Transforming A Business The Data Driven Way

Caroline Carruthers and Peter Jackson who are authors of Data Driven Business Transformation have now published the Chief Data Officer’s Playbook, a manual for newly-appointed data leaders who have joined companies that are planning to or have recently started on a journey of data transformation.
 
Their earlier book, Data Driven Business Transformation, illustrates how to find the secrets to fast adaptation and disruptive origination hidden in your data and how to use them to capture market share.
 
Digitalisation - or the Digital Revolution - was the first step in an evolving process of analysis and improvement in the operations and administration of commerce.  Carruthers and Jackson, two global leaders in data transformation and education, pick up the conversation here at the next evolutionary step where data from these digital systems generates value, and really use data science to produce tangible results
 
Now the new and rapidly expanding role of the Chief Data Officer (CDO) is of significant interest and relevance to
organisations and data professionals internationally. And so Chief Data Officer’s Playbook is written by two practicing CDOs, and this new book offers a jargon-free, practical guide to making better decisions based on data. 
 
Content covered includes:
 
  • why does any organisation need a CDO?
  • the secret ingredients of the successful CDO
  • avoiding the hype cycle
  • building the CDO team
  • who leads the technology?
  • the CDO and data governance: enablement not red tape.
This book will offer key insight for CDOs looking to understand their position better, for aspiring CDOs and data officers looking at career progression, for those recruiting CDOs, and offers essential knowledge for anyone else operating in the current data environment.
 
They have also launch the book in parts and the latest instalment, Data Driven Business Transformation-How to disrupt, innovate and stay ahead of the competition, is out now. One is to use data properly and responsibly. Another is that a data driven business transformation is not the same as a digital-driven or a digital transformation and this book is making the case for the former.
 
“You should have a data enabled organisation with ethics and governance built in,” they write.
 
This book also has tools for the implementation of such a transformation, but there are levels to it. A low level transformation is the transformation of a single business process, enabled by data. Companies that have a higher level of data maturity can go through a data-driven business transformation which transforms the whole organisation but reaches an end state.
 
The top tier transformation, that can only be attempted by the most data mature organisations, is a total data driven business transformation with the end goal of continuous improvement. Carruthers and Jackson named this type of transformation ‘D3’.
 
They wrote: “A shift to this level of transformation will be seismic and fundamental but will set up an organisation to succeed and continue to succeed as markets, competitors, opportunities and challenges develop and continue to emerge, both internally and externally.”
 
A D3 approach encompasses changes to people, processes and technology and is all about taking an incremental approach to testing and iterating to make cumulative gains.
 
The chapters explain the steps to be taken and are illustrated by sharp diagrams and boxes of questions and diagrams that enable to reader to assess their company’s readiness in terms of factors such as the starting place, tools and method.
To enable a data driven business transformation, at any level, the authors stated that seven elements underpin that transformation and should be used as a constant guide. 
  • The first element is dynamic and continuous change with an ever-evolving end state and vision. 
  • The second element is a cultural shift towards data and how it is used that will support more agile methodologies.
  • Leadership is the third element. 
  • The fourth is a change of focus to ‘data’ from ‘technology’ and ‘digital’. The fifth element is a mindset to succeed and the recruitment of people with the right skills to achieve that success. 
  • The penultimate element is organisation-wide understanding of the maturity starting point before the transformation begins. And the final element is people.
They wrote “… people… are the powerhouse of creativity that will mobilise the data, keep it safe and ensure it is used ethically.”  They added: “We need to make sure we humanise the data transformation.”
 
The conclusion recaps the previous chapters and includes many peppy phrases that would encourage a data professional to go forth and get on the road to a data driven transformation.
 
"Data is there to be used, don’t ignore it. Become data cheerleaders like us and create a future where we leverage the real power of data.”
 
Essentially, they have laid out methods and processes to move forward and transform in a data driven way.
 
DataIQ:        FacetPublishing:     Book Depository:
 
You Might Also Read: 
 
Digital Shock: Special Report (£):
 
Big-Data Analytics Risks Becoming Jammed:
 
 
« The Global Cyber Skills & Training Shortage
Cyber Security: A Guide For Education Providers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Axiomatics

Axiomatics

Axiomatics provides dynamic authorization and access control solutions to protect critical data assets.

Emerson Electric Co

Emerson Electric Co

Emerson provides industrial automation systems and associated cybersecurity solutions to protect critical process control systems from cyber attack.

DefenseStorm

DefenseStorm

DefenseStorm is a Security Data Platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective.

Dreamlab Technologies

Dreamlab Technologies

Over the last 20 years, Dreamlab Technologies has established itself as a source of constant innovation within the information security landscape.

Business Hive Vilnius (BHV)

Business Hive Vilnius (BHV)

BHV is one of the oldest startup incubator and technology hubs in the Baltics, primarily focused on hardware, security, blockchain, AI, fintech and enterprise software.

Founder Shield

Founder Shield

Founder Shield is a data driven insurance brokerage focused excusively on rapidly evolving high-growth companies.

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center is dedicated to combating adversaries who desire to harm our citizens, our government, and our industry through cyber-attacks.

BrandShelter

BrandShelter

BrandShelter specializes in providing online brand protection for companies and trademark owners.

Cyber Polygon

Cyber Polygon

Cyber Polygon is an annual online exercise which connects various global organisations to train their competencies and exchange best practices.

Conatix

Conatix

Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity.

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC) is an information security company providing website vulnerability scanning and monitoring services.

NSR

NSR

NSR provide trusted solutions that deliver positive business outcomes for our clients in cybersecurity and data protection challenges.

Moss Adams

Moss Adams

Moss Adams is a fully integrated professional services firm dedicated to assisting clients with growing, managing, and protecting prosperity.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

RedLegg

RedLegg

RedLegg is a master provider of information security services, a boutique, nimble, old-fashioned customer service company that enjoys the technology battlefield.

Adaptiva

Adaptiva

Adaptiva, the autonomous endpoint management company, delivers the fastest way to patch and manage endpoints at scale.