Risk
3/5/2014
03:27 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail

Target Seeks New CIO

Data breach last year prompts CIO Beth Jacob to resign; Target will hire interim CIO and chief compliance officer.

Image credit: Jay Reed on Flickr.
Image credit: Jay Reed on Flickr.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Li Tan
50%
50%
Li Tan,
User Rank: Apprentice
3/9/2014 | 11:18:19 PM
Re: CIO or Chief Customer Officer?
Good point - we should have a know-how person in the enterprise, who has hands-on experience about security related technologies and the understanding about corportate security. CIO should not be the one who takes full security ownership.
Ariella
50%
50%
Ariella,
User Rank: Apprentice
3/6/2014 | 3:11:21 PM
Re: CIO or Chief Customer Officer?
@Alison that's an excellent point. Who has a greater need than a huge retailer with both physcial stores and an online presence?
Alison_Diana
50%
50%
Alison_Diana,
User Rank: Moderator
3/6/2014 | 10:28:43 AM
Re: Target seeks Beth Jacob replacement
If she fought for better security and was shot down, then it seems unfair. If security was low on her radar, then she was part of the problem that allowed hackers to break into the company and damage its sales and image. As a CIO, you play a bigger and bigger role in a company's image these days. Tech is a large part (both before and behind the scenes). Think websites, etail, apps, and partnerships with third-party apps like Shopkick, and it's clear how important tech is to actual transactions plus marketing and engagement. That's one reason CIOs must push hard for smart security spending. Even if boards don't agree, at least CIOs are on record if the unimaginable happens. 
Alison_Diana
50%
50%
Alison_Diana,
User Rank: Moderator
3/6/2014 | 10:24:51 AM
Re: CIO or Chief Customer Officer?
I am surprised a company as large as Target did not have a chief security officer. A CIO doesn't need to have hands-on experience with technology; they should know how an organization can use technology to differentiate the business. But a CSO or CISO must be well-versed in security technologies and understand how various solutions can safeguard employees, customers, and partners without impacting the experience.
Li Tan
50%
50%
Li Tan,
User Rank: Apprentice
3/6/2014 | 12:45:41 AM
Re: Target seeks Beth Jacob replacement
From this perspective, CIO is becoming a kind of job with higher and higher risk. You need to not only make the decision for IT infrastructure, but also take care of the operation and prevent any kind of security breach. If an accident happened, unfortunately you may risk your career.:-(
Charlie Babcock
50%
50%
Charlie Babcock,
User Rank: Moderator
3/5/2014 | 6:22:53 PM
Target seeks Beth Jacob replacement
Very hard to apportion blame from the outside. I'd be curous what an objective security expert, if there is such a thing, would say. The shops of some of the best people are broken into. But this decision to replace her will be noted by every CIO in the country and security will be tightened in many places,
WKash
50%
50%
WKash,
User Rank: Apprentice
3/5/2014 | 5:19:03 PM
Re: CIO or Chief Customer Officer?
Michael,  you make a good point here.  When you see what Amazon has done to retailing, even companies like Target have no choice but to morph into world class tech operations.
Michael Endler
50%
50%
Michael Endler,
User Rank: Apprentice
3/5/2014 | 5:07:43 PM
Re: CIO or Chief Customer Officer?
I think that's the case. Silicon Valley vendors are fond of saying that every company in the world will soon be a technology company. It's a good sales slogan when you're the one selling tech products and services-- but for any company the size of Target, it's also true.
WKash
50%
50%
WKash,
User Rank: Apprentice
3/5/2014 | 5:01:55 PM
Re: CIO or Chief Customer Officer?
Tom, I concede you're probably right.  The task of managing IT is so complex, being a good executive may no longer be enough.
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Moderator
3/5/2014 | 4:32:10 PM
Re: CIO or Chief Customer Officer?
Target doesn't mention any specific technical credentials in her bio. I wonder whether anyone can be a truly effective CIO these days without also having the CTO skillset.
Page 1 / 2   >   >>
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5426
Published: 2014-11-27
MatrikonOPC OPC Server for DNP3 1.2.3 and earlier allows remote attackers to cause a denial of service (unhandled exception and DNP3 process crash) via a crafted message.

CVE-2014-2037
Published: 2014-11-26
Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466.

CVE-2014-6609
Published: 2014-11-26
The res_pjsip_pubsub module in Asterisk Open Source 12.x before 12.5.1 allows remote authenticated users to cause a denial of service (crash) via crafted headers in a SIP SUBSCRIBE request for an event package.

CVE-2014-6610
Published: 2014-11-26
Asterisk Open Source 11.x before 11.12.1 and 12.x before 12.5.1 and Certified Asterisk 11.6 before 11.6-cert6, when using the res_fax_spandsp module, allows remote authenticated users to cause a denial of service (crash) via an out of call message, which is not properly handled in the ReceiveFax dia...

CVE-2014-7141
Published: 2014-11-26
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and crash) via a crafted type in an (1) ICMP or (2) ICMP6 packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?