Transforming A Business The Data Driven Way

Caroline Carruthers and Peter Jackson who are authors of Data Driven Business Transformation have now published the Chief Data Officer’s Playbook, a manual for newly-appointed data leaders who have joined companies that are planning to or have recently started on a journey of data transformation.
 
Their earlier book, Data Driven Business Transformation, illustrates how to find the secrets to fast adaptation and disruptive origination hidden in your data and how to use them to capture market share.
 
Digitalisation - or the Digital Revolution - was the first step in an evolving process of analysis and improvement in the operations and administration of commerce.  Carruthers and Jackson, two global leaders in data transformation and education, pick up the conversation here at the next evolutionary step where data from these digital systems generates value, and really use data science to produce tangible results
 
Now the new and rapidly expanding role of the Chief Data Officer (CDO) is of significant interest and relevance to
organisations and data professionals internationally. And so Chief Data Officer’s Playbook is written by two practicing CDOs, and this new book offers a jargon-free, practical guide to making better decisions based on data. 
 
Content covered includes:
 
  • why does any organisation need a CDO?
  • the secret ingredients of the successful CDO
  • avoiding the hype cycle
  • building the CDO team
  • who leads the technology?
  • the CDO and data governance: enablement not red tape.
This book will offer key insight for CDOs looking to understand their position better, for aspiring CDOs and data officers looking at career progression, for those recruiting CDOs, and offers essential knowledge for anyone else operating in the current data environment.
 
They have also launch the book in parts and the latest instalment, Data Driven Business Transformation-How to disrupt, innovate and stay ahead of the competition, is out now. One is to use data properly and responsibly. Another is that a data driven business transformation is not the same as a digital-driven or a digital transformation and this book is making the case for the former.
 
“You should have a data enabled organisation with ethics and governance built in,” they write.
 
This book also has tools for the implementation of such a transformation, but there are levels to it. A low level transformation is the transformation of a single business process, enabled by data. Companies that have a higher level of data maturity can go through a data-driven business transformation which transforms the whole organisation but reaches an end state.
 
The top tier transformation, that can only be attempted by the most data mature organisations, is a total data driven business transformation with the end goal of continuous improvement. Carruthers and Jackson named this type of transformation ‘D3’.
 
They wrote: “A shift to this level of transformation will be seismic and fundamental but will set up an organisation to succeed and continue to succeed as markets, competitors, opportunities and challenges develop and continue to emerge, both internally and externally.”
 
A D3 approach encompasses changes to people, processes and technology and is all about taking an incremental approach to testing and iterating to make cumulative gains.
 
The chapters explain the steps to be taken and are illustrated by sharp diagrams and boxes of questions and diagrams that enable to reader to assess their company’s readiness in terms of factors such as the starting place, tools and method.
To enable a data driven business transformation, at any level, the authors stated that seven elements underpin that transformation and should be used as a constant guide. 
  • The first element is dynamic and continuous change with an ever-evolving end state and vision. 
  • The second element is a cultural shift towards data and how it is used that will support more agile methodologies.
  • Leadership is the third element. 
  • The fourth is a change of focus to ‘data’ from ‘technology’ and ‘digital’. The fifth element is a mindset to succeed and the recruitment of people with the right skills to achieve that success. 
  • The penultimate element is organisation-wide understanding of the maturity starting point before the transformation begins. And the final element is people.
They wrote “… people… are the powerhouse of creativity that will mobilise the data, keep it safe and ensure it is used ethically.”  They added: “We need to make sure we humanise the data transformation.”
 
The conclusion recaps the previous chapters and includes many peppy phrases that would encourage a data professional to go forth and get on the road to a data driven transformation.
 
"Data is there to be used, don’t ignore it. Become data cheerleaders like us and create a future where we leverage the real power of data.”
 
Essentially, they have laid out methods and processes to move forward and transform in a data driven way.
 
DataIQ:        FacetPublishing:     Book Depository:
 
You Might Also Read: 
 
Digital Shock: Special Report (£):
 
Big-Data Analytics Risks Becoming Jammed:
 
 
« The Global Cyber Skills & Training Shortage
Cyber Security: A Guide For Education Providers »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Radware

Radware

Radware is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers.

Bricata

Bricata

Bricata offers industry-leading IPS solutions for enterprise-wide threat prevention and unparalleled situational awareness.

Mastercard

Mastercard

MasterCard is a leading global payments solutions company that serves consumers and businesses in over 210 countries and territories worldwide.

Pentagon Group

Pentagon Group

Pentagon Group is a provider of security services in high-risk environments, remote areas and emerging markets in support of land-based, aviation, maritime and cyber operations.

LATRO Services

LATRO Services

LATRO Services is a complete solution provider to discover, locate, and eliminate telecom fraud.

Eaton

Eaton

Eaton provides comprehensive cybersecurity services for operational technology (OT) to help keep your operations and personnel safe.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

Jit

Jit

Jit empowers developers to own security for the product they are building from day zero.

Cybernatics

Cybernatics

Cybernatics is inspired by bringing together best-in-class innovations around Cybersecurity and Analytics. We offer tailored enterprise solutions to safeguard your organisations best interests.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

ThreatER

ThreatER

ThreateER (formerly ThreatBlockr / Bandura Cyber) is a cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.

Cyber Industrial Networks

Cyber Industrial Networks

Cyber Industrial Networks objective is to service the needs of industry in achieving reliable, robust and secure infrastructure that supports productivity.

Sasken Technologies

Sasken Technologies

Sasken’s Cybersecurity Services enables enterprises to develop, maintain, and take digital products to the market with security postures that empower operational excellence.

Supersecure

Supersecure

Supersecure is a Managed Security Service Provider (MSSP) offering a wide range of information security solutions.

iolite Secure

iolite Secure

iolite secures our nation’s infrastructure and critical assets through cyber threat detection, response, and mitigation.