High-Impact IT Leader – Succeed as CIO/CTO/IT Director 2021!
Price: $109.99
Do you want to become a better IT leader?
This course is designed for those already in, or aspire to be, a CIO/CTO/IT Director or other C-level IT role. Unlike the masses of other leadership courses out there, this course is specifically for those working in the technology space.
The unique course will provide you with a broad set of knowledge and insights that will be well worth your time and the modest course fee.
Develop a LEADERSHIP MINDSET
-
Role of Today’s IT leader
-
The 3 CIO Archetypes
-
Deloitte’s 3 CIO Patterns
-
Friend of the CEO
-
Some Questions for Today’s IT Leaders
-
Four Priorities of an IT Leader
-
Rate Yourself as a Leader
-
Egon Zehnder – 9 Core CIO Competencies
-
6 Hats of an IT Leader
-
Impact of IT Leaders
Re-imagine the BUSINESS STRATEGY
-
Declining Fortunes
-
Former Industry Leaders
-
Marketing Myopia
-
Re-imagining the Business
-
Vision Cone
-
Examples of Strategic Vision
-
Tesla – Vision to Strategy
-
Strategy to Competitive Advantage
-
PESTEL Analysis
-
Re-inventing the New York Times
-
BEST Analysis
-
Best Analysis for ALDI, Hamleys and Disney
-
Executable Strategy
-
1-Page Strategy – Business Model Canvas
Formulate the IT STRATEGY
-
What is IT Strategy?
-
Example – Changi Airport Terminal 4 (T4)
-
Unlocking IT Value
-
Strategic IT Grid
-
Examples – Under Armour and Arcelor Mittal
-
Impact of Poor vs. Good IT Strategy
-
“Jump on the Bandwagon” Mentality
-
Gartner Hype Cycle
-
Does IT matter?
-
1-Page IT Strategy – the IT Pyramid
-
Example – IT Pyramid for NTU
-
Gartner’s IT Strategy
-
Example – BBC Technology Strategy and Roadmap
-
Business-IT Alignment and IT-IT Alignment
-
UK Government’s Failed NHS Project
-
IT Vision
-
IT Roadmap and IT Portfolio
-
Prioritising Project Investments
-
Top Tips on Creating an IT Roadmap
-
Pitfalls in IT Strategy
Architect AGILE IT PLATFORMS
-
Importance of IT Architecture
-
Good vs. Bad Architecture
-
Architecture Complexities
-
Spaghetti Architecture
-
Needs of Retail Banking
-
Business Agility is the New Mantra
-
Qualities of an IT Architecture
-
Multi-application Architectures
-
KISS Principle
-
Gartner’s Core Architecture Principles (for digital business)
-
Application Programme Interface (APIs)
Build BUSINESS RESILIENCE
-
IT Outages at BA, Amazon, Delta and Microsoft
-
Business Resilience
-
Cost of IT Downtime
-
Business Impact of IT Outage / Degradation
-
MAS Guidelines on Business Continuity Management
-
ISO 22301
-
Key Metrics: MTD+RTO, ADL+RPO
-
5R Business Continuity Timeline
-
Threats and Vulnerabilities
-
A Risk-Based Approach
-
Understanding Risk
-
Risk Assessment Matrix
-
Business Impact Analysis
-
Distributed Operations
-
Importance of Back-ups
-
3-2-1 Backup Strategy
-
Data-Centre Tiers
-
Data Centre Issues and Cause of BA Outage (2017)
-
Disaster Recovery Site
-
Disaster Recovery as a Service (DRaaS)
-
Business Continuity Team
-
Pitfalls in Business Continuity Planning
Deliver PROJECT SUCCESS
-
IT Projects Come In Different Shapes and Sizes
-
The Project Lifecycle
-
Project Success and Trade-offs
-
Four Layers of Impact
-
Writing a Project Proposal
-
4 Dimensions of Project Feasibility
-
Product vs. Project Scope
-
Types of Project Risk
-
Top 5 Causes of Project Failure
-
Requirements as a Major Pain Point
-
Prioritising with Moscow Analysis
-
Project Stakeholders
-
Work Breakdown Structure (WBS)
-
Using a WBS for Project Estimation
-
Project Estimation Methods
-
Shift from Traditional ‘Waterfall’ to Agile Project Lifecycle
-
Traditional vs Agile Approach
Stay safe and CYBER SECURE
-
Data Breaches at SingHealth, Equifax and Razer
-
IBM’s Cost of Data Breach Study (2019)
-
Information Assurance
-
Data Privacy
-
General Data Protection Regulation (GDPR)
-
EY Top 10 Cybersecurity Threats (2018-19)
-
Cybersecurity Threat Landscape
-
Malware
-
Malware examples – WannaCry, GigaLocker and WhatsApp
-
Keyloggers
-
IOT Issues – HomeCams, Smart Devices and Car Hacking
-
Zero-Day Attack
-
DDOS Attacks
-
Cybersecurity is a People Issue
-
Password Management
-
Biometrics
-
2-Factor Authentication (2FA)
-
Netflix Phishing Scam (2017)
-
Phishing and Spear Phishing
-
Social Engineering
-
Social Engineering Examples – Romance Scams, Call-Centre Scams and Impersonation
-
Deepfake Videos
-
Fake Website – Malindo Air
-
Insider Threat
-
NIST Framework for Cyber-Security
-
Table-top Exercise
Leave a reply
You must login or register to add a new comment .