Posts

Showing posts from October, 2017

What makes us Trust a Trusted Adviser?

Image
Where there is a solution there is always selling involved. Funnily, even if there is no obvious problem to solve sales is pushed. In my opinion, a Trusted Adviser is someone who provides an Approach to identifying the opportunities or problems that the customer does not see yet. Thereby, may provide approaches to Capitalize on this opportunity or fix the problem. The approach may involve the necessary solution Options and selection criteria but without actively selling any particular solution. The moment selling comes into play the credibility as a Trusted Adviser is lost. I'd insist on the Approach and urge to resist the temptation to sell a Solution. The boundary between Sales and Advise is narrowing in today's hyper-competitive business landscape At the same time advisory may broker an internal team or an ecosystem to come up with a customized solution for the customer based on the discovery; focus as far as the customer is concerned remains on the Value Real

Security at the Cyber-Physical Intersections

Image
In my previous post  Complexity impedes Security  I covered the simplification principles. The Cyber-Physical interactions are the focus in this post. The Physical-space comprises the geographical locations and the users and the tools in them orchestrated within a business process context.  The Cyber-space comprises the Network that provides the connectivity, the Platforms that provide containers for the Applications to run on hence process the Data.  Enterprises operate their businesses across the breadth and depth of their capabilities using internal and external entities that share each others’ physical and cyber space.  E.g., an Order Processing system illustrated here has a Payment Processing Team operating from Vietnam, an Order Processing Application accessible over the extranet (to employees, partners and customers) and a product catalog hosted on the Cloud. Today’s Enterprises, old and new alike, operate a network of processes that transact across physical a

Complexity impedes Security

Image
Complexity is the primary reason Enterprises struggle so much with security vulnerabilities.  Today’s Enterprises are complex mashup of capabilities in operations and technology. Even small and medium enterprises aren’t an exception. Business capabilities are both broad and deep often cross-referenced in the context of an end-to-end business process.  Businesses are, in today’s information economy, wide open to internal and external threats. Each possible entry and exit are potential points of vulnerabilities.  Enterprises are forced to invest in complicated security systems to monitor, control and audit access to vital assets that include information. Often the cost of securing are a big operational overhead on the profitability. Enterprises need to constantly re-look at the need for complex systems in securing information. at each level of the capability Breadth and Depth for relevance and consistency.  Simplifying the architecture gives an opportunity to apply security where