Blockchain and the Don Quixote de La Mancha Syndrome

Defining the Blockchain Problem Blockchain is the technology leading the next round of business disruption. It provides a decentralized, trusted-chain of evidence, meaning the integrity of the data stored is essentially incorruptible. In fact, in many cases, blockchain provides the…
Read More

Cybersecurity Skills for Top Performance: Beyond Technical Skills

As the number of interconnected digital devices grows exponentially, and since computer infrastructure has come to underlie almost every organizational, business, and government function, the complexity of maintaining cybersecurity in all corners of society has become staggering. Protecting digital data…
Read More

Failure to Phoenix: 7 Lessons to Learn from Failure

In Greek mythology, the phoenix lives a long life, exits spectacularly in flames, and then rises from the ashes of seemingly permanent death to live and flourish again. All organizations experience a similar cycle – if they’re lucky. What makes…
Read More

Rebels at the Front Gate!

Engage your stakeholders and make them own the solution all the way Designing solutions for complex organizational problems requires a methodical approach; proven frameworks and methodologies; and committed stakeholders. Whether these stakeholders are participants, enthusiastic team members, or key decision-makers,…
Read More

Shadow I.T. Is Not A Technical Problem

Social and communication skills are crucial to engage stakeholders, convey technical information, and motivate them to comply with corporate policies. Technical leadership keeps failing to tame “shadow I.T.” We firmly believe that the problem’s solution is erroneously conceived. Shadow I.T.…
Read More

CISOs: Leave the Jargon Out to Bridge the Cybersecurity Communications Gap

There’s a serious gap in communication skills between cybersecurity pros and their general audiences, and it’s essential for Chief Information Security Officers (CISO) and their teams to bridge it. Increasingly complex security threats demand that cybersecurity professionals use plain language with those…
Read More