SlideShare a Scribd company logo
1 of 14
Loss of employee loyalty in a changing worldLoss of employee loyalty in a changing world
Steve Anderson – IT Partner EMEA, Davis Langdon LLP
steve.anderson@davislangdon.com
STEVE
ANDERSON
 Over 15 years working in IT
 Held in a variety of technical roles before rising into
management – currently studying for my MBA
 Worked across many sectors including engineering,
manufacturing, transport, retail, high-tech,
management consultancy, finance, construction and
business services
 A ‘turn-around’ CIO
WHAT WE
ARE
 Davis Langdon is a multi disciplinary firm of client focused
specialists, highly experienced in all areas of the built
environment, with an in-depth knowledge of procurement,
development, finance and construction delivery processes.
WHERE WE
ARE
 Davis Langdon are established in all major economic
clusters, nationally and internationally
QATAR
DUBAI
BAHRAIN
LEBANON
BRUNEI
CHINA
HONG KONG
MALAYSIA
PHILIPPINES
SINGAPORE
THAILAND
VIETNAM
AUSTRALIA
NEW ZEALAND
SOUTH AFRICA
BOTSWA
NA
USA
SPAIN
POLAND
FRANCE
ENGLAND
SCOTLAND
WALES
EGYPT
KOREA
WEST AFRICA EAST AFRICA
IRELAND
CZECH REPUBLIC
Global reachGlobal reach Local deliveryLocal delivery
Europe/ Middle East
Offices: 33
Staff: 1350
Asia Pacific
Offices: 18
Staff: 960
Australasia
Offices: 13
Staff: 170
Africa
Offices: 14
Staff: 160
USA
Offices: 6
Staff: 60
A (RAPIDLY) CHANGING WORLD …
 Global issues
 Security, security, security…
 11th
September 2001
 Secularism
 Terrorism
 War
 Capitalism
 Globalisation
 Business issues
 Industrialisation
 Nationalisation
 Privatisation
 Re-engineering
 De-layering
 Empowerment
 Outsourcing
 Off-shoring
BUSINESS SECURITY
NEEDS
 Protect data – loss, integrity, access
 Backups & archiving
 Anti-virus & anti-malware
 Network access & authentication
 Technology is the answer?
 Intellectual property – the lost promise of KM
 The bottom line…
 No such thing as absolute security – manage imperfections
 Unlimited potential for investing in IT ‘solutions’ – cost vs. risk
 YOU (human beings) are the weakest link!
INDUSTRY OPINION
“Insiders, not crooks, still biggest
security threat” – 27 Aug 2004
“Insiders, not crooks, still biggest
security threat” – 27 Aug 2004
“You are still the weakest
security link” – 5 Aug 2004
“You are still the weakest
security link” – 5 Aug 2004
“Greatest security risk: Social
engineering, says Gartner” – 1 Nov
2004
“Greatest security risk: Social
engineering, says Gartner” – 1 Nov
2004
IMPACT ON EMPLOYEE LOYALTY?
 Trust – rise of redundancy and illusion of job security
 Transience – multiple jobs and even careers the norm
 Footloose – greater mobility and location flexibility
 Skills – birth of knowledge/information worker
 Knowledge – recognised as key competitive factor
 Intellectual property – how is this managed/controlled
 Culture – “herding cats” or “nailing jelly to a wall”
 Conclusion – loyalty is a product of motivation
THE HUMAN FACTOR
 “to really screw it up you need… a human being”
 Ignorance is bliss … but not an excuse
 Ineffective security
 Security is obstructive – busy, busy, busy
 Security is anti-social – trust no-one
 Security is inhuman – more than a number
 Security is oppressive – police state
 Make it automatic, simple and painless
 Taking it seriously – the real motivators
MOTIVATION?
 Negative
 Security policy
 Police state
 Risk
 Threats
 Fear
 Positive
 Awareness
 Education
 Understanding
 Simplicity
 Habit
INDUSTRY OPINION
“Companies still fail to take
security seriously” – 6 Sep 2004
“Companies still fail to take
security seriously” – 6 Sep 2004
“IT security culture must start from
the top” – 23 Sep 2004
“IT security culture must start from
the top” – 23 Sep 2004
MANAGEMENT vs. LEADERSHIP
Management Behaviour
Attitude
Values
Beliefs
Leadership
The human ‘iceberg’
SUMMARY
 Change today is inevitable – become adaptable
 Focus on real business risk – balance against cost
 Effective security is 20% technology & 80%
leadership – beware the security ‘arms race’
 Key management elements
 Understand, accept and accommodate the human factor
 Raise awareness and educate continually
 Encourage the appropriate behaviours through leadership
 Design practical policies – monitor and police (soft)
 Keep it current and applicable
QuestionsQuestions
Steve Anderson – IT Partner EMEA, Davis Langdon LLP
steve.anderson@davislangdon.com

