Advertisement
gartner magic quadrant integrated risk management: Understanding Financial Risk Management Angelo Corelli, 2024-05-27 Financial risk management is a topic of primary importance in financial markets. It is important to learn how to measure and control risk, how to be primed for the opportunity of compensative return, and how to avoid useless exposure. |
gartner magic quadrant integrated risk management: Straight from the Client Carsten Fabig, Alexander Haasper, 2017-12-11 The challenges of our customers are more and more diverse. A couple of strong trends like digitalization and cyber security issues are facing the daily life of all of us. This is true for our business and private life. That People make a difference is a strong Vineyard belief. Therefore, in this book the Vineyard consultants are interviewed in order to present their individual consulting experiences. As a starting point the current customer challenges and consulting trends are summarized. A contribution towards the GDPR deadline and approaches how to deal with these changes is following. The next article is suggesting how to handle the need in the pharmaceutical industry to communicate with business partners beyond the firewall. Based on Vineyards long experience in the IT Cyber Security world the following article is emphasizing why security is priority zero and how IT Security standards and frameworks can be used in a beneficial and lean way. The following two articles have a strong technical focus. While the first one is introducing the new technology Summarizer which is capable to compress existing files from a content perspective the following is about what an agile methodology can deliver in the field IT Service Management. The benefits of a focused eDiscovery approach for litigation processes are discussed in another contribution. How transitional changes for companies as a result of Brexit for example can be managed is following. Risk management in the cyber field for the banking industry and leading in projects are two interviews that reflect typical customer challenges. How to set-up an electronic archive as part of a digitalization initiative is outlined in an expert interview for the insurance industry. The benefits of a focused eDiscovery approach for litigation processes are discussed in another impulse. An interview about knowledge management is closing this book. As a key component for the customer in a knowledge society it is discussed how this can be approached for a consultancy. If you focus your deep dives you can also see the little things in a broader context. We wish our readers inspiring insights and new impulses to find the individual balance between the right deep dives and the ability for the helicopter view. Many thanks again to all Vineyard colleagues contributing to this new Vineyard book. |
gartner magic quadrant integrated risk management: Actionable Strategies Through Integrated Performance, Process, Project, and Risk Management Stephen S. Bonham, 2008 This unique resource presents a new look at how the puzzle pieces of corporate dynamics management can fit together to ensure strategic designs are actionable. |
gartner magic quadrant integrated risk management: Digital Transformation Emmanuel Monod, Yuewei Jiang, 2023-06-01 Whereas digital transformation, considered from the standpoint of strategy, suggests a direct link with business benefits, questions linger about the implementation of digital technologies that often result in a lack of return on investment. Many consulting trends adopt a technology-centered approach, assuming that AI, IoT, data analytics, or robotics, would lead to business performance. Yet, most of the time, organizational factors are neglected, especially hidden costs or hidden work. Moreover, unexpected consequences are overlooked, such as resistance to change. Digital transformation is a practical problem for managers. Are IS implementation approaches such as agile methods to Socio-Technical Systems (STS) sufficient to tackle these issues? This book suggests starting from organizational transformation, in essence, independently from technology with methods such as Business Process Management (BPM), Socio-Economic Approaches to Management (SEAM) or Organizational Development (OD). Overall, whereas technology-centered approaches have been associated with numerous unintended consequences and failures with previous generations of technologies (e.g., ERP or KMS), process-centered and human-centered approaches may represent a less risky approach to digital transformation implementation. This volume focuses on evaluating the potential performance improvements and risks of digital transformation and ways to assess how technology may support work and organizational goals. Therefore, whereas written by both academics and practitioners, this book has been written for all managers in companies and institutions in order to help them achieve digital transformation success. |
gartner magic quadrant integrated risk management: T-Byte Platforms & Applications V Gupta, 2019-12-30 This document brings together a set of latest data points and publicly available information relevant for Platforms & Applications Industry. We are very excited to share this content and believe that readers will benefit from this periodic publication immensely. |
gartner magic quadrant integrated risk management: Securing the Future: Cybersecurity Strategies with AI, ML, and Generative AI Purshotam Singh Yadav, Anil Kumar Komarraju, Surya Nalamati, Aravind Ravi, ..... |
gartner magic quadrant integrated risk management: Practical Risk Management for the CIO Mark Scherling, 2016-04-19 The growing complexity of today's interconnected systems has not only increased the need for improved information security, but also helped to move information from the IT backroom to the executive boardroom as a strategic asset. And, just like the tip of an iceberg is all you see until you run into it, the risks to your information are mostly invi |
