30 results found
- Risk Awareness Workshop
Learn to identify the residual risk of a project or the company as a part of planning the project or service We learn the basics of risk management: SWOT, PESTLE, DPIA and ISO31000 through pragmatic stories in groups Attendees can be project managers, quality managers or data protection managers that need risk awareness in their daily working. End result of this workshop is risk oriented thinking, counting the residual risk and materials of the course: attendees will get the risk management toolbox used in the workshop (as long as the elements aren't behind a license) Workshop is suitable for HR, communications, risk managers (finance), directors, project managers and service managers.
- December 11, 2019 | 12:55 PMMannerheimintie 46, 00260 Helsinki, Finland
- November 23, 2020 | 3:00 PM
- February 1, 2021 | 4:00 PM
- Meet our new Data Economy Advisor Jarkko Moilanen Ph.D
Jarkko defended his doctoral dissertation on 3D printing focused Peer Production: Revolution in design, development and manufacturing, and the related dissertation is one of the few works describing the 3D printing ecosystem. The dissertation consists of articles, all of which have been co-written with other researchers. Jarkko's way of working as a writer is to collaborate with others instead of writing everything himself. In October 2017, Jarkko got the idea to write an API Economics book and came up with the name "API Economy 101". The title reflects the purpose of the book, which is to provide a basic package of API economics information to people in charge of business, rather than addressing the issue from a technology perspective. Jarkko invited 3 other experts in the field he knew to participate in the writing process. The book was published under an ideological name in August 2018 by Alma Talent. The book was translated into 2019 in English as "API Economy 101". In the autumn of 2018, Jarkko began working on a new book in English on "Build for Developers - Application Developers as Customers in API Economy". Jarkko also invited other experts in the field to this work, but this time in the role of advisors. The invitees mainly represent application developers, i.e. typical API economy customers and interface consumers. As the writing work progressed slowly, Jarkko decided to try a new approach from July 2019 onwards. He started writing one developer-related writing a day for his own writing series called 100 Days DX. The last summary article in the series was completed on November 6, 2019. Editing the material for the book is in progress. At the same time as 100 Days DX was completed, Jarkko began the video production developer experience of business significance. Doctor of Developer eXperience includes approximately 10-15 minutes of informative videos, often based on scientific articles. In November 2019 Jarkko started to develop Data Product Toolkit, which is a set of canvases to design data products which are the building blocks of the data economy. Data productizement process and tools are part of the research aimed at Jarkko's second dissertation.
- Do you already have Identity Governance in place?
Everyone in IT knows an acronym called IAM, Identity and Access Management which means, how the company process is designed for proofing that you are who you claim to be and then, giving you permission to access something. IAM process is very technical. However, the landscape has changed since the cloud services came part of the picture. The simple IAM process is just not enough to manage every identity for companies. Therefore designing Identity Governance will structure and help you to understand, what identities your organisation currently has and how they should be protected. It is like an umbrella with standardised procedures that are easier to budget for the new solution implementation. FIDO 2 brings a great technology neutral way to secure your cloud accounts and identities and you have also possibility to use it in your internal identity process as well. When considering phishing, it can also precent your cloud accounts being impersonated. When it comes to accesses the Governance is important, because seldom we work with one provider only. When you have cross cloud solution, where for instance your CRM is running in different cloud than your other services, you have more options to select technology neutral best fit solution for your organisation. Your organisation have also customers and external consultants, who are working with your provided tools. That is why it is very important to have standardised way to process each request and automated some of the process parts, so that the onboarding process after vetting is shorter. Each identity and access should be reviewed every now and then. Therefore it is good to design lifecycle what and when will happen. Lifecycle management can be easy for newer systems that already supports time-based lifecycles. Time-based lifecycle helps your organisation to manage situations when the access is not removed by your sub-contractor, even the employee has left, leaving your organisation into a not that nice situation as the identity and accesses are still open. This also helps your organisation to manage the accounts, that are there, but you don't know why and for what they are used for. In case you wish to know more about the Identity Governance, please do not hesitate to contact! email@example.com (we do have spam and safe links in use in more sophisticated level, than filtering, so our post is going thru a separate sandbox check, before reaching our email .
- Techie Stories service updates!
