SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
Maximizing Technology Adoption ROI
CodeMash 2014

January 9, 2014
Eric A. Vanderburg, MBA, CISSP
Director, Information Systems and Security
Computer Forensic and Investigation Services

© 2014 Property of JurInnov Ltd. All Rights Reserved
Questions
• How does an organization adopt technology?
• What factors are important?
• What makes technology initiatives succeed?

2
© 2014 Property of JurInnov Ltd. All Rights Reserved
Factors of Systems adoption

Ease of Use

New IS
Adoption

Visibility

Trialability

Relative
Advantage
Compatibility

Rogers (1962, 1983)

© 2014 Property of JurInnov Ltd. All Rights Reserved

3
Process

Get aware

Interest

Evaluate

© 2014 Property of JurInnov Ltd. All Rights Reserved
4

Implement

Confirm
Communicate
• Communicate what we are doing
“IT’s inability to market effectively cements its cost center role in the enterprise:
communicating status but not value, fulfilling requests but not solving problems, and
partially deploying technologies but not delivering expected results.” -Laurie Orlov,
Forrester

•
•
•
•
•
•

Policies
Service updates
Customer service feedback
Employee engagement results
Government priorities
Industry reports and standards

© 2014 Property of JurInnov Ltd. All Rights Reserved
5
Align to Culture
• Deeper understanding of culture
• Leadership’s shaping of culture
• Cultural change factors
• Enacting transformational change
• Barriers
• Temporary tradeoffs

© 2014 Property of JurInnov Ltd. All Rights Reserved
Change factors
Evolutionary







Hybridization: secondary contrary or
different cultural elements with
primary elements
Growth impacts innovation
Increased assets affects risk tolerance

Lewin Change Model

Disconfirmation

Transformative







Can a successful organization change
without a significant event?
Ex: Pearl harbor of data breaches
Lewin Change Model

© 2014 Property of JurInnov Ltd. All Rights Reserved

Learning

Incorporation
For assistance or additional information

•
•
•
•
•
•
•

Phone:
Web:
Email:
Twitter:
Facebook:
Linkedin:
Youtube:

216-664-1100
www.jurinnov.com
eric.vanderburg@jurinnov.com
@evanderburg
www.facebook.com/VanderburgE
www.linkedin.com/in/evanderburg
www.youtube.com/user/evanderburg
JurInnov Ltd.
The Idea Center
1375 Euclid Avenue, Suite 400
Cleveland, Ohio 44115
8

© 2014 Property of JurInnov Ltd. All Rights Reserved

Mais conteúdo relacionado

Mais procurados

Healthcare in the age of mobile working - with Ericom
Healthcare in the age of mobile working - with EricomHealthcare in the age of mobile working - with Ericom
Healthcare in the age of mobile working - with EricomEricom Software
 
The future of electronic monitoring
The future of electronic monitoringThe future of electronic monitoring
The future of electronic monitoringnir shelly
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...SolarWinds
 
SolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds
 
RMIT_IPSec_MSS_Case_Study
RMIT_IPSec_MSS_Case_StudyRMIT_IPSec_MSS_Case_Study
RMIT_IPSec_MSS_Case_StudyIby Boztepe
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyLogicalis Australia
 
Ethical issues in software testing v4
Ethical issues in software testing v4Ethical issues in software testing v4
Ethical issues in software testing v4Scott Allman
 
Field flex mobile 1st strategy for iwms
Field flex mobile 1st strategy for iwmsField flex mobile 1st strategy for iwms
Field flex mobile 1st strategy for iwmsSteve Lisle
 
New IT Survey: Public Sector
New IT Survey: Public SectorNew IT Survey: Public Sector
New IT Survey: Public SectorSolarWinds
 
Survey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSurvey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSolarWinds
 

Mais procurados (11)

Healthcare in the age of mobile working - with Ericom
Healthcare in the age of mobile working - with EricomHealthcare in the age of mobile working - with Ericom
Healthcare in the age of mobile working - with Ericom
 
The future of electronic monitoring
The future of electronic monitoringThe future of electronic monitoring
The future of electronic monitoring
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
 
