Analytics, machine learning, and artificial intelligence will have a bigger impact on your business strategy. None will be effective without the right data. Therefore when defining your business strategy, it must be aligned with your data strategy.
This webinar will help your organization find that right combination by demonstrating how:
• Organizations are aligning data to business strategy
• New collaboration models accelerate data activation and outcomes
• Augmenting data management processes with Agile Process scales and accelerates data capabilities
• Harnessing enterprise tribes overcomes resistance and shadow IT for data
Many low volatility strategies have been unsuccessful at protecting investors from drawdowns. This can be traced to two major design flaws.Read more >
If you want your product content to work for you (rather than the other way around), you need a content strategy. In fact, you probably need a Unified Content Strategy -- a three-pronged approach that empowers you to do just about anything with your product content.
Join me, Scott Abel, The Content Wrangler, for a free, one-hour webinar with content strategy maven, Regina Lynn Preciado. Regina will discuss the need for a flexible, forward-looking content strategy. You'll learn what a Unified Content Strategy is, why it’s important, and five things you can do to start working toward a more strategic approach to product content.
ABOUT OUR GUEST
Regina Lynn Preciado is a content strategy consultant who helps companies transform how they organize, manage, and leverage content. From the dot-com boom of the ‘90s to today’s demand for intelligent, global, mobile-friendly content, Regina has helped dozens of organizations make content work for people (instead of the other way around).
“I’ve worked with projects of all sizes, from sole proprietors to large international enterprises, and have found that a unified content strategy is scalable for any size organization -- the principles and the purpose remain the same,” – Regina Lynn Preciado
Regina is a senior consultant with Content Rules, Inc., the only licensed provider of The Rockley Method™ unified content strategy.
Organizations collaborating with third-party entities, where employees are sharing files with individuals outside of the organization, are facing security risks at unprecedented scale. These dynamics correlate to the need for security controls such as Enterprise Digital Rights Management (EDRM) to protect sensitive information when it travels outside of the corporate firewall.
In this presentation, analyst Doug Cahill from Enterprise Strategy Group (ESG) will discuss the findings from a recent study where over 200 IT and Security Professionals shared their views on the challenges with external collaboration, and his recommendations for best practices. Lynne Courts, VP of Marketing from Seclore will share how to build a comprehensive data-centric security strategy with such technologies as next-generation EDRM.
Join us and discover:
- The most vulnerable information – what types of files are regularly shared externally that pose the greatest risks
- Industry and analyst views on where shared sensitive data needs protecting, and what defences are most effective
- How to best design a comprehensive data-centric security strategy for shared information that will protect data, meet compliance regulations and reduce your risks
Consumers today have access to more information than ever before when making a purchase decision. Buyers are looking for informative and trusted thought leadership content as they research their purchases, meaning that your brand's PR strategy needs to be working in tandem with marketing campaigns. As buyer behavior continues to change, marketers are re-examining their campaign and product launch strategy to incorporate PR storytelling tactics.
Join us as we discuss how to tell a unique story through a cohesive content plan to build audience trust and achieve campaign success.
During this webinar we will discuss:
• How to influence behavior through authentic and transparent content
• The evolution of earned media, and how to harness it
• The role of distribution as the missing link to any content plan
IDC Government Insights' Smart Cities Strategies research analyzes the role of ICT in improving services delivery in public safety, transportation, and public works; in fostering innovation and civic engagement; and in building successful business models for the evolution of a Smart City. IDC Government Insights' global team of analysts provides best practice case studies and objective third-party assessments of Smart City solution providers.Read more >
IDC Health Insights' Healthcare Payer IT Strategies research service provides in-depth coverage of key emerging business trends and technologies that drive emerging U.S. healthcare payer business objectives and impact payer information technology (IT) portfolios and investment.Read more >
The complexities and uncertainty of the present day combined with the pace of change and innovation only seem to be making healthcare more perplexing than promising for providers. The Provider IT Transformation Strategies service offers in-depth coverage of rapidly evolving use cases with a focus on the interrelations between providers, patients, and technologies that help providers meet the challenges of a market transitioning to value-based health.Read more >
As you move to the cloud, ensure that you secure your IT Delivery apabilities with spelled out business objectives to which the IT organisation can deliver with an effective Service Strategy to leverage IT in the execution of the Business Strategy http://www.brighttalk.com/webcast/29211 .
Where security is important, and I would think twice on the data that I would choose to put on the cloud, Time to Market and Cost Effectiveness are the critical success factors.
Time to Market should not only include “how fast do we get IT services set” but how can we leverage the business strategy execution with IT as we support the end to end delivery of new products / services to market.
