IDEAS home Printed from https://ideas.repec.org/a/spr/elmark/v35y2025i1d10.1007_s12525-025-00786-8.html
   My bibliography  Save this article

The CIO–CISO relationship in a globally networked business—An interview with Nestlé AG

Author

Listed:
  • M. Eric Johnson

    (Vanderbilt University)

  • Hans Brechbühl

    (SDA Bocconi School of Management)

Abstract

Information security has become increasingly important in networked businesses that are digitally enabled. AI, cloud computing, digital platforms, and the proliferation of Internet-enabled devices have created rapid business innovation and a steady stream of security challenges. This article explores the relationship between the Chief Information Officer (CIO) and the Chief Information Security Officer (CISO) in a large, globally networked enterprise. Nestlé AG’s Group CIO, Chris Wright, and CISO John Petersen highlight the growing security challenges of moving and storing data around the world, with the resulting implications for networked businesses operating on shared global infrastructures and digital platforms.

Suggested Citation

  • M. Eric Johnson & Hans Brechbühl, 2025. "The CIO–CISO relationship in a globally networked business—An interview with Nestlé AG," Electronic Markets, Springer;IIM University of St. Gallen, vol. 35(1), pages 1-10, December.
  • Handle: RePEc:spr:elmark:v:35:y:2025:i:1:d:10.1007_s12525-025-00786-8
    DOI: 10.1007/s12525-025-00786-8
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s12525-025-00786-8
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s12525-025-00786-8?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to

    for a different version of it.

    References listed on IDEAS

    as
    1. Sepideh Ebrahimi & Kamran Eshghi, 2022. "A meta-analysis of the factors influencing the impact of security breach announcements on stock returns of firms," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(4), pages 2357-2380, December.
    2. Hippolyte Lefebvre & Pavel Krasikov & Christine Legner & Gabin Flourac, 2025. "Data management as a joint value proposition—A design theory for horizontal data sharing communities," Electronic Markets, Springer;IIM University of St. Gallen, vol. 35(1), pages 1-21, December.
    3. Arthur Kari & Pepe Bellin & Martin Matzner & Martin Gersch, 2025. "Governing the emergence of network-driven platform ecosystems," Electronic Markets, Springer;IIM University of St. Gallen, vol. 35(1), pages 1-27, December.
    4. Jacob Haislip & Jee-Hae Lim & Robert Pinsker, 2021. "The Impact of Executives’ IT Expertise on Reported Data Security Breaches," Information Systems Research, INFORMS, vol. 32(2), pages 318-334, June.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Tao Chen & Shuwen Pi & Qing Sophie Wang, 2025. "Artificial Intelligence and Corporate Investment Efficiency: Evidence from Chinese Listed Companies," Working Papers in Economics 25/05, University of Canterbury, Department of Economics and Finance.
    2. Zhaohua Deng & Guorui Fan & Zihao Deng & Bin Wang, 2024. "Why Doctors Participate in Teams of Online Health Communities? A Social Identity and Brand Resource Perspective," Information Systems Frontiers, Springer, vol. 26(5), pages 1915-1941, October.
    3. Slapničar, Sergeja & Axelsen, Micheal & Bongiovanni, Ivano & Stockdale, David, 2023. "A pathway model to five lines of accountability in cybersecurity governance," International Journal of Accounting Information Systems, Elsevier, vol. 51(C).
    4. Romanus Izuchukwu Okeke & Max Hashem Eiza, 2023. "The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies," Information Systems Frontiers, Springer, vol. 25(2), pages 451-472, April.
    5. Simon Kratzer & Andreas Drechsler & Markus Westner & Susanne Strahringer, 2022. "The Fractional CIO in SMEs: conceptualization and research agenda," Information Systems and e-Business Management, Springer, vol. 20(3), pages 581-611, September.
    6. Jin Li & Wei Xiao & Chong Zhang, 2023. "Data security crisis in universities: identification of key factors affecting data breach incidents," Palgrave Communications, Palgrave Macmillan, vol. 10(1), pages 1-18, December.
    7. Uddin, Mohammad Rajib & Akter, Shahriar & Lee, Wai Jin Thomas, 2024. "Developing a data breach protection capability framework in retailing," International Journal of Production Economics, Elsevier, vol. 271(C).
    8. Seaton Kelton, Andrea & Yang, Ya-Wen, 2024. "Understanding cybersecurity breach contagion effects: The role of the loss heuristic and internal controls," International Journal of Accounting Information Systems, Elsevier, vol. 55(C).
    9. Rainer Alt, 2022. "Electronic Markets on AI and standardization," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(4), pages 1795-1805, December.
    10. Jana Ammann & Thomas Hess, 2025. "To sell, to donate, or to barter? Value creation and capture through business model types in decentralized data ecosystems," Electronic Markets, Springer;IIM University of St. Gallen, vol. 35(1), pages 1-22, December.
    11. Tan, Weijie & Tang, Qiuyu & Sun, Wanting & Du, Xuanyu, 2025. "Unintended consequences: Examining the effects of government digital regulation on corporate fintech innovation in China," Emerging Markets Review, Elsevier, vol. 64(C).
    12. Guohong, Zheng & Zhongwei, Xia & Feng, He & Zhongyi, Xiao, 2025. "The audit committee’s IT expertise and its impact on the disclosure of cybersecurity risk," Research in International Business and Finance, Elsevier, vol. 73(PA).
    13. Caluwe, Laura & Wilkin, Carla L. & De Haes, Steven & Huygh, Tim, 2024. "Board roles required for IT governance to become an integral component of corporate governance," International Journal of Accounting Information Systems, Elsevier, vol. 54(C).

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:elmark:v:35:y:2025:i:1:d:10.1007_s12525-025-00786-8. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.