Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
digital innovation
Digital innovation is the adoption of modern digital technologies by a business. Continue Reading
business goals
A business goal is an endpoint, accomplishment or target an organization wants to achieve in the short term or long term. Continue Reading
vertical SaaS (software as a service)
Vertical SaaS describes a type of software as a service solution created for a specific industry, such as retail, financial services, insurance, healthcare or manufacturing. Continue Reading
-
business process mapping
Business process mapping is the visual display of the steps within a business process showing how it's done from start to finish. Continue Reading
digital platform
A digital platform is a web-based structural software package that speeds and eases transactions among users. Continue Reading
transfer learning
Transfer learning is a machine learning method where a model already developed for a task is reused in another task.Continue Reading
enterprise IT (enterprise-class IT)
Enterprise-class IT (also known as enterprise-grade, or enterprise IT) is hardware, software and other IT services designed to meet the demands of a large organization.Continue Reading
microtargeting
Microtargeting (also called micro-niche targeting) is a marketing strategy that uses consumer data and demographics to identify the interests and preferences of specific individuals or small groups to send targeted advertisements that align with ...Continue Reading
business process
A business process is an activity or set of activities that accomplish a specific organizational goal. Business processes should have purposeful goals, be as specific as possible and produce consistent outcomes.Continue Reading
business process improvement (BPI)
Business process improvement (BPI) is a practice in which enterprise leaders analyze their business processes to identify areas where they can improve accuracy, effectiveness and efficiency and then make changes within the processes to realize these...Continue Reading
-
Why cloud governance is shifting to business stakeholders
Balancing value creation with innovation is a constant challenge for organizations. Here's what to consider when evaluating the long-term business value of cloud governance.Continue Reading
electronically stored information (ESI)
Electronically stored information (ESI) is data that is created, altered, communicated and stored in digital form.Continue Reading
technology adoption lifecycle
The technology adoption lifecycle describes how different customers accept and adopt new technology, with early adopters enthusiastically embracing new products and services, and later adopters taking longer to make a purchase decision.Continue Reading
IT modernization
IT modernization is the process of updating an organization's information technology infrastructure, practices and systems to keep up with emerging technologies.Continue Reading
sharing economy
The sharing economy, also known as collaborative consumption or peer-to-peer-based sharing, is a concept that highlights the ability -- and perhaps the preference -- of individuals to rent or borrow goods rather than buy and own them.Continue Reading
steering committee
A steering committee comprises a group of high-ranking IT professionals who provide guidance and strategic direction to an organization or organizational segment.Continue Reading
Risk prediction models: How they work and their benefits
Accurate risk prediction models can aid risk management efforts in organizations. Here's a look at how risk models work and the business benefits they provide.Continue Reading
16 top ERM software vendors to consider in 2023
Various software tools can help automate risk management and GRC processes. Here's a look at 16 enterprise risk management vendors and their products.Continue Reading
learning management system (LMS)
A learning management system is a software application or web-based technology used to plan, implement and assess a specific learning process.Continue Reading
key risk indicator (KRI)
A key risk indicator (KRI) is a metric for measuring the likelihood that the combined probability of an event and its consequence will exceed the organization's risk appetite and have a profoundly negative impact on an organization's ability to be ...Continue Reading
servant leadership
Servant leadership is a leadership philosophy built on the belief that the most effective leaders strive to serve others, rather than accrue power or take control.Continue Reading
distributed ledger technology (DLT)
Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time.Continue Reading
smart contract
A smart contract is a self-executing computer program that automatically executes the terms of a contract without the involvement of third parties.Continue Reading
10 blockchain quiz questions: Test your understanding
IT leaders are increasingly faced with learning how to implement blockchain in their organizations. Use this blockchain quiz to test your knowledge.Continue Reading
authentic leadership
