Risk
3/5/2014
03:27 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail

Target Seeks New CIO

Data breach last year prompts CIO Beth Jacob to resign; Target will hire interim CIO and chief compliance officer.

Image credit: Jay Reed on Flickr.
Image credit: Jay Reed on Flickr.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Li Tan
50%
50%
Li Tan,
User Rank: Apprentice
3/9/2014 | 11:18:19 PM
Re: CIO or Chief Customer Officer?
Good point - we should have a know-how person in the enterprise, who has hands-on experience about security related technologies and the understanding about corportate security. CIO should not be the one who takes full security ownership.
Ariella
50%
50%
Ariella,
User Rank: Apprentice
3/6/2014 | 3:11:21 PM
Re: CIO or Chief Customer Officer?
@Alison that's an excellent point. Who has a greater need than a huge retailer with both physcial stores and an online presence?
Alison_Diana
50%
50%
Alison_Diana,
User Rank: Apprentice
3/6/2014 | 10:28:43 AM
Re: Target seeks Beth Jacob replacement
If she fought for better security and was shot down, then it seems unfair. If security was low on her radar, then she was part of the problem that allowed hackers to break into the company and damage its sales and image. As a CIO, you play a bigger and bigger role in a company's image these days. Tech is a large part (both before and behind the scenes). Think websites, etail, apps, and partnerships with third-party apps like Shopkick, and it's clear how important tech is to actual transactions plus marketing and engagement. That's one reason CIOs must push hard for smart security spending. Even if boards don't agree, at least CIOs are on record if the unimaginable happens. 
Alison_Diana
50%
50%
Alison_Diana,
User Rank: Apprentice
3/6/2014 | 10:24:51 AM
Re: CIO or Chief Customer Officer?
I am surprised a company as large as Target did not have a chief security officer. A CIO doesn't need to have hands-on experience with technology; they should know how an organization can use technology to differentiate the business. But a CSO or CISO must be well-versed in security technologies and understand how various solutions can safeguard employees, customers, and partners without impacting the experience.
Li Tan
50%
50%
Li Tan,
User Rank: Apprentice
3/6/2014 | 12:45:41 AM
Re: Target seeks Beth Jacob replacement
From this perspective, CIO is becoming a kind of job with higher and higher risk. You need to not only make the decision for IT infrastructure, but also take care of the operation and prevent any kind of security breach. If an accident happened, unfortunately you may risk your career.:-(
Charlie Babcock
50%
50%
Charlie Babcock,
User Rank: Strategist
3/5/2014 | 6:22:53 PM
Target seeks Beth Jacob replacement
Very hard to apportion blame from the outside. I'd be curous what an objective security expert, if there is such a thing, would say. The shops of some of the best people are broken into. But this decision to replace her will be noted by every CIO in the country and security will be tightened in many places,
WKash
50%
50%
WKash,
User Rank: Apprentice
3/5/2014 | 5:19:03 PM
Re: CIO or Chief Customer Officer?
Michael,  you make a good point here.  When you see what Amazon has done to retailing, even companies like Target have no choice but to morph into world class tech operations.
Michael Endler
50%
50%
Michael Endler,
User Rank: Apprentice
3/5/2014 | 5:07:43 PM
Re: CIO or Chief Customer Officer?
I think that's the case. Silicon Valley vendors are fond of saying that every company in the world will soon be a technology company. It's a good sales slogan when you're the one selling tech products and services-- but for any company the size of Target, it's also true.
WKash
50%
50%
WKash,
User Rank: Apprentice
3/5/2014 | 5:01:55 PM
Re: CIO or Chief Customer Officer?
Tom, I concede you're probably right.  The task of managing IT is so complex, being a good executive may no longer be enough.
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Moderator
3/5/2014 | 4:32:10 PM
Re: CIO or Chief Customer Officer?
Target doesn't mention any specific technical credentials in her bio. I wonder whether anyone can be a truly effective CIO these days without also having the CTO skillset.
Page 1 / 2   >   >>
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4734
Published: 2014-07-21
Cross-site scripting (XSS) vulnerability in e107_admin/db.php in e107 2.0 alpha2 and earlier allows remote attackers to inject arbitrary web script or HTML via the type parameter.

CVE-2014-4960
Published: 2014-07-21
Multiple SQL injection vulnerabilities in models\gallery.php in Youtube Gallery (com_youtubegallery) component 4.x through 4.1.7, and possibly 3.x, for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) listid or (2) themeid parameter to index.php.

CVE-2014-5016
Published: 2014-07-21
Multiple cross-site scripting (XSS) vulnerabilities in LimeSurvey 2.05+ Build 140618 allow remote attackers to inject arbitrary web script or HTML via (1) the pid attribute to the getAttribute_json function to application/controllers/admin/participantsaction.php in CPDB, (2) the sa parameter to appl...

CVE-2014-5017
Published: 2014-07-21
SQL injection vulnerability in CPDB in application/controllers/admin/participantsaction.php in LimeSurvey 2.05+ Build 140618 allows remote attackers to execute arbitrary SQL commands via the sidx parameter in a JSON request to admin/participants/sa/getParticipants_json, related to a search parameter...

CVE-2014-5018
Published: 2014-07-21
Incomplete blacklist vulnerability in the autoEscape function in common_helper.php in LimeSurvey 2.05+ Build 140618 allows remote attackers to conduct cross-site scripting (XSS) attacks via the GBK charset in the loadname parameter to index.php, related to the survey resume.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.