Gartner Risk Management Magic Quadrant

Advertisement



  gartner risk management magic quadrant: Real Business of IT Richard Hunter, George Westerman, 2009-10-20 If you're a general manager or CFO, do you feel you're spending too much on IT or wishing you could get better returns from your IT investments? If so, it's time to examine what's behind this IT-as-cost mind-set. In The Real Business of IT, Richard Hunter and George Westerman reveal that the cost mind-set stems from IT leaders' inability to communicate about the business value they create-so CIOs get stuck discussing budgets rather than their contributions to the organization. The authors explain how IT leaders can combat this mind-set by first using information technology to generate three forms of value important to leaders throughout the organization: -Value for money when your IT department operates efficiently and effectively -An investment in business performance evidenced when IT helps divisions, units, and departments boost profitability -Personal value of CIOs as leaders whose contributions to their enterprise go well beyond their area of specialization The authors show how to communicate about these forms of value with non-IT leaders-so they understand how your firm is benefiting and see IT as the strategic powerhouse it truly is.
  gartner risk management magic quadrant: Infonomics Douglas B. Laney, 2017-09-05 Many senior executives talk about information as one of their most important assets, but few behave as if it is. They report to the board on the health of their workforce, their financials, their customers, and their partnerships, but rarely the health of their information assets. Corporations typically exhibit greater discipline in tracking and accounting for their office furniture than their data. Infonomics is the theory, study, and discipline of asserting economic significance to information. It strives to apply both economic and asset management principles and practices to the valuation, handling, and deployment of information assets. This book specifically shows: CEOs and business leaders how to more fully wield information as a corporate asset CIOs how to improve the flow and accessibility of information CFOs how to help their organizations measure the actual and latent value in their information assets. More directly, this book is for the burgeoning force of chief data officers (CDOs) and other information and analytics leaders in their valiant struggle to help their organizations become more infosavvy. Author Douglas Laney has spent years researching and developing Infonomics and advising organizations on the infinite opportunities to monetize, manage, and measure information. This book delivers a set of new ideas, frameworks, evidence, and even approaches adapted from other disciplines on how to administer, wield, and understand the value of information. Infonomics can help organizations not only to better develop, sell, and market their offerings, but to transform their organizations altogether. Doug Laney masterfully weaves together a collection of great examples with a solid framework to guide readers on how to gain competitive advantage through what he labels the unruly asset – data. The framework is comprehensive, the advice practical and the success stories global and across industries and applications. Liz Rowe, Chief Data Officer, State of New Jersey A must read for anybody who wants to survive in a data centric world. Shaun Adams, Head of Data Science, Betterbathrooms.com Phenomenal! An absolute must read for data practitioners, business leaders and technology strategists. Doug's lucid style has a set a new standard in providing intelligible material in the field of information economics. His passion and knowledge on the subject exudes thru his literature and inspires individuals like me. Ruchi Rajasekhar, Principal Data Architect, MISO Energy I highly recommend Infonomics to all aspiring analytics leaders. Doug Laney’s work gives readers a deeper understanding of how and why information should be monetized and managed as an enterprise asset. Laney’s assertion that accounting should recognize information as a capital asset is quite convincing and one I agree with. Infonomics enjoyably echoes that sentiment! Matt Green, independent business analytics consultant, Atlanta area If you care about the digital economy, and you should, read this book. Tanya Shuckhart, Analyst Relations Lead, IRI Worldwide
  gartner risk management magic quadrant: Digital to the Core Mark Raskino, Graham Waller, 2016-09-12 There is no simple strategic method for dealing with the multidimensional nature of digital change. Even the sharpest leaders can become disoriented as change builds on change, leaving almost nothing certain. Yet to stand still is to fail. Enterprises and leaders must re-master themselves to succeed. Leaders must identify the key macro forces, then lead their organizations at three distinct levels: industry, enterprise, and self. By doing this they cannot only survive but clean up. Digital to the Core makes the case that all business leaders must understand the impact the digital revolution will continue to play in their industries, companies, and leadership style and practices. Drawing on interviews with over 30 top C-level executives in some of the world's most powerful companies and government organizations, including GE, Ford, Tory Burch, Babolat, McDonalds, Publicis and UK Government Digital Service, this book delivers practical insights from those on the front lines of major digital upheaval. The authors incorporate Gartner's annual CIO and CEO global survey research and also apply the deep knowledge and qualitative insights they have acquired as practitioners, management researchers, and advisors over decades in the business. Above all else, Raskino and Waller want companies and their top leaders to understand the full impact of digital change and integrate it at the core of their businesses.
  gartner risk management magic quadrant: Operational Risk Management Ron S. Kenett, Yossi Raanan, 2011-06-20 Models and methods for operational risks assessment and mitigation are gaining importance in financial institutions, healthcare organizations, industry, businesses and organisations in general. This book introduces modern Operational Risk Management and describes how various data sources of different types, both numeric and semantic sources such as text can be integrated and analyzed. The book also demonstrates how Operational Risk Management is synergetic to other risk management activities such as Financial Risk Management and Safety Management. Operational Risk Management: a practical approach to intelligent data analysis provides practical and tested methodologies for combining structured and unstructured, semantic-based data, and numeric data, in Operational Risk Management (OpR) data analysis. Key Features: The book is presented in four parts: 1) Introduction to OpR Management, 2) Data for OpR Management, 3) OpR Analytics and 4) OpR Applications and its Integration with other