Authentic leadership is a type of management style in which people act in a real, genuine and sincere way that is true to who they are as individuals.Continue Reading
IT controls
An IT control is a procedure or policy that provides a reasonable assurance that the information technology (IT) used by an organization operates as intended, that data is reliable and that the organization is in compliance with applicable laws and ...Continue Reading
three lines model
The three lines model is a risk management approach to help organizations identify and manage risks effectively by creating three distinct lines of defense.Continue Reading
IT organization (information technology organization)
An IT organization (information technology organization) is the department within a company that's charged with establishing, monitoring and maintaining information technology systems and services.Continue Reading
IT audit (information technology audit)
An IT audit is the examination and evaluation of an organization's information technology, operations and controls.Continue Reading
change request
A change request is a formal proposal for an alteration to some product or system.Continue Reading
ISACA
ISACA is an independent, nonprofit, global association that engages in the development, adoption and use of globally accepted information system (IS) knowledge and practices.Continue Reading
deputy CIO (deputy chief information officer)
Deputy CIO (chief information officer) is a role within some organizations that generally has responsibility for overseeing day-to-day information technology (IT) operations.Continue Reading
Key concepts of public vs. enterprise blockchain
Public and enterprise blockchain have major differences that affect their practicality for specific business applications. Here's what you need to know before deciding.Continue Reading
Electronic Discovery Reference Model (EDRM)
The Electronic Discovery Reference Model (EDRM) is a conceptual framework that outlines activities for the recovery and discovery of digital data.Continue Reading
IT transformation
IT transformation is a complete reassessment and overhaul of an organization's IT systems to improve the efficiency and delivery in a digital economy.Continue Reading
Top 12 risk management skills and why you need them
Effective risk management is necessary in all parts of a business. Here are a dozen skills that risk managers need to be successful in their jobs.Continue Reading
6 open source GRC tools compliance professionals should know
Organizations must meet a variety of regulatory compliance requirements today. Here's a look at six open source GRC tools and related resources that might help.Continue Reading
Top 4 information security strategy essentials CIOs need
Right now, hackers are targeting your organization. Fight back by learning how CIOs can create a resilient and strong information security foundation.Continue Reading
ISO 31000 vs. COSO: Comparing risk management standards
ISO 31000 and the COSO ERM framework are the two most popular risk management standards. Here's what they include and some of their similarities and differences.Continue Reading
rainmaker
A rainmaker is an individual who generates an unusually high amount of revenue for an organization by bringing new clients and new business to the company.Continue Reading
sustainability risk management (SRM)
Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental, social and governance (ESG).Continue Reading
executive dashboard
An executive dashboard is a computer interface that displays the key performance indicators (KPIs) that corporate officers need to effectively run an enterprise.Continue Reading
Risk appetite vs. risk tolerance: How are they different?
Risk appetite and risk tolerance are related terms but not the same thing. Here's how they differ plus examples of risk appetite and risk tolerance statements.Continue Reading
change management strategy
A change management strategy is a plan for or systematic approach to dealing with a transition or transformation in an organization.Continue Reading
10 blockchain uses cases in finance that show value
Blockchain continues to grow in the enterprise as companies in the financial sector expand their use of the technology. Here's a look at 10 established and emerging use cases.Continue Reading
compliance audit
A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.Continue Reading
Explaining risk maturity models and how they work
Explore risk maturity models and assessment tools for enhancing enterprise risk management. Improve ERM programs to mitigate risk and gain a competitive edge.Continue Reading
intrapreneur (intrapreneurship)
The term intrapreneur is a portmanteau of 'internal' and 'entrepreneur,' referring to employees within a company who apply entrepreneurial skills like creativity, initiative and risk-taking to their roles.Continue Reading
innovation manager
An innovation manager is an employee whose responsibilities focus on the development of new products, services or processes.Continue Reading
value proposition
A value proposition is a statement that clearly identifies the benefits a company's products and services will deliver to its customers.Continue Reading
