Advertisement
gartner magic quadrant for it risk management: Infonomics Douglas B. Laney, 2017-09-05 Many senior executives talk about information as one of their most important assets, but few behave as if it is. They report to the board on the health of their workforce, their financials, their customers, and their partnerships, but rarely the health of their information assets. Corporations typically exhibit greater discipline in tracking and accounting for their office furniture than their data. Infonomics is the theory, study, and discipline of asserting economic significance to information. It strives to apply both economic and asset management principles and practices to the valuation, handling, and deployment of information assets. This book specifically shows: CEOs and business leaders how to more fully wield information as a corporate asset CIOs how to improve the flow and accessibility of information CFOs how to help their organizations measure the actual and latent value in their information assets. More directly, this book is for the burgeoning force of chief data officers (CDOs) and other information and analytics leaders in their valiant struggle to help their organizations become more infosavvy. Author Douglas Laney has spent years researching and developing Infonomics and advising organizations on the infinite opportunities to monetize, manage, and measure information. This book delivers a set of new ideas, frameworks, evidence, and even approaches adapted from other disciplines on how to administer, wield, and understand the value of information. Infonomics can help organizations not only to better develop, sell, and market their offerings, but to transform their organizations altogether. Doug Laney masterfully weaves together a collection of great examples with a solid framework to guide readers on how to gain competitive advantage through what he labels the unruly asset – data. The framework is comprehensive, the advice practical and the success stories global and across industries and applications. Liz Rowe, Chief Data Officer, State of New Jersey A must read for anybody who wants to survive in a data centric world. Shaun Adams, Head of Data Science, Betterbathrooms.com Phenomenal! An absolute must read for data practitioners, business leaders and technology strategists. Doug's lucid style has a set a new standard in providing intelligible material in the field of information economics. His passion and knowledge on the subject exudes thru his literature and inspires individuals like me. Ruchi Rajasekhar, Principal Data Architect, MISO Energy I highly recommend Infonomics to all aspiring analytics leaders. Doug Laney’s work gives readers a deeper understanding of how and why information should be monetized and managed as an enterprise asset. Laney’s assertion that accounting should recognize information as a capital asset is quite convincing and one I agree with. Infonomics enjoyably echoes that sentiment! Matt Green, independent business analytics consultant, Atlanta area If you care about the digital economy, and you should, read this book. Tanya Shuckhart, Analyst Relations Lead, IRI Worldwide |
gartner magic quadrant for it risk management: Real Business of IT Richard Hunter, George Westerman, 2009-10-20 If you're a general manager or CFO, do you feel you're spending too much on IT or wishing you could get better returns from your IT investments? If so, it's time to examine what's behind this IT-as-cost mind-set. In The Real Business of IT, Richard Hunter and George Westerman reveal that the cost mind-set stems from IT leaders' inability to communicate about the business value they create-so CIOs get stuck discussing budgets rather than their contributions to the organization. The authors explain how IT leaders can combat this mind-set by first using information technology to generate three forms of value important to leaders throughout the organization: -Value for money when your IT department operates efficiently and effectively -An investment in business performance evidenced when IT helps divisions, units, and departments boost profitability -Personal value of CIOs as leaders whose contributions to their enterprise go well beyond their area of specialization The authors show how to communicate about these forms of value with non-IT leaders-so they understand how your firm is benefiting and see IT as the strategic powerhouse it truly is. |
gartner magic quadrant for it risk management: Operational Risk Management Ron S. Kenett, Yossi Raanan, 2011-06-20 Models and methods for operational risks assessment and mitigation are gaining importance in financial institutions, healthcare organizations, industry, businesses and organisations in general. This book introduces modern Operational Risk Management and describes how various data sources of different types, both numeric and semantic sources such as text can be integrated and analyzed. The book also demonstrates how Operational Risk Management is synergetic to other risk management activities such as Financial Risk Management and Safety Management. Operational Risk Management: a practical approach to intelligent data analysis provides practical and tested methodologies for combining structured and unstructured, semantic-based data, and numeric data, in Operational Risk Management (OpR) data analysis. Key Features: The book is presented in four parts: 1) Introduction to OpR Management, 2) Data for OpR Management, 3) OpR Analytics and 4) OpR Applications and its Integration with other Disciplines. Explores integration of semantic, unstructured textual data, in Operational Risk Management. Provides novel techniques for combining qualitative and quantitative information to assess risks and design mitigation strategies. Presents a comprehensive treatment of near-misses data and incidents in Operational Risk Management. Looks at case studies in the financial and industrial sector. Discusses application of ontology engineering to model knowledge used in Operational Risk Management. Many real life examples are presented, mostly based on the MUSING project co-funded by the EU FP6 Information Society Technology Programme. It provides a unique multidisciplinary perspective on the important and evolving topic of Operational Risk Management. The book will be useful to operational risk practitioners, risk managers in banks, hospitals and industry looking for modern approaches to risk management that combine an analysis of structured and unstructured data. The book will also benefit academics interested in research in this field, looking for techniques developed in response to real world problems. |