Disciplines. Explores integration of semantic, unstructured textual data, in Operational Risk Management. Provides novel techniques for combining qualitative and quantitative information to assess risks and design mitigation strategies. Presents a comprehensive treatment of near-misses data and incidents in Operational Risk Management. Looks at case studies in the financial and industrial sector. Discusses application of ontology engineering to model knowledge used in Operational Risk Management. Many real life examples are presented, mostly based on the MUSING project co-funded by the EU FP6 Information Society Technology Programme. It provides a unique multidisciplinary perspective on the important and evolving topic of Operational Risk Management. The book will be useful to operational risk practitioners, risk managers in banks, hospitals and industry looking for modern approaches to risk management that combine an analysis of structured and unstructured data. The book will also benefit academics interested in research in this field, looking for techniques developed in response to real world problems.
  gartner risk management magic quadrant: Understanding Financial Risk Management Angelo Corelli, 2024-05-27 Financial risk management is a topic of primary importance in financial markets. It is important to learn how to measure and control risk, how to be primed for the opportunity of compensative return, and how to avoid useless exposure.
  gartner risk management magic quadrant: Data Governance Dimitrios Sargiotis,
  gartner risk management magic quadrant: Continuous Computing Technologies for Enhancing Business Continuity Bajgoric, Nijaz, 2008-12-31 The main objective of this book is to assist managers in becoming aware and more knowledgeable on the economics of downtime and continuous computing technologies that help in achieving business continuity and managing efficiently information resources--Provided by publisher.
  gartner risk management magic quadrant: The Connector Manager Jaime Roca, Sari Wilde, 2019-09-19 The best managers work smarter, not harder After conducting a unique global study of over 9,000 people, analysts at the world-leading sales research firm Gartner identified four distinct types of manager. Incredibly, they found one type consistently performs far better than the rest, and it wasn’t the one they were expecting. Connector Managers understand that it’s not enough for managers to just encourage and teach employees themselves, and that providing constant coaching to employees can actually be detrimental to their independent development. Instead, by connecting employees to others in the team or organisation, Connector Managers can help their employees develop a range of skills beyond their own areas of expertise. Although the four types of managers are more or less evenly distributed, employees with Connector Managers perform significantly better than others. Employees with Always-on Managers who provide constant feedback and coaching perform significantly worse. Drawing on their ground-breaking data-driven research, as well as in-depth case studies and extensive interviews with thousands of managers, you’ll discover what behaviours define Connector Managers and how you can use them yourself to build brilliant, powerhouse teams.
  gartner risk management magic quadrant: T Bytes Platforms & Applications IT-Shades, 2020-10-02 This document brings together a set of latest data points and publicly available information relevant for Platforms & Applications This document brings together a set of latest data points and publicly available information relevant for Platforms & Applications periodic publication immensely.
  gartner risk management magic quadrant: T-Byte Platforms & Applications V Gupta, 2019-12-30 This document brings together a set of latest data points and publicly available information relevant for Platforms & Applications Industry. We are very excited to share this content and believe that readers will benefit from this periodic publication immensely.
  gartner risk management magic quadrant: T Bytes Digital Customer Experience IT-Shades, 2020-09-30 This document brings together a set of latest data points and publicly available information relevant for Digital Customer Experience Technology. We are very excited to share this content and believe that readers will benefit from this periodic publication immensely.
  gartner risk management magic quadrant: Commercial Banking Risk Management Weidong Tian, 2016-12-08 This edited collection comprehensively addresses the widespread regulatory challenges uncovered and changes introduced in financial markets following the 2007-2008 crisis, suggesting strategies by which financial institutions can comply with stringent new regulations and adapt to the pressures of close supervision while responsibly managing risk. It covers all important commercial banking risk management topics, including market risk, counterparty credit risk, liquidity risk, operational risk, fair lending risk, model risk, stress test, and CCAR from practical aspects. It also covers major components of enterprise risk management, a modern capital requirement framework, and the data technology used to help manage risk. Each chapter is written by an authority who is actively engaged with large commercial banks, consulting firms, auditing firms, regulatory agencies, and universities. This collection will be a trusted resource for anyone working in or studying the commercial banking industry.
  gartner risk management magic quadrant: Always-On Enterprise Information Systems for Modern Organizations Bajgoric, Nijaz, 2017-12-01 Continuous improvements in digitized practices have created opportunities for businesses to develop more streamlined processes. This not only leads to higher success in day-to-day production, but it increases the overall success of businesses. Always-On Enterprise Information Systems for Modern Organizations is a critical scholarly resource that examines how EIS implementations support business processes and facilitate this in today’s e-business environment. Featuring coverage on a broad range of topics such as customer relations management, supply chain management, and business intelligence, this book is geared towards professionals, researchers, managers, consultants, and university students interested in emerging developments for business process management.
