logo
  • Practices
    • Enterprise IT
    • Cyber Security
    • Data & Analytics
    • Product & Engineering
    • Private Equity
    • View All
  • Expertise
    • Roles We Recruit
    • How We Work
    • Clients & Testimonials
  • Focus
    • Hiring Managers
    • Candidates
  • Insight
    • Resource Hub
    • The Heller Report
    • Blog
  • Company
    • Our Team
    • Contact
    • Newsroom
  • Contact Us

Get The Heller Report. View Details

logo
logo
  • Practices
    • Enterprise IT
    • Cyber Security
    • Data & Analytics
    • Product & Engineering
    • Private Equity
    • View All
  • Expertise
    • Roles We Recruit
    • How We Work
    • Clients & Testimonials
  • Focus
    • Hiring Managers
    • Candidates
  • Insight
    • Resource Hub
    • The Heller Report
    • Blog
  • Company
    • Our Team
    • Contact
    • Newsroom
  • Login
  • Contact Us
Home / Martha Heller
  • Cyber Security
A CIO’s Checklist for Bringing Shadow AI into the Light
A CIO’s Checklist for Bringing Shadow AI into the Light
A CIO’s Checklist for Bringing Shadow AI into the Light
The Zero-Disruption Playbook: 6 Principles to Keep A Transformation Initiative on Track
  • Data & Analytics
The Zero-Disruption Playbook: 6 Principles to Keep A Transformation Initiative on Track
Cyber Means Business: Dr. Margaret Cunningham on How Human Behavior Shapes Security Practices – and Business Outcomes
  • Product & Engineering
Cyber Means Business: Dr. Margaret Cunningham on How Human Behavior Shapes Security Practices – and Business Outcomes
A Framework for AI Governance as Boards Shift Focus from Risk to Opportunity
  • Data & Analytics
A Framework for AI Governance as Boards Shift Focus from Risk to Opportunity
Search
Type
  • All Types
  • IT Leaders
  • Hiring Managers

By clicking Subscribe, you consent to Heller Search storing and processing your personal information to provide you the content requested.You may unsubscribe at any time. View our privacy policy.

overlay-4
Subscribe to The Heller Report
Subscribe
overlay-4
All Posts
Eash Sundaram: CIOs Offer Much-needed Expertise to PE-owned Businesses
Leading Tech in a PE Portfolio Company: 5 Things You Need to Know
The Quotable #CIO: Wit and Wisdom in the Age of Twitter, 8th Edition
  • IT Leaders
CIO Recommended Reading List for 2018
  • IT Leaders
The Quotable #CIO: Wit and Wisdom in the Age of @Twitter, Part VII
CIO Interview Guide
  • Hiring Managers
CIO Recommended Reading List for 2017
  • IT Leaders
Be the Business: CIOs in the New Era of IT is published
  • Hiring Managers
  • IT Leaders
What is a CTO?
  • Hiring Managers
The Quotable #CIO: Wit and Wisdom in the Age of @Twitter, Part VI
Twitter Accounts Our Readers Recommend for IT Executives
CIOs Share How They Are Rebranding IT
Newer Posts 1 2 3 4 5 ... 11 Older Posts
heller-overlay-1
Subscribe to the Heller Report

logo (1)

Executive
Search
for the Data
Economy

  • Practices
  • Enterprise IT
  • Cyber Security
  • Data & Analytics
  • Product & Engineering
  • Private Equity
  • Expertise
  • Roles We Recruit
  • How We Work
  • Clients & Testimonials
  • Focus
  • Hiring Managers
  • Candidates
  • Insight
  • Resource Hub
  • The Heller Report
  • Company
  • Our Team
  • Contact
  • Newsroom
  • LinkedIn

©2026 Heller Search Associates, Inc. |

  • Privacy Policy

Web Design by GoingClear