Competing on Analytics

Size: px
Start display at page:

Download "Competing on Analytics"

Transcription

1 Competing on Analytics Probability explains the limitations of our knowledge of truth, it never denies it. - William Briggs, Uncertainty: The soul of modeling, probability & statistics

2 Aim: To convince you that we, as security leaders, must compete with the bad guys on analytics Q: Why is this important? A: We re losing and bode to lose more.. Q: What s the problem? A: Our concept of measurement* gives advantage to the bad guys and under performing vendors. Q: What s the solution? A: An integrated approach for measuring security risk. * We will use the term measurement and analytics interchangeably.

3 Why?: We re losing. There is nothing more deceptive than an obvious fact. Sherlock Holmes The Bascombe Valley Mystery

4 We re losing. James B. Comey, Director FBI, made the following statement before the Senate Committee on Homeland Security and Government Affairs on Nov 14, 2013: The diverse threats we face are increasingly cyber-based. Much of America s most sensitive data is stored on computers. We are losing data, money, and ideas through cyber intrusions. This threatens innovation and, as citizens, we are also increasingly vulnerable to losing our personal information. That is why we anticipate that in the future, resources devoted to cyber-based threats will equal or even eclipse the resources devoted to non-cyber based terrorist threats..[fbi]

5 We re losing The Global Information Security Workforce Study (GISWS) a survey conducted in 2015 of more than 14,000 security professionals, including 1,800 federal employees showed we are not just taking a beating, we are backpedaling: When we consider the amount of effort dedicated over the past two years to furthering the security readiness of federal systems and the nation s overall security posture, our hope was to see an obvious step forward. The data shows that, in fact, we have taken a step back. (ISC) 2 on the announcement of the GISWS, 20153

6 We re losing The founder and head of XL Catlin, the largest insurer in Lloyd s of London, said cybersecurity is the biggest, most systemic risk he has seen in his 42 years in insurance. Potential weaknesses in widely used software; interdependent network access between companies, vendors, and clients; and the possibility of large coordinated attacks can affect much more than even one big company like Anthem, Target, or Sony. XL Catlin believes it is possible that there could be a simultaneous impact on multiple major organizations affecting the entire economy. They feel that if there are multiple major claims in a short period of time, this is a bigger burden than insurers can realistically cover.

7 and will lose a lot more due to the exploding attack surface and its amplified uncertainty.. Internet users worldwide grew by a factor of 6 from 2001 to 2014 (half a billion to 3 billion). Since 2001 the number of websites alone has grown at a rate five times faster than the number of users a billion total by The emerging platform economy that competes on speed (devops) will exacerbate this in ways yet to be seen 4.9 billion connected things will be in use in 2015, up 30 percent from 2014, and will reach 25 billion by Gartner Breach will increase. This is due to the increase in connected systems, users, devices and uses per device with potential vulnerabilities, even if vulnerabilities per system or device do not increase.

8 The Problem: Quant education & application Success is a function of persistence and doggedness and the willingness to work hard for twenty-two minutes to make sense of something that most people would give up on after thirty seconds. Malcom Gladwell Outliers

9 The Problem: We need more quant exposure For the book, we conducted a survey of 171 Cybersecurity professionals. Strong opinions against quant are associated with poor stats understanding. Note: Those who performed the worst on the stats literacy quiz were more likely to overestimate their skills in statistics.

10 The Problem: We are not consistent (Responses: Agree, Disagree, No Opinion/Don t Know) Information security is too complex to model with probabilistic methods. Management and users won't understand the quantitative methods output. An expert using quantitative probabilistic methods will do better risk assessments then an expert using intuition alone. RESULTS: 80% of respondents had more pro than anti quantitative responses. Only 22% were consistently pro on quantitative and anti on softer scoring methods.

11 The Problem: Even the basics are misunderstood Assume that you have a portfolio of systems for which you have observed no security events in the past year that resulted in a monetary or productivity loss, which of the following statements is true? r a! r r r Answer Options If no events were observed, then we have no data about the likelihood of these events. The fact that no events were observed tells us something about the likelihood of these events. One year is not long enough time to gather enough observations to make an inference. Since some events may not have been observed, the lack of observed losses tells us nothing. There is insufficient information to answer the question. I don't know Response Percent 2.2% 37.0% 4.4% 31.9% 17.8% 6.7%

12 Solution: The current approach is useless Q: How many have used risk matrices similar to the one below, or have security management solutions (SIEM, VM, TM, AV etc) that use similar scales for prioritize risk? Tony Cox What s wrong with Risk Matrices investigates various mathematical consequences of ordinal scales on a matrix. they can be worse than useless, leading to worse-than-random decisions. Bickel et al. The Risk of Using Risk Matrices, Society of Petroleum Engineers, 2014 The burden of proof is squarely on the shoulders of those who would recommend the use of such methods to prove that these obvious inconsistencies do not impair decision making, much less improve it, as is often claimed.

