Discover why many organisation face difficulties transforming their Identity and Access Management (IAM) ecosystem, and how IAM programmes should be approached and structured.
Discover Wavestone : we are a new consulting firm providing customized solutions designed to steer our clients in making their most strategic decisions.
Identity and Access Management (IAM) is once again at the centre of major transformation programmes. Discover why the concept of identity back in the spotlight?
Organising a cyber crisis exercise is not an easy task. From the preparation to the D-Day, a lot of unforeseen events can occur and the preparation teams need to remain a step ahead of the players. This article breaks down the steps to a successful cyber crisis exercise in a large company.
Due to years of under investment in legacy technology solutions, many organisations we have worked with have amassed a large amount of technical debt which in many cases supports large parts of their important business services.
Effective Service Level Management (SLM) can enhance vendor performance and service delivery by incentivizing proper behaviour and enforcing a fair distribution of risk. Here are 4 concepts to optimize vendor performance and guide the structuring and calculation of service level incentives.
Many organizations have turned to outsourcing to help with cost reduction and improve operating efficiency. Historically, we IT leaders thought of two types of outsourcing: IT Outsourcing (generally referred to as ITO) and Business Process Outsourcing (generally referred to as BPO).