Quebec's Law 25 mandates a rigorous policy on corporate governance practices regarding the protection of personal information. In this context, the LightBeam tool…
In today's business world, information technology (IT) is no longer a convenience but a strategic necessity. Yet, many CEOs hesitate to hire a…
The Canadian government has recently adopted amendments to the Canadian Business Corporations Act (CBCA) that require companies to disclose information on environmental, social,…
This article summarizes some key success factors for a successful digital transformation. These topics will be dynamically explored during a master class at…
A Cyber Risk control approach based on a financial control model As part of the launch of the new version of our CyberRisk…
The “Identify” function of cybersecurity Our CISO 360 Cyber Risk Control intervention and diagnosis plan covers a series of controls allowing organizations of…
The “Protect” function of cybersecurity Our CISO-360 CyberRisk Control intervention and diagnosis plan enables organizational managers to take control of cybersecurity risk management.…
The “Detect” function of cybersecurity In previous articles in our cybersecurity for managers folder, we have discussed the "identify" and "protect" functions. This…
The "Response" function in cybersecurity Our previous articles discussed the importance of implementing healthy cyber hygiene governance as a crucial aspect of our…
The “Recover” function of cybersecurity This is the last article related to our CyberRisk Control CISO-360 intervention and diagnosis plan. What to do…
"The executive role of cybersecurity is important for any type of organization. There are cost-effective solutions to ensure good governance of cyber risks…
The IT audit, or IT function diagnostic, is the first phase of the CIO-360 that leads you to an IT master plan. In…
In a world that is increasingly digital, business continuity in case of disaster has become a crucial issue for companies.This article briefly presents…
This article is a follow up to the previous article “The IT audit, a good investment”, in which we can learn about the…
A process architecture is something quite specific that will evolve over time. It is a hierarchical model of an organization's business processes. Typically…
The importance of guided demonstration scenarios Guided demonstration scenarios are an essential tool for effectively evaluating a software solution. By requesting a software…
Project management is increasingly vital to the success of a business. Many organizations have implemented a project management office (PMO) to support the…
Three-Step ApproachThere are countless Integrated Software Solutions (ISS) available in the market, encompassing solutions like ERP (Enterprise Resources Planning), PLM (Product Life Management),…
When an organization decides to embark on its digital transformation, the combination of the Internet of Things and artificial intelligence can create significant…
It is useful to be able to classify the business capabilities of an organization. This makes it possible to prioritize digital transformation initiatives…
Business capabilities are a fundamental element that enables and supports digital transformation initiatives. Companies that excel in mapping their existing capabilities and creating…
The acceleration of digital transformations in organizations makes it imperative that the first 100 days of a CIO (Chief Information Officer, or VP…
L'accélération des transformations numériques dans les organisations rend impératif que les 100 premiers jours du CIO (Chief Information Officer, ou VP des Technologies…
Is it possible to transform your organization into an agile enterprise where business and IT are aligned? Yes! with the right objectives and…