Register Now


Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Add post

You must login to add post .

Add question

You must login to ask a question.


Register Now

Welcome to! Your registration will grant you access to using more features of this platform. You can ask questions, make contributions or provide answers, view profiles of other users and lots more. Register now!

High-Impact IT Leader – Succeed as CIO/CTO/IT Director 2021!

High-Impact IT Leader – Succeed as CIO/CTO/IT Director 2021!

Price: $109.99

Do you want to become a better IT leader?

This course is designed for those already in, or aspire to be, a CIO/CTO/IT Director or other C-level IT role. Unlike the masses of other leadership courses out there, this course is specifically for those working in the technology space.

The unique course will provide you with a broad set of knowledge and insights that will be well worth your time and the modest course fee.


  • Role of Today’s IT leader

  • The 3 CIO Archetypes

  • Deloitte’s 3 CIO Patterns

  • Friend of the CEO

  • Some Questions for Today’s IT Leaders

  • Four Priorities of an IT Leader

  • Rate Yourself as a Leader

  • Egon Zehnder – 9 Core CIO Competencies

  • 6 Hats of an IT Leader

  • Impact of IT Leaders


  • Declining Fortunes

  • Former Industry Leaders

  • Marketing Myopia

  • Re-imagining the Business

  • Vision Cone

  • Examples of Strategic Vision

  • Tesla – Vision to Strategy

  • Strategy to Competitive Advantage

  • PESTEL Analysis

  • Re-inventing the New York Times

  • BEST Analysis

  • Best Analysis for ALDI, Hamleys and Disney

  • Executable Strategy

  • 1-Page Strategy – Business Model Canvas

Formulate the IT STRATEGY

  • What is IT Strategy?

  • Example – Changi Airport Terminal 4 (T4)

  • Unlocking IT Value

  • Strategic IT Grid

  • Examples – Under Armour and Arcelor Mittal

  • Impact of Poor vs. Good IT Strategy

  • “Jump on the Bandwagon” Mentality

  • Gartner Hype Cycle

  • Does IT matter?

  • 1-Page IT Strategy – the IT Pyramid

  • Example – IT Pyramid for NTU

  • Gartner’s IT Strategy

  • Example – BBC Technology Strategy and Roadmap

  • Business-IT Alignment and IT-IT Alignment

  • UK Government’s Failed NHS Project

  • IT Vision

  • IT Roadmap and IT Portfolio

  • Prioritising Project Investments

  • Top Tips on Creating an IT Roadmap

  • Pitfalls in IT Strategy


  • Importance of IT Architecture

  • Good vs. Bad Architecture

  • Architecture Complexities

  • Spaghetti Architecture

  • Needs of Retail Banking

  • Business Agility is the New Mantra

  • Qualities of an IT Architecture

  • Multi-application Architectures

  • KISS Principle

  • Gartner’s Core Architecture Principles (for digital business)

  • Application Programme Interface (APIs)


  • IT Outages at BA, Amazon, Delta and Microsoft

  • Business Resilience

  • Cost of IT Downtime

  • Business Impact of IT Outage / Degradation

  • MAS Guidelines on Business Continuity Management

  • ISO 22301

  • Key Metrics: MTD+RTO, ADL+RPO

  • 5R Business Continuity Timeline

  • Threats and Vulnerabilities

  • A Risk-Based Approach

  • Understanding Risk

  • Risk Assessment Matrix

  • Business Impact Analysis

  • Distributed Operations

  • Importance of Back-ups

  • 3-2-1 Backup Strategy

  • Data-Centre Tiers

  • Data Centre Issues and Cause of BA Outage (2017)

  • Disaster Recovery Site

  • Disaster Recovery as a Service (DRaaS)

  • Business Continuity Team

  • Pitfalls in Business Continuity Planning


  • IT Projects Come In Different Shapes and Sizes

  • The Project Lifecycle

  • Project Success and Trade-offs

  • Four Layers of Impact

  • Writing a Project Proposal

  • 4 Dimensions of Project Feasibility

  • Product vs. Project Scope

  • Types of Project Risk

  • Top 5 Causes of Project Failure

  • Requirements as a Major Pain Point

  • Prioritising with Moscow Analysis

  • Project Stakeholders

  • Work Breakdown Structure (WBS)

  • Using a WBS for Project Estimation

  • Project Estimation Methods

  • Shift from Traditional ‘Waterfall’ to Agile Project Lifecycle

  • Traditional vs Agile Approach

Stay safe and CYBER SECURE

  • Data Breaches at SingHealth, Equifax and Razer

  • IBM’s Cost of Data Breach Study (2019)

  • Information Assurance

  • Data Privacy

  • General Data Protection Regulation (GDPR)

  • EY Top 10 Cybersecurity Threats (2018-19)

  • Cybersecurity Threat Landscape

  • Malware

  • Malware examples – WannaCry, GigaLocker and WhatsApp

  • Keyloggers

  • IOT Issues – HomeCams, Smart Devices and Car Hacking

  • Zero-Day Attack

  • DDOS Attacks

  • Cybersecurity is a People Issue

  • Password Management

  • Biometrics

  • 2-Factor Authentication (2FA)

  • Netflix Phishing Scam (2017)

  • Phishing and Spear Phishing

  • Social Engineering

  • Social Engineering Examples – Romance Scams, Call-Centre Scams and Impersonation

  • Deepfake Videos

  • Fake Website – Malindo Air

  • Insider Threat

  • NIST Framework for Cyber-Security

  • Table-top Exercise


About arkadmin

Leave a reply