IT

The CISO Merry-Go-Round by Indy Dhami

"Many CISOs live day to day under the sword of Damocles”

A controversial quote to begin with, I admit.  However, in the past few years, data breaches have become more prominent, impacting businesses, governments, healthcare, and even hairdressers!  There is no let-up in sight and business leaders must pay attention to the cyber risks they face.

On Cyber Security and Trust by Jean-Christophe Gaillard

People simply trust other people

This excellent November piece from McKinsey on cyber security deserves a comment (“A Framework for Improving Cybersecurity discussions within Organizations” – Jason Choi / Harrison Lung / James Kaplan).

Moving Your Business up the Digital Evolution Curve by Richard Morecroft

Digital evolution is an ongoing journey for every business.

Gone are the days of saying that you have ‘done’ digital after a major technology overhaul. Instead, it is an evolution to transition and optimise your business continually. Even digitally native companies know that they have to innovate and stay ahead of the game because of growing disruption and rapid technological change.

Cyber Security: How do you build a transformational dynamic? by Jean-Christophe Gaillard

Security is not about “enabling” the business but “protecting” it

At the end of a keynote speech I gave at the excellent CIOWaterCooler LIVE! Event in London on 28th September 2017 on security organisation, governance and creating the dynamics for change around cyber security, I was asked a challenging question on which I would like to elaborate:

Why do digital transformation projects always over-resource IT? by Niall McKeown

digital transformation projects

Digital transformation starts with a change in mindset. How much time and resource should an organisation commit to making that mind shift?

It’s said that “strategy is where we create our competitive advantage”. How much money, how much time and how many people are dedicated to finding a new competitive advantage?

“Culture eats strategy for breakfast” according to Peter Drucker. How much of your business resource is invested in changing that culture?

Shakespeare and Cyber Security by Indy Dhami

Shakespeare and Cyber Security by Indy Dhami

In 2013, a sophisticated Trojan known as “Shylock” was unleashed on millions of unsuspecting online banking customers. Its modus operandi was to stealthily install itself onto a computer and await banking transactions, upon which it drained the funds out of its victim’s accounts. Not only was this Trojan highly intelligent, but it also had strong self-preservation instincts.