CIO Work Report - Executive Brief (£)

Studies of Chief Information Officer (CIO) employment shows that they tend to stay in a job on average for only 4 years and 4 months. Nevertheless, the likelihood of a long career often increases significantly for those CIOs that stay longer than 2 years and get engaged with their organisations.

The first year as CIO is considered the quiet review when they attempt to understand the organisation’s systems and employees and they are often treated with quiet respect.

In the second year if they get engaged with strategy and planning and the Board they tend to stay longer.

In the third year they spend more time on systems and implementation.

In the fourth year if they discover that the implementation is not going well then early in the fifth year they start looking for their next job.

Often when CEOs try to improve IT they replace the CIO even when they have not really analysed the issues and the reasons for what they believe is required.

How long has your CIO held his/her position?

  • Less than 1 year: 16%
  • 1-2 years: 26%
  • 3-4 years: 19%
  • 5-7 years: 15%
  • More than 7 years: 24%

On average 51.3% of CEOs are satisfied with IT functions and less than 35% think CIOs and the IT departments are doing an adequate job. Often this is because the Board do not understand the IT issues and the CIO has not been given adequate time and assisted reporting analysis to explain clearly the issues to the Board and CEO.

Some of these findings may be attributed to the Board’s and the CIO’s inability to:

  • Effectively manage organisational relationships.
  • Understand the requirements and needs of different departments
  • Have adequate commercial understanding of the electronic opportunities and potential cognitive systems that could change the business strategy or products. IT will create on-going innovations that will help businesses capitalise on the growing technology opportunities.

Please Contact Cyber Security Intelligence: Here.

« Corporations Drowning In The Data Flood (£)
Business Is Struggling To Combat Hacking »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CEPS

CEPS

CEPS is a leading think tank and forum for debate on EU affairs, ranking among the top think tanks in Europe. Topic areas include Innovation, Digital economy and Cyber-security.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

NRD Cyber Security

NRD Cyber Security

NRD Cyber Security create a secure digital environment for countries, governments, and organisations and implement cybersecurity resilience enhancement projects around the world.

Ceerus

Ceerus

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Panorays

Panorays

Panorays automates third-party security lifecycle management. It is a SaaS-based platform, with no installation needed.

VIBE Cybersecurity International

VIBE Cybersecurity International

VIBE’s certificate-less authenticated encryption enables scalable, flexible key exchange, and other advanced cryptographic functions using identity-based elliptic curve cryptosystems (ECC).

Valid Network

Valid Network

Valid Network DSP is blending traditional cyber security methodologies with blockchain transactions to achieve trust, internal and federated between organizations and stake holders.

Semmle

Semmle

Semmle's code analysis platform helps teams find zero-days and automate variant analysis. Secure your code with continuous security analysis and automated code review.

AVANTEC

AVANTEC

AVANTEC is the leading Swiss provider of IT security solutions in the areas of cloud, content, network and endpoint security.

Lockheed Martin

Lockheed Martin

Lockheed Martin deliver full-spectrum cyber capabilities and cyber resilient systems to defense, intelligence community and global security customers.

SOC Prime

SOC Prime

SOC Prime is the only Threat Detection Marketplace where researchers monetize their content to help security teams defend against attacks easier, faster and more efficiently than ever.

Tenet3

Tenet3

Tenet3's vision is to make optimal cyber strategy development tractable, data driven, with concrete success metrics. The result is cost effective cyber resilience for our customers.

DESCERT

DESCERT

DESCERT offers you an extended IT, cyber security, risk advisory & compliance audit team which provides strategic guidance, engineering and audit services.

Lasso Security

Lasso Security

Lasso Security is a pioneer cybersecurity company ensuring comprehensive protection for businesses leveraging generative AI and other large language model technologies.

ZeroGPT

ZeroGPT

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text.