Cio Quotes

Quotes tagged as "cio" Showing 1-5 of 5
Pearl Zhu
“The digital CIOs have to wear different colors of hats and master multiple leadership personas and management roles effortlessly.”
Pearl Zhu, 12 CIO Personas: The Digital CIO's Situational Leadership Practices

Pearl Zhu
“Information by itself is meaningless until it’s interpreted and analyzed to capture insight and harness innovation.”
Pearl Zhu, 12 CIO Personas: The Digital CIO's Situational Leadership Practices

Pearl Zhu
“CIOs need to leverage different conversations tyles to construct the collaborative vision and deliver high performance IT result.”
Pearl Zhu, 12 CIO Personas: The Digital CIO's Situational Leadership Practices

“I have often pointed out to students that the Jim Crow order had a specific and relatively brief life span. It was not completely consolidated until the end of the first decade of the twentieth century. All of my grandparents were fully sentient and aware of their social environments, if not full adults, before the order's features took definite shape and assumed the form of normal politics and everyday life. And during the roughly three decades or so between the regime's consolidation and its slow, painful unraveling, the system was placed under considerable strain and reorganized internally by the Great Migration of black people out of the South or to cities within it, the Great Depression and the New Deal, the emergence of the industrial unions of the Congress of Industrial Organizations (CIO) and the war. And in large and small ways, black people never stopped challenging its boundaries and constraints–from the struggle over its imposition to its eventual defeat.”
Adolph L. Reed Jr., The South: Jim Crow and Its Afterlives

“How can one identify the true owner of a cyber risk?

When everyone is responsible, no one is responsible. This is an undisputed fact.

To the best of my knowledge, organizations often rely on frameworks such as RACI matrices (Responsible, Accountable, Consulted, Informed) to formally assign ownership.

From another perspective, however, the “true owner” of a cyber threat is its creator. And here is where the truth may reside.

Whether it is hackers, insiders, corporate culture, a lack of CISO expertise, disinformation, or perhaps the very silos you have built. And wait. What about your CIO, your CEO, your Board? Think of them as the first line of cyber threats.

I can. I am a scientist, a researcher. I search for what I cannot even imagine at first. Then - it is up to you to decide where to look.”
Ludmila Morozova-Buss