This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Do you want to become a better IT leader?
This course is designed for those already in, or aspire to be, a CIO/CTO/IT Director or other C-level IT role. Unlike the masses of other leadership courses out there, this course is specifically for those working in the technology space.
The unique course will provide you with a broad set of knowledge and insights that will be well worth your time and the modest course fee.
Develop a LEADERSHIP MINDSET
-
Role of Today’s IT leader
-
The 3 CIO Archetypes
-
Deloitte’s 3 CIO Patterns
-
Friend of the CEO
-
Some Questions for Today’s IT Leaders
-
Four Priorities of an IT Leader
-
Rate Yourself as a Leader
-
Egon Zehnder – 9 Core CIO Competencies
-
6 Hats of an IT Leader
-
Impact of IT Leaders
Re-imagine the BUSINESS STRATEGY
-
Declining Fortunes
-
Former Industry Leaders
-
Marketing Myopia
-
Re-imagining the Business
-
Vision Cone
-
Examples of Strategic Vision
-
Tesla – Vision to Strategy
-
Strategy to Competitive Advantage
-
PESTEL Analysis
-
Re-inventing the New York Times
-
BEST Analysis
-
Best Analysis for ALDI, Hamleys and Disney
-
Executable Strategy
-
1-Page Strategy – Business Model Canvas
Formulate the IT STRATEGY
-
What is IT Strategy?
-
Example – Changi Airport Terminal 4 (T4)
-
Unlocking IT Value
-
Strategic IT Grid
-
Examples – Under Armour and Arcelor Mittal
-
Impact of Poor vs. Good IT Strategy
-
“Jump on the Bandwagon” Mentality
-
Gartner Hype Cycle
-
Does IT matter?
-
1-Page IT Strategy – the IT Pyramid
-
Example – IT Pyramid for NTU
-
Gartner’s IT Strategy
-
Example – BBC Technology Strategy and Roadmap
-
Business-IT Alignment and IT-IT Alignment
-
UK Government’s Failed NHS Project
-
IT Vision
-
IT Roadmap and IT Portfolio
-
Prioritising Project Investments
-
Top Tips on Creating an IT Roadmap
-
Pitfalls in IT Strategy
Architect AGILE IT PLATFORMS
-
Importance of IT Architecture
-
Good vs. Bad Architecture
-
Architecture Complexities
-
Spaghetti Architecture
-
Needs of Retail Banking
-
Business Agility is the New Mantra
-
Qualities of an IT Architecture
-
Multi-application Architectures
-
KISS Principle
-
Gartner’s Core Architecture Principles (for digital business)
-
Application Programme Interface (APIs)
Build BUSINESS RESILIENCE
-
IT Outages at BA, Amazon, Delta and Microsoft
-
Business Resilience
-
Cost of IT Downtime
-
Business Impact of IT Outage / Degradation
-
MAS Guidelines on Business Continuity Management
-
ISO 22301
-
Key Metrics: MTD+RTO, ADL+RPO
-
5R Business Continuity Timeline
-
Threats and Vulnerabilities
-
A Risk-Based Approach
-
Understanding Risk
-
Risk Assessment Matrix
-
Business Impact Analysis
-
Distributed Operations
-
Importance of Back-ups
-
3-2-1 Backup Strategy
-
Data-Centre Tiers
-
Data Centre Issues and Cause of BA Outage (2017)
-
Disaster Recovery Site
-
Disaster Recovery as a Service (DRaaS)
-
Business Continuity Team
-
Pitfalls in Business Continuity Planning
Deliver PROJECT SUCCESS
-
IT Projects Come In Different Shapes and Sizes
-
The Project Lifecycle
-
Project Success and Trade-offs
-
Four Layers of Impact
-
Writing a Project Proposal
-
4 Dimensions of Project Feasibility
-
Product vs. Project Scope
-
Types of Project Risk
-
Top 5 Causes of Project Failure
-
Requirements as a Major Pain Point
-
Prioritising with Moscow Analysis
-
Project Stakeholders
-
Work Breakdown Structure (WBS)
-
Using a WBS for Project Estimation
-
Project Estimation Methods
-
Shift from Traditional ‘Waterfall’ to Agile Project Lifecycle
-