13 The Problem: Communication is an illusion Budescu et. al. Psychological Science, 2009 on the use of verbal, qualitative scales for likelihoods: [Verbal terms] induce an illusion of communication People assume that everyone interprets the terms consistently and similarly, and fail to appreciate the variance in the interpretations of these words. The high level of potential miscommunication has been widely documented in many contexts. Richards Heuer, The Psychology of Intelligence Analysis, Center for the Study of Intelligence, CIA, % 20% 30% 40% 50% 60% 70% 80% 90% 23 NATO officers estimates of probabilities for events described using common terms used in communicating likelihoods in intelligence reports (e.g. War between X and Y is )

14 The Problem: We live on placebos The first principle is that you must not fool yourself, and you are the easiest person to fool. Richard P. Feynman Collecting more than a few data points on horses makes experts worse at estimating outcomes. (Tsai, Klayman, Hastie) Interaction with others only improves estimates up to a point, then they get worse. (Heath, Gonzalez) Collecting more data about investments makes people worse at investing. Collecting more data about students makes counselors worse at predicting student performance. (Andreassen) An experiment with a structured decision analysis method shows confidence increased whether decisions are improved or degraded. (Williams, Dennis, Stam, Aronson) In short, we should assume increased confidence from analysis is a placebo. Real benefits have to be measured.

15 Solution: The right concept of measurement For those who believe something to be immeasurable, the concept of measurement or rather the misconception of it is probably the most important obstacle to overcome. For all practical decision-making purposes, we need to treat measurement as observations that quantitatively reduce uncertainty. HTMA Cyber As far as the propositions of mathematics refer to reality, they are not certain; and as far as they are certain, they do not refer to reality. Albert Einstein Although this may seem a paradox, all exact science is based on the idea of approximation. If a man tells you he knows a thing exactly, then you can be safe in inferring that you are speaking to an inexact man. Bertrand Russell

16 Solution: An integrated security analytics approach

17 Solution: Basic Sparse Data Analytics: Monte Carlo Simulations

18 Solution: Advance Sparse Data Analytics: Monte Carlo Mitigation Simulations

19 Solution: Advance Sparse Data Analytics: Multi-Portfolio Monte Carlo Mitigation Simulations

20 Solution: Rolling packages in R!

21 Solutions: Security Metrics Survival Analysis

22 Solutions: Security Metrics

Legal Firms and the Struggle to Protect Sensitive Data IT Disaster Recovery Planning and Preparedness Survey

Legal Firms and the Struggle to Protect Sensitive Data IT Disaster Recovery Planning and Preparedness Survey Legal Firms and the Struggle to Protect Sensitive Data 2016 IT Disaster Recovery Planning and Preparedness Survey 1 Table of Contents Survey Objectives... 3 Survey Results... 4-10 Conclusion: Making Sense

More information

8 ways to make your survey useless if you are making any of these mistakes with your surveys, you might as well throw away the data and start all over

8 ways to make your survey useless if you are making any of these mistakes with your surveys, you might as well throw away the data and start all over 8 ways to make your survey useless if you are making any of these mistakes with your surveys, you might as well throw away the data and start all over by Stacey Barr introduction Surveys are one of the

More information

ISO whitepaper, January Inspiring Business Confidence.

ISO whitepaper, January Inspiring Business Confidence. Inspiring Business Confidence. ISO 31000 whitepaper, January 2015 Author: Graeme Parker enquiries@parkersolutionsgroup.co.uk www.parkersolutionsgroup.co.uk ISO 31000 is an International Standard for Risk

More information

Leveraging Risk Assessments to Raise Funding for Your Security Program

Leveraging Risk Assessments to Raise Funding for Your Security Program Leveraging Risk Assessments to Raise Funding for Your Security Program Shawn Reilly, CPP, PSP, CHPA, CPD 1 Sources of Information ASIS Facilities Physical Security Measures Guideline Design and Evaluation

More information

TIPSHEET. Optimise Your Website Content for B2B Buyers

TIPSHEET. Optimise Your Website Content for B2B Buyers TIPSHEET Optimise Your Website Content for B2B Buyers OPTIMISE YOUR WEBSITE CONTENT FOR B2B BUYERS With content marketing still high on its pedestal as a key tactic for driving sales, it s crucial that,

More information

Managing reputation risk. Laura Toni, Deloitte Romania November 28, 2014

Managing reputation risk. Laura Toni, Deloitte Romania November 28, 2014 Managing reputation risk Laura Toni, Deloitte Romania November 28, 2014 Executive summary What is your company s reputation worth? According to a study by the World Economic Forum performed in 2012, on

More information

Seven Principles for Performance

Seven Principles for Performance Seven Principles for Performance Measurement What is excellent performance measurement really based on? by Stacey Barr introduction There are seven principles which are the criteria that define excellence

More information

8. Keys to effective decision-making

8. Keys to effective decision-making SEC 4 Page 1 of 5 8. Keys to effective decision-making 8.1 Specification of objectives: Effective leaders go through six steps as part of their decision-making process. It s very similar to skiers on a

More information

BT and the Future of IT Security. Bruce Schneier Chief Security Technology Officer, BT BCSG. 27 February 2009

BT and the Future of IT Security. Bruce Schneier Chief Security Technology Officer, BT BCSG. 27 February 2009 BT and the Future of IT Security Bruce Schneier Chief Security Technology Officer, BT BCSG 27 February 2009 The computer security industry is about to change. In the future, organizations will care both