gartner magic quadrant for it risk management: Continuous Computing Technologies for Enhancing Business Continuity Bajgoric, Nijaz, 2008-12-31 The main objective of this book is to assist managers in becoming aware and more knowledgeable on the economics of downtime and continuous computing technologies that help in achieving business continuity and managing efficiently information resources--Provided by publisher. |
gartner magic quadrant for it risk management: T Bytes Platforms & Applications IT-Shades, 2020-10-02 This document brings together a set of latest data points and publicly available information relevant for Platforms & Applications This document brings together a set of latest data points and publicly available information relevant for Platforms & Applications periodic publication immensely. |
gartner magic quadrant for it risk management: Enterprise Cybersecurity in Digital Business Ariel Evans, 2022-03-23 Cyber risk is the highest perceived business risk according to risk managers and corporate insurance experts. Cybersecurity typically is viewed as the boogeyman: it strikes fear into the hearts of non-technical employees. Enterprise Cybersecurity in Digital Business: Building a Cyber Resilient Organization provides a clear guide for companies to understand cyber from a business perspective rather than a technical perspective, and to build resilience for their business. Written by a world-renowned expert in the field, the book is based on three years of research with the Fortune 1000 and cyber insurance industry carriers, reinsurers, and brokers. It acts as a roadmap to understand cybersecurity maturity, set goals to increase resiliency, create new roles to fill business gaps related to cybersecurity, and make cyber inclusive for everyone in the business. It is unique since it provides strategies and learnings that have shown to lower risk and demystify cyber for each person. With a clear structure covering the key areas of the Evolution of Cybersecurity, Cybersecurity Basics, Cybersecurity Tools, Cybersecurity Regulation, Cybersecurity Incident Response, Forensics and Audit, GDPR, Cybersecurity Insurance, Cybersecurity Risk Management, Cybersecurity Risk Management Strategy, and Vendor Risk Management Strategy, the book provides a guide for professionals as well as a key text for students studying this field. The book is essential reading for CEOs, Chief Information Security Officers, Data Protection Officers, Compliance Managers, and other cyber stakeholders, who are looking to get up to speed with the issues surrounding cybersecurity and how they can respond. It is also a strong textbook for postgraduate and executive education students in cybersecurity as it relates to business. |
gartner magic quadrant for it risk management: Digital to the Core Mark Raskino, Graham Waller, 2016-09-12 There is no simple strategic method for dealing with the multidimensional nature of digital change. Even the sharpest leaders can become disoriented as change builds on change, leaving almost nothing certain. Yet to stand still is to fail. Enterprises and leaders must re-master themselves to succeed. Leaders must identify the key macro forces, then lead their organizations at three distinct levels: industry, enterprise, and self. By doing this they cannot only survive but clean up. Digital to the Core makes the case that all business leaders must understand the impact the digital revolution will continue to play in their industries, companies, and leadership style and practices. Drawing on interviews with over 30 top C-level executives in some of the world's most powerful companies and government organizations, including GE, Ford, Tory Burch, Babolat, McDonalds, Publicis and UK Government Digital Service, this book delivers practical insights from those on the front lines of major digital upheaval. The authors incorporate Gartner's annual CIO and CEO global survey research and also apply the deep knowledge and qualitative insights they have acquired as practitioners, management researchers, and advisors over decades in the business. Above all else, Raskino and Waller want companies and their top leaders to understand the full impact of digital change and integrate it at the core of their businesses. |
gartner magic quadrant for it risk management: T Bytes Digital Customer Experience IT-Shades, 2020-09-30 This document brings together a set of latest data points and publicly available information relevant for Digital Customer Experience Technology. We are very excited to share this content and believe that readers will benefit from this periodic publication immensely. |
gartner magic quadrant for it risk management: Exploring Cyber Criminals and Data Privacy Measures Mateus-Coelho, Nuno, Cruz-Cunha, Manuela, 2023-09-07 In recent years, industries have shifted into the digital domain, as businesses and organizations have used various forms of technology to aid information storage and efficient production methods. Because of these advances, the risk of cybercrime and data security breaches has skyrocketed. Fortunately, cyber security and data privacy research are thriving; however, industry experts must keep themselves updated in this field. Exploring Cyber Criminals and Data Privacy Measures collects cutting-edge research on information security, cybercriminals, and data privacy. It proposes unique strategies for safeguarding and preserving digital information using realistic examples and case studies. Covering key topics such as crime detection, surveillance technologies, and organizational privacy, this major reference work is ideal for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students. |
gartner magic quadrant for it risk management: Practical Risk Management for the CIO Mark Scherling, 2016-04-19 The growing complexity of today's interconnected systems has not only increased the need for improved information security, but also helped to move information from the IT backroom to the executive boardroom as a strategic asset. And, just like the tip of an iceberg is all you see until you run into it, the risks to your information are mostly invi |
