The explosion of IoT and ‘smart’ devices is happening – like it or not – and this represents a clear and present cyber-risk for many organisations that are unaware of the latent cybersecurity vulnerabilities that they present. What to do about this expanding cyber risk profile is the question.
Recent industry studies confirm that the phenomenon of short term-ism is on the increase.
Short term-ism describes the focus on short-term business goals at the expense of achieving long-term objectives. This has been shown to undermine organisation’s longer term value creation in certain cases.
In this 20 minute presentation Rob offers 7 actionable insights to help educational institutions prepare for the Australian Privacy Amendment (Notifiable Data Breaches) Act 2016 – which comes into effect in February 2018.
[Presentation delivered at EduTech 2017 conference, Sydney]
Rob explores a number of aspects of your digital ecosystem, including IoT, executive’s ‘Digital literacy’ levels, fully utilising your existing IT systems, cyber-security and rapid change. See the non-technical challenges in your organisation’s Digital journey?
Shadow IT – a term used to describe the use of IT / Digital / Cloud systems by individuals and parts of the organisation without the appropriate oversight – can add overall IT cost, increase complexity, elevate business risk and more. The business benefits may be substantial if handled correctly.…
Rob explores a range of business, organisational and governance factors that will ensure IT departments are able to incubate business relevant innovation to drive and deliver sustainable business value
How do organisations and their IT departments rate when it comes to protecting themselves and their organisations against the ever present cyber risks and cyber-crime? The answer is, on average, poorly.
In this episode Rob explores key organisational factors that have an overriding influence on the likelihood of data breaches …
Adverse cyber incidents are occurring with monotonous regularity and are routinely reported in the media. With the list of mega-data breaches increasingly looking like the ‘whose-who’ of the corporate world, what chance do you really have in your business when it comes to the protection of valuable information assets?