Skip to main content
 

chief

Results 1 - 25 of 228Sort Results By: Published Date | Title | Company Name
Published By: Workday Netherlands     Published Date: Mar 28, 2019
Uit nieuw onderzoek van IDC en Workday blijkt dat er in veel organisaties een digitale disconnectie bestaat. De kloof tussen de agenda van de CDO en het vermogen van de belangrijkste bedrijfssystemen om het bredere digitale transformatieprogramma te ondersteunen, wordt steeds groter. Dit heeft verschillende oorzaken: 80% zegt dat ze nieuwe digitale oplossingen niet, of slechts met moeite, kunnen integreren met bestaande processen voor finance en HR 80% geeft aan dat ze niet, of slechts met moeite, kunnen beschikken over realtime forecasts en dashboards 80% vindt het moeilijk of onmogelijk om finance- en HR-processen aan te passen aan nieuwe wet- en regelgeving Download ons whitepaper en lees alles over succesvolle, schaalbare digitale transformatie – en hoe u een digitale impasse voorkomt.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday Netherlands
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss
    
Blue Coat Systems
Published By: Metafuse     Published Date: Sep 26, 2007
In speaking with project managers, directors of operations, vice presidents of professional services, chief financial offers, and other project team members every day, we hear familiar stories repeatedly and there are some trends, or commonalities. This document outlines five of the most common project management challenges.
Tags : 
project management, document management, project planning, project, enterprise resource planning, erp, planning, metafuse
    
Metafuse
Published By: Oracle     Published Date: Apr 27, 2015
According to Accenture, identifying and influencing these profitability levers is at the top of most CFO agendas today, as CEOs increasingly look to their finance chiefs for insights on where to invest in new initiatives that can boost top line and bottom line growth.
Tags : 
cloud computing, erp, productivity, applications, efficiency, finance, software solutions, management
    
Oracle
Published By: 6th Sense Analytics     Published Date: Sep 19, 2007
Doug Gold, chief financial officer of CoreObjects, a Los Angeles-based product development company with multiple locations across India, talks about how his company is overcoming the challenges of visibility and control within distributed software development projects.
Tags : 
business management, business metrics, business analytics, offshore, offshoring, outsource, outsourcing, software development
    
6th Sense Analytics
Published By: 6th Sense Analytics     Published Date: Sep 18, 2007
Jake Sorofman, Vice President of Marketing for 6th Sense Analytics interviews Rusty Weston, editor in chief of CMP Media’s Global Services magazine, a premier publication focusing on the trends of off-shoring and outsourcing. The discussion focuses on the trend of globally distributed software development.
Tags : 
offshore, offshoring, outsource, outsourcing, cost, costs, cost savings, spend management
    
6th Sense Analytics
Published By: BlackLine     Published Date: Sep 08, 2017
MODERN FINANCE CHIEFS LEVERAGE PEOPLE, PROCESSES AND TECHNOLOGY
Tags : 
    
BlackLine
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read how chief information security officers (CISOs) view the state of mobile computing. This whitepaper discusses the importance of mobile enablement, policy updates, pertinent security practices and what organizations have done to secure their business mobility.
Tags : 
ciso, mobile, computing, security, idg, symantec, managers, enterprise
    
CDW Symantec
Published By: Forcepoint     Published Date: May 14, 2019
The CISO, Head of Human Resources, CIO, and Chief Legal Council are not the cast of characters you would expect to see solve a data protection challenge. Yet, the GDPR’s far-reaching impact has forced teams who typically don’t work together to collaborate to solve a nuanced problem they never thought they would have. Get a firsthand account of how Forcepoint’s CIO, Meerah Rajavel prepared for the regulation including collaborating with all stakeholders to jointly determine how the regulation applied to each part of the business and implementing a path to compliance.
Tags : 
    
Forcepoint
Published By: SAP     Published Date: Jun 22, 2009
Read this white paper from CFO Research Services, which examines why and how chief financial offers are looking to create "highly integrated" organizations by moving from standalone spreadsheets to integrated planning, budgeting, and forecasting systems. (CFO Research Services, 2008)
Tags : 
cfo, sap, global organizations, forecasting, budgeting, planning, finance, financing
    
SAP
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
When he joined SDBC in May of 2004, SunnyD's Chief Information Officer and Global Controller was faced with a classic build-or-buy decision, although the circumstances were less than typical. Despite the company just being carved out from Procter & Gamble with an experienced management team and a well-known brand name, it was missing a crucial operational element — an entire information technology infrastructure.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, microsoft dynamics ax, fusion, outsourcing
    
OneNeck IT Services
Published By: Ecora Software     Published Date: Aug 15, 2007
This whitepaper will teach you the necessary steps any organization must take to comply with the Gramm-Leach-Bliley Act (GLBA). Based on the experienced insight of Alex Bakman, Founder, Chairman & Chief Technology Officer at Ecora Software and Khalid Kark, Senior Research Analyst at Forrester Research, this paper discusses how any organization can reduce compliance costs by automating the process of attaining and maintaining proper financial privacy and consumer data safeguard procedures.
Tags : 
gbla, glba, compliance, financial, privacy, consumer data, data privacy, information management
    