gartner magic quadrant for it risk management: T-Byte Platforms & Applications V Gupta, 2019-12-30 This document brings together a set of latest data points and publicly available information relevant for Platforms & Applications Industry. We are very excited to share this content and believe that readers will benefit from this periodic publication immensely. |
gartner magic quadrant for it risk management: The Connector Manager Jaime Roca, Sari Wilde, 2019-09-19 The best managers work smarter, not harder After conducting a unique global study of over 9,000 people, analysts at the world-leading sales research firm Gartner identified four distinct types of manager. Incredibly, they found one type consistently performs far better than the rest, and it wasn’t the one they were expecting. Connector Managers understand that it’s not enough for managers to just encourage and teach employees themselves, and that providing constant coaching to employees can actually be detrimental to their independent development. Instead, by connecting employees to others in the team or organisation, Connector Managers can help their employees develop a range of skills beyond their own areas of expertise. Although the four types of managers are more or less evenly distributed, employees with Connector Managers perform significantly better than others. Employees with Always-on Managers who provide constant feedback and coaching perform significantly worse. Drawing on their ground-breaking data-driven research, as well as in-depth case studies and extensive interviews with thousands of managers, you’ll discover what behaviours define Connector Managers and how you can use them yourself to build brilliant, powerhouse teams. |
gartner magic quadrant for it risk management: Understanding Financial Risk Management Angelo Corelli, 2024-05-27 Financial risk management is a topic of primary importance in financial markets. It is important to learn how to measure and control risk, how to be primed for the opportunity of compensative return, and how to avoid useless exposure. |
gartner magic quadrant for it risk management: Global Perspectives on Robotics and Autonomous Systems: Development and Applications Habib, Maki K., 2023-08-01 There is an increasing demand to develop intelligent robotics and autonomous systems to deal with dynamically changing and complex, unstructured, and unpredictable environments. Such robots should be able to handle task varieties, environment dynamics and goal variations, and their complexity. This also highlights the need for having intelligent robotics and autonomous systems with capabilities assuring reliable and robust functions resolving real-time complex problems that are associated with many applications across diverse domains. This requires unconventional ways to develop creative and innovative, energy-efficient, and eco- and environmentally friendly solutions that consider new ways of creative thinking while drawing inspiration from nature as a model leading to creating new designs, intelligent systems, intelligent structures/mechanisms, reconfigurability, and more. Global Perspectives on Robotics and Autonomous Systems: Development and Applications describes the evolution of robotics and autonomous systems, their development, their technologies, and their applications. This book discusses the concept of autonomy, requirements, and its role in shaping the behavior of these robots so that they can make their own effective and safe decisions and act on them reliably while assuring real-life requirements. Covering topics such as digital transformation, fused deposition modeling (FDM), and organizational unbundling process, this premier reference source is an essential resource for engineers, computer scientists, industry professionals, manufacturers, smart systems developers, data analysts, students and educators of higher educations, researchers, and academicians. |
gartner magic quadrant for it risk management: Commercial Banking Risk Management Weidong Tian, 2016-12-08 This edited collection comprehensively addresses the widespread regulatory challenges uncovered and changes introduced in financial markets following the 2007-2008 crisis, suggesting strategies by which financial institutions can comply with stringent new regulations and adapt to the pressures of close supervision while responsibly managing risk. It covers all important commercial banking risk management topics, including market risk, counterparty credit risk, liquidity risk, operational risk, fair lending risk, model risk, stress test, and CCAR from practical aspects. It also covers major components of enterprise risk management, a modern capital requirement framework, and the data technology used to help manage risk. Each chapter is written by an authority who is actively engaged with large commercial banks, consulting firms, auditing firms, regulatory agencies, and universities. This collection will be a trusted resource for anyone working in or studying the commercial banking industry. |
gartner magic quadrant for it risk management: Always-On Enterprise Information Systems for Modern Organizations Bajgoric, Nijaz, 2017-12-01 Continuous improvements in digitized practices have created opportunities for businesses to develop more streamlined processes. This not only leads to higher success in day-to-day production, but it increases the overall success of businesses. Always-On Enterprise Information Systems for Modern Organizations is a critical scholarly resource that examines how EIS implementations support business processes and facilitate this in today’s e-business environment. Featuring coverage on a broad range of topics such as customer relations management, supply chain management, and business intelligence, this book is geared towards professionals, researchers, managers, consultants, and university students interested in emerging developments for business process management. |
