Results for

  • Blogs
    February 29, 2024
    While the various forms of artificial intelligence (AI) have captured the imagination of nearly everyone in the business world, generative AI (GenAI) is rapidly becoming the hottest new kid on the block. We’ve seen the terms AI and GenAI being used synonymously but there are many types of AI. GenAI is the latest one and represents the ability of a model to create novel output. GenAI is a big…
  • Leadership
    Managing Director and Global Ecosystem Programme Leader, with over 15 years in Alliance Management developing partner ecosystems and designing recruitment strategies around strategic technology partners, global system integrators, and service providers.
  • Blogs
    May 17, 2024
    These turbulent times of evolving threats and rising personal responsibility considerations for cybersecurity leaders make the CISO role a challenging but rewarding position. The CISO must contend with an increasing sophistication of attacks, potential geopolitical adversaries and the material impact cybersecurity can have on organisational value. Whether it’s a new CISO or a seasoned…
  • Blogs
    March 8, 2024
    We often hear our clients ask what steps to take to develop a Software as a Service (SaaS) strategy for IT environments. Both the CIO and business owners recognise the benefits of SaaS solutions, which are readily available and often focused on a particular business need. SaaS products are becoming more popular, and usage is expected to grow at a double-digit rate in the coming years, driven by…
  • Blogs
    June 19, 2023
    Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed.
  • Blogs
    June 30, 2023
    This blog post was authored by Justin Turner - Director, Security and Privacy on the technology insights blog. Anyone who has spent a significant amount of time in any U.S. state where college football is popular, has likely seen a “house divided” bumper sticker or license plate cover, with contrasting university logos. Many of us (and our friends and families) enjoy spirited rivalries (Roll…
  • Blogs
    April 26, 2024
    The role of a cyber incident responder is more critical than ever as these professionals are tasked with protecting organisations from cyber threats, mitigating risks and minimising the impact of security incidents. As cyber threats continue to proliferate, targeting organisations of all sizes and sectors, it is imperative for cyber incident response (CIR) teams to be well prepared at mitigating…
  • Blogs
    February 23, 2024
    In today’s interconnected world, where adversaries seem to always be one step ahead, companies face an increasingly complex threat landscape. One of the most challenging and often overlooked threats is the dark web, an intentionally hidden part of the internet where threat actors can operate with a greater sense of anonymity. To adequately protect assets, companies need to do more than merely…
  • Newsletter
    January 10, 2024
    Conducted in partnership with the NC State ERM Initiative, our global survey of C-level executives and directors highlights the influence of economic headwinds, talent issues, emerging technologies, cyber threats and geopolitical events on the 2024 risk landscape. This issue of Board Perspectives discusses the 10 highest-rated risk themes noted in the survey to provide a context for understanding…
  • Blogs
    May 17, 2024
    An SAP S/4HANA transformation project has many risks that need to be managed and often, it is difficult for the project team operating day to day on detailed tasks to “see the forest for the trees.” The PMO has intimate knowledge of the key processes and risks associated with the project and, as such, is in an ideal position to develop mitigation strategies in collaboration with the system…
Loading...