Gartner Risk Management Quadrant

Advertisement



  gartner risk management quadrant: Infonomics Douglas B. Laney, 2017-09-05 Many senior executives talk about information as one of their most important assets, but few behave as if it is. They report to the board on the health of their workforce, their financials, their customers, and their partnerships, but rarely the health of their information assets. Corporations typically exhibit greater discipline in tracking and accounting for their office furniture than their data. Infonomics is the theory, study, and discipline of asserting economic significance to information. It strives to apply both economic and asset management principles and practices to the valuation, handling, and deployment of information assets. This book specifically shows: CEOs and business leaders how to more fully wield information as a corporate asset CIOs how to improve the flow and accessibility of information CFOs how to help their organizations measure the actual and latent value in their information assets. More directly, this book is for the burgeoning force of chief data officers (CDOs) and other information and analytics leaders in their valiant struggle to help their organizations become more infosavvy. Author Douglas Laney has spent years researching and developing Infonomics and advising organizations on the infinite opportunities to monetize, manage, and measure information. This book delivers a set of new ideas, frameworks, evidence, and even approaches adapted from other disciplines on how to administer, wield, and understand the value of information. Infonomics can help organizations not only to better develop, sell, and market their offerings, but to transform their organizations altogether. Doug Laney masterfully weaves together a collection of great examples with a solid framework to guide readers on how to gain competitive advantage through what he labels the unruly asset – data. The framework is comprehensive, the advice practical and the success stories global and across industries and applications. Liz Rowe, Chief Data Officer, State of New Jersey A must read for anybody who wants to survive in a data centric world. Shaun Adams, Head of Data Science, Betterbathrooms.com Phenomenal! An absolute must read for data practitioners, business leaders and technology strategists. Doug's lucid style has a set a new standard in providing intelligible material in the field of information economics. His passion and knowledge on the subject exudes thru his literature and inspires individuals like me. Ruchi Rajasekhar, Principal Data Architect, MISO Energy I highly recommend Infonomics to all aspiring analytics leaders. Doug Laney’s work gives readers a deeper understanding of how and why information should be monetized and managed as an enterprise asset. Laney’s assertion that accounting should recognize information as a capital asset is quite convincing and one I agree with. Infonomics enjoyably echoes that sentiment! Matt Green, independent business analytics consultant, Atlanta area If you care about the digital economy, and you should, read this book. Tanya Shuckhart, Analyst Relations Lead, IRI Worldwide
  gartner risk management quadrant: Real Business of IT Richard Hunter, George Westerman, 2009-10-20 If you're a general manager or CFO, do you feel you're spending too much on IT or wishing you could get better returns from your IT investments? If so, it's time to examine what's behind this IT-as-cost mind-set. In The Real Business of IT, Richard Hunter and George Westerman reveal that the cost mind-set stems from IT leaders' inability to communicate about the business value they create-so CIOs get stuck discussing budgets rather than their contributions to the organization. The authors explain how IT leaders can combat this mind-set by first using information technology to generate three forms of value important to leaders throughout the organization: -Value for money when your IT department operates efficiently and effectively -An investment in business performance evidenced when IT helps divisions, units, and departments boost profitability -Personal value of CIOs as leaders whose contributions to their enterprise go well beyond their area of specialization The authors show how to communicate about these forms of value with non-IT leaders-so they understand how your firm is benefiting and see IT as the strategic powerhouse it truly is.
  gartner risk management quadrant: Digital to the Core Mark Raskino, Graham Waller, 2016-09-12 There is no simple strategic method for dealing with the multidimensional nature of digital change. Even the sharpest leaders can become disoriented as change builds on change, leaving almost nothing certain. Yet to stand still is to fail. Enterprises and leaders must re-master themselves to succeed. Leaders must identify the key macro forces, then lead their organizations at three distinct levels: industry, enterprise, and self. By doing this they cannot only survive but clean up. Digital to the Core makes the case that all business leaders must understand the impact the digital revolution will continue to play in their industries, companies, and leadership style and practices. Drawing on interviews with over 30 top C-level executives in some of the world's most powerful companies and government organizations, including GE, Ford, Tory Burch, Babolat, McDonalds, Publicis and UK Government Digital Service, this book delivers practical insights from those on the front lines of major digital upheaval. The authors incorporate Gartner's annual CIO and CEO global survey research and also apply the deep knowledge and qualitative insights they have acquired as practitioners, management researchers, and advisors over decades in the business. Above all else, Raskino and Waller want companies and their top leaders to understand the full impact of digital change and integrate it at the core of their businesses.
