Governance Archives - Wylie Blanchard Wylie Blanchard | Business Technology Expert, Digital Executive Advisor & Speaker - Wylie Blanchard Mon, 05 May 2025 08:09:47 +0000 en-US hourly 1 /wp-content/uploads/cropped-Wylie-Blanchard-profile-photo_202008_IMG_7092_1100x1100-32x32.jpg Governance Archives - Wylie Blanchard 32 32 61397150 Illinois Privacy Compliance: What Every Business Owner Needs to Know https://wylieblanchard.com/illinois-privacy-compliance-what-every-business-owner-needs-to-know/ Sun, 01 Jun 2025 08:26:00 +0000 https://www.wylieblanchard.com/?p=8974 The Rising Stakes of Data Privacy. Whether you’re running a family-owned retail shop, growing a medical practice, or managing multiple office locations, if you handle customer or employee data, privacy compliance applies to you. In Illinois, two of the strictest privacy laws in the country—the Biometric Information Privacy Act (BIPA) and the Personal Information Protection Act (PIPA)—create clear legal obligations […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Silhouette of the state of Illinois with digital icons

The Rising Stakes of Data Privacy.

Whether you’re running a family-owned retail shop, growing a medical practice, or managing multiple office locations, if you handle customer or employee data, privacy compliance applies to you.

In Illinois, two of the strictest privacy laws in the country—the Biometric Information Privacy Act (BIPA) and the Personal Information Protection Act (PIPA)—create clear legal obligations that can cost thousands (or millions) if ignored.

As an IT consultant who works with small and midsize businesses across the state, I’m here to break down what you need to know and how you can protect your business before problems arise.

Understanding Key Illinois Privacy Laws

Biometric Information Privacy Act (BIPA)

BIPA regulates how private businesses collect, use, and store biometric data like fingerprints, facial scans, and retina scans. It requires:

  • Informed written consent before collecting or storing biometric data.
  • Disclosure of the specific purpose and storage duration.
  • public retention and destruction policy.
  • A strict prohibition on selling or profiting from biometric data.
  • Private right of action, meaning individuals can sue your business for violations.

Even something as common as a fingerprint time clock or facial recognition camera falls under BIPA. Penalties and fines can be applied for violations of negligence, recklessness or intentional action.

Personal Information Protection Act (PIPA)

PIPA focuses on safeguarding broader categories of personal data, including Social Security numbers, driver’s license numbers, medical and health insurance information, account numbers, and login credentials.

It requires:

  • Prompt breach notification to affected Illinois residents.
  • Reporting breaches to the Illinois Attorney General (if 500+ individuals are impacted).
  • Reasonable security measures to protect data.
  • Proper disposal of sensitive data.
  • Contracts with third parties that require them to maintain security.

Violations are considered unlawful practices under the state’s Consumer Fraud Act and can result in enforcement actions.

Common Compliance Pitfalls

Despite the legal requirements, many businesses unintentionally fall short. Here are some of the most common missteps:

  • Using biometric time clocks without proper notice or consent.
  • Collecting customer or employee data without a written policy or retention schedule.
  • Failing to implement encryption, firewalls, or access controls.
  • Assuming that cloud storage providers automatically ensure compliance.
  • Not having an incident response plan or breach notification process.

Often, the biggest risk comes not from bad intentions but from lack of awareness.

Steps Toward Compliance: IT Consultant’s Checklist

Here is a practical checklist to help your business align with Illinois privacy laws:

  1. Audit Your Data: Know what types of personal and biometric data you collect, where it’s stored, who has access, and how long you keep it.
  2. Create a Written Privacy Policy: Include clear language about data collection, usage, retention, and destruction.
  3. Implement Consent Procedures: Obtain written consent before collecting biometric data and explain how it will be used.
  4. Secure Your Systems: Use encryption, secure user authentication, regular patching, and monitoring to protect stored data.
  5. Train Your Employees: Ensure your staff understands data privacy procedures and how to respond to data incidents.
  6. Plan for Breaches: Develop and test an incident response plan, including breach notification protocols.
  7. Review Vendor Contracts: Make sure service providers who access your data agree to meet your security requirements.

The Cost of Non-Compliance

Non-compliance isn’t just a legal problem—it can be a business-ending event. Illinois courts have upheld massive BIPA settlements, with some cases costing businesses millions in damages. A single fingerprint scan collected without consent can lead to multiple violations, each carrying its own penalty.

With PIPA, a data breach could force you to notify thousands of customers, face scrutiny from the Attorney General, and deal with damaged customer trust.

Tools and Tech That Can Help

Fortunately, the right tools can make compliance manageable:

  • Consent management platforms to track and store written consents.
  • Data loss prevention (DLP) software to monitor sensitive information.
  • Security information and event management (SIEM) tools for real-time alerts.
  • Encryption solutions for both stored and transmitted data.
  • Automated backups with secure, offsite storage.

Don’t overlook free or low-cost training platforms to keep your team informed.

