Search

Search Result Image for 'Giving Away the Farm – a Business Strategy'
Giving Away the Farm – a Business Strategy
Kenneth Gustin·24 September 2017·Strategy & Innovation
...After decades in B2B sales I’m convinced the corporate sales culture is toxic. As a sales person, I’ve taken class after class on selling skills and they pretty much all use a stingy philosophy which (all sugar coating aside) pits you against the customer. Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'Why Banks Should Reinvent Banking in the Era of Platform Economy'
Why Banks Should Reinvent Banking in the Era of Platform Economy
Deepthi Rajan·20 September 2017·Strategy & Innovation
...Six of the ten most valuable companies in the world are platform companies. None of the six is a bank. Admittedly, banks are late to the platform party. Nonetheless, banks are set on — what would have been considered impossible until a few years ago — transforming themselves from impassable… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'Unified Access Control – Explained'
Unified Access Control – Explained
Chris Murphy·19 September 2017·Cyber Security
...The current cyber crisis is the result of a misapplication of technology based on a misunderstanding applying security protocols. Much of the current cyber crisis was created by a choice made last century. ANY path forward requires analysis of past decisions. Why were the choices made? Were those decisions correct? Are they still valid? Read More...
 thedigitaltransformationpeople.com· 7 Shares
Search Result Image for 'How #GoogleTez is failing to create the WeChat of India'
How #GoogleTez is failing to create the WeChat of India
Sreeraman Thiagarajan·18 September 2017·Enabling Technologies
...Google Tez is a UPI based payment app for Android and Apple IOS launched by Google in India today; it has uncanny resemblances to China’s leading chat-based commerce app called WeChat.   Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'Large Firms: What role for the Group CISO?'
Large Firms: What role for the Group CISO?
JC GAILLARD·18 September 2017·Cyber Security
...The role of the CISO and their reporting line seems to be a continuing topic of discussion amongst cyber security professionals. The same title often hides a large diversity of roles, positioned differently across their respective organisations. It often reflects the maturity of each firm towards the appreciation of the threats it faces, the need for business protection, and its appetite for controls. Read More...
 thedigitaltransformationpeople.com· 12 Shares
Search Result Image for 'The Digital Transformation People Newsletter #6'
The Digital Transformation People Newsletter #6
News In Digital·4 September 2017·The Case For Digital Transformation
...Welcome to issue #6.  An emphasis on strategy and customer experience, and in case you missed it; some research on the shared characteristics of those exceptional firms that manage to successfully transform their businesses and push into new growth markets. How to achieve success in Digital Transformation; key insights, strategies and case studies for success in Issue #6 Read More...
 thedigitaltransformationpeople.com· 43 Shares
Search Result Image for 'The CISO and the Business'
The CISO and the Business
JC GAILLARD·21 August 2017·Cyber Security
...Keep appointing pure technologists in CISO roles and you’ll never win. The Wannacry ransomware attack that affected so many large firms in May 2017 led to a number of animated discussions amongst InfoSec communities.       Read More...
 thedigitaltransformationpeople.com· 35 Shares
Search Result Image for 'Reporting Line of the CISO: What Really Matters'
Reporting Line of the CISO: What Really Matters
JC GAILLARD·24 July 2017·Cyber Security
...Corporate culture and the profile of the CISO are key, over and above any arbitrary organisational consideration. It is astonishing to see the amount of interest still surrounding the reporting line of the CISO.  Read More...
 thedigitaltransformationpeople.com· 12 Shares
Search Result Image for 'Blockchain: What are the opportunities for Procurement?'
Blockchain: What are the opportunities for Procurement?
Bertrand Maltaverne·23 July 2017·Enabling Technologies
...To be honest, I haven’t totally figured out all of the details of the inner workings of the blockchain technology. And, I do not think I will ever try to as some of it is very technical. I also do not believe that Procurement professionals should take a deep dive either.    Read More...
 thedigitaltransformationpeople.com· 23 Shares
Search Result Image for 'The Magic Triangle – An internal lens to build amazing growth companies'
The Magic Triangle – An internal lens to build amazing growth companies
Sangram Vajre·23 July 2017·Customer Engagement
...If you've followed me for a while, you know that I'm particularly keen on finding a way to make magic happen - in every situation. As a startup co-founder, one of the key areas that I get excited about is what makes the magic happen? What is it that makes a certain company explode and seemingly amazing product tank? Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'Proof-of-Identity: Applying Basic Security Protocols'
Proof-of-Identity: Applying Basic Security Protocols
Chris Murphy·16 July 2017·Cyber Security
...This is the complete Proof-of-Identity series. Each subject is 1300 characters or less. Security Protocols are not optional, here are the proper application of some critical security protocols. Read More...
 thedigitaltransformationpeople.com· 14 Shares
Search Result Image for 'A Quick Overview of PETYA Ransomware'
A Quick Overview of PETYA Ransomware
Vimal Mani·16 July 2017·Cyber Security
...Petya Ransomware is different than regular ransomwares we have seen in. It infects low-level structure (MBR [Master Boot Record], MFT [Master File Table]) and doesn’t allow the computer to boot normally. It will infect MBR and on restart, it has its own low language code to encrypt MFT, which makes the drive inaccessible.  Read More...
 thedigitaltransformationpeople.com· 0 Shares