  gartner risk management quadrant: The Connector Manager Jaime Roca, Sari Wilde, 2019-09-19 The best managers work smarter, not harder After conducting a unique global study of over 9,000 people, analysts at the world-leading sales research firm Gartner identified four distinct types of manager. Incredibly, they found one type consistently performs far better than the rest, and it wasn’t the one they were expecting. Connector Managers understand that it’s not enough for managers to just encourage and teach employees themselves, and that providing constant coaching to employees can actually be detrimental to their independent development. Instead, by connecting employees to others in the team or organisation, Connector Managers can help their employees develop a range of skills beyond their own areas of expertise. Although the four types of managers are more or less evenly distributed, employees with Connector Managers perform significantly better than others. Employees with Always-on Managers who provide constant feedback and coaching perform significantly worse. Drawing on their ground-breaking data-driven research, as well as in-depth case studies and extensive interviews with thousands of managers, you’ll discover what behaviours define Connector Managers and how you can use them yourself to build brilliant, powerhouse teams.
  gartner risk management quadrant: Understanding Financial Risk Management Angelo Corelli, 2024-05-27 Financial risk management is a topic of primary importance in financial markets. It is important to learn how to measure and control risk, how to be primed for the opportunity of compensative return, and how to avoid useless exposure.
  gartner risk management quadrant: Operational Risk Management Ron S. Kenett, Yossi Raanan, 2011-06-20 Models and methods for operational risks assessment and mitigation are gaining importance in financial institutions, healthcare organizations, industry, businesses and organisations in general. This book introduces modern Operational Risk Management and describes how various data sources of different types, both numeric and semantic sources such as text can be integrated and analyzed. The book also demonstrates how Operational Risk Management is synergetic to other risk management activities such as Financial Risk Management and Safety Management. Operational Risk Management: a practical approach to intelligent data analysis provides practical and tested methodologies for combining structured and unstructured, semantic-based data, and numeric data, in Operational Risk Management (OpR) data analysis. Key Features: The book is presented in four parts: 1) Introduction to OpR Management, 2) Data for OpR Management, 3) OpR Analytics and 4) OpR Applications and its Integration with other Disciplines. Explores integration of semantic, unstructured textual data, in Operational Risk Management. Provides novel techniques for combining qualitative and quantitative information to assess risks and design mitigation strategies. Presents a comprehensive treatment of near-misses data and incidents in Operational Risk Management. Looks at case studies in the financial and industrial sector. Discusses application of ontology engineering to model knowledge used in Operational Risk Management. Many real life examples are presented, mostly based on the MUSING project co-funded by the EU FP6 Information Society Technology Programme. It provides a unique multidisciplinary perspective on the important and evolving topic of Operational Risk Management. The book will be useful to operational risk practitioners, risk managers in banks, hospitals and industry looking for modern approaches to risk management that combine an analysis of structured and unstructured data. The book will also benefit academics interested in research in this field, looking for techniques developed in response to real world problems.
  gartner risk management quadrant: T Bytes Digital Customer Experience IT-Shades, 2020-09-30 This document brings together a set of latest data points and publicly available information relevant for Digital Customer Experience Technology. We are very excited to share this content and believe that readers will benefit from this periodic publication immensely.
  gartner risk management quadrant: T Bytes Platforms & Applications IT-Shades, 2020-10-02 This document brings together a set of latest data points and publicly available information relevant for Platforms & Applications This document brings together a set of latest data points and publicly available information relevant for Platforms & Applications periodic publication immensely.
  gartner risk management quadrant: Continuous Computing Technologies for Enhancing Business Continuity Bajgoric, Nijaz, 2008-12-31 The main objective of this book is to assist managers in becoming aware and more knowledgeable on the economics of downtime and continuous computing technologies that help in achieving business continuity and managing efficiently information resources--Provided by publisher.
  gartner risk management quadrant: T-Byte Platforms & Applications V Gupta, 2019-12-30 This document brings together a set of latest data points and publicly available information relevant for Platforms & Applications Industry. We are very excited to share this content and believe that readers will benefit from this periodic publication immensely.
  gartner risk management quadrant: Data Governance Dimitrios Sargiotis,
  gartner risk management quadrant: Commercial Banking Risk Management Weidong Tian, 2016-12-08 This edited collection comprehensively addresses the widespread regulatory challenges uncovered and changes introduced in financial markets following the 2007-2008 crisis, suggesting strategies by which financial institutions can comply with stringent new regulations and adapt to the pressures of close supervision while responsibly managing risk. It covers all important commercial banking risk management topics, including market risk, counterparty credit risk, liquidity risk, operational risk, fair lending risk, model risk, stress test, and CCAR from practical aspects. It also covers major components of enterprise risk management, a modern capital requirement framework, and the data technology used to help manage risk. Each chapter is written by an authority who is actively engaged with large commercial banks, consulting firms, auditing firms, regulatory agencies, and universities. This collection will be a trusted resource for anyone working in or studying the commercial banking industry.
