Posted by & filed under IT Infrastructure, IT Security, No Discussion Questions.









Description: The U.S. Army enlists new virtual world video game to teach soldiers interpersonal skills and cultural awareness for combat environments like Iraq and Afghanistan.

Source: Chris Gonsalves, Baseline

Date: 1/18/2008


Posted by & filed under IT Security, IT Standards.








Description: In 2008, the average number of security breaches increased slightly from previous years. Although the number of security breaches remained moderate over the last few years, the data indicates the severity levels have increased. This suggests many organizations have made significant progress in dealing with security issues, but the number and types of threats have increased in step.  The most significant costs of security breaches remains the overall impact on employee productivity. About one-third of U.S. respondents cite lost productivity as the top consequence of a breach, followed by a disruption of revenue-generating activities.  The primary cause for the most severe security breaches remains unintentional in nature and typically caused by human error. This demonstrates a need for more employee trainings and deeper knowledge of technology functions.

Source: CompTIA

Date: 2010


Discussion Questions:

  1. Forced compliance is always more costly than willing.  Why then do so many companies take a reactive rather than proactive stance?

Posted by & filed under IT Projects.








Description: Graphical display of top IT issues for CIOs and IT Directors.

Source: Peter Thomas

Date: 3/17/2009


Discussion Questions:

1. CIOs who have a more strategic role are more successful in what core strategic activities?  Why are these critical success factors?

2. Oversees the IT division typically:

a. CFO

b. CIO

c. President

d. It depends

3. To whom the CIO reports within the organization structure is critical because it determines decision making authority & autonomy:

a. C-suite shares highest level of strategy setting importance

b. Seen as strategic weapon if reporting to CEO

c. Cost cutting center will likely report to CFO

d. All of the above are correct

e. None of the above are correct

4. IT governance is a critical success factor:

a. To achieving overall strategic goals of the organization

b. For few organizations of small to mid-size

c. Within IT only

d. None of the above 

Posted by & filed under IT Security.




 Description: Yahoo was under attack, the first of several in one week that would dramatically expose cyberspace’s dirty secret: though the Internet is an amazing creation that has boosted our economy and provided lots of cheeky Super Bowl ads, it is still a work in progress that can be knocked silly with surprising ease. Even the e-commerce giants are no sturdier than any others. All it takes is a well-directed “denial of service” attack to blow away the edifices, at least on a temporary basis. And when you try to track the culprit, it turns out that all you can find is a shield–the dummy computers through which the cyber vandal laundered his poisonous computer code.

Source: Steve Levy, NewsWeek

Date: 1/21/2000


Discussion Questions:

  1. What defenses, if any, are there against cyber vandalism?

Posted by & filed under IT Planning.




Description: article about common mistakes related to strategic planning by IT professionals. 

Source: Derek Slater, CIO Magazine

Date: 6/1/2002


Discussion Questions:

1. Discuss the importance of IT-business alignment for CIOs.

2. IT initiatives may fail if:

a. IT is not aligned to the overall business strategy

b. CIO is not a member of the top executive level

c. Poor communication of the initiative

d. Lack of support at all levels

e. All of the above

3. Top issues facing CIOs:

a. Reducing costs

b. Attracting & retaining top talent

c. Managing change

d. All of the above

e. None of the above

4. Organized planning of IT resources:

a. Business strategic planning

b. IT strategic planning

c. Quarterly forecasting

d. Sourcing

Posted by & filed under IT Governance, Video.

Description: 7:36 minutes. YouTube video about the “governance,” or management, of information.  Many companies govern “money, finances, risks.”   This video presents argument about need for special, specific, different attention to the importance of controlling these assets; a context for what needs to be done.

Source: YouTube

Date: 10/23/2008


Discussion Questions:

  1. What is different about this direction of thinking versus the IT function as we know it?

Posted by & filed under IT Governance.






 Description: Whitepaper from IT Governance Institute, providing a discussion of IT governance trends by a panel of experts. The IT Governance Institute (ITGI) was established in 1998 to advance international thinking and standards in directing and controlling an enterprise’s information technology. ITGI developed Control Objectives for Information and related Technology (COBIT), now in its fourth edition, and Val IT, and offers original research and case studies to assist enterprise leaders and boards of directors in their IT governance responsibilities.

Source: IT Governance Institute

Date: 2007


Discussion Questions:

  1. Identify challenges to leaders for IT governance models to be implemented.