How we chose the 2012 CIO 100 winners
- 27 July, 2012 13:22
Beginning last November, we solicited applications for the 2012 CIO 100 Awards through ads in CIO and our online newsletters, and through electronic mailings to our print subscribers, event attendees and publicists who sign up to receive our editorial announcements.
Entrants filled out an online application between November 2011 and late February 2012. Although most applications came from companies headquartered in North America, the pool included entries from multiple continents.
Two CIO 100 judges--who included former CIOs, academic experts and independent consultants--read each application. The judges evaluated the applications according to two criteria: innovation and business value. Applications that received a score of 15 or higher (out of a possible 20) were selected for a second round of scrutiny by CIO editors.
We examined how each company stacked up against the others in the pool, putting emphasis on submissions that told the best stories about generating business value through creative and cutting-edge uses of technology. We sought to cull the most exciting initiatives from the pack and reward them with the CIO 100 honor.
The companies we selected for this year's CIO 100 Awards range from nonprofits to multibillion-dollar global powerhouses, and they come from every industry. Companies had to demonstrate not only that they were able to create new value using IT and to execute their project well, but also that they did so in uncommon, innovative ways: pioneering a new technology, applying a familiar technology to a new purpose, setting the bar higher for their competitors. We also emphasized projects that, due to their scope and impact, are helping propel companies to a more profitable future. In short, these organizations are technology leaders.
The list of award winners was published in the July 1 issue of CIO magazine, and award plaques will be handed out at the 2012 CIO 100 Symposium and Awards Ceremony, August 19-21, in Rancho Palos Verdes, Calif.
Read more about innovation in CIO's Innovation Drilldown.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Russian Underground 101
This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.
Detecting APT Activity with Network Traffic Analysis
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.
Spear-Phishing Email: Most Favored APT Attack Bait
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.