More information

Achieving Organizational Readiness to Maximize the Impact of Skills-Based Volunteering. June 12, 2017

Achieving Organizational Readiness to Maximize the Impact of Skills-Based Volunteering. June 12, 2017 Achieving Organizational Readiness to Maximize the Impact of Skills-Based Volunteering June 12, 2017 Session Agenda Welcome and Introduction Overview of Common Impact Skills-based volunteering (SBV) 101

More information

Cyber Security and the Probability Challenge

Cyber Security and the Probability Challenge Cyber Security and the Probability Challenge Reframing the cyber investment imperative It's summertime. The sun is shining. A warm breeze is blowing. And you're about to dive into a big bowl of ripe, red

More information

White Paper: SAS and Apache Hadoop For Government. Inside: Unlocking Higher Value From Business Analytics to Further the Mission

White Paper: SAS and Apache Hadoop For Government. Inside: Unlocking Higher Value From Business Analytics to Further the Mission White Paper: SAS and Apache Hadoop For Government Unlocking Higher Value From Business Analytics to Further the Mission Inside: Using SAS and Hadoop Together Design Considerations for Your SAS and Hadoop

More information

If it is worth doing, it is worth doing slowly Mae West CREATING FOLLOWERSHIP DURING CHANGE MARCH, 2011 SUSAN L. NEWTON

If it is worth doing, it is worth doing slowly Mae West CREATING FOLLOWERSHIP DURING CHANGE MARCH, 2011 SUSAN L. NEWTON If it is worth doing, it is worth doing slowly Mae West 1 CREATING FOLLOWERSHIP DURING CHANGE MARCH, 2011 SUSAN L. NEWTON HOW PREVALENT IS RESISTANCE TO CHANGE? It is generally acknowledged that in an

More information

Risk Management User Guide

Risk Management User Guide Risk Management User Guide Version 17 December 2017 Contents About This Guide... 5 Risk Overview... 5 Creating Projects for Risk Management... 5 Project Templates Overview... 5 Add a Project Template...

More information

Incident Management Systems:

Incident Management Systems: Emergency Notification Incident Management Incident Management Systems: A Business Continuity Program Game-Changer Table of Contents Introduction Poised for Mainstream Adoption Marketplace Confusion Standardization

More information

Product Development & Entrepreneurship

Product Development & Entrepreneurship Product Development & Entrepreneurship Concept Selection 1 2 Concept Selection Example: 3 Choosing a concept All teams use some method for choosing a concept External decisions: Concepts are turned over

More information

Change Management Training The Practitioners' Masterclass Series

Change Management Training The Practitioners' Masterclass Series The Human Side of Change "The human side is much harder than the technology side and harder than the process side. It's the overwhelming issue..." [Mike Hammer - "Re-engineering the Corporation"] TARGET

More information

The Challenger TM Customer: THE NEW REALITY OF SALES

The Challenger TM Customer: THE NEW REALITY OF SALES The Challenger TM Customer: THE NEW REALITY OF SALES FOREWORD Imagine your ideal customer: friendly, eager to meet, ready to buy and become an advocate of your products and services. It turns out that

More information

The IoT Value/Trust Paradox. Building Trust and Value in the Data Exchange Between People, Things and Providers

The IoT Value/Trust Paradox. Building Trust and Value in the Data Exchange Between People, Things and Providers The IoT Value/Trust Paradox Building Trust and Value in the Data Exchange Between People, Things and Providers How do value and trust determine the future success of the Internet of Things? As the Internet

More information

The Truth about Cyber Risk Metrics

The Truth about Cyber Risk Metrics SESSION ID: CXO-R02 The Truth about Cyber Risk Metrics Connecting Vulnerabilities to Economics Scott Borg U.S. Cyber Consequences Unit "You can t always get what you want. But if you try sometimes you

More information

Robotic Process Automation. Reducing process costs, increasing speed and improving accuracy Process automation with a virtual workforce

Robotic Process Automation. Reducing process costs, increasing speed and improving accuracy Process automation with a virtual workforce Robotic Process Automation Reducing process costs, increasing speed and improving accuracy Process automation with a virtual workforce What is Robotic Process Automation (RPA)? Advanced macros? Robots...

More information

BETTING ON THE CURRENCY OF THE FUTURE: A DIGITAL ASSET INVESTMENT STRATEGY

BETTING ON THE CURRENCY OF THE FUTURE: A DIGITAL ASSET INVESTMENT STRATEGY 1 IN BRIEF BETTING ON THE CURRENCY OF THE FUTURE: A DIGITAL ASSET INVESTMENT STRATEGY How do you evaluate investments in an emerging technology? What s the rational split for a bet on the two current leading

More information

My name is Sam Mulholland and I am the Managing Director of Standby Consulting.

My name is Sam Mulholland and I am the Managing Director of Standby Consulting. Cyber Security Forum Presentation C.B (Sam) Mulholland Good Afternoon My name is Sam Mulholland and I am the Managing Director of Standby Consulting. Just a little bit about myself. I have worked in IT

More information

The Envision process Defining tomorrow, today

The Envision process Defining tomorrow, today The Envision process Defining tomorrow, today Because life and the markets change over time, you need an investment plan that helps you know exactly where you stand now, tomorrow, and in the years to come.