Make Privacy a Business Priority

Privacy compliance isn’t a one-time fix—it’s an ongoing responsibility. If you collect any form of personal or biometric data, you are legally and ethically responsible for protecting it.

By investing in secure systems, clear policies, and proper staff training, you’re not just avoiding fines—you’re building customer trust and long-term resilience.

If you’re unsure where to start or whether your current practices meet Illinois standards, now is the time to act.

Local IT consultants, privacy professionals can help you:

  • Audit your systems and data handling practices
  • Develop legally sound policies and consent forms
  • Deploy the right technologies for security and monitoring
  • Train your team to maintain compliance

Don’t wait until a lawsuit or a breach that forces your hand. Reach out to a trusted local technology expert today and take control of your privacy compliance strategy.


This content was originally posted on Medium

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8974
From NPD to the Cloud: Why Businesses Must Prioritize Cybersecurity Now https://wylieblanchard.com/from-npd-to-the-cloud-why-businesses-must-prioritize-cybersecurity-now/ Sat, 14 Sep 2024 11:24:00 +0000 https://www.wylieblanchard.com/?p=8844 The recent National Public Data (NPD) breach, which compromised the personal information of over a million individuals, serves as a stark reminder of the ever-growing need for strengthened cybersecurity measures. As organizations increasingly rely on digital platforms to store sensitive data, the importance of cybersecurity cannot be overstated. Data breaches are no longer isolated incidents—they […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Data Codes through Eyeglasses

The recent National Public Data (NPD) breach, which compromised the personal information of over a million individuals, serves as a stark reminder of the ever-growing need for strengthened cybersecurity measures. As organizations increasingly rely on digital platforms to store sensitive data, the importance of cybersecurity cannot be overstated. Data breaches are no longer isolated incidents—they have become a significant, ongoing threat to businesses and their customers. With the rapid evolution of technology, companies must prioritize the implementation of robust cybersecurity frameworks to safeguard their operations, protect consumer trust, and ensure long-term business continuity.

The NPD Breach: A Wake-Up Call for Cybersecurity

The NPD incident was a clear demonstration of how vulnerable even large, data-driven organizations can be to cyberattacks. Although the breach reportedly impacted 1.3 million individuals, some experts argue the actual scale of the compromise might be larger, considering the 2.9 billion records reportedly exposed on the dark web. This gap between the company’s official disclosure and the broader cybersecurity community’s findings highlights a recurring challenge: many organizations underestimate the extent of their vulnerabilities until it’s too late.

In the wake of such incidents, businesses must ask themselves: Are we doing enough to protect our digital assets? Data breaches like the NPD case underscore the importance of taking proactive measures to avoid devastating consequences, such as financial losses, damaged reputations, and loss of consumer trust.

Why Cybersecurity is Critical for Today’s Businesses

Businesses today operate in an increasingly complex digital landscape. From financial institutions to healthcare providers, nearly every industry depends on digital infrastructure to facilitate daily operations, communicate with clients, and store critical data. However, this reliance on technology comes with its own set of risks.

Cybercriminals are becoming more sophisticated, leveraging advanced techniques to exploit vulnerabilities in systems. They target weak spots, from outdated software to poorly configured cloud platforms, and the consequences of these attacks can be catastrophic. According to the IBM and Ponemon Institute’s 2024 Cost of a Data Breach Report, the global average cost of a data breach increased to USD 4.88 million in 2024, marking a 10% increase over the previous year. Business disruption and the costs associated with post-breach responses, such as customer support and regulatory compliance, contributed to this significant rise. For small businesses, these figures could result in bankruptcy or closure. This is why cybersecurity has evolved from a technical concern to a strategic business priority.

The Long-Term Costs of Data Breaches

Beyond the immediate financial impact, the long-term effects of data breaches can be equally damaging. Businesses may face legal repercussions, including fines and lawsuits from customers whose data has been compromised. Additionally, regulatory bodies such as the California Consumer Privacy Act of 2018 (CCPA), the state of Illinois’ Personal Information Protection Act (PIPA) or the Biometric Information Privacy Act (BIPA) can impose strict penalties for non-compliance with data protection standards.

A breach can also severely damage a company’s reputation. Consumers are increasingly aware of the importance of data security, and a company’s failure to protect their information can lead to a loss of trust. When customers no longer feel secure doing business with a company, they take their business elsewhere, further eroding the company’s market share.

Moreover, data breaches disrupt operations. Recovery efforts often involve halting production, isolating systems, and launching extensive investigations. This downtime can significantly hinder a company’s ability to serve its customers, exacerbating the damage caused by the breach.

Proactive Cybersecurity Measures

To avoid the far-reaching consequences of a data breach, organizations need to adopt proactive cybersecurity strategies. The following measures can help businesses mitigate risks and strengthen their defenses:

1. Comprehensive Risk Assessments
Businesses must regularly conduct thorough risk assessments to identify potential vulnerabilities within their digital infrastructure. These assessments should not only focus on internal systems but also include third-party vendors and partners who have access to company data. A well-rounded risk assessment allows businesses to prioritize cybersecurity investments and focus on areas that present the highest risk.