More Related Content

What's hot

Lte research project overview
Lte research project overviewLte research project overview
Lte research project overviewfinnwill
 
Stanford lille presentation march 2011
Stanford lille presentation   march 2011Stanford lille presentation   march 2011
Stanford lille presentation march 2011finnwill
 
Money talks will cardwell
Money talks   will cardwellMoney talks   will cardwell
Money talks will cardwellfinnwill
 
VOC Analysis of European Startup Ecosystems
VOC Analysis of European Startup EcosystemsVOC Analysis of European Startup Ecosystems
VOC Analysis of European Startup EcosystemsEricPeckham
 
Adeo Ressi on Global Entrepreneurship
Adeo Ressi on Global EntrepreneurshipAdeo Ressi on Global Entrepreneurship
Adeo Ressi on Global EntrepreneurshipAdeoRessi
 
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...Mighty Guides, Inc.
 
Talent succession
Talent successionTalent succession
Talent successionSasin SEC
 
Finance indaba 2018
Finance indaba 2018Finance indaba 2018
Finance indaba 2018Keith Jones
 

What's hot (9)

Lte research project overview
Lte research project overviewLte research project overview
Lte research project overview
 
Stanford lille presentation march 2011
Stanford lille presentation   march 2011Stanford lille presentation   march 2011
Stanford lille presentation march 2011
 
Money talks will cardwell
Money talks   will cardwellMoney talks   will cardwell
Money talks will cardwell
 
VOC Analysis of European Startup Ecosystems
VOC Analysis of European Startup EcosystemsVOC Analysis of European Startup Ecosystems
VOC Analysis of European Startup Ecosystems
 
Adeo Ressi on Global Entrepreneurship
Adeo Ressi on Global EntrepreneurshipAdeo Ressi on Global Entrepreneurship
Adeo Ressi on Global Entrepreneurship
 
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
 
Track 1
Track 1Track 1
Track 1
 
Talent succession
Talent successionTalent succession
Talent succession
 
Finance indaba 2018
Finance indaba 2018Finance indaba 2018
Finance indaba 2018
 

Similar to Loss of Employee Loyalty in a Changing World

Stephane Nappo. January 2023. Top Cyber News MAGAZINE.pdf
Stephane Nappo. January 2023. Top Cyber News MAGAZINE.pdfStephane Nappo. January 2023. Top Cyber News MAGAZINE.pdf
Stephane Nappo. January 2023. Top Cyber News MAGAZINE.pdfStéphane Nappo
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015ITSM Academy, Inc.
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureCraig McGill
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyMighty Guides, Inc.
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
Cybersecurity Marketing
Cybersecurity MarketingCybersecurity Marketing
Cybersecurity MarketingAlex Weishaupt
 
reStartEvents DC metro & Beyond Cleared Virtual Career Fair Employer Director...
reStartEvents DC metro & Beyond Cleared Virtual Career Fair Employer Director...reStartEvents DC metro & Beyond Cleared Virtual Career Fair Employer Director...
reStartEvents DC metro & Beyond Cleared Virtual Career Fair Employer Director...Ken Fuller
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.IGN MANTRA
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
The Perspective of Today's Information Security Leader
The Perspective of Today's Information Security LeaderThe Perspective of Today's Information Security Leader
The Perspective of Today's Information Security LeaderRavila White
 