platform economy
Platform economy is the tendency for commerce to increasingly move toward and favor digital platform business models.Continue Reading
disruptive innovation
Disruptive innovation is the idea that when a product or service is introduced into an established industry and performs better and/or costs less than existing offerings, it can displace the market leaders and even transform the industry.Continue Reading
data protection impact assessment (DPIA)
A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, procedures or technologies affect individuals' privacy and eliminate any risks that might violate compliance.Continue Reading
The negative impact of technical debt
Adding features on top of poorly written code is a recipe for a bad reputation and a compromised user experience. Here's a look at 12 negative effects of technical debt.Continue Reading
Dodd-Frank Act
The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.Continue Reading
How to become a smart contract developer
Blockchain fundamentals, programming knowledge, security awareness, and experience in testing and debugging are among the major requirements in smart contract development.Continue Reading
ledger database
A ledger database is somewhat modern and commonly refers to a type of database that uses cryptographic techniques, including blockchain, to secure data and enable an immutable ledger.Continue Reading
SIPOC (suppliers, inputs, process, outputs, customers) diagram
A SIPOC (suppliers, inputs, process, outputs, customers) diagram is a visual tool for documenting a business process from beginning to end prior to implementation.Continue Reading
public data
Public data is information that can be shared, used, reused and redistributed without restriction.Continue Reading
Hyperledger
Hyperledger is a collection of open source projects created to support the development of blockchain-based distributed ledgers.Continue Reading
prototyping model
The prototyping model is a systems development method in which a prototype is built, tested and then reworked as necessary until an acceptable outcome is achieved from which the complete system or product can be developed.Continue Reading
RFI vs. RFP vs. RFQ: What are the differences?
A request for information, a request for proposal and a request for quote are critical documents for procurement. Learn what differentiates each one and when to use them.Continue Reading
digital ecosystem
A digital ecosystem is a group of interconnected information technology resources that can function as a unit.Continue Reading
9 benefits of cryptocurrency in business
Businesses adopting cryptocurrency can potentially improve their financial liquidity, attract new customers, ensure transaction transparency, reduce fraud and align with Web 3.0.Continue Reading
procurement plan
A procurement plan -- also called a procurement management plan -- is a document that is used to manage the process of finding and selecting a vendor.Continue Reading
AI transparency: What is it and why do we need it?
As the use of AI models has evolved and expanded, the concept of transparency has grown in importance. Learn about the benefits and challenges of AI transparency.Continue Reading
How to write an RFP for a software purchase, with template
Software buying teams should understand how to create an effective RFP. Here's a look at what components to include, along with a free, customizable template.Continue Reading
What are the 4 different types of blockchain technology?
Public, private, hybrid or consortium, each blockchain network has distinct pluses and minuses that largely drive its ideal uses -- and will determine which one is best for you.Continue Reading
Blockchain vs. database: Similarities, differences explained
Choosing between blockchain and traditional databases -- or using them together -- requires knowing how each one handles data management and the skills needed to make them work.Continue Reading
5 tips to successfully implement blockchain for businesses
When implementing blockchain, organizations should consider what problem they're trying to solve and how blockchain technology will add lasting value.Continue Reading
Generally Accepted Recordkeeping Principles (the Principles)
Generally Accepted Recordkeeping Principles is a framework for managing records in a way that supports an organization's immediate and future regulatory, legal, risk mitigation, environmental and operational requirements.Continue Reading
Information Age
The Information Age is the idea that access to and the control of information is the defining characteristic of this current era in human civilization.Continue Reading
compliance framework
A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with established regulations, specifications or legislation.Continue Reading
qualitative data
Qualitative data is information that cannot be counted, measured or easily expressed using numbers.Continue Reading
green IT (green information technology)
Green IT (green information technology) is the practice of creating and using environmentally sustainable computing resources.Continue Reading
