Digitalist Flash Briefing: Who Cares About Data Breaches?

Bonnie D. Graham

Today’s briefing looks at how major consumer data breaches – such as fraudulent credit card charges, compromised data, hijacked e-mail, or social media accounts, and loans or lines of credit opened through identity theft – impact consumers and the breached companies.

  • Amazon Echo or Dot: Enable the “Digitalist” flash briefing skill, and ask Alexa to “play my flash briefings” on every business day.
  • Alexa on a mobile device:
    • Download the Amazon Alexa app: Select Skills, and search “Digitalist”. Then, select Digitalist, and click on the Enable button.
    • Download the Amazon app: Click on the microphone icon and say “Play my flash briefing.”

Find and listen to previous Flash Briefings on

Read more on today’s topic



About Bonnie D. Graham

Bonnie D. Graham is the creator, producer and host/moderator of 29 Game-Changers Radio series presented by SAP, bringing technology and business strategy thought leadership panel discussions to a global audience via the Business Channel on World Talk Radio. A broadcast journalist with nearly 20 years in media production and hosting, Bonnie has held marketing communications management roles in the business software, financial services, and real estate industries. She calls SAP Radio her “dream job”. Listen to Coffee Break with Game-Changers.

Driving Full Adoption Of Virtualized Desktop Environments

Daniel Newman

As more employees become mobile workers, it’s time for enterprise businesses to move to virtualized desktop environments. Here’s why.

Virtualized desktop infrastructure (VDI) was developed over ten years ago, yet its true potential is only being discovered now. I’ve written about VDI before – it just goes to show how much of a VDI fan I am. I still remember the excitement of logging on to my first remote desktop more than a decade ago. To sit at home and still have the exact same files and software I had at the office was magical!

Virtualized desktop environments have come a long way since then. Built on the same prose as VDI, these allow for desktops to be hosted at a data center or on the cloud. Considering that IDC predicts nearly three-quarters of the workforce will be online by 2020, it’s absolutely necessary for organizations to drive full adoption of VDE. Among other benefits, VDEs can store legacy systems and applications in a central location and be accessed from any device. With the exponential rise of bringing your own devices to work (BYOD), VDEs become of utmost importance. Here’s why businesses need to fully embrace VDEs in the years to come.

Increased productivity

While the “how” may not be obvious at first, a centralized virtualized environment boosts productivity in many ways. In the business world, efficiency comes in the form of time and cost savings. VDEs provide both. Employees will be able to work when they want, from a location of their choice, using the device they prefer. For employees who thrive in a more creative office environment than a cramped cubicle, this could do wonders. If an employee is stuck at an airport or delayed at an appointment, VDEs will allow them to complete work that needs to get done.

In terms of upkeep, IT productivity increases too. Having a centralized system to manage devices, applications, and security concerns is easier and more efficient than dealing with troubleshooting individual devices. Updates can be done at one go, freeing up IT staff time to focus their efforts elsewhere. In general, VDEs help overall business productivity through greater mobility across the organization.

Improved security

One of the greatest benefits of a virtualized desktop environment is that it sets the stage for better security practices across an organization. VDEs successfully keep corporate applications and data off users’ devices, giving company control of security. In the past, employees working from home might email work-related documents to their home computer. In such cases, the company would lose control over the security of the document as soon as it was opened on the home computer. With VDEs, all work takes place via a data center or cloud, where it can be monitored and protected.

Similarly, when it’s time to apply a security update, VDEs enable a more streamlined process. The IT department can simply patch one image in the data center or cloud, updating all devices promptly and reducing the risk of security breaches due to time lag.

Reduced cost

As mentioned above, VDEs can generate huge cost savings. Once virtualization is securely set up, companies can institute BYOD programs, which completely eliminate the cost of device-related overhead. As personal devices are successfully connected to enterprise data, organizations don’t need to purchase any new devices, saving significant capital expenses. Additionally, organizations can reap cost savings through a more efficient and fully centralized IT management system. Ultimately, enabling centralized management through virtual environments is bound to improve an organization’s bottom line.