Traditional vs Agile Approach
Stay safe and CYBER SECURE
-
Data Breaches at SingHealth, Equifax and Razer
-
IBM’s Cost of Data Breach Study (2019)
-
Information Assurance
-
Data Privacy
-
General Data Protection Regulation (GDPR)
-
EY Top 10 Cybersecurity Threats (2018-19)
-
Cybersecurity Threat Landscape
-
Malware
-
Malware examples – WannaCry, GigaLocker and WhatsApp
-
Keyloggers
-
IOT Issues – HomeCams, Smart Devices and Car Hacking
-
Zero-Day Attack
-
DDOS Attacks
-
Cybersecurity is a People Issue
-
Password Management
-
Biometrics
-
2-Factor Authentication (2FA)
-
Netflix Phishing Scam (2017)
-
Phishing and Spear Phishing
-
Social Engineering
-
Social Engineering Examples – Romance Scams, Call-Centre Scams and Impersonation
-
Deepfake Videos
-
Fake Website – Malindo Air
-
Insider Threat
-
NIST Framework for Cyber-Security
-
Table-top Exercise
Develop a LEADERSHIP MINDSET
Re-imagine the BUSINESS STRATEGY
-
2Role of Today's IT leader
-
3CIO.com - The 3 CIO Archetypes
-
4Deloitte's 3 CIO Patterns
-
5Friend of the CEO
-
6Some Questions for Today's IT Leaders
-
7Four Priorities of an IT Leader
-
8Rate Yourself as a Leader
-
9Egon Zehnder - 9 Core CIO Competencies
-
106 Hats of an IT Leader
-
11Impact of IT Leaders
Formulate the IT STRATEGY
-
12Declining Fortunes
-
13Former Industry Leaders
-
14Marketing Myopia
-
15Re-imagining the Business
-
16Vision Cone
-
17Examples of Strategic Vision
-
18Tesla - Vision to Strategy
-
19Strategy to Competitive Advantage
-
20PESTEL Analysis
-
21Re-inventing the New York Times
-
22BEST Analysis
-
23Best Analysis for ALDI, Hamleys and Disney
-
24Executable Strategy
-
251-Page Strategy - Business Model Canvas
Architect AGILE IT PLATFORMS
-
26What is IT Strategy?
-
27Example - Changi Airport Terminal 4 (T4)
-
28Unlocking IT Value
-
29Strategic IT Grid
-
30Examples - Under Armour and Arcelor Mittal
-
31Impact of Poor vs. Good IT Strategy
-
32"Jump on the Bandwagon" Mentality
-
33Gartner Hype Cycle
-
34Does IT matter?
-
351-Page IT Strategy - the IT Pyramid
-
36Example - IT Pyramid for NTU
-
37Gartner's IT Strategy
-
38Example - BBC Technology Strategy and Roadmap
-
39Business-IT Alignment and IT-IT Alignment
-
40UK Government's Failed NHS Project
-
41IT Vision
-
42IT Roadmap and IT Portfolio
-
43Prioritising Project Investments
-
44Top Tips on Creating an IT Roadmap
-
45IT Platforms
-
46IT Operations
-
47Pitfalls in IT Strategy
Build BUSINESS RESILIENCE
-
48Importance of IT Architecture
-
49Good vs. Bad Architecture
-
50Architecture Complexities
-
51Spaghetti Architecture
-
52Needs of Retail Banking
-
53Business Agility is the New Mantra
-
54Qualities of an IT Architecture
-
55KISS Principle
-
56Multi-application Architectures
-
57Gartner's Core Architecture Principles (for digital business)
-
58Application Programme Interface (APIs)
Deliver PROJECT SUCCESS
-
59IT Outages at BA, Amazon, Delta and Microsoft
-
60Business Resilience
-
61Cost of IT Downtime
-
62Business Impact of IT Outage / Degradation
-
63MAS Guidelines on Business Continuity Management
-
64ISO 22301
-
65Key Metrics: MTD+RTO, ADL+RPO
-
665R Business Continuity Timeline
-
67Threats and Vulnerabilities
-
68A Risk-Based Approach
-
69Understanding Risk
-
70Risk Assessment Matrix
-
71Business Impact Analysis
-
72Distributed Operations
-
73Importance of Back-ups
-
743-2-1 Backup Strategy
-
75Data-Centre Tiers
-
76Data Centre Issues and Cause of BA Outage (2017)
-
77Disaster Recovery Site
-
78Disaster Recovery as a Service (DRaaS)
-
79Business Continuity Team
-
80Pitfalls in Business Continuity Planning