TIAD 2016 : Ethics in software development
TIAD 2016 : Ethics in software developmentTIAD 2016 : Ethics in software development
TIAD 2016 : Ethics in software development
 
SolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity Survey
 
RMIT_IPSec_MSS_Case_Study
RMIT_IPSec_MSS_Case_StudyRMIT_IPSec_MSS_Case_Study
RMIT_IPSec_MSS_Case_Study
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
Ethical issues in software testing v4
Ethical issues in software testing v4Ethical issues in software testing v4
Ethical issues in software testing v4
 
Field flex mobile 1st strategy for iwms
Field flex mobile 1st strategy for iwmsField flex mobile 1st strategy for iwms
Field flex mobile 1st strategy for iwms
 
New IT Survey: Public Sector
New IT Survey: Public SectorNew IT Survey: Public Sector
New IT Survey: Public Sector
 
Survey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSurvey: Security Analytics and Intelligence
Survey: Security Analytics and Intelligence
 

Destaque

Adoption of Technology Facilitated Services
Adoption of Technology Facilitated ServicesAdoption of Technology Facilitated Services
Adoption of Technology Facilitated ServicesDr. Amit Kapoor
 
Technology executive summary
Technology executive summaryTechnology executive summary
Technology executive summaryNaman Kumar
 
Digital transformation continues to drive IT strategy, How is QA and testing ...
Digital transformation continues to drive IT strategy, How is QA and testing ...Digital transformation continues to drive IT strategy, How is QA and testing ...
Digital transformation continues to drive IT strategy, How is QA and testing ...QA or the Highway
 
A project report on gap analysis of service delivered to sundaram finance ltd
A project report on  gap analysis of service delivered to sundaram finance ltdA project report on  gap analysis of service delivered to sundaram finance ltd
A project report on gap analysis of service delivered to sundaram finance ltdBabasab Patil
 
SXSW 2016 takeaways
SXSW 2016 takeawaysSXSW 2016 takeaways
SXSW 2016 takeawaysHavas
 

Destaque (7)

Customer Adoption is the new ROI
Customer Adoption is the new ROICustomer Adoption is the new ROI
Customer Adoption is the new ROI
 
Adoption of Technology Facilitated Services
Adoption of Technology Facilitated ServicesAdoption of Technology Facilitated Services
Adoption of Technology Facilitated Services
 
Technology executive summary
Technology executive summaryTechnology executive summary
Technology executive summary
 
Digital transformation continues to drive IT strategy, How is QA and testing ...
Digital transformation continues to drive IT strategy, How is QA and testing ...Digital transformation continues to drive IT strategy, How is QA and testing ...
Digital transformation continues to drive IT strategy, How is QA and testing ...
 
A project report on gap analysis of service delivered to sundaram finance ltd
A project report on  gap analysis of service delivered to sundaram finance ltdA project report on  gap analysis of service delivered to sundaram finance ltd
A project report on gap analysis of service delivered to sundaram finance ltd
 
Growth spurts - orthodontics
 Growth spurts - orthodontics Growth spurts - orthodontics
Growth spurts - orthodontics
 
SXSW 2016 takeaways
SXSW 2016 takeawaysSXSW 2016 takeaways
SXSW 2016 takeaways
 

Semelhante a Maximizing Technology Adoption ROI - Eric Vanderburg - CodeMash 2014

Safeguard Commercial Success with a Strategic Monitoring Approach
Safeguard Commercial Success with a Strategic Monitoring ApproachSafeguard Commercial Success with a Strategic Monitoring Approach
Safeguard Commercial Success with a Strategic Monitoring Approachmadelinestack
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
Future Trends Of The CIO - SFSU CIO Development Program 2014
Future Trends Of The CIO - SFSU CIO Development Program 2014Future Trends Of The CIO - SFSU CIO Development Program 2014
Future Trends Of The CIO - SFSU CIO Development Program 2014Stuart Appley
 
Check out how Iceland, Lloyds Bank & Cathay Pacific took a "Candidate-First" ...
Check out how Iceland, Lloyds Bank & Cathay Pacific took a "Candidate-First" ...Check out how Iceland, Lloyds Bank & Cathay Pacific took a "Candidate-First" ...
Check out how Iceland, Lloyds Bank & Cathay Pacific took a "Candidate-First" ...Kallidus
 
