8:30 - 9:00am Registration & Breakfast 9:00 - 9:30am Welcome Jeff Pikulik, Microsoft 9:30 - 10:00am Digital Transformation Daniel Cohen-Dumani, Partner and Market Leader, Withum 10:00 - 10:30am Cyber Security Anupam Goradia, Senior Manager, Withum 10:30 - 10:45am COFFEE BREAK 10:45 - 11:15am Creating a Data-Driven Enterprise Daniel Cohen-Dumani, Partner and Market Leader, Withum 11:15 Best practices for creating a game plan Q&A and Raffle
74
Embed
Creating a Game Plan for Your Digital Transformation
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
15+ years of Digital Transformation Expertise with Office 365, SharePoint and DynamicsSharePoint Visionary
Interests: Productivity in the Modern Workplace. Work 2.0
Started working with SharePoint when nobody could spell it
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
20SM
The world works differently today.The change from a world of individual creation to real-time, anytime, anywhere collaboration and co-creation is ever increasing.
of business email users will primarily rely on a Surface, tablet or other mobile device by 2018.
50%
of Business believe mobile apps will entirely replace some traditional solutions in the near future
71%
3.5 million
Business will use instant collaboration apps by 2018, and
2.5 million
will use web conferencing
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
21SM
Source: PWC CEO Survey
Trends that will
transform
business,
next five years (%)
Technological advancesDemographic shifts
Shift in global economic powerResource scarcity & climate change
Urbanization
CEOs believe technology will
transform their business more
than any other global trend
Source: Gartner
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
22SM
Blurring the physical and the digitaldivide
1784 1870 1969 2016
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
23SM
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
24SM
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
25SM
Microsoft’s Mission is to empower every individual and every organization to achieve more through Digital Transformation.
Building better, stronger
engagements by
harnessing data
representing a complete
view of your customer,
then drawing actionable
intelligence, predictive
insights that can deliver
personalization at scale.
Engage your
customers
Reinventing products,
services and business
models using digital
content to capitalize on
emerging revenue
opportunities.
Transform
your products
Optimizing operations to
reshape customer
relationships and service
models by gathering data
across a wide, dispersed
set of endpoints, and
drawing insights through
advanced analytics that
can be used to introduce
improvements on a
continuous, real time basis.
Optimize your
operations
Empowering employees
with tools that fuel
collaboration and
productivity, while
mitigating the risks that
come with providing
freedom and space to
employees.
Empower your
employees
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
26SM
Ignore boundaries
Microsoft AzureEnterprise Mobile & Security Dynamics 365
Microsoft 365
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
27SM
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
More than 15 years of professional public accounting experience, member of the Cyber & Information Security Services team and the firm’s Governance, Risk and Compliance Services Group, responsible for business development of internal audit, risk management and internal control related consulting services.
Experience includes Sarbanes Oxley Compliance, implementation of COSO Internal Control Framework, risk and control assessment, internal process documentation, gap analysis and testing.
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
29SM
- Tim Berners-Lee
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
30SM
• Accurate
• Legal
• Reliable
• Available
• Transparent
• Complete
• Meet compliance
• Enable decision making
• Enable reporting
• Protected, confidential
• Need to know basis
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
31SM
D A T A
Recipient’s systems
Cloud
Mobile Apps, Social Media
Paper
Storage Media such as USBs, SD
cards
Workstations, Tablets and
Laptops
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
32SM
Data is stolen
Data is misplaced (i.e. left in a public place)
Data is unavailable
• Ransomware
• Denial of Service
Data is altered unauthorized
Data is not restricted
• Left on desks and in shared spaces
• Left open on laptops, desktops
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
33SM
Weakness within your own IT systems.
Weakness within your vendor’s IT systems.
Can be a result of human element too!
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
44SM
An update to its cybersecurity framework in 2017
• Simplifies implementation
• Will include glossary of terms
• Attempts at measurement of cybersecurity
• Integrate cybersecurity in other enterprise objectives
Small Business Information Security: The Fundamentals (NISTIR 7621 Revision 1)
A crosswalk document exists mapping HIPAA Security Rule to NIST Cybersecurity Framework at https://www.hhs.gov/sites/default/files/nist-csf-to-hipaa-security-rule-crosswalk-02-22-2016-final.pdf
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
45SM
Know where your data is stored, when it is shared and being transmitted (i.e. at rest and in motion)
Strong password policy
Continuously updating anti virus and OS patches
Firewalls and web filtering
Encryption of storage media, devices and transmission
Mobile Device Management
Educate, Educate and Educate some more
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
46SM
Password hygiene
01
Educate yourself and others
02
Stranger Danger-don’t reply to unusual emails
03
Confirm Reply to Address when answering emails to combat impersonation / phishing
04
Call back and confirm
05
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
47SM
Execute Penetration Testing and
Vulnerability Scans
Developing an “Incidence
Response Plan” and performing
mock trials
Cybersecurity Insurance
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
48SM
A form of ethical hacking
Scope is defined
Result is a report listing:
• Specific vulnerabilities
• Sensitive data
Follow up on findings and take corrective action
Change the scope from year to year.
Change in/out providers for fresh eyes
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
49SM
Understand what you will be reimbursed for.
Understand that this is new and evolving.
Discuss risk based scenarios and determine risk transference strategy.
What are the requirements with respect to security environment and how can they be demonstrated.