gartner magic quadrant for it risk management: Straight from the Client Carsten Fabig, Alexander Haasper, 2017-12-11 The challenges of our customers are more and more diverse. A couple of strong trends like digitalization and cyber security issues are facing the daily life of all of us. This is true for our business and private life. That People make a difference is a strong Vineyard belief. Therefore, in this book the Vineyard consultants are interviewed in order to present their individual consulting experiences. As a starting point the current customer challenges and consulting trends are summarized. A contribution towards the GDPR deadline and approaches how to deal with these changes is following. The next article is suggesting how to handle the need in the pharmaceutical industry to communicate with business partners beyond the firewall. Based on Vineyards long experience in the IT Cyber Security world the following article is emphasizing why security is priority zero and how IT Security standards and frameworks can be used in a beneficial and lean way. The following two articles have a strong technical focus. While the first one is introducing the new technology Summarizer which is capable to compress existing files from a content perspective the following is about what an agile methodology can deliver in the field IT Service Management. The benefits of a focused eDiscovery approach for litigation processes are discussed in another contribution. How transitional changes for companies as a result of Brexit for example can be managed is following. Risk management in the cyber field for the banking industry and leading in projects are two interviews that reflect typical customer challenges. How to set-up an electronic archive as part of a digitalization initiative is outlined in an expert interview for the insurance industry. The benefits of a focused eDiscovery approach for litigation processes are discussed in another impulse. An interview about knowledge management is closing this book. As a key component for the customer in a knowledge society it is discussed how this can be approached for a consultancy. If you focus your deep dives you can also see the little things in a broader context. We wish our readers inspiring insights and new impulses to find the individual balance between the right deep dives and the ability for the helicopter view. Many thanks again to all Vineyard colleagues contributing to this new Vineyard book. |
gartner magic quadrant for it risk management: Economic and Social Implications of Information and Communication Technologies Bayar, Yilmaz, Karabetyan, Lina, 2022-12-19 Enormous developments have been made in the field of information and communication technologies (ICT) during the past four decades as ICT has spread rapidly in the world and become a significant part of daily life for economic units. ICT development and penetration are continuing to affect all aspects of societies and have led to significant changes in almost all disciplines such as education, environment, economics, management, energy, health, and medical care. Economic and Social Implications of Information and Communication Technologies explores the economic and social implications of ICT development and penetration from a multidisciplinary perspective. Covering key topics such as sustainability, public health, and economic growth, this reference work is ideal for managers, industry professionals, researchers, scholars, practitioners, academicians, instructors, and students. |
gartner magic quadrant for it risk management: The Routledge Companion to Accounting Information Systems Martin Quinn, Erik Strauss, 2017-12-22 Information technology has permeated all walks of life in the past two decades. Accounting is no exception. Be it financial accounting, management accounting, or audit, information technology and systems have simplified daily tasks and routine work, simplified reporting, and changed how accounting is done. The Routledge Companion to Accounting Information Systems provides a prestige reference work which offers students and researchers an introduction to current and emerging scholarship in the discipline. Contributions from an international cast of authors provides a balanced view of both the technical underpinnings and organisational consequences of accounting information systems. With a focus on the business consequences of technology, this unique reference book will be a vital resource for students and researchers involved in accounting and information management. |
gartner magic quadrant for it risk management: Handbook on Business Process Management 2 Jan vom Brocke, Michael Rosemann, 2010-09-22 Business Process Management (BPM) has become one of the most widely used approaches for the design of modern organizational and information systems. The conscious treatment of business processes as significant corporate assets has facilitated substantial improvements in organizational performance but is also used to ensure the conformance of corporate activities. This Handbook presents in two volumes the contemporary body of knowledge as articulated by the world's leading BPM thought leaders. This second volume focuses on the managerial and organizational challenges of Business Process Management such as strategic and cultural alignment, governance and the education of BPM stakeholders. As such, this book provides concepts and methodologies for the integration of BPM. Each chapter has been contributed by leading international experts. Selected case studies complement their views and lead to a summary of BPM expertise that is unique in its coverage of the most critical success factors of BPM. |
gartner magic quadrant for it risk management: Digital Transformation Emmanuel Monod, Yuewei Jiang, 2023-06-01 Whereas digital transformation, considered from the standpoint of strategy, suggests a direct link with business benefits, questions linger about the implementation of digital technologies that often result in a lack of return on investment. Many consulting trends adopt a technology-centered approach, assuming that AI, IoT, data analytics, or robotics, would lead to business performance. Yet, most of the time, organizational factors are neglected, especially hidden costs or hidden work. Moreover, unexpected consequences are overlooked, such as resistance to change. Digital transformation is a practical problem for managers. Are IS implementation approaches such as agile methods to Socio-Technical Systems (STS) sufficient to tackle these issues? This book suggests starting from organizational transformation, in essence, independently from technology with methods such as Business Process Management (BPM), Socio-Economic Approaches to Management (SEAM) or Organizational Development (OD). Overall, whereas technology-centered approaches have been associated with numerous unintended consequences and failures with previous generations of technologies (e.g., ERP or KMS), process-centered and human-centered approaches may represent a less risky approach to digital transformation implementation. This volume focuses on evaluating the potential performance improvements and risks of digital transformation and ways to assess how technology may support work and organizational goals. Therefore, whereas written by both academics and practitioners, this book has been written for all managers in companies and institutions in order to help them achieve digital transformation success. |
