INTRODUCTION Barcodes and other automatic identification and data capture (AIDC) technologies are ubiquitous in everyday life. They are found everywhere from grocery stores to passports because they are mature, proven, and less expensive than they once were....
Operational technology (OT) is a mission-critical function that must increasingly respond to industry changes. The traditional OT model distributed OT responsibilities across operating areas, embedding these responsibilities within engineering functions. While this...
As the cyber threat landscape intensifies, cybersecurity programs must evolve to protect your organization’s mission. To manage this continuous cybersecurity evolution, five key security program change management practices should be followed: 1. Identify and...
A security operating model enables an organization to focus on identifying risks, recommending risk responses, facilitating tradeoff decisions related to these risks, and providing a line of sight to the execution of these responses. The core of this model is a...
The workforce shortage is changing the way healthcare organizations attract, engage, and retain talent. The race to recruit is on. ScottMadden has found that the most successful organizations are tackling the challenge by refocusing on the fundamentals—and rethinking...