gartner magic quadrant integrated risk management: Enterprise Cybersecurity in Digital Business Ariel Evans, 2022-03-23 Cyber risk is the highest perceived business risk according to risk managers and corporate insurance experts. Cybersecurity typically is viewed as the boogeyman: it strikes fear into the hearts of non-technical employees. Enterprise Cybersecurity in Digital Business: Building a Cyber Resilient Organization provides a clear guide for companies to understand cyber from a business perspective rather than a technical perspective, and to build resilience for their business. Written by a world-renowned expert in the field, the book is based on three years of research with the Fortune 1000 and cyber insurance industry carriers, reinsurers, and brokers. It acts as a roadmap to understand cybersecurity maturity, set goals to increase resiliency, create new roles to fill business gaps related to cybersecurity, and make cyber inclusive for everyone in the business. It is unique since it provides strategies and learnings that have shown to lower risk and demystify cyber for each person. With a clear structure covering the key areas of the Evolution of Cybersecurity, Cybersecurity Basics, Cybersecurity Tools, Cybersecurity Regulation, Cybersecurity Incident Response, Forensics and Audit, GDPR, Cybersecurity Insurance, Cybersecurity Risk Management, Cybersecurity Risk Management Strategy, and Vendor Risk Management Strategy, the book provides a guide for professionals as well as a key text for students studying this field. The book is essential reading for CEOs, Chief Information Security Officers, Data Protection Officers, Compliance Managers, and other cyber stakeholders, who are looking to get up to speed with the issues surrounding cybersecurity and how they can respond. It is also a strong textbook for postgraduate and executive education students in cybersecurity as it relates to business. |
gartner magic quadrant integrated risk management: T Bytes Platforms & Applications IT-Shades, 2020-10-02 This document brings together a set of latest data points and publicly available information relevant for Platforms & Applications This document brings together a set of latest data points and publicly available information relevant for Platforms & Applications periodic publication immensely. |
gartner magic quadrant integrated risk management: Records and Information Management, Second Edition Patricia C. Franks, 2018-10-10 As Information Management put it, On the strength of its currency and coverage alone, Franks' book is poised to take over as the recommended go-to reference for both students and RIM professionals for many years to come.” The new second edition cements this work’s status as an up-to-date classic, its content updated and expanded to address emerging technologies, most notably blockchain, and evolving standards and practices. Inside, Franks presents complete coverage of the records and information lifecycle model, encompassing paper, electronic (databases, office suites, email), and new media records (blogs, chat messages, and software as a service). Informed by an advisory board of experts in the field and with contributions by noted authorities, the text addresses such key topics as the origins and development of records and information;the discipline of information governance and developing a strategic records management plan;creation/capture and classification;retention strategies, inactive records management, archives, and long-term preservation;access, storage, and retrieval;electronic records and electronic records management systems;the latest on rapidly evolving technologies such as web records, social media, and mobile devices;vital records, disaster preparedness and recovery, and business continuity;monitoring, auditing, and risk management; andeducation and training. This book’s authoritative blend of theory and practice makes it a matchless resource for everyone in the archives and records management field. Instructor/trainer extras include a set of ready-to-go, customizable PowerPoint slides to accompany the text. Examination copies are available for instructors who are interested in adopting this title for course use. |
gartner magic quadrant integrated risk management: The Changing Face of Compliance Sharon Ward, 2016-04-01 In the current business climate the impact of the volume and nature of regulatory change and the regulatory risk arising from this is a significant business risk for regulated firms and regulators alike. As a consequence, management of this risk is increasingly high on the board agenda of regulated firms, with those business functions whose activities support this, such as Compliance, facing increasing levels of challenge in their efforts to be effective. The Changing Face of Compliance addresses core aspects of this challenge, considering the relationship between regulation and compliance and key influences on both, offering insight into the effectiveness of current approaches and addressing practical compliance challenges. Sharon Ward explains how the role of Compliance might be strengthened and those who work within it further enabled to support the current focus on improving standards in business, offering recommendations for enhancing this role. The text includes a mix of hands-on advice, examples and research based on the experiences of practitioners, educators and regulators drawn from across a wide range of jurisdictions and sectors. This is a thoughtful and timely book, whether you are concerned about the growing and changing implications of regulatory risk; the benefit of leveraging additional value from your Compliance function or your own Compliance role; or ways of transforming and sustaining the function to ensure its continued relevance to the business. |
gartner magic quadrant integrated risk management: The Effortless Experience Matthew Dixon, Nick Toman, Rick DeLisi, 2013-09-12 Everyone knows that the best way to create customer loyalty is with service so good, so over the top, that it surprises and delights. But what if everyone is wrong? In their acclaimed bestseller The Challenger Sale, Matthew Dixon and his colleagues at CEB busted many longstanding myths about sales. Now they’ve turned their research and analysis to a new vital business subject—customer loyalty—with a new book that turns the conventional wisdom on its head. The idea that companies must delight customers by exceeding service expectations is so entrenched that managers rarely even question it. They devote untold time, energy, and resources to trying to dazzle people and inspire their undying loyalty. Yet CEB’s careful research over five years and tens of thousands of respondents proves that the “dazzle factor” is wildly overrated—it simply doesn’t predict repeat sales, share of wallet, or