Accelerating The Pace of Change: CIO Asia Conference Sept 28th 2010
Accelerating The Pace of Change:  CIO Asia Conference Sept 28th 2010Accelerating The Pace of Change:  CIO Asia Conference Sept 28th 2010
Accelerating The Pace of Change: CIO Asia Conference Sept 28th 2010sidofthesububs
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11captsbtyagi
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT IssueEvan Francen
 
'Unsustainably Sustainable' by Dr Carl Ungerer and Vanessa Liell at Mumbrella...
'Unsustainably Sustainable' by Dr Carl Ungerer and Vanessa Liell at Mumbrella...'Unsustainably Sustainable' by Dr Carl Ungerer and Vanessa Liell at Mumbrella...
'Unsustainably Sustainable' by Dr Carl Ungerer and Vanessa Liell at Mumbrella...Brittany Ferdinands
 
OSSIM-School of Security and Intelligence Management
OSSIM-School of Security and Intelligence ManagementOSSIM-School of Security and Intelligence Management
OSSIM-School of Security and Intelligence ManagementAmitabh Sen Gupta
 
Business RISKS From IT
Business RISKS From IT Business RISKS From IT
Business RISKS From IT Sanjiv Arora
 

Similar to Loss of Employee Loyalty in a Changing World (20)

Stephane Nappo. January 2023. Top Cyber News MAGAZINE.pdf
Stephane Nappo. January 2023. Top Cyber News MAGAZINE.pdfStephane Nappo. January 2023. Top Cyber News MAGAZINE.pdf
Stephane Nappo. January 2023. Top Cyber News MAGAZINE.pdf
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Cybersecurity Marketing
Cybersecurity MarketingCybersecurity Marketing
Cybersecurity Marketing
 
Ciso NYC
Ciso NYCCiso NYC
Ciso NYC
 
pln9 presentation mall
pln9 presentation mallpln9 presentation mall
pln9 presentation mall
 
reStartEvents DC metro & Beyond Cleared Virtual Career Fair Employer Director...
reStartEvents DC metro & Beyond Cleared Virtual Career Fair Employer Director...reStartEvents DC metro & Beyond Cleared Virtual Career Fair Employer Director...
reStartEvents DC metro & Beyond Cleared Virtual Career Fair Employer Director...
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
The Perspective of Today's Information Security Leader
The Perspective of Today's Information Security LeaderThe Perspective of Today's Information Security Leader
The Perspective of Today's Information Security Leader
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Accelerating The Pace of Change: CIO Asia Conference Sept 28th 2010
Accelerating The Pace of Change:  CIO Asia Conference Sept 28th 2010Accelerating The Pace of Change:  CIO Asia Conference Sept 28th 2010
Accelerating The Pace of Change: CIO Asia Conference Sept 28th 2010
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11
 
ISO 31000: Culture vs Documentation, the way forward
ISO 31000: Culture vs Documentation, the way forwardISO 31000: Culture vs Documentation, the way forward
ISO 31000: Culture vs Documentation, the way forward
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT Issue
 
'Unsustainably Sustainable' by Dr Carl Ungerer and Vanessa Liell at Mumbrella...
'Unsustainably Sustainable' by Dr Carl Ungerer and Vanessa Liell at Mumbrella...'Unsustainably Sustainable' by Dr Carl Ungerer and Vanessa Liell at Mumbrella...
'Unsustainably Sustainable' by Dr Carl Ungerer and Vanessa Liell at Mumbrella...
 
