Tech Leaders Benefit from a Cyber-Savvy Boardroom

Bob Zukis, Noah Barsky
CISOs, CIOs, and other technology leaders are well-served with a strong digital- and cyber-savvy corporate board, as are shareholders and other corporate stake­holders. In a world increasingly dependent on complex digital systems for growth and resiliency, ensuring the boardroom is a critical digital and cyber-control point is a necessary and overdue step.

Tech Leaders Benefit from a Cyber-Savvy Boardroom

Bob Zukis, Noah Barsky
CISOs, CIOs, and other technology leaders are well-served with a strong digital- and cyber-savvy corporate board, as are shareholders and other corporate stake­holders. In a world increasingly dependent on complex digital systems for growth and resiliency, ensuring the boardroom is a critical digital and cyber-control point is a necessary and overdue step.

Digital Twins for Sustainability: Current Status & Applications

Curt Hall
Digital twins provide an advanced form of simulation and modeling for building virtual digital versions of real-world entities and processes. How are organizations using digital twins to implement sustainability projects? This Advisor considers the use of digital twins in sustainability scenarios — including some real-world applications involving smart cities, smart buildings, and clean energy production.

The Role of Business Architecture in Software Design

William Ulrich
In this on-demand webinar with Cutter Fellow William Ulrich, you'll discover why holistic, formally defined, and highly rationalized business abstractions are vital to the success of software design and related IT deliverables.

Quantum Computing Will Drive Parallel Innovation

Joseph Byrum
This Advisor explores how the power behind quantum computing can enable today’s most difficult algorithms to be solved in a matter of seconds, enabling real-time processing, analysis, and modeling of data unthinkable with current methods. Parallel processing will accelerate the effectiveness of teams using data analytics to boost efficiency.

Leading Successful Tech Projects Requires Courage

Ralph Menzano
Why do technology projects succeed? The most vital ingredient is organizational and personal courage.

Leading Successful Tech Projects Requires Courage

Ralph Menzano
Why do technology projects succeed? The most vital ingredient is organizational and personal courage.

Green, Secure IoT for Enhanced Sustainability Strategies

San Murugesan

The Internet of Things (IoT) is being used — and can be used — in key business and industry sectors, buildings, and households to improve energy and operational efficiency, thereby minimiz­ing environmental impact. In this Advisor, we take an inward-looking approach to examine how we can reduce IoT’s own environmental impact and explore its cybersecurity risks. We also discuss how we can leverage and benefit from IoT’s full climate-action potential and help create a sustainable environment.


Practical Use Cases of IoT Solutions in Healthcare

Ulrica Sehlstedt, Rebecka Axelsson Wadman, Sean McDevitt, Agron Lasku
Today’s Internet of Things (IoT) solutions have tremendous potential to enhance healthcare operations and generate overall improvements to care outcomes, cost, and efficiency. New IoT solutions for healthcare are smarter and, more importantly, tailored to the needs and requirements of healthcare organizations. In this Advisor, we explore two practical use cases of IoT solutions in healthcare.

Balancing Growth & Sustainability: Technology-Led Business Model Transformations

Pradipta Chakraborty
Companies can’t choose between growth and sustainability — they must have both. This Executive Update explores this issue and proposes ways to identify the right technology portfolio to support new business models that lead to growth while ensuring sustainability goals.

Promoting Gender Equality at the Leadership Level

Keren Joseph Browning
The increases of women in senior or executive roles over the past two decades have been less than inspiring. It would seem, therefore, that although leadership literature has played a significant role in raising the profile of women in management, much needs to happen in actual board rooms and manage­ment suites in order to advance the careers of women in leadership positions.

Cyber AI: Leveraging the AI-Cybersecurity Nexus for Heightened Protection

San Murugesan
San Murugesan looks at how artificial intelligence (AI) strategies can enhance information systems security. He calls this “cyber AI” and discusses how activities such as monitoring, threat hunting, and incident response can benefit from AI/machine learning solutions. The article covers the use of AI in behavioral analytics, threat intelligence, ransomware attack detection, smart identity governance, online fraud detection, deepfakes, and risk assessment. Finally, the author points out the potential for malicious use of AI in the increasing occurrence of cyber threats. His thoughtful piece provides a deep exploration of the nexus between AI and cybersecurity from an expert viewpoint.

Intensifying Attacks Demand New Strategies

Abhijit Dasgupta
Abhijit Dasgupta, an accom­plished security risk leader with extensive experience in building and leading security risk and digital governance practices globally, comments on the changing threat landscape and highlights the enhanced risk from both new remote work practices across businesses as a result of COVID as well as from cryptocurrencies. He suggests strategies such as zero trust, perimeter-less, and multi-cloud.

