Tag Archives: Information Security Management

Information Security Management Self-Assessment: Meeting the challenge: are missed Information Security Management opportunities costing us money?

This Instant-Access Self-Assessment Excel Dashboard and accompanying eBook is for managers, advisors, consultants, specialists, professionals and anyone interested in Information Security Management assessment.

‘Excellent customer service, superior product with best-in-class ease of use and functionality in key areas of evaluation. The tool’s outcomes were able to integrate easily with our key processes and perform well.’ – BI Developer in the Finance Industry

‘Very visual and easy to use. Implementation was easy. Highly Recommended.’ – PMO-Data and Analytics in the Media Industry

‘The tool is great for reporting and has really allowed effective decision making.’ – Associate Director, IT PMO in the Manufacturing Industry

What Is The Information Security Management Self-Assessment?

The Information Security Management Self-Assessment’s Purpose is:

  • To help our clients to reduce their effort in the Information Security Management work they do to get their problem solved
  • To help our clients in ensuring that their plans of action include every Information Security Management task and that every Information Security Management outcome is in place
  • To help our clients not having to spend time investigating strategic and tactical options, therefore saving time and ensuring Information Security Management opportunity costs are low
  • To help our clients channel implementation direction instantly to deliver tailored Information Security Management advise with structured going-forward plans

All the tools you need to an in-depth Information Security Management Self-Assessment. Featuring 640 new and updated case-based questions, organized into seven core areas of process design, this Self-Assessment will help you identify areas in which Information Security Management improvements can be made.

What You Get:

The Information Security Management Complete Self-Assessment Excel Dashboard

  • Ensures you don’t miss anything: 640 questions in 7 RDMAICS (Recognize, Define, Measure, Analyze, Improve, Control and Sustain) steps with easy and quick navigating and answering for 1 or up to 10 participants
  • Shows your organization instant insight in areas for improvement: Auto generates reports, radar chart for maturity assessment, insights per process and participant and bespoke, ready to use, RACI Matrix
  • Gives you a professional Dashboard to guide and perform a thorough Information Security Management Self-Assessment
  • Dynamically generated projects-ready RACI Matrix shows your organization exactly what to do next
  • Is secure: Ensures offline data protection of your Self-Assessment results

The Information Security Management Complete Self Assessment eBook version of the book in print

  • Provides a convenient way to distribute and share among the participants to prepare and discuss the Self-Assessment

In using the Self-Assessment you will be better able to:

  • Diagnose Information Security Management projects, initiatives, organizations, businesses and processes using accepted diagnostic standards and practices
  • Implement evidence-based best practice strategies aligned with overall goals
  • Integrate recent advances in Information Security Management and process design strategies into practice according to best practice guidelines

Assess and define Information Security Management with this Information Security Management Self Assessment. Sample questions from the Complete, 640 Questions, Self-Assessment:

  • Recognize Question: Have all basic functions of Information Security Management been defined?
  • Define Question: How do we Lead with Information Security Management in Mind?
  • Measure Question: Information Security Management within Service Operation is a mature practice
  • Analyze Question: What are the revised rough estimates of the financial savings/opportunity for Information Security Management improvements?
  • Improve Question: Think about the people you identified for your Information Security Management project and the project responsibilities you would assign to them. what kind of training do you think they would need to perform these responsibilities effectively?
  • Control Question: How do we Identify specific Information Security Management investment and emerging trends?
  • Sustain Question: Meeting the challenge: are missed Information Security Management opportunities costing us money?

Value [to you] of the Information Security Management Self-Assessment

Excluding hired consultants and advisors from top management consulting firms, internal Information Security Management Self-Assessment work is typically undertaken by senior level positions with titles such as Enterprise Architect, Business Process Architects, Business Process Re-engineering Specialists and Business Architects.

Statistics according to Glassdoor and Indeed tell these positions receive an average basic pay of $125,000. Daily rates of basic pay are computed by dividing an employee’s annual pay by 260 days. The daily salary is then derived by dividing the annual salary of $125,000 by 260 days = a daily rate of $480.

Top management consulting firms start at $2,000 a day, with rates typically charged up to 40 hours per week.

For the price of a fraction of this you can get complete peace of mind. Now.

Defining, designing, creating, and implementing a process to solve a business challenge or meet a business objective is the most valuable role… In EVERY company, organization and department.