positive wordof-mouth. The reality: Loyalty is driven by how well a company delivers on its basic promises and solves day-to-day problems, not on how spectacular its service experience might be. Most customers don’t want to be “wowed”; they want an effortless experience. And they are far more likely to punish you for bad service than to reward you for good service. If you put on your customer hat rather than your manager or marketer hat, this makes a lot of sense. What do you really want from your cable company, a free month of HBO when it screws up or a fast, painless restoration of your connection? What about your bank—do you want free cookies and a cheerful smile, even a personal relationship with your teller? Or just a quick in-and-out transaction and an easy way to get a refund when it accidentally overcharges on fees? The Effortless Experience takes readers on a fascinating journey deep inside the customer experience to reveal what really makes customers loyal—and disloyal. The authors lay out the four key pillars of a low-effort customer experience, along the way delivering robust data, shocking insights and profiles of companies that are already using the principles revealed by CEB’s research, with great results. And they include many tools and templates you can start applying right away to improve service, reduce costs, decrease customer churn, and ultimately generate the elusive loyalty that the “dazzle factor” fails to deliver. The rewards are there for the taking, and the pathway to achieving them is now clearly marked. |
gartner magic quadrant integrated risk management: Real Business of IT Richard Hunter, George Westerman, 2009-10-20 If you're a general manager or CFO, do you feel you're spending too much on IT or wishing you could get better returns from your IT investments? If so, it's time to examine what's behind this IT-as-cost mind-set. In The Real Business of IT, Richard Hunter and George Westerman reveal that the cost mind-set stems from IT leaders' inability to communicate about the business value they create-so CIOs get stuck discussing budgets rather than their contributions to the organization. The authors explain how IT leaders can combat this mind-set by first using information technology to generate three forms of value important to leaders throughout the organization: -Value for money when your IT department operates efficiently and effectively -An investment in business performance evidenced when IT helps divisions, units, and departments boost profitability -Personal value of CIOs as leaders whose contributions to their enterprise go well beyond their area of specialization The authors show how to communicate about these forms of value with non-IT leaders-so they understand how your firm is benefiting and see IT as the strategic powerhouse it truly is. |
gartner magic quadrant integrated risk management: Communications Writing and Design John DiMarco, 2017-03-14 Communications Writing and Design is an integrated, project-based introduction to effective writing and design across the persuasive domains of communication. Build a strong foundation of core writing and design skills using professionally-designed examples that illustrate and reinforce key principles Readers learn and analyze techniques by creating 15 projects in marketing, advertising, PR, and social media with the help of strategy suggestions, practical tips, and professional production techniques Written by an experienced professional and teacher, with a focus on the cross-disciplinary nature of contemporary communication work Learning is reinforced through a variety of pedagogical features: learning objectives, helpful mnemonics, real-life projects and applications, chapter references for further study, and end-of-chapter summaries and exercises A companion website with multimedia slides, exam questions, learning videos, and design guides provides additional learning tools for students and instructors |
gartner magic quadrant integrated risk management: Customer Relationship Management (CRM) for Medium and Small Enterprises Antonio Specchia, 2022-04-07 Customer Relationship Management (CRM) systems are a growing topic among small- and medium-sized enterprises, entrepreneurs, and solopreneurs, and it is completely clear that CRM is a tool that businesses should have in place to manage sales processes. Teams of salespeople must have a system to run their daily activities, and small businesses and solopreneurs must track their marketing effort, a functioning structure for maintaining their contacts with prospects and clients to improve the effectiveness of their sales effort. CRM, once only available to large corporations, is now powerful technology for small and medium businesses. Small and medium businesses are now able to implement CRM solutions under a more cost-effective balance as an alternative to traditional tools like Salesforce, Dynamics, or Oracle. The reason for the success is mainly the simplicity of the new tools and solutions that have been developed for the management of sales processes. This book discusses how to implement a CRM from the perspective of the businessperson—not the more typical IT consultant or the technical staff. It benefits business development, sales management, and sales process control. Small business owners must understand why and how implementing a CRM will create value for their business—how it will focus on business development, sales management, and how sales leads develop into happy customers. Small business owners must first understand what a CRM system is, how it works, what its main functions are, and how it serves to manage workflows in the company’s sales department. Generally, entrepreneurs struggle to find the time to read and study complex and fully comprehensive books. This book provides direct operational guidelines to those who need easy-to-read information about how to use CRM effectively. Business professionals must be able to set up CRM systems and avoid mistakes and wasting time. This book provides an overview of what can be done with CRM and how it happens to empower businesspeople to find new customers and win business opportunities. This book discusses the logic of CRM in sales, giving tips and explanations on why and what happens when CRM is implemented in a specific way. Essentially, this book gives the entrepreneur the know-how behind CRM in sales in general terms, supporting enhanced customer relationships. |