OSSIM-School of Security and Intelligence Management
OSSIM-School of Security and Intelligence ManagementOSSIM-School of Security and Intelligence Management
OSSIM-School of Security and Intelligence Management
 
Business RISKS From IT
Business RISKS From IT Business RISKS From IT
Business RISKS From IT
 

More from Steven Anderson

The role of IT in the M&A process
The role of IT in the M&A processThe role of IT in the M&A process
The role of IT in the M&A processSteven Anderson
 
The rapid emergence of real-time reporting and the implications for your BI s...
The rapid emergence of real-time reporting and the implications for your BI s...The rapid emergence of real-time reporting and the implications for your BI s...
The rapid emergence of real-time reporting and the implications for your BI s...Steven Anderson
 
The Promise of Outsourcing - Outsourced Wide Area Network Services with MCI
The Promise of Outsourcing - Outsourced Wide Area Network Services with MCIThe Promise of Outsourcing - Outsourced Wide Area Network Services with MCI
The Promise of Outsourcing - Outsourced Wide Area Network Services with MCISteven Anderson
 
Ensuring that your Information Storage Management strategy is business centri...
Ensuring that your Information Storage Management strategy is business centri...Ensuring that your Information Storage Management strategy is business centri...
Ensuring that your Information Storage Management strategy is business centri...Steven Anderson
 
Finding the right scope for your chargeback strategy
Finding the right scope for your chargeback strategyFinding the right scope for your chargeback strategy
Finding the right scope for your chargeback strategySteven Anderson
 
Delivering the Benefits of Building Intelligence to Clients and Occupier
Delivering the Benefits of Building Intelligence to Clients and OccupierDelivering the Benefits of Building Intelligence to Clients and Occupier
Delivering the Benefits of Building Intelligence to Clients and OccupierSteven Anderson
 

More from Steven Anderson (6)

The role of IT in the M&A process
The role of IT in the M&A processThe role of IT in the M&A process
The role of IT in the M&A process
 
The rapid emergence of real-time reporting and the implications for your BI s...
The rapid emergence of real-time reporting and the implications for your BI s...The rapid emergence of real-time reporting and the implications for your BI s...
The rapid emergence of real-time reporting and the implications for your BI s...
 
The Promise of Outsourcing - Outsourced Wide Area Network Services with MCI
The Promise of Outsourcing - Outsourced Wide Area Network Services with MCIThe Promise of Outsourcing - Outsourced Wide Area Network Services with MCI
The Promise of Outsourcing - Outsourced Wide Area Network Services with MCI
 
Ensuring that your Information Storage Management strategy is business centri...
Ensuring that your Information Storage Management strategy is business centri...Ensuring that your Information Storage Management strategy is business centri...
Ensuring that your Information Storage Management strategy is business centri...
 
Finding the right scope for your chargeback strategy
Finding the right scope for your chargeback strategyFinding the right scope for your chargeback strategy
Finding the right scope for your chargeback strategy
 
Delivering the Benefits of Building Intelligence to Clients and Occupier
Delivering the Benefits of Building Intelligence to Clients and OccupierDelivering the Benefits of Building Intelligence to Clients and Occupier
Delivering the Benefits of Building Intelligence to Clients and Occupier
 

Recently uploaded

No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfakankshagupta7348026
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 

Recently uploaded (20)

No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdf
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 

