We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 2,229 results
  1. Siemens: Acting Resiliently Through Hybrid Process Intelligence in the Supply Chain Metaverse

    In the face of disruptions like COVID-19, the Ukraine conflict, or the Suez Canal blockage, Siemens Supply Chain Management is encountering various...
    Robert Morgner, Markus Burger in Process Intelligence in Action
    Chapter 2024
  2. Kimberly-Clark: Process Intelligence as Catalyst for Supply Chain and Global Business Services Transformation

    Discovering process mining capability was a great fit for Kimberly-Clark’s circumstances. While seeking out back-office efficiency opportunities, we...
    Sara Johnson, Julie Jones, ... Zach Elliott in Process Intelligence in Action
    Chapter 2024
  3. Ingka: Inspiring a Community for Open Exchange

    In a world where we are all learning about what process mining is and where it can be effectively delivered, sharing what we’ve proven, what we have...
    Chapter 2024
  4. Uniper: Empowering Business Transformation Through Process Orchestration

    In the fast-evolving landscape of today’s business environment it is essential for companies to be able to steer their end-to-end processes to...
    Christian Flötotto in Process Intelligence in Action
    Chapter 2024
  5. Operating Models and Centers of Excellence

    To leverage the Process Intelligence capability, a suitable operating model should be adopted to the organization’s DNA, with one strong driving team...
    Lars Reinkemeyer in Process Intelligence in Action
    Chapter 2024
  6. Key Learnings

    As a summary of Part I, this chapter comprises the ten key learnings from the previous chapters. The following 10 key learnings have been described...
    Lars Reinkemeyer in Process Intelligence in Action
    Chapter 2024
  7. How to Get Started

    Starting right sets the foundation to stay on your happy path and achieve your aspirations. Experiences, examples and practical tips for this initial...
    Lars Reinkemeyer in Process Intelligence in Action
    Chapter 2024
  8. Preparing for Forensic Analysis

    This chapter is intimately linked with Incident Response. First you respond to an incident to contain it, then you must analyze it. It is important...
    Chapter 2024
  9. Security Awareness: Brave New World

    Computer security is a challenge. An attacker only needs to find one hole…but a defender needs to close all holes. Since it is impossible to close...
    Chapter 2024
  10. Designing Physical Security

    Physical security may be overlooked because it is not as complex or interesting as technology security. Assets are things of value, and may include...
    Chapter 2024
  11. Designing Information Security

    Criminals and spies concentrate on stealing, modifying or destroying financial account information, trade secrets, and internal organization data....
    Chapter 2024
  12. Complying with HIPAA and HITECH

    The Health Insurance Portability & Accountability Act (HIPAA) of 1996 was a bipartisan bill implemented as part of United States law. HIPAA addressed...
    Chapter 2024
  13. Planning for Alternative Networks: Cloud Security and Zero Trust

    This chapter discusses alternative network configurations: cloud computing and the advanced network configuration: zero trust. The vast majority of...
    Chapter 2024
  14. Planning for Network Security

    The Internet allows an attacker to attack from anywhere in the world from their home desk. They just need to find one vulnerability, while a security...
    Chapter 2024
  15. Complying with U.S. Security Regulations

    What security regulation(s) must your organization adhere to? What must you implement as part of that regulation? How important is it to adhere to...
    Chapter 2024
  16. Planning for Secure Software Requirements and Design with UML

    It is not possible to build an excellent software product quickly without understanding the requirements. It is known in the security world (and...
    Chapter 2024
  17. Maturing Ethical Risk

    The pervasive and accepted thought when dealing with cybersecurity is to evaluate risk from the organization’s perspective: the organization protects...
    Chapter 2024
  18. Managing Risk

    The field of security – and American regulation – realizes that not all organizations need the same level or type of security. Banks need more...
    Chapter 2024
  19. Complying with the European Union General Data Protection Regulation (GDPR)

    Europe has a common overarching regulation that focuses on data privacy and is exemplary in the rights it affords its constituents. This chapter...
    Chapter 2024
  20. Complying with the PCI DSS Standard

    It is hard to be in business without making money, so one of the first standards that must be adhered to internationally, is the Payment Card...
    Chapter 2024
Did you find what you were looking for? Share feedback.