gartner magic quadrant integrated risk management: Border Management Modernization Gerard McLinden, Enrique Fanta, David Widdowson, Tom Doyle, 2010-11-30 Border clearance processes by customs and other agencies are among the most important and problematic links in the global supply chain. Delays and costs at the border undermine a country’s competitiveness, either by taxing imported inputs with deadweight inefficiencies or by adding costs and reducing the competitiveness of exports. This book provides a practical guide to assist policy makers, administrators, and border management professionals with information and advice on how to improve border management systems, procedures, and institutions. |
gartner magic quadrant integrated risk management: Handbook on Business Process Management 2 Jan vom Brocke, Michael Rosemann, 2010-09-22 Business Process Management (BPM) has become one of the most widely used approaches for the design of modern organizational and information systems. The conscious treatment of business processes as significant corporate assets has facilitated substantial improvements in organizational performance but is also used to ensure the conformance of corporate activities. This Handbook presents in two volumes the contemporary body of knowledge as articulated by the world's leading BPM thought leaders. This second volume focuses on the managerial and organizational challenges of Business Process Management such as strategic and cultural alignment, governance and the education of BPM stakeholders. As such, this book provides concepts and methodologies for the integration of BPM. Each chapter has been contributed by leading international experts. Selected case studies complement their views and lead to a summary of BPM expertise that is unique in its coverage of the most critical success factors of BPM. |
gartner magic quadrant integrated risk management: No Excuses Dennis I. Dickstein, Robert H. Flast, 2008-12-23 Why should a company have an operational risk management function and how should it be organized? No Excuses proposes that operational risk should be examined through the business processes, that is, the flows of business. It provides practical, how-to, step-by-step lessons and checklists to help identify and mitigate operational risks in an organization. As well, it shows how operational risk can be directly linked to the process flows of a business for all industries. CEOs, CFOs, COOs, CROs, CIOs, and CAOs will benefit from this innovative book. |
gartner magic quadrant integrated risk management: Innovation in Medicine and Healthcare Yen-Wei Chen, Satoshi Tanaka, R. J. Howlett, Lakhmi C. Jain, 2023-05-30 This book presents the proceedings of the KES International Conferences on Innovation in Medicine and Healthcare (KES-InMed-23), held in Rome, Italy, on June 14–16, 2023. Covering a number of key areas, including digital IT architecture in healthcare; advanced ICT for medicine and healthcare; biomedical engineering, trends, research and technologies; and healthcare support systems, this book is a valuable resource for researchers, managers, industrialists and anyone wishing to gain an overview of the latest research in these fields. |
gartner magic quadrant integrated risk management: Measuring the Business Value of Cloud Computing Theo Lynn, John G. Mooney, Pierangelo Rosati, Grace Fox, 2020-08-27 The importance of demonstrating the value achieved from IT investments is long established in the Computer Science (CS) and Information Systems (IS) literature. However, emerging technologies such as the ever-changing complex area of cloud computing present new challenges and opportunities for demonstrating how IT investments lead to business value. Recent reviews of extant literature highlights the need for multi-disciplinary research. This research should explore and further develops the conceptualization of value in cloud computing research. In addition, there is a need for research which investigates how IT value manifests itself across the chain of service provision and in inter-organizational scenarios. This open access book will review the state of the art from an IS, Computer Science and Accounting perspective, will introduce and discuss the main techniques for measuring business value for cloud computing in a variety of scenarios, and illustrate these with mini-case studies. |
gartner magic quadrant integrated risk management: Strategic Information Technology and Portfolio Management Tan, Albert Wee Kwan, Theodorou, Petros, 2009-03-31 The objectives of the proposed book are to provide techniques and tools appropriate for building application portfolios and develop strategies that increase financial performance--Provided by publisher. |
gartner magic quadrant integrated risk management: Hyperautomation Matt Calkins, Neil Ward-Dutton, George Westerman, Lakshmi N, Sidney Fernandes, Alice Wei, Chris Skinner, Isaac Sacolick, John Rymer, Lisa Heneghan, Darren Blake, Rob Galbraith, Ron Tolido, Michael Beckley, 2020-11-20 HYPERAUTOMATION is a collection of expert essays on low-code development and the future of business process automation. In each chapter, an academic, analyst, implementer, or end-user examines different aspects of low-code and automation in the enterprise, clarifying both value and barriers through personal experiences and insights. With contributions from: Dr. George Westerman, MIT - Neil Ward-Dutton, IDC - Lakshmi N, Tata Consultancy Services - Sidney Fernandes & Alice Wei, University of South Florida - Lisa Heneghan, KPMG - Chris Skinner, FinTech expert - John R. Rymer, Forrester (Emeritus) - Isaac Sacolick, StarCIO - Darren Blake, Bexley Neighbourhood Care - Rob Galbraith, InsureTech expert - Ron Tolido, Capgemini - Michael Beckley, Appian All proceeds from the sale of this book will be donated to Black Girls Code, an organization providing young girls of color opportunities to learn in-demand skills in technology and computer programming. |
gartner magic quadrant integrated risk management: The Risk IT Framework Isaca, 2009 |
