Daily Tech Digest - April 05, 2023

The evolving role of the CHRO in the post-pandemic era

A major landscape shift for CHROs is the advent of HR technologies that can be used as hiring as well as learning and development tools. By collecting and analysing critical HR data, companies can derive actionable insights to improve workforce, people, and talent management performance. Case in point, TDCX’s proprietary Flash Hire recruitment platform enables hiring managers to gauge a candidate’s competency and alignment with the job requirements more quickly through its artificial intelligence (AI) capabilities. ... Actionable insights can be combined with digital tools to boost employee productivity and encourage workers to further their career trajectories through learning and coaching for better outcomes. Additionally, digital tools can help organisations reach out and engage talent globally. While companies innovate their HR strategies by leveraging data analytics and digital tools, such efforts should also be balanced with a human touch. Many companies are already using technology such as robotic process automation and AI to improve hiring, boost employee productivity and encourage learning and career growth, and such instances will only continue to increase.

Three Trends in Enterprise Architecture to Optimize IT Operations

A shift to Continuous Delivery sees each team organize itself around an end-to-end value stream that brings ongoing and longer-term benefits to the business rather than short-term and time-bounded “wins” for individual departments. In addition, a Continuous Delivery approach aims to change the delivery model so that teams can work independently and with less direction rather than competing with one another for resources. ... In this model, each team holds responsibility for the design, operation, realization and future-state direction of their own semi-independent business area. Empowering teams in this way causes a shift in power control, making decision-making more democratic and less centralized. In addition, optimizing collaboration between teams brings about more active conversation and facilitation, resulting in a freer flow of information across the business. In shifting the Enterprise Architect role to a facilitator role than that of a data warden, the democratization of Enterprise Architecture significantly impacts the enterprise, evolving how it operates and the type of tooling it needs for success.

IT Leaders as Advocates for Continual Change

“All IT leaders should keep the concept of constant change top of mind, as it is essential for driving innovation, staying ahead of the curve, and responding quickly to new challenges and opportunities,” he says. Dennis Monner, chief commercial officer at Aryaka, explains businesses are coming to realize that digital transformation is a never-ending process. “As environments change and are on the verge of more change, IT leaders want to be well-prepared and be able to adapt,” he says. This means they need to be continuously evaluating their businesses, as well as different models of operation that may facilitate transformation more smoothly. “IT leaders must recognize when a particular approach may not be working as expected and when a pivot may be necessary,” he says. “Keeping an open mind to continual change means a business is putting the needs of its customers first, rather than forcing customers to adapt and settle for less than they deserve.” If a product or service isn’t resonating with customers, business leaders need to be willing to shake things up, as opposed to continuing down a path that will not yield results.

Top Digital Communication Skills You’ll Need For 2023

Cultural and social sensitivity is a significant part of d igital communication management. Understanding different cultural and social dynamics enables you to become a better business leader, and will help you to develop relevant communication strategies. This is why at BI students receive a grounding in psychological and sociological concepts underlying communication process. Modules such as ‘human interaction’ and ‘human-technology interaction’ educates students on different theories related to identity and diversity. Along with an extensive understanding of how people interact and communicate with each other through technology. ... To excel in a career management, it is vital that you have a clear understanding of the dynamics of communication. At BI, you will be introduced to solid theories and research which revolve around digital communication strategy, social media, network theory, and innovation and corporate storytelling. Our methods course covers the basics of qualitative and quantitative methods such as data handling, recoding, experimental statistics, and digital and social network data analysis.

How Unregulated Access and Advanced Processing Threaten Personal Privacy

Powerful tech companies like Google, Amazon, Meta, and Apple revolutionized data analytics and its use in the private sector. By combining widely collected user activity with behavioral psychology, commercial organizations alter choices that people make, often in the interest of profit maximization. While not illegal, such manipulation challenges the notions of individual choice in a liberal society. However, while processing capabilities have matured, the requirements to secure data during the collection, storage, and analysis phases grow increasingly complex. Companies face endless attempts to exploit networks and servers, keeping cyber security teams busy with ever-evolving threats. Preventing data breaches, such as the 2013-2015 exfiltration of personal information from the United States Office of Personnel Management (OPM), requires skilled technicians and powerful software working around the clock. Perhaps more concerningly, the proliferation of commercially-collected data has led to the rise of data brokers, who profit off the collection and sale of personal information within the current legal limitations of consumer data usage.

Should Every Incident Get a Retrospective?

