Home » Warren Neuburger

Warren Neuburger

Warren Neuburger has served as Chief Information Officer for PGi since 2014 and was named Executive Vice President, Global Operations and Customer Care in 2015. Mr. Neuburger has a proven record of leading organizations to double-digit growth and profitability, and he’s applied his results-driven approach and leadership abilities to helping PGi maintain a leading position among global collaboration software providers. With the global IT team, Mr. Neuburger is optimizing PGi’s IT systems for agile software development and SaaS delivery.

PGi — General Data Protection Regulation

A new European privacy law, the General Data Protection Regulation (GDPR), comes into force on 25 May 2018.  The GDPR substantially harmonizes data protection compliance requirements across the EU, imposes accountability and security obligations on organizations which collect and process personal data, and gives individuals new and enhanced rights over their personal data. It also regulates how data is shared …

Read More »

Big Data: The Key to Collaboration-Centric Business

big data, collaboration

Recently I participated in a webinar panel with IT and marketing leaders on building alignment between the CIO and CMO, and surprisingly every speaker agreed: most of us are there or well on our way. The next frontier is building a collaboration-centric culture across the company, and data is the place you start. Just about every business function now needs …

Read More »

Reinventing Global IT with an Eye on the Customer

global IT

The most common perception of IT is that it is the guys in the back room that make all those invisible systems work and help you get your laptop working again when you get stuck. The traditional industry focus of IT has been on gaining better efficiencies and reducing costs. And to be honest, that is the way it works …

Read More »

IT Must Partner and Adapt to Deliver Business Value

The role and responsibilities of today’s CIO are evolving thanks to a myriad of new business trends and technologies. Increased demand for smartphones, tablets and wearable devices in the workplace brings along with it new challenges, such as managing BYOD devices and mitigating shadow IT. The deployment of SaaS-based tools is booming, and with it comes challenges related to security …

Read More »

Turning the Problem of Shadow IT into Opportunity

The ease of deployment, use and maintenance of Software-as-a-Service (SaaS) applications is something of a double-edged sword for IT departments. While they often let IT lower their support burdens and costs, they also effectively give every employee within an organization an easy way to circumvent IT altogether and acquire their own cloud-based tools without IT’s involvement or knowledge. Known as …

Read More »

How to Ensure Employees Are Using the Technology You’re Giving Them

Companies introduce new technologies to their employee base with the best of intentions. Before every deployment of a new tool, the unsung heroes of the IT department go through a lengthy purchasing decision with several vendors vying for their business, finally settling on a solution and deftly managing the installation process. This process can take weeks if not months to …

Read More »

What Keeps IT Up at Night Part 2: Enemies at the Gates

We recently heard insights from IT experts about the dangers presented by vulnerabilities in their internal user base and processes, such as password weakness and the challenges of balancing flexible work and BYOD with creating secure systems. However, the other very real side of the security coin is external threats and data breaches. How do CTOs and CIOs protect against …

Read More »

What Keeps IT Up at Night Part 1: The Human Element

What’s keeping CIOs and CTOs up at night these days? We presented this question to a variety of IT leaders. While there were a scattering of other answers, the vast majority all revolved around the same concern: security. Whether it’s educating and equipping your internal users with the knowledge and tools to protect company data, protecting against external attacks and …

Read More »
Powered By OneLink