12 tips for evaluating RFP responses
Buying teams should streamline the request for proposals process to find a suitable vendor. These tips can help an organization evaluate RFP responses effectively.Continue Reading
5 must-know blockchain trends for 2023 and beyond
The 'crypto winter' dampened interest in cryptocurrency and proved the need for regulation, but blockchain continues to advance. These trends should set the tone.Continue Reading
Agile Manifesto
The Agile Manifesto is a document that identifies four key values and 12 principles that its authors believe software developers should use to guide their work.Continue Reading
Total Quality Management (TQM)
Total Quality Management (TQM) is a management framework based on the belief that an organization can build long-term success by having all its members -- from low-level workers to its highest-ranking executives -- focus on improving quality and, ...Continue Reading
systems thinking
Systems thinking is a holistic approach to analysis that focuses on the way that a system's constituent parts interrelate and how systems work over time and within the context of larger systems.Continue Reading
crowdsourcing
Crowdsourcing is the practice of turning to a body of people to obtain needed knowledge, goods or services.Continue Reading
synthetic data
Synthetic data is information that's artificially manufactured rather than generated by real-world events.Continue Reading
corporate social responsibility (CSR)
Corporate social responsibility (CSR) is a strategy undertaken by companies to not just grow profits, but also to take an active and positive social role in the world around them. The term is also associated with the related term corporate ...Continue Reading
knowledge-based systems (KBSes)
Knowledge-based systems (KBSes) are computer programs that use a centralized repository of data known as a knowledge base to provide a method for problem-solving.Continue Reading
Sarbanes-Oxley Act
The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.Continue Reading
project charter
A project charter is a formal short document that states a project exists and provides project managers with written authority to begin work.Continue Reading
leadership
Leadership is the ability of an individual or a group of people to influence and guide followers or members of an organization, society or team.Continue Reading
transaction
In computing, a transaction is a set of related tasks treated as a single action.Continue Reading
lean management
Lean management is an approach to managing an organization that supports the concept of continuous improvement, a long-term approach to work that systematically seeks to achieve small, incremental changes in processes in order to improve efficiency ...Continue Reading
device ID (device identification)
A device ID (device identification) is an anonymous string of numbers and letters that uniquely identifies a mobile device such as a smartphone, tablet or smartwatch.Continue Reading
hackathon
A hackathon, also known as a codefest, is a social coding event that brings computer programmers and other interested people together to improve upon or build a new software program.Continue Reading
proof of concept (POC)
A proof of concept (POC) is a demonstration of a product in which work is focused on determining whether an idea can be turned into a reality.Continue Reading
hard skills
Hard skills are specific abilities, capabilities and skill sets that an individual can possess and demonstrate in a measured way.Continue Reading
Top metaverse platforms to know about in 2023
It's early days for metaverse platforms, especially those geared for the enterprise. Here's what to know and which platforms to keep an eye on in 2023.Continue Reading
4 types of employee reactions to a digital transformation
The success of a digital transformation project depends on employee buy-in. Discover how organizations can address employee reactions to digital transformation.Continue Reading
enterprise project management (EPM)
Enterprise project management (EPM) represents the professional practices, processes and tools involved in managing multiple projects taking place simultaneously across the enterprise.Continue Reading
SWOT analysis (strengths, weaknesses, opportunities and threats analysis)
SWOT analysis is a framework for identifying and analyzing an organization's strengths, weaknesses, opportunities and threats.Continue Reading
IT strategy (information technology strategy)
IT strategy (information technology strategy) is a comprehensive plan that outlines how technology should be used to meet IT and business goals.Continue Reading
8 top Web 3.0 use cases and examples
Smart contracts, automated content creation, targeted advertising, community building and metaverse-like experiences are some of the benefits from anticipated Web 3.0 applications.Continue Reading
10 core features of Web 3.0 technology
Web 3.0 promises to provide what Web 2.0 can't: autonomy for content creators to monetize their own data through blockchain, decentralization, user data ownership and private keys.Continue Reading