Unless you are talking a one-time, single-use project within a business, there should be a process. Whether that process is managed and implemented by humans, AI, or a combination of the two, it needs to be designed by someone with a complex enough perspective to ask the right questions. Someone capable of asking the right questions and step back and say, ‘What are we really trying to accomplish here? And is there a different way to look at it?’

For more than twenty years, The Art of Service’s Self-Assessments empower people who can do just that – whether their title is marketer, entrepreneur, manager, salesperson, consultant, business process manager, executive assistant, IT Manager, CxO etc… – they are the people who rule the future. They are people who watch the process as it happens, and ask the right questions to make the process work better.

You are free to use the Self-Assessment contents in your presentations and documentation for internal end external use without asking us – we are here to help.

Information Security Management Self-Assessment: What is information security management (ism)?

This Instant-Access Self-Assessment Excel Dashboard and accompanying eBook is for managers, advisors, consultants, specialists, professionals and anyone interested in Information Security Management assessment.

‘Overall, its an easy tool to use and setup’ – Director UI/UX Front End Development in the Media Industry

‘Well, I have been using The Art of Service’s self assessments just for a few months and I’m impressed how easy it is to create cool visualizations, and RACI roadmaps. Also, is one of the best tools to create dashboards using Big Data.’ – CIO in the Construction Industry

‘The Art of Service is worth your time. Great product, great experience’ – Sr. Manager in the Retail Industry

What Is The Information Security Management Self-Assessment?

The Information Security Management Self-Assessment’s Purpose is:

  • To help our clients to reduce their effort in the Information Security Management work they do to get their problem solved
  • To help our clients in ensuring that their plans of action include every Information Security Management task and that every Information Security Management outcome is in place
  • To help our clients not having to spend time investigating strategic and tactical options, therefore saving time and ensuring Information Security Management opportunity costs are low
  • To help our clients channel implementation direction instantly to deliver tailored Information Security Management advise with structured going-forward plans

All the tools you need to an in-depth Information Security Management Self-Assessment. Featuring 640 new and updated case-based questions, organized into seven core areas of process design, this Self-Assessment will help you identify areas in which Information Security Management improvements can be made.

What You Get:

The Information Security Management Complete Self-Assessment Excel Dashboard

  • Ensures you don’t miss anything: 640 questions in 7 RDMAICS (Recognize, Define, Measure, Analyze, Improve, Control and Sustain) steps with easy and quick navigating and answering for 1 or up to 10 participants
  • Shows your organization instant insight in areas for improvement: Auto generates reports, radar chart for maturity assessment, insights per process and participant and bespoke, ready to use, RACI Matrix
  • Gives you a professional Dashboard to guide and perform a thorough Information Security Management Self-Assessment
  • Dynamically generated projects-ready RACI Matrix shows your organization exactly what to do next
  • Is secure: Ensures offline data protection of your Self-Assessment results

The Information Security Management Complete Self Assessment eBook version of the book in print

  • Provides a convenient way to distribute and share among the participants to prepare and discuss the Self-Assessment

In using the Self-Assessment you will be better able to:

  • Diagnose Information Security Management projects, initiatives, organizations, businesses and processes using accepted diagnostic standards and practices
  • Implement evidence-based best practice strategies aligned with overall goals
  • Integrate recent advances in Information Security Management and process design strategies into practice according to best practice guidelines

Assess and define Information Security Management with this Information Security Management Self Assessment. Sample questions from the Complete, 640 Questions, Self-Assessment:

  • Recognize Question: Are there any easy-to-implement alternatives to Information Security Management? Sometimes other solutions are available that do not require the cost implications of a full-blown project?
  • Define Question: What are your current levels and trends in key measures or indicators of Information Security Management product and process performance that are important to and directly serve your customers? how do these results compare with the performance of your competi tors and other organizations with similar offerings?
  • Measure Question: What potential environmental factors impact the Information Security Management effort?
  • Analyze Question: What knowledge, skills and characteristics mark a good Information Security Management project manager?
  • Improve Question: How can you negotiate Information Security Management successfully with a stubborn boss, an irate client, or a deceitful coworker?
  • Control Question: Is there a critical path to deliver Information Security Management results?
  • Sustain Question: What is information security management (ism)?