2. Multi-Factor Authentication (MFA)
A simple yet effective security measure, multi-factor authentication adds an extra layer of protection by requiring multiple forms of verification before granting access to sensitive systems. This reduces the likelihood of unauthorized access, even if a password is compromised.

3. Regular Software Updates and Patching
Cybercriminals often exploit known vulnerabilities in outdated software. Ensuring that all systems are regularly updated and patched is critical to closing these gaps. Organizations should have a clear patch management process in place, with designated personnel responsible for monitoring and implementing updates.

4. Employee Training and Awareness
One of the most common ways cyberattacks occur is through human error. Phishing schemes and social engineering tactics exploit untrained employees to gain access to sensitive information. To combat this, businesses must invest in continuous cybersecurity training programs that educate employees on the latest threats and how to recognize them.

5. Data Encryption
Encrypting sensitive data ensures that, even if a breach occurs, the stolen information is unreadable to unauthorized users. Businesses should implement encryption protocols both for data at rest (stored data) and data in transit (information being sent between systems).

6. Incident Response Planning
Having a robust incident response plan in place can help businesses quickly address and mitigate the effects of a breach. An effective plan should include clear protocols for isolating compromised systems, notifying affected stakeholders, and conducting forensic analysis to determine the scope of the breach. Regular testing of the incident response plan ensures that all team members are familiar with their roles in the event of a breach.

The Role of Cloud Security

With the shift towards cloud computing, businesses are increasingly relying on cloud providers to store and manage their data. However, cloud environments present their own unique set of challenges. Data breaches in cloud infrastructures can occur due to misconfigurations, lack of encryption, or insecure APIs. Therefore, organizations must ensure they partner with reputable cloud providers who offer robust security measures, such as encryption, regular monitoring, and adherence to industry standards.

It’s also critical for businesses to maintain visibility and control over their cloud environments. Implementing cloud security tools, such as cloud access security brokers (CASBs), can help organizations monitor and enforce security policies across cloud services. These tools offer real-time visibility into user activities, identifying potential threats before they can escalate into full-blown breaches.

Learning from the NPD Breach: The Need for Transparency

One of the lessons businesses can learn from the NPD breach is the importance of transparency. In many cases, companies are hesitant to disclose breaches until they have a complete understanding of what happened. However, this approach can delay critical responses, such as notifying affected individuals or taking action to prevent further damage.

Transparency and timely reporting are not just ethical obligations—they are also critical components of crisis management. Customers need to be informed promptly if their data has been compromised so that they can take steps to protect themselves. Moreover, regulatory agencies often require timely disclosures, and failure to comply can result in additional penalties.

The Future of Cybersecurity: Evolving with the Threats

Cyber threats are constantly evolving, which means businesses must remain vigilant and adaptive. Cybersecurity is not a one-time investment; it requires continuous updates, monitoring, and strategic planning. As artificial intelligence (AI) and machine learning (ML) become more integrated into cybercriminals’ arsenals, businesses will need to leverage these same technologies to defend against sophisticated attacks.

By adopting a forward-thinking approach to cybersecurity, businesses can stay one step ahead of cybercriminals, protecting both their operations and their customers. In today’s digital world, investing in cybersecurity is not just about avoiding breaches—it’s about building a resilient organization that can thrive in the face of adversity.


The NPD breach is a reminder that no organization, regardless of size or industry, is immune to cyberattacks. Strengthening cybersecurity requires a proactive, comprehensive approach that addresses both technological vulnerabilities and human factors. By implementing robust cybersecurity strategies, businesses can protect themselves from the ever-present threat of data breaches, safeguard their customers, and secure their future in the digital economy.

This content was originally posted on Medium.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8844
GIAC Security Leadership (GSLC) was issued by Global Information Assurance Certification (GIAC) to Wylie Blanchard https://wylieblanchard.com/giac-security-leadership-gslc-was-issued-by-global-information-assurance-certification-giac-to-wylie-blanchard/ Sat, 17 Feb 2024 11:30:00 +0000 https://www.wylieblanchard.com/?p=8490 View my verified achievement from Global Information Assurance Certification (GIAC). GIAC Security Leadership (GSLC) was issued by Global Information Assurance Certification (GIAC) to Wylie Blanchard on February 14, 2024. The GIAC Security Leadership (GSLC) certification validates a practitioner’s understanding of governance and technical controls focused on protecting, detecting, and responding to security issues. GSLC certification holders […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
View my verified achievement from Global Information Assurance Certification (GIAC).

GIAC Security Leadership (GSLC) logo

GIAC Security Leadership (GSLC) was issued by Global Information Assurance Certification (GIAC) to Wylie Blanchard on February 14, 2024.