gartner magic quadrant for it risk management: ERP: The Implementation Cycle Stephen Harwood, 2017-07-05 The ERP Implementation cycle is characterized by complexity, uncertainty and a long timescale. It is about people and issues that affect the business it is a multi-disciplinary effort.This book will provide you with the practical information you will need in relation to the many issues and events within the implementation cycle. After reading this book you will be fully equipped and alerted to what is involved in an ERP implementation.ERP (Enterprise Resource Planning) can be described as an integrated enterprise-wide information system. As well as handling many of the transactions found within a business it has the potential for meeting many of the information requirements of busy personnel. If used in the right hands, it may provide the business with a competitive edge.Much can go wrong during the implementation since there are many issues to deal with. From the content of this book you will gain an understanding of what can go wrong you will be prepared in advance, and will be equipped to take preventative steps to smooth the progress of implementation.This book:Covers the multidisciplinary subject of ERP implementationLooks at a range of relevant topics including ERP market-place development, vendor selection, project management, process design and post GoLive improvementsReveals a range of issues which an implementer should be alert to right at the outset before the go-ahead is given to proceed with an implementationFeatures material on vendor selection, project management, training, business process re-engineering (BPR) and continuous improvement |
gartner magic quadrant for it risk management: Guide to Security Assurance for Cloud Computing Shao Ying Zhu, Richard Hill, Marcello Trovati, 2016-03-09 This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this field. Enlightening perspectives are presented by an international collection of pre-eminent authorities in cloud security assurance from both academia and industry. Topics and features: · Describes the important general concepts and principles of security assurance in cloud-based environments · Presents applications and approaches to cloud security that illustrate the current state of the art · Reviews pertinent issues in relation to challenges that prevent organizations moving to cloud architectures · Provides relevant theoretical frameworks and the latest empirical research findings · Discusses real-world vulnerabilities of cloud-based software in order to address the challenges of securing distributed software · Highlights the practicalities of cloud security, and how applications can assure and comply with legislation · Includes review questions at the end of each chapter This Guide to Security Assurance for Cloud Computing will be of great benefit to a broad audience covering enterprise architects, business analysts and leaders, IT infrastructure managers, cloud security engineers and consultants, and application developers involved in system design and implementation. The work is also suitable as a textbook for university instructors, with the outline for a possible course structure suggested in the preface. The editors are all members of the Computing and Mathematics Department at the University of Derby, UK, where Dr. Shao Ying Zhu serves as a Senior Lecturer in Computing, Dr. Richard Hill as a Professor and Head of the Computing and Mathematics Department, and Dr. Marcello Trovati as a Senior Lecturer in Mathematics. The other publications of the editors include the Springer titles Big-Data Analytics and Cloud Computing, Guide to Cloud Computing and Cloud Computing for Enterprise Architectures. |
gartner magic quadrant for it risk management: Agile Testing Manfred Baumgartner, Martin Klonk, Christian Mastnak, Helmut Pichler, Richard Seidl, Siegfried Tanczos, 2021-09-09 This book is written by testers for testers. In ten chapters, the authors provide answers to key questions in agile projects. They deal with cultural change processes for agile testing, with questions regarding the approach and organization of software testing, with the use of methods, techniques and tools, especially test automation, and with the redefined role of the tester in agile projects. The first chapter describes the cultural change brought about by agile development. In the second chapter, which addresses agile process models such as Scrum and Kanban, the authors focus on the role of quality assurance in agile development projects. The third chapter deals with the agile test organization and the positioning of testing in an agile team. Chapter 4 discusses the question of whether an agile tester should be a generalist or a specialist. In Chapter 5, the authors turn to the methods and techniques of agile testing, emphasizing the differences from traditional, phase-oriented testing. In Chapter 6, they describe which documents testers still need to create in an agile project. Next, Chapter 7 explains the efficient use of test automation, which is particularly important in agile development, as it is the main instrument for project acceleration and is necessary to support state-of-the-art DevOps approaches and Continuous Integration. Chapter 8 then adds examples from test tool practice extending test automation to include test management functionality. Chapter 9 is dedicated to training and its importance, emphasizing the role of employee training in getting started with agile development. Finally, Chapter 10 summarizes the results of the agile journey in general with a special focus on testing. To make the aspects described even more tangible, the specific topics of this book are accompanied by the description of experiences from concrete software development projects of various organizations. The examples demonstrate that different approaches can lead to solutions that meet the specific challenges of agile projects. |