Value [to you] of the Information Security Management Self-Assessment

Excluding hired consultants and advisors from top management consulting firms, internal Information Security Management Self-Assessment work is typically undertaken by senior level positions with titles such as Enterprise Architect, Business Process Architects, Business Process Re-engineering Specialists and Business Architects.

Statistics according to Glassdoor and Indeed tell these positions receive an average basic pay of $125,000. Daily rates of basic pay are computed by dividing an employee’s annual pay by 260 days. The daily salary is then derived by dividing the annual salary of $125,000 by 260 days = a daily rate of $480.

Top management consulting firms start at $2,000 a day, with rates typically charged up to 40 hours per week.

For the price of a fraction of this you can get complete peace of mind. Now.

Defining, designing, creating, and implementing a process to solve a business challenge or meet a business objective is the most valuable role… In EVERY company, organization and department.

Unless you are talking a one-time, single-use project within a business, there should be a process. Whether that process is managed and implemented by humans, AI, or a combination of the two, it needs to be designed by someone with a complex enough perspective to ask the right questions. Someone capable of asking the right questions and step back and say, ‘What are we really trying to accomplish here? And is there a different way to look at it?’

For more than twenty years, The Art of Service’s Self-Assessments empower people who can do just that – whether their title is marketer, entrepreneur, manager, salesperson, consultant, business process manager, executive assistant, IT Manager, CxO etc… – they are the people who rule the future. They are people who watch the process as it happens, and ask the right questions to make the process work better.

You are free to use the Self-Assessment contents in your presentations and documentation for internal end external use without asking us – we are here to help.

Information Security Management Self-Assessment: Which of the following statements about the authentication concept of information security management is true?

This Instant-Access Self-Assessment Excel Dashboard and accompanying eBook is for managers, advisors, consultants, specialists, professionals and anyone interested in Information Security Management assessment.

‘Excellent customer service, superior product with best-in-class ease of use and functionality in key areas of evaluation. The tool’s outcomes were able to integrate easily with our key processes and perform well.’ – BI Developer in the Finance Industry

‘Great product, easy to use, just as advertised. Great tool for analyst and easy to share with business.’ – Manager in the Finance Industry

‘The Art of Service has proven to be the right decision for our company. We needed a product that was going to service everyone from Data Scientist to self-service non-IT data consumer. The Art of Service’s self assessment has been proven very easy to use and demand is surging through word of mouth within the company. Training from The Art of Service has been proving to be among the best we have ever used. Technical support has been very responsive to every thing from basic issues to advance enterprise data integration. The Art of Service Dashboards have made data within the company much more widely available with insights available to an order of magnitude consumers. The roadmaps that The Art of Service provides match the needs we have for more self-service and higher performance. The Art of Service executives have demonstrated they are very interested in being long term partners with a large enterprise implementation.’ – IT Program Senior Manager in the Manufacturing Industry

What Is The Information Security Management Self-Assessment?

The Information Security Management Self-Assessment’s Purpose is:

  • To help our clients to reduce their effort in the Information Security Management work they do to get their problem solved
  • To help our clients in ensuring that their plans of action include every Information Security Management task and that every Information Security Management outcome is in place
  • To help our clients not having to spend time investigating strategic and tactical options, therefore saving time and ensuring Information Security Management opportunity costs are low
  • To help our clients channel implementation direction instantly to deliver tailored Information Security Management advise with structured going-forward plans

All the tools you need to an in-depth Information Security Management Self-Assessment. Featuring 640 new and updated case-based questions, organized into seven core areas of process design, this Self-Assessment will help you identify areas in which Information Security Management improvements can be made.

What You Get:

The Information Security Management Complete Self-Assessment Excel Dashboard

  • Ensures you don’t miss anything: 640 questions in 7 RDMAICS (Recognize, Define, Measure, Analyze, Improve, Control and Sustain) steps with easy and quick navigating and answering for 1 or up to 10 participants
  • Shows your organization instant insight in areas for improvement: Auto generates reports, radar chart for maturity assessment, insights per process and participant and bespoke, ready to use, RACI Matrix
  • Gives you a professional Dashboard to guide and perform a thorough Information Security Management Self-Assessment
  • Dynamically generated projects-ready RACI Matrix shows your organization exactly what to do next
  • Is secure: Ensures offline data protection of your Self-Assessment results

The Information Security Management Complete Self Assessment eBook version of the book in print

  • Provides a convenient way to distribute and share among the participants to prepare and discuss the Self-Assessment

