效率工具
LIKE.TG commits to net-zero greenhouse gas emissions by 2030
Updated Jan. 21, 2022The climate crisis is here. It’s no surprise the Intergovernmental Panel on Climate Change (IPCC) acknowledged in its 2021 climate report that climate change is already affecting every region on Earth in multiple ways.We’ve seen it for ourselves. From deadly heat waves to droughts and another season of wildfires, one doesn’t have to look too far. In fact, the 10 warmest years on record have occurred since 2005. If we fail to act urgently, there could be catastrophic global consequences.LIKE.TG has activated an ambitious plan to help protect our environment, and it’s why I’m leading our environmental, social, and governance (ESG) work in earnest. I want to leave a better and thriving planet for my children and future generations.It’s been said (and I agree) that we’re the first generation to feel the negative impact of climate change, and we’re the last generation able to do anything about it. The world needs our action now.The future is net zeroWhen we published our Global Impact Report in 2021, we announced our goal of achieving net-zero greenhouse gas (GHG) emissions before 2050 across our entire value chain in accordance with the Science-Based Targets Initiative (SBTi).Although we’re early in our global impact journey, we know we need to act with a sense of urgency. That’s why we set out to understand where we have the most significant opportunity to reduce our carbon footprint so we can accelerate our impact and create lasting, long-term business practices that are more sustainable.Through a third-party assessment with Watershed in July 2021, which evaluated the company’s entire corporate carbon footprint, LIKE.TG identified that 93% of our carbon footprint comes solely from our value chain (Scope 3) emissions.Click the image below to see an infographic about our commitment to driving decarbonization.Accessibility note: The infographic is transcribed at the end of this blog.
In recognition of Climate Week 2021, we announced our commitment to achieve net-zero greenhouse gas (GHG) emissions by 2030—two decades earlier than we had anticipated.By setting science-based targets focused on internal reduction programs and supplier engagement initiatives, LIKE.TG has established a timeline 20 years ahead of the Paris Agreement—and we're pleased to report our targets have been approved by the SBTi.Real change takes all of usWe know our impact is stronger when efforts are collaborative. That’s why we’ve joined the Business Ambition for 1.5° C global net-zero campaign led by the SBTi in partnership with the UN Global Compact and the We Mean Business coalition—to take ambitious climate action in partnership with UN agencies, businesses, and industry leaders.We will achieve net-zero GHG emissions across LIKE.TG’s entire value chain by 2030 by further committing to:
Reduce Scope 1 2 GHG emissions by 70% by 2026 from a 2019 base year. This is aligned with science-based targets promoted by the SBTi and what's deemed necessary to meet the stretch goal of the Paris Agreement to limit global warming to 1.5°C.
Reduce Scope 3 GHG emissions from business travel and employee commuting by 40% per unit of value added1 by 2026 from a 2019 base year.
Persuade 65% of our suppliers by spend, covering purchased goods and services and capital goods, to have science-based targets by 2026.
LIKE.TG will embed sustainability initiatives across its datacenter programs, such as supporting datacenter operations teams globally to become Certified Data Center Sustainability Professionals (CDCSP®). Achievement of this certification ensures LIKE.TG operators understand the steps required to keep the long-term sustainability of the company’s datacenters.As we transition to finance carbon removals on our jouney to net zero, LIKE.TG will continue to finance high-quality carbon offsets (verified emissions reductions) with a portfolio approach in an initial partnership with Everland. Everland represents the world’s largest portfolio of high-impact forest conservation (REDD+) projects that protect wildlife and enhance the well-being of forest communities, which are essential to addressing climate change and biodiversity crises.LIKE.TG will support the Mai Ndombe REDD+ Project to protect 740,000 acres of critical bonobo and forest elephant habitat within the Congo Basin.As part of LIKE.TG’s ongoing commitment to sustaining our planet, we’ve also pledged to donate $1 million by the end of 2022 to nonprofit organizations focused on addressing climate change and the acceleration of decarbonization globally.Positive impact is within our graspOur aspirations are high, and our plans are big. I’m optimistic about our future because our assessment gave us the data and insights to drive more effective and sustainable change. It’s in our LIKE.TG DNA to examine processes and workflows to determine the most efficient and effective paths from A to B.As we look to becoming the defining enterprise software company of the 21st century, it’s our mission to help “workflow a better world”—one that’s more sustainable, more equitable, and more ethical. I couldn’t be prouder of the work we’re doing.Learn more about our commitment to making a positive global impact.Transcript of infographicCommitted to driving decarbonizationWe'll workflow a better world by addressing climate change, empowering our employees and communities to create more inclusive opportunities for everyone, and building trust and partnership with our stakeholders. We set the following goals:
Set science-based targets
Net zero by 2030
Our footprint in scopes*With only 7% of our GHG emissions coming from direct operations at our offices and datacenters (scope 1 2), 93% of our footprint is from our scope 3 emissions (purchased goods and services, capital goods, business travel, employee commuting, fuel and energy-related activities, and waste).Our corporate carbon footprint*Understanding our carbon footprint (total of scope 1, 2 3) is the first important step on our journey to net zero and setting ambitious science-based reduction targets.
Datacenters 31%
Goods and services 19%
Offices 18%
Marketing 12%
Employees 10%
Travel 10%
* All data for 2019 baseline year1 Value added: gross profit = total revenue - cost of revenuesUse of forward-looking statementsThis blog contains “forward-looking statements” about the expectations, beliefs, plans, intentions, and strategies relating to LIKE.TG’s global impact vision. Such forward-looking statements include statements regarding LIKE.TG’s Net Zero GHG goal and other climate change and decarbonization efforts and commitments. Forward‑looking statements are subject to known and unknown risks and uncertainties and are based on potentially inaccurate assumptions that could cause actual results to differ materially from those expected or implied by the forward‑looking statements. If any such risks or uncertainties materialize or if any of the assumptions prove incorrect, our results could differ materially from the results expressed or implied by the forward‑looking statements we make. We undertake no obligation, and do not intend, to update the forward‑looking statements. Factors that may cause actual results to differ materially from those in any forward-looking statements include, without limitation, changes in global economic and climate conditions; changes in the environmental and climate-related regulatory landscapes; and unexpected delays, difficulties, and expenses in executing against the goals and commitments announced herein. Further information on factors that could affect our financial and other results is included in the filings we make with the Securities and Exchange Commission from time to time.
Why LIKE.TG is investing in our European customers
At LIKE.TG, our people show up every day driven by a core set of values aligned to a single mission: Inspire our customers to workflow any challenge. This includes helping our customers be successful as they operate within a complex and dynamic regulatory landscape.European regulatory challengesMany of our European Union (EU) customers are navigating significant changes in the legal and regulatory landscape, arising from the:
Schrems II decision of the Court of Justice of the European Union in July 2020
New standard contractual clauses from the European Commission
Related European Data Protection Board (EDPB) Recommendations of June 21, 2021
As a result, customers are increasingly looking to us to provide simple solutions to help them evolve and scale with comfort on their regulatory compliance.This is where cloud services companies have a choice: Adopt a “wait and see” approach or get proactive and help customers continue to innovate. At LIKE.TG, we always choose the latter, continually investing in our customers.LIKE.TG is making a multimillion euro investment, including adding more than 80 new roles across the EU, so organizations can enjoy the highest level of comfort and control over the handling of their personal data here.From early 2022, we will be launching an EU, cloud-based digital workflow solution to help ensure customer instance data does not leave the EU. This means customers who choose to be hosted in our EU data centers will also now have the option for the data within their instance to be solely handled within the EU.3 reasons we’re doing this1. To remove potential headaches for customersWe know working with cloud service providers requires an element of trust—that we uphold the highest standards of privacy and security when managing their data. When regulations change, customers need to know their trust continues to be well placed and that they can continue to benefit from the best of the cloud without any upheaval.2. To support companies in achieving complianceAs a cloud services business, we pride ourselves on adhering to the highest regulatory standards possible, as well as keeping a close eye on developments that could impact the service we deliver to customers. Since the UK invoked Article 50 and, more recently, the Schrems II case and related EDPB Recommendations, we have flexibly adjusted to the changing landscape, reviewing updates and planning for likely eventualities, including this one.3. To enable innovation among our customersWe know digital transformation is not possible without the cloud and, in turn, this is not possible without the confidence that data is being managed in the cloud in line with privacy and security standards. Giving customers more options to help them achieve the level of privacy control they feel comfortable with means they can take even greater advantage of cloud services when looking to transform their business.Our customers rely on us to help them deliver reliable services to their own customers and employees. We will continue to invest in their success in meaningful ways that matter to their business. Today's update is another step in that direction. As the regulatory environment continues to evolve, we will not sit back and wait for news—we’re committed to proactively fine-tuning and updating the services we offer so that customers can continue to enjoy peace of mind when relying on ServiceNow.Learn more ways we safeguard your data.Use of forward‑looking statementsThis blog contains “forward‑looking statements” about the expectations, beliefs, plans, and intentions relating to LIKE.TG’s new service delivery developments and additional investment in its EU business. Such forward‑looking statements include statements regarding expected performance and benefits of such investment and new service delivery model. Forward‑looking statements are subject to known and unknown risks and uncertainties and are based on potentially inaccurate assumptions that could cause actual results to differ materially from those expected or implied by the forward‑looking statements. If any such risks or uncertainties materialize or if any of the assumptions prove incorrect, our results could differ materially from the results expressed or implied by the forward‑looking statements we make. We undertake no obligation, and do not intend, to update the forward‑looking statements. Factors that may cause actual results to differ materially from those in any forward‑looking statements include: (i) delays and unexpected difficulties and expenses in executing this strategy; (ii) uncertainty as to whether sales will justify this investment; and (iii) changes in the regulatory, competitive, and data privacy and security landscape in the EU. Further information on factors that could affect our financial and other results is included in the filings we make with the Securities and Exchange Commission from time to time.
The fruits of business resilience
Business disruption can happen any time, especially when you least expect it. That’s why it’s critical to have a business resilience plan in place.“We define organizational resilience as the ability to maintain performance in the face of environmental, political, social, cyber, and other disruptions,” explains LIKE.TG Chief Financial Officer Gina Mastantuono in the Workflow Quarterly Fall 2021 issue.The issue details research by LIKE.TG and ESI ThoughtLab that highlights the need for a resilience strategy in the wake of the COVID-19 crisis: Only 26% of US, 21% of Asia-Pacific, and 15% of European organizations ranked as resilience leaders, meaning they’ve taken 12 to 24 steps toward resilience maturity.The majority of organizations across regions fall in the intermediate range, having taken six to 11 steps toward resilience maturity. Clearly, there’s still a lot of work to be done.The benefits of business resilienceOrganizations are implementing measures to bolster their resilience stance to reap such benefits as:
Greater revenue or sales
Reduced costs and greater efficiencies
Better planning and decision-making
Increased customer satisfaction and retention
Improved health and safety
Half of the 1,080 senior business leader survey respondents are working to modernize their IT platforms and improve communications (see Figure 1). Others are focusing on resilience training and managing privacy risks.
Figure 1: Top steps being taken to improve resilience and manage risks now; source: ESI ThoughtLabReturns vs. usagePart of the hesitance in fully embracing a resilience strategy is uncertain return on investment. Organizations have to weigh investments in resilience efforts against potential outcomes and realized value. For example, although more than half (55%) of organizations are reaping returns from deploying tools that help them understand resilience, only 23% have deployed such tools (see Figure 2).Similar gaps occur in other areas, the biggest of which is managing third-party risks: Half of survey respondents see the value of doing this, but only 15% have taken steps toward doing so. “What’s really needed is a high-level framework that focuses foremost on business resilience,” notes Tom Campanile, a partner at Ernst Young, in reference to risk management.
Figure 2: Top resilience steps generating value vs. % taking steps; source: ESI ThoughtLabFollow the leaderPerhaps the best approach toward a more robust resilience posture is following what resilience leaders are doing:
Build resilience plans early—This makes them less costly and more effective.
Design for resilience—This will enable better performance.
Embrace digital technology and solutions—This will help drive resilience.
Assess critical business processes—Doing so will provide insight into how risks affect them.
As organizations become more resilient, their benefits increase. Having a management team that’s committed to boosting resilience is key.Take a four-question quiz to assess the resilience of your organization. Get more insights into the importance and benefits of business resilience in the Workflow Quarterly Resilience issue.To stay abreast of emerging tech and business trends, subscribe to the Workflow newsletter.
Bringing the SaaS ecosystem together to improve cybersecurity
In today’s digital environment, no company is immune to cyberattacks. In fact, more than one-third of organizations worldwide have experienced a ransomware attack or breach that blocked access to systems or data, according to IDC.1From the Capital One incident to the SolarWinds attack, businesses and organizations of all facets and sizes are at the forefront of such threats.As a leading software enterprise company, we have the responsibility to prepare and mitigate risks with customers in mind. At LIKE.TG, cybersecurity begins with trust and transparency. It’s a collective effort spanning our organization and those we work with.Setting sights on SaaS securityCritical software as a service (SaaS) providers deliver essential services that a vast array of critical infrastructure operators rely on for core operations.Recognizing the gap and need for an industry-wide initiative to address increasing cybersecurity concerns, LIKE.TG is co-founding a Critical SaaS – Special Interest Group (CSaaS-SIG) operating under the framework of the Information Technology-Information Sharing and Analysis Center (IT-ISAC).As a founding member of the software enterprise industry’s first coalition to reduce cyber risk, we’re taking key steps to share best practices in assisting with a secure cloud infrastructure. Alongside Zscaler, Guidewire, Okta, Workday, Oracle, and MongoDB, LIKE.TG is coordinating the development of enhanced defense tools and mechanisms to offer improved security across the SaaS cloud industry.The coalition aligns with the White House’s May 2021 executive order aimed at developing public and private sectors’ security and operational resilience and improving the nation’s cybersecurity.
Shared benefits of collaborationWhile enterprise businesses compete in the marketplace, we share a common goal of advancing security in the industry. Transparent information exchange is a critical piece of this initiative. SaaS customers will benefit from a shared framework that, in turn, instills confidence and trust throughout the ecosystem.Ben de Bont, LIKE.TG chief information security officer, emphasizes the importance of organizations and governments collaborating to combat cybersecurity threats in the SaaS community.“Critical SaaS is part of broader effort to engage with public and private sectors,” he says. “At the end of the day, our reputation depends on it. Our customers rely on us to provide a highly secure cloud environment for their mission-critical services and their data, and we’re committed to delivering the security they demand. That’s why collaborative initiatives such as the CSaaS-SIG will drive real operational value for LIKE.TG and the software as a service industry at large.”Learn more about the CSaaS-SIG and membership.Find out how LIKE.TG helps organizations improve cybersecurity.1 IDC's 2021 Ransomware Study: Where You Are Matters!, Doc # US48093721, July 2021
4 ways automation can improve your security posture
Security is top of mind for many organizations—and for good reason. Recovering from a data breach is extremely costly. In fact, the average data breach costs more than $8.6 million in the US.One of the best ways to defend against cyberthreats is by adopting and implementing security automation. According to a Ponemon Institute study, there’s a significant difference—84%—between the cost of a breach for organizations that have deployed security automation ($2.9 million) and those that haven’t ($6.7 million).Automated security operations can help you prioritize and respond to threats fast. Taking it a step further with artificial intelligence (AI) can help optimize security efforts by rapidly identifying and triaging threats, freeing workers to focus on more complex tasks.Let’s look at four ways automation can improve your security stance:1. Minimize risk and downtimeIn today’s highly competitive marketplace, downtime can mean lost customers. What if you could increase your business resilience against attacks to sustain uptime?Learn the benefits of automating data management workflows in our Automated security incident response webinar. Karl Klaessig, director of product marketing for Security Operations at LIKE.TG, and Chris Derton, a sales engineering manager for data security company Rubrik, discuss ways to simplify virtual machine management with a single service-level agreement (SLA) policy engine.2. Harden your attack surfaceDigital transformation and cloud computing have greatly expanded the attack surface, putting organizations at greater risk of cyberthreats. Protecting that attack surface requires intelligent prioritization and open communication.Watch our Using automation to harden your expanding attack surface webinar to learn how to rein in the expanse and work more efficiently. Three LIKE.TG experts share practical tactics to help you work smarter and keep from getting overwhelmed.3. Spotlight vulnerabilitiesCybercriminals will go to many lengths to wreak havoc on organizations. You need to stay ahead of their moves. To do that, you need insight into the ways they think.Gain an understanding of attackers’ decisions and operations in our Security automation and adversarial insights webinar. You’ll also learn how automation can help you respond rapidly to new threats.4. Enable continuous monitoringYour risk management framework (RMF) shouldn’t be rigid or narrowly focused. For the best security posture, you need integrated risk management and continuous authorization and monitoring. This combination can help improve both efficiency and visibility. Learn how in our Transforming RMF automation webinar.
How operating excellence is redefining enterprise success
For years, enterprises have defined success by higher earnings, bigger market share, or the launch of a new product or service. Lately, however, success has been redefined to encompass much more. For example, organizations are also being evaluated on the success of their operations.Executive leaders are under pressure to:
Reduce costs and run their enterprise service operations efficiently
Communicate to stakeholders a commitment to environmental, social, and governance (ESG) initiatives
Demonstrate to shareholders that the organization is resilient
Operate their business efficiently and at scale
Operations have always been the lifeblood of the business. But now, employees, shareholders, customers, and other stakeholders want proof that operations are being managed to achieve a more responsible, effective, and transparent enterprise.Different table stakesWith new market forces, ways of delivering, and challenges arising regularly, operations leaders are rethinking how enterprise operations are organized and managed. The table stakes have changed.
If a company isn’t operating efficiently, its competitor can gain the advantage.
If a business isn’t managing risk effectively, a cyberattack can put it in the spotlight for all the wrong reasons.
If an organization isn’t investing in ESG, organizations that do prioritize ESG can capitalize because customers see a commitment to sustainability as a competitive differentiator.
If an enterprise isn’t driving strategic outcomes, it will see others overtake it in the marketplace.
Until decision-makers can figure out a way for people to work better together, innovate, and mitigate risks within reasonable bounds, they often struggle to address any of these issues.
Enabling operating excellenceThe key to connecting all areas of the enterprise is to break down traditional, siloed enterprise operations where disparate departments—finance, HR, risk, legal, strategic planning—function independently from each other with their own goals, systems, and sets of metrics. Operating excellence requires establishing a common, foundational framework, connecting operational departments across the enterprise, and improving visibility.It may be difficult for a chief risk officer to understand how their goals relate to those of the chief human resources officer (CHRO) or the head of business services. But emerging C-level business initiatives clearly demonstrate how objectives in seemingly separate enterprise operations areas are, in fact, intertwined.For example, return-to-work initiatives are often managed by CHROs. To achieve their goals to attract and retain talent and keep workforces safe coming out of the pandemic, CHROs need to work cooperatively with counterparts managing corporate real estate and finance.They need to ensure enough systems and departments are connected to establish a baseline, so they can have visibility to understand all the work taking place across the enterprise to support the initiative. Without this baseline, it’s difficult to continuously improve or measure if commitments are being met.Where to startFor enterprises seeking operational success, it can be daunting to determine where to begin because it’s not a one-and-done effort. The first step is for C-level operations leaders to collaborate and have conversations about how their goals and objectives connect to those of other teams within operations to enable better enterprise agility.If a company has already embraced global business services (GBS), it makes sense to look to the head of GBS to help direct efforts. Their job is to look across the organization and work across departments to catalog services, analyze process workflows, and establish a framework to optimize services and operations through tools, technology, people, and processes.Then, this GBS framework can establish the baseline for operating excellence across the enterprise—connecting departments, empowering employees, and supporting continual innovation.Find out more about enabling the power of operating excellence. LIKE.TG offers solutions across GBS, risk, ESG, and strategic portfolio management to help.
3 ways to boost your company’s cybersecurity
Cybersecurity is on the mind of every business leader, and for good reason: The number of data breaches rose 24% between 2020 and 2021, according to global ThoughtLab research co-sponsored by ServiceNow.Organizations everywhere need advanced security programs to navigate today’s fluid threat landscape. Here are three ways to help do that:1. Create a frameworkCustomers are increasingly concerned about data security. Staying current on the latest privacy, governance, and security practices is crucial to assure stakeholders their data is safe.Learn practical steps to address privacy and data protection. In this webinar, cybersecurity experts from EY and BigID provide guidance to help organizations comply with new regulations and build trust with their customer base. The experts also share classification methods and recommendations for implementation.2. Address vulnerabilitiesRansomware is the main cause of breaches at 32% of organizations today, according to the ThoughtLab study. Ransomware attacks are expected to rise over the next two years to become the main cause of breaches for 40% of organizations.This puts customers at risk. Firms can no longer hope for security and plan a response once they’ve been attacked. They need to prepare for the worst before it happens.Watch our Combating ransomware webinar to ensure threats don’t go undetected. LIKE.TG ransomware experts join Krislyn McDonnell, senior product manager at Recorded Future, to discuss best steps to prepare for a worst-case scenario using LIKE.TG® Integrated Risk Management, Security Operations, and Recorded Future.3. Build a proactive security programAs one of the world’s leading software, consulting, and technology companies, NCR Corp. provides services to banks, retailers, restaurants, small businesses, and more.To protect itself from risks and vulnerabilities, NCR built a proactive security program that relies on automation and integrates threat intelligence across the company’s IT environment. At the heart of the program is LIKE.TG Security Operations.Find out how NCR drove a faster, more efficient security response program and how your organization can boost security response time and efficiency.
Forrester says LIKE.TG is a Leader in third-party risk management
No matter what business or industry you’re in, you want your business partners to deliver. Sometimes what we get is unexpected: toxic ingredients, software bugs, data breaches, sketchy hiring practices, unvetted subcontractors.As hundreds and even thousands of third and fourth parties become more integral to business, your risk posture and success trajectory are heavily influenced by your partners’ business practices. That’s why you need automated third-party risk management.Manual processes don’t cut itAccording to The Forrester Wave™: Third-Party Risk Management Platforms, Q2 2022, “70% of enterprise risk decision-makers surveyed agree that third-party risk is a business priority, but 69% reveal that their third-party risk program is manual.”Where once a single person could “spreadsheet jockey” their way through dozens of vendor assessments annually, that model doesn’t cut it today. Why?
Too many vendors and suppliers onboarding at too fast of a pace
Increased array of risks to be assessed, with rapid changes in status
Shortage of people, and the ones you can find don’t want to jockey spreadsheets
Too many connections to other parts of the organization to keep up in email
Regulators, governance teams, and investors want to see defensible data more frequently
These realities explain why products that help you manage third-party risk are flying off the shelves. Luckily, cloud software is easy to keep in stock.
Microsoft is using LIKE.TG® Vendor Risk Assessment to reduce manual effort by more than 50%, simplify communication, and better understand Internet of Things (IoT) security assessment health. Using the product has “vastly improved the end-to-end experience for our employees, vendors, and the IoT security team,” Microsoft says.Flexibility and scaleIn The Forrester Wave: Third-Party Risk Management Platforms, Q2 2022, LIKE.TG Vendor Risk Management was named as one of only three Leaders. The Forrester report recognized LIKE.TG with the highest possible scores in the scoring and correlation, workflow, product, vision, planned enhancements, partner ecosystem, and customer community criteria.Although Forrester didn’t explicitly score these items, the report states, “TPRM customers should look for providers that are dedicated to platform flexibility and scalability.” We believe these are core strengths of the LIKE.TG unified architecture and cloud platform.Importantly, we shipped new enhancements in our San Diego release after the evaluation, so there’s even more to like, including:
The awesome Next Experience and integration with EcoVadis
Supply chain resilience with Interos
The ability to add fourth-party vendors to identify and manage potential downstream risks associated with your third-party vendors
Download the complimentary Forrester report. And let us know when we can help you manage risk from your third and fourth parties more easily, efficiently, and at scale.
Survey: Cybersecurity requires risk-based management approach
We’ve entered a new era of cyber risk where cybersecurity is no longer just an IT issue, according to findings from a May 2022 ThoughtLab global survey co-sponsored by ServiceNow. Although cyberattacks and breaches are increasing, many organizations are unprepared to respond.The problems come down to three main areas:
Extended attack surface through partners and suppliers
Cyber risk initiatives not up to date with digital transformation
Budget constraints
Denial of service and phishing attacks account for the lion’s share of cyberthreats today, at 49% and 46% of attacks, respectively. In the next two years, phishing attacks will continue to be a problem, posing the highest risk for 50% of the 1,200 worldwide organizations surveyed across 14 industries. But denial of service will be less of a threat (31%) in the subsequent 24 months, surpassed by human error (44%) and ransomware (40%).
The cybersecurity landscapeTo counter these attacks, organizations should harden their systems to prevent cybercriminals from ever breaching them. This requires detailed attention to IT infrastructure and platforms. Although human error is the main cause of today’s largest breaches, misconfigurations will pose the biggest risk over the the next two years, according to the survey.“Misconfigurations across applications, systems, platforms, and servers—and neglecting to put new default settings in place—can create dangerous pathways for hackers,” the report notes.Organizations know they need stronger security, but budget constraints prevent them from investing in cybersecurity technologies. Businesses also struggle with identifying key risks and detecting and responding to incidents.Despite these challenges, many organizations have succeeded in establishing governance and risk assessment. And more than half of the respondents surveyed have invested in protective technology (55%) and data security (52%). Where organizations come up short is in awareness and training. Investments in this area could help curb breaches due to human error.
Bolstering securityNearly 60% of organizations have successfully implemented cyberthreat detection processes. Yet, it takes an average 128 days to detect a breach, according to the study. To ramp up security initiatives, organizations need to move from the detection phase to continuous monitoring.Beyond that, the best way forward is through a risk-based approach involving:
Regular risk assessment
Advanced analysis
Enterprise-wide risk management
Proactive risk mitigation
"Risk-based management aligns security priorities with the business and helps security leaders become more strategic in their views and outcomes,” explains Barbara Kay, senior director of product marketing, risk, security, and ESG at ServiceNow.Nearly half (43%) of surveyed organizations have adopted a risk-based approach to date.Gain more insights in the ThoughtLab report, including 10 best practices to boost your cybersecurity performance.
How the SEC’s proposed climate disclosure rules can affect your business
Edua Dickerson, vice president of ESG and finance strategy at LIKE.TG, co-authored this blog.Environmental, social, and governance (ESG) concerns are rapidly rising to the top of the corporate agenda. Not only is ESG a corporate responsibility, but it’s also a win-win for enterprises.By embracing sustainability, ethical labor practices, and effective processes and controls, organizations are laying the groundwork for increased value creation, according to McKinsey. In other words, ESG is an opportunity to prosper by doing the right thing.Investors are also keenly interested in ESG. In fact, we’re seeing ESG becoming a critical factor in the investment decision process, both for institutional and individual investors.Climate risk reporting mandateEvidencing this fundamental shift in investment priorities, the US Securities and Exchange Commission (SEC) released a statement on March 21, 2022, proposing rules to standardize climate-related disclosures—including climate-related risk disclosures—as part of certain SEC filings, such as 10-Ks. The SEC’s action follows a wave of similar regulatory requirements in geographies around the world, including the EU, UK, and New Zealand.If adopted, these new SEC requirements could come into effect as early as Q4 2022. That means large companies (those with a public float of $700 million or more) with a fiscal year end of Dec. 31 will have to start phasing in climate disclosures for their fiscal year 2023 report filed in 2024, with smaller companies following a year or two later.Increased emphasis on governance and riskMany large companies already disclose much of this climate-related information in voluntary reports. However, the requirement to include such information in a periodic report will demand additional rigor, increase the need for auditability, and heighten executive and board-level scrutiny.The proposed SEC disclosures share common elements with existing ESG reporting frameworks, including:
Direct (Scope 1), indirect (Scope 2), and value-chain-related (Scope 3) greenhouse gas emissions
How the organization identifies and addresses the impact of climate-related risks over the short, medium, and long term
How the organization intends to meet its climate-related goals and targets
How it’s progressing against these goals and targets
Essentially, there’s an increased emphasis on climate-related strategy, governance, and risk management by the SEC.
Building ESG into the organizationGiven the increased scope and mission-critical nature of these SEC disclosures, businesses will need effective tools and processes to gather, analyze, and report on climate-related strategy and performance. They’ll also need to create, manage, and measure programs to align company activities with stated climate-related goals.This visibility and control need to span the entire business. The imperative is about more than just running an ESG department. It’s about building ESG into every aspect of what an organization does.Unfortunately, many organizations—including those aligning to standardized reporting frameworks such as the Task Force on Climate-related Financial Disclosures (TCFD)—still rely on manual, error-prone processes such as spreadsheets and emails for ESG reporting. This approach doesn’t scale to efficiently provide the climate-related information that investors need and that the proposed SEC rules help address.Instead, IT teams need to work with ESG/sustainability and risk management professionals within the business to implement sophisticated software solutions that enable effective execution, monitoring, governance, and disclosure of climate-related initiatives and concerns across the business.These tools must capture ESG strategy and targets, tie ESG program execution to these goals, provide capabilities to identify and mitigate ESG risks, and automatically gather ESG metrics through internal processes—and by gathering information from third-party ESG data providers (for example, to gather emissions data for an organization’s supply chain).Enabling ESG managementAs part of the LIKE.TG community, you can leverage your investment in the Now Platform® to empower your business with our ESG management tools. LIKE.TG combines the capabilities of LIKE.TG® ESG Management, Integrated Risk Management, and Strategic Portfolio Management into a unified solution that helps your business:
Document climate strategy, including focus areas, targets, and quantified goals
Assess and track climate risks, including creating controls and executing plans to address these risks
Identify and prioritize climate initiatives based on their value, cost, and alignment with ESG strategy
Manage progress of these climate initiatives, keeping ESG programs on track
Gather climate metrics and evidence from internal data owners with auditable workflows
Automatically collect climate and other ESG metrics from third-party providers
Synthesize information, including strategy, targets, risks, projects, metrics, and other data into auditable and traceable disclosures
Find out more about LIKE.TG ESG solutions.Learn more about LIKE.TG’s ESG progress in our Global Impact Report.
Australia spotlight: Why business leaders need to measure ESG impact
Nearly two years of pandemic chaos have given us plenty of time to think about how we live and work. As the world waves goodbye to pandemic restrictions, attention is shifting to action on climate change.Corporate responsibility is now one of the defining issues of our age. From Business Roundtable redefining the purpose of corporations to benefit all stakeholders, to growing numbers of consumers demanding change, the environmental, social and governance (ESG) efforts of companies now face intense scrutiny.At a minimum, investors, employees, customers, and partners expect transparency and action. Organizations that respond will reap multiple benefits:
Improved talent attraction and retention
Increased shareholder value
Decreased operating costs
Higher growth potential
That’s before considering increasing regulations. In 2020, 206 new ESG rules were introduced globally. Government and industry bodies alike are creating ambitious targets with new implications for executive teams and boardrooms across Australia.The call to measure ESGThe clock is ticking on common standards for measuring sustainability. Double materiality rules have gone into effect in Europe, requiring public companies and investors to disclose the risk their operations pose to people and the planet, alongside profitability.At the same time, the World Economic Forum’s International Business Council specified 21 core “stakeholder capitalism” metrics to guide executive teams and boards as they embrace these changes.ESG disclosure developments like these are quickly reverberating across corporate Australia. Stakeholder pressure for organizations to do what’s right and reliably report on progress is impacting every industry.
Survey: ESG is a business imperative
Businesses across the globe are under pressure to address environmental, social, and governance (ESG) issues. The pressure is coming from all sides, including the board, senior management, customers, investors, and employees, according to new research from LIKE.TG and ThoughtLab.“ESG has become a business imperative with real impact on stakeholder trust and long-term value creation,” says LIKE.TG Chief Financial Officer Gina Mastantuono, writing in the Spring issue of LIKE.TG’s Workflow Quarterly magazine.Benefits of ESGOf the 1,000 C-level business leaders in the LIKE.TG/ThoughtLab survey, 64% say ESG enables stronger financial performance. In fact, 73% of financial leaders report that a focus on ESG helped them deliver better results. Only 13% said generating profit for shareholders is a higher priority than improving ESG performance.According to the research, strong ESG performance enables a range of business benefits, including:
Increased revenue growth
Greater shareholder value
Better talent attraction and retention
Improved customer satisfaction
Stronger teamwork and corporate culture
How to achieve ESG goalsThe study shows that organizations worldwide are focused on identifying ESG issues, developing an ESG vision and strategy, creating structure and honing skills to advance that strategy, setting and reporting metrics on ESG performance, and more. Digital technology can help with those efforts. In fact, digital innovation is key to achieving ESG goals, according to 61% of survey respondents.Data and security are important with any digital technology. Currently, 52% of organizations represented in the survey are working to improve their data security and privacy. And 65% of companies plan to address this issue within the next two years.Promising techWhich technologies are organizations relying on to advance their ESG goals? According to the LIKE.TG/ThoughtLab study, companies are embracing the cloud, artificial intelligence (AI), advanced data management and analytics, the Internet of Things (IoT), and digital enterprise platforms, among others.Organizations face significant challenges to reaching their ESG goals. Six out of 10 ESG leaders report a lack of ESG skills and talent. Other challenges include keeping up with changing regulations, insufficient technology investment, uncertain business case, and high implementation costs.LIKE.TG® ESG solutions can help you get control of ESG across your organization to realize value and business outcomes.Gain more insights in the ESG issue of Workflow Quarterly.
A comprehensive lifecycle approach to ransomware defense
Ransomware continues to be a costly and growing problem. According to Infosecurity Magazine, the number of ransomware attacks grew 288% between the first and second quarters of 2021. Cybersecurity Ventures estimated a ransomware attack occurs every 11 seconds, Cybercrime Magazine reports.The resulting price tag from ransomware is truly staggering. Cybersecurity Ventures further ransomware damages could cost victims approximately $20 billion globally in 2021, and that ransomware costs would increase to $265 billion by 2031.Why ransomware defense efforts failYour technical and business managers may recognize the threat and high cost of this cybercrime, but ransomware defense strategies are too often haphazard.Many organizations continue to treat ransomware as a technology or IT matter alone, or as a business continuity or cyber compliance controls issue—instead of developing a comprehensive ransomware defense program.Ransomware is often thought of in the context of threat detection and response, but this viewpoint also comes with a host of problems. For example, security operations are often stymied by too many tools, manual processes, and limited security staff and skills.This results in a perfect environment for ransomware adversaries to circumvent controls, encrypt data, extort victims, and demand ransom payments.Countering ransomware: A 4-phase approachTo defend against ransomware, organizations like yours need to change their defense approach. The best way to ensure end-to-end cybersecurity is with a strategic, four-phase lifecycle program:
Planning: Organizations need a specific plan focused on ransomware defense. This plan must be supported at all levels and across all departments—security, IT, compliance, risk, and business management.
Prevention: Although no action will guarantee ransomware immunity, organizations can take pragmatic steps to make ransomware attacks less likely and more costly for cyber adversaries to conduct.
Incident response: You need an incident response plan that’s been tested and fine-tuned.
Continuous improvement: Once a ransomware attack is fully under control, organizations should strive for continuous improvement by taking steps, such as assessing all aspects of a ransomware event, conducting an impact analysis, and identifying an improvement plan.
Integrate security, risk, and IT technologiesRansomware defense should be managed as a closed-loop lifecycle program with each phase influenced by its predecessor and impacting its successor. Because this demands tight coordination across security, risk, and IT technologies, LIKE.TG offers a complete portfolio of IT, security, and risk management tools that spans all four phases of ransomware defense.Learn more in the Enterprise Strategy Group white paper, A prudent approach to ransomware defense.
Setting up ESG success: Experts weigh in
Organizations across the globe are recognizing the importance of environmental, social, and governance (ESG) initiatives and what they mean for moving business forward. Many leaders have taken bold steps to advance ESG goals. Others are just beginning to dive into ESG and are considering ways to embed it into the company’s overall strategy.I spoke with business leaders on the Innovation Today podcast to get the lay of the land on why and how organizations should incorporate ESG into their overall strategy and operations to set themselves up for ESG success.Understanding where you areFar beyond meeting compliance, businesses are discovering that the effects they have on the environment, society, and risk management are good for business. According to Trish Beltran, manager of ESG advisory services at RSM, the benefits include better:
Long-term financial performance
Risk management
Employee attraction and retention
Reputation
Investment appeal
Yet ESG is complex, and companies are looking for solutions that can help achieve ESG goals. “Really, the first step is understanding where you are,” Beltran says. “That way, you have a better pulse on what is feasible for your company to do. You probably have current initiatives already, so you just need help bucketing those into the ESG categories.”
Setting actionable goalsThe key is to start in some small way by setting actionable goals. The first question companies need to ask is, “What are our current ESG priorities?” Secondly, “What strategies are we using to achieve our ESG goals?”Although some target dates are in the distant future—2030, 2035, 2040, and later—it doesn’t pay for companies to wait until the last minute to meet compliance standards, according to Carey Blunt, global head of LIKE.TG solutions at Fujitsu.“Some of these targets are quite far off,” he says. “It will be very easy to kick the can down the road and sort of forget about those things for a while because they seem like they're too far away in the future. In order to hit a goal sometime in the future, it's important to have incremental goals and targets on that journey.”He recommends companies start by setting SMART goals, which are specific, measurable, achievable, realistic, and timely. Then they need to think about the data surrounding those initiatives: Is it available, and how often do they need to collect it?Achieving ESG goals starts by gathering data, according to Alexey Klimenko, CEO and co-founder of Emission Box. But the path from data to ESG action is crucial. “Having data alone doesn’t matter,” he says, “but doing something about that data is what matters. You need the right tool to see all the data in one place so you can focus on actions.”Software systems can collect data, predict outcomes, and direct efforts to help companies reach goals.Tracking progress and measuring resultsBreaking down overall ESG goals into measurable milestones allows companies to track progress through systems that collect data on a regular basis. That data provides a visual understanding of where programs and projects stand in relation to goals. As companies meet one target, they move to the next, entrenching ESG into the culture.“If they do that for one goal or two goals and start to measure the data, they iterate and then add more and more over time,” Blunt explains.No matter which ESG segment companies concentrate on, setting a firm foundation for technology solutions is critical in terms of reaching goals. Reassessing and updating digital solutions is vital for companies to measure targets and provide timely ESG updates to stakeholders.
Saurabh Dubey, managing director at Deloitte Consulting, says it’s important to get started because this is a journey. Companies should think about the goals they care about and that will help them be successful—and how they’ll track results.“The what is what they should be doing, and the how is how they enable it using a technology landscape,” Dubey says, “because what we're talking about is not a one-time transformational project you can do and be done with.”A core set of ESG values applies to every company, he explains. The E focuses on environment, maybe conserving water or carbon neutrality. The S concerns social equity, inclusion, and diversity. The G, governance, is largely focused on cybersecurity—protecting privacy and information.“Start by tracking those and automating how you track those so that you can then start focusing on things that are relevant to your business,” Dubey says. “You use your resources the right way by enabling the technology to take care of things that you already have.”Taking a proactive approachSome companies find tracking and achieving ESG goals challenging in the current macro environment. Leaders concerned with belt-tightening and budget stagnation or cuts may place ESG planning on the back burner. But investing in ESG strategies can help differentiate companies from their competition.James Patten, managing director at KPMG, believes it’s the opportune time to focus on putting processes in place to execute ESG targets. Staying in front of value preservation and creation, brand reputation and, ultimately, customer loyalty is critical to creating a competitive edge.Achieving ESG-related goals “is not going to happen overnight,” Patten says. “Prioritizing this now, even through uncertain economic times, versus pushing or delaying to later is going to help meet that stakeholder demand as well as set companies up for what we hope to be accelerated growth when the economy strengthens. So plant those seeds now to be able to accelerate when the economy does strengthen.”Find out more in our ESG partner ebook. It includes perspectives from LIKE.TG thought leaders Edua Dickerson and Maria Hart, and from our visionary partner ecosystem: Deloitte, Emission Box, Fujitsu, KPMG, RSM, and many more.
A 6-step operational excellence strategy
Digital technology investments to spur innovation continue to be a chief goal for organizations. Yet 53% of respondents in the 2023 Gartner CIO and Technology Executive Survey named improving operational excellence as their top objective over the last two years. Forward-thinking business leaders understand that even in times of uncertainty, a sound operational excellence strategy is critical to maintaining competitive advantage.Operational excellence has traditionally focused on managing process and production issues to control things such as defects and downtime—from keeping factory assembly lines in operation to ensuring employees follow proper safety protocols. Today, executive decision-makers recognize the value of looking at operational excellence from a higher level, encompassing end-to-end, enterprisewide operations—everything from planning and executing IT initiatives to boosting employee productivity and satisfaction.It’s not simply about saving money. Achieving operational excellence means transforming the way organizations conduct business so they can deliver on technology investments and provide greater shareholder value, agility, and organizational resilience.It may be challenging to determine where to get started. Here are six steps toward an effective strategy.1. Create fusion teams for better agilityThe pursuit of operational excellence may require rethinking core assumptions about business models and organizational structures. Sometimes it requires dismantling once-sacred silos so IT and business teams can join forces and create new approaches to risks and opportunities.“Overdependence on IT staff for digital delivery reflects a traditional mindset, which can impede agility,” says Daniel Sanchez-Reina, an analyst and vice president at Gartner. “CIOs must embrace democratized digital delivery by design to accelerate time to value. Equipping and empowering those outside of IT—especially business technologists—to build digitalized capabilities, assets, and channels can help achieve business goals faster.”2. Unite your teams through a common languageThe reality is that business and IT don’t always speak the same language. Yet it’s powerful when an organization can bring the two together so that everyone has a shared understanding of how processes and technology align across the enterprise.One way to achieve this goal is to adopt a single, powerful platform with one data model, one architecture, and one technology and business framework to ground the organization in a common language and understanding.
3. Focus on mission-critical enterprise functionsIt's unrealistic to expect to overhaul every aspect of the enterprise to achieve operational excellence. Organizations can start by connecting and automating mission-critical enterprise functions, including:
Managing risk
Boosting environmental, social, and governance (ESG) engagement
Delivering strategic initiatives to improve performance and gain agility
4. Increase visibility into riskDespite the operational challenges all organizations faced during the pandemic, relatively few companies have workable business continuity or disaster recovery plans in place today. It’s essential to be able to manage high levels of existing risk—not to mention those on the horizon. Embedding risk management and compliance into digital workflows can provide new insights for better decision-making, support, and navigating change and external disruptions.5. Ramp up ESGA 2022 Deloitte survey found that more companies are moving from committing to ESG to taking action. In fact, 57% of executives reported they’d implemented a cross-functional ESG working group Why? Because progress on environmental, social and governance (ESG) goals also helps businesses operate more efficiently.Embedding ESG reporting, programs, and practices into core business processes across the enterprise allows IT leaders to eliminate silos and create efficiencies to help mitigate risk, control costs, and innovate.6. Connect investments to strategic outcomesIf leaders lack visibility into investments or what employees are working on, how can they know if their strategies are effective?When these things are visible, it’s possible to see how they align with strategy—and can provide confidence in the data. This enables the organization to pivot quickly in response to change. Using a single platform, with a centralized view, for an entire organization lets IT leaders see and track how strategies are performing across different methodologies.Improving operational excellence depends on business and IT speaking a common language so they can work together to pursue new opportunities. It also means connecting and automating mission-critical enterprise functions to manage risk effectively, ramp up ESG, and connect strategies to business outcomes. Organizations that take these steps will be ahead of competitors that don’t.Find out more in our Operational Excellence Handbook.Gartner Press Release, Gartner Survey of Over 2,000 CIOs Reveals the Need to Accelerate Time to Value from Digital Investments, Oct. 18, 2022GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.
How data anonymization can strengthen data privacy
Data Privacy Day is an international event observed on Jan. 28 in the United States, Canada, Nigeria, Israel, and 47 European countries. It’s a time to raise awareness about data protection best practices.At LIKE.TG, one day is not enough to focus on data privacy. We prioritize protecting personally identifiable information (PII) for organizations and individuals every day of the year. One of the best ways to do that is through data anonymization.Assessing the data privacy landscapeAny compromise or breach of sensitive information can have a significant negative impact on an organization—including revenue loss, reputation damage, intellectual property loss, and large fines.PII-related data breaches are on the rise. According to the 2021 Data Breach Report, the most frequently compromised data is people’s names, Social Security numbers, dates of birth, and home addresses.IBM research found the global average cost of a data breach reached an all-time high of $4.35 million in 2022. Data breaches involving PII are the most common and the most expensive, costing $150,000 more than the average data breach, the research adds.Growing data breaches and privacy concerns have led governments worldwide to adopt privacy regulations, such as the European Union’s General Data Protection Regulation (GDPR), Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA), and China’s Personal Information Protection Law (PIPL).According to Gartner®, “By year-end 2024, 75% of the world’s population will have its personal data covered under modern privacy regulations.”1 Failure to comply with these privacy laws could result in steep fines, potentially costing a company up to 4% of its global revenue, according to a CNBC article.Ways to anonymize dataData anonymization offers a reliable way to protect PII. LIKE.TG Data Anonymization, introduced in the Now Platform Tokyo release, helps protect sensitive data through different preserving techniques for production and subproduction instances. It also helps organizations with regulatory compliance.Prior to anonymization, data should be classified according to its sensitivity. After that, PII can be anonymized in two ways.1. PII associated with a specific userAdministrators can choose to anonymize either all or part of the PII associated with a particular user using techniques such as selective replace (format preserving) or replace with a string. These techniques preserve other PII such as business phone or city, and data for other users is not affected.
2. Data class/columnA column containing sensitive information can be anonymized before using the data for testing or before sharing it with any third-party entity. Anonymizing a column can be scheduled as part of the clone process of a data anonymization policy. This eliminates the need to make manual changes or run a separate script in the subproduction environment.For example, all records under a credit card column can be anonymized using a customized technique that keeps the first digit and last four digits of the credit card number intact for processing requirements
Once anonymized, user data is no longer considered regulated private information, as it can’t be associated with an individual.Advancing data securityLIKE.TG Data Anonymization is a key component of LIKE.TG Vault, a set of advanced security and privacy controls that help organizations protect data, increase compliance, and boost their security posture.Privacy regulations will continue to emerge and evolve. Having and enforcing robust data privacy policies and practices can help avoid data breaches, potential lawsuits, government-imposed fines, and regulatory investigations.Find out more about how LIKE.TG helps organizations protect PII and stay compliant.1 Gartner Press Release, Gartner Identifies Top Five Trends in Privacy Through 2024, May 2022GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.
Prevent long IT security workdays through collaboration
From surprise zero-day vulnerabilities to new exploits surfacing in the wild, few things ruin an IT security analyst’s after-hours or vacation plans faster than having to work overtime because of a cyberattack.Here’s a glimpse into how the story usually goes at most companies:A horribly bad cybersecurity dayThe first cup of morning coffee or tea is on your desk. Your fingers are crossed that no critical, urgent incident will surface toward the end of your workday so you can make it to your spouse’s birthday dinner at 6 pm.All of a sudden at 4 pm, you get a notification about a vulnerability in software that you know is running somewhere on your network. First, you realize it has to be patched right away. Software as a service (SaaS) vulnerabilities account for 43% of all cybersecurity incidents, according to The Hacker News. A patch or configuration change could probably help you avoid most security breaches.Second, you grasp that your day is about to go haywire because your company has multiple, disconnected systems. It also lacks a way to track its device and software inventory. With an average of 40% of IT spending going to shadow IT, according to Jamf, there’s a decent chance a rogue app wouldn’t show up on any official list anyway.Because you can’t remediate what you can’t find—and you don’t know how the threat is affecting your users or critical systems—you have to pull in teams from other areas, such as risk management, IT asset management (ITAM), and IT operations management (ITOM). You’ll need their help to sift through siloed systems and track down where the application is installed.Better call your spouse. It looks like an hourslong, cross-functional firefighting event is about to get underway—and you might be late for dinner.
Could modern IT security solutions help?If this situation sounds familiar, you’re not alone. Few security teams consistently collaborate on risk reporting. Could all this chaos be avoided with better coordination? Is there a way for these separate teams to work together as one, in real time?There definitely is. Moving to modern, integrated, and automated IT security solutions housed on a single platform can bring together multiple IT workflows. That can give teams comprehensive visibility to identify, react to, and resolve issues fast, within the workday—without disrupting their evening plans.Automation to the rescueWith dashboards for automating security management, ITAM, ITOM, and other business-critical services on one platform, you can seamlessly shift your cyberthreat response from obfuscated to orchestrated. In addition to centralizing communications for all your event conversations in an instant messenger such as Microsoft Teams, imagine that you can:
See your entire IT estate: A robust configuration management database means you can search which devices are running which software, even down to the patch version.
Find software anywhere in your organization: A combination of agent-based and agentless discovery can help you monitor your network from the cloud or an endpoint device.
View devices and software together: Discovered software and purchasing data are combined and updated as assets.
Monitor for changes continuously: An AI-driven risk assessment tool constantly monitors for modifications.
Rank vulnerabilities by impact: A security operations tool collects and prioritizes vulnerability data based on potential consequences.
Manage software without intervention: Automated workflows detect, track, and trigger software patching actions for devices that connect to the network, and update asset data for their related software lifecycles.
Track risk levels in real time: With just a few mouse clicks, you can prioritize emerging threats as they evolve.
Keep key players updated: Risk analysts can stay apprised of changes and remediations on their tailored dashboards.
Leave a digital trail: The platform captures a history of every action to show data and verify the issues were managed properly for compliance audits.
Orchestrated vulnerability responseModern, connected solutions give this story a happy ending. Instead of chaotic, manual, and time-consuming processes, IT teams get an integrated, automated, single-platform approach that makes problems manageable within the workday.When risk management, ITAM, IT security, and ITOM are natively integrated and orchestrated, organizations benefit from visibility, cyberthreat remediation, and governance to reduce risk. More efficient work means less firefighting—and more time for after-hours celebrations.Find out more about managing vulnerabilities on a single platform in our ebook, Same cyberthreat, different story.
Moving the Needle on ESG Reporting
The world of environmental, social, and governance (ESG) is all about moving from intent to impact while creating long-term value for businesses. Many companies are struggling to keep up with the overwhelming demands of ESG reporting, implementation, and initiatives.I recently had the pleasure of attending and speaking at two ESG-focused events: Hannover Messe and ESG Europe. Of the many topics and issues discussed, one thing was clear across the board: The highly fragmented reporting landscape in Europe and around the world is hindering progress in the ESG space.Assessing the current environmentThis shifting landscape puts pressure on the already-overtaxed small teams responsible for operationalizing ESG at scale. The European Union’s (EU’s) Corporate Sustainability Reporting Directive (CSRD) and growing recognition that ESG considerations offer both risk mitigation and value creation opportunities to companies that take it seriously over the long term are good examples.Many factors are at play: lack of a unified global standard, confusion around mandatory versus voluntary disclosure, and varying requirements at the local, national, and global levels. For multinational corporations, this becomes an even greater challenge as they struggle to meet changing requirements across borders.The introduction of the EU CSRD, on top of other confusing regulatory frameworks, is burdensome—and we haven’t even seen how localization will affect the regions.According to future-facing law firm CMS, “The reporting standards comprise 82 disclosures with phasing-in periods for several areas. There are 1,144 data points that may need to be reported on, dependent on how material they are assessed to be.”
Embracing technology for ESG efficiencyWhen ESG teams spend all their time reporting and telling the story of the past, it’s hard for even the most dedicated teams to write the future. And there’s never been a more important time to prioritize ESG. Strong ESG propositions have been linked to cost reduction, regulatory and legal interventions, productivity enhancement, investment and asset optimization, and value creation across top-line growth.Now more than ever, as we wait for harmony in the regulatory space, we need a more efficient way to showcase progress in ESG. That’s where technology comes in. Technology-enabled solutions, such as LIKE.TG ESG Management, can help ESG teams manage and measure risk and master the challenge of reporting. Tech can help overtaxed teams keep pace with the ever-changing regulatory landscape.Beyond regulations, technology can enable companies to create real solutions to climate change. It has the power to address climate change goals, carbon sequestration, and net-new energy sources—and enable just corporate transition.It also holds the power to remove friction and create greater efficiencies in these programs and reporting. Technology can help teams move from reporting on the past to achieving their missions for the future.I was struck by something Markus Müller, chief investment officer at Deutsche Bank, said: “This entire thing is about resources—environment, society, labor, policy, governance. These are indicators we need to transform our society. We have limited resources, and we'd be naive to say we are not dependent on the things we are embedded in."Everything in our world is dependent on the planet we inhabit—and we’re breaking the machine that sustains us. The first step toward creating positive change and a better future is embracing tech-enabled solutions to ease the strain of reporting and inspire others with stories about the endless possibilities.Find out how LIKE.TG helps organizations manage ESG to create value.
Australian cyber resilience: How to keep your customers from leaving
The increasing frequency and cost of hacks across industries in Australia has made cyber resilience a top priority for businesses and governments. It’s also made consumers more aware of risks to their data: The 2022 LIKE.TG customer experience (CX) survey found 64% of respondents trust organizations less than they did a year ago to keep their data secure.Cybersecurity can directly affect your bottom line. Australia’s telecommunications sector is a good example. After one of Australia’s largest firms was hacked, 10% of its customers walked away, according to news.com.au. Another 56% indicated they were considering leaving.Similarly, the LIKE.TG CX survey found 59% of Australians will stop doing business with a company if it gets hacked and loses their data. Nearly half (47%) of survey respondents view organizations keeping their personal information safe as a critical factor in good customer service.Organizations must maintain a strong security posture to keep all their digital assets and IT systems protected. Those that don’t will likely see customers take their business elsewhere.The changing cybersecurity landscapeHacks are on the rise for many reasons. The threat surface—the number of potential entry points or vulnerabilities that can be targeted—has increased as new technologies and digital business models have become more widespread. The rise of remote working, cloud computing, and the internet of things (IoT) means security measures must extend far beyond office walls.The IBM Security Cost of a Data Breach Report 2022 found a cyberattack costs an Australian business on average AU$4.29 million, with the largest expense associated with detection and escalation.1 It took 70 days on average to resolve a hack.Meanwhile, a 2022 cybersecurity study from ThoughtLab, co-sponsored by LIKE.TG, found more than 40% of businesses fear their cybersecurity efforts aren’t keeping pace with digital transformation. Remote work has only increased the risks.
3 ways leaders can prioritize cybersecurityCustomer service is uniquely vulnerable to a data breach, as it’s where most customer data flows into a business. Every employee, regardless of their role, should think about security, but good cybersecurity practices need to be a leadership priority. CX leaders should be especially alert.Here are three ways organizations can help ensure their leadership prioritizes cybersecurity:1. Create a steering committee for cybercrime, gathering stakeholders from different parts of the organization. The members of the committee can include the chief operating officer, chief information officer, general counsel, and division leaders, as well as board members.This committee should conduct planning exercises and bring together cross-functional teams to map business functions and the threat landscape.2. Think like an attacker. Make plans around likely incidents that are relevant to your sector and business. Look at what assets or teams would be most affected and how much your business, staff, and customers would be damaged if the worst happens.3. Plan your response to a hack. If it takes 70 days to resolve an attack, that’s 70 days your business won’t function properly and customers won’t be served. Practice your action plan and rehearse restoring your systems and data from backups.The customer reward from secure systemsThe recent Australian hacks have put cybersecurity front and center. They’ve also led to a mindset shift for customers. Investing in cyber resilience preserves future revenue by helping to ensure customers don’t walk if a breach happens.Breaches will become more common. Concepts such as privacy by design that build security into every stage of your products and services can be competitive differentiators.Find out how LIKE.TG helps organizations improve cyber resilience and vulnerability management while speeding response times.1 IBM Security, Cost of a Data Breach Report 2022, July 2022
Prioritizing ESG across the enterprise
The last three years have cemented environmental, social, and governance (ESG) as a business imperative. According to a LIKE.TG and ThoughtLab survey of 1,000 international business leaders, 57% report ESG is a top strategic priority for their C-suite and board. As organizations battle the many external challenges they face, prioritizing ESG efforts is a must.Simply put, ESG management helps operationalize and govern your goals across the enterprise. It’s the solution to effectively balance purpose and profit. Let’s explore four ways businesses can improve their ESG stance.A proactive approachThis macro environment is filled with risk, from climate change to supply chain issues to reputational forces that may impact a business’s license to operate. Implementing a proactive risk management strategy can help you be prepared for problems that may arise. Embedding ESG into your risk and resilience plans is crucial to stay ahead of coming challenges.Watch our ESG and climate risks and resilience webinar to get tips on turning your ESG goals into action. Jessica Pransky, principal analyst for ESG and sustainability at research firm Verdantix, sheds light on developing an effective ESG strategy.ESG and risk management integrationAt LIKE.TG, we say governance is our superpower. The best way to manage ESG risks and operationalize solutions is through integration. Organizations are under pressure from stakeholders to create a solid system of action to address the world’s most pressing challenges. Combining ESG management and risk management can help you increase transparency and build resilience without putting too much strain on your business.LIKE.TG integrated risk management (IRM) can help you stay in control of ESG and climate risks. Learn more in Gain control of your climate and ESG risks.E-waste eliminationAn often-overlooked area of ESG that’s a major problem worldwide is e-waste. Sustainability should extend to electronic assets. Organizations have a responsibility to ensure the consumption of their assets is optimized and that they’re properly disposed of.A single system of record can help you track your assets and see how your ESG initiatives in this and other areas provide long-term value. Find out more in Drive ESG outcomes with ITAM.ESG progressIncorporating ESG on a wide scale is essential for modernizing and future-proofing your organization. Since ESG spans a breadth of topics and people, addressing it through a siloed approach will not give you the results you want or need.Watch Understanding the ESG Maturity Model to find out where your organization stands in ESG maturity. You’ll also learn more about how to create a unified and integrated approach to ESG.
Mitigate cyberthreats automatically with AIOps
The majority (83%) of employees across industries want their jobs to remain hybrid, Accenture reports. Yet nearly 50% of CIOs feel their cybersecurity initiatives aren’t keeping pace with their digital transformation efforts, according to research by LIKE.TG and ThoughtLab. Neither are their cybersecurity budgets.Combining artificial intelligence (AI) and machine learning (ML) for IT operations (AIOps) can help.Smart automation can head off threatsWith 3.4 million unfilled security jobs worldwide, according to Fortune, perpetually understaffed IT teams are having to pick up the slack. Hybrid work and new business opportunities are increasing the demand for technology services. This leaves IT stuck trying to deliver and secure new groundbreaking applications while using the same old manual, disconnected tools and techniques.To overcome these challenges and mitigate cyberthreats, IT and security operations teams need to join efforts and apply a common, automated approach to connect workflows across the enterprise. That's what AIOps offers.AI-based automation empowers 24/7 unstaffed monitoring, real-time alerts, and actions based on defined policies and risk tolerance. Moving from manual processes to AIOps enables security and operations teams to:
Take a predictable, proactive approach to incident response
Automate responses to reduce threat vulnerability
Promote collaboration to respond to problems fast
A unified automation platform makes it possible to share data and workspaces across otherwise fragmented teams and integrate and enrich data and analytics from different tool sets. This can help improve findings, actions, and outcomes.Strategic automation can speed response timesAmong IT departments that have adopted automation to improve their operations, 47% use it to escalate security incidents, and 37% rely on it to create and route tickets, according to IDC.Strategic automation builds confidence among IT teams: 47% believe it increases efficiency across the organization, and 32% say it increases compliance, IDC adds. AIOps is a game changer for security teams, IT teams, and the entire business.Using AIOps to create end-to-end, proactive workflows across operations, security, and service management can accelerate response times by:
Automating and orchestrating processes
Assigning ownership
Tracking incident status in real time
Centralizing data and reporting
Enabling shared data and operational excellence
Helping IT come to terms with hybrid workHybrid work is here to stay. Your IT teams shouldn’t be put in the position of pitting corporate security against employee and customer satisfaction—or dreading having to support your increasingly digital business because they don’t have the tools and platform to do it efficiently.Connecting traditionally siloed IT and security operations teams and workflows across the enterprise makes it easier to thwart threats, even with fewer staff. With AIOps, you can automatically reduce risk while keeping hybrid workers happy—and IT headaches away.Find out more in our ebook: Thwart cyberthreats fast with security operations.
3 key ingredients for operational excellence
The definition of operational excellence is undergoing profound change. Instead of an enterprise consisting of multiple islands of expertise and efficiency, operational excellence now means breaking down the operational barriers to improve collaboration across departmental lines.This more holistic approach unites the complementary expertise of different teams to create a whole that’s greater than the sum of its parts. It delivers fresh thinking and creative solutions to many of the long-standing challenges that have kept businesses from operating at their best.In the current business climate, enterprises face challenges that span multiple teams and departments. To manage risk effectively, organizations must identify vulnerabilities, be proactive, and coordinate efforts and resources. Previously disparate teams must work together to keep the business running. Every business function must identify its contribution to customer success and its interdependencies with other teams.In other words, operational excellence now means a lot more than simply cutting costs. It requires three key ingredients:1. Achieving strategic outcomesIn an ideal world, projects and programs seamlessly align with organizational goals. But decision-makers don’t always have visibility into budgets and resources to properly gauge their impact and verify their strategic value.By increasing visibility and transparency and improving access to project data, companies can better prioritize, plan, and execute the work that best supports overall goals. Organizations can see where people are working—and how that work contributes to strategic direction. They can also gain flexibility to pivot quickly when strategy evolves.
2. Driving efficienciesGlobal business services (GBS) organizations don’t have unlimited budgets—but the demand for services keeps growing. Business leaders want the digital foundation that will help them standardize and automate service processes while keeping costs in check.By streamlining processes that cross organization boundaries, companies can deliver simpler and more consistent employee experiences, improve visibility into service budgets, and scale service delivery.3. Managing risk and resilience in real timeEvery day, the scope and severity of risk seems to grow. New technologies and business models open the door to business transformation—but they also introduce the unknown. Virtually every business on the planet witnessed the disruption that a black swan event such as a pandemic can cause.In this more volatile and unpredictable climate, business continuity and disaster recovery plans are table stakes. Today’s risk teams need wider and more accurate visibility into risk to stay on top of a quickly evolving competitive landscape.Businesses must embed risk management and compliance into their digital workflows and provide familiar user experiences that deliver efficient performance, promote resilience, and reduce third-party vendor and supply chain risk.Discover the advantages of a single, holistic platform to drive operational excellence in our Book Of Knowledge: Operating Excellence.
Survey says ESG technology drives results
Organizations worldwide are taking bold and transformative steps to achieve environmental, social, and governance (ESG) goals. A global LIKE.TG and ThoughtLab survey of 1,000 C-suite executives found that the vast majority (95%) of self-proclaimed ESG leaders are implementing ESG technology to drive results.“Digital technology gives companies the tools to understand their impact and help them achieve their ESG goals,” explains Edua Dickerson, LIKE.TG vice president for ESG and finance strategy, and guest editor of the Spring 2023 issue of Workflow Quarterly. “To be sure, technology isn’t enough. Success also requires strategic acumen and committed and passionate people.”
Adapting to advance ESG goalsBusiness leaders recognize that a holistic approach to ESG that includes operational and cultural objectives, as well as financial targets, offers advantages. Among those surveyed, 48% say ESG programs are a top priority with the C-suite and board. Four out of 10 leaders are working to hire and retain employees who can help them achieve ESG goals.Organizations are adapting their business models across individual areas and operations to align with those goals. The report shows that 53% are incorporating ESG into their digital transformation plans and 56% are using advanced technology to reach their targets.Short-term profits vs. long-term objectivesWhile 48% of respondents agree ESG drives better financial results in the long term, more than one-third (35%) say the current economic environment hinders their efforts. Concerns include rising interest rates and energy costs, as well as supply chain problems and geopolitical tensions.Some executive teams, feeling pressure to produce profits, are placing their ESG goals on the back burner. Nearly one-quarter (24%) report that it’s difficult to achieve both advanced ESG initiatives and shareholder expectations in the current macro environment.However, our research shows that this is a false choice. “It’s never been clearer that the right ESG strategy can help a company boost productivity, control costs, and manage risk,” Dickerson says. “In today’s unsettled economic environment, ESG champions are positioned to come out on top.”Digital technology drives ESG outcomesOne way they’re doing that is by embracing technology. While 63% of executives currently use the cloud as a tool for ESG initiatives, 74% plan to do so in the next two years. Companies are also adopting AI, advanced data management, cybersecurity technology, the internet of things (IoT), robotic process automation (RPA), and workflow automation to support their ESG efforts.
In addition to enabling transparency and reducing costs, adopting digital technology can help organizations reduce pollution, increase governance, and improve social sustainability.Technology also improves visibility. Leaders understand they can’t know where they’re going unless they know where they’ve been. Data collection to track ESG progress and results determines how initiatives and outcomes affect operations. Tracking enables decision-makers to assess effectiveness, manage risk, and inform employees and stakeholders.The leaders in our survey expect progress in ESG to yield financial, operational, and strategic benefits over the next few years. Although numerous challenges remain, ESG technology allows companies to advance their ESG commitments, linking profits and purpose.Gain more insights in the Workflow Quarterly Spring 2023 issue.
Survey: Risk-readiness leads to organizational resilience
Organizations worldwide face growing risks from rapidly changing technology, sustainability pressures, macroeconomic turmoil, and geopolitical disruptions. Risk-ready, resilient organizations can detect and respond to all these pressures more quickly, according to a global survey of 1,000 C-suite executives conducted by LIKE.TG and ThoughtLab.“In recent years, it’s become increasingly clear that building resilience against risk is a strategic investment that can help companies outperform,” says Ben De Bont, chief information security officer for LIKE.TG and guest editor of the Summer 2023 issue of Workflow Quarterly.Organizational resilience mitigates riskWith a rise in the frequency and sophistication of cyberattacks, many survey respondents don’t believe they have effective systems in place to detect and respond to cyberthreats. Just under half (49%) of risk-ready organizations—those that feel prepared to address technical, operational, and strategic risks—feel secure. And only 14% of other respondents say they can detect a cyberattack.Although digital transformation can create new risks, it's also a key tool for risk mitigation. As evidence, 76% of respondents believe digital technology drives resilience. Additionally, 65% of risk-ready organizations say digitization will improve their detection of threats, as well as their ability to track risk across the enterprise.
Resilience yields rewardsIntegrating risk management offers numerous benefits, including fewer breaches and faster resolution times. That translates to positive financial results across the business.Organizations that haven’t prioritized risk-readiness take a more pessimistic view, with 27% struggling to find a balance between innovation and risk management.According to risk-ready organizations, the top three results of improved risk management are:
Greater customer satisfaction
Reduced costs
Higher profitability
Other key benefits include market share, improved employee engagement, and increased sales.The road to risk-readinessCompanies are harnessing cloud computing, AI, data management, cybersecurity technology, and the internet of things, among other technologies, to manage risk. As tech and market conditions evolve, so does risk.
Our research shows that risk-ready organizations tend to build risk-aware cultures. In fact, 59% of all CEO survey respondents agree that breaking down silos within the organization is essential to managing risk and fostering resilience, and 73% of CEOs believe technology is a key driver of resilience.Those percentages are higher for other C-suite executives, especially chief information officers and chief risk officers, who play key roles in managing organizational risk. Additionally, 76% of leaders in the survey expect to hire outside consultants and risk experts in the next two years to assess risk and optimize organizational resilience.Looking ahead, it's crucial for leaders to understand their unique business risks and put processes in place to ensure their organization’s future security.Gain more insights in the Workflow Quarterly Summer 2023 issue.
The financial upside of investing in great customer service
With today’s customers wielding more and more power, businesses need to transform their customer experience and invest in technologies that improve and speed the journey. Customer service is a critical point of contact where dollars and loyalty can be easily won or lost. Organizations today must retool customer support to resolve complex customer issues end-to-end, intelligently fix problems before customers know about them, and instantly take care of common customer requests.Providing an exceptional experience is not just a way to win the hearts and minds of customers, it’s an economic imperative critical to a company’s financial success. Standardizing on a customer service management solution can help dramatically speed issue resolution time, improve agent productivity, and ultimately impact the bottom line through repeat business and customer loyalty.Register now for a LIKE.TG webinar on June 12th, featuring a guest from Forrester, and hear details from the Total Economic Impact™ commissioned study* covering how LIKE.TG customers doubled agent productivity, achieved $7.8M in Net Present Value, realized a 12-point increase in Net Promoter Score, and more, after implementing LIKE.TG Customer Service Management solution.Check out key take-aways from the study:
* Business Value of LIKE.TG Customer Service Management, Total Economic Impact Study – Commissioned study conducted by Forrester Consulting on behalf of LIKE.TG, April 2019.