Search

Search Result Image for 'Security & Privacy by Design: A Cultural Revolution and a Matter of Corporate Social Responsibility for Tech Firms'
Security & Privacy by Design: A Cultural Revolution and a Matter of Corporate Social Responsibility for Tech Firms
JC GAILLARD·7 September 2016·Cyber Security
...For years, many technology firms have treated security and privacy matters as an afterthought. It was at best a necessary evil related to regulations and compliance; at worst, something you would window-dress on the day in front of those few clients who would ask the question. Read More...
 thedigitaltransformationpeople.com· 3 Shares
Search Result Image for 'Cyber Security: Who Cares? and What Happens Next?'
Cyber Security: Who Cares? and What Happens Next?
JC GAILLARD·7 September 2016·Cyber Security
...In recent years, the topic of digital transformation has moved to the top of the agenda in the business world. However, most of these discussions all too often seem to bypass the issue of cyber security. This is hard to understand in a context where many studies have clearly illustrated that cyber and privacy threats have started to damage the trust of consumers and have the potential to destroy considerable amounts of value. Read More...
 thedigitaltransformationpeople.com· 11 Shares
Search Result Image for 'Cyber Security: The Misleading Message of the Technology Industry'
Cyber Security: The Misleading Message of the Technology Industry
JC GAILLARD·6 September 2016·Cyber Security
...There is an incredible amount of material online and on social media around cyber security. But the vast majority of it is either sponsored by technology vendors or directly associated with them. They range from start-ups or specialised software houses (large and small), all the way up to industry heavy weights. They sponsor industry events, conferences and publications of all sorts, including the specialised supplements of many broadsheets and magazines. They produce white papers, reports, surveys and the like, in numbers sufficient to fill several bookcases every year. Read More...
 thedigitaltransformationpeople.com· 14 Shares
Search Result Image for 'Knee-Jerk Reactions to Data Breaches are damaging the case for Cyber Security'
Knee-Jerk Reactions to Data Breaches are damaging the case for Cyber Security
JC GAILLARD·24 August 2016·Cyber Security
...Cyber Security Transformation is not about implementing yet another technology product.  Anybody who has spent a few years in InfoSec management has seen this happen: Following an internal near-miss or some high-profile security incident widely publicised in the media (such as the TalkTalk data breach in the UK), the same senior executives – who previously wouldn’t bat an eyelid over information security issues – suddenly start panicking: Priorities shift. Immediate solutions are demanded. Money appears out of nowhere by the millions. Tech vendors are lined up. Some product is purchased that will allegedly fix everything. A box is checked, then normality returns. Read More...
 thedigitaltransformationpeople.com· 6 Shares
Search Result Image for 'Enabling Your CIO'
Enabling Your CIO
Simon Ratcliffe·24 August 2016·People & Change
...Most businesses are becoming increasingly dependent on IT, not just for daily operations, but as the enabler of digital transformation in a world that is being disrupted every day with new approaches to enacting business. The inherent problem within most businesses is the tension that is ever present between IT Operations and the need for innovation and change.  Over the past thirty years, with the exception of the dot com blip, IT departments have been tasked with ensuring the availability of key systems, updating things where necessary and responding with resources, often in large scale projects, aimed at transforming an aspect of a business. Read More...
 thedigitaltransformationpeople.com· 0 Shares
Search Result Image for 'Digital Disruption: How CEOs Can Lead The Way'
Digital Disruption: How CEOs Can Lead The Way
Shawna Ryan·24 August 2016·People & Change
...Shawna Ryan, Editor, Meet The Boss, asks thought leaders in marketing how CEOs are leading the way in an industry where digital transformation looms large. Read More...
 thedigitaltransformationpeople.com· 11 Shares
Search Result Image for '9 Resources To Create Better B2B Buyer Personas'
9 Resources To Create Better B2B Buyer Personas
Jed Singer·24 August 2016·Customer Engagement
...According to Aberdeen Research, marketers who use buyer personas and map content to the Buyer Journey enjoy 73% higher conversions from response to marketing qualified lead. At this point, you know you need Buyer Personas. The search term has been gaining steam the last few years, peaking at a Google Trends Score of 100 (out of 100) in May of 2016. Read More...
 thedigitaltransformationpeople.com· 2 Shares
Search Result Image for 'Consulting Industry Attacked on Three Sides'
Consulting Industry Attacked on Three Sides
Braden Kelley·24 August 2016·Strategy & Innovation
...The worlds of employment and business are becoming increasingly turbulent as the stability of the enterprise grows ever shorter, the loyalty of the enterprise to its people faces extinction, and the wealthy countries of the world stand at a precipice of overhanging debt. Increasingly intelligent digital technologies and mercurial customer expectations threaten both people and enterprise at every turn. Read More...
 thedigitaltransformationpeople.com· 1 Share
Search Result Image for 'Social Network Analysis Using R'
Social Network Analysis Using R
Birendra Kumar Sahu·23 August 2016·Data & Analytics
...R is a programming language and an environment for statistical computing. R development takes advantage of a growing community that cooperates in its development due to its open source philosophy. In effect, the source code of every R component is freely available for inspection and/or adaptation.This fact allows you to… Read More...
 thedigitaltransformationpeople.com· 1 Share
Search Result Image for 'The Key Steps Towards a Successful InfoSec Practice'
The Key Steps Towards a Successful InfoSec Practice
JC GAILLARD·22 August 2016·Cyber Security
...Cyber threats are a reality for most organisations. However, misconceptions and misunderstandings about the true nature of InfoSec are still hindering the protection of highly strategic information assets. Here, we offer to outline key pitfalls that CIOs should avoid in order to successfully lead their organisations towards an effective InfoSec practice. Read More...
 thedigitaltransformationpeople.com· 6 Shares
Search Result Image for 'The Current Role of most CISOs Lacks Clarity and Needs to Change'
The Current Role of most CISOs Lacks Clarity and Needs to Change
JC GAILLARD·22 August 2016·Cyber Security
...Cyber threats are a growing concern for most organisations. However, it appears that reactive, expensive and inefficient practices are still underpinning most InfoSec strategies. As we have argued in previous articles, it is an issue that must be addressed primarily at the people and process levels through an effective cyber security governance framework – instead of traditional approaches that have historically treated the problem as a mere IT problem and focused only on technology solutions. Read More...
 thedigitaltransformationpeople.com· 6 Shares