In using the Self-Assessment you will be better able to:

  • Diagnose Information Security Management projects, initiatives, organizations, businesses and processes using accepted diagnostic standards and practices
  • Implement evidence-based best practice strategies aligned with overall goals
  • Integrate recent advances in Information Security Management and process design strategies into practice according to best practice guidelines

Assess and define Information Security Management with this Information Security Management Self Assessment. Sample questions from the Complete, 640 Questions, Self-Assessment:

  • Recognize Question: What knowledge, skills and characteristics mark a good Information Security Management project manager?
  • Define Question: Is there a recommended audit plan for routine surveillance inspections of Information Security Management’s gains?
  • Measure Question: What situation(s) led to this Information Security Management Self Assessment?
  • Analyze Question: Are there any disadvantages to implementing Information Security Management? There might be some that are less obvious?
  • Improve Question: Are improvement team members fully trained on Information Security Management?
  • Control Question: At what point will vulnerability assessments be performed once Information Security Management is put into production (e.g., ongoing Risk Management after implementation)?
  • Sustain Question: Which of the following statements about the authentication concept of information security management is true?

Value [to you] of the Information Security Management Self-Assessment

Excluding hired consultants and advisors from top management consulting firms, internal Information Security Management Self-Assessment work is typically undertaken by senior level positions with titles such as Enterprise Architect, Business Process Architects, Business Process Re-engineering Specialists and Business Architects.

Statistics according to Glassdoor and Indeed tell these positions receive an average basic pay of $125,000. Daily rates of basic pay are computed by dividing an employee’s annual pay by 260 days. The daily salary is then derived by dividing the annual salary of $125,000 by 260 days = a daily rate of $480.

Top management consulting firms start at $2,000 a day, with rates typically charged up to 40 hours per week.

For the price of a fraction of this you can get complete peace of mind. Now.

Defining, designing, creating, and implementing a process to solve a business challenge or meet a business objective is the most valuable role… In EVERY company, organization and department.

Unless you are talking a one-time, single-use project within a business, there should be a process. Whether that process is managed and implemented by humans, AI, or a combination of the two, it needs to be designed by someone with a complex enough perspective to ask the right questions. Someone capable of asking the right questions and step back and say, ‘What are we really trying to accomplish here? And is there a different way to look at it?’

For more than twenty years, The Art of Service’s Self-Assessments empower people who can do just that – whether their title is marketer, entrepreneur, manager, salesperson, consultant, business process manager, executive assistant, IT Manager, CxO etc… – they are the people who rule the future. They are people who watch the process as it happens, and ask the right questions to make the process work better.

You are free to use the Self-Assessment contents in your presentations and documentation for internal end external use without asking us – we are here to help.

Information Security Management Self-Assessment: Meeting the Challenge: Are Missed Information Security Management opportunities Costing you Money?

This Instant-Access Self-Assessment Excel Dashboard and accompanying eBook is for managers, advisors, consultants, specialists, professionals and anyone interested in Information Security Management assessment.

‘TAOS’s self-assessment was one of the most successful initiatives we have undertaken in recent years’ – Director of Information Technology in the Manufacturing Industry

‘Wonderful user and sales experience. Excellent sales and product support. The The Art of Service team has gone above and beyond to help ensure that we are getting more than we expected out of the tool. The product is extremely user friendly and is helping us to put information in the hands of those who need it, quickly and reliably.’ – Executive Vice President, Supply Chain in the Manufacturing Industry

‘Our initial rollout of The Art of Service’s self assessment has added significant value across multiple functional areas. We are extremely happy with the end product. We’ve begun training teams of super-users within the organization to make this a self-service analytics tool and adoption has been strong across all levels of the organization.’ – VP Financial Analysis and Insights in the Transportation Industry

What Is The Information Security Management Self-Assessment?

The Information Security Management Self-Assessment’s Purpose is:

  • To help our clients to reduce their effort in the Information Security Management work they do to get their problem solved
  • To help our clients in ensuring that their plans of action include every Information Security Management task and that every Information Security Management outcome is in place
  • To help our clients not having to spend time investigating strategic and tactical options, therefore saving time and ensuring Information Security Management opportunity costs are low
  • To help our clients channel implementation direction instantly to deliver tailored Information Security Management advise with structured going-forward plans

All the tools you need to an in-depth Information Security Management Self-Assessment. Featuring 640 new and updated case-based questions, organized into seven core areas of process design, this Self-Assessment will help you identify areas in which Information Security Management improvements can be made.

