
The Two Faces of Cybersecurity
In the race to beef up security measures through electronic surveillance, the crucial “human factor” is often overlooked.
In the race to beef up security measures through electronic surveillance, the crucial “human factor” is often overlooked.
For 30 years, companies have sought to outsource and offshore IT as a way to reduce costs and/or quickly improve performance. Mega-deals were done in the ’90s and then, after that market was saturated, lesser deals ensued.
Racing past red flags to introduce a new product or service invariably backfires. Here’s how to get the launch process right.
Information technology project failures cost companies millions in new technology expenses, manual workarounds, additional customer service and reputational damage. What’s more, failure rates are high. A look at three IT undertakings that went massively wrong offers some insights into what CEOs and companies can do to spot runaway projects early and take steps to get them back on track.
All companies—not just big, public firms—are vulnerable to security breaches. Fortunately, there are measures CEOs can take to mitigate risk.
When Gregg Steinhafel, Target’s CEO since 2008, abruptly resigned in May, the company’s recent weak financial performance clearly factored into the change. However, the massive
While most CEOs realize that computers have produced significant productivity, many remain frustrated with their company’s Information Technology activity due to: 1) Poor communication, 2) Persistent Unresolved Difficulties; and 3) Surprises.
Is your company overweight, bloated, and out of shape? Is it burdened by rolls of inventory fat? Just how far from “just-in-time” is your delivery?
Chief Executive Group exists to improve the performance of U.S. CEOs, senior executives and public-company directors, helping you grow your companies, build your communities and strengthen society. Learn more at chiefexecutivegroup.com.
0