Remove 2014 Remove Measurement Remove Strategy
article thumbnail

Data Strategy Creation – A Roadmap

Peter James Thomas

Data Strategy creation is one of the main pieces of work that I have been engaged in over the last decade [1]. In my last article, Measuring Maturity , I wrote about Data Maturity and how this relates to both Data Strategy and a Data Capability Review. I find Data Strategy creation a very rewarding process.

article thumbnail

Measuring Maturity

Peter James Thomas

The author, engaged in measuring maturity – © Jennifer Thomas Photography – view full photo. In the thirteen years that have passed since the beginning of 2007, I have helped ten organisations to develop commercially-focused Data Strategies [1].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How To Suck At Social Media: An Indispensable Guide For Businesses

Occam's Razor

" The second question was never answered either, but because all businesses know is how to pimp that became their default strategy. if yes, what should your content (and marketing) strategy be. I believe the best way to measure success is to measure the above four metrics (actual interaction/action/outcome).

B2B 167
article thumbnail

How To Improve Incident Response Time for Data Breaches

Smart Data Collective

Take the Marriott data breach in 2014, for example. Organizations should have strategies and procedures in place for making risk-related choices that represent the organization’s risk tolerance for data theft. Before Marriot acquired the Starwood hotel group, Starwood suffered a major data breach of its customer database.

article thumbnail

Digital mining for sustainability in a low-carbon economy

CIO Business Intelligence

Furthermore, measuring and monitoring ESG performance required consolidating data from various instruments and functions in diverse locations. The company had little choice but to adopt a digital strategy to realize its sustainability aspirations in the most cost-effective and time-efficient manner.

article thumbnail

6 Case Studies on The Benefits of Business Intelligence And Analytics

datapine

For example, in regards to marketing, traditional advertising methods of spending large amounts of money on TV, radio, and print ads without measuring ROI aren’t working like they used to. Lieferando is a European online food-ordering service that was acquired by Just Eat Take Away in 2014. The results?

article thumbnail

Zero Trust Security for NIS2 compliance: What you need to know

CIO Business Intelligence

Central NetConductor includes all the tools organizations need to deploy, configure, and operate networks that support Zero Trust Security strategies. Assessing Zero Trust adoption for NIS2 compliance With the NIS2 compliance deadline looming, it can be helpful to assess current levels of cybersecurity implementation. European Union.

IoT 97