Validating and Promoting HR Strategies with Data and Analytics
Validating and Promoting HR Strategies with Data and AnalyticsValidating and Promoting HR Strategies with Data and Analytics
Validating and Promoting HR Strategies with Data and AnalyticsMark Lawrence
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseRES
 
Michel hebert info tech - misa presentation
Michel hebert   info tech - misa presentationMichel hebert   info tech - misa presentation
Michel hebert info tech - misa presentationMichel Hébert
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Flexera
 
IT Governance for Board Members
IT Governance for Board MembersIT Governance for Board Members
IT Governance for Board MembersBill Clark
 
Is Mobile Qual a New Method - Field Agent
Is Mobile Qual a New Method - Field AgentIs Mobile Qual a New Method - Field Agent
Is Mobile Qual a New Method - Field AgentMerlien Institute
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
HRM presentation on Infosys
HRM presentation on InfosysHRM presentation on Infosys
HRM presentation on InfosysSumit Suthar
 
EMA Presentation: Driving Business Value with Continuous Operational Intellig...
EMA Presentation: Driving Business Value with Continuous Operational Intellig...EMA Presentation: Driving Business Value with Continuous Operational Intellig...
EMA Presentation: Driving Business Value with Continuous Operational Intellig...ExtraHop Networks
 
Pervasive Analytics Gets Real
Pervasive Analytics Gets RealPervasive Analytics Gets Real
Pervasive Analytics Gets RealCloudera, Inc.
 
BA Masterclass - Top IT trends that can impact your role - SLIDES
BA Masterclass - Top IT trends that can impact your role - SLIDESBA Masterclass - Top IT trends that can impact your role - SLIDES
BA Masterclass - Top IT trends that can impact your role - SLIDESPete Clouston
 
How Mobile BI can Impact Your Organization
How Mobile BI can Impact Your OrganizationHow Mobile BI can Impact Your Organization
How Mobile BI can Impact Your OrganizationEmtec Inc.
 
Holger Mueller - How The Cloud changes Everything in Social Business
Holger Mueller - How The Cloud changes Everything in Social BusinessHolger Mueller - How The Cloud changes Everything in Social Business
Holger Mueller - How The Cloud changes Everything in Social BusinessOpenKnowledge srl
 
Governance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGovernance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGoutama Bachtiar
 

Semelhante a Maximizing Technology Adoption ROI - Eric Vanderburg - CodeMash 2014 (20)

Safeguard Commercial Success with a Strategic Monitoring Approach
Safeguard Commercial Success with a Strategic Monitoring ApproachSafeguard Commercial Success with a Strategic Monitoring Approach
Safeguard Commercial Success with a Strategic Monitoring Approach
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
Future Trends Of The CIO - SFSU CIO Development Program 2014
Future Trends Of The CIO - SFSU CIO Development Program 2014Future Trends Of The CIO - SFSU CIO Development Program 2014
Future Trends Of The CIO - SFSU CIO Development Program 2014
 
Check out how Iceland, Lloyds Bank & Cathay Pacific took a "Candidate-First" ...
Check out how Iceland, Lloyds Bank & Cathay Pacific took a "Candidate-First" ...Check out how Iceland, Lloyds Bank & Cathay Pacific took a "Candidate-First" ...
Check out how Iceland, Lloyds Bank & Cathay Pacific took a "Candidate-First" ...
 
Validating and Promoting HR Strategies with Data and Analytics
Validating and Promoting HR Strategies with Data and AnalyticsValidating and Promoting HR Strategies with Data and Analytics
Validating and Promoting HR Strategies with Data and Analytics
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern Enterprise
 
Michel hebert info tech - misa presentation
Michel hebert   info tech - misa presentationMichel hebert   info tech - misa presentation
Michel hebert info tech - misa presentation
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
 
IT Governance for Board Members
IT Governance for Board MembersIT Governance for Board Members
IT Governance for Board Members
 
Is Mobile Qual a New Method - Field Agent
Is Mobile Qual a New Method - Field AgentIs Mobile Qual a New Method - Field Agent
Is Mobile Qual a New Method - Field Agent
 
A Career In IT
A Career In ITA Career In IT
A Career In IT
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
HRM presentation on Infosys
HRM presentation on InfosysHRM presentation on Infosys
HRM presentation on Infosys
 
EMA Presentation: Driving Business Value with Continuous Operational Intellig...
EMA Presentation: Driving Business Value with Continuous Operational Intellig...EMA Presentation: Driving Business Value with Continuous Operational Intellig...
EMA Presentation: Driving Business Value with Continuous Operational Intellig...
 