Loss of Employee Loyalty in a Changing World

  • 1. Loss of employee loyalty in a changing worldLoss of employee loyalty in a changing world Steve Anderson – IT Partner EMEA, Davis Langdon LLP steve.anderson@davislangdon.com
  • 2. STEVE ANDERSON  Over 15 years working in IT  Held in a variety of technical roles before rising into management – currently studying for my MBA  Worked across many sectors including engineering, manufacturing, transport, retail, high-tech, management consultancy, finance, construction and business services  A ‘turn-around’ CIO
  • 3. WHAT WE ARE  Davis Langdon is a multi disciplinary firm of client focused specialists, highly experienced in all areas of the built environment, with an in-depth knowledge of procurement, development, finance and construction delivery processes.
  • 4. WHERE WE ARE  Davis Langdon are established in all major economic clusters, nationally and internationally QATAR DUBAI BAHRAIN LEBANON BRUNEI CHINA HONG KONG MALAYSIA PHILIPPINES SINGAPORE THAILAND VIETNAM AUSTRALIA NEW ZEALAND SOUTH AFRICA BOTSWA NA USA SPAIN POLAND FRANCE ENGLAND SCOTLAND WALES EGYPT KOREA WEST AFRICA EAST AFRICA IRELAND CZECH REPUBLIC Global reachGlobal reach Local deliveryLocal delivery Europe/ Middle East Offices: 33 Staff: 1350 Asia Pacific Offices: 18 Staff: 960 Australasia Offices: 13 Staff: 170 Africa Offices: 14 Staff: 160 USA Offices: 6 Staff: 60
  • 5. A (RAPIDLY) CHANGING WORLD …  Global issues  Security, security, security…  11th September 2001  Secularism  Terrorism  War  Capitalism  Globalisation  Business issues  Industrialisation  Nationalisation  Privatisation  Re-engineering  De-layering  Empowerment  Outsourcing  Off-shoring
  • 6. BUSINESS SECURITY NEEDS  Protect data – loss, integrity, access  Backups & archiving  Anti-virus & anti-malware  Network access & authentication  Technology is the answer?  Intellectual property – the lost promise of KM  The bottom line…  No such thing as absolute security – manage imperfections  Unlimited potential for investing in IT ‘solutions’ – cost vs. risk  YOU (human beings) are the weakest link!
  • 7. INDUSTRY OPINION “Insiders, not crooks, still biggest security threat” – 27 Aug 2004 “Insiders, not crooks, still biggest security threat” – 27 Aug 2004 “You are still the weakest security link” – 5 Aug 2004 “You are still the weakest security link” – 5 Aug 2004 “Greatest security risk: Social engineering, says Gartner” – 1 Nov 2004 “Greatest security risk: Social engineering, says Gartner” – 1 Nov 2004
  • 8. IMPACT ON EMPLOYEE LOYALTY?  Trust – rise of redundancy and illusion of job security  Transience – multiple jobs and even careers the norm  Footloose – greater mobility and location flexibility  Skills – birth of knowledge/information worker  Knowledge – recognised as key competitive factor  Intellectual property – how is this managed/controlled  Culture – “herding cats” or “nailing jelly to a wall”  Conclusion – loyalty is a product of motivation
  • 9. THE HUMAN FACTOR  “to really screw it up you need… a human being”  Ignorance is bliss … but not an excuse  Ineffective security  Security is obstructive – busy, busy, busy  Security is anti-social – trust no-one  Security is inhuman – more than a number  Security is oppressive – police state  Make it automatic, simple and painless  Taking it seriously – the real motivators
  • 10. MOTIVATION?  Negative  Security policy  Police state  Risk  Threats  Fear  Positive  Awareness  Education  Understanding  Simplicity  Habit
  • 11. INDUSTRY OPINION “Companies still fail to take security seriously” – 6 Sep 2004 “Companies still fail to take security seriously” – 6 Sep 2004 “IT security culture must start from the top” – 23 Sep 2004 “IT security culture must start from the top” – 23 Sep 2004
  • 12. MANAGEMENT vs. LEADERSHIP Management Behaviour Attitude Values Beliefs Leadership The human ‘iceberg’
  • 13. SUMMARY  Change today is inevitable – become adaptable  Focus on real business risk – balance against cost  Effective security is 20% technology & 80% leadership – beware the security ‘arms race’  Key management elements  Understand, accept and accommodate the human factor  Raise awareness and educate continually  Encourage the appropriate behaviours through leadership  Design practical policies – monitor and police (soft)  Keep it current and applicable
  • 14. QuestionsQuestions Steve Anderson – IT Partner EMEA, Davis Langdon LLP steve.anderson@davislangdon.com