PRO+ Premium Content/Information Security

Thank you for joining!
Access your Pro+ Content below.
January 2009

The evolving role of the CIO involves IT and security responsibilities

SHAWN PARTRIDGE CONTINUALLY nudges his staff and his superiors at Rockford Construction in Grand Rapids,Mich., to view information security-and IT in general-as a means to bring about positive changes for an industry beset by economic woes. "Until I came here, IT was a support mechanism," says Partridge, whose company has no CIO. "It was seen as a cost center only." Since Partridge, vice president of IT, implemented Web portals to make site management easier, employees "used to running projects with a walkietalkie and a pad of paper" are not only embracing the new technology but are helping him evangelize the importance of good security habits. "We implement different levels of access" for foremen, customers, and others with a stake in a project, Partridge says. As threats to corporate data grow, putting organizations' reputation and revenue on the line, many CIOs and IT executives view information security with appropriate urgency. They're working to elevate security in the enterprise by expanding their roles and ...

Access this PRO+ Content for Free!

Features in this issue

  • Product Review: Cenzic Hailstorm Enterprise ARC 5.7

    Web application security has moved from a niceto- have to a must-have requirement, for data protection and compliance. Cenzic's Hailstorm, which we last reviewed in 2005, reflects the growth in the depth and maturity of Web application vulnerability assessment software.

  • Product Review: GoldKey Secure USB Token

    The GoldKey Secure USB Token works with Windows and Macintosh operating systems to provide a secure place to stash encryption keys for virtual disks. By keeping encryption keys on a small, removable USB token, GoldKey simplifies the task of locking away important information on laptops and encourages good security behaviors.

  • Product Review: Hedgehog Enterprise 2.2

    Eight years after the release of Microsoft SQL 2000, we're still looking for help from bolt-on security product vendors to harden and protect critical production database servers. Sentrigo's Hedgehog Enterprise 2.2 is designed to monitor and protect against known and unknown database threats.

Columns in this issue