Two Things Every CISO Should Consider:
- “What critical assets do you have that are worth protecting?”
- “What happens if they’re compromised?”
These were two questions I asked a CIO from a large Energy company when I had the chance to sit down with him recently.Read More
For many years I had the privilege of being able to play various roles in building a community sports organization and working in sport at the provincial level, learning from coaches with immense experience, who are devoted to developing the sport community in general.
Despite being mostly “retired” from these roles, I still find myself applying athlete development analogies to business and professional development situations. There is so much we can learn in business from those who are very skilled at mentoring athletes and coaches.Read More
Digital Transformation, Field Service Management, FSM, Asset Management, IT, Information Technology, Chief Information Officer, CMDB
Everyday businesses face a unique set of challenges and must consider a changing array of variables and scenarios. These dynamic realities make it very difficult to identify the "best time" for integrating new processes, making it impossible to generalize the problem into a one-size-fits-all type of answer, especially when it comes to Digital Transformation. The variables with DT are even more of a factor given its inherently adaptable and far reaching impact.
In this blog, we will look at two common scenarios that are often experienced and from there, entertain some practical solutions on how you can successfully integrate DT processes as efficiently as possible.
Although 2019 promises a new version of the Payment Card Industry Data Security Standard (PCI DSS) the current version 3.2.1 is the de facto standard for measuring security programs for all merchants and service providers that participate in commerce using credit or debit cards.
There are twelve major requirements in the PCI DSS, and considering the complexity of the material we have chosen to dedicate individual blogs to the different requirements. The focus of these blogs will be to provide tips and pointers, help provide clarity for “what’s new” and to enhance understanding so that your organization can achieve a sustainable security posture that easily satisfies the requirements of the PCI DSS.Read More
Technology Trends, AI, RPA, Robotic Process Automation, Finance, Automation, Workforce, Efficiency, Bot Solutions
Solutions that leverage Robotic Process Automation (RPA) are a common outcome when companies combine User Experience initiatives with Artificial Intelligence.Read More
Technology Trends, CFO, AI, RPA, Robotic Process Automation, Finance, Automation, Workforce, Efficiency, Gartner
Why are so many companies looking to integrate AI into their day-to-day business processes?
While some people have concerns that AI is being used to reduce the number of workers, the reality is that AI can be used to drive efficiency and raise productivity. By assigning high-frequency, repeatable business activities to robotic processes, organizations are able to focus more time and attention on higher level activities.
Security, Digital Experience, Digital Transformation, GDPR, Artificial Intelligence, technology consulting, Agile Adoption, End-Point, Passwords, Design Thinking Process, Security Breach, Blockchain, CTO, Chief Technology Officer, Technology Trends, InfoSec
2018 has been a year of rapid technology growth. We have seen changes to the security landscape, an increased adoption of AI and continued generational adjustments to our workforce. As we look back over the last 12 months, we wanted to share some of our favorite blog posts from 2018 that touch on some or all of these topics: from risk and security assessment, to user experience, design thinking, business consulting, and everything in between. Happy reading!Read More
Passwords, Cyber Monday, Cell Phone, Juice Jacking, USB Ports, Hacker, Security Breach, Black Friday
(A friendly reminder from our RSP team on practical ways you can avoid being a target of identify theft when shopping on & offline this holiday season.)
What's Your Cellular Data (Protection) Plan?
There’s no shortage of stories from around the globe on new ways that hackers are learning to access our personal data. Important preventative measures include keeping up-to-date antivirus software, having an active firewall, and using strong passwords. Even with these controls in place, this can lead to a false sense of security.
While many of us focus on protecting laptops and computers, we often don’t stop to think about protecting our personal or work-assigned smartphones, which is exactly what criminals are counting on.Read More