  gartner risk management magic quadrant: Straight from the Client Carsten Fabig, Alexander Haasper, 2017-12-11 The challenges of our customers are more and more diverse. A couple of strong trends like digitalization and cyber security issues are facing the daily life of all of us. This is true for our business and private life. That People make a difference is a strong Vineyard belief. Therefore, in this book the Vineyard consultants are interviewed in order to present their individual consulting experiences. As a starting point the current customer challenges and consulting trends are summarized. A contribution towards the GDPR deadline and approaches how to deal with these changes is following. The next article is suggesting how to handle the need in the pharmaceutical industry to communicate with business partners beyond the firewall. Based on Vineyards long experience in the IT Cyber Security world the following article is emphasizing why security is priority zero and how IT Security standards and frameworks can be used in a beneficial and lean way. The following two articles have a strong technical focus. While the first one is introducing the new technology Summarizer which is capable to compress existing files from a content perspective the following is about what an agile methodology can deliver in the field IT Service Management. The benefits of a focused eDiscovery approach for litigation processes are discussed in another contribution. How transitional changes for companies as a result of Brexit for example can be managed is following. Risk management in the cyber field for the banking industry and leading in projects are two interviews that reflect typical customer challenges. How to set-up an electronic archive as part of a digitalization initiative is outlined in an expert interview for the insurance industry. The benefits of a focused eDiscovery approach for litigation processes are discussed in another impulse. An interview about knowledge management is closing this book. As a key component for the customer in a knowledge society it is discussed how this can be approached for a consultancy. If you focus your deep dives you can also see the little things in a broader context. We wish our readers inspiring insights and new impulses to find the individual balance between the right deep dives and the ability for the helicopter view. Many thanks again to all Vineyard colleagues contributing to this new Vineyard book.
  gartner risk management magic quadrant: The Changing Face of Compliance Sharon Ward, 2016-04-01 In the current business climate the impact of the volume and nature of regulatory change and the regulatory risk arising from this is a significant business risk for regulated firms and regulators alike. As a consequence, management of this risk is increasingly high on the board agenda of regulated firms, with those business functions whose activities support this, such as Compliance, facing increasing levels of challenge in their efforts to be effective. The Changing Face of Compliance addresses core aspects of this challenge, considering the relationship between regulation and compliance and key influences on both, offering insight into the effectiveness of current approaches and addressing practical compliance challenges. Sharon Ward explains how the role of Compliance might be strengthened and those who work within it further enabled to support the current focus on improving standards in business, offering recommendations for enhancing this role. The text includes a mix of hands-on advice, examples and research based on the experiences of practitioners, educators and regulators drawn from across a wide range of jurisdictions and sectors. This is a thoughtful and timely book, whether you are concerned about the growing and changing implications of regulatory risk; the benefit of leveraging additional value from your Compliance function or your own Compliance role; or ways of transforming and sustaining the function to ensure its continued relevance to the business.
  gartner risk management magic quadrant: Practical Risk Management for the CIO Mark Scherling, 2016-04-19 The growing complexity of today's interconnected systems has not only increased the need for improved information security, but also helped to move information from the IT backroom to the executive boardroom as a strategic asset. And, just like the tip of an iceberg is all you see until you run into it, the risks to your information are mostly invi
  gartner risk management magic quadrant: Enterprise Cybersecurity in Digital Business Ariel Evans, 2022-03-23 Cyber risk is the highest perceived business risk according to risk managers and corporate insurance experts. Cybersecurity typically is viewed as the boogeyman: it strikes fear into the hearts of non-technical employees. Enterprise Cybersecurity in Digital Business: Building a Cyber Resilient Organization provides a clear guide for companies to understand cyber from a business perspective rather than a technical perspective, and to build resilience for their business. Written by a world-renowned expert in the field, the book is based on three years of research with the Fortune 1000 and cyber insurance industry carriers, reinsurers, and brokers. It acts as a roadmap to understand cybersecurity maturity, set goals to increase resiliency, create new roles to fill business gaps related to cybersecurity, and make cyber inclusive for everyone in the business. It is unique since it provides strategies and learnings that have shown to lower risk and demystify cyber for each person. With a clear structure covering the key areas of the Evolution of Cybersecurity, Cybersecurity Basics, Cybersecurity Tools, Cybersecurity Regulation, Cybersecurity Incident Response, Forensics and Audit, GDPR, Cybersecurity Insurance, Cybersecurity Risk Management, Cybersecurity Risk Management Strategy, and Vendor Risk Management Strategy, the book provides a guide for professionals as well as a key text for students studying this field. The book is essential reading for CEOs, Chief Information Security Officers, Data Protection Officers, Compliance Managers, and other cyber stakeholders, who are looking to get up to speed with the issues surrounding cybersecurity and how they can respond. It is also a strong textbook for postgraduate and executive education students in cybersecurity as it relates to business.
  gartner risk management magic quadrant: Advanced Information Systems Engineering Barbara Pernici, 2010-05-20 This book constitutes the proceedings of the 22nd International Conference on Advanced Information Systems Engineering, CAiSE 2010, held im Hammamet, Tunisia, in June 2010. The 39 papers presented were carefully reviewed and selected from 299 submissions. The topics covered are business process modeling, information systems quality, service modelling, security management, matching and mining, case studies and experiences, conceptual modelling, adaptation, requirements, and process analysis. In addition this volume contains two keynote papers and the abstract of a panel discussion.