Try to do this for every incident, and you’ll quickly run into practical limitations. Each incident can take tens of person-hours to study, and meanwhile, more incidents may stack up. At some point, there won’t be enough hours in the day, incident analysts to run investigations or money to spend. You’ll also soon exhaust your organization’s goodwill. Earlier in my career, I learned this lesson the hard way. My site reliability engineering (SRE) team had a keen interest in getting a handle on the growing number of production incidents in our cloud infrastructure. ... High-profile incidents as a whole should give you pause. These are exactly the kinds of incidents that we can learn the most from. However, tensions will run high, and even a company that normally embraces a blameless approach to retrospectives might look for someone to take the fall. Does your incident retrospective have the potential to cause harm to incident participants, or perhaps even termination? It might be best to focus on incidents that are less emotionally charged, especially at companies that are still early on the path toward blameless retrospectives.

UK data regulator issues warning over generative AI data protection concerns

“Organisations developing or using generative AI should be considering their data protection obligations from the outset, taking a data protection by design and by default approach,” said Stephen Almond, the ICO’s director of technology and innovation, in the post. Almond also said that, for organizations processing personal data for the purpose of developing generative AI, there are various questions they should ask themselves, centering on: what their lawful basis for processing personal data is; how they can mitigate security risks; and how they will respond to individual rights requests. “There really can be no excuse for getting the privacy implications of generative AI wrong,” Almond said, adding that ChatGPT itself recently told him that “generative AI, like any other technology, has the potential to pose risks to data privacy if not used responsibly.” “We’ll be working hard to make sure that organisations get it right,” Almond said. The ICO and the Italian data regulator are not the only ones to have recently raised concerns about the potential risk to the public that could be caused by generative AI.

The Data Trifecta: Privacy, Security, and Governance from Reactivity to Resilience

The panelists broadly agreed that bringing together privacy, security, and governance teams to develop a tech-driven model of unified engagement can revolutionize a business’s efficiency and effectiveness. In Sommer’s observations, this form of platform approach cuts down on the number of individual interactions between teams, while at the same time distilling the load of regulatory obligations, all of which makes operations more manageable to support. Streamlining this process allows managers to automate rules and controls into the data in a manner that lets the data flow, “which ultimately means that our privacy teams and security teams can say yes to more projects,” noted Prestidge. “Then our data teams can get access to that approved data much quicker, speeding up all of the processes and reducing the risk.” ... “At the end of the day, the intentions behind most privacy regulations tend to be focused around protecting the consumer,” reflected Sommer. It’s therefore essential for data teams to implement a degree of consistency between promises made to consumers in initial privacy disclosures and the ways in which data is used – and shared – in current operations.

Designing Tabletop Exercises That Actually Thwart Attacks

"The big thing that we want to shoot for in these tabletops is as much realism as we can possibly get," Durrin says. But realism is difficult to simulate. Davidoff jokes about how "we tried using ChatGPT to run a tabletop exercise," and it didn't turn out so well. "It's like: 'I am the facilitator,' and starts walking you through the steps. But it's very boring. It doesn't give you any curveballs." Simulating realism, ironically, requires a good deal of showmanship: storytelling, audio and visual materials, and a certain creativity to generate the chaos and unpredictability you'd find in a cyberattack in real life. But little of this theater is completely made-up. "We try to leverage the experience that we've gained over the years of actually dealing with these attacks in the wild," Durrin notes, ... Enterprises that run these kinds of simulations tend to avoid those mistakes. "We've actually been able to see how those changes that we've made and tested inside of an incident response plan have benefited organizations in a very tangible and real sense," Durrin says, "in the speed of recovery, the quality of recovery and how the organization is actually able to get back on their feet after suffering from an incident."

Attention to detail matters

What about O’Brien’s theory that caring about details is something that you’re born with? I think people can learn to apply more attention to detail. If you give people enough context about why they should care about the little things, they should make the effort to internalize the lesson. That must be what happens in work environments in which people’s lives are on the line, such as operating rooms and airplane cockpits. But what about in the office? In the many years I spent as an editor managing teams of reporters, I learned it was a good practice, when I moved into a role, to tell my new colleagues that I didn’t like corrections—the notes reporters add at the end of an online article that explain how an earlier version got some spelling or fact wrong. I didn’t say it in a threatening way. I just shared it as a fact about me. That approach sent a clear signal that I expected people to check their facts before their piece was published. So, on the nature-or-nurture question, the answer is probably a bit of both—but the advice would be to cultivate a detail-oriented approach if you sense you might not be born with one.

Quote for the day:

"Listening & trusting the inner voice is one of the most important lessons of leadership." -- Warren Bennis

No comments:

Post a Comment