The impact of Cost Effectiveness can be measured only as Total Cost of Ownership with cost, consumption and chargeback is defined (Cloud Computing: Fluff or Lightening http://www.brighttalk.com/community/it-service-management/webcast/21892 ).
We also need to define a clear IT Service Strategy with an “IT Business Model” (“This is how we deliver IT services to the business”) and a “Business (IT) Value proposition” (“This is how we support business objectives with services in a time to market perspective”).
Content marketing is an exciting concept that can generate a tremendous amount of success when executed correctly. For a lot of us, the issue is just that: we are not sure exactly how to execute a content marketing program. Suffice it to say that content marketing is the last step in the overall content creation process, and success with the process all comes down to your content strategy.
In this session, we'll start off by going over exactly what the difference between content strategy and content marketing really is. Subsequently, we'll examine how to conduct a content strategy audit in order to ensure that our content is working towards helping us achieve our goals. Attendees will walk away with the necessary steps and action items to review key performance indicators related to their content, identify opportunities through the analysis of social data and optimize their content strategy based on the findings of their audit.
Content marketing can be a cornerstone of success when it comes to your social business. In order for that to be the case, a fully optimized content strategy needs to be in place.
Building from the global Smart Cities program, the Smart Cities Public Safety Strategies report series will focus on key IT trends, challenges, and innovations in public safety/emergency management.Read more >
The Secrets to a Successful Public Cloud Management Strategy will teach you how to understand the new management requirements of the public cloud, develop the right strategies for managing cloud deployments, understand the various cloud management options, and how to select and integrate the necessary tooling to govern your cloud infrastructure at scale.Read more >
Today, 91% of malware uses DNS to carry out campaigns once it has breached the perimeter. In a recent SC Magazine survey, 46% of survey respondents said they experienced DNS-based data exfiltration. DNS traffic is not investigated or filtered by firewalls and thus is a gap that is commonly exploited by malicious actors.
Solving these challenges requires:
•Visibility into DNS traffic
•Plugging the DNS security gap with a multipronged approach to threat detection
•Integration between DNS Security and other security tools that are part of the ecosystem
As part of the continued DNS Security webinar series, please join (ISC)², Infoblox and McAfee for this interactive discussion and learn more on why DNS should be part of your cyber strategy.
For part 1 in this series: paste the following URL into your browser: https://www.isc2.org/News-and-Events/Webinars/EMEA-Webinars/Focused-Webinars?commid=293803&part2
For many organizations, structured content is the key to managing a shared content collection that includes information from teams across the enterprise. As they invested in the Darwin Information Typing Architecture (DITA) and a Component Content Management System (CCMS), organizations started to reap the benefits of driving efficiency gains across enterprise teams, better content consistency, and faster time to market.
But what’s next? How can these organizations evolve their content strategy and support new initiatives to drive delivery of better customer-centric content?
Please join Amber Swope, President, DITA Strategies, to learn about advanced techniques for managing and sharing structured content.
In recent years data breaches have become a common occurrence. What’s more surprising is how consistently these breaches occur. It’s not just the usual suspects of phishing, social engineering and insider threats; weak and stolen passwords are the majority cause (81% of the time per Verizon’s DBIR).
There’s no silver bullet for breach prevention, but there are excellent strategies to defend against today’s threat actors. In this session, we’ll unveil the findings of a research study from leading analyst firm IDG. You’ll learn:
- Challenges and priorities for IAM as a part of a breach prevention strategy
- Threats they’re most concerned about and the best way to defend against them
- How they’re identifying and responding to account compromise
You can easily re-coup lost customer spending – you just need to learn the strategies essential to increased lifetime customer value. Discover how to recover sleeping subscribers (and their abandoned shopping baskets), with help from Pure 360 and Let’sTalk Strategy.Read more >
Healthcare providers have specific and unique requirements around storing and accessing sensitive patient data and meeting HIPAA compliance. But this shouldn’t mean you can’t take advantage of the cost and scalability benefits of the cloud. In this webinar, we’ll discuss four common questions healthcare providers ask when they’re thinking of moving to the cloud and the corresponding strategies to employ a hybrid cloud approach.Read more >
Digital transformation is something that everybody wants to achieve, but not everyone can define. In this webinar, Accenture managing director Davinder Gautam and MuleSoft founder Ross Mason will discuss the problems CIOs are facing in planning and executing their digital transformation strategies as well as solutions to closing the IT delivery gap and achieving their goals.
Attendees will learn:
- What are the obstacles getting in the way of achieving digital transformation?
- Strategies to end the misalignment of business and IT on digital initiatives
- A roadmap to closing the IT delivery gap