Search

Search Result Image for 'Realizing the Software Defined Enterprise'
Realizing the Software Defined Enterprise
David Sprott·3 October 2016·Delivery
...While Gartner seem to be the primary advocates of software defined everything, (SDx) it’s rather obvious that SDx is primarily focused on service delivery, infrastructure and networks. I give full credit to Jason Bloomberg for exploring software defined development and devops in his recent blog. [1] He merges SDx and Shift Left ideas saying,  “If we combine no-code with DevOps properly, we now have a way of abstractly representing working production software, including its functionality. Not just the limited-scope apps that some no-code platforms are best known for, but full-blown, enterprise-class applications – created from nothing but their abstract representations with the push of a button.” Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'Who can you trust?'
Who can you trust?
Ian Glover·2 October 2016·Cyber Security
...Ian Glover, president of CREST, explains why penetration testing is a vital weapon in the battle against cyber crime and why you wouldn’t want just anyone trying to break into your company. Read More...
 thedigitaltransformationpeople.com· 5 Shares
Search Result Image for 'Cyber War – the facts'
Cyber War – the facts
Ian Glover·2 October 2016·Cyber Security
...Ian Glover, President of CREST talks Cyber War, Government and what business can do to protect itself.   Read More...
 thedigitaltransformationpeople.com· 2 Shares
Search Result Image for 'CREST: Closing the Gender Gap in Cyber Security'
CREST: Closing the Gender Gap in Cyber Security
Ian Glover·2 October 2016·Cyber Security
...CREST releases report exploring the reasons behind the lack of gender diversity in cyber security and looks at ways to drive change.   Read More...
 thedigitaltransformationpeople.com· 26 Shares
Search Result Image for 'Millennials and Cybersecurity: Where did it go wrong?'
Millennials and Cybersecurity: Where did it go wrong?
JC GAILLARD·28 September 2016·Cyber Security
...As millennials are massively entering the workforce, it is not rare to see them depicted as the great generation that is going to deeply transform the way business is done. Born between 1980 and 2000, this “net” generation is the first one to be fully “digital native” and endowed with a supposedly innate sense of how the modern technology functions. As a result, millennials are often praised as highly adaptable and thus as valuable assets for an organisation in a business environment that is constantly being shaken by technology and the digital transformation of society at large. Read More...
 thedigitaltransformationpeople.com· 18 Shares
Search Result Image for 'Don’t Wait for Magic; you are the Magic!'
Don’t Wait for Magic; you are the Magic!
Richard Cronin·14 September 2016·People & Change
...Have you ever sat there and wanted something to change? Probably. What have you done about it to make a successful change transformation? Chances are, not a lot. Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'How to Rebound From Failure'
How to Rebound From Failure
Richard Cronin·14 September 2016·People & Change
...Failure is inevitable. At some point in your life, you are going to suffer a setback, whether it is when you are applying for a position at a new company, trying to meet KPIs and targets, or making a sale to a large prospective client. Not succeeding at a task is nothing to be ashamed of, it is how you react and carry on that determines your long term success. Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'Leadership and the digital agenda'
Leadership and the digital agenda
Richard Chiumento·14 September 2016·People & Change
...Digital transformation has become a key priority for boardrooms across the globe. Such transformation means different things to different organisations but typically involves the digitisation of processes, services, products, customer experiences and more. It also encompasses making better use of data and analytics across the organisation. Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for '5 Social Business Predictions for 2017'
5 Social Business Predictions for 2017
Rachel Mezzatesta·12 September 2016·Customer Engagement
...In the past two years, we have seen a focus on content creation and storytelling, the inception of real time video with successes like Meerkat and Periscope and the rapid adoption of specialized networks and tools like BeBee and Slack. Read More...
 thedigitaltransformationpeople.com· 6 Shares
Search Result Image for 'See through the hype; chart your digital course now'
See through the hype; chart your digital course now
Jens Harsaae·12 September 2016·The Case For Digital Transformation
...If buzz words and tech lingo cloud your sight, you’re not alone. This article contains some navigation aid. Judging from the hype, most companies today face a burning platform of unseen magnitude[1]. The rate of change accelerates and predicting outcomes almost impossible. And – to be clear – digital transformation is relevant for all industries, even if speed and magnitude vary. Read More...
 thedigitaltransformationpeople.com· 13 Shares
Search Result Image for 'The CIO Guide to a Successful Information Security Practice: 8 Key Management Pitfalls to Avoid'
The CIO Guide to a Successful Information Security Practice: 8 Key Management Pitfalls to Avoid
JC GAILLARD·7 September 2016·Cyber Security
...This article is a summary of the series “The CIO Guide to a successful Information Security Practice – 8 Key Management pitfalls to avoid” published on the Corix Partners blog in May and June 2015. The series deconstructs eight commonly held views on Information Security that CIOs would have encountered, and highlights the key Governance and Leadership rules CIOs and CISOs should follow to build and deliver a successful Information Security practice. Read More...
 thedigitaltransformationpeople.com· 11 Shares
Search Result Image for 'For A New Approach to Cyber Security Executive Education'
For A New Approach to Cyber Security Executive Education
JC GAILLARD·7 September 2016·Cyber Security
...Last January, Brown University launched a milestone “Executive Master in Cybersecurity”. The 16-months program aims at training a new generation of top security executives by offering professionals with a combination of on-campus as well as online, highly collaborative and interactive education modules. Experts from many different departments of the University were drawn into the program in order to provide students with a deep understanding of this multi-faceted issue – looking at InfoSec from a global, technical, human, and policy perspective. Read More...
 thedigitaltransformationpeople.com· 7 Shares