Building an adaptive ICT Procurement capability

Delivered at the 2017 Procurement and Contracting for ICT conference, this presentation explored:

  • How to build a holistic, adaptive ICT procurement capability that drives continuous business innovation and efficiency;
  • How to identify and mitigate the systemic risks associated with ICT procurement;
  • How to managing risks of corruption and malfeasance in complex, opaque, globalised and rapidly evolving ICT supply ecosystems , and
  • The role of ‘best practice’ standards, governance and certification regimes in an era of increasing cyber risk, volatility and change

A narrated copy of the slide deck is available below:

Episode 23 – How to ‘disrupt’ your own organisation without breaking it?

Established organisations attempting to become more responsive and fast moving in the face of increasing change and uncertainty, need to overcome their own internal inertia.

How best to approach the challenge of building this continuous, sustainable change capability, that underpins both efficiency and innovation, is key.…

Continue reading

Business short term-ism and digital transformation. What’s driving what?

Recent industry studies confirm that the phenomenon of short term-ism is on the increase.  

Short term-ism describes the focus on short-term business goals at the expense of achieving long-term objectives. This has been shown to undermine organisation’s longer term value creation in certain cases.

Fact is, short term-ism is a …

Continue reading

How to ‘disrupt’ your own organisation without breaking it

Established organisations attempting to become more responsive and fast moving in the face of increasing change and uncertainty, need to overcome their own internal inertia.

How best to approach the challenge of building this continuous, sustainable change capability, that underpins both efficiency and innovation, is key.

In the face of …

Continue reading

How to setup & lead digital transformation capability

Presented at the University of Technology, Sydney’s DigiSAS Lab Seminar “Adaptive strategic journey management for leading digital transformation“, Rob explores:

Digital transformation scorecard,
The current CIO landscape,
CIOs leading enterprise digital transformation capabilities – why this is important and some of the critical success factors

The audio track …

Continue reading

Best practices to mitigate data breach risk

Data Breach Risk is real, and of increasing concern to business leaders, regulators and customers.

Audio of Rob Livingstone’s presentation  at Trend Micro’s Executive briefing events Sydney and Melbourne 5-6 June 2017 on Australia’s new Mandatory Data Breach Notification legislation.

Narrated slides also available in YouTube:

Also available on Slideshare:…

Continue reading

Episode 15 – Exploring various value and risk factors that make up your organisation’s IT and Digital ecosystems

Rob explores a number of aspects of your digital ecosystem, including IoT, executive’s ‘Digital literacy’ levels, fully utilising your existing IT systems, cyber-security and rapid change. See the non-technical challenges in your organisation’s Digital journey?

or, Subscribe via iTunes

Continue reading

Episode 12 – What’s your IT Department’s role in preventing a data breach

How do organisations and their IT departments rate when it comes to protecting themselves and their organisations against the ever present cyber risks and cyber-crime? The answer is, on average, poorly.

In this episode Rob explores key organisational factors that have an overriding influence on the likelihood of data breaches …

Continue reading

Mandatory data breach reporting legislation and your Australian organisation: BAU?

Australia now joins the list of states and countries which have implemented – or are in the process of  enacting – mandatory data breach legislation.

The Privacy Amendment (Notifiable Data Breaches) Bill 2016 was passed in February 2017 which applies to organisations that meet specific criteria such as business size …

Continue reading

Forget hackers – Look within to find your greatest cyber risk.

Adverse cyber incidents are occurring with monotonous regularity and are routinely reported in the media. With the list of mega-data breaches increasingly looking like the ‘whose-who’ of the corporate world, what chance do you really have in your business when it comes to the protection of valuable information assets?

While …

Continue reading