Due to many years in tech, there was no reason to only bind our capabilities to one technology and a cloud provider only. In the current market we are more and more going towards cross cloud services. Hence, in our design services we will look into different options in order to find best fit solution for your business! We are also adding more partners to our solution portfolio in the future.
- Services | Techie Stories
Meet Jukka-Pekka Joensuu, Senior Executive Adviser and Chairman at Techie Stories, Launch! event Play Video Meet Techies! at Techie Stories Launch! and how the company was built! Play Video Meet Jarkko Moilanen Ph.D. Techie Stories Data Economy Adviser at Launch! event! Play Video Meet Marjukka Niinioja, Techie Stories Business Adviser and Founder of Osaango at Launch! Play Video Presenting Softability XR partner at Techie Stories Ltd. Launch 2021 event! Play Video Presenting Hypertrace Observability at Techie Stories Ltd. February 1st Launch 2021 Play Video Presenting Traceable new era of Security at Techie Stories Launch! Play Video Techie Stories Ltd. Vortex! Trailer Play Video Launch! Watch Now Meet Techies! at Techie Stories Launch! and how the company was built! Play Video Share Whole Channel This Video Facebook Twitter Pinterest Tumblr Copy Link Link Copied Share Channel Info Close
- Courses | Techie Stories
Added value in our courses is our special tailoring into company needs, we deliver courses hands-on with business aspects and add a little bit of fun using gamification. Full Stack Cloud Security How to become the best in cloud security? Did you know that the better you understand cloud security, the better experience you can also provide for your end-users? When your specialists understand the full stack of cloud security services including hybrid environments, they know how to build your company a solid foundation for your services! What does your company gain by ordering the course? - You will learn to identify risks and causality - How the security cost structure is formed in the cloud - How to manage security costs - Which cloud service would be suitable among several and how the evaluation is done - Configure security and protection - How to hunt in the bit jungle - How the organization's ability can be tested and staff automatically directed to appropriate training Participants in the course will receive a badge with their learned skills and a certificate of participation from us. The number of signs depends on the extent of the topics covered. Ask for quota Full Stack Cloud Power How to become the best Cloud Service, Cloud Compliance, or a Cloud Bid or Business manager? Did you know that the better you understand cloud possibilities, the better experience you can also provide for your end-users? When you understand the full stack of cloud services from a business perspective including hybrid environments, you know how to manage services in Cloud! What does your company gain by ordering the course? - You will learn to identify risks and causality - Cloud TCO - Service Levels - GDPR and other compliance in the cloud - Calculating the costs - Benefits and pitfalls - Vendor Exit Participants in the course will receive a badge with their learned skills and a certificate of participation from us. The number of flashes depends on the extent of the topics covered. Ask for quota Full Stack Cloud Buyer How to become the best buyer of cloud services Did you know that all the successful cloud implementations start from successful buy? Each failed project is a failure already when the contract has been signed. In this course, you will learn the vital skills that the buyer needs to have before buying the cloud or outsource the services. The knowledge also will help your organization to reduce the costs of operations. What does your company gain, for example? - The buyer learns to identify the risks and the causality - Costs structures ane TCO in the cloud - How cloud implementation can affect the current state - How to reduce implementation risks - What cloud services is worth outsourcing and what is not - Regulations and ensuring compliance - What the buyer needs to know about organizational cloud feasibility - How to evaluate the supplier's ability Participants in the course will receive a badge with their learned skills and a certificate of participation from us. The amount of euros on the shield depends on the extent of the topics covered. Ask for quota Cryptocurrency investigator How to tackle the risks in cryptocurrency world? Did you know that cryptocurrency transaction flows can be easily traced and identified using artificial intelligence? Join our course to learn what, for example, your company CISO can do in concrete! Hands-on! What does your company gain, for example? - You will learn to identify the risks and causality - You will learn to identify the risks associated with money laundering (We e.g. investigate the WannaCry chain in the course) - You will learn how transaction flows are formed - You will learn to trace the complete flow of the transactions between addresses that linked to the real world - You will learn to trace and monitor the flows through many nodes automatically - You will learn to build an authority research package quickly Participants will receive a LinkedIn shareable badge with the learned skills and a certificate of completion from us. The amount of bitcoins on the badge shield depends on the extent of the topics covered. Ask for quota