  gartner risk management magic quadrant: Quality Management Practices R. P. Mohanty, 2008 This book is the outcome of the efforts of many professionals working both in academia and industry who have contributed to the proceedings of the International Conference on Quality Management Practices for Organizational Excellence . Organizational Excellence is a final product composed of two basic elements alloyed prudently by the members/stakeholders of an organization. These two basic elements are Strategy and Culture . When we talk of quality management practices, we have to pursue quality as a strategy and also quality as a culture . Quality as strategy is a conscious and deliberate search for a plan of action that will develop an organization's distinctive competence and compound it. Quality as culture is the amalgamation of behavior patterns of all the stakeholders in terms of beliefs, values, attitudes etc. In other words, quality management is the epicenter of the competitive organizations of the future in which strategy is the scientific pursuits and culture is the artistic artifacts. Numerous authors have put forth their logical thoughts, have articulated their concepts and have validated their hypothesis relating to quality management. The papers, which have found place in this book aim at creating values of quality management practices.
  gartner risk management magic quadrant: Global Perspectives on Robotics and Autonomous Systems: Development and Applications Habib, Maki K., 2023-08-01 There is an increasing demand to develop intelligent robotics and autonomous systems to deal with dynamically changing and complex, unstructured, and unpredictable environments. Such robots should be able to handle task varieties, environment dynamics and goal variations, and their complexity. This also highlights the need for having intelligent robotics and autonomous systems with capabilities assuring reliable and robust functions resolving real-time complex problems that are associated with many applications across diverse domains. This requires unconventional ways to develop creative and innovative, energy-efficient, and eco- and environmentally friendly solutions that consider new ways of creative thinking while drawing inspiration from nature as a model leading to creating new designs, intelligent systems, intelligent structures/mechanisms, reconfigurability, and more. Global Perspectives on Robotics and Autonomous Systems: Development and Applications describes the evolution of robotics and autonomous systems, their development, their technologies, and their applications. This book discusses the concept of autonomy, requirements, and its role in shaping the behavior of these robots so that they can make their own effective and safe decisions and act on them reliably while assuring real-life requirements. Covering topics such as digital transformation, fused deposition modeling (FDM), and organizational unbundling process, this premier reference source is an essential resource for engineers, computer scientists, industry professionals, manufacturers, smart systems developers, data analysts, students and educators of higher educations, researchers, and academicians.
  gartner risk management magic quadrant: Mastering Cloud Security Posture Management (CSPM) Qamar Nomani, 2024-01-31 Strengthen your security posture in all aspects of CSPM technology, from security infrastructure design to implementation strategies, automation, and remedial actions using operational best practices across your cloud environment Key Features Choose the right CSPM tool to rectify cloud security misconfigurations based on organizational requirements Optimize your security posture with expert techniques for in-depth cloud security insights Improve your security compliance score by adopting a secure-by-design approach and implementing security automation Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionThis book will help you secure your cloud infrastructure confidently with cloud security posture management (CSPM) through expert guidance that’ll enable you to implement CSPM effectively, ensuring an optimal security posture across multi-cloud infrastructures. The book begins by unraveling the fundamentals of cloud security, debunking myths about the shared responsibility model, and introducing key concepts such as defense-in-depth, the Zero Trust model, and compliance. Next, you’ll explore CSPM's core components, tools, selection criteria, deployment strategies, and environment settings, which will be followed by chapters on onboarding cloud accounts, dashboard customization, cloud assets inventory, configuration risks, and cyber threat hunting. As you progress, you’ll get to grips with operational practices, vulnerability and patch management, compliance benchmarks, and security alerts. You’ll also gain insights into cloud workload protection platforms (CWPPs). The concluding chapters focus on Infrastructure as Code (IaC) scanning, DevSecOps, and workflow automation, providing a thorough understanding of securing multi-cloud environments. By the end of this book, you’ll have honed the skills to make informed decisions and contribute effectively at every level, from strategic planning to day-to-day operations.What you will learn Find out how to deploy and onboard cloud accounts using CSPM tools Understand security posture aspects such as the dashboard, asset inventory, and risks Explore the Kusto Query Language (KQL) and write threat hunting queries Explore security recommendations and operational best practices Get to grips with vulnerability, patch, and compliance management, and governance Familiarize yourself with security alerts, monitoring, and workload protection best practices Manage IaC scan policies and learn how to handle exceptions Who this book is for If you’re a cloud security administrator, security engineer, or DevSecOps engineer, you’ll find this book useful every step of the way—from proof of concept to the secured, automated implementation of CSPM with proper auto-remediation configuration. This book will also help cybersecurity managers, security leads, and cloud security architects looking to explore the decision matrix and key requirements for choosing the right product. Cloud security enthusiasts who want to enhance their knowledge to bolster the security posture of multi-cloud infrastructure will also benefit from this book.
  gartner risk management magic quadrant: Cloud Identity Patterns and Strategies Giuseppe Di Federico, Fabrizio Barcaroli, 2022-12-23 Get to grips with identity patterns and design a structured enterprise identity model for cloud applications Key FeaturesLearn all you need to know about different identity patterns and implementing them in real-world scenariosHandle multi-IDP-related common situations no matter how big your organizationGain practical insights into OAuth implementation patterns and flowsBook Description Identity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However, information on cloud identity patterns is generally scattered across different sources and rarely approached from an architect's perspective, and this is what Cloud Identity Patterns and Strategies aims to solve, empowering solutions architects to take an active part in implementing identity solutions. Throughout this book, you'll cover various theoretical topics along with practical examples that follow the implementation of a standard de facto identity provider (IdP) in an enterprise, such as Azure Active Directory. As you progress through the chapters, you'll explore the different factors that contribute to an enterprise's current status quo around identities and harness modern authentication