article thumbnail

Measuring Maturity

Peter James Thomas

The author, engaged in measuring maturity – © Jennifer Thomas Photography – view full photo. In the thirteen years that have passed since the beginning of 2007, I have helped ten organisations to develop commercially-focused Data Strategies [1].

article thumbnail

Data Strategy Creation – A Roadmap

Peter James Thomas

Data Strategy creation is one of the main pieces of work that I have been engaged in over the last decade [1]. In my last article, Measuring Maturity , I wrote about Data Maturity and how this relates to both Data Strategy and a Data Capability Review. I find Data Strategy creation a very rewarding process.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zero Trust Security for NIS2 compliance: What you need to know

CIO Business Intelligence

Central NetConductor includes all the tools organizations need to deploy, configure, and operate networks that support Zero Trust Security strategies. Assessing Zero Trust adoption for NIS2 compliance With the NIS2 compliance deadline looming, it can be helpful to assess current levels of cybersecurity implementation. European Union.

IoT 76
article thumbnail

Success is Growth – Data Insight promotes high performing leadership

Data Insight

Carmen Vicelich founded Data Insight in 2014 and mortgage technology business Valocity shortly after. Carmen Vicelich will continue to be instrumental in the development of Data Insight, supporting C-suite data strategy and in the position of Founder Chair, as well as CEO of Valocity. This is where Data Insight steps in.

article thumbnail

NLP Search Makes Business User Analytics Easy!

Smarten

Gartner research states that, ‘…data literacy will become an explicit and necessary driver of business value, demonstrated by its formal inclusion in over 80% of data and analytics strategies and change management programs.’ ‘If So, your team member might ask, ‘Who sold the most bakery items in the Southwest in 2014?’

article thumbnail

How To Improve Incident Response Time for Data Breaches

Smart Data Collective

Take the Marriott data breach in 2014, for example. Organizations should have strategies and procedures in place for making risk-related choices that represent the organization’s risk tolerance for data theft. Before Marriot acquired the Starwood hotel group, Starwood suffered a major data breach of its customer database.

article thumbnail

Towards optimal experimentation in online systems

The Unofficial Google Data Science Blog

the weight given to Likes in our video recommendation algorithm) while $Y$ is a vector of outcome measures such as different metrics of user experience (e.g., Taking measurements at parameter settings further from control parameter settings leads to a lower variance estimate of the slope of the line relating the metric to the parameter.