gartner magic quadrant for it risk management: Business Management Practices Emerging Trends Dr G vani, Dr B Nagarjuna, Md KhwajaMoinoddin, Dr Bindu K Nambiar, |
gartner magic quadrant for it risk management: Asymmetric Marketing Joseph E. Bentzel, 2006-10-09 |
gartner magic quadrant for it risk management: Practical Cloud Security Melvin B. Greer, Jr., Kevin L. Jackson, 2016-08-05 • Provides a cross-industry view of contemporary cloud computing security challenges, solutions, and lessons learned • Offers clear guidance for the development and execution of industry-specific cloud computing business and cybersecurity strategies • Provides insight into the interaction and cross-dependencies between industry business models and industry-specific cloud computing security requirements |
gartner magic quadrant for it risk management: INTERNATIONAL MARKETING R. SRINIVASAN, 2008-08-12 This well-established book, now in its third edition, continues to provide up-to-date information and data on International Marketing with emphasis on the Indian context. Retaining all the strengths of the previous editions, the new edition includes two new chapters on International Business Risks and International Marketing Strategies to meet the curriculum requirements. Besides, all the case studies have been updated to reflect the changing scenario of international marketing. Primarily intended for postgraduate students of management, the book would also greatly benefit managers attending various management programmes. |
gartner magic quadrant for it risk management: HCI International 2023 – Late Breaking Papers Helmut Degen, Stavroula Ntoa, Abbas Moallem, 2023-11-25 This seven-volume set LNCS 14054-14060 constitutes the proceedings of the 25th International Conference, HCI International 2023, in Copenhagen, Denmark, in July 2023. For the HCCII 2023 proceedings, a total of 1578 papers and 396 posters was carefully reviewed and selected from 7472 submissions. Additionally, 267 papers and 133 posters are included in the volumes of the proceedings published after the conference, as “Late Breaking Work”. These papers were organized in the following topical sections: HCI Design and User Experience; Cognitive Engineering and Augmented Cognition; Cultural Issues in Design; Technologies for the Aging Population; Accessibility and Design for All; Designing for Health and Wellbeing; Information Design, Visualization, Decision-making and Collaboration; Social Media, Creative Industries and Cultural Digital Experiences; Digital Human Modeling, Ergonomics and Safety; HCI in Automated Vehicles and Intelligent Transportation; Sustainable Green Smart Cities and Smart Industry; eXtended Reality Interactions; Gaming and Gamification Experiences; Interacting with Artificial Intelligence; Security, Privacy, Trust and Ethics; Learning Technologies and Learning Experiences; eCommerce, Digital Marketing and eFinance. |
gartner magic quadrant for it risk management: Enhancing Business Continuity and IT Capability Nijaz Bajgorić, Lejla Turulja, Semir Ibrahimović, Amra Alagić, 2020-12-01 Enterprise servers play a mission-critical role in modern computing environments, especially from a business continuity perspective. Several models of IT capability have been introduced over the last two decades. Enhancing Business Continuity and IT Capability: System Administration and Server Operating Platforms proposes a new model of IT capability. It presents a framework that establishes the relationship between downtime on one side and business continuity and IT capability on the other side, as well as how system administration and modern server operating platforms can help in improving business continuity and IT capability. This book begins by defining business continuity and IT capability and their importance in modern business, as well as by giving an overview of business continuity, disaster recovery planning, contingency planning, and business continuity maturity models. It then explores modern server environments and the role of system administration in ensuring higher levels of system availability, system scalability, and business continuity. Techniques for enhancing availability and business continuity also include Business impact analysis Assessing the downtime impact Designing an optimal business continuity solution IT auditing as a process of gathering data and evidence to evaluate whether the company’s information systems infrastructure is efficient and effective and whether it meets business goals The book concludes with frameworks and guidelines on how to measure and assess IT capability and how IT capability affects a firm’s performances. Cases and white papers describe real-world scenarios illustrating the concepts and techniques presented in the book. |
gartner magic quadrant for it risk management: Transformational Security Awareness Perry Carpenter, 2019-04-30 Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That’s what Transformational Security Awareness is all about. Author Perry Carpenter weaves together insights and best practices from experts in communication, persuasion, psychology, behavioral economics, organizational culture management, employee engagement, and storytelling to create a multidisciplinary masterpiece that transcends traditional security education and sets you on the path to make a lasting impact in your organization. Find out what you need to know about marketing, communication, behavior science, and culture management Overcome the knowledge-intention-behavior gap Optimize your program to work with the realities of human nature Use simulations, games, surveys, and leverage new trends like escape rooms to teach security awareness Put effective training together into a well-crafted campaign with ambassadors Understand the keys to sustained success and ongoing culture change Measure your success and establish continuous improvements Do you care more about what your employees know or what they do? It's time to transform the way we think about security awareness. If your organization is stuck in a security awareness rut, using the same ineffective strategies, materials, and information that might check a compliance box but still leaves your organization wide open to phishing, social engineering, and security-related employee mistakes and oversights, then you NEED this book. |