  gartner risk management quadrant: Always-On Enterprise Information Systems for Modern Organizations Bajgoric, Nijaz, 2017-12-01 Continuous improvements in digitized practices have created opportunities for businesses to develop more streamlined processes. This not only leads to higher success in day-to-day production, but it increases the overall success of businesses. Always-On Enterprise Information Systems for Modern Organizations is a critical scholarly resource that examines how EIS implementations support business processes and facilitate this in today’s e-business environment. Featuring coverage on a broad range of topics such as customer relations management, supply chain management, and business intelligence, this book is geared towards professionals, researchers, managers, consultants, and university students interested in emerging developments for business process management.
  gartner risk management quadrant: Quality Management Practices R. P. Mohanty, 2008 This book is the outcome of the efforts of many professionals working both in academia and industry who have contributed to the proceedings of the International Conference on Quality Management Practices for Organizational Excellence . Organizational Excellence is a final product composed of two basic elements alloyed prudently by the members/stakeholders of an organization. These two basic elements are Strategy and Culture . When we talk of quality management practices, we have to pursue quality as a strategy and also quality as a culture . Quality as strategy is a conscious and deliberate search for a plan of action that will develop an organization's distinctive competence and compound it. Quality as culture is the amalgamation of behavior patterns of all the stakeholders in terms of beliefs, values, attitudes etc. In other words, quality management is the epicenter of the competitive organizations of the future in which strategy is the scientific pursuits and culture is the artistic artifacts. Numerous authors have put forth their logical thoughts, have articulated their concepts and have validated their hypothesis relating to quality management. The papers, which have found place in this book aim at creating values of quality management practices.
  gartner risk management quadrant: Enterprise Cybersecurity in Digital Business Ariel Evans, 2022-03-23 Cyber risk is the highest perceived business risk according to risk managers and corporate insurance experts. Cybersecurity typically is viewed as the boogeyman: it strikes fear into the hearts of non-technical employees. Enterprise Cybersecurity in Digital Business: Building a Cyber Resilient Organization provides a clear guide for companies to understand cyber from a business perspective rather than a technical perspective, and to build resilience for their business. Written by a world-renowned expert in the field, the book is based on three years of research with the Fortune 1000 and cyber insurance industry carriers, reinsurers, and brokers. It acts as a roadmap to understand cybersecurity maturity, set goals to increase resiliency, create new roles to fill business gaps related to cybersecurity, and make cyber inclusive for everyone in the business. It is unique since it provides strategies and learnings that have shown to lower risk and demystify cyber for each person. With a clear structure covering the key areas of the Evolution of Cybersecurity, Cybersecurity Basics, Cybersecurity Tools, Cybersecurity Regulation, Cybersecurity Incident Response, Forensics and Audit, GDPR, Cybersecurity Insurance, Cybersecurity Risk Management, Cybersecurity Risk Management Strategy, and Vendor Risk Management Strategy, the book provides a guide for professionals as well as a key text for students studying this field. The book is essential reading for CEOs, Chief Information Security Officers, Data Protection Officers, Compliance Managers, and other cyber stakeholders, who are looking to get up to speed with the issues surrounding cybersecurity and how they can respond. It is also a strong textbook for postgraduate and executive education students in cybersecurity as it relates to business.
  gartner risk management quadrant: Practical Risk Management for the CIO Mark Scherling, 2016-04-19 The growing complexity of today's interconnected systems has not only increased the need for improved information security, but also helped to move information from the IT backroom to the executive boardroom as a strategic asset. And, just like the tip of an iceberg is all you see until you run into it, the risks to your information are mostly invi
  gartner risk management quadrant: Exploring Cyber Criminals and Data Privacy Measures Mateus-Coelho, Nuno, Cruz-Cunha, Manuela, 2023-09-07 In recent years, industries have shifted into the digital domain, as businesses and organizations have used various forms of technology to aid information storage and efficient production methods. Because of these advances, the risk of cybercrime and data security breaches has skyrocketed. Fortunately, cyber security and data privacy research are thriving; however, industry experts must keep themselves updated in this field. Exploring Cyber Criminals and Data Privacy Measures collects cutting-edge research on information security, cybercriminals, and data privacy. It proposes unique strategies for safeguarding and preserving digital information using realistic examples and case studies. Covering key topics such as crime detection, surveillance technologies, and organizational privacy, this major reference work is ideal for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students.