Pervasive Analytics Gets Real
Pervasive Analytics Gets RealPervasive Analytics Gets Real
Pervasive Analytics Gets Real
 
BA Masterclass - Top IT trends that can impact your role - SLIDES
BA Masterclass - Top IT trends that can impact your role - SLIDESBA Masterclass - Top IT trends that can impact your role - SLIDES
BA Masterclass - Top IT trends that can impact your role - SLIDES
 
How Mobile BI can Impact Your Organization
How Mobile BI can Impact Your OrganizationHow Mobile BI can Impact Your Organization
How Mobile BI can Impact Your Organization
 
Holger Mueller - How The Cloud changes Everything in Social Business
Holger Mueller - How The Cloud changes Everything in Social BusinessHolger Mueller - How The Cloud changes Everything in Social Business
Holger Mueller - How The Cloud changes Everything in Social Business
 
Governance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGovernance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 Framework
 

Mais de Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumEric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveEric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgEric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatEric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology managementEric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technologyEric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challengesEric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: RoboticsEric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercisesEric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemEric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsEric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgEric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgEric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgEric Vanderburg
 

Mais de Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Maximizing Technology Adoption ROI - Eric Vanderburg - CodeMash 2014

  • 1. Maximizing Technology Adoption ROI CodeMash 2014 January 9, 2014 Eric A. Vanderburg, MBA, CISSP Director, Information Systems and Security Computer Forensic and Investigation Services © 2014 Property of JurInnov Ltd. All Rights Reserved
  • 2. Questions • How does an organization adopt technology? • What factors are important? • What makes technology initiatives succeed? 2 © 2014 Property of JurInnov Ltd. All Rights Reserved
  • 3. Factors of Systems adoption Ease of Use New IS Adoption Visibility Trialability Relative Advantage Compatibility Rogers (1962, 1983) © 2014 Property of JurInnov Ltd. All Rights Reserved 3
  • 4. Process Get aware Interest Evaluate © 2014 Property of JurInnov Ltd. All Rights Reserved 4 Implement Confirm
  • 5. Communicate • Communicate what we are doing “IT’s inability to market effectively cements its cost center role in the enterprise: communicating status but not value, fulfilling requests but not solving problems, and partially deploying technologies but not delivering expected results.” -Laurie Orlov, Forrester • • • • • • Policies Service updates Customer service feedback Employee engagement results Government priorities Industry reports and standards © 2014 Property of JurInnov Ltd. All Rights Reserved 5
  • 6. Align to Culture • Deeper understanding of culture • Leadership’s shaping of culture • Cultural change factors • Enacting transformational change • Barriers • Temporary tradeoffs © 2014 Property of JurInnov Ltd. All Rights Reserved
  • 7. Change factors Evolutionary     Hybridization: secondary contrary or different cultural elements with primary elements Growth impacts innovation Increased assets affects risk tolerance Lewin Change Model Disconfirmation Transformative     Can a successful organization change without a significant event? Ex: Pearl harbor of data breaches Lewin Change Model © 2014 Property of JurInnov Ltd. All Rights Reserved Learning Incorporation
  • 8. For assistance or additional information • • • • • • • Phone: Web: Email: Twitter: Facebook: Linkedin: Youtube: 216-664-1100 www.jurinnov.com eric.vanderburg@jurinnov.com @evanderburg www.facebook.com/VanderburgE www.linkedin.com/in/evanderburg www.youtube.com/user/evanderburg JurInnov Ltd. The Idea Center 1375 Euclid Avenue, Suite 400 Cleveland, Ohio 44115 8 © 2014 Property of JurInnov Ltd. All Rights Reserved