Icon info
EN
Search results
https://www.antwerpmanagementschool.be/en
Home
https://www.antwerpmanagementschool.be/en/search
Search

Search

Search

About 1781 results

Give the public sector the leadership it deserves

"Two feet on the ground, getting people moving. Not waiting for the mandate. Daring to look in the mirror every day. Not the leadership but the effect."

These are some testimonies about leadership from the participants of the AMS Masterclass Leadership for the public and social profit sector. Throughout the course, they took the step from "socialized" to "self-authoring": from using social leadership benchmarks to developing their own definition about what is needed and appropriate. A crucial step toward the leaders the public sector needs to properly address today's many challenges.

Which of these 4 CISO archetypes do you deserve and match with?

Why do CISOs have such a low retention in firms and leave after 1-2 years? Is this because recruiters and HR professionals find it hard to discover what is actually needed and “copy paste” function profiles with the exact same requirements, rather than looking at the real need in the organization: M&A strategy, family business, scale-up phase, consolidation, preparing for sales of the company, cultural differences etc.? The CISO role is an embryonic role compared to the CFO, and not one hundred percent clear about exact expectations.

Digital risks to business, what do they cost?

Analyzing Business Information Security for a data breach use case;

In a digital business world that is highly distributed via an eco-system, ensuring your digital assurance becomes vital. Everything needs to work continuously and Confidentiality, Integrity and Auditability have to be assured, especially when your business is regulated and should demonstrate to be “in control”. Nevertheless, how do we do that when business models can be attacked by hackers? Hackers using heavily automated attack methods and work in a distributed evasive platform-model that disguises their identity and criminal organization. Therefore, hackers form a threat to your business. Varying from State sponsored hackers to scriptkiddies all finding sophisticated ways to hammer on your front porch of your business. To you an IP address means your API store or critical business process; for a hacker it is just an IP number attack, they don't care and don't know the impact.

Why FUD fails and BAD prevails in Digital Security

Many cyber security specialists or security software sales representatives want to convince people to act or buy certain products by frightening them with statements like: “If you don’t do (or buy) this, you will be hacked.” Sadly, this way of communicating is still an often-used approach in Information Security to get the message across or motivate people to “buy” their products or service. We call this the FUD approach. FUD stands for Fear, Uncertainty, and Doubt and was introduced in the late eighties. As of 1991, the expression became fashionable for any form of disinformation used against the competition. FUD is a simple but effective strategy that supplies the audience with negative, fake, or false information to influence their behavior and decisions. FUD is so effective because adverse events have a more significant impact on our brain and associated attitudes than positive ones. In psychology, this is called negative bias. Negative bias can have an effect on behavior as well as your decisions. This is also why the news often spreads negative news because negative news draws greater attention and therefore sells.

Although this might be effective in the short term to get things done, this won’t be a very successful approach in the long term. In this blog I'd like to explain you why.

Going shopping for citizen services with your government platform app?

As a student of the Executive Master in IT Governance and Assurance (aka MITGA), I graduated in June 2020 with a subject that matters to us all: how to find and select the right citizen services from the government to help us? And more importantly, how can governments apply digital technology to their services to facilitate the use of it by citizens? In this blog I would like to give a summary of my research and share my findings with you.

Strategic Approaches to Digital Platform Security Assurance

Nowadays, it is impossible to imagine a business without technology. Most industries are becoming "smarter" and more tech-driven. We live in the era of the "platform society." For example, Coursera has become the world's most prominent online educator, collaborating with over 200 leading universities and companies. Platforms are becoming increasingly powerful and concentrate on collecting more and more data to cross- or upsell services. Ranging from small individual tech initiatives to complete business models with intertwined supply chains and "Platform" based business models. New ways of working, such as Agile and DevOps, are introduced, leading to opportunities and unknown risks.