  gartner risk management quadrant: Straight from the Client Carsten Fabig, Alexander Haasper, 2017-12-11 The challenges of our customers are more and more diverse. A couple of strong trends like digitalization and cyber security issues are facing the daily life of all of us. This is true for our business and private life. That People make a difference is a strong Vineyard belief. Therefore, in this book the Vineyard consultants are interviewed in order to present their individual consulting experiences. As a starting point the current customer challenges and consulting trends are summarized. A contribution towards the GDPR deadline and approaches how to deal with these changes is following. The next article is suggesting how to handle the need in the pharmaceutical industry to communicate with business partners beyond the firewall. Based on Vineyards long experience in the IT Cyber Security world the following article is emphasizing why security is priority zero and how IT Security standards and frameworks can be used in a beneficial and lean way. The following two articles have a strong technical focus. While the first one is introducing the new technology Summarizer which is capable to compress existing files from a content perspective the following is about what an agile methodology can deliver in the field IT Service Management. The benefits of a focused eDiscovery approach for litigation processes are discussed in another contribution. How transitional changes for companies as a result of Brexit for example can be managed is following. Risk management in the cyber field for the banking industry and leading in projects are two interviews that reflect typical customer challenges. How to set-up an electronic archive as part of a digitalization initiative is outlined in an expert interview for the insurance industry. The benefits of a focused eDiscovery approach for litigation processes are discussed in another impulse. An interview about knowledge management is closing this book. As a key component for the customer in a knowledge society it is discussed how this can be approached for a consultancy. If you focus your deep dives you can also see the little things in a broader context. We wish our readers inspiring insights and new impulses to find the individual balance between the right deep dives and the ability for the helicopter view. Many thanks again to all Vineyard colleagues contributing to this new Vineyard book.
  gartner risk management quadrant: Global Perspectives on Robotics and Autonomous Systems: Development and Applications Habib, Maki K., 2023-08-01 There is an increasing demand to develop intelligent robotics and autonomous systems to deal with dynamically changing and complex, unstructured, and unpredictable environments. Such robots should be able to handle task varieties, environment dynamics and goal variations, and their complexity. This also highlights the need for having intelligent robotics and autonomous systems with capabilities assuring reliable and robust functions resolving real-time complex problems that are associated with many applications across diverse domains. This requires unconventional ways to develop creative and innovative, energy-efficient, and eco- and environmentally friendly solutions that consider new ways of creative thinking while drawing inspiration from nature as a model leading to creating new designs, intelligent systems, intelligent structures/mechanisms, reconfigurability, and more. Global Perspectives on Robotics and Autonomous Systems: Development and Applications describes the evolution of robotics and autonomous systems, their development, their technologies, and their applications. This book discusses the concept of autonomy, requirements, and its role in shaping the behavior of these robots so that they can make their own effective and safe decisions and act on them reliably while assuring real-life requirements. Covering topics such as digital transformation, fused deposition modeling (FDM), and organizational unbundling process, this premier reference source is an essential resource for engineers, computer scientists, industry professionals, manufacturers, smart systems developers, data analysts, students and educators of higher educations, researchers, and academicians.
  gartner risk management quadrant: Communications Writing and Design John DiMarco, 2017-03-14 Communications Writing and Design is an integrated, project-based introduction to effective writing and design across the persuasive domains of communication. Build a strong foundation of core writing and design skills using professionally-designed examples that illustrate and reinforce key principles Readers learn and analyze techniques by creating 15 projects in marketing, advertising, PR, and social media with the help of strategy suggestions, practical tips, and professional production techniques Written by an experienced professional and teacher, with a focus on the cross-disciplinary nature of contemporary communication work Learning is reinforced through a variety of pedagogical features: learning objectives, helpful mnemonics, real-life projects and applications, chapter references for further study, and end-of-chapter summaries and exercises A companion website with multimedia slides, exam questions, learning videos, and design guides provides additional learning tools for students and instructors
  gartner risk management quadrant: Hyperautomation Matt Calkins, Neil Ward-Dutton, George Westerman, Lakshmi N, Sidney Fernandes, Alice Wei, Chris Skinner, Isaac Sacolick, John Rymer, Lisa Heneghan, Darren Blake, Rob Galbraith, Ron Tolido, Michael Beckley, 2020-11-20 HYPERAUTOMATION is a collection of expert essays on low-code development and the future of business process automation. In each chapter, an academic, analyst, implementer, or end-user examines different aspects of low-code and automation in the enterprise, clarifying both value and barriers through personal experiences and insights. With contributions from: Dr. George Westerman, MIT - Neil Ward-Dutton, IDC - Lakshmi N, Tata Consultancy Services - Sidney Fernandes & Alice Wei, University of South Florida - Lisa Heneghan, KPMG - Chris Skinner, FinTech expert - John R. Rymer, Forrester (Emeritus) - Isaac Sacolick, StarCIO - Darren Blake, Bexley Neighbourhood Care - Rob Galbraith, InsureTech expert - Ron Tolido, Capgemini - Michael Beckley, Appian All proceeds from the sale of this book will be donated to Black Girls Code, an organization providing young girls of color opportunities to learn in-demand skills in technology and computer programming.