Ecora Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
AA Ireland specializes in home, motor, and travel insurance and provides emergency rescue for people in their homes and on the road, attending to over 140,000 car break downs every year, 80% of which are fixed on-the-spot. “In each of the last five years, the industry lost a quarter billion in motor insurance," says Colm Carey, chief analytics officer. "So, there's a huge push for new data, models, ways to segment and pick profitable customer types—and get a lot more sophisticated. Our goal is to optimize pricing, understand the types of customers we're bringing, and the types we're trying to attract. We would like to tie that across the business. Marketing will run a campaign, trying to attract a lot of customers, but maybe they're not the right type. "We wanted to step away from industry standard software and go with something that was powerful and future-proof. In 2016, we had an opportunity to analyze all software. We chose the TIBCO® System of Insight with TIBCO BusinessWorks™ i
Tags : 
    
TIBCO Software
Published By: Zycus     Published Date: Nov 30, 2009
If the go-go 1990s, with its fast money and flush credit seeking rapid and steep returns, created the demand for "renaissance" Chief Financial Officers ("CFO"), who could manage (and market) both the strategic and financial operations of the enterprise, the more sobering decade that followed led directly to the creation and subsequent rise of the Chief Procurement Officer ("CPO"), who could reduce costs, build internal relationships, and develop strategic suppliers efficiently and effectively.
Tags : 
zycus, cfo, chief financial officer, procurement, chief procurement officer, sourcing companies, sourcing services, sourcing
    
Zycus
Published By: Zycus     Published Date: May 01, 2009
The global recession is taking no prisoners. Neither industry, nor region, nor company-size has provided shelter from its impact. Within the enterprise, few business functions have been unaffected. Yet, as this business downturn continues, the Chief Procurement Officer's ("CPO") agenda and the CEO's agenda have started to converge.
Tags : 
zycus, recession, downturn, procurement, sourcing companies, sourcing services, sourcing, reverse auction
    
Zycus
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
The data maturity curve As companies invest more and more in data access and organization, business leaders seek ways to extract more business value from their organization’s data. 92 percent of business leaders say that to compete in the future, their organization must be able to exploit information much more quickly than it can today.1 Chief Information Officers (CIO) need solutions that will allow them to evolve their organization’s approach to data and drive real value with strategic decisions. This journey can be depicted in a data maturity curve.
Tags : 
    
Group M_IBM Q2'19
Published By: IBM     Published Date: Jun 05, 2018
Keeping up with ever changing contract management work is challenging. Governing legal and procurement content is written by thousands of people and applied to hundreds of situations. To stay compliant, organizations employ knowledgeable professionals to analyze every sentence to determine the changes that need to be made to company contracts. The manual process of sifting through these dense, complicated documents is inefficient and prone to error. Watson Compare and Comply is trained on contract specific knowledge and classifications and can streamline contract workflows through semantic understanding. Join Director of Watson Offering Management, Adam Orentrichler, and Chief Data Scientist of SAP Ariba, David Herman, as they discuss how Watson can transform the way your company manages contract governance.
Tags : 
    
IBM
Published By: Amazon Web Services     Published Date: Oct 09, 2017
The following insights should be used as a resource for Chief Financial Officers (CFOs) as they lead or support their organisation through a cloud adoption journey. It is designed to provide an overview of cloud adoption drivers, costs, risks, and benefits, as well as raise important questions about staffing and technology decisions that are critical to success. It is also intended to help inform business cases, while surfacing measurements and indicators specific to cloud environments that impact the bottom line. The foundational guidance provided is a collection of insights captured and distilled from direct conversations and engagements between Amazon Web Services (AWS) and customer CFOs representing an extensive range of industries.
Tags : 
global expansion, mergers and acquisitions, business agility, real estate, tax exposure, talent acquisition, operations investment
    
Amazon Web Services
Published By: IBM     Published Date: Oct 28, 2009
In the IBM white paper, "The Smarter Supply Chain of the Future: Global Chief Officer Supply Chain Study," you'll see how sensor technologies, new analytic capabilities and simulation techniques can predict, if not prevent, disruptions before they occur.
Tags : 
supply chain management, ibm, risk, management systems, connectivity, scm, network
    
IBM
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: Workday Italy     Published Date: Sep 20, 2018
Quali caratteristiche deve avere un buon leader? Questo articolo di Ashley Goldsmith, Chief People Officer di Workday, rivela le lezioni che hanno influenzato di più la sua leadership. Leggilo per sapere perché leadership significa essere al servizio dei clienti e uscire dalla comfort zone è fondamentale per avere successo.
Tags : 
    
Workday Italy
Published By: Workday Spain     Published Date: Sep 20, 2018
Quali caratteristiche deve avere un buon leader? Questo articolo di Ashley Goldsmith, Chief People Officer di Workday, rivela le lezioni che hanno influenzato di più la sua leadership. Leggilo per sapere perché leadership significa essere al servizio dei clienti e uscire dalla comfort zone è fondamentale per avere successo.
Tags : 
    
Workday Spain
Published By: Iron Mountain     Published Date: Jun 01, 2015
Deze stap is belangrijk, niet alleen om compliance te verzekeren maar ook om de kosten in de hand te houden. Ook waarborgt u dat uw informatie op het juiste moment beschikbaar is, onafhankelijk van waar deze zich bevindt.
Tags : 
    
Iron Mountain
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.