More information

Managing Volatility. Risk in mining investment decisions. Managing Volatility

Managing Volatility. Risk in mining investment decisions. Managing Volatility Managing Volatility Risk in mining investment decisions Managing Volatility Previous page Contents page Next page Contents Managing volatility risk in mining investment decisions Introduction 2 Can your

More information

Fighting online payments fraud. SAS Banking and Insurance Day May 2014 Andy Scherpenberg, Fraud Expert, SAS

Fighting online payments fraud. SAS Banking and Insurance Day May 2014 Andy Scherpenberg, Fraud Expert, SAS Fighting online payments fraud SAS Banking and Insurance Day May 2014 Andy Scherpenberg, Fraud Expert, SAS Fraud is everywhere Internet Application Online Shopping Transfer Payment Credit Card Claims Darknet

More information

3 Questions. to Ask When Developing an Adaptive Security Awareness Program

3 Questions. to Ask When Developing an Adaptive Security Awareness Program 3 Questions to Ask When Developing an Adaptive Security Awareness Program 3 Questions to Ask When Developing an Adaptive Security Awareness Program INTRODUCTION Most people working in or near cybersecurity

More information

Chapter 4 Market research

Chapter 4 Market research Chapter 4 Market research Businesses regard having an understanding of the market place as a major priority. This is because of the following factors: the expense of launching new products; the importance

More information

Advanced Analytics in Cyber Security

Advanced Analytics in Cyber Security Advanced Analytics in Cyber Security Michael McFadden Fraud, Security & Compliance August 1, 2017 2017 Fair Isaac Corporation.. This presentation is provided 2017 Fair for the Isaac recipient Corporation.

More information

Who would win a battle between Qlikview, Tableau, BO and Power BI?

Who would win a battle between Qlikview, Tableau, BO and Power BI? Who would win a battle between Qlikview, Tableau, BO and Power BI? First of all, I want you to know you won't find the final answer in this post, but you could find the way to get your answer, as there

More information

Colorado Springs PMI Risk Management in Five Easy Pieces Colorado Springs, Colorado May 8 th, 2008

Colorado Springs PMI Risk Management in Five Easy Pieces Colorado Springs, Colorado May 8 th, 2008 Risk management is essential for any significant project. and is useful for any project where an unfavorable outcome is undesirable. Certain information about key project cost, performance, and schedule

More information

ALGORITHMIC ATTRIBUTION

ALGORITHMIC ATTRIBUTION HOW TO EXPLAIN THE VALUE OF ALGORITHMIC ATTRIBUTION TO THE REST OF YOUR ORGANIZATION Table of Contents Page 1 Introduction Page 2 What is Algorithmic Marketing Attribution? Page 3 What are Some Limitations

More information

How to Create Compelling Product Roadmaps

How to Create Compelling Product Roadmaps How to Create Compelling Product Roadmaps Tips and Best Practices for Success A white paper by: Brian Lawley President, 280 Group LLC The Product Marketing and Product Management Experts About the 280

More information

Introduction to Small Business

Introduction to Small Business Introduction to Small Business Revision Notes Topic 1.1 Spotting a business opportunity Understanding customer needs What is a business? Businesses are organisations which produce goods and services. They

More information

Building Successful Teams Marc Elpel, December 23, 2006

Building Successful Teams Marc Elpel, December 23, 2006 Building Successful Teams Marc Elpel, December 23, 2006 Team building is a broad field and as you have probably already noticed there are many resources available around the web for team exercises, individual

More information

Forty million credit cards hacked

Forty million credit cards hacked www.breaking News English.com Ready-to-use ESL / EFL Lessons Forty million credit cards hacked URL: http://www.breakingnewsenglish.com/0506/050619-creditcard-e.html Today s contents The Article 2 Warm-ups

More information

Deadly Sins of. Business Process Management. Smarter Solutions, Inc.

Deadly Sins of. Business Process Management.  Smarter Solutions, Inc. 7 Deadly Sins of Business Process Management Introduction Wikipedia states that BPM is: Business process management (BPM) has been referred to as a "holistic management" approach to aligning an organization's

More information

Soft Skills Courses & Workshops

Soft Skills Courses & Workshops OUR Workshops Soft Skills Courses & Workshops As KPMG Academy core of Training focuses on the certification programs, we highly weight the need of the soft skills obtained by people, for the reason of

More information

YOUR FLEXIBLE POLICY ADMINISTRATION SOLUTION

YOUR FLEXIBLE POLICY ADMINISTRATION SOLUTION YOUR FLEXIBLE POLICY ADMINISTRATION SOLUTION POINT IN SUITE increase flexibility with POINT IN SUITE POlIcy AdmINISTrATION SySTem From the company that invented the Policy Administration System a fully

More information

Mindshop Business Leader

Mindshop Business Leader Mindshop Business Leader Insight Study 2016 Mindshop Business Leader Insight Study 2016 Table of Contents About the study 3 Top 10 business leader insights 4 Key findings 5 About Mindshop 14 About the

More information

TIMEBOXING PLANNING: BUFFERED MOSCOW RULES

TIMEBOXING PLANNING: BUFFERED MOSCOW RULES TIMEBOXING PLANNING: BUFFERED MOSCOW RULES EDUARDO MIRANDA, INSTITUTE FOR SOFTWARE RESEARCH, CARNEGIE MELLON UNIVERSITY, SEPTEMBER 2011 ABSTRACT Time boxing is a management technique which prioritizes

More information

Scope Creep: need strong change control to prevent or mitigate. Must establish the change control system early in the project.

