Transforming A Business The Data Driven Way

Caroline Carruthers and Peter Jackson who are authors of Data Driven Business Transformation have now published the Chief Data Officer’s Playbook, a manual for newly-appointed data leaders who have joined companies that are planning to or have recently started on a journey of data transformation.
 
Their earlier book, Data Driven Business Transformation, illustrates how to find the secrets to fast adaptation and disruptive origination hidden in your data and how to use them to capture market share.
 
Digitalisation - or the Digital Revolution - was the first step in an evolving process of analysis and improvement in the operations and administration of commerce.  Carruthers and Jackson, two global leaders in data transformation and education, pick up the conversation here at the next evolutionary step where data from these digital systems generates value, and really use data science to produce tangible results
 
Now the new and rapidly expanding role of the Chief Data Officer (CDO) is of significant interest and relevance to
organisations and data professionals internationally. And so Chief Data Officer’s Playbook is written by two practicing CDOs, and this new book offers a jargon-free, practical guide to making better decisions based on data. 
 
Content covered includes:
 
  • why does any organisation need a CDO?
  • the secret ingredients of the successful CDO
  • avoiding the hype cycle
  • building the CDO team
  • who leads the technology?
  • the CDO and data governance: enablement not red tape.
This book will offer key insight for CDOs looking to understand their position better, for aspiring CDOs and data officers looking at career progression, for those recruiting CDOs, and offers essential knowledge for anyone else operating in the current data environment.
 
They have also launch the book in parts and the latest instalment, Data Driven Business Transformation-How to disrupt, innovate and stay ahead of the competition, is out now. One is to use data properly and responsibly. Another is that a data driven business transformation is not the same as a digital-driven or a digital transformation and this book is making the case for the former.
 
“You should have a data enabled organisation with ethics and governance built in,” they write.
 
This book also has tools for the implementation of such a transformation, but there are levels to it. A low level transformation is the transformation of a single business process, enabled by data. Companies that have a higher level of data maturity can go through a data-driven business transformation which transforms the whole organisation but reaches an end state.
 
The top tier transformation, that can only be attempted by the most data mature organisations, is a total data driven business transformation with the end goal of continuous improvement. Carruthers and Jackson named this type of transformation ‘D3’.
 
They wrote: “A shift to this level of transformation will be seismic and fundamental but will set up an organisation to succeed and continue to succeed as markets, competitors, opportunities and challenges develop and continue to emerge, both internally and externally.”
 
A D3 approach encompasses changes to people, processes and technology and is all about taking an incremental approach to testing and iterating to make cumulative gains.
 
The chapters explain the steps to be taken and are illustrated by sharp diagrams and boxes of questions and diagrams that enable to reader to assess their company’s readiness in terms of factors such as the starting place, tools and method.
To enable a data driven business transformation, at any level, the authors stated that seven elements underpin that transformation and should be used as a constant guide. 
  • The first element is dynamic and continuous change with an ever-evolving end state and vision. 
  • The second element is a cultural shift towards data and how it is used that will support more agile methodologies.
  • Leadership is the third element. 
  • The fourth is a change of focus to ‘data’ from ‘technology’ and ‘digital’. The fifth element is a mindset to succeed and the recruitment of people with the right skills to achieve that success. 
  • The penultimate element is organisation-wide understanding of the maturity starting point before the transformation begins. And the final element is people.
They wrote “… people… are the powerhouse of creativity that will mobilise the data, keep it safe and ensure it is used ethically.”  They added: “We need to make sure we humanise the data transformation.”
 
The conclusion recaps the previous chapters and includes many peppy phrases that would encourage a data professional to go forth and get on the road to a data driven transformation.
 
"Data is there to be used, don’t ignore it. Become data cheerleaders like us and create a future where we leverage the real power of data.”
 
Essentially, they have laid out methods and processes to move forward and transform in a data driven way.
 
DataIQ:        FacetPublishing:     Book Depository:
 
You Might Also Read: 
 
Digital Shock: Special Report (£):
 
Big-Data Analytics Risks Becoming Jammed:
 
 
« The Global Cyber Skills & Training Shortage
Cyber Security: A Guide For Education Providers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

e2e-assure

e2e-assure

e2e Protective Monitoring and Security Operations Centre (SOC) Service is a complete cyber defence service to protect your critical assets from cyber attacks and GDPR breaches.

United Security Providers

United Security Providers

United Security Providers is a leading specialist in information security, protecting IT infrastructures and applications for companies with high demands on security.

Shinobi Cyber

Shinobi Cyber

Shinobi Defense System is an integrated security system that absolutely secures information with smart, automatic encryption and protects your endpoints by stopping any unauthorized actions.

Travelers

Travelers

Travelers is a leading writer of US commercial property casualty insurance and one of the world’s largest global insurers for cyber insurance.

Risk Ident

Risk Ident

RISK IDENT specializes in supporting enterprises in identifying and preventing criminal activity like payment fraud, account takeovers and identity theft.

The Citadel Department of Defense Cyber Institute (CDCI)

The Citadel Department of Defense Cyber Institute (CDCI)

CDCI is established to address the critical national security needed for a skilled cybersecurity workforce.

TechBase

TechBase

TechBase is an innovation and start-up center offering technology-oriented start-ups optimal conditions for successful business development.

Cyral

Cyral

Easily observe, control, and protect your data endpoints in a cloud and DevOps-first world. Discover Data Mesh Security with Cyral.

Truvantis

Truvantis

Truvantis is a cybersecurity consulting organization providing best-in-class cybersecurity services to secure your organization’s infrastructure, data, operations and products.

BastionZero

BastionZero

BastionZero is leveraging cryptography to reimagine the tools used to manage remote access to servers, containers, clusters, applications and databases across cloud and on-prem environments.

Fibernet

Fibernet

Fibernet's innovative solutions in the fields of cybersecurity and fiber optics range from telecommunications infrastructure to small business cybersecurity.

GoPro Consultants

GoPro Consultants

GoPro Consultants is an IT Consultancy and IT Managed services provider Globally with immeasurable expertise of IT professionals in Hardware/Support & Consultancy and Project Planning.

Red Helix

Red Helix

Red Helix (formerly Phoenix Datacom) is a market leader in network performance and cyber security.

Vault Cloud

Vault Cloud

Vault Cloud, Australia's National Cloud, is an Australian owned and operated company specialising in secure, sovereign, hyperscale cloud infrastructure.

SysGroup

SysGroup

SysGroup is an award-winning managed IT services, cloud hosting, and IT consultancy provider.