Change Management challenges – people & process.
Bring sanity to your IT Change process: Influence the Change Management Culture
Change Management challenges with people & process – The first in a 3 part series on IT Change Management
Following the path of Crawl, Walk, and Run; learn to crawl before you fall. Many IT shops have change management where everyone submits changes for work they want done, process and enforcement is simplistic, and reporting is minimal. Join Acorio for this lively discussion as we cover the following topics:
Culture of Change
Change Management Steps of Maturity
Resistance to Process Enforcement
You’ll come away with a better understanding of the challenges and practical ways to address them.
BrightTALK caught up with Kai Roer, the Creator of the Security Culture Framework for an in-depth conversation on security culture and it's value to businesses today. Kai also talks through the findings of the Security Culture Report 2017, which can be accessed via the videos attachments.
Topics up for discussion:
- The importance of building a strong culture of security at businesses to add to an overall security strategy
- How to improve security culture within your organisation
- GDPR and how to prepare effectively
- The findings of the Security Culture Report 2017
BrightTALK caught up with Giovanni Vigna from University of Santa Barbara & Lastline for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- The difference between traditional AI & Machine Learning and the tools when applied to cyber security
- Whether the buzz surrounding the tools is legitimate
- How the human still needs to fit into the picture when using machine learning based security techniques
- How AI & Machine learning can be used for threat hunting purposes
- The WannaCry virus and what it means for the ransomware landscape and how we protect ourselves from attacks
- The value of security culture in an organisation
- Trends in the techniques used in cyber warfare
- The exponential growth of the IoT and what it means for securing the connected devices
Who are your content ambassadors? Join Jim Williams of Influitive as he discusses strategies and tactics for finding and rewarding the best brand and product advocates.Read more >
Focus of the talk:
The current global political climate and the increased number of cyber attacks associated with nation states and revelations from whistleblowers such as WikiLeaks. The strategies and potential reasons for such attacks – We are seeing a focus shifting from financial gain
to political power, control and mass surveillance.
A view of the technologies utilised and targeted to perform the attacks such as malware targets such as iPhones, Android devices and smart TVs and malware on Windows, Osx, Linux etc
The talk is aimed at those with a general interest in Cyber Security and how political gain is firmly intertwined and a tool utilised in state sponsored cyber attacks indiscriminately against corporations, criminals and citizens alike.
Indy possesses over 14 years’ experience, having worked in both
operational and consulting positions at FTSE100 and Fortune 500
organisations including AXA, Deutsche Bank, PwC, Accenture,
Mercedes-Benz, Jaguar Land Rover and many other world leading
His experience includes leadership positions in information/
cybersecurity transformation, risk assurance, crisis management
(pre and post incident), assurance, audit, governance, risk and
IT Consumerization—the blending of personal and business use of technology, devices and applications —presents IT organizations with both a challenge and an opportunity. The most strategic weapon IT has at its disposal is the IT service desk, the interface between business users and the IT services the organization provides.
This webinar will discuss:
* How IT organizations can modernize the business’s customer support and technical experiences,
* Shine the light on shadow IT to ensure value is created,
* Protect and improve the overall perception of IT within the business.
There are simple and effective ways to incorporate more persuasion techniques in sales as you work with prospects and customers. A few examples to become more persuasive are enhance your credibility, use persuasive words and offer the right proof. Shorten your sales cycle and sell more with power persuasion.Read more >
Traditional models of cognitive behaviour remain meaningful, but they can fail to deliver strong links between ‘smart’, cognitive-based factors of judgement and the decision-making associated with actual behaviour change.
In contrast, behavioural economics accounts for the ‘lazy’ judgments and thoughts that occur at an automatic level, but can over-weight the prevalence of such behaviour.
On October 4 Cello Health Insight, in association with PMGroup, will host a free webinar on applying adaptive and integrated behavioural models to qualitative enquiry.
It will look at how to achieve a better understanding of what drives therapeutic decision-making and how medical marketing, digital and PR initiatives can change future behaviours in favour of achieving target sales.
Financial services marketers are overcoming the difficulties of participating in social media and measuring its Return On Investment (ROI) by adopting a new definition of ROI: Return On Influence. Join Victor Gaxiola and Mark Cohen in this webcast to find out how measuring this new social ROI is enabling financial services marketers to asses their leverage of social media tools to engage, enrich, educate, and entertain.
- The fundamentals of social networks and influence
- The five factors of influence (value, trust, engagement, reciprocity, and advocacy)
- The amplification of influence via social media
- The Return On Influence
- The next generation of advisors and investors
- Infosecurity Europe 2016 -
BrightTALK were honoured to be joined by the CSA's CTO Daniele Catteddu to get his thoughts on cyber security and cloud defences in particular.
Daniele walked through his thoughts on privacy shield and the sharing of EU data with the US; data protection; cyber security in the financial sector and how the banks can better protect themselves; assessing who the key threat actors are; ethical hacking and strengthening your perimeter to keep out zero-day attacks.
According to IIA guidance, internal auditors are charged with monitoring organizational ethics and assessing whether management policies, procedures, and practices support ethical operations. And while management usually seeks to set, promote, and perpetuate an ethical climate, some leaders seem either motivated by self-interest or so focused on other operational priorities that they overlook their obligation to steward organizational ethics.
What can internal audit do to articulate this risk of unethical behavior? How can internal audit influence the tone at the top? How can internal auditors persuade management to see the value proposition for ethical leadership? This webinar addresses these questions and equips auditors, audit directors, and CAEs to make a compelling argument as to how ethical leadership drives bottom-line results.
By the end of this webinar, participants should be able to:
-Compare contrasting views of behavioral ethics
-Differentiate between moral and conditioned honesty
-Examine rationalizations commonly indicative of moral disengagement
-Explain why ethical stewardship is a primary leadership responsibility
-Correlate ethical leadership to organizational results
-Formulate a compelling argument in favor of an ethical tone at the top