  gartner risk management quadrant: Identity Attack Vectors Morey J. Haber, Darran Rolls, 2019-12-17 Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory initiatives. As a solution, Identity Access Management (IAM) has emerged as the cornerstone of enterprise security. Managing accounts, credentials, roles, certification, and attestation reporting for all resources is now a security and compliance mandate. When identity theft and poor identity management is leveraged as an attack vector, risk and vulnerabilities increase exponentially. As cyber attacks continue to increase in volume and sophistication, it is not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities, to conduct their malicious activities through privileged attacks and asset vulnerabilities. Identity Attack Vectors details the risks associated with poor identity management practices, the techniques that threat actors and insiders leverage, and the operational best practices that organizations should adopt to protect against identity theft and account compromises, and to develop an effective identity governance program. What You Will Learn Understand the concepts behind an identity and how their associated credentials and accounts can be leveraged as an attack vector Implement an effective Identity Access Management (IAM) program to manage identities and roles, and provide certification for regulatory compliance See where identity management controls play a part of the cyber kill chain and how privileges should be managed as a potential weak link Build upon industry standards to integrate key identity management technologies into a corporate ecosystem Plan for a successful deployment, implementation scope, measurable risk reduction, auditing and discovery, regulatory reporting, and oversight based on real-world strategies to prevent identity attack vectors Who This Book Is For Management and implementers in IT operations, security, and auditing looking to understand and implement an identity access management program and manage privileges in these environments
  gartner risk management quadrant: Inside Jobs Joe Payne, Jadee Hanson, Mark Wojtasiak, 2020-09-29 From data security company Code42, Inside Jobs offers companies of all sizes a new way to secure today’s collaborative cultures—one that works without compromising sensitive company data or slowing business down. Authors Joe Payne, Jadee Hanson, and Mark Wojtasiak, seasoned veterans in the cybersecurity space, provide a top-down and bottom-up picture of the rewards and perils involved in running and securing organizations focused on rapid, iterative, and collaborative innovation. Modern day data security can no longer be accomplished by “Big Brother” forms of monitoring or traditional prevention solutions that rely solely on classification and blocking systems. These technologies frustrate employees, impede collaboration, and force productivity work-arounds that risk the very data you need to secure. They provide the illusion that your trade secrets, customer lists, patents, and other intellectual property are protected. That couldn’t be farther from the truth, as insider threats continue to grow. These include: Well-intentioned employees inadvertently sharing proprietary data Departing employees taking your trade secrets with them to the competition A high-risk employee moving source code to an unsanctioned cloud service What’s the solution? It’s not the hunt for hooded, malicious wrongdoers that you might expect. The new world of data security is built on security acting as an ally versus an adversary. It assumes positive intent, creates organizational transparency, establishes acceptable data use policies, increases security awareness, and provides ongoing training. Whether you are a CEO, CIO, CISO, CHRO, general counsel, or business leader, this book will help you understand the important role you have to play in securing the collaborative cultures of the future.
  gartner risk management quadrant: The Real Business of Blockchain David Furlonger, Christophe Uzureau, 2019-10-15 Blockchain is transforming business. What's your strategy? Leaders of forward-thinking organizations are exploring how blockchain can transform the way they create and seek value. Whether it's used to streamline multiparty processes, create and trade new assets, or leverage artificial intelligence and the internet of things, blockchain enables entirely new business opportunities. This is just the start. As blockchain becomes more widely adopted, it has the potential to radically change the way companies and societies operate, as transformative a paradigm shift as the launch of the internet. The Real Business of Blockchain is one of the first books on this transformative technology written for business leaders. Authors David Furlonger and Christophe Uzureau--both of Gartner, the world-renowned research and advisory company--will help you: Assess how blockchain will impact your business Explore the value proposition that blockchain offers Make smart near- and midterm investments Position your organization in a new competitive landscape Timely, visionary, and accessible, The Real Business of Blockchain cuts through the hype and helps you unlock the vast capabilities of this powerful and potentially world-changing technology.