approaches to meet specific requirements of an enterprise. You'll also be able to make sense of how modern application designs are impacted by the company's choices and move on to recognize how a healthy organization tackles identity and critical tasks that the development teams pivot on. By the end of this book, you'll be able to breeze through creating portable, robust, and reliable applications that can interact with each other. What you will learnUnderstand the evolution of identity in the enterpriseDiscover basic to advanced OAuth patterns and implementationsFind out how OAuth standards are usually adopted in the enterpriseExplore proven solutions for modern identity challengesUse Azure AD for implementing identity solutionsComprehend how company structure and strategies influence design decisionsWho this book is for This book is for cloud security engineers and identity experts. Enterprise architects, tech leads, developers, and anyone who wants to learn how to use identity patterns and strategies to build identity models for the modern cloud era will find this book useful. This book covers many DevOps and Agile principles; although not a pre-requisite, familiarity with these topics would be helpful.
  gartner risk management magic quadrant: Handbook of Research on Big Data Storage and Visualization Techniques Segall, Richard S., Cook, Jeffrey S., 2018-01-05 The digital age has presented an exponential growth in the amount of data available to individuals looking to draw conclusions based on given or collected information across industries. Challenges associated with the analysis, security, sharing, storage, and visualization of large and complex data sets continue to plague data scientists and analysts alike as traditional data processing applications struggle to adequately manage big data. The Handbook of Research on Big Data Storage and Visualization Techniques is a critical scholarly resource that explores big data analytics and technologies and their role in developing a broad understanding of issues pertaining to the use of big data in multidisciplinary fields. Featuring coverage on a broad range of topics, such as architecture patterns, programing systems, and computational energy, this publication is geared towards professionals, researchers, and students seeking current research and application topics on the subject.
  gartner risk management magic quadrant: T-Byte Digital Customer Experience V-Gupta, 2019-11-26 This document brings together a set of latest data points and publicly available information relevant for Digital Customer Experience Industry. We are very excited to share this content and believe that readers will benefit from this periodic publication immensely.
  gartner risk management magic quadrant: Digital Transformation Emmanuel Monod, Yuewei Jiang, 2023-06-01 Whereas digital transformation, considered from the standpoint of strategy, suggests a direct link with business benefits, questions linger about the implementation of digital technologies that often result in a lack of return on investment. Many consulting trends adopt a technology-centered approach, assuming that AI, IoT, data analytics, or robotics, would lead to business performance. Yet, most of the time, organizational factors are neglected, especially hidden costs or hidden work. Moreover, unexpected consequences are overlooked, such as resistance to change. Digital transformation is a practical problem for managers. Are IS implementation approaches such as agile methods to Socio-Technical Systems (STS) sufficient to tackle these issues? This book suggests starting from organizational transformation, in essence, independently from technology with methods such as Business Process Management (BPM), Socio-Economic Approaches to Management (SEAM) or Organizational Development (OD). Overall, whereas technology-centered approaches have been associated with numerous unintended consequences and failures with previous generations of technologies (e.g., ERP or KMS), process-centered and human-centered approaches may represent a less risky approach to digital transformation implementation. This volume focuses on evaluating the potential performance improvements and risks of digital transformation and ways to assess how technology may support work and organizational goals. Therefore, whereas written by both academics and practitioners, this book has been written for all managers in companies and institutions in order to help them achieve digital transformation success.
  gartner risk management magic quadrant: Exploring Cyber Criminals and Data Privacy Measures Mateus-Coelho, Nuno, Cruz-Cunha, Manuela, 2023-09-07 In recent years, industries have shifted into the digital domain, as businesses and organizations have used various forms of technology to aid information storage and efficient production methods. Because of these advances, the risk of cybercrime and data security breaches has skyrocketed. Fortunately, cyber security and data privacy research are thriving; however, industry experts must keep themselves updated in this field. Exploring Cyber Criminals and Data Privacy Measures collects cutting-edge research on information security, cybercriminals, and data privacy. It proposes unique strategies for safeguarding and preserving digital information using realistic examples and case studies. Covering key topics such as crime detection, surveillance technologies, and organizational privacy, this major reference work is ideal for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students.
  gartner risk management magic quadrant: Learn Business Analytics in Six Steps Using SAS and R Subhashini Sharma Tripathi, 2016-12-19 Apply analytics to business problems using two very popular software tools, SAS and R. No matter your industry, this book will provide you with the knowledge and insights you and your business partners need to make better decisions faster. Learn Business Analytics in Six Steps Using SAS and R teaches you how to solve problems and execute projects through the DCOVA and I (Define, Collect, Organize, Visualize, Analyze, and Insights) process. You no longer need to choose between the two most popular software tools. This book puts the best of both worlds—SAS and R—at your fingertips to solve a myriad of problems, whether relating to data science, finance, web usage, product development, or any other business discipline. What You'll Learn Use the DCOVA and I process: Define, Collect, Organize, Visualize, Analyze and Insights. Harness both SAS and R, the star analytics technologies in the industry Use various tools to solve significant business challenges Understand how the tools relate to business analytics See seven case studies for hands-on practice Who This Book Is For This book is for all IT professionals, especially data analysts, as well as anyone who Likes to solve business problems and is good with logical thinking and numbers Wants to enter the analytics world and is looking for a structured book to reach that goal Is currently working on SAS , R, or any other analytics software and strives to use its full power
