High-Impact It Leader - Succeed As Cio/Cto/It Director 2024!
Last updated 9/2024
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English (UK) | Size: 1.36 GB | Duration: 6h 33m
Last updated 9/2024
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English (UK) | Size: 1.36 GB | Duration: 6h 33m
Complete playbook for IT executives on leading strategy, technology, people and operations
What you'll learn
Develop a LEADERSHIP MINDSET
Re-imagine the BUSINESS STRATEGY
Formulate the IT STRATEGY
Drive DIGITAL TRANSFORMATION
Architect AGILE IT PLATFORMS
Build BUSINESS RESILIENCE
Deliver PROJECT SUCCESS
Stay Safe and CYBER SECURE
Requirements
At least 10 years of IT working experience.
Description
Do you want to become a better IT leader? This course is designed for those already in, or aspire to be, a CIO/CTO/IT Director or other C-level IT role. Unlike the masses of other leadership courses out there, this course is specifically for those working in the technology space. The unique course will provide you with a broad set of knowledge and insights that will be well worth your time and the modest course fee.Develop a LEADERSHIP MINDSETRole of Today's IT leaderThe 3 CIO ArchetypesDeloitte's 3 CIO PatternsFriend of the CEOSome Questions for Today's IT LeadersFour Priorities of an IT LeaderRate Yourself as a LeaderEgon Zehnder - 9 Core CIO Competencies6 Hats of an IT LeaderImpact of IT LeadersRe-imagine the BUSINESS STRATEGYDeclining FortunesFormer Industry LeadersMarketing MyopiaRe-imagining the BusinessVision ConeExamples of Strategic VisionTesla - Vision to StrategyStrategy to Competitive AdvantagePESTEL AnalysisRe-inventing the New York TimesBEST AnalysisBest Analysis for ALDI, Hamleys and DisneyExecutable Strategy1-Page Strategy - Business Model CanvasFormulate the IT STRATEGYWhat is IT Strategy?Example - Changi Airport Terminal 4 (T4)Unlocking IT ValueStrategic IT GridExamples - Under Armour and Arcelor MittalImpact of Poor vs. Good IT Strategy“Jump on the Bandwagon" MentalityGartner Hype CycleDoes IT matter?1-Page IT Strategy - the IT PyramidExample - IT Pyramid for NTUGartner's IT StrategyExample - BBC Technology Strategy and RoadmapBusiness-IT Alignment and IT-IT AlignmentUK Government's Failed NHS ProjectIT VisionIT Roadmap and IT PortfolioPrioritising Project InvestmentsTop Tips on Creating an IT RoadmapPitfalls in IT StrategyArchitect AGILE IT PLATFORMSImportance of IT ArchitectureGood vs. Bad ArchitectureArchitecture ComplexitiesSpaghetti ArchitectureNeeds of Retail BankingBusiness Agility is the New MantraQualities of an IT ArchitectureMulti-application ArchitecturesKISS PrincipleGartner's Core Architecture Principles (for digital business)Application Programme Interface (APIs)Build BUSINESS RESILIENCEIT Outages at BA, Amazon, Delta and MicrosoftBusiness ResilienceCost of IT DowntimeBusiness Impact of IT Outage / DegradationMAS Guidelines on Business Continuity ManagementISO 22301Key Metrics: MTD+RTO, ADL+RPO5R Business Continuity TimelineThreats and VulnerabilitiesA Risk-Based ApproachUnderstanding RiskRisk Assessment MatrixBusiness Impact AnalysisDistributed OperationsImportance of Back-ups3-2-1 Backup StrategyData-Centre TiersData Centre Issues and Cause of BA Outage (2017)Disaster Recovery SiteDisaster Recovery as a Service (DRaaS)Business Continuity TeamPitfalls in Business Continuity PlanningDeliver PROJECT SUCCESSIT Projects Come In Different Shapes and SizesThe Project LifecycleProject Success and Trade-offsFour Layers of ImpactWriting a Project Proposal4 Dimensions of Project FeasibilityProduct vs. Project ScopeTypes of Project RiskTop 5 Causes of Project FailureRequirements as a Major Pain PointPrioritising with Moscow AnalysisProject StakeholdersWork Breakdown Structure (WBS)Using a WBS for Project EstimationProject Estimation MethodsShift from Traditional 'Waterfall' to Agile Project LifecycleTraditional vs Agile ApproachStay safe and CYBER SECUREData Breaches at SingHealth, Equifax and RazerIBM's Cost of Data Breach Study (2019)Information AssuranceData PrivacyGeneral Data Protection Regulation (GDPR)EY Top 10 Cybersecurity Threats (2018-19)Cybersecurity Threat LandscapeMalwareMalware examples - WannaCry, GigaLocker and WhatsAppKeyloggersIOT Issues - HomeCams, Smart Devices and Car HackingZero-Day AttackDDOS AttacksCybersecurity is a People IssuePassword ManagementBiometrics2-Factor Authentication (2FA)Netflix Phishing Scam (2017)Phishing and Spear PhishingSocial EngineeringSocial Engineering Examples - Romance Scams, Call-Centre Scams and ImpersonationDeepfake VideosFake Website - Malindo AirInsider ThreatNIST Framework for Cyber-SecurityTable-top Exercise
Who this course is for:
Those preparing for IT leadership roles in the near future.,Current IT leaders wishing to enhance and update their knowledge.,Consultants whose work involves advising IT leaders.,Anyone with career aspirations to become an IT leader.