The GIAC Security Leadership (GSLC) certification validates a practitioner’s understanding of governance and technical controls focused on protecting, detecting, and responding to security issues. GSLC certification holders have demonstrated knowledge of data, network, host, application, and user controls along with key management topics that address the overall security lifecycle.

Learn more.

Skills:

Access Control, Change Management, Cyber Defense, Incident Handling, Information Security, IT Business Management, Leadership, Network Security, Project Management, Risk Management, Security Operations, Security Policy, Software Security, and Vulnerability Management.

Earning Criteria:

  • Accept GIAC’s Code of Ethics.
  • Acquire skills via industry experience or from a training course.
  • Achieve a passing score on the GSLC exam.

Analyst Number:
13012

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8490
ITIL® Leader: Digital and IT Strategy was issued by AXELOS to Wylie Blanchard https://wylieblanchard.com/itil-leader-digital-and-it-strategy-was-issued-by-axelos-to-wylie-blanchard/ Mon, 29 Jan 2024 03:55:04 +0000 https://www.wylieblanchard.com/?p=8428 View my verified achievement from Axelos. ITIL® LEADER Digital and IT Strategy (DITS) was issued by AXELOS to Wylie Blanchard on January 28, 2024. ITIL 4® Leader Digital and IT Strategy (DITS) demonstrates the individual has the practical understanding and application of crafting a digital vision and strategy, shaping and integrating IT and business strategies aligned with the […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
View my verified achievement from Axelos.

ITIL 4 ® ITIL LEADER Digital IT Strategy by Axelos logo

ITIL® LEADER Digital and IT Strategy (DITS) was issued by AXELOS to Wylie Blanchard on January 28, 2024.

ITIL 4® Leader Digital and IT Strategy (DITS) demonstrates the individual has the practical understanding and application of crafting a digital vision and strategy, shaping and integrating IT and business strategies aligned with the wider organizational goals to enable success of the business. They develop cross-functional digital strategy, elevate discussions to strategic levels, drive operational excellence, analyze and respond effectively to VUCA factors.

Learn more.

Skills:

Adaptability, Agile Ways Of Working, Business Case Development, Business Change Management, Business Plan Development, Collaboration And Teamwork, Communication, Creation and Implementation of Target Operating Models, Creativity, Customer Service Management, Data Management, DevOps Methodology Knowledge, Digital Design (including UX and UI), Digital Technology Architecture, Driving Company Culture Change, Education and Training Provision, Emerging Technology Monitoring, Emotional and Social Intelligence, Enterprise Architecture, Financial Management, Information Analysis, Information Security Management, Information Security Strategy Development, Information Systems Governance, Innovation, Knowledge Management, Leadership Development, Negotiation, Planning And Organisation, Problem Solving, Product Development, Product Management, Project – Programme and Portfolio Management, Risk Management, Robotics and Automation Engineering, Service Delivery and Management, Software Development And Management, Stakeholder Management, Strategic Planning, Supplier Management, Sustainable Management, Systems Development and Management, Systems Engineering, UX Design, Experience and Support.

Earning Criteria:

  • Obtained the ITIL 4 Foundation certification designation prior to studying for ITIL LEADER Digital and IT Strategy.
  • Meet the managerial experience requirement.
  • Complete required training.
  • Complete and receive a passing score on four case study assignments.
  • Passed the ITIL 4 ® LEADER Digital and IT Strategy (DITS) exam.

Evidence:

Certification Number
GR679004963WB

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8428
Bridging the Gap: Unleashing Digital Transformation for Business Growth https://wylieblanchard.com/bridging-the-gap-unleashing-digital-transformation-for-business-growth/ Mon, 18 Dec 2023 19:34:05 +0000 https://www.wylieblanchard.com/?p=8317 Digital transformation has become more than just a buzzword; it’s now a fundamental imperative for businesses seeking to thrive in an era defined by rapid technological advancements. As organizations across various industries grapple with the challenges of embracing digital transformation, a recent study conducted by Chief Executive Group in collaboration with Amazon Web Services (AWS) […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Person Using A Laptop

Digital transformation has become more than just a buzzword; it’s now a fundamental imperative for businesses seeking to thrive in an era defined by rapid technological advancements. As organizations across various industries grapple with the challenges of embracing digital transformation, a recent study conducted by Chief Executive Group in collaboration with Amazon Web Services (AWS) reveals both the high aspirations and the significant execution gaps in leveraging digital transformation for sustainable business growth.

The study surveyed over 500 C-suite executives and public company board members, revealing a substantial gap between the aspiration to harness digital transformation for growth and the actual adoption of advanced digital practices.

The Aspiration: Growth Through Digital Transformation

One of the key takeaways from the study is the strong desire among leaders to leverage digital transformation for growth. More than half of those surveyed listed growth through either new (28 percent) or existing (36 percent) products or markets as their company’s top priority for the year ahead. This aspiration aligns with the widespread recognition that digital transformation can be a powerful catalyst for business expansion and innovation.