What You Get:

The Information Security Management Complete Self-Assessment Excel Dashboard

  • Ensures you don’t miss anything: 640 questions in 7 RDMAICS (Recognize, Define, Measure, Analyze, Improve, Control and Sustain) steps with easy and quick navigating and answering for 1 or up to 10 participants
  • Shows your organization instant insight in areas for improvement: Auto generates reports, radar chart for maturity assessment, insights per process and participant and bespoke, ready to use, RACI Matrix
  • Gives you a professional Dashboard to guide and perform a thorough Information Security Management Self-Assessment
  • Dynamically generated projects-ready RACI Matrix shows your organization exactly what to do next
  • Is secure: Ensures offline data protection of your Self-Assessment results

The Information Security Management Complete Self Assessment eBook version of the book in print

  • Provides a convenient way to distribute and share among the participants to prepare and discuss the Self-Assessment

In using the Self-Assessment you will be better able to:

  • Diagnose Information Security Management projects, initiatives, organizations, businesses and processes using accepted diagnostic standards and practices
  • Implement evidence-based best practice strategies aligned with overall goals
  • Integrate recent advances in Information Security Management and process design strategies into practice according to best practice guidelines

Assess and define Information Security Management with this Information Security Management Self Assessment. Sample questions from the Complete, 640 Questions, Self-Assessment:

  • Recognize Question: What tools and technologies are needed for a custom Information Security Management project?
  • Define Question: How will the Information Security Management team and the organization measure complete success of Information Security Management?
  • Measure Question: How are the Information Security Management’s objectives aligned to the organization’s overall business strategy?
  • Analyze Question: Meeting the Challenge: Are Missed Information Security Management opportunities Costing you Money?
  • Improve Question: Who are the Information Security Management improvement team members, including Management Leads and Coaches?
  • Control Question: Will team members regularly document their Information Security Management work?
  • Sustain Question: Meeting the Challenge: Are Missed Information Security Management opportunities Costing you Money?

Value [to you] of the Information Security Management Self-Assessment

Excluding hired consultants and advisors from top management consulting firms, internal Information Security Management Self-Assessment work is typically undertaken by senior level positions with titles such as Enterprise Architect, Business Process Architects, Business Process Re-engineering Specialists and Business Architects.

Statistics according to Glassdoor and Indeed tell these positions receive an average basic pay of $125,000. Daily rates of basic pay are computed by dividing an employee’s annual pay by 260 days. The daily salary is then derived by dividing the annual salary of $125,000 by 260 days = a daily rate of $480.

Top management consulting firms start at $2,000 a day, with rates typically charged up to 40 hours per week.

For the price of a fraction of this you can get complete peace of mind. Now.

Defining, designing, creating, and implementing a process to solve a business challenge or meet a business objective is the most valuable role… In EVERY company, organization and department.

Unless you are talking a one-time, single-use project within a business, there should be a process. Whether that process is managed and implemented by humans, AI, or a combination of the two, it needs to be designed by someone with a complex enough perspective to ask the right questions. Someone capable of asking the right questions and step back and say, ‘What are we really trying to accomplish here? And is there a different way to look at it?’

For more than twenty years, The Art of Service’s Self-Assessments empower people who can do just that – whether their title is marketer, entrepreneur, manager, salesperson, consultant, business process manager, executive assistant, IT Manager, CxO etc… – they are the people who rule the future. They are people who watch the process as it happens, and ask the right questions to make the process work better.

You are free to use the Self-Assessment contents in your presentations and documentation for internal end external use without asking us – we are here to help.

Information Security Management Self-Assessment: Does the Information Security Management task fit the client’s priorities?

This Instant-Access Self-Assessment Excel Dashboard and accompanying eBook is for managers, advisors, consultants, specialists, professionals and anyone interested in Information Security Management assessment.

‘The Art of Service has been valuable partner and effective with their engagements.’ – CIO in the Government Industry

‘Great product, easy to use, just as advertised. Great tool for analyst and easy to share with business.’ – Manager in the Finance Industry

‘Solid product for explorative data visualization, with variety of filtering, maps, drill through reports visually appealing and instantly available. Desktop product was easy to install and deploy reports within a short time period. Opened up a new world of interactive interpretation of data, rather than static reports delivered 1 x month.’ – Sr. Data Analytics Consultant in the Services Industry

What Is The Information Security Management Self-Assessment?

