2016 and 2017 have seen a virtual tsunami of compliance failures involving some of our largest companies. From Mitsubishi to VW, from ANZ to Target, almost weekly there have been media reports about some company employees having run amok – unbeknownst to their executives and boards. People are asking: “What happened to the compliance management systems that are supposed to monitor and prevent such abuses?” Executives and boards are naturally starting to question the entire compliance management function. Continue reading
Category Archives: Technology@Risk® – Howard M. Wiener
#169 – BALDRIGE CYBERSECURITY AWARD IS COMING – GREG HUTCHINS
Featured
We are all familiar with the Malcolm Baldrige National Quality Award (MBNQA). Now simply known as the Baldrige Award – the Performance Excellence Award.
Well, a new award is coming – The Baldrige Cybersecurity award may be out in a year or so.
Why? Well, information and data is where value is more commonly found. The information may be organizational, personal, or intellectual property. This information is hugely valuable and is commonly digitized. The information has to be protected through cybersecurity. Continue reading
#147 – ICT FASHION VICTIMHOOD – HOWARD WEINER
Featured
When I think of the term ‘Fashion Victim’ these two shots from Brazil (one of my favorite movies of all time) come to mind:
There seems to be no length to which some of us will not go to prove that we are on top of the latest and greatest trends. Katherine Helmond’s character in the film, above, is a case in point. Over the course of the film she sports ridiculous clothing and submits herself to intrusive, painful and ultimately destructive medical procedures, all for the sake of fashion. By the end of the film she has virtually destroyed herself. Continue reading
#135 – STRUCTURING ICT MANAGEMENT TO ALIGN IT WITH THE ENTERPRISE – PART IV PRINCIPLES OF ENTERPRISE ICT ALIGNMENT – HOWARD WIENER
Featured
In the previous posts in this series, we covered:
- Part I: models of the enterprise and ICT and the need to rationalize the two in order to manage both properly.
- Part II: a four-level enterprise model consisting of strategy, business model, operating model and operational architecture; the need for and value of creating and maintaining the as-is model.
- Part III: the as-is model and its role in the existing EA, planning for transformation and ensuring that the enterprise is equally capable of evaluating changes emanating outside-in and inside-out.
#132 – STRUCTURING ICT MANAGEMENT TO ALIGN IT WITH THE ENTERPRISE: PART 3 CHARTING TO BE – HOWARD M. WIENER
Featured
In previous posts (Part 2) , I defined a simple hierarchy for portraying the Enterprise and made a case for the importance of understanding and documenting the as-is Enterprise Architecture to a reasonable level of detail.