gartner magic quadrant integrated risk management: Advances in Enterprise Technology Risk Assessment Gupta, Manish, Singh, Raghvendra, Walp, John, Sharman, Raj, 2024-10-07 As technology continues to evolve at an unprecedented pace, the field of auditing is also undergoing a significant transformation. Traditional practices are being challenged by the complexities of modern business environments and the integration of advanced technologies. This shift requires a new approach to risk assessment and auditing, one that can adapt to the changing landscape and address the emerging challenges of technology-driven organizations. Advances in Enterprise Technology Risk Assessment offers a comprehensive resource to meet this need. The book combines research-based insights with actionable strategies and covers a wide range of topics from the integration of unprecedented technologies to the impact of global events on auditing practices. By balancing both theoretical and practical perspectives, it provides a roadmap for navigating the intricacies of technology auditing and organizational resilience in the next era of risk assessment. |
gartner magic quadrant integrated risk management: Evaluation of Novel Approaches to Software Engineering Leszek A. Maciaszek, Joaquim Filipe, 2016-02-13 This book constitutes the thoroughly refereed proceedings of the 10th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2015, held in Barcelona, Spain, in April 2015. The 10 full papers presented were carefully reviewed and selected from 74 submissions. The papers reflect a growing effort to increase the dissemination of new results among researchers and professionals related to evaluation of novel approaches to software engineering. By comparing novel approaches with established traditional practices and by evaluating them against software quality criteria, the ENASE conferences advance knowledge and research in software engineering, identify most hopeful trends, and propose new directions for consideration by researchers and practitioners involved in large-scale software development and integration. |
gartner magic quadrant integrated risk management: Cybersecurity Essentials for Legal Professionals Eric N. Peterson, 2024-10-27 Cybersecurity Essentials for Legal Professionals: Protecting Client Confidentiality is an indispensable guide for attorneys and law firms navigating the complex digital landscape of modern legal practice. This comprehensive ebook, written by cybersecurity expert Eric Peterson, offers practical strategies, real-world case studies, and actionable insights to help legal professionals safeguard sensitive client data and maintain ethical standards in an increasingly digital world. Key topics covered include: • Understanding cybersecurity fundamentals in the legal context • Legal obligations and ethical considerations in digital security • Implementing best practices for law firm cybersecurity • Technical measures and infrastructure to protect client data • Future trends and emerging challenges in legal cybersecurity • Building a culture of security awareness in legal practice • Incident response and recovery strategies • Secure client communication in the digital age Whether you're a solo practitioner or part of a large firm, this ebook provides the knowledge and tools to protect your practice, clients, and reputation from evolving cyber threats. With its clear explanations, practical advice, and focus on the unique needs of legal professionals, Cybersecurity Essentials for Legal Professionals is a must-read for anyone committed to maintaining the highest client confidentiality and data protection standards in the modern legal landscape. Don't wait for a cyber incident to compromise your firm's integrity. Equip yourself with the essential cybersecurity knowledge you need to thrive in today's digital legal environment. Get your copy now and take the first step towards a more secure legal practice. |
gartner magic quadrant integrated risk management: T-Bytes Digital Customer Experience V Gupta, 2020-01-02 This document brings together a set of latest data points and publicly available information relevant for Digital Customer Expierence. We are very excited to share this content and believe that readers will benefit immensely from this periodic publication immensely. |
gartner magic quadrant integrated risk management: T-Byte Digital Customer Experience V Gupta, 2020-01-01 This document brings together a set of latest data points and publicly available information relevant for Digital Customer Expierence. We are very excited to share this content and believe that readers will benefit immensely from this periodic publication immensely. |
gartner magic quadrant integrated risk management: Privileged Attack Vectors Morey J. Haber, 2020-06-13 See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors target the path of least resistance: users and their privileges. In decades past, an entire enterprise might be sufficiently managed through just a handful of credentials. Today’s environmental complexity has seen an explosion of privileged credentials for many different account types such as domain and local administrators, operating systems (Windows, Unix, Linux, macOS, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and so many more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. We are experiencing an expanding universe of privileged accounts almost everywhere. There is no one solution or strategy to provide the protection you need against all vectors and stages of an attack. And while some new and innovative products will help protect against or detect against a privilege attack, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that threat actors leverage, and the defensive measures that organizations should adopt to protect against an incident, protect against lateral movement, and improve the ability to detect malicious activity due to the inappropriate usage of privileged credentials. This revised and expanded second edition covers new attack vectors, has updated definitions for privileged access management (PAM), new strategies for defense, tested empirical steps for a successful implementation, and includes new disciplines for least privilege endpoint management and privileged remote access. What You Will Learn Know how identities, accounts, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and monitoring strategies to mitigate privilege threats and risk Understand a 10-step universal privilege management implementation plan to guide you through a successful privilege access management journeyDevelop a comprehensive model for documenting risk, compliance, and reporting based on privilege session activity Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privilege access management problems |