Scope Creep: need strong change control to prevent or mitigate. Must establish the change control system early in the project. Scope Creep: need strong change control to prevent or mitigate. Must establish the change control system early in the project. HBS Article: value of scope creep; delays & overruns vs market opportunities.

More information

IS BECOMING THE GROWING LIABILITY FOR THOSE TRYING TO SUCCEED

IS BECOMING THE GROWING LIABILITY FOR THOSE TRYING TO SUCCEED C O M M U N I C A T I O N IS BECOMING THE GROWING LIABILITY FOR THOSE TRYING TO SUCCEED EMAIL: C O M M U N I C A T I O N IS BECOMING THE GROWING LIABILITY FOR THOSE TRYING TO SUCCEED Ineffective communication

More information

Fulfilling CDM Phase II with Identity Governance and Provisioning

Fulfilling CDM Phase II with Identity Governance and Provisioning SOLUTION BRIEF Fulfilling CDM Phase II with Identity Governance and Provisioning SailPoint has been selected as a trusted vendor by the Continuous Diagnostics and Mitigation (CDM) and Continuous Monitoring

More information

TEAM EMOTIONAL INTELLIGENCE SURVEY REPORT

TEAM EMOTIONAL INTELLIGENCE SURVEY REPORT TEAM EMOTIONAL INTELLIGENCE SURVEY REPORT April 15, 2013 For further information about Team Emotional Intelligence: www.geipartners.com GEI Partners 2013 This report is the property of GEI Partners (Professor

More information

INNOVATION IN THE MARKETPLACE A podcast with Irving Wladawsky-Berger

INNOVATION IN THE MARKETPLACE A podcast with Irving Wladawsky-Berger INNOVATION IN THE MARKETPLACE A podcast with Irving Wladawsky-Berger Interviewer: David Poole Interviewee: Irving Wladawsky-Berger IRVING: My name is Irving Wladawsky-Berger, Vice President of Technical

More information

Getting To Yes Negotiating Agreement Without Giving In By Roger Fisher and William Ury I. Don t Bargain Over Positions

Getting To Yes Negotiating Agreement Without Giving In By Roger Fisher and William Ury I. Don t Bargain Over Positions Negotiating Agreement Without Giving In By Roger Fisher and William Ury I. Don t Bargain Over Positions Any method of negotiation may be fairly judged by three criteria: o It should produce a wise agreement

More information

Navigating the Intersection of Vendor Management and Business Continuity

Navigating the Intersection of Vendor Management and Business Continuity Navigating the Intersection of Vendor Management and Business Continuity MICHAEL BERMAN, J.D. Table of Contents Why are we here? Business Continuity and Vendor Management Primary Intersection BCP Each

More information

Irish SMEs going for growth SME Pulse Survey

Irish SMEs going for growth SME Pulse Survey www.pwc.ie Irish SMEs going for growth SME Pulse Survey What SMEs in Ireland are saying... Introduction John Dunne I am delighted to introduce our latest SME Pulse Survey which reflects the views of over

More information

State of Software Delivery Trends in the market now and in the future. XebiaLabs

State of Software Delivery Trends in the market now and in the future. XebiaLabs State of Software Delivery Trends in the market now and in the future www.xebialabs.com Copyright 2014 Table of Contents Executive Summary...3 Methodology...3 Key Takeaways...4 Survey Results...5 Description

More information

Insights On Video Interviewing

Insights On Video Interviewing Insights On Video Interviewing Written by David Creelman Sponsored by videointerview_whitepaper_hirevue_060616.indd Introduction There s no doubt that video interviewing is fascinating, but is it a technology

More information

SAP BUSINESS GROUP AGILE FOR SAP SOLUTIONS

SAP BUSINESS GROUP AGILE FOR SAP SOLUTIONS SAP BUSINESS GROUP AGILE FOR SAP SOLUTIONS AGILE AND SAP PROJECTS: FINDING THE FIT In a constantly changing business environment, enterprise systems and agile approaches are powerful allies. Enterprise

More information

Project Planning & Management. Lecture 11 Project Risk Management

Project Planning & Management. Lecture 11 Project Risk Management Lecture 11 Project Risk Management The Importance of Project Risk Management PMBOK definition of Project Risk An uncertain event or condition that, if it occurs, has a positive or negative effect on the

More information

The Unmasking of Asking

The Unmasking of Asking Preferrals The Unmasking of Asking A System Designed to Win Introductions from a Place of Integrity and Genuineness 3 Steps to Building Your Preferral: Step #1: When Asking for Referrals, Write Down the

More information

The Rules of Engagement

The Rules of Engagement The Rules of Engagement An industry report card based on Advisor Impact s Economics of Loyalty research February 2013 Created by: Sponsored by: The Rules of Engagement When we get it right, measurement

More information

Available online at ScienceDirect. Procedia CIRP 28 (2015 ) rd CIRP Global Web Conference

Available online at  ScienceDirect. Procedia CIRP 28 (2015 ) rd CIRP Global Web Conference Available online at www.sciencedirect.com ScienceDirect Procedia CIRP 28 (2015 ) 179 184 3rd CIRP Global Web Conference Quantifying risk mitigation strategies for manufacturing and service delivery J.