The Information Security Management Self-Assessment’s Purpose is:

  • To help our clients to reduce their effort in the Information Security Management work they do to get their problem solved
  • To help our clients in ensuring that their plans of action include every Information Security Management task and that every Information Security Management outcome is in place
  • To help our clients not having to spend time investigating strategic and tactical options, therefore saving time and ensuring Information Security Management opportunity costs are low
  • To help our clients channel implementation direction instantly to deliver tailored Information Security Management advise with structured going-forward plans

All the tools you need to an in-depth Information Security Management Self-Assessment. Featuring 640 new and updated case-based questions, organized into seven core areas of process design, this Self-Assessment will help you identify areas in which Information Security Management improvements can be made.

What You Get:

The Information Security Management Complete Self-Assessment Excel Dashboard

  • Ensures you don’t miss anything: 640 questions in 7 RDMAICS (Recognize, Define, Measure, Analyze, Improve, Control and Sustain) steps with easy and quick navigating and answering for 1 or up to 10 participants
  • Shows your organization instant insight in areas for improvement: Auto generates reports, radar chart for maturity assessment, insights per process and participant and bespoke, ready to use, RACI Matrix
  • Gives you a professional Dashboard to guide and perform a thorough Information Security Management Self-Assessment
  • Dynamically generated projects-ready RACI Matrix shows your organization exactly what to do next
  • Is secure: Ensures offline data protection of your Self-Assessment results

The Information Security Management Complete Self Assessment eBook version of the book in print

  • Provides a convenient way to distribute and share among the participants to prepare and discuss the Self-Assessment

In using the Self-Assessment you will be better able to:

  • Diagnose Information Security Management projects, initiatives, organizations, businesses and processes using accepted diagnostic standards and practices
  • Implement evidence-based best practice strategies aligned with overall goals
  • Integrate recent advances in Information Security Management and process design strategies into practice according to best practice guidelines

Assess and define Information Security Management with this Information Security Management Self Assessment. Sample questions from the Complete, 640 Questions, Self-Assessment:

  • Recognize Question: Does Information Security Management appropriately measure and monitor risk?
  • Define Question: Does Information Security Management analysis show the relationships among important Information Security Management factors?
  • Measure Question: For your Information Security Management project, identify and describe the business environment. is there more than one layer to the business environment?
  • Analyze Question: What about Information Security Management Analysis of results?
  • Improve Question: How does the organization define, manage, and improve its Information Security Management processes?
  • Control Question: How can we improve Information Security Management?
  • Sustain Question: Does the Information Security Management task fit the client’s priorities?

Value [to you] of the Information Security Management Self-Assessment

Excluding hired consultants and advisors from top management consulting firms, internal Information Security Management Self-Assessment work is typically undertaken by senior level positions with titles such as Enterprise Architect, Business Process Architects, Business Process Re-engineering Specialists and Business Architects.

Statistics according to Glassdoor and Indeed tell these positions receive an average basic pay of $125,000. Daily rates of basic pay are computed by dividing an employee’s annual pay by 260 days. The daily salary is then derived by dividing the annual salary of $125,000 by 260 days = a daily rate of $480.

Top management consulting firms start at $2,000 a day, with rates typically charged up to 40 hours per week.

For the price of a fraction of this you can get complete peace of mind. Now.

Defining, designing, creating, and implementing a process to solve a business challenge or meet a business objective is the most valuable role… In EVERY company, organization and department.

Unless you are talking a one-time, single-use project within a business, there should be a process. Whether that process is managed and implemented by humans, AI, or a combination of the two, it needs to be designed by someone with a complex enough perspective to ask the right questions. Someone capable of asking the right questions and step back and say, ‘What are we really trying to accomplish here? And is there a different way to look at it?’

For more than twenty years, The Art of Service’s Self-Assessments empower people who can do just that – whether their title is marketer, entrepreneur, manager, salesperson, consultant, business process manager, executive assistant, IT Manager, CxO etc… – they are the people who rule the future. They are people who watch the process as it happens, and ask the right questions to make the process work better.

You are free to use the Self-Assessment contents in your presentations and documentation for internal end external use without asking us – we are here to help.