Take a look at what our consultants have been discussing this week... Finance Transformation: How do you measure success?“Our guests agreed that to create a successful Finance Transformation you must outline how best to measure success, identify your key metrics and explore how they align with your strategy but there remains no standardised or straight-forward method of measuring success and I'd like to find out how you tackle this.” - Josh White Does the ideal Data Scientist exist and where should we sit them?“This has made me wonder if the turnover of Data Science professionals is really linked to where they sit in a company. If we were allowing them to sit on a desk where they will learn, develop and progress as a tech professional will they be more inclined to stay on board? Are we stunting their growth by sitting them next to people they will never technically learn from?.” – Alex Walsh The Scottish Labour Market is outperforming the UK but is it a good thing for small and medium enterprises?“International giants are moving to Scotland in a bid to capture the country’s top talent but while it’s boosting the books, SMEs are struggling to attract existing technology professionals who are interested in working for techy start-ups, corporate giants and not much in-between.” – Izzy Brown Who is the ideal CISO and is their route to c-suite changing?“CISOs are now expected to address the board and have a relationship with the CEO, discuss whole business issues, be personable, approachable and an all-round communicator but with a new level of sophistication and a heap of responsibility, are we narrowing down the profile of the ideal CISO?” – Ryan Surry To read more of our insightful content visit our Blog.
15 Jan 2019
Associate Director - Accounting£110,000 - £120,000 per annum + car allowance + bonus + benefitsReading, Berkshire Project Manager - Salesforce£450 - £550 per dayBasingstoke, Hampshire Security Architecture DirectorUp to £150,000 per annum + £20,000 bonusLondon Group Financial Reporting Manager£500 - £600 per dayOxfordshire Group FP&A Manager£70,000 - £80,000 per annum + blue chips benefits South West London Data Stream Lead - ERPNegotiable Hampshire A wider selection of current vacancies can be viewed on our opportunities page or get in touch for a confidential discussion about how Stanton House can help you hire great people or assist with your own career goals.
11 Jan 2019
The CISO has been around for more than a decade but with Cyber becoming as mainstream as Finance and HR, has the role evolved with the times and are we being more selective with who we let take to the throne?The profile of the CISO has been elevated in an age of high-profile cyber-attacks and they are now expected to do more than just analyse the potential security risks for the company or wear a uniquely technical hat. CISOs are now expected to address the board and have a relationship with the CEO, discuss whole business issues, be personable, approachable and an all-round communicator but with a new level of sophistication and a heap of responsibility, are we narrowing down the profile of the ideal CISO?I have been speaking to my network about their ideal CISO and the education, career journey and social behaviour they bring to the table but I’d like to hear from you and see if you too have an idea of the perfect CISO and if their route to c-suite has been altered along the way.Is the route to CISO changing? Please spare 60-seconds to take my anonymous survey. All results will be published within an insight paper focused on the changing role of the CISO.
09 Jan 2019
Take a look at what our consultants have been discussing in the last seven days: Did you know less than 10% of data breaches are physical hacking attempts? “Malware is thought to be the most dangerous threat to cyber security and as illustrated below, since 2013 it has continued to rise however over the last two years we have seen a drop in Malware data breaches and I’m curious to find out why.” - Tyler Smith Is the Private Equity Space doing enough to represent women? “Presenting a shortlist which represents all genders, ethnicities and abilities while ensuring each is highly competent and completely suitable for the job can be a challenge. You can’t sacrifice competencies in aid of diversity but you can’t neglect equalities either. While it’s often a challenge, it’s something I pride myself in being able to achieve and something that Deborah Zurkow of Alianz Global Investors said reinvested my faith that my clients appreciate the effort.” – Joanne Moses Is your workplace due a transformation in 2019?“With an emphasis on transforming workplace culture, improving diversity and retaining millennial talent – my network are busy planning their transformation projects for 2019 ensuring the New Year brings with it a new lease of life for their organisations. To help with this, I have been speaking to my network about reverse-mentoring and its ability to transform a workplace - How it can help you to improve racial, intergenerational, hierarchical and gender diversity; retain millennial talent, broaden your demographic, engage a new generation and up-skill an existing workforce.” – David Garstang
17 Dec 2018
I came across this table in the Verizon 2018 Data Breach Investigations Report and was slightly shocked myself. Just 10% of data breaches; if not less, are the result of a physical hacking attempt but perhaps more surprisingly, Malware seems to be on the decline. Malware is thought to be the most dangerous threat to cyber security and as illustrated below, since 2013 it has continued to rise however over the last two years we have seen a drop in Malware data breaches and I’m curious to find out why. Are companies becoming more sophisticated with their cyber security or is there an up and coming threat on the horizon?
11 Dec 2018
This figure is always the pinnacle of debate in the cyber industry as contradictory statistics circulate on a daily basis but I have never seen it hit the 80% mark, let alone go over it. Deadly combo; attacks are becoming more sophisticated and are companies being ignorant to the challenges they face - ill-prepared to deal with the consequences? I visited the Cyber Security Summit and Expo last week and sat through two talks with software companies who combat cyber threats which can range from accidental issues such as phishing scams to a more malicious attack to purposefully detract information and use it. It was during a speech by Aruba that I heard that 84% of data breaches came from the inside. It was a thought-provoking talk as it opened my eyes to the sheer number of breaches which can happen either accidentally or; more worryingly, internally. This is the fifth event I have visiting in the last two months as I love learning about new technology and exploring the processes that my network are interested in implementing. It’s my role as a Consultant to learn about common issues in the market and provide insight to my network of cyber professionals to try and solve them. But, with this statistic at the forefront of my mind, it is evident that companies need to do more to implement processes and protocol for a potential security breach. I’m keen to hear more about what you currently have in place at your own organisations. What happens if someone receives an email that doesn’t quite look right? Do your team know how to respond? Please do get in touch and let us know how your organisation works to stop insider threats becoming data breaches.
03 Dec 2018
Everyone is obviously fascinated by Elon Musk’s every move, with his most recent manoeuvre I think it should be more thought provoking and a warning to other businesses.Is your own house in order? First port of call should always be too look internally surely? Maybe this is similar with GDPR in the fact that everyone is taking lots of care with their clients data and maybe the data closer to home is something which shouldn’t be neglected. This is featuring more prevalently at board level meetings as this doesn’t just effect the security function but all business division decision makers.John McAfee says insider threats are responsible for 43% of data breaches and the Information Security Forum says its more like 54%. Raytheon released a survey saying it was a relatively low risk with only 36% saying they consider malicious insiders to be a high risk? Surely Michael Daly is right….Whatever the answer one thing we do know is that the insider threat to corporate data is growing, which means the cost is growing and the need for proactive education, processes, hires and tech must increase right?!Does the cost or proactive measures outweigh that of big incidents? How are your internal behaviours being monitored? What do you take as your first step to securing this? Was Elon Musk right to send the email to all staff in that tone? Will corporates continue to fire fight and be reactive rather than proactive when it comes to their data and intellectual property? Snowden… hero or villain???
31 Jul 2018