article thumbnail

Digital transformation’s fundamental change management mistake

CIO Business Intelligence

Ask CIOs about their biggest digital transformation challenges, and they’re likely to cite people issues or what experts identify as gaps in change management practices. When CIOs can’t drive change, new digital products and technology capabilities can become shelfware, and the business value is delayed or diminished.

article thumbnail

Ringing down the curtain on change management theater

Forrester IT

Change Management is a hot topic lately on my social media channels. Like my friend Jon Hall , I also am a long time veteran of the classic Change Advisory Board (CAB) process. This was the topic of my most recent research, " Change Management: Let's Get Back to Basics. " ITIL service management.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Elevating Cyber Awareness: A Strategic Approach

Information Week

Executives should view security programs as change management initiatives, emphasizing vision for employee engagement.

article thumbnail

What is root cause analysis? A proactive approach to change management

CIO Business Intelligence

RCA is typically part of service management methodologies and frameworks, such as ITIL , TQM , and Kanban , that focus on continuous process improvement. This type of analysis can help identify flaws in IT processes, potential security breaches, and faults in business processes.

article thumbnail

Elevating Cyber Awareness: A Strategic Approach

Information Week

Executives should view security programs as change management initiatives, emphasizing vision for employee engagement.

article thumbnail

Firemon: The Proactive Security Intelligence Platform

CTOvision

Firemon has been a leader in security management technology for over a decade. Their security manager 8.0 monitors and validates compliance throughout your network, cleans up hidden, unused and outdated rules, and manages policy changes in real time.

Security 150
article thumbnail

CYBER SECURITY TRANSFORMATION IS A THING, AND IT NEEDS PERSONAL AND RELENTLESS DRIVE

Forrester IT

Cyber security transformation of course! I have also engaged peer CISOs doing terrific work transforming their firms’ security function and capabilities – I’ve always had […]. My first Forrester report was published this week. Forrester clients can access here). It’s what I have lived and breathed for the last 3.5

Security 215