The Reality: A Disconnect in Execution

Despite the high aspirations, the study indicates that many organizations are struggling to translate their digital transformation intentions into concrete actions. The data reveals several critical areas where companies fall short of harnessing the full potential of digital transformation:

1. Insufficient Utilization of Customer Data:

  • The study highlights that most businesses still rely on anecdotal comments or conversations (23 percent), customer service data (21 percent), and ongoing tracking of NPS scores (15 percent) to understand customer needs.
  • Only a mere 2 percent have adopted advanced techniques such as AI-driven insights to gain a deeper understanding of customer preferences and behaviors.

2. Lag in Real-Time Adaptation:

  • Approximately 47 percent of leaders expressed the desire to use real-time data to inform and change their strategies instantly, but only 28 percent reported currently doing so.
  • Many companies still align their strategies with three- to five-year projections (30 percent), missing out on the agility required to adapt rapidly to evolving consumer trends.

3. Traditional Approaches to Customer Involvement:

  • A staggering 82 percent of organizations rely on longstanding, non-digital practices for involving customers in the development process.
  • Only 15 percent use continuous monitoring of purchase or usage behavior, and a mere 3 percent do so at scale using algorithmic insights.

4. Long-Term Business Cases vs. Real-Time Adaptation:

  • While 47 percent of organizations aspire to use real-time data for strategy adaptation, 30 percent still rely on long-term (3-5 years) business cases and projections.

These findings highlight a stark disconnect between ambition and execution when it comes to digital transformation. Many organizations are grappling with the challenge of embracing the real-time, data-driven, and customer-centric approaches that are essential for unlocking the full potential of digital transformation.

Bridging the Gap: Strategies for Success

To bridge the gap between aspiration and execution in digital transformation, organizations need to adopt a more strategic and holistic approach. Here are some key strategies:

1. Prioritize Customer-Centricity:

  • Invest in advanced data analytics and AI-driven insights to understand customer needs, preferences, and behaviors in real-time.
  • Leverage customer advisory boards, focus groups, and continuous monitoring of purchase and usage behavior to co-create products and services with customers.

2. Embrace Real-Time Decision-Making:

  • Shift from long-term projections to real-time data-driven decision-making.
  • Invest in technology and analytics capabilities that enable instant strategy adaptation based on real-time insights.

3. Foster a Culture of Innovation:

  • Encourage a culture of continuous experimentation and innovation.
  • Empower teams to explore new products, services, and go-to-market strategies based on real-time data.

4. Invest in Digital Infrastructure:

  • Ensure that the organization has the necessary digital infrastructure and tools to collect, process, and analyze real-time data.
  • Collaborate with technology partners to stay at the forefront of digital capabilities.

5. Educate and Empower Leadership:

  • Provide leadership teams with training and resources to understand the value of digital transformation.
  • Foster a mindset of adaptability and openness to change.

Digital transformation holds immense potential for driving business growth and innovation. However, organizations must bridge the gap between aspiration and execution to reap the full benefits. By prioritizing customer-centricity, embracing real-time decision-making, fostering a culture of innovation, investing in digital infrastructure, and educating leadership, companies can position themselves for success in the digital age. The journey may be challenging, but the rewards are substantial for those who can truly unleash the power of digital transformation.

This content was originally posted on Medium.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8317
Boardroom Certified Qualified Technology Expert (QTE) was issued by Digital Directors Network to Wylie Blanchard https://wylieblanchard.com/boardroom-certified-qualified-technology-expert-qte-was-issued-by-digital-directors-network-to-wylie-blanchard/ Tue, 06 Jun 2023 00:40:58 +0000 https://www.wylieblanchard.com/?p=8108 View my verified achievement from Digital Directors Network. Qualified Technology Expert (Board Certified QTE) was issued by Digital Directors Network to Wylie Blanchard on June 5th, 2023. DDN Certified Qualified Technology Experts (QTEs) are boardroom qualified technology executives who have the education, applied experience, and/or formal education necessary to work in the corporate boardroom and oversee […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
View my verified achievement from Digital Directors Network.

Qualified Technology Expert (Board Certified QTE) was issued by Digital Directors Network to Wylie Blanchard on June 5th, 2023.

DDN Certified Qualified Technology Experts (QTEs) are boardroom qualified technology executives who have the education, applied experience, and/or formal education necessary to work in the corporate boardroom and oversee risk in complex digital business systems.

QTE certification is earned by members of Digital Directors Network (DDN) by completing the DDN QTE 501 Boardroom Readiness Masterclass for Technology Executives and successfully passing examination. The DDN QTE 501 Masterclass is a Certified Professional Development executive education learning program as certified by the CPD Certification Service. DDN is the world’s leading boardroom network focused exclusively on governing systemic risk and overseeing digital and cybersecurity in the corporate boardroom.

