it (32)

To be able to fight various problems and downtime, companies across the globe are finding the ways to improve their capability and make them more resilient. Proactive services have an important role to play in this whole process. The notion behind proactive services is to quickly identify and provide a solution for anticipated problems even before they arise. Proactive service is a big aid to those organizations that aim to improve their customer base and brand loyalty.

In many fields such as med

Read more…

eSIMs are now available in several flagship models, and some users are dumping the familiar physical SIM card to welcome the unavoidable future of eSIM technology. eSIM is short for Embedded Subscriber Identity Module, or Embedded SIM. Instead of being available as a physical entity, manufacturers integrate a small SIM card inside the phone, saving the process of switching between physical ones when you change your service provider.

8028326084?profile=original

The SIM card is a technology that most of us have been familiar

Read more…

8028322493?profile=original

FranSec Virtual IT Security Conference launches on 24th – 25th June, uniting cyber security leaders from across the country to exchange in-depth knowledge and expertise towards safeguarding the nation’s Banking & Finance, Energy, FMCG, Agriculture, Manufacturing, Chemical & Pharmaceuticals, Automotive industries.

 

2019 was a record-breaking year for cyber-attacks in France. A staggering 67% of companies fell victim to malicious activity and with only 10% equipped to cope with them. As digitalisat

Read more…

8028293665?profile=original

ISACA, a leading nonprofit organization dedicated to the development, adoption, and use of industry-leading information security knowledge and best practices, opened up its 50th anniversary celebration this year with their 2019 North America CACS Conference. I was fortunate enough to be invited to speak to the more than 1,500 cybersecurity professionals in attendance about how to operationalize their cybersecurity programs and turn policy into action.

The North America CACS Conference is the prem

Read more…

Setting aside the hype of AI and delivering real value for businesses is not easy. There are so many products and services touting to include ‘artificial intelligence’ as part of their offering, with almost ‘silver bullet’ potential, that there has to be an element of sympathy with IT leaders who are tasked with deciphering what is genuinely a good product, and what is merely a product that has just been rebranded and marketed as ‘AI’ but has the same fundamental capabilities it did five or even

Read more…

What is Application Virtualization?

Application virtualization can be understood as a software technology which implements the encapsulation of an application to isolate it from its host Operating System. The output of this isolation process leads to the independence of the operating system, which can also be considered as one of the top advantages of deploying the application virtualization technology. Encapsulation is a fundamental and a crucial factor which enables the operation of application

Read more…

8028294856?profile=original

The Retail industry is under constant pressure by low margins and ever-increasing rivalry. Weak consumer spending; saturated markets; increased consumers demands for service and lower prices; and intense competition has put significant strain on retail bottom lines and growth avenues. Thus, Retail Strategy must evolve to accommodate these market changes.

Such low margins force the retailers to save costs across the operations, including IT, which is vital for the success of every strategic endeav

Read more…

Learning How to Test and Learn

8028274855?profile=original

Learning How to Test and Learn

By: MIT CISR

Author(s)

Ross, Jeanne W. and Fonstad, Nils O.

Type:

Research Briefing

Topics:

Digital Innovation

Business Agility

IT Governance

IT Investment and Portfolio Management

IT-based Business Transformation

2018-02-15

Abstract: To counter pervasive uncertainties in the business and technology environment and prioritize the most strategic innovation projects from myriad options, companies can take a test-and-learn approach to innovation investments. From our analysis of t

Read more…

Certified ethical hacker training is commonly denoted as the course that teaches you to break through your own or your company’s computer/s in a legitimate and official manner to find out the existent vulnerabilities and to assess the safety bearing of the target system. Certified ethical hackers use the same tools and knowledge that malicious attackers exploit and execute the indicated defensive, counteractive and protective actions to protect the system from any breach in future.

The ethical ha

Read more…

8028270057?profile=original

Northwestern Mutual’s Digital Transformation: Redesigning IT

Source:

MIT-CISR

Author(s): Sebastian, Ina, Beath, Cynthia M., Ross, Jeanne W.

Type: Working Paper

Topics: Design/Management of the IT Unit, IT-based Business Transformation

Date: 2017-10-26

Abstract: While in 2017 Northwestern Mutual had been in business for 160 years, management believed that success in the digital economy would require delivering digital products and services to extend the value that customers were receiving from the compa

Read more…

8028253863?profile=original

Artificial Intelligence: ‘Frankenstein’ or Capitalist Money Machine

By Professor James Petras

Global Research, February 24, 2017

The Financial Times’ Special Report (2/16/2017) published a four-page spread on the ‘use and possible dangers of artificial intelligence (AI)’. Unlike the usual trash journalists who serve as Washington ’s megaphones on the editorial pages and political columns, the Special Report is a thoughtful essay that raises many important issues, even as it is fundamentally flawed.

