28 January 2013

taking on new CHAPTER5 : Organizational structure that support strategic initiative

1. Differentation between chief information officer (CIO), chief technology officer (CTO), chief security officer (CSO), chief privacy officer (CPO), and chief knowledge officer (CKO).

CHIEF INFORMATION OFFICER

  • Responsible for overseeing all uses of information technology and ensuring the strategic aligment of IT with business goals and objectives.
  • Ensure the delivery of all IT project on time and within budget.
  • Ensure the strategic vision of IT is in line with the strategic vision of the organization.
  • Advocate and communicate the IT strategy by building and maintain strong executive relationship.
CHIEF TECHNOLOGY OFFICER
  • Develop and approve the DISA net-centricity and IP convergence strategy.
  • Review and approREsve detailed net-centricityion and IP converge plans develop by Program and Service Managero
  • Conduct technical review of all solutions, products and service to determine compliance with overall DISA strategy and evaluate soundness of technicalapproach.
  • Conduct technical reconnaissance to identify and recommend innovative engineering technique, tecnology and products that may be of use to DISA.
  • Represent DISA at senior level technical exchanges, conference, panels, etc.
  • Advice the director and vice director on all aspect off technology relevant to DISA effort.
CHIEF SECURITY OFFICER
  • Ensuring the confidentiality  of sensitive information processed by, stored in, and moved through information systems and application belonging to the enterprises. Example of sensitive information processed by enterprise include personally identifiable information and other privacy ACT protected records, pre-release economic statistic, information provided by companies and individuals under the assumption of confidentiality, and pre-award contract financial information.
  • Ensuring the integrity of enterprise information such that decisions and actions taken based upon the data processed by, stored in, and moved through enterprise information system can be made with the assurance that the information has not been manipulated, the information is not subject to repudiation, the source of the changes to information can be determined as best as possible.
  • Ensuring the availability of enterprise information system and applications during routine operations and in crisis situation to support the enterprise mission.
  • Responsibility for ensuring and developing strategy and IT safeguards again attacks from hackers and viruses.
  • CSO process detailed knowledge of networks and telecommunication because hackers and viruses usually find their way into IT system through networked computers.
CHIEF PRIVACY OFFICER
  • Responsibility fr ensuring the ethical and legal use of information within an organization.
  • CPO are the newest senior executive position in IT.
  • LAwyer training enabling them to understand the often complex legal issue sorrounding the use of information.
CHIEF KNOWLEDGE OFFICER
  • Responsible for collecting, maintaing and distributing the organization knowledge.
  • CKO designs program and system that make it easy for people to use knowledge.
  • Can contribute directly to the organization buttom line by reducing the learning curve for new employees or employees roles.

No comments:

Post a Comment