Intensifying Attacks Demand New Strategies

Abhijit Dasgupta
Abhijit Dasgupta, an accom­plished security risk leader with extensive experience in building and leading security risk and digital governance practices globally, comments on the changing threat landscape and highlights the enhanced risk from both new remote work practices across businesses as a result of COVID as well as from cryptocurrencies. He suggests strategies such as zero trust, perimeter-less, and multi-cloud.

Proactive Defense: Threat Hunting & Deception

James Motherway
James Motherway, a senior threat hunt analyst, offers practical insights on proactive defense with threat hunting and deception. He believes that, as cyberattacks become bolder and more widespread, reactive security is not enough. Even worse, many organizations suffer from detection blind spots or collect lots of data that does not help. Motherway believes security teams have no choice but to invest in proactive capabilities to protect their operations.

Proactive Defense: Threat Hunting & Deception

James Motherway
James Motherway, a senior threat hunt analyst, offers practical insights on proactive defense with threat hunting and deception. He believes that, as cyberattacks become bolder and more widespread, reactive security is not enough. Even worse, many organizations suffer from detection blind spots or collect lots of data that does not help. Motherway believes security teams have no choice but to invest in proactive capabilities to protect their operations.

Effective Cybersecurity Starts with Strengthening the Corporate Boardroom

Bob Zukis, Noah Barsky
The authors describe how systemic risk should be factored in as a board priority and how to enhance preparedness. They argue that in terms of bolstering cybersecurity, the corporate boardroom is “too frequently a non­existent or under­performing control point for many organizations.” Zukis and Barsky go on to discuss the vulnerability of today’s highly connected and complex systems to systemic risks that can cause damage to the entire system. Finally, their article illustrates how boardroom mechanisms for governing digital and cyber risk can benefit enterprises.

Effective Cybersecurity Starts with Strengthening the Corporate Boardroom

Bob Zukis, Noah Barsky
The authors describe how systemic risk should be factored in as a board priority and how to enhance preparedness. They argue that in terms of bolstering cybersecurity, the corporate boardroom is “too frequently a non­existent or under­performing control point for many organizations.” Zukis and Barsky go on to discuss the vulnerability of today’s highly connected and complex systems to systemic risks that can cause damage to the entire system. Finally, their article illustrates how boardroom mechanisms for governing digital and cyber risk can benefit enterprises.

Cyberattacks: Strategies That Matter — Opening Statement

Anjali Kaushik
In this issue of CBTJ, we address the question, “Why are cyberattacks on the rise, and what strategies/practices can organizations adopt to address and minimize the chance of these attacks?” Our five articles were carefully selected to highlight the strategies that enterprises can follow to enhance their security posture.

Cyberattacks: Strategies That Matter — Opening Statement

Anjali Kaushik
In this issue of CBTJ, we address the question, “Why are cyberattacks on the rise, and what strategies/practices can organizations adopt to address and minimize the chance of these attacks?” Our five articles were carefully selected to highlight the strategies that enterprises can follow to enhance their security posture.

Flexibility Can Help Tech Close the DEI Gap

Benjamin Duke

societal attitude that home and childcare duties should be carried out by women is widespread in many countries. During the COVID-19 global pandemic, more women than men lost their jobs or felt they had to stop work. But the IT sector initiated, and needs to continue with, COVID-19-induced societal transformation toward remote work.


What Does “DEI” Really Mean?

Samin Saadat
The term “DEI” (diversity, equity, inclusion) is currently trending across the business world but is frequently and increasingly misused. In this Advisor, we break down each concept into simple language that can help your company "walk the talk" when it comes to organizational transformation.

Cybersecurity Vulnerability Management for Medical Devices

Hans Martin von Stockhausen, Frances Paulisch
Cybersecurity vulnerability management for medical devices is an area of concern for both medical device manufacturers and healthcare delivery organizations. The issues related to updates, configuration, and patch management are extremely challenging in the medical domain, especially with ransomware attacks designed to exploit well-known technologies used in medical devices. The article describes a centralized service and continuous patch delivery that can be adopted as an industry practice for medical device manufacturers, and is an important read for all cybersecurity and healthcare professionals.

Cybersecurity Vulnerability Management for Medical Devices

Hans Martin von Stockhausen, Frances Paulisch
Cybersecurity vulnerability management for medical devices is an area of concern for both medical device manufacturers and healthcare delivery organizations. The issues related to updates, configuration, and patch management are extremely challenging in the medical domain, especially with ransomware attacks designed to exploit well-known technologies used in medical devices. The article describes a centralized service and continuous patch delivery that can be adopted as an industry practice for medical device manufacturers, and is an important read for all cybersecurity and healthcare professionals.

Advancing DEI with Evolving Attitudes and Inclusive Language

Benjamin Duke
DEI problems are created by offensive and archaic attitudes that persist in the workplace. As explored in this Advisor, organizations can advance DEI by removing their institutional structural barriers and by using inclusive language to help create an equitable workplace.