In a previous post we looked at Four Steps to Implementing Robotic Process Automation (RPA). Today we will take a closer look at the first of those steps, Identify Processes, and look at how you can maximize your RPA investment by selecting high impact processes that deliver immediate ROI.Read More
For many years I had the privilege of playing various roles in building a community sports organization and working in sport at the provincial level, learning from coaches with immense experience, who are devoted to developing the sport community in general.
Despite being mostly retired from these roles, I still find myself applying athlete development analogies to business and professional development situations. There is so much we can learn in business from those who are very skilled at mentoring athletes and coaches.
My first-hand experience with athletic coaches combined with my consulting role at Online has provided me with some insight I’d like to share. In Part 1 we opened with three lessons. Here are four more:Read More
Last fall I had the chance to share some thoughts about the value of Agile Coaches in a post I entitled 4 Ways an Agile Coach Can Boost Your Agile Adoption. In that post I recommended that the Scrum Master should not act at the Agile Coach – this recommendation prompted several fellow Agile practitioners to reach out to me for clarification around WHY I was asserting this recommendation. Many of them reminded me that the Scrum Guide™ mentions that coaching is one of the foremost responsibilities of a Scrum Manager and others reasoned that an experienced Scrum Master should be able to carry out most of the responsibilities that I have outlined for an Agile coach in my blog.Read More
This past year saw a continuation of established trends in cybersecurity. Breaches continue to rise, attackers are getting more sophisticated, and the market continues to be flooded with silver bullets that promise to solve all enterprise security problems in one fell swoop. As an organization, Online works with hundreds of organizations, many in healthcare and have learned a few things. Here are five things we learned in 2018 that you and your organization should consider for moving forward:Read More
Data Privacy, Data Privacy Day 2019, Google Docs, Courts, Android, CNIL, Google, Google Maps, Violation, Fine, YouTube
Two Things Every CISO Should Consider:
- “What critical assets do you have that are worth protecting?”
- “What happens if they’re compromised?”
These were two questions I asked a CIO from a large Energy company when I had the chance to sit down with him recently.Read More
For many years I had the privilege of being able to play various roles in building a community sports organization and working in sport at the provincial level, learning from coaches with immense experience, who are devoted to developing the sport community in general.
Despite being mostly “retired” from these roles, I still find myself applying athlete development analogies to business and professional development situations. There is so much we can learn in business from those who are very skilled at mentoring athletes and coaches.Read More
Digital Transformation, Field Service Management, FSM, Asset Management, IT, Information Technology, Chief Information Officer, CMDB
Everyday businesses face a unique set of challenges and must consider a changing array of variables and scenarios. These dynamic realities make it very difficult to identify the "best time" for integrating new processes, making it impossible to generalize the problem into a one-size-fits-all type of answer, especially when it comes to Digital Transformation. The variables with DT are even more of a factor given its inherently adaptable and far reaching impact.
In this blog, we will look at two common scenarios that are often experienced and from there, entertain some practical solutions on how you can successfully integrate DT processes as efficiently as possible.
Although 2019 promises a new version of the Payment Card Industry Data Security Standard (PCI DSS) the current version 3.2.1 is the de facto standard for measuring security programs for all merchants and service providers that participate in commerce using credit or debit cards.
There are twelve major requirements in the PCI DSS, and considering the complexity of the material we have chosen to dedicate individual blogs to the different requirements. The focus of these blogs will be to provide tips and pointers, help provide clarity for “what’s new” and to enhance understanding so that your organization can achieve a sustainable security posture that easily satisfies the requirements of the PCI DSS.Read More