gartner magic quadrant for it risk management: Handbook of Financial Data and Risk Information II Margarita S. Brose, Mark D. Flood, Dilip Krishna, Bill Nichols, 2014-01-09 A comprehensive resource for understanding the issues involved in collecting, measuring and managing data in the financial services industry. |
gartner magic quadrant for it risk management: Mexican Multinationals Alvaro Cuervo-Cazurra, Miguel A. Montoya, 2018-12-06 Over the past two decades, emerging market multinationals have become an important force in international business. This book provides a better understanding of the actions and strategies used by firms from mid-sized emerging markets to upgrade their capabilities and become successful multinationals. It is the first book to provide an in-depth look at Mexican multinationals, or 'Multimexicans'. These include some of the leading firms in the world, such as the construction materials producer Cemex and the tortilla maker Grumasa, as well as smaller but innovative firms such as the theme park Kidzania and the cinema multicomplex Cinepolis. This comprehensive analysis contains case studies written by local industry experts on these and other firms, across twenty-two industries. The lessons drawn will be of interest to researchers, students, and consultants, as well as managers and executives of firms in other emerging markets looking to upgrade capabilities and expand abroad. |
gartner magic quadrant for it risk management: Information Technology Control and Audit Sandra Senft, Frederick Gallegos, Aleksandra Davis, 2016-04-19 The new edition of a bestseller, Information Technology Control and Audit, Fourth Edition provides a comprehensive and up-to-date overview of IT governance, controls, auditing applications, systems development, and operations. Aligned to and supporting the Control Objectives for Information and Related Technology (COBIT), it examines emerging trend |
gartner magic quadrant for it risk management: Data Governance Dimitrios Sargiotis, |
gartner magic quadrant for it risk management: Encyclopedia of Information Science and Technology, Fourth Edition Khosrow-Pour, D.B.A., Mehdi, 2017-06-20 In recent years, our world has experienced a profound shift and progression in available computing and knowledge sharing innovations. These emerging advancements have developed at a rapid pace, disseminating into and affecting numerous aspects of contemporary society. This has created a pivotal need for an innovative compendium encompassing the latest trends, concepts, and issues surrounding this relevant discipline area. During the past 15 years, the Encyclopedia of Information Science and Technology has become recognized as one of the landmark sources of the latest knowledge and discoveries in this discipline. The Encyclopedia of Information Science and Technology, Fourth Edition is a 10-volume set which includes 705 original and previously unpublished research articles covering a full range of perspectives, applications, and techniques contributed by thousands of experts and researchers from around the globe. This authoritative encyclopedia is an all-encompassing, well-established reference source that is ideally designed to disseminate the most forward-thinking and diverse research findings. With critical perspectives on the impact of information science management and new technologies in modern settings, including but not limited to computer science, education, healthcare, government, engineering, business, and natural and physical sciences, it is a pivotal and relevant source of knowledge that will benefit every professional within the field of information science and technology and is an invaluable addition to every academic and corporate library. |
gartner magic quadrant for it risk management: Mastering Cloud Security Posture Management (CSPM) Qamar Nomani, 2024-01-31 Strengthen your security posture in all aspects of CSPM technology, from security infrastructure design to implementation strategies, automation, and remedial actions using operational best practices across your cloud environment Key Features Choose the right CSPM tool to rectify cloud security misconfigurations based on organizational requirements Optimize your security posture with expert techniques for in-depth cloud security insights Improve your security compliance score by adopting a secure-by-design approach and implementing security automation Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionThis book will help you secure your cloud infrastructure confidently with cloud security posture management (CSPM) through expert guidance that’ll enable you to implement CSPM effectively, ensuring an optimal security posture across multi-cloud infrastructures. The book begins by unraveling the fundamentals of cloud security, debunking myths about the shared responsibility model, and introducing key concepts such as defense-in-depth, the Zero Trust model, and compliance. Next, you’ll explore CSPM's core components, tools, selection criteria, deployment strategies, and environment settings, which will be followed by chapters on onboarding cloud accounts, dashboard customization, cloud assets inventory, configuration risks, and cyber threat hunting. As you progress, you’ll get to grips with operational practices, vulnerability and patch management, compliance benchmarks, and security alerts. You’ll also gain insights into cloud workload protection platforms (CWPPs). The concluding chapters focus on Infrastructure as Code (IaC) scanning, DevSecOps, and workflow automation, providing a thorough understanding of securing multi-cloud environments. By the end of this book, you’ll have honed the skills to make informed decisions and contribute effectively at every level, from strategic planning to day-to-day operations.What you will learn