Search
Search Results
-
Siemens: Acting Resiliently Through Hybrid Process Intelligence in the Supply Chain Metaverse
In the face of disruptions like COVID-19, the Ukraine conflict, or the Suez Canal blockage, Siemens Supply Chain Management is encountering various... -
Kimberly-Clark: Process Intelligence as Catalyst for Supply Chain and Global Business Services Transformation
Discovering process mining capability was a great fit for Kimberly-Clark’s circumstances. While seeking out back-office efficiency opportunities, we... -
Ingka: Inspiring a Community for Open Exchange
In a world where we are all learning about what process mining is and where it can be effectively delivered, sharing what we’ve proven, what we have... -
Uniper: Empowering Business Transformation Through Process Orchestration
In the fast-evolving landscape of today’s business environment it is essential for companies to be able to steer their end-to-end processes to... -
Operating Models and Centers of Excellence
To leverage the Process Intelligence capability, a suitable operating model should be adopted to the organization’s DNA, with one strong driving team... -
Key Learnings
As a summary of Part I, this chapter comprises the ten key learnings from the previous chapters. The following 10 key learnings have been described... -
How to Get Started
Starting right sets the foundation to stay on your happy path and achieve your aspirations. Experiences, examples and practical tips for this initial... -
Preparing for Forensic Analysis
This chapter is intimately linked with Incident Response. First you respond to an incident to contain it, then you must analyze it. It is important... -
Security Awareness: Brave New World
Computer security is a challenge. An attacker only needs to find one hole…but a defender needs to close all holes. Since it is impossible to close... -
Designing Physical Security
Physical security may be overlooked because it is not as complex or interesting as technology security. Assets are things of value, and may include... -
Designing Information Security
Criminals and spies concentrate on stealing, modifying or destroying financial account information, trade secrets, and internal organization data.... -
Complying with HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA) of 1996 was a bipartisan bill implemented as part of United States law. HIPAA addressed... -
Planning for Alternative Networks: Cloud Security and Zero Trust
This chapter discusses alternative network configurations: cloud computing and the advanced network configuration: zero trust. The vast majority of... -
Planning for Network Security
The Internet allows an attacker to attack from anywhere in the world from their home desk. They just need to find one vulnerability, while a security... -
Complying with U.S. Security Regulations
What security regulation(s) must your organization adhere to? What must you implement as part of that regulation? How important is it to adhere to... -
Planning for Secure Software Requirements and Design with UML
It is not possible to build an excellent software product quickly without understanding the requirements. It is known in the security world (and... -
Maturing Ethical Risk
The pervasive and accepted thought when dealing with cybersecurity is to evaluate risk from the organization’s perspective: the organization protects... -
Managing Risk
The field of security – and American regulation – realizes that not all organizations need the same level or type of security. Banks need more... -
Complying with the European Union General Data Protection Regulation (GDPR)
Europe has a common overarching regulation that focuses on data privacy and is exemplary in the rights it affords its constituents. This chapter... -
Complying with the PCI DSS Standard
It is hard to be in business without making money, so one of the first standards that must be adhered to internationally, is the Payment Card...