{"title":"CIO职位的风险评估和风险评价","authors":"Eugenio Orlandi","doi":"10.1109/CCST.2005.1594858","DOIUrl":null,"url":null,"abstract":"In the turmoil of globalization, nothing is stable except change. As far as enterprises are concerned, cost reduction is a must. The information technology (IT) function is the ideal candidate to experiment rightsizing and outsourcing policies that seem the best way to ensure competitiveness. The CIO (Chief Information Officer) is the natural candidate scapegoat. To avoid this fate, the today \"new CIO leader\" has to overcome the traditional role of technical expert and implement strategies for the survival of the IS unit. In this effort, the conceptual framework of IT security can be of help. The contingency planning and risk management techniques applied to the IS unit require ad hoc models to define the exact nature of threats, vulnerabilities, and countermeasures.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"83 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Risk assessment and risk evaluation of CIO's position\",\"authors\":\"Eugenio Orlandi\",\"doi\":\"10.1109/CCST.2005.1594858\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the turmoil of globalization, nothing is stable except change. As far as enterprises are concerned, cost reduction is a must. The information technology (IT) function is the ideal candidate to experiment rightsizing and outsourcing policies that seem the best way to ensure competitiveness. The CIO (Chief Information Officer) is the natural candidate scapegoat. To avoid this fate, the today \\\"new CIO leader\\\" has to overcome the traditional role of technical expert and implement strategies for the survival of the IS unit. In this effort, the conceptual framework of IT security can be of help. The contingency planning and risk management techniques applied to the IS unit require ad hoc models to define the exact nature of threats, vulnerabilities, and countermeasures.\",\"PeriodicalId\":411051,\"journal\":{\"name\":\"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology\",\"volume\":\"83 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2005.1594858\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2005.1594858","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Risk assessment and risk evaluation of CIO's position
In the turmoil of globalization, nothing is stable except change. As far as enterprises are concerned, cost reduction is a must. The information technology (IT) function is the ideal candidate to experiment rightsizing and outsourcing policies that seem the best way to ensure competitiveness. The CIO (Chief Information Officer) is the natural candidate scapegoat. To avoid this fate, the today "new CIO leader" has to overcome the traditional role of technical expert and implement strategies for the survival of the IS unit. In this effort, the conceptual framework of IT security can be of help. The contingency planning and risk management techniques applied to the IS unit require ad hoc models to define the exact nature of threats, vulnerabilities, and countermeasures.