QTE certification holders have corporate governance training or experience and executive management experience overseeing one or multiple domains of complex digital business systems including data, information architecture, risk communications, emerging technology, cybersecurity, third-party and systemic risk, IT operations and digital/cyber regulation. Earning QTE certification required attendance at an online or offline QTE 501 boardroom readiness masterclass where participants received thirteen hours of instructor led learning and successfully completed examination.

QTE 501 is designed and delivered by business school professors, experienced technology executives, corporate lawyers and corporate governance experts. QTE certification earners have been trained on the DiRECTOR(TM) framework for overseeing systemic risk in complex digital business systems. They have also been trained on the role of the corporate director in creating and protecting shareholder and stakeholder value.

Learn more.

Skills:

Corporate Governance, and Systemic Risk Oversight of Complex Digital Systems.

Earning Criteria:

  • QTE certificate holders have taken and passed the QTE 501 certification exam with a minimum score of 70%.
  • QTE certificate holders maintain their certification by completing ten hours of relevant instructor led learning on corporate governance and digital and systemic cyber risk oversight every 2 years.

Evidence:

Certification Number
74950824

Boardroom Certified Qualified Technology Expert (QTE) by Digital Directors Network

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8108
ITIL 4® Foundation was issued by AXELOS to Wylie Blanchard https://wylieblanchard.com/itil-4-foundation-was-issued-by-axelos-to-wylie-blanchard/ Sat, 31 Dec 2022 18:01:00 +0000 https://www.wylieblanchard.com/?p=7250 View my verified achievement from Axelos. ITIL® Foundation Certificate in IT Service Management (ITIL 4 Edition) was issued by AXELOS to Wylie Blanchard on December 25, 2022. ITIL® 4 Foundation demonstrates this individual understands the key concepts of IT and digital service delivery including the key concepts, guiding principles and practices of ITIL® 4 for service management. They […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
View my verified achievement from Axelos.

ITIL 4 ® Foundation

ITIL® Foundation Certificate in IT Service Management (ITIL 4 Edition) was issued by AXELOS to Wylie Blanchard on December 25, 2022.

ITIL® 4 Foundation demonstrates this individual understands the key concepts of IT and digital service delivery including the key concepts, guiding principles and practices of ITIL® 4 for service management. They have a fundamental understanding of the modern organization’s end-to-end operating model for the creation, delivery and continual improvement of technology-enabled products and services. They have an awareness of how cultural or behavioral principles benefit the wider organization.

Learn more.

Skills:

Adaptability, Availability Management, Business Change Management, Business Relationship Management, Capacity Management, Communication Incident Management, Information Security Management, IT Systems Governance, Problem Management, Release And Deployment, Risk Management, Service Delivery Management, Service Desk, Stakeholder Management, UX Design, Experience and Support.

Earning Criteria:

The individual has passed the ITIL 4 ® Foundation exam.

Evidence:

Certification Number
GR671468197WB

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
7250
The Value of Multi-Factor Authentication https://wylieblanchard.com/the-value-of-multi-factor-authentication/ Sun, 11 Sep 2022 16:12:00 +0000 https://www.wylieblanchard.com/?p=6526 Multi-Factor Authentication (MFA) is an authentication form that contains a layered approach to securing access whereby the system requires a user to present a combination of two or more different authenticators to verify a user’s identity for login. This is part of a core component of the Identity and access management policy. It increases security […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
.player6622 .plyr__controls, .player6622 .StampAudioPlayerSkin{ border-radius: px; overflow: hidden; } .player6622{ margin: 0 auto; } .player6622 .plyr__controls .plyr__controls { border-radius: none; overflow: visible; } .skin_default .player6622 .plyr__controls { overflow: visible; }
Hand Holding a Key With a USB Flash Drive

Multi-Factor Authentication (MFA) is an authentication form that contains a layered approach to securing access whereby the system requires a user to present a combination of two or more different authenticators to verify a user’s identity for login. This is part of a core component of the Identity and access management policy. It increases security since even if one authenticator becomes compromised by hackers, they will not meet the second authentication request condition and will be denied access to the account or computer system.

As the years pass by and new interventions and ideas are being launched and improved. For instance, MFA relied on Two-Factor Authentication whereas in recent years many users are moving towards the MFA. This has been viewed as an upgraded form of security whereby the 2FA had a limit of the number of required factors to two whereas in MFA the factors can be more than two.

Multi-Factor Authentication works by combining two or more authentication factors in one go. These authentication factors are categorized as described below:

The knowledge factors – This usually refers to something that you know. This can be a user ID and password, a Personal Identification Number (PIN), or answering a security question. This is the most common and basic form of authentication. It is prone to security breaches via brute force attacks and phishing attempts.

The Possession factors – This refers to something that you have in your possession, such as a security key or token. Currently, this is being implemented by methods such as:

  • Physical USB tokens – these are connected to the computer system to authenticate the user.
  • Mobile push notifications – a push notification sent to the user’s phone.
  • One-time Passcodes (OTP) – a one-time passcode sent to the user’s phone to enable login only once. This can be sent via email or SMS and should be used within a given time frame.
  • Phone security keys- a secret key or passcode stored on the phone that uniquely identifies the user.
  • Authenticator apps- these apps provide randomly generated codes for the registered services for authentication.
  • URL link – an email or SMS is sent embedded with a link to validate the user.

