article thumbnail

Leadership in Cybersecurity

N2Growth Blog

Network systems security. Identity & Access Management (IAM). Below is a list of security initiatives that a security leader would either manage or have parallel impact upon within a business: Data security. Vendor management. Budgeting & forecasting. Disaster Recovery (DR). Application security. Vulnerability Management (VM).

IAM 194
article thumbnail

Your Whole Company Needs to Be Distinctive, Not Just Your Product

Harvard Business Review

For example, Iams pet food was one of the first premium brands; it sold to health-conscious pet owners, who purchased it only at specialized pet stores. In 2014, P&G sold Iams and its related brands (Eukanuba and Natura) to Mars, which had other distinctive pet food brands (like Whiskas) and thus had the requisite capabilities in place.

IAM 11
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

You, Too, Can Move Your Company Into the Cloud

Harvard Business Review

The US Navy is an organization utilizing 1,400 systems and 7,000 applications to serve more than 500,000 employees. While the USN is relatively mum about its specific strategies, there are references to the fact that they intend to cut their systems in half within 36 months, reducing some overhead cost and modernizing. 017%,019% and.00028%

article thumbnail

Why the U.S. Needs More Worker-Owned Companies

Harvard Business Review

Last year 400 members of IAM Maine Lobstering Union bought the wholesale operation of Trenton Bridge Lobster Pound and turned it into a worker-owned cooperative called Lobster 207. One area that seems ripe for this is in the arena of connected and autonomous mobility systems in the automotive and aerospace industries.

ESOP 13