Viewing Security With A Service Perspective
More posts by this contributor:
More posts by this contributor:
I would say my perspective for media is relevant especially for a company which has a close relationship with customers. When you have a full connection with the customers. It’s gives you an opportunity to provide services for them in real time. So you don’t have to call to complain manager, you can pose complaint, we can see them and respond to it immediately when there is an issue or even more importantly when we have a chance to have real time training opportunity. We provided the application to our customers to make their shopping experience better. We think about what marketing used to be, it was very generic. We used to send out the marketing merchandise to everybody in a certain zip code. Social media gives us an opportunity to give specialized specific marketing and discussion that’s very different for you and it would be for me based on my current needs.
Social Media at Supervalu an asset and not a Potential Threat
From my perspective, a social media strategy is all based on our marketing strategies which is aligned with the IT organization to ensure that we can deliver what are customers need. So we try understanding customers better and ensure that we are building the platform that will make it different.
Maximizing cost efficiency for IT
Delivering high security services is one of my passions. It helps to think of delivering security from the service perspective. Having a great security platform allows you to protect information and customer data and privacy of their conversation allows you to have a higher sincerity to the customer. Looking at security project in the same manner as looking at business applications, they need to be justified the same, including hard and soft benefits, cost saving, productivity and operational upgrades.
Today's Threat Landscape Requires Adaptive Security
Staying Abreast of Application Development and Delivery
How to Ensure Information Security when Outsourcing Your Projects
This Is How Your Computer Gets Hacked!
By Patrick Quinn, CIO, Acuity Brands Lighting
By Ritesh Ramesh, Chief Technologist, Global Data and...
By James Streeter, Global VP Life Sciences Strategy, Oracle...
By Leebrian E. Gaskins, CIO, Texas A&M International University
By Anthony Hill, Executive Director Business & Enterprise...
By Bryan Tantzen, Senior Director, Kinetic Industry...
By Anu George, Chief Quality Officer, Morningstar
By Ron Winward, Security Evangelist, Radware
By Cynthia Johnson,Ex VP & CIO, California Resources...
By Miguel Lopes, VP, Product Line Management, Dialogic
By Hiro Imamura, Senior Vice President and General Manager,...
By Diana Bittle, Chief Technology Officer, American Fidelity
By Brady Jensen, Senior Director, Global Human Resources...
By Dave Pearson, Executive Vice President & CIO, Sykes...
By Plamen Petrov, VP, Artificial Intelligence, Anthem, Inc
By John Dyer, Deputy Chief Compliance Officer, Western Union
By Matt Rider, CIO, Information Technology, Franklin...
By Ian Glazer, Founder & President, IDPro
By Tim Skinner, Director Information Security, BlueCross...
By Brad Mitchell, CIO & Head of IT, CTBC Bank Corp. (USA)