Tackling the privacy goals and profiling the data and network threats and solutions in a connected world.

  • GDPR came into force on 25 May 2018 with a build-up panicked activity. Noisy and unnecessary? This briefing notes investigates what organisations did wrong and, going forward, the lessons they need to learn with respect to protecting personal data, consent and the governance process.
  • This is an accompanying report to the CIC Software Delivery InFocus Podcast Series The difference your Mainframe investments can make to GDPR compliance.To understand how IBM Z customers can leverage their investments to aid GDPR compliance, Creative Intellect Consulting’s Principal Analyst, Ian Murphy, speaks with Distinguished Engineer and 22-year IBM veteran Francoise Alabiso. In this report we outline and summarise important insights from the discussion and offer guidance as to what customers can look to gain from both the IBM Z platform and team. The recommended take away points within this report will help support a strategy for GDPR compliance through IBM Z.
  • Security – along with data privacy and protection – is sacrosanct in healthcare and is the basis of trust in administering clinical services. Much is at stake when a cyber-attack occurs: foremost patients’ lives and a hospital’s reputation, but also legal and financial repercussions. For healthcare organizations to take full advantage of digital technologies and services, and, to securely support the exponential growth of IoT devices, the right kind of ICT infrastructure is vital. In this report that is related to CIC’s insights into the network foundations for IoT and connected healthcare,  we specifically look to:
    • Identifying how Cybercrime is the flip side of digitisation
    • The implications of a security failure to healthcare
    • The requirements of a secure, connected healthcare infrastructure
    • The importance of encryption
    • Cisco’s security strategy for connected healthcare
    Related Reports To learn more about connected healthcare and Cisco’s offerings in this area, please see the other reports in this series: Download an infographic overview to the whole series.
  • Organisations are looking to implement strategies and processes that allow them to successfully operate in the digital economy. They need guidance to understand how best to achieve their goals and what supporting practices will ensure the most effective and efficient approaches. While no two organisations are the same, learn how Deutsche Telekom’s strategy for enabling employees with the right tools, using a workplace they find comfortable, can drive their organisation forward.
  • Organisations are looking to implement strategies and processes that allow them to successfully operate in the digital economy. They need guidance to understand how best to achieve their goals and what supporting practices will ensure the most effective and efficient approaches. While no two organisations are the same, learn how BP Castrol employs customer-centred outcomes, planning and enterprise architecture to support its investments in agile and DevOps.
  • Despite the hype and noise, Distributed Ledger Technology (DLT) and Blockchains  hold great promise in healthcare if executed correctly.  And there lies the challenge…’If done correctly!’ This CIC report sees Dr Robert M. Learney, a qualified doctor who studied medicine at Oxford University present the operational opportunities that blockchain and DLT could deliver to the healthcare ecosystem. Many will want and need to understand what is practical and how such technologies can address the demands and changing dynamics of the healthcare stakeholder community. Important questions such as how DLT and blockchains can advance and secure engagements and interactions within national and global healthcare networks. Specifically, CIC’s report offers insights into how DLT and Blockchains can be used to break walls between data silos and offer new ways for standardising healthcare data. Readers will be left with a number of take-away points that they can use to learn from what is promised by distributed ledger technology in healthcare and what has emerged so far.
  • In this CIC case study, you will learn how a 40+ year old leading furniture retailer in South Florida undertook a successful mobile transformation to improve its workforce’s productivity. Important points of focus:
    • An overview of the transformational journey that City Furniture needed to undertake
    • Discover four key insights underpinning City Furniture’s transformation execution
    • Review the dynamics of a transformation in action
    • Take away five essential lessons that can help guide other journeys
  • It's just three years since IBM set out a new security framework, designed to secure businesses operating over multiple platforms from on-premises to managed services and the cloud. Since then, the whole security focus at IBM has undergone radical restructuring and become its own division, with control over its own destiny. The result is a security approach that covers mobile devices to mainframes, on-premises deployment to cloud and a federated architecture that offers hope for the future. At IBM Interconnect 2015, the vendor’s newly formatted premier Cloud and mobile conference held in Las Vegas from 22nd to 27th February, CIC got a feel for the drive propelling the newly formed Security Business Unit forward.
  • Like many technologies, there has never been a golden age for computer security, where systems were perfectly secure and no-one did anything remotely bad. Mainframes and minicomputers were just as susceptible to people using acoustic couplers, low speed modems and hacking into local accounts in the 20th Century as modern systems are to hackers in the 21st Century. What has changed is the scale and the nature of the threat. That continually evolving threat means that the Chief Information Security Officer (CISO) and Chief Information Office (CIO) are struggling to understand how to combat the risk to the enterprise. IBM believes that, with decades of experience and a multi-billion dollar investment in this area, it can deliver the right architecture, knowledge, tools and skills to help solve this problem. In this report we take a look at IBM’s latest security story and how it is evolving to meet the threat which enterprises are facing.
  • The biggest non-news every year is the surveys that say c-level executives worry about protecting corporate data. It is time to evolve the way we do security and to introduce new approaches to dealing with new threats. In this article we look at the cost of getting security wrong and how we need to change.
  • Bola Rotibi, Research Director, Creative Intellect Consulting and founding member of the (ISC)2 Application Security Advisory Board, looks at the ‘ownership’ challenge in securing software. Reprint.
  • As we have begun to closely define the technologies that make up Cloud computing, the overuse of the phrase is causing confusion and no where moreso than in the crucial area of security in the Cloud. This reports examines what it really means in detail.
  • In October and November 2010, Creative Intellect Consulting UK undertook a survey to understand the impact of security on the software development and delivery processes. This report, carried out after an in- depth survey with members of information security professional body (ISC)2; the International Association of Software Architects (IASA); software development, IT and information security professionals; and software architects around the world, represents current practices firmly in the dock. It throws up in black and white just how serious the issue is.