  gartner risk management quadrant: Project Management Theory and Practice Gary L. Richardson, 2014-10-29 Updated to reflect the Project Management Institute's (PMI's) Project Management Body of Knowledge (PMBOK Guide), Fifth Edition, the new edition of this bestselling textbook continues to provide a practical and up-to-date overview of project management theory. Project Management Theory and Practice, Second Edition explains project management theory
  gartner risk management quadrant: Privileged Attack Vectors Morey J. Haber, 2020-06-13 See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors target the path of least resistance: users and their privileges. In decades past, an entire enterprise might be sufficiently managed through just a handful of credentials. Today’s environmental complexity has seen an explosion of privileged credentials for many different account types such as domain and local administrators, operating systems (Windows, Unix, Linux, macOS, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and so many more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. We are experiencing an expanding universe of privileged accounts almost everywhere. There is no one solution or strategy to provide the protection you need against all vectors and stages of an attack. And while some new and innovative products will help protect against or detect against a privilege attack, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that threat actors leverage, and the defensive measures that organizations should adopt to protect against an incident, protect against lateral movement, and improve the ability to detect malicious activity due to the inappropriate usage of privileged credentials. This revised and expanded second edition covers new attack vectors, has updated definitions for privileged access management (PAM), new strategies for defense, tested empirical steps for a successful implementation, and includes new disciplines for least privilege endpoint management and privileged remote access. What You Will Learn Know how identities, accounts, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and monitoring strategies to mitigate privilege threats and risk Understand a 10-step universal privilege management implementation plan to guide you through a successful privilege access management journeyDevelop a comprehensive model for documenting risk, compliance, and reporting based on privilege session activity Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privilege access management problems
  gartner risk management quadrant: Digital Transformation Emmanuel Monod, Yuewei Jiang, 2023-06-01 Whereas digital transformation, considered from the standpoint of strategy, suggests a direct link with business benefits, questions linger about the implementation of digital technologies that often result in a lack of return on investment. Many consulting trends adopt a technology-centered approach, assuming that AI, IoT, data analytics, or robotics, would lead to business performance. Yet, most of the time, organizational factors are neglected, especially hidden costs or hidden work. Moreover, unexpected consequences are overlooked, such as resistance to change. Digital transformation is a practical problem for managers. Are IS implementation approaches such as agile methods to Socio-Technical Systems (STS) sufficient to tackle these issues? This book suggests starting from organizational transformation, in essence, independently from technology with methods such as Business Process Management (BPM), Socio-Economic Approaches to Management (SEAM) or Organizational Development (OD). Overall, whereas technology-centered approaches have been associated with numerous unintended consequences and failures with previous generations of technologies (e.g., ERP or KMS), process-centered and human-centered approaches may represent a less risky approach to digital transformation implementation. This volume focuses on evaluating the potential performance improvements and risks of digital transformation and ways to assess how technology may support work and organizational goals. Therefore, whereas written by both academics and practitioners, this book has been written for all managers in companies and institutions in order to help them achieve digital transformation success.
  gartner risk management quadrant: CSO , 2008-09 The business to business trade publication for information and physical Security professionals.
  gartner risk management quadrant: Handbook on Business Process Management 2 Jan vom Brocke, Michael Rosemann, 2010-09-22 Business Process Management (BPM) has become one of the most widely used approaches for the design of modern organizational and information systems. The conscious treatment of business processes as significant corporate assets has facilitated substantial improvements in organizational performance but is also used to ensure the conformance of corporate activities. This Handbook presents in two volumes the contemporary body of knowledge as articulated by the world's leading BPM thought leaders. This second volume focuses on the managerial and organizational challenges of Business Process Management such as strategic and cultural alignment, governance and the education of BPM stakeholders. As such, this book provides concepts and methodologies for the integration of BPM. Each chapter has been contributed by leading international experts. Selected case studies complement their views and lead to a summary of BPM expertise that is unique in its coverage of the most critical success factors of BPM.
  gartner risk management quadrant: Transformational Security Awareness Perry Carpenter, 2019-04-30 Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That’s what Transformational Security Awareness is all about. Author Perry Carpenter weaves together insights and best practices from experts in communication, persuasion, psychology, behavioral economics, organizational culture management, employee engagement, and storytelling to create a multidisciplinary masterpiece that transcends traditional security education and sets you on the path to make a lasting impact in your organization. Find out what you need to know about marketing, communication, behavior science, and culture management Overcome the knowledge-intention-behavior gap Optimize your program to work with the realities of human nature Use simulations, games, surveys, and leverage new trends like escape rooms to teach security awareness Put effective training together into a well-crafted campaign with ambassadors Understand the keys to sustained success and ongoing culture change Measure your success and establish continuous improvements Do you care more about what your employees know or what they do? It's time to transform the way we think about security awareness. If your organization is stuck in a security awareness rut, using the same ineffective strategies, materials, and information that might check a compliance box but still leaves your organization wide open to phishing, social engineering, and security-related employee mistakes and oversights, then you NEED this book.