gartner magic quadrant integrated risk management: Scaling Agile with Jira Align Dean MacNeil, Aslam Cader, 2020-11-27 Accelerate business value delivery with Jira Align, the enterprise agile planning platform, by connecting strategy with execution to maximize outcomes Key FeaturesImprove coordination and transparency between multiple programs, products, and business portfoliosIncrease customer satisfaction by responding quickly to ever-evolving customer needsDeliver higher quality products faster and more predictably with real-time insights and OKR trackingBook Description Jira Align is a platform purpose-built for enterprises to connect strategy with execution and drive transparency, consistency, and predictability at all levels of scale. The platform supports business value delivery in agile frameworks such as LeSS, DAD, and SAFe. It also caters to organizations that mix agile with waterfall to support scaled bimodal delivery. Starting with an introduction to the platform and its features, this book takes you through the foundational building blocks of Jira Align. You'll learn how an organization can benefit from implementing Jira Align and understand how to connect dimensions such as people, work, time, and outcomes. The book takes you through the typical steps for implementing Jira Align for maximizing outcomes and helps you solve common team, program, and portfolio-level challenges by enhancing visibility, tracking dependencies and risks, and using reports for real-time, distributed decision making. Throughout the book, you'll explore features such as remote agile ceremonies, live roadmaps, and objectives and key results (OKRs). You'll also get to grips with lean portfolio management, financial reporting, and using the program board for planning and execution. By the end of this book, you'll be well versed in the key features of Jira Align and be able to leverage them to support all levels of agile at scale. What you will learnUnderstand Jira Align's key factors for successFind out how you can connect people, work, time, and outcomes with Jira AlignNavigate and collaborate in Jira AlignScale team agility to the portfolio and enterpriseDelve into planning and execution, including roadmaps and predictability metricsImplement lean portfolio management and OKRsGet to grips with handling bimodal and hybrid deliveryEnable advanced data security and analytics in Jira AlignWho this book is for This book is for portfolio managers, program managers, product managers, product owners, executives, release train engineers, and scrum masters who want to empower their teams to deliver the right things at the right time and quickly respond to changes in the market. Familiarity with agile frameworks and Jira Software is necessary; the book will teach you the rest. |
gartner magic quadrant integrated risk management: Auditor's Guide to IT Auditing Richard E. Cascarino, 2012-02-15 Step-by-step guide to successful implementation and control of IT systems—including the Cloud Many auditors are unfamiliar with the techniques they need to know to efficiently and effectively determine whether information systems are adequately protected. Now in a Second Edition, Auditor's Guide to IT Auditing presents an easy, practical guide for auditors that can be applied to all computing environments. Follows the approach used by the Information System Audit and Control Association's model curriculum, making this book a practical approach to IS auditing Serves as an excellent study guide for those preparing for the CISA and CISM exams Includes discussion of risk evaluation methodologies, new regulations, SOX, privacy, banking, IT governance, CobiT, outsourcing, network management, and the Cloud Includes a link to an education version of IDEA--Data Analysis Software As networks and enterprise resource planning systems bring resources together, and as increasing privacy violations threaten more organization, information systems integrity becomes more important than ever. Auditor's Guide to IT Auditing, Second Edition empowers auditors to effectively gauge the adequacy and effectiveness of information systems controls. |
gartner magic quadrant integrated risk management: Agile Testing Manfred Baumgartner, Martin Klonk, Christian Mastnak, Helmut Pichler, Richard Seidl, Siegfried Tanczos, 2021-09-09 This book is written by testers for testers. In ten chapters, the authors provide answers to key questions in agile projects. They deal with cultural change processes for agile testing, with questions regarding the approach and organization of software testing, with the use of methods, techniques and tools, especially test automation, and with the redefined role of the tester in agile projects. The first chapter describes the cultural change brought about by agile development. In the second chapter, which addresses agile process models such as Scrum and Kanban, the authors focus on the role of quality assurance in agile development projects. The third chapter deals with the agile test organization and the positioning of testing in an agile team. Chapter 4 discusses the question of whether an agile tester should be a generalist or a specialist. In Chapter 5, the authors turn to the methods and techniques of agile testing, emphasizing the differences from traditional, phase-oriented testing. In Chapter 6, they describe which documents testers still need to create in an agile project. Next, Chapter 7 explains the efficient use of test automation, which is particularly important in agile development, as it is the main instrument for project acceleration and is necessary to support state-of-the-art DevOps approaches and Continuous Integration. Chapter 8 then adds examples from test tool practice extending test automation to include test management functionality. Chapter 9 is dedicated to training and its importance, emphasizing the role of employee training in getting started with agile development. Finally, Chapter 10 summarizes the results of the agile journey in general with a special focus on testing. To make the aspects described even more tangible, the specific topics of this book are accompanied by the description of experiences from concrete software development projects of various organizations. The examples demonstrate that different approaches can lead to solutions that meet the specific challenges of agile projects. |
