Search

Search Result Image for '5 Social Business Predictions for 2017'
5 Social Business Predictions for 2017
Rachel Mezzatesta·12 September 2016·Customer Engagement
...In the past two years, we have seen a focus on content creation and storytelling, the inception of real time video with successes like Meerkat and Periscope and the rapid adoption of specialized networks and tools like BeBee and Slack. Read More...
 thedigitaltransformationpeople.com· 6 Shares
Search Result Image for 'See through the hype; chart your digital course now'
See through the hype; chart your digital course now
Jens Harsaae·12 September 2016·The Case For Digital Transformation
...If buzz words and tech lingo cloud your sight, you’re not alone. This article contains some navigation aid. Judging from the hype, most companies today face a burning platform of unseen magnitude[1]. The rate of change accelerates and predicting outcomes almost impossible. And – to be clear – digital transformation is relevant for all industries, even if speed and magnitude vary. Read More...
 thedigitaltransformationpeople.com· 13 Shares
Search Result Image for 'The CIO Guide to a Successful Information Security Practice: 8 Key Management Pitfalls to Avoid'
The CIO Guide to a Successful Information Security Practice: 8 Key Management Pitfalls to Avoid
JC GAILLARD·7 September 2016·Cyber Security
...This article is a summary of the series “The CIO Guide to a successful Information Security Practice – 8 Key Management pitfalls to avoid” published on the Corix Partners blog in May and June 2015. The series deconstructs eight commonly held views on Information Security that CIOs would have encountered, and highlights the key Governance and Leadership rules CIOs and CISOs should follow to build and deliver a successful Information Security practice. Read More...
 thedigitaltransformationpeople.com· 11 Shares
Search Result Image for 'For A New Approach to Cyber Security Executive Education'
For A New Approach to Cyber Security Executive Education
JC GAILLARD·7 September 2016·Cyber Security
...Last January, Brown University launched a milestone “Executive Master in Cybersecurity”. The 16-months program aims at training a new generation of top security executives by offering professionals with a combination of on-campus as well as online, highly collaborative and interactive education modules. Experts from many different departments of the University were drawn into the program in order to provide students with a deep understanding of this multi-faceted issue – looking at InfoSec from a global, technical, human, and policy perspective. Read More...
 thedigitaltransformationpeople.com· 7 Shares
Search Result Image for 'Security & Privacy by Design: A Cultural Revolution and a Matter of Corporate Social Responsibility for Tech Firms'
Security & Privacy by Design: A Cultural Revolution and a Matter of Corporate Social Responsibility for Tech Firms
JC GAILLARD·7 September 2016·Cyber Security
...For years, many technology firms have treated security and privacy matters as an afterthought. It was at best a necessary evil related to regulations and compliance; at worst, something you would window-dress on the day in front of those few clients who would ask the question. Read More...
 thedigitaltransformationpeople.com· 3 Shares
Search Result Image for 'Cyber Security: Who Cares? and What Happens Next?'
Cyber Security: Who Cares? and What Happens Next?
JC GAILLARD·7 September 2016·Cyber Security
...In recent years, the topic of digital transformation has moved to the top of the agenda in the business world. However, most of these discussions all too often seem to bypass the issue of cyber security. This is hard to understand in a context where many studies have clearly illustrated that cyber and privacy threats have started to damage the trust of consumers and have the potential to destroy considerable amounts of value. Read More...
 thedigitaltransformationpeople.com· 11 Shares
Search Result Image for 'Cyber Security: The Misleading Message of the Technology Industry'
Cyber Security: The Misleading Message of the Technology Industry
JC GAILLARD·6 September 2016·Cyber Security
...There is an incredible amount of material online and on social media around cyber security. But the vast majority of it is either sponsored by technology vendors or directly associated with them. They range from start-ups or specialised software houses (large and small), all the way up to industry heavy weights. They sponsor industry events, conferences and publications of all sorts, including the specialised supplements of many broadsheets and magazines. They produce white papers, reports, surveys and the like, in numbers sufficient to fill several bookcases every year. Read More...
 thedigitaltransformationpeople.com· 14 Shares
Search Result Image for 'Knee-Jerk Reactions to Data Breaches are damaging the case for Cyber Security'
Knee-Jerk Reactions to Data Breaches are damaging the case for Cyber Security
JC GAILLARD·24 August 2016·Cyber Security
...Cyber Security Transformation is not about implementing yet another technology product.  Anybody who has spent a few years in InfoSec management has seen this happen: Following an internal near-miss or some high-profile security incident widely publicised in the media (such as the TalkTalk data breach in the UK), the same senior executives – who previously wouldn’t bat an eyelid over information security issues – suddenly start panicking: Priorities shift. Immediate solutions are demanded. Money appears out of nowhere by the millions. Tech vendors are lined up. Some product is purchased that will allegedly fix everything. A box is checked, then normality returns. Read More...
 thedigitaltransformationpeople.com· 6 Shares
Search Result Image for 'Enabling Your CIO'
Enabling Your CIO
Simon Ratcliffe·24 August 2016·People & Change
...Most businesses are becoming increasingly dependent on IT, not just for daily operations, but as the enabler of digital transformation in a world that is being disrupted every day with new approaches to enacting business. The inherent problem within most businesses is the tension that is ever present between IT Operations and the need for innovation and change.  Over the past thirty years, with the exception of the dot com blip, IT departments have been tasked with ensuring the availability of key systems, updating things where necessary and responding with resources, often in large scale projects, aimed at transforming an aspect of a business. Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'Digital Disruption: How CEOs Can Lead The Way'
Digital Disruption: How CEOs Can Lead The Way
Shawna Ryan·24 August 2016·People & Change
...Shawna Ryan, Editor, Meet The Boss, asks thought leaders in marketing how CEOs are leading the way in an industry where digital transformation looms large. Read More...
 thedigitaltransformationpeople.com· 11 Shares
Search Result Image for '9 Resources To Create Better B2B Buyer Personas'
9 Resources To Create Better B2B Buyer Personas
Jed Singer·24 August 2016·Customer Engagement
...According to Aberdeen Research, marketers who use buyer personas and map content to the Buyer Journey enjoy 73% higher conversions from response to marketing qualified lead. At this point, you know you need Buyer Personas. The search term has been gaining steam the last few years, peaking at a Google Trends Score of 100 (out of 100) in May of 2016. Read More...
 thedigitaltransformationpeople.com· 2 Shares