The inherence factors – This refers to something that you are a unique characteristic, typically biometric. These include:

  • Fingerprint – the use of a finger biometric reader to allow the user to register their print for authentication.
  • Face recognition– the use of face recognition software to scan users’ faces and enable authentication.
  • Voice recognition – the use of voice recognition software to enable users to use their voice for authentication.
  • Iris and retina recognition – the use of retina scanners to enable users to authenticate their identity.

Location and time-based factors – These are less common and usually less secure forms of authentication and therefore are embedded with other factors. For example, OTPs or push notifications can be programmed to only be sent within a given location and to be used within a given time frame otherwise they expire.

You may come across some organizations, systems, or apps that only implement Two-factor authentication, which is a subset of MFA, but not as secure.

The difference between Two-factor and MFA is the number of authentication factors used. Two-factor authentication only uses two factors for the authentication process, such as a knowledge factor a password, and an inherence factor such as fingerprint scanning.

Organizations should strive to increase the authentication layers to three factors since it makes it difficult for hackers to compromise the system. Some of the benefits of Multi-Factor Authentication realized include the following:

Security – MFA enhances security since multiple layers of authentication make it more difficult for a hacker to gain access to an organization’s information systems, even if passwords or PINs are compromised through phishing attacks or other means. The extra layer of security provided by requesting a possession factor and inherence factors will deny access to the system.

Usability – Using MFA provides the possibility to phase out the use of passwords. Users have trouble managing passwords for so many apps. Working with MFA allows the use of other authentication factors that offer a better user experience and simplicity to the users, such as fingerprint scanners, therefore enabling an easier login process.

Reduce cost – Successful defenses against attacks can provide a reduction of organization losses, for example, preventing a costly attack on an organization’s system leading to loss of resources. Preventing such attacks, especially in the financial industry provides a huge benefit.

Customizable Security Solutions – Authentication factors offer multiple options, providing organizations with the ability to customize their solutions to meet their user’s and employees’ needs. For example, users might have access to fingerprint scanners on their smartphones, but not retinal or face scanners. Therefore, the organization can customize the solution to best fit its users.

Regulatory compliance – In certain industries, regulations are in place that requires MFA compliance. For example, the banking sector regulations require implementing MFA.

Manage Devices – In the current hybrid working environment, many employees are working from home using personal devices to access their organization’s network. Malicious software on employees’ machines can be transferred to the organization’s network. MFA enables organizations not to worry about the security of remote employees’ machines since malware and vulnerabilities are detected soon.

Currently, security experts tend to encourage organizations to strive to implement MFA in their systems since the pros outweigh the cons. In addition to that, upgrading to MFA has been made much easier than ever since most cloud providers have inbuilt MFA in their systems that match industry standards.

In a few years from now, most organizations and users will appreciate the importance of Multifactor Authentication. For this is the future of cyber security and we should embrace it. Modern devices come equipped with these new technologies such as facial recognition and fingerprint scanners. We should use this opportunity to improve our digital security and data by implementing MFA on all our accounts and devices.

Moreover, in recent years we have seen many organizations embracing cloud computing and with this MFA has played an important factor in cloud computing. For this, stringent measures need to be taken into consideration to ensure those users having access to those systems are secured at all times.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
6526
The Importance of Health Information Exchange https://wylieblanchard.com/the-importance-of-health-information-exchange/ Sun, 17 Oct 2021 16:49:00 +0000 https://www.wylieblanchard.com/?p=6542 The security of your medical information has never been more important than it is today. The creation of secure electronic data transfer on a wide scale is undeniable, but many Americans still have their personal information stored within the paper filing systems of their doctor’s offices in numerous different locations. Currently, this health care information […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
.player6618 .plyr__controls, .player6618 .StampAudioPlayerSkin{ border-radius: px; overflow: hidden; } .player6618{ margin: 0 auto; } .player6618 .plyr__controls .plyr__controls { border-radius: none; overflow: visible; } .skin_default .player6618 .plyr__controls { overflow: visible; }
Magnifying Glass on Top of Document

The security of your medical information has never been more important than it is today. The creation of secure electronic data transfer on a wide scale is undeniable, but many Americans still have their personal information stored within the paper filing systems of their doctor’s offices in numerous different locations.

Currently, this health care information is shared between medical providers through physical means such as fax, mail, or direct transfer to a different office on behalf of the actual patient. All patients in the medical system have the right to have comprehensive and accurate records that their medical providers can rely on at all times. Fortunately, health information exchange has made it possible for each individual patient’s previous and current medical history to be completely accessible by whatever healthcare professionals they want to see via a shared and secure digital network.