More information

Refer to Chapter 4, Subsection for information on Guidance/Counseling during service delivery.

Refer to Chapter 4, Subsection for information on Guidance/Counseling during service delivery. LRS Part 408 CHAPTER 4, TECHNICAL ASSISTANCE & GUIDANCE MANUAL Name Effective Date Vocational Guidance and Counseling for Career Planning October 26, 2010 Authorization *Federal Register, Volume 66, Department

More information

Seven Ways to Create an Unbeatable Enterprise Mobility Strategy

Seven Ways to Create an Unbeatable Enterprise Mobility Strategy Seven Ways to Create an Unbeatable Enterprise Mobility Strategy A practical guide to what business and IT leaders need to do NOW to manage their business s mobile future By Arun Bhattacharya, CA Technologies

More information

Business Resilience: Proactive measures for forward-looking enterprises

Business Resilience: Proactive measures for forward-looking enterprises IBM Global Services Business Resilience: Proactive measures for forward-looking enterprises protect deflect predict adapt Working with IBM, you can develop and implement a flexible business resilience

More information

The Science of Running Effective User Acceptance Testing Cycles

The Science of Running Effective User Acceptance Testing Cycles The Science of Running Effective User Acceptance Testing Cycles WHITEPAPER Real-Time Test Management User Acceptance Test (UAT) programs have traditionally been areas of contention between IT and the Business.

More information

Life Cycle Assessment A product-oriented method for sustainability analysis. UNEP LCA Training Kit Module f Interpretation 1

Life Cycle Assessment A product-oriented method for sustainability analysis. UNEP LCA Training Kit Module f Interpretation 1 Life Cycle Assessment A product-oriented method for sustainability analysis UNEP LCA Training Kit Module f Interpretation 1 ISO 14040 framework Life cycle assessment framework Goal and scope definition

More information

A Changing Profession for a Changing Market: Evolving services, skills and talent to meet business demands

A Changing Profession for a Changing Market: Evolving services, skills and talent to meet business demands AICPA Conference on Current SEC and PCAOB Developments December 4-6, 2017 Washington, DC (and online) Kimberly N. Ellison-Taylor, CPA, CGMA Chairman, American Institute of CPAs Remarks As Prepared for

More information

FORTUNE FAVORS THE BRAVE EMPOWERING THE BACK OFFICE INSIGHT REPORT

FORTUNE FAVORS THE BRAVE EMPOWERING THE BACK OFFICE INSIGHT REPORT FORTUNE FAVORS THE BRAVE EMPOWERING THE BACK OFFICE INSIGHT REPORT Contents Technology in the back office Regulation Tech trends The future of the back office Conclusions Technology in the back office

More information

A SURVEY & ANALYSIS OF THE IMPACT OF THE EU RULES ON WORKING TIME DIRECTIVE WHAT THIS MEANS FOR THE FIELD SERVICE INDUSTRY

A SURVEY & ANALYSIS OF THE IMPACT OF THE EU RULES ON WORKING TIME DIRECTIVE WHAT THIS MEANS FOR THE FIELD SERVICE INDUSTRY A SURVEY & ANALYSIS OF THE IMPACT OF THE EU RULES ON WORKING TIME DIRECTIVE WHAT THIS MEANS FOR THE FIELD SERVICE INDUSTRY www.clicksoftware.com A Survey & Analysis of the Impact of the CONTENTS Introduction

More information

Team Management Profile

Team Management Profile The Margerison-McCann Team Management Profile All that is valuable in human society depends upon the opportunity for development accorded to the individual Albert Einstein In brief Relevant Focused Researched

More information

Risk Analysis Overview

Risk Analysis Overview Risk Analysis Overview What Is Risk? Uncertainty about a situation can often indicate risk, which is the possibility of loss, damage, or any other undesirable event. Most people desire low risk, which

More information

CEO Worldwide Expert File. Scenario Planning. that Leads To Success

CEO Worldwide Expert File. Scenario Planning. that Leads To Success Issue 44 Scenario Planning that Leads To Success Scenario planning isn't the same issue as strategic planning; basic strategic planning tends to address the accidents of the day, such as the decision to

More information

CASE STUDY. Qualcomm Reduces Fees and Develops Worker and Supplier Relationships with IMP

CASE STUDY. Qualcomm Reduces Fees and Develops Worker and Supplier Relationships with IMP CASE STUDY Qualcomm Reduces Fees and Develops Worker and Supplier Relationships with IMP WWW.EVERHIVE.COM Founded by seven people in 1985 to create quality communications, today Qualcomm (www.qualcomm.com),

More information

Lean Agile Methodologies Accentuate Benefits of Cloud Computing Yash Talreja, President, The Technology Gurus