  gartner risk management quadrant: Gartner Group Symposium ITxpo , 1998
  gartner risk management quadrant: The Social Organization Anthony J. Bradley, Mark P. McDonald, 2011-09-27 As a leader, it's your job to extract maximum talent, energy, knowledge, and innovation from your customers and employees. But how? In The Social Organization, two of Gartner's lead analysts strongly advocate exploiting social technology. The authors share insights from their study of successes and failures at more than four hundred organizations that have used social technologies to foster—and capitalize on—customers’ and employees’ collective efforts. But the new social technology landscape isn’t about the technology. It’s about building communities, fostering new ways of collaborating, and guiding these efforts to achieve a purpose. To that end, the authors identify the core disciplines managers must master to translate community collaboration into otherwise impossible results: • Vision: defining a compelling vision of progress toward a highly collaborative organization. • Strategy: taking community collaboration from risky and random success to measurable business value. • Purpose: rallying people around a clear purpose, not just providing technology. • Launch: creating a collaborative environment and gaining adoption. • Guide: participating in and influencing communities without stifling collaboration. • Adapt: responding creatively to change in order to better support community collaboration. The Social Organization highlights the benefits and challenges of using social technology to tap the power of people, revealing what managers must do to make collaboration a source of enduring competitive advantage.
  gartner risk management quadrant: Learning Analytics John R Mattox II, Mark Van Buren, Jean Martin, 2016-09-03 Faced with organizations that are more dispersed, a workforce that is more diverse and the pressure to reduce costs, CEOs and CFOs are increasingly asking what the return on investment is from training and development programmes. Learning Analytics provides a framework for understanding how to work with learning analytics at an advanced level. It focuses on the questions that training evaluation is intended to answer: is training effective and how can it be improved? It discusses the field of learning analytics, outlining how and why analytics can be useful, and takes the reader through examples of approaches to answering these questions and looks at the valuable role that technology has to play. Even where technological solutions are employed, the HR or learning and development practitioner needs to understand what questions they should be asking of their data to ensure alignment between training and business needs. Learning Analytics enables both senior L&D and HR professionals as well as CEOs and CFOs to see the transformational power that effective analytics has for building a learning organization, and the impacts that this has on performance, talent management, and competitive advantage. It helps learning and development professionals to make the business case for their activities, demonstrating what is truly adding value and where budgets should be spent, and to deliver a credible service to their business by providing metrics based on which sound business decisions can be made.
  gartner risk management quadrant: Management Information Systems Kenneth C. Laudon, Jane Price Laudon, 2004 Management Information Systems provides comprehensive and integrative coverage of essential new technologies, information system applications, and their impact on business models and managerial decision-making in an exciting and interactive manner. The twelfth edition focuses on the major changes that have been made in information technology over the past two years, and includes new opening, closing, and Interactive Session cases.
  gartner risk management quadrant: Economic and Social Implications of Information and Communication Technologies Bayar, Yilmaz, Karabetyan, Lina, 2022-12-19 Enormous developments have been made in the field of information and communication technologies (ICT) during the past four decades as ICT has spread rapidly in the world and become a significant part of daily life for economic units. ICT development and penetration are continuing to affect all aspects of societies and have led to significant changes in almost all disciplines such as education, environment, economics, management, energy, health, and medical care. Economic and Social Implications of Information and Communication Technologies explores the economic and social implications of ICT development and penetration from a multidisciplinary perspective. Covering key topics such as sustainability, public health, and economic growth, this reference work is ideal for managers, industry professionals, researchers, scholars, practitioners, academicians, instructors, and students.
  gartner risk management quadrant: Innovative and Agile Contracting for Digital Transformation and Industry 4.0 Shalan, Mohammad Ali, Algarni, Mohammed Ayedh, 2020-12-18 Digital transformation is reshaping the business arena as new, successful digital business models are increasing agility and presenting better ways to handle business than the traditional alternatives. Industry 4.0 affects everything in our daily lives and is blurring the line between the physical, the biological, and the digital. This created an environment where technology and humans are so closely integrated that it is impacting every activity within the organizations. Specifically, contracting processes and procedures are challenged to align with the new business dynamics as traditional contracts are no longer fitting today's agile and continuously changing environments. Businesses are required to facilitate faster, more secure, soft, and real-time transactions while protecting stakeholders’ rights and obligations. This includes agile contracts which are dynamically handling scope changes, smart contracts that can automate rule-based functions, friction-less contracts that can facilitate different activities, and opportunity contracts that looks toward the future. Innovative and Agile Contracting for Digital Transformation and Industry 4.0 analyzes the consequences, benefits, and possible scenarios of contract transformation under the pressure of new technologies and business dynamics in modern times. The chapters cover the problems, issues, complications, strategies, governance, and risks related to the development and enforcement of digital transformation contracting practices. While highlighting topics in the area of digital transformation and contracting such as artificial intelligence, digital business, emerging technologies, and blockchain, this book is ideally intended for business, engineering, and technology practitioners and policy makers, along with practitioners, stakeholders, researchers, academicians, and students interested in understanding the scope, complexity, and importance of innovative contracts and agile contracting.
