Measuring the Outcome of a High Consequence Training Program
This article explores the measurement of training outcomes to guarantee a well-rounded, effective and continually useful high consequence training program.
Read moreTraining in Business Resources and Trends
This article explores the measurement of training outcomes to guarantee a well-rounded, effective and continually useful high consequence training program.
Read moreCyberwarfare is changing the very nature of armed conflicts. Nations, terrorist groups, hacktivists and criminal organizations are moving beyond the traditional means of destruction into using technology as a method of disrupting systems and networks.
Read moreThere is no question that client expectations and needs are changing. Internal and external clients are demanding more customized solutions that deliver more business value. They also expect projects to be executed more quickly than ever before. As a consultant required to recommend client solutions, you must be able to properly understand the client’s needs, which may be poorly defined – especially where innovation is involved. You must also be able to assess the client’s situation and recommend a solution that meets increasingly demanding expectations.
Read moreThe second article in the three-part series, “The Business Case for T-Shaped Leaders – Why Your Company Needs Them” will explore why universities and corporations are in the early stages of building T-shaped curriculum into their leadership development programs.
Read moreAs with all technologies, the biggest security threat emerges from end users’ device management habits. The best security ever devised can fall apart if a user writes their ID and password on the side of a two-factor key and then drops it in the hall. Security can also fall apart if end users visit malicious websites. Sure these threat conditions have existed since the first days of the Internet, but Bring Your Own Device (BYOD) has focused security attention on devices once again.
Read more