Transforming A Business The Data Driven Way

Caroline Carruthers and Peter Jackson who are authors of Data Driven Business Transformation have now published the Chief Data Officer’s Playbook, a manual for newly-appointed data leaders who have joined companies that are planning to or have recently started on a journey of data transformation.
 
Their earlier book, Data Driven Business Transformation, illustrates how to find the secrets to fast adaptation and disruptive origination hidden in your data and how to use them to capture market share.
 
Digitalisation - or the Digital Revolution - was the first step in an evolving process of analysis and improvement in the operations and administration of commerce.  Carruthers and Jackson, two global leaders in data transformation and education, pick up the conversation here at the next evolutionary step where data from these digital systems generates value, and really use data science to produce tangible results
 
Now the new and rapidly expanding role of the Chief Data Officer (CDO) is of significant interest and relevance to
organisations and data professionals internationally. And so Chief Data Officer’s Playbook is written by two practicing CDOs, and this new book offers a jargon-free, practical guide to making better decisions based on data. 
 
Content covered includes:
 
  • why does any organisation need a CDO?
  • the secret ingredients of the successful CDO
  • avoiding the hype cycle
  • building the CDO team
  • who leads the technology?
  • the CDO and data governance: enablement not red tape.
This book will offer key insight for CDOs looking to understand their position better, for aspiring CDOs and data officers looking at career progression, for those recruiting CDOs, and offers essential knowledge for anyone else operating in the current data environment.
 
They have also launch the book in parts and the latest instalment, Data Driven Business Transformation-How to disrupt, innovate and stay ahead of the competition, is out now. One is to use data properly and responsibly. Another is that a data driven business transformation is not the same as a digital-driven or a digital transformation and this book is making the case for the former.
 
“You should have a data enabled organisation with ethics and governance built in,” they write.
 
This book also has tools for the implementation of such a transformation, but there are levels to it. A low level transformation is the transformation of a single business process, enabled by data. Companies that have a higher level of data maturity can go through a data-driven business transformation which transforms the whole organisation but reaches an end state.
 
The top tier transformation, that can only be attempted by the most data mature organisations, is a total data driven business transformation with the end goal of continuous improvement. Carruthers and Jackson named this type of transformation ‘D3’.
 
They wrote: “A shift to this level of transformation will be seismic and fundamental but will set up an organisation to succeed and continue to succeed as markets, competitors, opportunities and challenges develop and continue to emerge, both internally and externally.”
 
A D3 approach encompasses changes to people, processes and technology and is all about taking an incremental approach to testing and iterating to make cumulative gains.
 
The chapters explain the steps to be taken and are illustrated by sharp diagrams and boxes of questions and diagrams that enable to reader to assess their company’s readiness in terms of factors such as the starting place, tools and method.
To enable a data driven business transformation, at any level, the authors stated that seven elements underpin that transformation and should be used as a constant guide. 
  • The first element is dynamic and continuous change with an ever-evolving end state and vision. 
  • The second element is a cultural shift towards data and how it is used that will support more agile methodologies.
  • Leadership is the third element. 
  • The fourth is a change of focus to ‘data’ from ‘technology’ and ‘digital’. The fifth element is a mindset to succeed and the recruitment of people with the right skills to achieve that success. 
  • The penultimate element is organisation-wide understanding of the maturity starting point before the transformation begins. And the final element is people.
They wrote “… people… are the powerhouse of creativity that will mobilise the data, keep it safe and ensure it is used ethically.”  They added: “We need to make sure we humanise the data transformation.”
 
The conclusion recaps the previous chapters and includes many peppy phrases that would encourage a data professional to go forth and get on the road to a data driven transformation.
 
"Data is there to be used, don’t ignore it. Become data cheerleaders like us and create a future where we leverage the real power of data.”
 
Essentially, they have laid out methods and processes to move forward and transform in a data driven way.
 
DataIQ:        FacetPublishing:     Book Depository:
 
You Might Also Read: 
 
Digital Shock: Special Report (£):
 
Big-Data Analytics Risks Becoming Jammed:
 
 
« The Global Cyber Skills & Training Shortage
Cyber Security: A Guide For Education Providers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Indemnity Solutions (CIS)

Cyber Indemnity Solutions (CIS)

CIS is an InsurTech company focused on licensing innovative cyber risk insurance solutions to the global insurance industry.

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

Cologix

Cologix

Cologix provides reliable, secure, scalable data center and interconnection solutions from 24 prime interconnection locations across 9 strategic North American edge markets.

Rewertz

Rewertz

Rewterz is a cyber security company based out of Dubai, serving customers in UAE, Oman, Qatar, Bahrain, Saudi Arabia, and Pakistan.

Future of Cyber Security Europe

Future of Cyber Security Europe

Future of Cyber Security Europe is a European wide event examining the latest cyber security strategies and technologies.

Infortec

Infortec

Infortec provide consultancy and solutions for the protection of digital information and the management of computer resources.

Danish Maritime Cybersecurity Unit

Danish Maritime Cybersecurity Unit

The Danish Maritime Cybersecurity Unit is tasked with delivering the initiatives set out in the Cyber and Information Security Strategy for the Maritime Sector.

Intercast Global

Intercast Global

Intercast's mission is to be a strategic resource to our clients in Risk Reduction. We are a global leader in cyber security staffing and consulting to the enterprise.

TalaTek

TalaTek

TalaTek is a full-service risk management firm providing expert services in risk management, cybersecurity, and compliance.

Privakey

Privakey

Transaction Intent Verification. Privakey delivers a secure channel to streamline high risk transactions, enabling digital trust between services and their users.

Quintillion Consulting

Quintillion Consulting

Quintillion Consulting is a strategic risk based consulting firm. We help companies safeguard the core business and IT capabilities that deliver competitive advantage.

Descope

Descope

Descope is a service that helps every developer build secure, frictionless authentication and user journeys for any application.

CUBE3 AI

CUBE3 AI

CUBE3.AI is a web3 security platform that provides real-time transaction protection for smart contracts, safeguarding against cyber exploits, fraud, and compliance risks.

Xeol

Xeol

Software free of vulnerabilities, built and distributed by trusted entities. Our mission is to help customers secure their software from code to deploy.

Digital Security Authority (DSA)

Digital Security Authority (DSA)

The establishment of the Digital Security Authority, which incorporates the National CSIRT, is crucial to significantly raising the cybersecurity posture and capabilities of Cyprus.

FearsOff

FearsOff

FearsOff is a global information security company serving clients worldwide. White hat operators with a black hat mindset to emulate real world attacks and everchanging threat vectors.