  gartner risk management quadrant: Guide to Security Assurance for Cloud Computing Shao Ying Zhu, Richard Hill, Marcello Trovati, 2016-03-09 This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this field. Enlightening perspectives are presented by an international collection of pre-eminent authorities in cloud security assurance from both academia and industry. Topics and features: · Describes the important general concepts and principles of security assurance in cloud-based environments · Presents applications and approaches to cloud security that illustrate the current state of the art · Reviews pertinent issues in relation to challenges that prevent organizations moving to cloud architectures · Provides relevant theoretical frameworks and the latest empirical research findings · Discusses real-world vulnerabilities of cloud-based software in order to address the challenges of securing distributed software · Highlights the practicalities of cloud security, and how applications can assure and comply with legislation · Includes review questions at the end of each chapter This Guide to Security Assurance for Cloud Computing will be of great benefit to a broad audience covering enterprise architects, business analysts and leaders, IT infrastructure managers, cloud security engineers and consultants, and application developers involved in system design and implementation. The work is also suitable as a textbook for university instructors, with the outline for a possible course structure suggested in the preface. The editors are all members of the Computing and Mathematics Department at the University of Derby, UK, where Dr. Shao Ying Zhu serves as a Senior Lecturer in Computing, Dr. Richard Hill as a Professor and Head of the Computing and Mathematics Department, and Dr. Marcello Trovati as a Senior Lecturer in Mathematics. The other publications of the editors include the Springer titles Big-Data Analytics and Cloud Computing, Guide to Cloud Computing and Cloud Computing for Enterprise Architectures.
  gartner risk management quadrant: ERP: The Implementation Cycle Stephen Harwood, 2017-07-05 The ERP Implementation cycle is characterized by complexity, uncertainty and a long timescale. It is about people and issues that affect the business it is a multi-disciplinary effort.This book will provide you with the practical information you will need in relation to the many issues and events within the implementation cycle. After reading this book you will be fully equipped and alerted to what is involved in an ERP implementation.ERP (Enterprise Resource Planning) can be described as an integrated enterprise-wide information system. As well as handling many of the transactions found within a business it has the potential for meeting many of the information requirements of busy personnel. If used in the right hands, it may provide the business with a competitive edge.Much can go wrong during the implementation since there are many issues to deal with. From the content of this book you will gain an understanding of what can go wrong you will be prepared in advance, and will be equipped to take preventative steps to smooth the progress of implementation.This book:Covers the multidisciplinary subject of ERP implementationLooks at a range of relevant topics including ERP market-place development, vendor selection, project management, process design and post GoLive improvementsReveals a range of issues which an implementer should be alert to right at the outset before the go-ahead is given to proceed with an implementationFeatures material on vendor selection, project management, training, business process re-engineering (BPR) and continuous improvement
  gartner risk management quadrant: Actionable Strategies Through Integrated Performance, Process, Project, and Risk Management Stephen S. Bonham, 2008 This unique resource presents a new look at how the puzzle pieces of corporate dynamics management can fit together to ensure strategic designs are actionable.
  gartner risk management quadrant: Advances in Enterprise Technology Risk Assessment Gupta, Manish, Singh, Raghvendra, Walp, John, Sharman, Raj, 2024-10-07 As technology continues to evolve at an unprecedented pace, the field of auditing is also undergoing a significant transformation. Traditional practices are being challenged by the complexities of modern business environments and the integration of advanced technologies. This shift requires a new approach to risk assessment and auditing, one that can adapt to the changing landscape and address the emerging challenges of technology-driven organizations. Advances in Enterprise Technology Risk Assessment offers a comprehensive resource to meet this need. The book combines research-based insights with actionable strategies and covers a wide range of topics from the integration of unprecedented technologies to the impact of global events on auditing practices. By balancing both theoretical and practical perspectives, it provides a roadmap for navigating the intricacies of technology auditing and organizational resilience in the next era of risk assessment.
Gartner是一个什么样的机构? - 知乎
Gartner(高德纳)成立于1979年,是全球最具权威的IT研究公司,其名头在顾问研究领域,可以说是无人不知无人不晓,在鼓公司拥有 1,200多位世界级分析专家。在全球的IT …

Gartner魔力象限为什么会受到重视? - 知乎
Gartner由Gartner研究与咨询服务、Gartner顾问、Gartner评测、Gartner社区四部分组成,在此我们不做过多阐述。 二维模型阐释公司实力四个象限评判企业差异 最 …

如何获取Gartner报告,付费账号怎么申请,年费多少? - 知乎
其实也能找到一些渠道可以低价获取报告,之前试过以几百块的价格买过Gartner报告(比如技术成熟度曲线等),亲测过,如果需要可以私信我,我有空的情况下尽量传授经验。

普及一下什么是大数据技术? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭 …

IDC研究方向,报告与Gartner 的主要区别是什么? - 知乎
Gartner数据这块比较弱,分析师团队基本都Base在北美,没有数据相关的常规报告,中国分析师团队规模较小,常规报告都是全球的,基本不划分区域,不接地气。但是技术 …