ACS Vic announces Pathways scholarships
- 06 July, 2011 12:00
The Australian Computer Society’s (ACS) Victorian arm has committed to fostering the careers of three senior ICT managers, sponsoring their participation in the CIO Executive Council’s Pathway’s Program.
The ICT development and leadership program, created by the Executive Council and designed by CIOs, will run for 12 months and focuses on the business and leadership aspects of the CIO position rather than the technical.
The three successful scholarship applicants, announced at the Vic State iAwards, are Adam Smith, Craig Lindley and David Makin.
The ACS based the selection on the applicants past achievements and their potential to make a significant difference in ICT.
The program is now in its second year and has about 90 participants around Australia.
In March, the CIO Executive Council launched ‘Pathways Advanced’ and ‘Pathways Business’, designed in conjunction with Rob Livingstone Advisory.
Pathways program universal core competencies
- Change leadership
- Collaboration and influence
- Commercial orientation
- External customer focus
- Market knowledge
- People and organisational development
- Results orientation
- Strategic orientation
- Team leadership
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Russian Underground 101
This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.
Tolly Report: Performance Survey of Virtual Environment Security
This report by Tolly tests the system resource requirements of competing vendor solutions when performing on-demand and on-access scanning functions, during distributed definition updates. Click to download how the four competing options ranked against each other.
Advanced Malware Exposed
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. This ebook will provide readers with a new understanding of the rapidly developing cyber threat landscape and practical insights into how they can protect their data and computing infrastructures. Download now.