Search

Search Result Image for 'Controlling & Delivering Digital Transformation Using A Collaborative And Cross-functional Approach'
Controlling & Delivering Digital Transformation Using A Collaborative And Cross-functional Approach
Andrew Salmon·25 February 2020·People & Change
...Controlling and delivering Digital Transformation can be a challenge! In this business education webinar,  Digital Transformation expert, Andrew Salmon of Digital Works Consulting, shares his experience, recommendations and best practices to help guide you through your transformation journey. Andrew shares some top advice on how to control and successfully deliver… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'Why storytelling is key to marketing and user experience design'
Why storytelling is key to marketing and user experience design
Garret Keogh·17 February 2020·Customer Engagement
...We’re all vying for audience attention. You’re there trying to promote your service or product whilst your audience’s social media feeds are full of pictures of somebody’s baby, Christmas dinner, and that cute cat doing something adorable! All things that pull on people’s emotional heartstrings. So you need to… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'Reflections on a decade of Digital Transformation'
Reflections on a decade of Digital Transformation
Didier Bonnet·4 February 2020·The Case For Digital Transformation
...On the eve of this new decade, it is worth reflecting on what has truly been one of the most talked-about, exciting and challenging business transition of the 2010s, digital transformation. So much ink has been spilt on the topic in the past few years that it is difficult to… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'Why are we still facing so many security products and vendors?'
Why are we still facing so many security products and vendors?
JC GAILLARD·14 January 2020·Cyber Security
...A symptom of the unhealthy relationship between cyber security and large firms: as we reach one of the high points of each year’s conference season, one has to reflect once more on the staggering number of products and vendors active across the cybersecurity space. Once again, they will line up… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'Orchestrating Transformation: How to deliver winning performance with a connected approach to change.  An Executive Summary'
Orchestrating Transformation: How to deliver winning performance with a connected approach to change. An Executive Summary
The Digital Transformation People·19 December 2019·Strategy & Innovation
...This is an Executive Summary of Orchestrating Transformation: How to deliver winning performance with a connected approach to change by Michael Wade, James Macauley, Andy Noronha and Joel Barbier It is a practical how-to guide on implementing Digital Transformation and presents a checklist of methods that can be… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'How to recognize a good data scientist'
How to recognize a good data scientist
Matthew Gierc·9 December 2019·Data & Analytics
...To understand what drives a data scientist, we need to understand what doesn’t. There’s a reason why the term “scientist” is used to describes practitioners of this alchemy, and sans the white coat and clipboard, one might have difficulty telling the data scientist apart from their laboratory equivalent. Rather than… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'Start-ups: your most valuable asset in the long run will be the trust of your customers'
Start-ups: your most valuable asset in the long run will be the trust of your customers
JC GAILLARD·5 December 2019·Cyber Security
...Bake it in from the start: “Moving fast and breaking things” will become a thing of the past as customers and investors take security and privacy more and more seriously. It seems that security is still – at best – an afterthought for most start-ups as they go about building… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for '2020 Prediction: Align to Modernize'
2020 Prediction: Align to Modernize
Mark Hewitt·2 December 2019·Strategy & Innovation
...In-house innovation teams and centers of excellence (COEs) became the norm for progressive organizations in 2019. As modernization continues, in-house innovation teams will mature and scale with external support to create, nurture and facilitate new ideas. In 2020, modernization will occur by deploying both inside out… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'It is possible to prevent Phishing'
It is possible to prevent Phishing
Chris Murphy·27 November 2019·Cyber Security
...There is no such thing a “human error” when it comes to phishing. Phishing is a successful deception of an authorized user by an unauthorized user. Preforming all activity in public is a security protocol problem not human error. Commingling secure and public communication is a choice every organization makes. Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'Cyber Security – a look across two decades'
Cyber Security – a look across two decades
JC GAILLARD·15 November 2019·Cyber Security
...The Security industry talks a lot about what could go wrong … but not so much about how to improve things. Research released today by The Security Transformation Research Foundation, ahead of the Cyber Security Leadership Summit in Berlin on 12-14 November… Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'An inadvertent mistake undermines Cybersecurity'
An inadvertent mistake undermines Cybersecurity
Chris Murphy·24 October 2019·Cyber Security
...It is necessary to put the mistake in context to understand the weakness it introduced. Business leaders cannot address a problem when a mistake has become an accepted norm. This is written so a business audience can understand the mistake their cybersecurity experts aren’t explaining. Sometimes mistakes are so obvious,… Read More...
 thedigitaltransformationpeople.com· 0 Shares