Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Target Seeks New CIO
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
WKash
WKash,
User Rank: Apprentice
3/5/2014 | 4:22:07 PM
CIO or Chief Customer Officer?
By most every measure, Target CIO Beth Jacob has had an impressive career.  If anyone understood Target's business and its customers, she did. And her advancement through the organization suggests she understood how to manage big issues in a fast moving environment, which is what retailers must do every week. 

Whether she was up to the task of managing Target's Technology Services, or simply had to take the sword in what is proving to be a very costly hacking, only Target's insiders will know. 

Her departure raises two questions.  Are enterprises better served when a business (customer) champion is in charge of IT, so long as the IT team has the requisite talent, versus someone who came up through the tech ranks?  (My sense is, with the right management skills, the answer is sure, why not?)  The other question is, what are other CEOs across the nation doing to elevate IT security in their firms in the aftermath of the Target breach?

Target's CEO Gregg Steihafel certainly found out the hard way how costly it can be not being prepared for today's rapidly evolving cyber threats.

 
 Bup to eth Jacob is by all accounts a very impressive woman. She has a bachelor's degree in retail merchandising and an MBA, and has risen steadily at a major retailer to become Executive Vice President and CIO at a young age. Sounds like a perfect job, right? Except when you consider that the company where she's spent most of her career just experienced a breach of 40 million credit and debit cards during the holiday season. - See more at: http://www.enterprisingcio.com/368/will-cio-become-target#sthash.kGOX0ORO.dpuf
<<   <   Page 2 / 2


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Developing and Testing an Effective Breach Response Plan
Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to: -understand the technical environment, -determine what types of incidents would trigger the plan, -know which stakeholders need to be notified and how to do so, -develop steps to contain the breach, collect evidence, and initiate recovery.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-41902
PUBLISHED: 2022-12-06
TensorFlow is an open source platform for machine learning. The function MakeGrapplerFunctionItem takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds memory read or a crash is triggered. We have p...
CVE-2022-41910
PUBLISHED: 2022-12-06
TensorFlow is an open source platform for machine learning. The function MakeGrapplerFunctionItem takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds memory read or a crash is triggered. We have p...
CVE-2022-45816
PUBLISHED: 2022-12-06
Auth. Stored Cross-Site Scripting (XSS) vulnerability in GD bbPress Attachments plugin &lt;= 4.3.1 on WordPress.
CVE-2022-45829
PUBLISHED: 2022-12-06
Auth. Path Traversal vulnerability in Easy WP SMTP plugin &lt;= 1.5.1 at WordPress.
CVE-2022-45833
PUBLISHED: 2022-12-06
Auth. Path Traversal vulnerability in Easy WP SMTP plugin &lt;= 1.5.1 on WordPress.