Find out how to deploy and onboard cloud accounts using CSPM tools Understand security posture aspects such as the dashboard, asset inventory, and risks Explore the Kusto Query Language (KQL) and write threat hunting queries Explore security recommendations and operational best practices Get to grips with vulnerability, patch, and compliance management, and governance Familiarize yourself with security alerts, monitoring, and workload protection best practices Manage IaC scan policies and learn how to handle exceptions Who this book is for If you’re a cloud security administrator, security engineer, or DevSecOps engineer, you’ll find this book useful every step of the way—from proof of concept to the secured, automated implementation of CSPM with proper auto-remediation configuration. This book will also help cybersecurity managers, security leads, and cloud security architects looking to explore the decision matrix and key requirements for choosing the right product. Cloud security enthusiasts who want to enhance their knowledge to bolster the security posture of multi-cloud infrastructure will also benefit from this book. |
gartner magic quadrant for it risk management: The Changing Face of Compliance Sharon Ward, 2016-04-01 In the current business climate the impact of the volume and nature of regulatory change and the regulatory risk arising from this is a significant business risk for regulated firms and regulators alike. As a consequence, management of this risk is increasingly high on the board agenda of regulated firms, with those business functions whose activities support this, such as Compliance, facing increasing levels of challenge in their efforts to be effective. The Changing Face of Compliance addresses core aspects of this challenge, considering the relationship between regulation and compliance and key influences on both, offering insight into the effectiveness of current approaches and addressing practical compliance challenges. Sharon Ward explains how the role of Compliance might be strengthened and those who work within it further enabled to support the current focus on improving standards in business, offering recommendations for enhancing this role. The text includes a mix of hands-on advice, examples and research based on the experiences of practitioners, educators and regulators drawn from across a wide range of jurisdictions and sectors. This is a thoughtful and timely book, whether you are concerned about the growing and changing implications of regulatory risk; the benefit of leveraging additional value from your Compliance function or your own Compliance role; or ways of transforming and sustaining the function to ensure its continued relevance to the business. |
gartner magic quadrant for it risk management: Innovation in Medicine and Healthcare Yen-Wei Chen, Satoshi Tanaka, R. J. Howlett, Lakhmi C. Jain, 2023-05-30 This book presents the proceedings of the KES International Conferences on Innovation in Medicine and Healthcare (KES-InMed-23), held in Rome, Italy, on June 14–16, 2023. Covering a number of key areas, including digital IT architecture in healthcare; advanced ICT for medicine and healthcare; biomedical engineering, trends, research and technologies; and healthcare support systems, this book is a valuable resource for researchers, managers, industrialists and anyone wishing to gain an overview of the latest research in these fields. |
gartner magic quadrant for it risk management: Digital Development of the European Union David Ramiro Troitiño, Tanel Kerikmäe, Ondrej Hamuľák, 2023-06-20 This edited volume analyses the digital development of the European Union, presenting an interdisciplinary perspective from the disciplines of political science, international relations, economics, and law. The contributions address the main areas where the EU can, and should act, for creating an efficient and protective digital space in Europe. The book highlights the responsibility of the European Union to work on the future of its digital development, looking for prosperity and defending the European conception of society. It explains how European values must be incorporated into the digital revolution and shows how the digital revolution of the EU will defend the Europeans from new threats. The book's comprehensive approach allows the reader to understand this process without in-depth knowledge of the specific discipline. Therefore, it is a must-read for everybody interested in a better understanding of digital development, European Union policy, and the future of Europe. |
Gartner是一个什么样的机构? - 知乎
Gartner(高德纳)成立于1979年,是全球最具权威的IT研究公司,其名头在顾问研究领域,可以说是无人不知无人不晓,在鼓公司拥有 1,200多位世界级分析专家。在全球的IT产业中,Gartner发布的IT评 …
Gartner魔力象限为什么会受到重视? - 知乎
Gartner由Gartner研究与咨询服务、Gartner顾问、Gartner评测、Gartner社区四部分组成,在此我们不做过多阐述。 二维模型阐释公司实力四个象限评判企业差异 最为大家熟知的“Gartner魔力象限”即 …
如何获取Gartner报告,付费账号怎么申请,年费多少? - 知乎
其实也能找到一些渠道可以低价获取报告,之前试过以几百块的价格买过Gartner报告(比如技术成熟度曲线等),亲测过,如果需要可以私信我,我有空的情况下尽量传授经验。
普及一下什么是大数据技术? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业、友善的社区 …
IDC研究方向,报告与Gartner 的主要区别是什么? - 知乎
Gartner数据这块比较弱,分析师团队基本都Base在北美,没有数据相关的常规报告,中国分析师团队规模较小,常规报告都是全球的,基本不划分区域,不接地气。但是技术趋势分析和厂商技术能力评定 …
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
如何评价Gartner 刚发布的2020年 《NDR(网络威胁检测及响 …
问题一、Gartner为什么把原来的《NTA全球市场指南》调整成了《NDR全球市场指南》? NDR可以看作是NTA的进化版,都属于流量威胁检测设备。 Gartner把原来的NTA调整成NDR的原因,简单来说是 …
EDR(终端检测与响应)和传统杀毒软件有什么区别? - 知乎
EDR,是端点检测与响应(Endpoint Detection & Response,EDR)的缩写,Gartner 于 2013 年定义了这一术语,被认为是一种面向未来的终端解决方案,以端点为基础,结合终端安全大数据对未知威胁和 …
如何获得Gartner、iSuppli、IDC之类的原报告? - 知乎
我有过两种免费获得Gartner报告的经历: 1. 用大学邮箱注册,@unimelb.edu.au 我们学校有部分订阅。(母校威武)你们可以用所在组织邮箱注册一下,说不定订阅了。 2. 去领导者象限的厂商官网上, …
什么是BI,当前国内外BI的现状,BI的应用状况? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业、友善的社区 …
Gartner是一个什么样的机构? - 知乎
Gartner(高德纳)成立于1979年,是全球最具权威的IT研究公司,其名头在顾问研究领域,可以说是无人不知无人不晓,在鼓公司拥有 1,200多位世界级分析专家。在全球的IT产业中,Gartner发布的IT …
Gartner魔力象限为什么会受到重视? - 知乎
Gartner由Gartner研究与咨询服务、Gartner顾问、Gartner评测、Gartner社区四部分组成,在此我们不做过多阐述。 二维模型阐释公司实力四个象限评判企业差异 最为大家熟知的“Gartner魔力象限” …
如何获取Gartner报告,付费账号怎么申请,年费多少? - 知乎
其实也能找到一些渠道可以低价获取报告,之前试过以几百块的价格买过Gartner报告(比如技术成熟度曲线等),亲测过,如果需要可以私信我,我有空的情况下尽量传授经验。
普及一下什么是大数据技术? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业、友善的社区 …
IDC研究方向,报告与Gartner 的主要区别是什么? - 知乎
Gartner数据这块比较弱,分析师团队基本都Base在北美,没有数据相关的常规报告,中国分析师团队规模较小,常规报告都是全球的,基本不划分区域,不接地气。但是技术趋势分析和厂商技术能力评定 …