Transforming A Business The Data Driven Way

Caroline Carruthers and Peter Jackson who are authors of Data Driven Business Transformation have now published the Chief Data Officer’s Playbook, a manual for newly-appointed data leaders who have joined companies that are planning to or have recently started on a journey of data transformation.
 
Their earlier book, Data Driven Business Transformation, illustrates how to find the secrets to fast adaptation and disruptive origination hidden in your data and how to use them to capture market share.
 
Digitalisation - or the Digital Revolution - was the first step in an evolving process of analysis and improvement in the operations and administration of commerce.  Carruthers and Jackson, two global leaders in data transformation and education, pick up the conversation here at the next evolutionary step where data from these digital systems generates value, and really use data science to produce tangible results
 
Now the new and rapidly expanding role of the Chief Data Officer (CDO) is of significant interest and relevance to
organisations and data professionals internationally. And so Chief Data Officer’s Playbook is written by two practicing CDOs, and this new book offers a jargon-free, practical guide to making better decisions based on data. 
 
Content covered includes:
 
  • why does any organisation need a CDO?
  • the secret ingredients of the successful CDO
  • avoiding the hype cycle
  • building the CDO team
  • who leads the technology?
  • the CDO and data governance: enablement not red tape.
This book will offer key insight for CDOs looking to understand their position better, for aspiring CDOs and data officers looking at career progression, for those recruiting CDOs, and offers essential knowledge for anyone else operating in the current data environment.
 
They have also launch the book in parts and the latest instalment, Data Driven Business Transformation-How to disrupt, innovate and stay ahead of the competition, is out now. One is to use data properly and responsibly. Another is that a data driven business transformation is not the same as a digital-driven or a digital transformation and this book is making the case for the former.
 
“You should have a data enabled organisation with ethics and governance built in,” they write.
 
This book also has tools for the implementation of such a transformation, but there are levels to it. A low level transformation is the transformation of a single business process, enabled by data. Companies that have a higher level of data maturity can go through a data-driven business transformation which transforms the whole organisation but reaches an end state.
 
The top tier transformation, that can only be attempted by the most data mature organisations, is a total data driven business transformation with the end goal of continuous improvement. Carruthers and Jackson named this type of transformation ‘D3’.
 
They wrote: “A shift to this level of transformation will be seismic and fundamental but will set up an organisation to succeed and continue to succeed as markets, competitors, opportunities and challenges develop and continue to emerge, both internally and externally.”
 
A D3 approach encompasses changes to people, processes and technology and is all about taking an incremental approach to testing and iterating to make cumulative gains.
 
The chapters explain the steps to be taken and are illustrated by sharp diagrams and boxes of questions and diagrams that enable to reader to assess their company’s readiness in terms of factors such as the starting place, tools and method.
To enable a data driven business transformation, at any level, the authors stated that seven elements underpin that transformation and should be used as a constant guide. 
  • The first element is dynamic and continuous change with an ever-evolving end state and vision. 
  • The second element is a cultural shift towards data and how it is used that will support more agile methodologies.
  • Leadership is the third element. 
  • The fourth is a change of focus to ‘data’ from ‘technology’ and ‘digital’. The fifth element is a mindset to succeed and the recruitment of people with the right skills to achieve that success. 
  • The penultimate element is organisation-wide understanding of the maturity starting point before the transformation begins. And the final element is people.
They wrote “… people… are the powerhouse of creativity that will mobilise the data, keep it safe and ensure it is used ethically.”  They added: “We need to make sure we humanise the data transformation.”
 
The conclusion recaps the previous chapters and includes many peppy phrases that would encourage a data professional to go forth and get on the road to a data driven transformation.
 
"Data is there to be used, don’t ignore it. Become data cheerleaders like us and create a future where we leverage the real power of data.”
 
Essentially, they have laid out methods and processes to move forward and transform in a data driven way.
 
DataIQ:        FacetPublishing:     Book Depository:
 
You Might Also Read: 
 
Digital Shock: Special Report (£):
 
Big-Data Analytics Risks Becoming Jammed:
 
 
« The Global Cyber Skills & Training Shortage
Cyber Security: A Guide For Education Providers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Spirion

Spirion

Spirion offers data discovery, classification, and protection tools for your business's privacy, security, and compliance program to avoid gaps and risks.

Potomac Institute for Policy Studies

Potomac Institute for Policy Studies

Potomac Institute undertakes research on key science, technology, and national security issues facing society, Study areas include cybersecurity.

Flexera

Flexera

Flexera is reimagining the way software is bought, sold, managed and secured.

Penta Security

Penta Security

Founded on its data encryption technology, Penta Security is a leading provider of web and data security products, solutions and services.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

Romanian Association for Information Security Assurance (RAISA)

Romanian Association for Information Security Assurance (RAISA)

RAISA promotes and supports information security activities and creates a community for the exchange of knowledge between specialists, academic and corporate environment in Romania.

Berwick Partners

Berwick Partners

Berwick Partners’ Cyber Security Practice is a leading recruiter of senior management positions in this field; we have an exceptional understanding of the constantly changing Cyber landscape.

Learning Tree International

Learning Tree International

Learning Tree's comprehensive cyber security training curriculum includes specialised IT security training and general cyber security courses for all levels of your organisation including the C-suite.

Relyum

Relyum

Relyum provides innovative solutions for networking, synchronization and cybersecurity in critical systems.

HSB

HSB

HSB offers insurance for equipment breakdown, cyber risk, data breach, identity recovery & employment practices liability.

Cyber Risk Aware

Cyber Risk Aware

Cyber Risk Aware provide a security awareness and phishing simulation platform that focuses on real threats and educates and empowers employees to be the first line of defence.

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

SEEDS conducts research and develops innovative cybersecurity technologies, tools, and methodologies that advance the energy sector’s ability to survive cyber incidents.

Lattice Semiconductor

Lattice Semiconductor

Lattice Semiconductor solves customer problems across the network, from the Edge to the Cloud, in the growing communications, computing, industrial, automotive and consumer markets.

Cyware

Cyware

Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally.

Oasis Technology

Oasis Technology

Oasis Technology are experts in cyber security. In addition to pioneering the game-changing TITAN anti-hacking device, we provide extensive cyber security consulting services.

Boldend

Boldend

Boldend offers leading-edge offensive and defensive cybersecurity solutions that empower government and commercial organizations to stay resilient in an evolving threat landscape.