Practices
Enterprise IT
Cyber Security
Data & Analytics
Product & Engineering
Private Equity
View All
Expertise
Roles We Recruit
How We Work
Clients & Testimonials
Focus
Hiring Managers
Candidates
Insight
Resource Hub
The Heller Report
Blog
Company
Our Team
Contact
Newsroom
Contact Us
Get The Heller Report.
View Details
Practices
Enterprise IT
Cyber Security
Data & Analytics
Product & Engineering
Private Equity
View All
Expertise
Roles We Recruit
How We Work
Clients & Testimonials
Focus
Hiring Managers
Candidates
Insight
Resource Hub
The Heller Report
Blog
Company
Our Team
Contact
Newsroom
Login
Contact Us
Home
/
Martha Heller
Cyber Security
How Boards Can Identify a CISO to Drive Business Enabled Innovation
How Boards Can Identify a CISO to Drive Business Enabled Innovation
Product & Engineering
Trust, Transparency, and Traceability: The New QA Mandates
Cyber Security
5 Lessons Learned from Inside A Ransomware Attack
AI
How Going ‘All In’ on AI Yielded Business Benefits for Software Developer
All Posts
Eash Sundaram: CIOs Offer Much-needed Expertise to PE-owned Businesses
Leading Tech in a PE Portfolio Company: 5 Things You Need to Know
The Quotable #CIO: Wit and Wisdom in the Age of Twitter, 8th Edition
IT Leaders
CIO Recommended Reading List for 2018
IT Leaders
The Quotable #CIO: Wit and Wisdom in the Age of @Twitter, Part VII
CIO Interview Guide
Hiring Managers
CIO Recommended Reading List for 2017
IT Leaders
Be the Business: CIOs in the New Era of IT is published
Hiring Managers
IT Leaders
What is a CTO?
Hiring Managers
The Quotable #CIO: Wit and Wisdom in the Age of @Twitter, Part VI
Twitter Accounts Our Readers Recommend for IT Executives
CIOs Share How They Are Rebranding IT
Newer Posts
1
2
3
4
5
...
11
Older Posts