What Exactly Is HIE?

Electronic health information exchange (HIE) is the electronic communication of health-related data between medical institutions, clinicians, and patients. This secure transmission of sensitive medical information is carried out entirely electronically between ONLY approved entities. This reduces total costs, increases patient care speed, safety, quality, and coordination. Below is just a quick snapshot of the numerous benefits associated with this premium data transfer system:

  • Circumvent issues associated with patient readmissions.
  • Improve the overall patient experience, care, and diagnoses opportunities.
  • Lower the rate of duplicate tests conducted on any one patient.
  • Sidestep complications associated with an incorrect medication prescription.

If you’re currently on the fence about incorporating this electronic transfer system into your business model, ponder the external benefits associated with this resource aside from just the ease of information. The standardization of this direct data transfer allows you to instantly input patient information into the Electronic Health Record (EHR) of the organization on the receiving end.

The Top Three Types of Health Information Exchange

There are three distinct types of this electronic system that are now known to be used by approved entities in order for it to function successfully.

Directed Exchange.

This secure method is used by numerous health care providers to directly transfer the medical information of each patient to ensure the use of coordinated care. This can include patient referrals, lab results and orders, immunization data, or even discharge summaries. The encrypted form of this extremely sensitive information is sent and received through the internet between trusted providers.

Query-Based Exchange

The trusted organizations with access to these records are able to find and/or request additional information about specific patients from other healthcare providers. This is a great way for any provider to gain knowledge on a new patient who has come to them in search of quality care. Physicians who work in the Emergency Room can truly benefit from this kind of access and reduction of administrative tasks when they must give time-sensitive care.

Consumer-Mediated Exchange.

Consumer-Mediated Exchange allows patients to take back control of their personal medical information. They can easily manage their own health care by gaining access to their information online. If they see any notes that are not correct within their file, they are able to make the necessary changes to the information quickly and efficiently.

These specified classifications exist to ensure every organization is able to utilize the health information exchange to the full extent of their needs and desires. Improving patient care is the goal and every provider now has the digital means to make this a reality through the HIE.

Understanding the Different Architectures.

Within the health information exchange, data is stored using three different architectural methods. These include centralized, decentralized, and hybrid.

Centralized.

The health information that is collected by and from the authorized organizations within the HIE network is stored in one database. This means all the important patient information can be found in one particular repository.

Decentralized.

Each class of health records is stored in its own independent database. The healthcare providers who are part of this electronic transferring system have complete ownership and control over how this information is shared.

Hybrid.

This is a combination of both centralized and decentralized architectures. Some healthcare organizations prefer to use a combination of both.

Through this push and pull exchange, all the necessary patient information is received by the proper organization. This seamless electronic transfer could truly make all the difference in the value of care any given patient is able to receive.

HIPAA Compliance: The Secure Exchange.

The security of the health information exchange rests in the fact that all the HIEs must comply with the HIPAA Privacy Rule. The United States Department of Health and Human Services (HHS) states this rule delivers a baseline of individual privacy requirements on a federal level that is to be adhered to in every single state. Each individual state is able to apply and enforce additional state laws that allow for a higher level of patient privacy protection.

Additionally, the Health Information Technology for Economic and Clinical Health Act has stated this electronic transfer must only occur in a connected manner that strives to improve the quality of patient healthcare. The extension of a business associate status to the HIEs also allows for the expansion of federal baseline protections. Given all the current measures put in place, this patient-centric electronic exchange exists to improve the overall patient experience.

Integrate the Best Solution Into Your Practice Today.

The health information exchange (HIE) has transformed into an incredibly streamlined digital process that gives healthcare providers and their patient’s peace of mind when it comes to the transferring of sensitive medical information. This has even become a source to contact The Centers for Medicare & Medicaid Services (CMS) with quality measure reports.

A convenient system like this forges a path for healthcare providers to truly improve every service they give to their clients. A single appointment can make all the difference.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
6542
Discussion with Sean T. O’Kelly: Leveraging Technology for Revenue Growth https://wylieblanchard.com/discussion-with-sean-t-okelly-leveraging-technology-for-revenue-growth/ Sun, 15 Nov 2020 07:08:00 +0000 https://www.wylieblanchard.com/?p=6241 I recently met with Sean T. O’Kelly, Chief Technology Officer for Meetings & Events International (MEI), to explore how business leaders can utilize technology as a tool to drive customer and revenue growth.  Here’s the full interview: Get the bonus Q&A with the audience by visiting GreatTechPros.com. Useful Links: Watch or Listen to Great Tech Pros anytime, anywhere.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
I recently met with Sean T. O’Kelly, Chief Technology Officer for Meetings & Events International (MEI), to explore how business leaders can utilize technology as a tool to drive customer and revenue growth. 

Here’s the full interview:

Get the bonus Q&A with the audience by visiting GreatTechPros.com.

Useful Links:

Watch or Listen to Great Tech Pros anytime, anywhere.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
6241