High-Impact IT Leader - Succeed as CIO/CTO/IT Director 2021!




High-Impact IT Leader - Succeed as CIO/CTO/IT Director 2021!

Do you want to become a better IT leader? 

This course is designed for those already in, or aspire to be, a CIO/CTO/IT Director or other C-level IT role.  Unlike the masses of other leadership courses out there, this course is specifically for those working in the technology space. 

The unique course will provide you with a broad set of knowledge and insights that will be well worth your time and the modest course fee.


Develop a LEADERSHIP MINDSET

  • Role of Today's IT leader

  • The 3 CIO Archetypes

  • Deloitte's 3 CIO Patterns

  • Friend of the CEO

  • Some Questions for Today's IT Leaders

  • Four Priorities of an IT Leader

  • Rate Yourself as a Leader

  • Egon Zehnder - 9 Core CIO Competencies

  • 6 Hats of an IT Leader

  • Impact of IT Leaders


Re-imagine the BUSINESS STRATEGY

  • Declining Fortunes

  • Former Industry Leaders

  • Marketing Myopia

  • Re-imagining the Business

  • Vision Cone

  • Examples of Strategic Vision

  • Tesla - Vision to Strategy

  • Strategy to Competitive Advantage

  • PESTEL Analysis

  • Re-inventing the New York Times

  • BEST Analysis

  • Best Analysis for ALDI, Hamleys and Disney

  • Executable Strategy

  • 1-Page Strategy - Business Model Canvas


Formulate the IT STRATEGY

  • What is IT Strategy?

  • Example - Changi Airport Terminal 4 (T4)

  • Unlocking IT Value

  • Strategic IT Grid

  • Examples - Under Armour and Arcelor Mittal

  • Impact of Poor vs. Good IT Strategy

  • “Jump on the Bandwagon" Mentality

  • Gartner Hype Cycle

  • Does IT matter?

  • 1-Page IT Strategy - the IT Pyramid

  • Example - IT Pyramid for NTU

  • Gartner's IT Strategy

  • Example - BBC Technology Strategy and Roadmap

  • Business-IT Alignment and IT-IT Alignment

  • UK Government's Failed NHS Project

  • IT Vision

  • IT Roadmap and IT Portfolio

  • Prioritising Project Investments

  • Top Tips on Creating an IT Roadmap

  • Pitfalls in IT Strategy


Architect AGILE IT PLATFORMS

  • Importance of IT Architecture

  • Good vs. Bad Architecture

  • Architecture Complexities

  • Spaghetti Architecture

  • Needs of Retail Banking

  • Business Agility is the New Mantra

  • Qualities of an IT Architecture

  • Multi-application Architectures

  • KISS Principle

  • Gartner's Core Architecture Principles (for digital business)

  • Application Programme Interface (APIs)

Build BUSINESS RESILIENCE

  • IT Outages at BA, Amazon, Delta and Microsoft

  • Business Resilience

  • Cost of IT Downtime

  • Business Impact of IT Outage / Degradation

  • MAS Guidelines on Business Continuity Management

  • ISO 22301

  • Key Metrics: MTD+RTO, ADL+RPO

  • 5R Business Continuity Timeline

  • Threats and Vulnerabilities

  • A Risk-Based Approach

  • Understanding Risk

  • Risk Assessment Matrix

  • Business Impact Analysis

  • Distributed Operations

  • Importance of Back-ups

  • 3-2-1 Backup Strategy

  • Data-Centre Tiers

  • Data Centre Issues and Cause of BA Outage (2017)

  • Disaster Recovery Site

  • Disaster Recovery as a Service (DRaaS)

  • Business Continuity Team

  • Pitfalls in Business Continuity Planning


Deliver PROJECT SUCCESS

  • IT Projects Come In Different Shapes and Sizes

  • The Project Lifecycle

  • Project Success and Trade-offs

  • Four Layers of Impact

  • Writing a Project Proposal

  • 4 Dimensions of Project Feasibility

  • Product vs. Project Scope

  • Types of Project Risk

  • Top 5 Causes of Project Failure

  • Requirements as a Major Pain Point

  • Prioritising with Moscow Analysis

  • Project Stakeholders

  • Work Breakdown Structure (WBS)

  • Using a WBS for Project Estimation

  • Project Estimation Methods

  • Shift from Traditional 'Waterfall' to Agile Project Lifecycle

  • Traditional vs Agile Approach


Stay safe and CYBER SECURE

  • Data Breaches at SingHealth, Equifax and Razer

  • IBM's Cost of Data Breach Study (2019)

  • Information Assurance

  • Data Privacy

  • General Data Protection Regulation (GDPR)

  • EY Top 10 Cybersecurity Threats (2018-19)

  • Cybersecurity Threat Landscape

  • Malware

  • Malware examples - WannaCry, GigaLocker and WhatsApp

  • Keyloggers

  • IOT Issues - HomeCams, Smart Devices and Car Hacking

  • Zero-Day Attack

  • DDOS Attacks

  • Cybersecurity is a People Issue

  • Password Management

  • Biometrics

  • 2-Factor Authentication (2FA)

  • Netflix Phishing Scam (2017)

  • Phishing and Spear Phishing

  • Social Engineering

  • Social Engineering Examples - Romance Scams, Call-Centre Scams and Impersonation

  • Deepfake Videos

  • Fake Website - Malindo Air

  • Insider Threat

  • NIST Framework for Cyber-Security

  • Table-top Exercise



Complete playbook for IT executives on leading strategy, technology, people and operations

Url: View Details

What you will learn
  • Develop a LEADERSHIP MINDSET
  • Re-imagine the BUSINESS STRATEGY
  • Formulate the IT STRATEGY

Rating: 4.13333

Level: All Levels

Duration: 6.5 hours

Instructor: Tech MBA


Courses By:   0-9  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z 

About US

The display of third-party trademarks and trade names on this site does not necessarily indicate any affiliation or endorsement of hugecourses.com.


© 2021 hugecourses.com. All rights reserved.
View Sitemap