Published 26 Mar 2015
In the world of cyber resilience, barely a week goes by without another company falling victim to cyber-attack – and to the penalties that can arise as a result. In February 2015, the UK Information Commissioner’s Office (ICO) fined insurance broker, Staysure, £175,000 after...
Behaviour|Best Practice|Cyber Resilience|Identity|Threats|Training|Vulnerability
Published 01 Feb 2019
What leadership techniques and understanding of behaviour should project boards and project managers use for organizational transformation? Set the strategic vision Taking the example of AXELOS’ work on updating PRINCE2 ® in 2017 , our vision was focused on the se...
Agile|Behaviour|Change management|Communication|Digital transformation|Leadership|PRINCE2|Project management
Published 09 Dec 2015
The vast majority of cyber-attacks start with either a phishing email and/or a social engineering attack. You might think you know the initial “tell-tale” signs of phishing emails and what to look for if a suspicious email lands in your inbox: Poor spelling Incomplete or...
Published 27 May 2016
One of the vital components of a successful Project and Programme Manager is leadership . Leadership capabilities are a key element of the behavioural competence among such professionals and, indeed, a Project or Programme Manager is someone people should choose to follow....
Behaviour|Capabilities|Leadership|Management|MSP|PRINCE2|Project and Programme Management (PPM)
Published 08 Jun 2016
Dear Mr or Mrs Private Company Director – do you know who you are handing your personal information to and why? For all of you, there is an information security risk when third parties are asking for your personal details. Why? Do you know how securely they will treat your i...
Cyber resilience|Cyber-attack|Data protection|RESILIA|Vulnerability
Published 17 Aug 2016
Why is there an obsession with where a cyber-attack originates? In recent reports about attacks on SWIFT (the global financial messaging service) at various banks, there was speculation that it may have been the work of well-skilled and motivated groups creating malware. T...
Published 05 Jul 2017
How do you start a project using the PRINCE2 ® project management method? Mark Sutton, change manager and trainer, considers the steps: Starting up a project – according to PRINCE2 – is triggered by a mandate : a reason to do something or, in other words, a busin...
PRINCE2|Project management|Project planning|Requirements|Roles|Skills
Published 20 Oct 2017
Organizations can use the introduction of GDPR in May 2018 to learn more about their customers while building customer loyalty and increasing efficiency. According to John McDermott, EMEA Portfolio Manager at Hewlett Packard Enterprise (HPE), the new regulations are a busine...
Behaviour|Customer engagement|Cyber resilience|Data protection|RESILIA|Training
Published 10 Aug 2018
This will be the final post from my time here at Agile 2018 . It’s been a packed week yet in the same breath I only feel like I have scratched the surface of the content on offer. I want to end this little series by sharing a couple of thoughts from the last day, but also de...
Agile|Benefits realization|Customer needs|Project and programme delivery|Project management|Project management office|Value
Published 20 Jul 2016
Okay, I don’t usually quote Shakespeare, but there’s one line that I’ve remembered since I was at school in England. It comes from Othello : “Reputation, reputation, reputation! O, I have lost my reputation! I have lost the immortal part of myself.” All the publicity aro...
Cyber resilience|Cyber-attack|Identity|IT services|RESILIA|Vulnerability