Read more…

This white paper is intended for readers who are familiar with Business Continuity Management (BCM) and Disaster Recovery (DR) and the processes to develop and manage related policies, standards and procedures.  The purpose is to provide guidance to the effective implementation and maintenance of resilience and disaster recovery capability of IT systems, and is applicable, by scaling, to all sizes of business organisation. A full copy of the paper is at http://www.austinriskconsultants.com/downl

Read more…

What's Changing in the Approach to IT GRC?

Increasing cyber-hazards have been accompanied by another trend; Governance, Risk Management, and Compliance (GRC) focused on IT (referred to as IT GRC) is changing. More and more organizations have been turning to a risk-based approach.

Traditionally, IT is comprised of a variety of underlying functions. These functions include:

  • IT Asset Management, commonly used to inventory servers, computers, and other technology hardware;
  • IT Risk Management, including vulnerability and threat identification an
Read more…

8028238892?profile=original

The Strategic Management Frameworks and the Delta Model: Putting Customers Before Products

Special PowerPoint Presentation for All Global Risk  Community Members

By:

Enrique R. Suarez

Master of Education & International Development

Harvard University


International Business Strategy Consultant & Professor
Former Harvard i-Lab Student Advisor

You can download the Delta Model PowerPoint Presentation below:

Frameworks_Delta2015_H.pdf

Contact Information

If you want to implement the Delta Model in your organiza

Read more…

Define Your Digital Strategy—Now

8028237066?profile=original

Enrique Suarez Presenting:

Define Your Digital Strategy—Now

Source:

Ross, Jeanne W.
Sebastian, Ina
Fonstad

Center for Information Systems Research (CISR)

M.I.T

2015-06-18

Abstract: The confluence of social, mobile, analytics, cloud, Internet of Things, and other powerful, readily accessible technologies is disrupting businesses in all industries. Success requires a coherent digital strategy that is informed by the capabilities of these technologies. Leaders guide investment decisions by focusing on eithe

Read more…

IMG_1266-500x333.jpg?width=300Sally Beauty Holdings confirmed last week that its payment card systems had been compromised, but did not disclose the extent to which data had been breached.

The Texas based retailer is the next in a string of security incidents that include Target and Sony Pictures, and comes a year following the company disclosing a breach of 25,000 customer records.

If the risk is high, and best practices of organizations like NIST, ISO, and SANS are known, then where are the gaps in these organization’s gover

Read more…

Is Agile for Dummies?

I have said more than once that the IT industry has much to be blamed for in terms of poor project delivery.  I wrote a discussion paper on Project Risk Management where I lead off with “Why could we land a man on the moon in 1969 yet in 2013 we struggle to get a moderate sized IT project delivered successfully? – An acceptance of mediocrity?”

I recently read “Agile for Dummies”published by IBM and authored by Scott W. Ambler and Matthew Holitza, which is about mastering Agile, a project manageme

Read more…

Nearshore delivery models remain a valid response to many of the pressures financial institutions face today. The challenge is that they tend to focus on areas such as application maintenance rather than transformation. How can organisations sustain truly transformational IT projects that call for continuous and agile interaction between the business, architects and development teams?  

Financial institutions must take a more responsive approach to nearshore. Flexible styles of working are ideal

Read more…

security_risk_management.jpgA study published last week sponsored by Tripwire and conducted by the Ponemon Institute found that while over 80% of security and risk professionals consider their organization's commitment to risk-based security management significant, less than 30% had a formal risk management strategy in place.

Why does such a large gap continue to exist, even as the evidence piles up that organizations with a mature risk framework are better performing and more prepared for an uncertain future?

One hurdle tha

Read more…

The past three years have seen a number of man-made and natural disasters bring risk management demands to the forefront of executives and board directors. Fat-tail risks that have a low probability, but a very high impact to the organization, such as the Japanese tsunami, the Gulf of Mexico oil spill or the euro-zone liquidity crisis, have been front and center, creating a renewed interest in enterprise risk management (ERM) practices.

John Brown, Director, Risk Management, Supply Chain & Techni

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead