Leadership Speaker Wylie Blanchard - Keynote Business Technology Speaker - Workshops Social Mobile Analytics Cloud Wylie Blanchard | Business Technology Expert, Digital Executive Advisor & Speaker - Wylie Blanchard Tue, 10 Jun 2025 06:11:16 +0000 en-US hourly 1 /wp-content/uploads/cropped-Wylie-Blanchard-profile-photo_202008_IMG_7092_1100x1100-32x32.jpg Leadership Speaker Wylie Blanchard - Keynote Business Technology Speaker - Workshops Social Mobile Analytics Cloud 32 32 61397150 Illinois Privacy Compliance: What Every Business Owner Needs to Know https://www.wylieblanchard.com/illinois-privacy-compliance-what-every-business-owner-needs-to-know/ Sun, 01 Jun 2025 08:26:00 +0000 https://www.wylieblanchard.com/?p=8974 The Rising Stakes of Data Privacy. Whether you’re running a family-owned retail shop, growing a medical practice, or managing multiple office locations, if you handle customer or employee data, privacy compliance applies to you. In Illinois, two of the strictest privacy laws in the country—the Biometric Information Privacy Act (BIPA) and the Personal Information Protection Act (PIPA)—create clear legal obligations […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Silhouette of the state of Illinois with digital icons

The Rising Stakes of Data Privacy.

Whether you’re running a family-owned retail shop, growing a medical practice, or managing multiple office locations, if you handle customer or employee data, privacy compliance applies to you.

In Illinois, two of the strictest privacy laws in the country—the Biometric Information Privacy Act (BIPA) and the Personal Information Protection Act (PIPA)—create clear legal obligations that can cost thousands (or millions) if ignored.

As an IT consultant who works with small and midsize businesses across the state, I’m here to break down what you need to know and how you can protect your business before problems arise.

Understanding Key Illinois Privacy Laws

Biometric Information Privacy Act (BIPA)

BIPA regulates how private businesses collect, use, and store biometric data like fingerprints, facial scans, and retina scans. It requires:

  • Informed written consent before collecting or storing biometric data.
  • Disclosure of the specific purpose and storage duration.
  • public retention and destruction policy.
  • A strict prohibition on selling or profiting from biometric data.
  • Private right of action, meaning individuals can sue your business for violations.

Even something as common as a fingerprint time clock or facial recognition camera falls under BIPA. Penalties and fines can be applied for violations of negligence, recklessness or intentional action.

Personal Information Protection Act (PIPA)

PIPA focuses on safeguarding broader categories of personal data, including Social Security numbers, driver’s license numbers, medical and health insurance information, account numbers, and login credentials.

It requires:

  • Prompt breach notification to affected Illinois residents.
  • Reporting breaches to the Illinois Attorney General (if 500+ individuals are impacted).
  • Reasonable security measures to protect data.
  • Proper disposal of sensitive data.
  • Contracts with third parties that require them to maintain security.

Violations are considered unlawful practices under the state’s Consumer Fraud Act and can result in enforcement actions.

Common Compliance Pitfalls

Despite the legal requirements, many businesses unintentionally fall short. Here are some of the most common missteps:

  • Using biometric time clocks without proper notice or consent.
  • Collecting customer or employee data without a written policy or retention schedule.
  • Failing to implement encryption, firewalls, or access controls.
  • Assuming that cloud storage providers automatically ensure compliance.
  • Not having an incident response plan or breach notification process.

Often, the biggest risk comes not from bad intentions but from lack of awareness.

Steps Toward Compliance: IT Consultant’s Checklist

Here is a practical checklist to help your business align with Illinois privacy laws:

  1. Audit Your Data: Know what types of personal and biometric data you collect, where it’s stored, who has access, and how long you keep it.
  2. Create a Written Privacy Policy: Include clear language about data collection, usage, retention, and destruction.
  3. Implement Consent Procedures: Obtain written consent before collecting biometric data and explain how it will be used.
  4. Secure Your Systems: Use encryption, secure user authentication, regular patching, and monitoring to protect stored data.
  5. Train Your Employees: Ensure your staff understands data privacy procedures and how to respond to data incidents.
  6. Plan for Breaches: Develop and test an incident response plan, including breach notification protocols.
  7. Review Vendor Contracts: Make sure service providers who access your data agree to meet your security requirements.

The Cost of Non-Compliance

Non-compliance isn’t just a legal problem—it can be a business-ending event. Illinois courts have upheld massive BIPA settlements, with some cases costing businesses millions in damages. A single fingerprint scan collected without consent can lead to multiple violations, each carrying its own penalty.

With PIPA, a data breach could force you to notify thousands of customers, face scrutiny from the Attorney General, and deal with damaged customer trust.

Tools and Tech That Can Help

Fortunately, the right tools can make compliance manageable:

  • Consent management platforms to track and store written consents.
  • Data loss prevention (DLP) software to monitor sensitive information.
  • Security information and event management (SIEM) tools for real-time alerts.
  • Encryption solutions for both stored and transmitted data.
  • Automated backups with secure, offsite storage.

Don’t overlook free or low-cost training platforms to keep your team informed.

Make Privacy a Business Priority

Privacy compliance isn’t a one-time fix—it’s an ongoing responsibility. If you collect any form of personal or biometric data, you are legally and ethically responsible for protecting it.

By investing in secure systems, clear policies, and proper staff training, you’re not just avoiding fines—you’re building customer trust and long-term resilience.

If you’re unsure where to start or whether your current practices meet Illinois standards, now is the time to act.

Local IT consultants, privacy professionals can help you:

  • Audit your systems and data handling practices
  • Develop legally sound policies and consent forms
  • Deploy the right technologies for security and monitoring
  • Train your team to maintain compliance

Don’t wait until a lawsuit or a breach that forces your hand. Reach out to a trusted local technology expert today and take control of your privacy compliance strategy.


This content was originally posted on Medium

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8974
Beyond Certifications – The Cybersecurity Skill That Sets Leaders Apart https://www.wylieblanchard.com/beyond-certifications-the-cybersecurity-skill-that-sets-leaders-apart/ Sat, 08 Feb 2025 12:16:00 +0000 https://www.wylieblanchard.com/?p=8906 Certifications Open Doors, But They Don’t Make You Boardroom-Ready. I’ve met countless professionals who believe that earning certifications like CISSP, CISM, Security+, etc. is the key to advancing their careers. And while certifications are valuable—they demonstrate expertise, commitment, and a solid understanding of best practices—there’s one critical skill they don’t teach: how to communicate security […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Certifications Open Doors, But They Don’t Make You Boardroom-Ready.

Finger Holding Badge with text certified trust me

I’ve met countless professionals who believe that earning certifications like CISSP, CISM, Security+, etc. is the key to advancing their careers. And while certifications are valuable—they demonstrate expertise, commitment, and a solid understanding of best practices—there’s one critical skill they don’t teach: how to communicate security and technology risks in a way that leadership understands.

I have several myself: CISSP, PMP, ITIL, MCSE and more — each one has helped me gain deeper technical knowledge and industry credibility. But none of them, on their own, prepared me for the real challenge of leadership: translating complex security concepts into business priorities.

A few weeks ago, I spoke with a colleague who had just completed a major certification. He was feeling confident about his technical knowledge, but then he walked into a leadership meeting and was asked to explain why his team’s proposed security initiative mattered to the business. He knew the technical details inside and out, but when it came to making the case to executives—framing security as a business priority rather than a technical challenge—he struggled.

That moment made it clear: Certifications don’t prepare you for the real challenges of leadership.


The Gap Between Certifications and Real-World Leadership

Certifications focus on frameworks, methodologies, and compliance—which are important. But in the real world, professionals must be able to:

  • Translate security risks into business impact.
  • Justify IT investments in terms of ROI.
  • Persuade leadership to prioritize security initiatives.

I’ve seen too many skilled IT professionals hit a ceiling in their careers—not because they lack knowledge, but because they struggle to communicate complex ideas in a way that decision-makers care about.

For example, if you’re discussing Zero Trust security with your executive team, you need to go beyond saying,

“Zero Trust limits network access to reduce attack surfaces.”

Instead, translate that into business terms:

Zero Trust ensures that only the right people have access to critical systems, reducing the likelihood of a data breach that could cost us millions in fines and lost customer trust.

This shift in communication changes the conversation—and ultimately determines whether your initiatives get the support they need.

Three Skills Every Cybersecurity and IT Leader Needs

If you want to stand out and drive real change, focus on developing these three essential leadership skills:

1. Storytelling & Business Impact

Leaders don’t respond to jargon and technical specs—they respond to narratives that connect security to real business challenges.

  • Instead of saying: “We need to implement multi-factor authentication (MFA) to strengthen security.”
  • Say: “Over 80% of breaches come from weak passwords. MFA would immediately reduce our risk of unauthorized access, protecting both our data and our reputation.”

The difference? One statement sounds like an IT upgrade. The other sounds like a business necessity.

2. Risk-Based Decision Making

Security isn’t about eliminating all risks—it’s about prioritizing the most critical ones without disrupting operations.

  • Understand risk appetite — how much risk your company is willing to tolerate.
  • Learn how to quantify risk in dollars — leaders want to know what a security failure could cost the business.
  • Frame recommendations in terms of business value, not just security best practices.

Example: Instead of saying, “This patch reduces vulnerabilities,” explain, “This patch could prevent an outage that would cost us $50K in lost revenue per hour.”

3. Stakeholder Influence & Negotiation

Your ability to secure buy-in for security initiatives determines whether they actually get implemented.

  • Speak the language of finance, operations, and executive leadership—not just IT.
  • Identify the real drivers behind security decisions (often compliance, customer trust, or financial impact).
  • Build relationships before you need them—so when a crisis arises, decision-makers already trust your expertise.

If you can’t convince the CFO or CEO why security investments matter, even the best technology solutions will go underfunded or deprioritized.

How to Develop These Skills (Beyond Certifications)

So, how do you bridge the gap between technical expertise and executive influence?

  1. Start practicing now. Present security insights to non-technical colleagues and get feedback on clarity.
  2. Study leadership communication. Take courses on storytelling, negotiation, and business strategy.
  3. Follow cybersecurity leaders who articulate security in business terms—watch how they frame discussions.
  4. Get involved in executive-level conversations. Don’t just sit in IT meetings—engage with finance, operations, and leadership.

The professionals who stand out are the ones who combine technical depth with the ability to communicate its value to the business.


Certifications prove what you know—but your ability to connect security to business priorities is what sets you apart.

If you’re serious about advancing in cybersecurity or IT leadership, ask yourself:
Are you just learning technical frameworks, or are you preparing to lead?

Tech skills get you in the door. Communication skills put you at the table.

Are you ready for that next-level conversation?


This content was originally posted on Medium.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8906
Essential Disaster Preparedness Strategies: Safeguarding Your Business https://www.wylieblanchard.com/essential-disaster-preparedness-strategies-safeguarding-your-business/ Sun, 18 Aug 2024 15:20:00 +0000 https://www.wylieblanchard.com/?p=8826 Discover essential disaster preparedness strategies for businesses, including risk assessment, disaster recovery plans, IT infrastructure investment, regular testing, and leveraging advanced technology. Ensure your business's resilience and continuity in the face of natural disasters.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Frustrated Man in Front of a Laptop

Recent tornadoes in Chicago and the surrounding suburbs have starkly highlighted the urgent need for businesses to enhance their disaster preparedness strategies. The destructive storms caused widespread power outages, significant infrastructure damage, and disrupted operations for numerous businesses. These events underscore the vulnerabilities in existing systems and the necessity for robust disaster recovery plans. Being prepared for such unforeseen events is critical to building resilience and ensuring continuity.

The recent tornadoes, which resulted in significant damage and power outages, serve as a stark reminder of the potential for natural disasters to disrupt business operations. As businesses in the affected areas work to recover, the importance of comprehensive disaster preparedness becomes evident. Ensuring that a business can withstand and quickly recover from such events is essential to maintaining operations and minimizing financial loss.

Here are some recommendations for businesses across the Midwest:

Assess and Prioritize Risks

Begin by identifying potential risks specific to the business and geographic location. The recent tornadoes, which caused extensive damage and power outages, underscore the importance of this step. Conduct a thorough risk assessment to prioritize threats based on their likelihood and potential impact on operations.

Develop a Comprehensive Disaster Recovery Plan

A robust disaster recovery plan is essential for minimizing downtime and ensuring business continuity. The plan should include:

  • Data Backup and Recovery: Regularly back up critical data and ensure that backups are stored offsite or in the cloud. This prevents data loss in the event of physical damage to premises.
  • Communication Strategy: Establish clear communication protocols to ensure all stakeholders are informed during a disaster. This includes updating contact information and having alternative communication channels in place.
  • Operational Continuity: Identify key business functions and outline procedures for maintaining these operations during disruptions. This includes having contingency plans for IT infrastructure, supply chain management, and customer service.

Invest in Reliable IT Infrastructure

Modern businesses rely heavily on technology, making IT infrastructure a critical component of disaster preparedness. Cloud services can ensure that IT systems are resilient, scalable, and secure. Important aspects include:

  • Cloud Migration: Transition critical applications and data to the cloud to enhance accessibility and reduce the risk of data loss.
  • System Redundancy: Implement redundant systems to ensure that if one system fails, another can take over without disrupting operations.
  • Cybersecurity Measures: Protect IT infrastructure from cyber threats with advanced security solutions, including firewalls, intrusion detection systems, and regular security audits.

Regular Testing and Training

A disaster recovery plan is only effective if it is regularly tested and updated. Conduct regular drills to ensure that all employees are familiar with their roles and responsibilities during a disaster. Comprehensive training programs can prepare the team for various disaster scenarios.

Leverage Technology for Enhanced Preparedness

Utilize advanced technologies to enhance disaster preparedness efforts. Solutions include:

  • Business Intelligence and Analytics: Use data analytics to monitor risks and make informed decisions during a crisis.
  • Automation Tools: Implement automation to streamline disaster recovery processes, such as automated backups and failover systems.
  • Virtual Dashboards: Access real-time information and insights through virtual dashboards that help monitor the status of business operations during a disaster.

Collaborate with Experts

Partnering with experts ensures that disaster preparedness strategies are comprehensive and up-to-date. Professionals with extensive experience in business continuity planning, IT support, and cloud services can work closely with businesses to develop customized solutions that meet unique needs.

Disasters can strike at any time, but with a proactive approach, businesses can be prepared to handle any challenge. Building resilience and ensuring continuity is essential for safeguarding business operations and minimizing financial loss.

This content was originally posted on Medium.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8826
Innovating on a Budget: Strategies for Today’s Tech Leaders https://www.wylieblanchard.com/innovating-on-a-budget-strategies-for-todays-tech-leaders/ Sat, 04 May 2024 11:31:00 +0000 https://www.wylieblanchard.com/?p=8811 How do technology companies manage the continuous demand for innovation while grappling with stringent budget constraints and evolving market expectations? In 2024, firms face a relentless challenge to integrate cutting-edge technologies into new products, all while optimizing operational efficiency under financial pressures. This article explores the aspects that influence the tech world, ranging from the […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
An elegant illustration of a digital network map alongside a mechanical wheel, set against a soft, uniform background

How do technology companies manage the continuous demand for innovation while grappling with stringent budget constraints and evolving market expectations? In 2024, firms face a relentless challenge to integrate cutting-edge technologies into new products, all while optimizing operational efficiency under financial pressures. This article explores the aspects that influence the tech world, ranging from the integration of innovative technologies to the dynamics of IT spending and consumer satisfaction. By analyzing critical statistics from industry-leading surveys and reports, we uncover the challenges and opportunities that define the landscape of technology and its impact on both companies and consumers.


Integration of Technologies and Innovation Pressure

For technology-focused businesses, innovation is not just a buzzword but a survival strategy. According to the KPMG 2023 US Technology Survey, 58% of technology sector executives report that their primary challenge is the increased pressure to create new product features by integrating multiple technologies.1 This indicates a broader industry trend where the rapid pace of technological advancement is not just an opportunity but also a considerable strain.

Companies are compelled to explore and adopt a multitude of emerging technologies—ranging from AI to IoT—each promising to be the next big revolution. The integration of these technologies is not merely about keeping up with competitors but about redefining market standards and consumer expectations. The drive to innovate under pressure not only pushes companies towards technological breakthroughs but also demands a high level of agility and creativity from their leaders.

Budget Constraints and Productivity

The pressure to innovate is juxtaposed with stringent budget constraints. The KPMG 2023 Global Tech Report highlights that 65% of tech companies are expected to do more with less, with reduced budgets compared to the previous year.2 Meanwhile, the Deloitte Tech Trends 2023 report indicates that 72% of digital leaders have witnessed improvements in employee productivity due to digital transformation.3

These insights underscore a critical balance that companies must achieve—enhancing productivity without proportional increases in budgets. Leveraging technology for digital transformation presents a solution, allowing businesses to automate processes, enhance decision-making, and optimize resource allocation. The key challenge lies in strategically investing in technologies that yield the highest return on investment in terms of productivity.

Future Trends in IT Investment and AI Adoption

Despite the economic uncertainties, the technology sector continues to see optimistic investment forecasts. In its 2024 Outlook Technology Report, Deloitte predicts an 8% growth in global IT spending,4 suggesting a strong confidence in tech development’s ROI. Concurrently, Horton’s anticipates that 75% of software engineers will use AI coding assistants by 2028 in its 2024 Tech Trends report,5 signifying a shift towards more automated and sophisticated tools in software development.

This indicates not only a robust investment climate but also a transformative shift in how technology is being developed and utilized. The integration of AI tools in software engineering is set to redefine the traditional methodologies, leading to faster, more efficient, and potentially more innovative development cycles. Such trends are pivotal for tech companies aiming to lead in innovation and efficiency.

Executive Confidence and Technological Adequacy

Confidence among executives regarding their technological capabilities remains high, with 70% expressing confidence in achieving their goals using existing technologies,1 reveals a significant alignment between strategic goals and technological capabilities within organizations.

This confidence likely stems from successful past integrations of technology that have led to measurable benefits, such as increased market reach or improved operational efficiency. It also points to a maturity in the technology lifecycle where existing tools can still provide competitive advantages without immediate upgrades or overhauls. For tech leaders, maintaining this confidence requires ongoing evaluation of tech capabilities against strategic objectives to ensure they continue to align effectively.

Consumer Experience and Market Expectations

A staggering 94% of consumers report frustration with disjointed experiences when interacting with organizations.6 This statistic highlights a significant gap between technological advancements and their implementation in user-friendly ways.

Improving consumer experience is crucial, as it directly influences satisfaction and loyalty. Tech companies must therefore focus not only on the backend integration of new technologies but also on how these technologies are experienced at the consumer level. Ensuring seamless, intuitive, and cohesive interactions across various platforms and touchpoints can substantially enhance consumer perceptions and foster stronger brand connections.


The technology sector’s landscape is complex and challenging, yet ripe with opportunities for those who can skillfully navigate the pressures of innovation, budget constraints, and consumer expectations. Understanding the nuances of this dynamic—through the lens of key industry statistics—provides valuable insights into strategic decision-making. For tech leaders and companies, the goal is clear: innovate effectively, manage resources wisely, and always keep the consumer experience at the forefront of technological integration. By doing so, they can not only survive but thrive in this competitive industry.

Sources:

  1. “KPMG 2023 US Technology Survey.” KPMG, 2023,
    kpmg.com/kpmg-us/content/dam/kpmg/pdf/2023/2023-kpmg-us-tech-survey.pdf
  2. “KPMG 2023 Global Tech Report.” KMPG, 2023,
    assets.kpmg.com/content/dam/kpmg/xx/pdf/2023/09/kpmg-global-tech-report.pdf
  3. “Tech Trends 2023: Life Sciences perspective.” Deloitte, 2023,
    www2.deloitte.com/content/dam/Deloitte/us/Documents/life-sciences-health-care/us-tech-trends-2023.pdf
  4. “2024 Outlook Technology Report.” Deloitte, 2024,
    www2.deloitte.com/content/dam/Deloitte/us/Documents/technology-media-telecommunications/2024-tmt-outlook-technology.pdf
  5. “Tech Trend 2024 Report.” Horton, 2024,
    hortoninternational.com/wp-content/uploads/2024/02/Tech_Trend_2024_Report-2.pdf
  6. “2023 Digital Trends: Financial Services in Focus.” Adobe, 2023,
    business.adobe.com/content/dam/dx/us/en/resources/digital-trends-financial-services-2023/adobe-digital-trends-2023-fsi.pdf

This content was originally posted on Medium.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8811
GIAC Security Leadership (GSLC) was issued by Global Information Assurance Certification (GIAC) to Wylie Blanchard https://www.wylieblanchard.com/giac-security-leadership-gslc-was-issued-by-global-information-assurance-certification-giac-to-wylie-blanchard/ Sat, 17 Feb 2024 11:30:00 +0000 https://www.wylieblanchard.com/?p=8490 View my verified achievement from Global Information Assurance Certification (GIAC). GIAC Security Leadership (GSLC) was issued by Global Information Assurance Certification (GIAC) to Wylie Blanchard on February 14, 2024. The GIAC Security Leadership (GSLC) certification validates a practitioner’s understanding of governance and technical controls focused on protecting, detecting, and responding to security issues. GSLC certification holders […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
View my verified achievement from Global Information Assurance Certification (GIAC).

GIAC Security Leadership (GSLC) logo

GIAC Security Leadership (GSLC) was issued by Global Information Assurance Certification (GIAC) to Wylie Blanchard on February 14, 2024.

The GIAC Security Leadership (GSLC) certification validates a practitioner’s understanding of governance and technical controls focused on protecting, detecting, and responding to security issues. GSLC certification holders have demonstrated knowledge of data, network, host, application, and user controls along with key management topics that address the overall security lifecycle.

Learn more.

Skills:

Access Control, Change Management, Cyber Defense, Incident Handling, Information Security, IT Business Management, Leadership, Network Security, Project Management, Risk Management, Security Operations, Security Policy, Software Security, and Vulnerability Management.

Earning Criteria:

  • Accept GIAC’s Code of Ethics.
  • Acquire skills via industry experience or from a training course.
  • Achieve a passing score on the GSLC exam.

Analyst Number:
13012

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8490
ITIL® Leader: Digital and IT Strategy was issued by AXELOS to Wylie Blanchard https://www.wylieblanchard.com/itil-leader-digital-and-it-strategy-was-issued-by-axelos-to-wylie-blanchard/ Mon, 29 Jan 2024 03:55:04 +0000 https://www.wylieblanchard.com/?p=8428 View my verified achievement from Axelos. ITIL® LEADER Digital and IT Strategy (DITS) was issued by AXELOS to Wylie Blanchard on January 28, 2024. ITIL 4® Leader Digital and IT Strategy (DITS) demonstrates the individual has the practical understanding and application of crafting a digital vision and strategy, shaping and integrating IT and business strategies aligned with the […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
View my verified achievement from Axelos.

ITIL 4 ® ITIL LEADER Digital IT Strategy by Axelos logo

ITIL® LEADER Digital and IT Strategy (DITS) was issued by AXELOS to Wylie Blanchard on January 28, 2024.

ITIL 4® Leader Digital and IT Strategy (DITS) demonstrates the individual has the practical understanding and application of crafting a digital vision and strategy, shaping and integrating IT and business strategies aligned with the wider organizational goals to enable success of the business. They develop cross-functional digital strategy, elevate discussions to strategic levels, drive operational excellence, analyze and respond effectively to VUCA factors.

Learn more.

Skills:

Adaptability, Agile Ways Of Working, Business Case Development, Business Change Management, Business Plan Development, Collaboration And Teamwork, Communication, Creation and Implementation of Target Operating Models, Creativity, Customer Service Management, Data Management, DevOps Methodology Knowledge, Digital Design (including UX and UI), Digital Technology Architecture, Driving Company Culture Change, Education and Training Provision, Emerging Technology Monitoring, Emotional and Social Intelligence, Enterprise Architecture, Financial Management, Information Analysis, Information Security Management, Information Security Strategy Development, Information Systems Governance, Innovation, Knowledge Management, Leadership Development, Negotiation, Planning And Organisation, Problem Solving, Product Development, Product Management, Project – Programme and Portfolio Management, Risk Management, Robotics and Automation Engineering, Service Delivery and Management, Software Development And Management, Stakeholder Management, Strategic Planning, Supplier Management, Sustainable Management, Systems Development and Management, Systems Engineering, UX Design, Experience and Support.

Earning Criteria:

  • Obtained the ITIL 4 Foundation certification designation prior to studying for ITIL LEADER Digital and IT Strategy.
  • Meet the managerial experience requirement.
  • Complete required training.
  • Complete and receive a passing score on four case study assignments.
  • Passed the ITIL 4 ® LEADER Digital and IT Strategy (DITS) exam.

Evidence:

Certification Number
GR679004963WB

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8428
Boardroom Certified Qualified Technology Expert (QTE) was issued by Digital Directors Network to Wylie Blanchard https://www.wylieblanchard.com/boardroom-certified-qualified-technology-expert-qte-was-issued-by-digital-directors-network-to-wylie-blanchard/ Tue, 06 Jun 2023 00:40:58 +0000 https://www.wylieblanchard.com/?p=8108 View my verified achievement from Digital Directors Network. Qualified Technology Expert (Board Certified QTE) was issued by Digital Directors Network to Wylie Blanchard on June 5th, 2023. DDN Certified Qualified Technology Experts (QTEs) are boardroom qualified technology executives who have the education, applied experience, and/or formal education necessary to work in the corporate boardroom and oversee […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
View my verified achievement from Digital Directors Network.

Qualified Technology Expert (Board Certified QTE) was issued by Digital Directors Network to Wylie Blanchard on June 5th, 2023.

DDN Certified Qualified Technology Experts (QTEs) are boardroom qualified technology executives who have the education, applied experience, and/or formal education necessary to work in the corporate boardroom and oversee risk in complex digital business systems.

QTE certification is earned by members of Digital Directors Network (DDN) by completing the DDN QTE 501 Boardroom Readiness Masterclass for Technology Executives and successfully passing examination. The DDN QTE 501 Masterclass is a Certified Professional Development executive education learning program as certified by the CPD Certification Service. DDN is the world’s leading boardroom network focused exclusively on governing systemic risk and overseeing digital and cybersecurity in the corporate boardroom.

QTE certification holders have corporate governance training or experience and executive management experience overseeing one or multiple domains of complex digital business systems including data, information architecture, risk communications, emerging technology, cybersecurity, third-party and systemic risk, IT operations and digital/cyber regulation. Earning QTE certification required attendance at an online or offline QTE 501 boardroom readiness masterclass where participants received thirteen hours of instructor led learning and successfully completed examination.

QTE 501 is designed and delivered by business school professors, experienced technology executives, corporate lawyers and corporate governance experts. QTE certification earners have been trained on the DiRECTOR(TM) framework for overseeing systemic risk in complex digital business systems. They have also been trained on the role of the corporate director in creating and protecting shareholder and stakeholder value.

Learn more.

Skills:

Corporate Governance, and Systemic Risk Oversight of Complex Digital Systems.

Earning Criteria:

  • QTE certificate holders have taken and passed the QTE 501 certification exam with a minimum score of 70%.
  • QTE certificate holders maintain their certification by completing ten hours of relevant instructor led learning on corporate governance and digital and systemic cyber risk oversight every 2 years.

Evidence:

Certification Number
74950824

Boardroom Certified Qualified Technology Expert (QTE) by Digital Directors Network

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8108
Certified Information Systems Security Professional (CISSP) was issued by ISC2 to Wylie Blanchard https://www.wylieblanchard.com/certified-information-systems-security-professional-cissp-was-issued-by-isc2-to-wylie-blanchard/ Thu, 27 Apr 2023 17:50:18 +0000 https://www.wylieblanchard.com/?p=7988 View my verified achievement from ISC2. Certified Information Systems Security Professional (CISSP) was issued by ISC2 to Wylie Blanchard on April 27, 2023. The vendor-neutral CISSP credential confirms technical knowledge and experience to design, engineer, implement, and manage the overall security posture of an organization. Required by the world’s most security-conscious organizations, CISSP is the gold-standard […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
View my verified achievement from ISC2.

Certified Information Systems Security Professional (CISSP) was issued by ISC2 to Wylie Blanchard on April 27, 2023.

The vendor-neutral CISSP credential confirms technical knowledge and experience to design, engineer, implement, and manage the overall security posture of an organization. Required by the world’s most security-conscious organizations, CISSP is the gold-standard information security certification that assures information security leaders possess the breadth and depth of knowledge to establish holistic security programs that protect against threats in an increasingly complex cyber world.

Learn more.

Skills:

Access Management, Asset Security, Communications Security, Identity Management, Network Security, Risk Management, Security Assessment, Security Engineering, Security Management, Security Operations, Security Testing, and Software Development Security.

Earning Criteria:

  • Obtain the required experience.
  • Achieve a passing score on the CISSP exam.
  • Obtain an endorsement from an existing ISC2 member.
  • Subscribe to the Code of Ethics.
  • Complete continuing professional education requirements.

Evidence:

Certification Number
1469327

Certified InformationSystems Security Professional (CISSP) by (ISC)²

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
7988
Certified in Cybersecurity was issued by ISC2 to Wylie Blanchard https://www.wylieblanchard.com/certified-in-cybersecurity-was-issued-by-isc2-to-wylie-blanchard/ Sun, 12 Feb 2023 17:59:00 +0000 https://www.wylieblanchard.com/?p=7612 View my verified achievement from ISC2. Certified in Cybersecurity (CC) was issued by ISC2 to Wylie Blanchard on February 11, 2023. The vendor-neutral CC credential starts newcomers on their path to advanced cybersecurity certifications and future leadership roles. It proves to organizations that newly certified team members understand fundamental security principles and operations, network security and access controls […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
View my verified achievement from ISC2.

Certified in Cybersecurity (CC) was issued by ISC2 to Wylie Blanchard on February 11, 2023.

The vendor-neutral CC credential starts newcomers on their path to advanced cybersecurity certifications and future leadership roles. It proves to organizations that newly certified team members understand fundamental security principles and operations, network security and access controls and that they have the skills to meet and exceed performance standards in their beginning roles. All this allows organizations to build a stronger line of defense.

Learn more.

Skills:

Access Controls Concepts, Business Continuity (BC) Concepts, Disaster Recovery (DR) Concepts, Incident Response Concepts, Network Security, Security Operations, and Security Principles.

Earning Criteria:

  • Achieve a passing score on the CC exam.
  • Subscribe to the Code of Ethics.
  • Complete continuing professional education requirements.

Evidence:

Certification Number
1469327

Certified in Cybersecurity (CC) by (ISC)²

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
7612
ITIL 4® Foundation was issued by AXELOS to Wylie Blanchard https://www.wylieblanchard.com/itil-4-foundation-was-issued-by-axelos-to-wylie-blanchard/ Sat, 31 Dec 2022 18:01:00 +0000 https://www.wylieblanchard.com/?p=7250 View my verified achievement from Axelos. ITIL® Foundation Certificate in IT Service Management (ITIL 4 Edition) was issued by AXELOS to Wylie Blanchard on December 25, 2022. ITIL® 4 Foundation demonstrates this individual understands the key concepts of IT and digital service delivery including the key concepts, guiding principles and practices of ITIL® 4 for service management. They […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
View my verified achievement from Axelos.

ITIL 4 ® Foundation

ITIL® Foundation Certificate in IT Service Management (ITIL 4 Edition) was issued by AXELOS to Wylie Blanchard on December 25, 2022.

ITIL® 4 Foundation demonstrates this individual understands the key concepts of IT and digital service delivery including the key concepts, guiding principles and practices of ITIL® 4 for service management. They have a fundamental understanding of the modern organization’s end-to-end operating model for the creation, delivery and continual improvement of technology-enabled products and services. They have an awareness of how cultural or behavioral principles benefit the wider organization.

Learn more.

Skills:

Adaptability, Availability Management, Business Change Management, Business Relationship Management, Capacity Management, Communication Incident Management, Information Security Management, IT Systems Governance, Problem Management, Release And Deployment, Risk Management, Service Delivery Management, Service Desk, Stakeholder Management, UX Design, Experience and Support.

Earning Criteria:

The individual has passed the ITIL 4 ® Foundation exam.

Evidence:

Certification Number
GR671468197WB

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
7250