Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Digital Transformation Strategy (NOW Corp CEO Presentation of Mel Velarde, Makati City, March 15, 2016)


Published on

NOW Corporation provides Fiber Speeds of up to 700Mbps through the Air and Underground to Large Enterprises — Philippine Stock Exchange listed firm NOW Corporation (“NOW”), a Telecom, Media and Technology company that provides value-added services (VAS) such as Virtual Private Network, Digital Media Production, IT Resource Management, Software Solutions, Cloud Services and Broadband Infrastructure Services, met recently with existing and future clients and partners at the posh Barcino Wine and Resto Bar in Makati City. NOW CEO Mel Velarde, who emphasized the need for today’s large enterprises with sophisticated and demanding IT needs to look at IT as an important part of the overall business decision-making process. For more information about NOW Corporation, visit
Digital Transformation Strategy (NOW Corp CEO Presentation of Mel Velarde, Makati City, March 15, 2016)

Published in: Technology
  • Be the first to comment

Digital Transformation Strategy (NOW Corp CEO Presentation of Mel Velarde, Makati City, March 15, 2016)

  2. 2. Source: h*p://<<ve-posi<on-templates-example PORTER’S FIVE FORCES MODEL OF COMPETITION
  3. 3. Source: h*p://<macy-meet-opera<onal-excellence CUSTOMER VALUE PROPOSITIONS
  4. 4. Source: h*ps://<macy/ VALUE DISCIPLINES
  5. 5. Source: h*ps://www.capgemini-consul<<on NAVIGATE DIGITAL TRANSFORMATION
  7. 7. GEOFFREY A. MOORE : Author of Crossing the Chasm Here is the bestselling guide that created a new game plan for marke9ng in high-tech industries. Crossing the Chasm has become the bible for bringing cu<ng-edge products to progressively larger markets. This edi9on provides new insights into the reali9es of high-tech marke9ng, with special emphasis on the Internet. It's essen9al reading for anyone with a stake in the world's most exci9ng marketplace.
  8. 8. Opera<onal Excellence Emo<onal Connec<ons The NEW CUSTOMER RELATIONSHIP Customer In<macy The digital rela<onship adds The human rela<onship adds Automa<on + Data Empathy + Crea<vity + Passion
  9. 9. MALCOLM GLADWELL Author Of “Outliers - The Story Of Success"
  11. 11. YELLOW CAB PIZZA CO. Year: 2014-2015 Project: Digital Store PlaRorm: iOS, Android Features: Loyalty Card, Coupons, Rewards, Push No<fica<on. Value: Customer Development.
  12. 12. AYALA LAND INC. Year: 2013-2014 PlaRorm: Web Project: Corporate Website Features: Responsive Web Design, Publica<on, CMS. Value: Awareness, Accessibility, Feedback.
  13. 13. DEPARTMENT OF TOURISM Year: 2012-2014 Project: It’s More Fun in the Philippines Website PlaRorm: Web Features: Responsive Web Design, CMS, Maps. Value: Global Awareness, Marke<ng, News.
  14. 14. DEPARTMENT OF TOURISM Year: 2012-2014 Project: It’s More fun in the Philippines App Features: Events, Photos, Meme. Value: Global Awareness, Promo<on, Tourism, Fun. PlaRorm: iOS
  15. 15. PHINMA Year: 2012-2016 Project: Human Resources PlaRorm: Web Features: 201 Files, A*endance, Leave, Over<me, Document Library, Performance Monitoring, Web Portal. Value: Produc<vity, Company Wide Update.
  16. 16. BDO Year: 2015-2016 Project: Collabora<on Platform: Private Cloud Features: Email, Social, Documents, Files, Community, Discussion, Calendar, Meeting, Chat, Video Conferencing. Value: Productivity, Collaboration.
  17. 17. CHINABANK Year: 2015-2016 Project: Communica<on System Platform: Web Features: Email, Documents, Files, Discussion, Calendar. Value: Productivity, Collaboration.
  18. 18. Source: h*ps://<cal-security-controls CIS Critical Security Controls Version 6.0 CSC 1: Inventory of Authorized and Unauthorized Devices CSC 2: Inventory of Authorized and Unauthorized SoNware CSC 3: Secure Configura9ons for Hardware and SoNware on Mobile Devices, Laptops, Worksta9ons, and Servers CSC 4: Con9nuous Vulnerability Assessment and Remedia9on CSC 5: Controlled Use of Administra9ve Privileges CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs CSC 7: Email and Web Browser Protec9ons CSC 8: Malware Defenses CSC 9: Limita9on and Control of Network Ports, Protocols, and Services CSC 10: Data Recovery Capability CSC 11: Secure Configura9ons for Network Devices such as Firewalls, Routers, and Switches CSC 12: Boundary Defense CSC 13: Data Protec9on CSC 14: Controlled Access Based on the Need to Know CSC 15: Wireless Access Control CSC 16: Account Monitoring and Control CSC 17: Security Skills Assessment and Appropriate Training to Fill Gaps CSC 18: Applica9on SoNware Security CSC 19: Incident Response and Management CSC 20: Penetra9on Tests and Red Team Exercises
  19. 19. Thank You!