Discuss risk based scenarios with your insurance broker to confirm coverage
Coverage includes Business Associates? (Third Party Coverage)
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
50SM
Its not just IT. A cyber security incident has financial, operational and legal ramifications
Ask “Who is going to do what, when, where and how”. (i.e. similar to DR and BCP)
Different kinds of attacks have different priorities for remedial action
This is a “table-top” exercise
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
51SM
Talk to your IT folks. Assess and document your basic IT controls.
Develop security policies not just for IT Department but for your business as a whole.
Locate where your data is and monitor its movement.
Executive Table Top Exercises frequently with mock trials.
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
52SM
- Tim Berners-Lee
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
53SM
Next Up
- Creating a Data-Driven Enterprise- Q&A and Raffle
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
54SM
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
55SM55
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
56SM
• It simply means basing your business decisions on actual data coming from your business operations and activities (e.g. sales, forecasts, HR data, financial info, etc.)
• Every commercial and public sector operation is collecting huge amounts of information
• Generated by people, machines, applications
• Structured and unstructured
• Stored in a variety of locations, systems etc.
• Spreadsheets remain the most common data source for business users.
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
57SM
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
58SM
• Every commercial and public sector operation is collecting information
• Data is generated by people, machines, applications…just about everyone and everything
• Immense amounts of data are being captured but most of it is not analyzed
• Good News: Almost anyone can tap into data and start analyzing it
• So, how do you do it?
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
59SM
• Start with understanding what you want to know or gain deeper understanding about it…then:
• Run your data through an analysis tool like Power BI
• Yes, it is that easy…because data analysis tools, like Power BI, are extremely powerful and relatively easy to use.
• Advanced analytics used to be the province of large firms and public sector agencies
• …but tools like Power BI have democratized data analytics
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
60SM
Technical Business
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
61SM
Power BI is a new cloud-based business analytics service that enables:
Experience your data. Any data, any way, anywhere.
Power BI
✓Fast and easy access to data✓A live 360º view of the business✓Data discovery and exploration✓Insights from any device✓Collaboration across the organization✓Anyone to visualize and analyze data
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
62SM
Data sources Power BI service
SaaS solutionse.g. Marketo, Salesforce, GitHub, Google analytics
On-premises datae.g. Analysis Services
Organizational content packsCorporate data sources or external data services
Azure servicesAzure SQL, Stream Analytics…
Excel filesWorkbook data / data models
Power BI Desktop filesData from files, databases, Azure, and other sources
Data refresh
Visualizations
Live dashboards
Content packs Sharing & collaborationNatural language query
Reports
Datasets01001
10101
62
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
63SM
▪ OLD
▪ Weekly or monthly reporting cycles
▪ Manual refresh of data
▪ Posting or emailing of spreadsheet
▪ Static charts and graphs
▪ No mobile access or alerts
▪ NEW
▪ Daily updates and instant sharing
▪ Automatic refreshes of data
▪ Access through multiple devices
▪ Apps w/ interactive visualizations
▪ User-defined mobile alerts
63
^
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
64SM
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
65SM
Challenges
• Scattered Data
• Labor Intensive Reporting Process
• Long Reporting Cycle
Solution
• Automatic Aggregation and Cleaning
• Disparate Sources Combined in Model
• Reports, Dashboards, and Beyond
Benefits
• Improve reporting cycle from 3 weeks to 2 days
• Allow drill down and end user data analysis
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
66SM
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
67SM
Challenges
• Slow and Unresponsive
• Excel based dashboards pulling from hundreds of thousands of entries
• Many data sources all pulled into a single file
• Difficult to Present
• Can’t share reports
Solution
• Cloud Based Data Model
• Data is aggregated and analyzed in the cloud, no more bulky files
• Interactive Reports and Dashboards
• Explore client’s data through intuitive interactive visualizations
Benefits
• Reduce reporting cycle by 50% and allow real-time access to key KPI
• Allow drill down and end user data analysis
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
68SM
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
69SM
Challenges
• Expensive inadequate business intelligence processes
• Lots of Manual processes and Excel reconciliation
• Under-utilized enterprise analytics
• Expensive licensing
Solution
• Developed data models to combine data sources which were previously only matched up manually in excel;.
• Created reports that provide visibility for middle-management and up to see the impact of their sales, customer service, and operations activities
• Replaced expensive, under-utilized enterprise analytics and business intelligence systems with self-service, interactive reporting and data management.
Benefits
• Accelerated data ingest and transformation for departments using data from SalesForce, SAP, Hyperion, and SQL server based systems on a daily basis
• Automated complex evaluation measures for sales and consulting departments which are used to determine bonus and commission compensation
• Allow the company to compare operations, financial planning, sales, development, and human resources data for the first time
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
70SM
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
71SM
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
72SM
WithumSmith+Brown, PC | BE IN A POSITION OF STRENGTH
73SM
1
Identify and prioritize transformational digital capabilities around the four pillars
2
Outline the benefits of transformational capabilities and measure them
3
Design and develop a digital business architecture
4
Pilot deployment of transformational capabilities and validate expected impact
5
Deploy capabilities enterprise-wide and measure organizational impact
Digital Workplace Today Bloghttp://digital.withum.com/blog
Next Steps
Let Us Guide You to Your Digital Transformation with OurDigital Workplace Roadmap Workshop Guide