  gartner risk management magic quadrant: Using Artificial Intelligence in Marketing Katie King, 2019-02-03 Artificial intelligence (AI) is paving the way for the future of marketing and business transformation, yet many organizations struggle to know exactly how and where to integrate it. This book is the ultimate guide to embracing the opportunity that AI can bring for your marketing. With AI forecasted to boost global GDP by 14% by 2030, an efficient and sustainable AI marketing strategy is now essential to avoid losing the competitive edge. Using Artificial Intelligence in Marketing provides the definitive, practical framework needed for marketers to identify, apply and embrace the opportunity to maximize the results and business advancement that AI can bring. Streamlining efficiencies into every business practice, AI automates simpler, repetitive tasks with unrivalled accuracy, allowing sales and marketing teams to return their attention to where human interaction is most valuable: strategy, creativity and personal connection. Using Artificial Intelligence in Marketing outlines key marketing benefits such as accurate market research samples, immediate big data insights and brand-safe content creation, right through to the on-demand customer service that is now expected 24/7. It also explores the inevitable myths, concerns and ethical questions that can arise from the large-scale adoption of AI. This book is an essential read for every 21st century marketer.
  gartner risk management magic quadrant: Emerging Technology Trends in Electronics, Communication and Networking Shilpi Gupta, Jignesh N. Sarvaiya, 2020-07-22 This book constitutes refereed proceedings of the Third International Conference on Emerging Technology Trends in Electronics, Communication and Networking, ET2ECN 2020, held in Surat, India, in February 2020. The 17 full papers and 6 short papers presented were thorougly reviewed and selected from 70 submissions. The volume covers a wide range of topics including electronic devices, VLSI design and fabrication, photo electronics, systems and applications, integrated optics, embedded systems, wireless communication, optical communication, free space optics, signal processing, image/ audio/ video processing, wireless sensor networks, next generation networks, network security, and many others.
  gartner risk management magic quadrant: T Bytes Agile & AI Operations IT Shades, This document brings together a set of latest data points and publicly available information relevant for Agile & AI Operations Industry. We are very excited to share this content and believe that readers will benefit from this periodic publication immensely.
  gartner risk management magic quadrant: Innovative and Agile Contracting for Digital Transformation and Industry 4.0 Shalan, Mohammad Ali, Algarni, Mohammed Ayedh, 2020-12-18 Digital transformation is reshaping the business arena as new, successful digital business models are increasing agility and presenting better ways to handle business than the traditional alternatives. Industry 4.0 affects everything in our daily lives and is blurring the line between the physical, the biological, and the digital. This created an environment where technology and humans are so closely integrated that it is impacting every activity within the organizations. Specifically, contracting processes and procedures are challenged to align with the new business dynamics as traditional contracts are no longer fitting today's agile and continuously changing environments. Businesses are required to facilitate faster, more secure, soft, and real-time transactions while protecting stakeholders’ rights and obligations. This includes agile contracts which are dynamically handling scope changes, smart contracts that can automate rule-based functions, friction-less contracts that can facilitate different activities, and opportunity contracts that looks toward the future. Innovative and Agile Contracting for Digital Transformation and Industry 4.0 analyzes the consequences, benefits, and possible scenarios of contract transformation under the pressure of new technologies and business dynamics in modern times. The chapters cover the problems, issues, complications, strategies, governance, and risks related to the development and enforcement of digital transformation contracting practices. While highlighting topics in the area of digital transformation and contracting such as artificial intelligence, digital business, emerging technologies, and blockchain, this book is ideally intended for business, engineering, and technology practitioners and policy makers, along with practitioners, stakeholders, researchers, academicians, and students interested in understanding the scope, complexity, and importance of innovative contracts and agile contracting.
  gartner risk management magic quadrant: Advances in Enterprise Technology Risk Assessment Gupta, Manish, Singh, Raghvendra, Walp, John, Sharman, Raj, 2024-10-07 As technology continues to evolve at an unprecedented pace, the field of auditing is also undergoing a significant transformation. Traditional practices are being challenged by the complexities of modern business environments and the integration of advanced technologies. This shift requires a new approach to risk assessment and auditing, one that can adapt to the changing landscape and address the emerging challenges of technology-driven organizations. Advances in Enterprise Technology Risk Assessment offers a comprehensive resource to meet this need. The book combines research-based insights with actionable strategies and covers a wide range of topics from the integration of unprecedented technologies to the impact of global events on auditing practices. By balancing both theoretical and practical perspectives, it provides a roadmap for navigating the intricacies of technology auditing and organizational resilience in the next era of risk assessment.
  gartner risk management magic quadrant: Guide to Security Assurance for Cloud Computing Shao Ying Zhu, Richard Hill, Marcello Trovati, 2016-03-09 This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this field. Enlightening perspectives are presented by an international collection of pre-eminent authorities in cloud security assurance from both academia and industry. Topics and features: · Describes the important general concepts and principles of security assurance in cloud-based environments · Presents applications and approaches to cloud security that illustrate the current state of the art · Reviews pertinent issues in relation to challenges that prevent organizations moving to cloud architectures · Provides relevant theoretical frameworks and the latest empirical research findings · Discusses real-world vulnerabilities of cloud-based software in order to address the challenges of securing distributed software · Highlights the practicalities of cloud security, and how applications can assure and comply with legislation · Includes review questions at the end of each chapter This Guide to Security Assurance for Cloud Computing will be of great benefit to a broad audience covering enterprise architects, business analysts and leaders, IT infrastructure managers, cloud security engineers and consultants, and application developers involved in system design and implementation. The work is also suitable as a textbook for university instructors, with the outline for a possible course structure suggested in the preface. The editors are all members of the Computing and Mathematics Department at the University of Derby, UK, where Dr. Shao Ying Zhu serves as a Senior Lecturer in Computing, Dr. Richard Hill as a Professor and Head of the Computing and Mathematics Department, and Dr. Marcello Trovati as a Senior Lecturer in Mathematics. The other publications of the editors include the Springer titles Big-Data Analytics and Cloud Computing, Guide to Cloud Computing and Cloud Computing for Enterprise Architectures.