gartner magic quadrant integrated risk management: T-Bytes IoT & AR Industry V Gupta, 2019-12-28 This document brings together a set of latest data points and publicly available information relevant for Digital Customer Expierence. We are very excited to share this content and believe that readers will benefit immensely from this periodic publication immensely. |
gartner magic quadrant integrated risk management: VMware Cross-Cloud Architecture Ajit Pratap Kundan, 2018-03-30 Enhance your virtualization skills by mastering storage and network virtualization with automation across different Clouds Key Features Migrate and build your applications in Hybrid Cloud with VMware Cross Cloud components and services Gain in-depth configuration insights of VMware Cross Cloud architecture Learn to migrate applications from VMware to AWS and IBM Cloud Book Description Over the past two decades, VMware vSphere has been known as the most trusted and reliable virtualization platform. VMware Cross-Cloud Architecture shows you how to design and configure Cross Cloud Architecture by using VMware Cloud Foundation and vRealize Suite with various use cases across private, public, and hybrid Cloud. This book takes you through everything from a basic understanding of virtualization to advanced aspects of storage and network virtualization, clustering, automation, and management. This book will be your guide to designing all aspects of Cloud. We start with the challenges faced by a traditional data center, define problem statements for you, and then brief you on respective solutions. Moving on, all kinds of virtualization and Cloud offerings from AWS and IBM Soft Layer are introduced and discussed in detail. Then, you'll learn how to design IT infrastructures for new and existing applications with a combination of Cloud Foundation, vRealize Suite, and vSphere enabled with VSAN and NSX. Furthermore, you'll learn how to design and configure high availability, disaster recovery, and apply an appropriate compliance matrix. Toward the end of the book, you will learn how to calculate the TCO/ROI, along with the VMware products packaging and licensing in detail. What you will learn Install and configure the Cloud foundation with Cross-Cloud services Configure vSphere high availability with the vCenter redundancy setup Architect and configure VMware with AWS Cloud Deploy VMware components in IBM Soft Layer Extend your DR setup with VMware to consume DRaaS Design and configure software-defined networking Implement compliance regulations to fix violations Who this book is for This book is for administrators, Cloud architects and network engineers who want to globalize their infrastructure using VMware and AWS services. An initial setup of workloads and data center is beneficial. |
gartner magic quadrant integrated risk management: Management Information Systems Kenneth C. Laudon, Jane Price Laudon, 2004 Management Information Systems provides comprehensive and integrative coverage of essential new technologies, information system applications, and their impact on business models and managerial decision-making in an exciting and interactive manner. The twelfth edition focuses on the major changes that have been made in information technology over the past two years, and includes new opening, closing, and Interactive Session cases. |
gartner magic quadrant integrated risk management: IT-gestuetztes Compliance Management fuer Geschaeftsprozesse Karlin, David, 2016-09-09 Compliance with regulatory requirements and internal policies has become increasingly critical to business success. This book presents an approach for efficiently checking the compliance of business processes based on event data recorded in a standardized event log format. In addition to a reference implementation of the approach an extension for a business process management tool as well as a web-based dashboard are developed. |
gartner magic quadrant integrated risk management: The Operational Risk Handbook for Financial Companies Brian Barnier, 2011-07-08 The Operational Risk Handbook for Financial Companies is a groundbreaking new book. It seeks to apply for the first time a range of proven operational risk techniques from other industries and disciplines to the troubled territory of financial services. Operational risk expert Brian Barnier introduces a range of sophisticated, dependable and - crucially - approachable tools for risk evaluation, risk response and risk governance. He provides a more robust way of gaining a better picture of risks, shows how to build risk-return awareness into decision making, and how to fix (and not just report) risks. The practical importance of fully understanding and acting on risk to the business begins in the foreword on plan-B thinking, penned by Marshall Carter, chairman of the NYSE and deputy chairman of NYSE Euronext. The book is unique because: - It is not just about modeling and a few basic tools derived from regulatory requirements. Instead, it looks at management of risk to operations across industries, professional disciplines and history to help ops risk leaders become aware of the entire landscape of proven experience, not just their own conference room. - It is not just about compliance. Instead, it looks to operations as part of performance - managing risk to return for shareholders and other interests (e.g. guarantee funds). - It is not content to look at risk in stand-alone segments or silos; instead it takes a systems approach. - It is not just about ops risk leaders sharing war stories at a conference. Instead, it introduces a panel of six financial institution board members who get risk management and provide their perspectives throughout the book to encourage/demand more from ops risk to meet the needs of the institution in the world. - It is not a semi-random collection of tips and tricks. Instead, it is grounded in a risk-management process flow tailored to financial companies from a range of proven experience, providing tools to help at each step. Suitable for companies of all sizes, this book is of direct relevance and use to all business managers, practitioners, boards and senior executives. Key insights from and for each are built into every chapter, including unique contributions from board members of a range of companies. The Operational Risk Handbook for Financial Companies is an essential book for making better decisions at every level of a financial company; ones that measurably improve outcomes for boards, managers, employees and shareholders alike. |