Lean Agile Methodologies Accentuate Benefits of Cloud Computing Yash Talreja, President, The Technology Gurus Lean Agile Methodologies Accentuate Benefits of Cloud Computing Yash Talreja, President, The Technology Gurus Advances in technologies such as virtualization, storage and high-speed network access, as

More information

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Global Headquarters: 5 Speen Street Framingham, MA USA P F Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com C O M P E T I T I V E A N A L Y S I S I D C M a r k e t S c a p e : W o r l d w i d e I T E d u c

More information

Dealing with problems

Dealing with problems Good Practice Guidance Dealing with problems The volunteer relationship is different to that of paid workers. Volunteers are working under a contract, and the ultimate discipline in the workplace the sack

More information

Human Resources Statistics

Human Resources Statistics Human Resources Statistics Almost overnight it seemed like we went from a manageable amount of HR research to an absolute flood of information. Don t get me wrong, we aren t complaining, we just empathize

More information

5 Metrics You Should Know to Understand Your Engineering Efficiency

5 Metrics You Should Know to Understand Your Engineering Efficiency 5 Metrics You Should Know to Understand Your Engineering Efficiency Increase the speed and reliability of your team by understanding these key indicators Table of Contents Commit-to-Deploy Time (CDT) Build

More information

HOW TO HIRE A SECURITY TEAM STRONG AND EFFECTIVE HOW TO HIRE A STRONG AND EFFECTIVE SECURITY TEAM - 1

HOW TO HIRE A SECURITY TEAM STRONG AND EFFECTIVE HOW TO HIRE A STRONG AND EFFECTIVE SECURITY TEAM - 1 HOW TO HIRE A STRONG AND EFFECTIVE SECURITY TEAM HOW TO HIRE A STRONG AND EFFECTIVE SECURITY TEAM - 1 Introduction Your organization is thinking about building a dedicated security team, but do you know

More information

We combined three different research methods to gain a deeper understanding of the complex issues in B2B usability:

We combined three different research methods to gain a deeper understanding of the complex issues in B2B usability: Page 1 of 6 useit.com Alertbox June 2006 Business-to-Business websites Search Jakob Nielsen's Alertbox, June 1, 2006: B2B Usability Summary: User testing shows that business-to-business websites have substantially

More information

RESEARCH BRIEF. Decide or Defer: What Type of Message Gets Executive Buyers To Purchase Now? Overview. Background: Executive Emotions

RESEARCH BRIEF. Decide or Defer: What Type of Message Gets Executive Buyers To Purchase Now? Overview. Background: Executive Emotions Decide or Defer: What Type of Message Gets Executive Buyers To Purchase Now? RESEARCH BRIEF Overview Stalled proposals and deals ending in no decision are a major threat to the health of your sales pipeline.

More information

Marketing Analytics II

Marketing Analytics II Stephan Sorger 2015:www.stephansorger.com;Marketing Analytics: Business Strategy Model: 1 Marketing Analytics II Chapter 5A. Business Strategy Stephan Sorger www.stephansorger.com Disclaimer: All images

More information

The Five Critical SLA Questions

The Five Critical SLA Questions STERLING COMMERCE WHITE PAPER The Five Critical SLA Questions What you need to know before you define your managed file transfer service level agreements Introduction A Service Level Agreement (SLA) is

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to build and operate security operations centers (SOC) of any size (large, med,

More information

Train to Accelerate Your Cloud Strategy

Train to Accelerate Your Cloud Strategy White Paper Train to Accelerate Your Cloud Strategy Sponsored by: Amazon Web Services Cushing Anderson October 2017 EXECUTIVE SUMMARY Cloud technologies help organizations transform their businesses, and

More information

THE E-COMMERCE BUSINESS OWNER'S GUIDE TO SEO MANAGEMENT

THE E-COMMERCE BUSINESS OWNER'S GUIDE TO SEO MANAGEMENT THE E-COMMERCE BUSINESS OWNER'S GUIDE TO SEO MANAGEMENT Lessons from Online Retailers Who Successfully Drive SEO Growth Table of Contents Introduction Why Top-Performing E-commerce Businesses Invest in

More information

ALL APPS ARE NOT CREATED EQUAL BUILDING THE BUSINESS CASE FOR BUSINESS CONTINUITY & DISASTER RECOVERY IN SMALL & MID-SIZED ORGANIZATIONS

ALL APPS ARE NOT CREATED EQUAL BUILDING THE BUSINESS CASE FOR BUSINESS CONTINUITY & DISASTER RECOVERY IN SMALL & MID-SIZED ORGANIZATIONS ALL APPS ARE NOT CREATED EQUAL BUILDING THE BUSINESS CASE FOR BUSINESS CONTINUITY & DISASTER RECOVERY IN SMALL & MID-SIZED ORGANIZATIONS a white paper by INTRODUCTION Whether we are supporting our customers

More information

Raise the R Getting extraordinary equipment reliability

Raise the R Getting extraordinary equipment reliability Abstract Raise the R Getting extraordinary equipment reliability This paper is primarily on understanding how to get extraordinary equipment reliability. The paper explains where equipment failures start

More information

IT Doesn t Matter. Article Analysis #3. Zach Evans

IT Doesn t Matter. Article Analysis #3. Zach Evans An article by Nicholas G. Carr published in the Harvard Business Review in May 2003 available online at http://www.hbsp.harvard.edu. Article Analysis #3 August 11, 2003 Article Abstract Businesses currently

More information

Reengineering your core processes and service layer A critical digital ecosystem enabler

Reengineering your core processes and service layer A critical digital ecosystem enabler Reengineering your core processes and service layer A critical digital ecosystem enabler Stéphane Hurtaud Partner Cybersecurity Leader Deloitte Jesper Nielsen Director Technology & Enterprise Application

More information

Communication Audit of the Academic & Career Advising Center. Table of Contents

Communication Audit of the Academic & Career Advising Center. Table of Contents Helping organizations reach new heights through effective communication Communication Audit of the Academic & Career Advising Center Table of Contents Mission Statement 4 Executive Summary 5 Introduction

More information

How can companies overcome their digitalisation challenges? November 2017

How can companies overcome their digitalisation challenges? November 2017 How can companies overcome their digitalisation challenges? November 2017 The HR contribution to digital maturity SAP has announced that in 2025 they will cease to support non-cloud solutions. Although

More information

SVP/Chief Information Officer Executive President and CEO Exempt

SVP/Chief Information Officer Executive President and CEO Exempt JOB TITLE: DEPARTMENT: REPORTS TO: FLSA STATUS: SALARY GRADE: SVP/Chief Information Officer Executive President and CEO Exempt SUMMARY: The Senior Vice President/Chief Information Officer is responsible

More information

Cybersecurity Awareness. Implementing Effective Staff Training and Communications. Treasury and Trade Solutions

Cybersecurity Awareness. Implementing Effective Staff Training and Communications. Treasury and Trade Solutions Cybersecurity Awareness Implementing Effective Staff Training and Communications Treasury and Trade Solutions Effective Staff Training and Communications Introduction 1 How Effective is Your Cybersecurity

More information

2009 Software Business Analyst: Seven Best Practices

2009 Software Business Analyst: Seven Best Practices 2009 Software Business Analyst: Seven Best Practices Barbara Merwin Patterson Group Monday April 20, 2009 1 Seven Best Practices for Software Business Analysts Quality as Job 1 Understand Your Business

More information

Contemporary Organizational Behavior (Elsbach) Topic Summary 2 Individual Characteristics

Contemporary Organizational Behavior (Elsbach) Topic Summary 2 Individual Characteristics Contemporary Organizational Behavior (Elsbach) Topic Summary 2 Individual Characteristics 1) The most sought after competency by employers is. A) Ethics/social responsibility B) Leadership C) Critical

More information

I.T. s New Mission: Be a Catalyst for Change and Strategic Partner to the Business

I.T. s New Mission: Be a Catalyst for Change and Strategic Partner to the Business White Paper I.T. s New Mission: Be a Catalyst for Change and Strategic Partner to the Business To become an effective driver of business outcomes, IT organizations must evolve into business leaders. Key

More information

How to Use a Weird "Trade- In" Loophole to Bank $300 to $500 PER DAY

How to Use a Weird Trade- In Loophole to Bank $300 to $500 PER DAY How to Use a Weird "Trade- In" Loophole to Bank $300 to $500 PER DAY Presented by: Luke Sample Hosted by: John S. Rhodes Copyright 2016 WebWord, LLC. All Rights Reserved. This guide may not be reproduced

More information

Project Controls Expo 18 th Nov 2014

Project Controls Expo 18 th Nov 2014 Project Controls Expo 18 th Nov 2014 Emirates Stadium, London Cost Estimate Risk Analysis: For Capital Projects and Maintenance Turnarounds Copyright @ 2011. All rights reserved About the Speaker Steve

More information

Mindset Of The Millionaire Traders

Mindset Of The Millionaire Traders Mindset Of The Millionaire Traders Windsor Advisory Services Mindset Of The Millionaire Traders The world s top traders may all have different methods for making money but they all tend to share the same

More information

Top Ten Barriers to IWMS Implementations and Their Solutions. Presented by: Phil Wales President and CEO of EBUSINESS STRATEGIES, LLC

Top Ten Barriers to IWMS Implementations and Their Solutions. Presented by: Phil Wales President and CEO of EBUSINESS STRATEGIES, LLC Top Ten Barriers to IWMS Implementations and Their Solutions Presented by: Phil Wales President and CEO of EBUSINESS STRATEGIES, LLC Let s Get Grounded What is an Integrated Workplace Management Solution

More information

2017 STRATEGIC READINESS AND TRANSFORMATION SURVEY // JUNE Are Business Leaders Caught in a Confidence Bubble?

2017 STRATEGIC READINESS AND TRANSFORMATION SURVEY // JUNE Are Business Leaders Caught in a Confidence Bubble? 2017 STRATEGIC READINESS AND TRANSFORMATION SURVEY // JUNE 2017 Are Business Leaders Caught in a Confidence Bubble? innosight 2017 Strategic Readiness and Transformation Survey 2 Table of Contents Executive

More information

Voice of the Category Manager Survey 2017

Voice of the Category Manager Survey 2017 Voice of the Category Manager Survey 2017 1 Big data and predictive analytics top the list of investment priorities in the JDA Voice of the Category Manager survey In the Voice of the Category Manager

More information