article thumbnail

Data Strategy Creation – A Roadmap

Peter James Thomas

Data Strategy creation is one of the main pieces of work that I have been engaged in over the last decade [1]. In my last article, Measuring Maturity , I wrote about Data Maturity and how this relates to both Data Strategy and a Data Capability Review. I find Data Strategy creation a very rewarding process.

article thumbnail

Zero Trust Security for NIS2 compliance: What you need to know

CIO Business Intelligence

Central NetConductor includes all the tools organizations need to deploy, configure, and operate networks that support Zero Trust Security strategies. Assessing Zero Trust adoption for NIS2 compliance With the NIS2 compliance deadline looming, it can be helpful to assess current levels of cybersecurity implementation. European Union.

IoT 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Success is Growth – Data Insight promotes high performing leadership

Data Insight

Carmen Vicelich founded Data Insight in 2014 and mortgage technology business Valocity shortly after. Carmen Vicelich will continue to be instrumental in the development of Data Insight, supporting C-suite data strategy and in the position of Founder Chair, as well as CEO of Valocity. This is where Data Insight steps in.

article thumbnail

How To Improve Incident Response Time for Data Breaches

Smart Data Collective

Take the Marriott data breach in 2014, for example. Organizations should have strategies and procedures in place for making risk-related choices that represent the organization’s risk tolerance for data theft. Before Marriot acquired the Starwood hotel group, Starwood suffered a major data breach of its customer database.

article thumbnail

Online Traders Need to Take the Threats of Data Breaches Seriously

Smart Data Collective

This is especially common as more hackers use AI-driven strategies to commit cyberattacks. This article will discuss the various cybersecurity risks associated with online trading and provide strategies for reducing these risks. An infamous example of this type of attack is the 2014 JPMorgan Chase breach.

Risk 77
article thumbnail

The Role of Cloud Computing in Patient Engagement in Healthcare

Smart Data Collective

A 2014 study published in The Journal of Medical Practice Management discussed some of the benefits of using cloud technology to make things easier for patients. The healthcare sector recognizes this truth and has started to invest enormously in developing patient investment strategies and solutions.

article thumbnail

Rising Tide Rents and Robber Baron Rents

O'Reilly on Data

But in 2013 and 2014, it remained stuck at 83% , and while in the ten years since, it has reached 95% , it had become clear that the easy money that came from acquiring more users was ending. It’s unclear whether this was a lack of imagination or a kind of “ strategy tax.” The market was maturing. By the end of 2012, it was up to 82%.