gartner magic quadrant integrated risk management: T Bytes Platforms & Applications ITShades.com, 2020-12-02 This document brings together a set of latest data points and publicly available information relevant for Platforms & Applications Industry.We are very excited to share this content and believe that readers will benefit from this periodic publication immensely. |
gartner magic quadrant integrated risk management: Software Product Management and Pricing Hans-Bernd Kittlaus, Peter N. Clough, 2008-12-18 Software product management and pricing are key success factors for any organization providing software, be it a software company or an organization responsible for software in a company that belongs to a different industry. After defining the term software product and looking at the business and organizational sides, the core elements of software product management and pricing are discussed. Recommendations are given on how to deal with these elements depending on different types of organizations and products in order to achieve the long-term success. |
gartner magic quadrant integrated risk management: The Lean Approach to Digital Transformation Yves Caseau, 2022-05-01 The Lean Approach to Digital Transformation: From Customer to Code and From Code to Customer is organized into three parts that expose and develop the three capabilities that are essential for a successful digital transformation: 1. Understanding how to co-create digital services with users, whether they are customers or future customers. This ability combines observation, dialogue, and iterative experimentation. The approach proposed in this book is based on the Lean Startup approach, according to an extended vision that combines Design Thinking and Growth Hacking. Companies must become truly customer-centric, from observation and listening to co-development. The revolution of the digital age of the 21st century is that customer orientation is more imperative -- the era of abundance, usages rate of change, complexity of experiences, and shift of power towards communities -- are easier, using digital tools and digital communities. 2. Developing an information system (IS) that is the backbone of the digital transformation – called “exponential information system” to designate an open IS (in particular on its borders), capable of interfacing and combining with external services, positioned as a player in software ecosystems and built for processing scalable and dynamic data flows. The exponential information system is constantly changing and it continuously absorbs the best of information processing technology, such as Artificial Intelligence and Machine Learning. 3. Building software “micro-factories” that produce service platforms, which are called “Lean software factories.” This “software factory” concept covers the integration of agile methods, tooling and continuous integration and deployment practices, a customer-oriented product approach, and a platform approach based on modularity, as well as API-based architecture and openness to external stakeholders. This software micro-factory is the foundation that continuously produces and provides constantly evolving services. These three capabilities are not unique or specific to this book, they are linked to other concepts such as agile methods, product development according to lean principles, software production approaches such as CICD (continuous integration and deployment) or DevOps. This book weaves a common frame of reference for all these approaches to derive more value from the digital transformation and to facilitate its implementation. The title of the book refers to the “lean approach to digital transformation” because the two underlying frameworks, Lean Startup and Lean Software Factory, are directly inspired by Lean, in the sense of the Toyota Way. The Lean approach is present from the beginning to the end of this book -- it provides the framework for customer orientation and the love of a job well done, which are the conditions for the success of a digital transformation. |
Gartner是一个什么样的机构? - 知乎
Gartner(高德纳)成立于1979年,是全球最具权威的IT研究公司,其名头在顾问研究领域,可以说是无人不知无人不晓,在鼓公司拥有 1,200多位世界级分析专家。在全球的IT产业 …
Gartner魔力象限为什么会受到重视? - 知乎
Gartner由Gartner研究与咨询服务、Gartner顾问、Gartner评测、Gartner社区四部分组成,在此我们不做过多阐述。 二维模型阐释公司实力四个象限评判企业差异 最为大家熟知的“Gartner魔 …
如何获取Gartner报告,付费账号怎么申请,年费多少? - 知乎
其实也能找到一些渠道可以低价获取报告,之前试过以几百块的价格买过Gartner报告(比如技术成熟度曲线等),亲测过,如果需要可以私信我,我有空的情况下尽量传授经验。
普及一下什么是大数据技术? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …
IDC研究方向,报告与Gartner 的主要区别是什么? - 知乎
Gartner数据这块比较弱,分析师团队基本都Base在北美,没有数据相关的常规报告,中国分析师团队规模较小,常规报告都是全球的,基本不划分区域,不接地气。但是技术趋势分析和厂商 …
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
如何评价Gartner 刚发布的2020年 《NDR(网络威胁检测及响应) …
问题一、Gartner为什么把原来的《NTA全球市场指南》调整成了《NDR全球市场指南》? NDR可以看作是NTA的进化版,都属于流量威胁检测设备。 Gartner把原来的NTA调整成NDR的原 …
EDR(终端检测与响应)和传统杀毒软件有什么区别? - 知乎
EDR,是端点检测与响应(Endpoint Detection & Response,EDR)的缩写,Gartner 于 2013 年定义了这一术语,被认为是一种面向未来的终端解决方案,以端点为基础,结合终端安全大数据 …
如何获得Gartner、iSuppli、IDC之类的原报告? - 知乎
我有过两种免费获得Gartner报告的经历: 1. 用大学邮箱注册,@unimelb.edu.au 我们学校有部分订阅。(母校威武)你们可以用所在组织邮箱注册一下,说不定订阅了。 2. 去领导者象限的 …
什么是BI,当前国内外BI的现状,BI的应用状况? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …
Gartner是一个什么样的机构? - 知乎
Gartner(高德纳)成立于1979年,是全球最具权威的IT研究公司,其名头在顾问研究领域,可以说是无人不知无人不晓,在鼓公司拥有 1,200多位世界级分析专家。在全球的IT产业 …
Gartner魔力象限为什么会受到重视? - 知乎
Gartner由Gartner研究与咨询服务、Gartner顾问、Gartner评测、Gartner社区四部分组成,在此我们不做过多阐述。 二维模型阐释公司实力四个象限评判企业差异 最为大家熟知的“Gartner魔 …
如何获取Gartner报告,付费账号怎么申请,年费多少? - 知乎
其实也能找到一些渠道可以低价获取报告,之前试过以几百块的价格买过Gartner报告(比如技术成熟度曲线等),亲测过,如果需要可以私信我,我有空的情况下尽量传授经验。
普及一下什么是大数据技术? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …
IDC研究方向,报告与Gartner 的主要区别是什么? - 知乎
Gartner数据这块比较弱,分析师团队基本都Base在北美,没有数据相关的常规报告,中国分析师团队规模较小,常规报告都是全球的,基本不划分区域,不接地气。但是技术趋势分析和厂商 …
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
如何评价Gartner 刚发布的2020年 《NDR(网络威胁检测及响应) …
问题一、Gartner为什么把原来的《NTA全球市场指南》调整成了《NDR全球市场指南》? NDR可以看作是NTA的进化版,都属于流量威胁检测设备。 Gartner把原来的NTA调整成NDR的原 …
EDR(终端检测与响应)和传统杀毒软件有什么区别? - 知乎
EDR,是端点检测与响应(Endpoint Detection & Response,EDR)的缩写,Gartner 于 2013 年定义了这一术语,被认为是一种面向未来的终端解决方案,以端点为基础,结合终端安全大数据 …
如何获得Gartner、iSuppli、IDC之类的原报告? - 知乎
我有过两种免费获得Gartner报告的经历: 1. 用大学邮箱注册,@unimelb.edu.au 我们学校有部分订阅。(母校威武)你们可以用所在组织邮箱注册一下,说不定订阅了。 2. 去领导者象限的 …
什么是BI,当前国内外BI的现状,BI的应用状况? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …