Make The Most Of Data Analytics

The right data can help you keep tabs on who's getting promoted, what training programs are producing the strongest leaders and how certain policies are luring foreign workers. 

But learning how to make the most of that data takes skill.

Here are some shortcuts that can help you make better use of data to improve workforce diversity.

1. Don't overdo it: It's easy to pull reams of data from bloated HR systems. But data is useless if it's not carefully poked and prodded for meaningful insights.

"The real bang is once you've extracted data, what are you doing with it?" says Charlie Judy, chief human resources officer at Chicago-based consultancy Baker Tilly Virchow Krause. "How are you interpreting that data, and how will it inform your actions?" What's more, he adds, there's a risk of collecting so much data that you simply don't know where to start.

2. Take action. Don't get caught in the trap of rolling out a data analytics program simply for the sake of gathering data. According to Stacia Garr, vice president of talent and HR research at Bersin by Deloitte, only 10% of organisations actually change, adjust or refresh their diversity strategies based on the data they collect and analyse.

"Even those organisations that are tracking data, they're not necessarily doing anything with it," says Garr.

3. Stay focused. Benchmarks and key performance indicators are valuable metrics for gauging diversity. But getting too caught up in the numbers can make you lose sight of your objectives.

"The thing you have to be careful with is that data analytics doesn't turn into affirmative action, where you're just trying to achieve numbers and quotas," says John Reed, senior executive director of IT staffing firm Robert Half Technology. "What it should be about is identifying the best candidates for the job."

Computerworld

Data Analytics Is Driving IT:

Data Analysis & CRM For 2016 (£):

You Have Big Data, Or Perhaps Just Too Much Data?:

 

 

 

« Russian Hackers using new Viruses for Attacks
Hackers targeted Banks and 100 organisations »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Conix

Conix

Conix offerings include Governance and Risk Management, Auditing and Penetration Testing, Digital Forensics, Managed Security Operations Centre (SOC).

SCIPP International

SCIPP International

SCIPP’s courses are based on internationally recognized best business practices for security awareness, for both technical and non-technical staff and to comply with regulatory mandates.

Idaho National Laboratory (INL)

Idaho National Laboratory (INL)

INL is an applied engineering laboratory dedicated to supporting the US Dept of Energy's missions in energy research, nuclear science and national defense including critical infrastructure protection.

Ingenio Global

Ingenio Global

Ingenio is a specialist recruitment business for SaaS companies. Our purpose is to source exceptional talent in areas including cyber security for leading SaaS companies in the UK and Ireland.

BlackRidge Technology

BlackRidge Technology

BlackRidge Technology develops, markets and supports a family of products that provide a next generation cyber security solution for protecting enterprise networks and cloud services.

White Cloud Security

White Cloud Security

White Cloud is a cloud-based Application Trust-Listing security service that prevents unauthorized programs from running on your computers.

Fusion Risk Management

Fusion Risk Management

Fusion Risk Management focuses on operational resilience encompassing business continuity, risk management, IT risk, and crisis and incident management.

Cyber Insurance Academy

Cyber Insurance Academy

Cyber Insurance Academy was founded to provide insurance professionals with the knowledge needed to work in cyber-insurance and cyber-related insurance fields.

HackNotice

HackNotice

HackNotice Teams is an all-in-one encompassing tool that monitors threats within your organization, different vendors, and third parties whose services you use.

Bright Security

Bright Security

Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively.

Schillings

Schillings

Shillings defends your rights to privacy, reuptation and security. We fight passionately against breaches of your privacy, attacks on your reputation and threats to your security.

Nuance Communications

Nuance Communications

From revolutionizing the doctor-patient relationship to reinventing the way brands connect with their customers, Nuance technology helps organizations push the boundaries of what’s possible.

BreakPoint Labs

BreakPoint Labs

BreakPoint Labs is dedicated to providing the methods and means for sustainable, measurable, and effective cybersecurity operations.

Aim Security

Aim Security

Aim empowers enterprises to unlock the full potential of GenAI technology without compromising security. GenAI makes business better - Aim makes GenAI secure.

Anetac

Anetac

Developed by seasoned cybersecurity experts, the Anetac Identity and Security Platform protects threat surface exploited via service accounts.

DataTrails

DataTrails

DataTrails enables organizations to prove and verify the provenance and authenticity of any data they use in their business operations.