  gartner risk management magic quadrant: ISSE 2004 — Securing Electronic Business Processes Sachar Paulus, Norbert Pohlmann, Helmut Reimer, 2013-11-11 This book presents the most interesting talks given at ISSE 2004 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Corporate Governance and why security implies to control the enterprise - Risk Management and how to quantify security threats - Secure Computing and how it will change the way we trust computers - Digital Rights Management and the protection of corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2004.
  gartner risk management magic quadrant: The Routledge Companion to Accounting Information Systems Martin Quinn, Erik Strauss, 2017-12-22 Information technology has permeated all walks of life in the past two decades. Accounting is no exception. Be it financial accounting, management accounting, or audit, information technology and systems have simplified daily tasks and routine work, simplified reporting, and changed how accounting is done. The Routledge Companion to Accounting Information Systems provides a prestige reference work which offers students and researchers an introduction to current and emerging scholarship in the discipline. Contributions from an international cast of authors provides a balanced view of both the technical underpinnings and organisational consequences of accounting information systems. With a focus on the business consequences of technology, this unique reference book will be a vital resource for students and researchers involved in accounting and information management.
  gartner risk management magic quadrant: Communications Writing and Design John DiMarco, 2017-03-14 Communications Writing and Design is an integrated, project-based introduction to effective writing and design across the persuasive domains of communication. Build a strong foundation of core writing and design skills using professionally-designed examples that illustrate and reinforce key principles Readers learn and analyze techniques by creating 15 projects in marketing, advertising, PR, and social media with the help of strategy suggestions, practical tips, and professional production techniques Written by an experienced professional and teacher, with a focus on the cross-disciplinary nature of contemporary communication work Learning is reinforced through a variety of pedagogical features: learning objectives, helpful mnemonics, real-life projects and applications, chapter references for further study, and end-of-chapter summaries and exercises A companion website with multimedia slides, exam questions, learning videos, and design guides provides additional learning tools for students and instructors
  gartner risk management magic quadrant: Principles and Applications of Business Intelligence Research Herschel, Richard T., 2012-12-31 This book provides the latest ideas and research on advancing the understanding and implementation of business intelligence within organizations--Provided by publisher.
  gartner risk management magic quadrant: Transformational Security Awareness Perry Carpenter, 2019-04-30 Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That’s what Transformational Security Awareness is all about. Author Perry Carpenter weaves together insights and best practices from experts in communication, persuasion, psychology, behavioral economics, organizational culture management, employee engagement, and storytelling to create a multidisciplinary masterpiece that transcends traditional security education and sets you on the path to make a lasting impact in your organization. Find out what you need to know about marketing, communication, behavior science, and culture management Overcome the knowledge-intention-behavior gap Optimize your program to work with the realities of human nature Use simulations, games, surveys, and leverage new trends like escape rooms to teach security awareness Put effective training together into a well-crafted campaign with ambassadors Understand the keys to sustained success and ongoing culture change Measure your success and establish continuous improvements Do you care more about what your employees know or what they do? It's time to transform the way we think about security awareness. If your organization is stuck in a security awareness rut, using the same ineffective strategies, materials, and information that might check a compliance box but still leaves your organization wide open to phishing, social engineering, and security-related employee mistakes and oversights, then you NEED this book.
  gartner risk management magic quadrant: Handbook of Financial Data and Risk Information II Margarita S. Brose, Mark D. Flood, Dilip Krishna, Bill Nichols, 2014-01-09 A comprehensive resource for understanding the issues involved in collecting, measuring and managing data in the financial services industry.
  gartner risk management magic quadrant: Handbook on Business Process Management 2 Jan vom Brocke, Michael Rosemann, 2010-09-22 Business Process Management (BPM) has become one of the most widely used approaches for the design of modern organizational and information systems. The conscious treatment of business processes as significant corporate assets has facilitated substantial improvements in organizational performance but is also used to ensure the conformance of corporate activities. This Handbook presents in two volumes the contemporary body of knowledge as articulated by the world's leading BPM thought leaders. This second volume focuses on the managerial and organizational challenges of Business Process Management such as strategic and cultural alignment, governance and the education of BPM stakeholders. As such, this book provides concepts and methodologies for the integration of BPM. Each chapter has been contributed by leading international experts. Selected case studies complement their views and lead to a summary of BPM expertise that is unique in its coverage of the most critical success factors of BPM.
Gartner是一个什么样的机构? - 知乎
Gartner(高德纳)成立于1979年,是全球最具权威的IT研究公司,其名头在顾问研究领域,可以说是无人不知无人不晓,在鼓公司拥有 1,200多位世界级分析专家。在全球的IT产业 …

Gartner魔力象限为什么会受到重视? - 知乎
Gartner由Gartner研究与咨询服务、Gartner顾问、Gartner评测、Gartner社区四部分组成,在此我们不做过多阐述。 二维模型阐释公司实力四个象限评判企业差异 最为大家熟知的“Gartner魔 …

如何获取Gartner报告,付费账号怎么申请,年费多少? - 知乎
其实也能找到一些渠道可以低价获取报告,之前试过以几百块的价格买过Gartner报告(比如技术成熟度曲线等),亲测过,如果需要可以私信我,我有空的情况下尽量传授经验。

普及一下什么是大数据技术? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …

IDC研究方向,报告与Gartner 的主要区别是什么? - 知乎
Gartner数据这块比较弱,分析师团队基本都Base在北美,没有数据相关的常规报告,中国分析师团队规模较小,常规报告都是全球的,基本不划分区域,不接地气。但是技术趋势分析和厂商 …

为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎

如何评价Gartner 刚发布的2020年 《NDR(网络威胁检测及响应) …
问题一、Gartner为什么把原来的《NTA全球市场指南》调整成了《NDR全球市场指南》? NDR可以看作是NTA的进化版,都属于流量威胁检测设备。 Gartner把原来的NTA调整成NDR的原 …

EDR(终端检测与响应)和传统杀毒软件有什么区别? - 知乎
EDR,是端点检测与响应(Endpoint Detection & Response,EDR)的缩写,Gartner 于 2013 年定义了这一术语,被认为是一种面向未来的终端解决方案,以端点为基础,结合终端安全大数据 …

如何获得Gartner、iSuppli、IDC之类的原报告? - 知乎
我有过两种免费获得Gartner报告的经历: 1. 用大学邮箱注册,@unimelb.edu.au 我们学校有部分订阅。(母校威武)你们可以用所在组织邮箱注册一下,说不定订阅了。 2. 去领导者象限的 …

什么是BI,当前国内外BI的现状,BI的应用状况? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …

Gartner是一个什么样的机构? - 知乎
Gartner(高德纳)成立于1979年,是全球最具权威的IT研究公司,其名头在顾问研究领域,可以说是无人不知无人不晓,在鼓公司拥有 1,200多位世界级分析专家。在全球的IT产业中,Gartner发布的IT评 …

Gartner魔力象限为什么会受到重视? - 知乎
Gartner由Gartner研究与咨询服务、Gartner顾问、Gartner评测、Gartner社区四部分组成,在此我们不做过多阐述。 二维模型阐释公司实力四个象限评判企业差异 最为大家熟知的“Gartner魔力象限”即 …

如何获取Gartner报告,付费账号怎么申请,年费多少? - 知乎
其实也能找到一些渠道可以低价获取报告,之前试过以几百块的价格买过Gartner报告(比如技术成熟度曲线等),亲测过,如果需要可以私信我,我有空的情况下尽量传授经验。

普及一下什么是大数据技术? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业、友善的社区 …

IDC研究方向,报告与Gartner 的主要区别是什么? - 知乎
Gartner数据这块比较弱,分析师团队基本都Base在北美,没有数据相关的常规报告,中国分析师团队规模较小,常规报告都是全球的,基本不划分区域,不接地气。但是技术趋势分析和厂商技术能力评定 …

为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎

如何评价Gartner 刚发布的2020年 《NDR(网络威胁检测及响 …
问题一、Gartner为什么把原来的《NTA全球市场指南》调整成了《NDR全球市场指南》? NDR可以看作是NTA的进化版,都属于流量威胁检测设备。 Gartner把原来的NTA调整成NDR的原因,简单来说是 …

EDR(终端检测与响应)和传统杀毒软件有什么区别? - 知乎
EDR,是端点检测与响应(Endpoint Detection & Response,EDR)的缩写,Gartner 于 2013 年定义了这一术语,被认为是一种面向未来的终端解决方案,以端点为基础,结合终端安全大数据对未知威胁和 …

如何获得Gartner、iSuppli、IDC之类的原报告? - 知乎
我有过两种免费获得Gartner报告的经历: 1. 用大学邮箱注册,@unimelb.edu.au 我们学校有部分订阅。(母校威武)你们可以用所在组织邮箱注册一下,说不定订阅了。 2. 去领导者象限的厂商官网上, …

什么是BI,当前国内外BI的现状,BI的应用状况? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业、友善的社区 …