In conclusion, it is integral that companies use VDEs, especially as more employees work on mobile devices. In the process of driving full adoption, organizations must avoid some key mistakes. Picking the right hardware, carefully sizing storage, and planning out networks (LAN, WAN, WLAN) can have a big impact on how smoothly the transition into a virtualized desktop environment occurs.

It’s also prudent to design and define workloads as well as size up the business environment before integrating VDEs into the workplace. After all, the transition to VDEs should be seamless and well received, so that employees actually understand the benefits and can fully embrace this technology of the future.

This article originally appeared on Future of Work.


About Daniel Newman

Daniel Newman serves as the Co-Founder and CEO of EC3, a quickly growing hosted IT and Communication service provider. Prior to this role Daniel has held several prominent leadership roles including serving as CEO of United Visual. Parent company to United Visual Systems, United Visual Productions, and United GlobalComm; a family of companies focused on Visual Communications and Audio Visual Technologies.
Daniel is also widely published and active in the Social Media Community. He is the Author of Amazon Best Selling Business Book “The Millennial CEO.” Daniel also Co-Founded the Global online Community 12 Most and was recognized by the Huffington Post as one of the 100 Business and Leadership Accounts to Follow on Twitter.
Newman is an Adjunct Professor of Management at North Central College. He attained his undergraduate degree in Marketing at Northern Illinois University and an Executive MBA from North Central College in Naperville, IL. Newman currently resides in Aurora, Illinois with his wife (Lisa) and his two daughters (Hailey 9, Avery 5).
A Chicago native all of his life, Newman is an avid golfer, a fitness fan, and a classically trained pianist

Five Ignored Practices That Can Disarm Your Cybersecurity Time Bomb

Paul Kurchina

Year after year, data breaches become messier, bigger, and more dangerous – and no business or person is immune from cybersecurity attacks. In fact, any form of cyber crime can impact over half of the world’s population. That’s roughly 3.8 billion people, up from 2 billion in 2015 – and that attack population will grow to 75% as another 2.2 billion people gain access to the Internet by 2022.

Considering the risk, consumers are always shocked to hear that the companies they love exposed their information by missing much-needed patches, ignoring back-door vulnerabilities in their IT architecture, and choosing weak passwords. Furthermore, a good portion of these incidents are preventable. For example, delaying one patch update by as little as six weeks could lead to data theft that impacts hundreds of millions of people in a matter of minutes.

“News headlines warn companies of all sizes that they are putting themselves at risk literally every day,” observed Virtual Forge CEO Markus Schumacher during the Webcast “Achieving Baseline Security Within the SAP Environment,” hosted by Americas’ SAP Users’ Group (ASUG). “If executives fail to implement good controls and ensure that safeguards are in place and effectively used, they are not doing their jobs.”

Tick, tick, tick: It’s time to take control of cybersecurity

Businesses often overlook system configuration, custom code, and transports even though most CEOs are aware of the guidelines to keep their systems secure. Unfortunately, failure in any of these areas introduces security risks

To address these preventable cybersecurity risks, executives should reconsider five fundamental practices for maintaining the security integrity of IT landscapes.

1. Governance, risk, compliance (GRC) of authorizations

Functional and technical users need to be managed in a manner that ensures proper and secure access to the right information, when and where they need it. GRC considerations include restriction of standard users and profiles, segregation of duties, remote function call (RFC) interfaces, user provisioning and decommissioning, data encryption, and the secure use of cryptography. Businesses can also address their password policies by implementing best practices and single sign-on capabilities.

2. Setup security

The organization and maintenance of the IT landscape – as routine as it may sound – can significantly impact the security of your systems, data, and brand reputation. In this case, the IT organization should prioritize the installation of all security patches, monitor security settings continuously on all systems, secure RFC and all other interfaces, and implement end-to-end encryption.

3. Security of custom code

Since companies are unique in how they operate, serve customers, and approach the industry, every IT landscape will always have one or more applications with custom code. The rule for ensuring a secure software development lifecycle is to scan all custom and third-party code early and often. After identifying an exposure, the IT department should perform risk-based assessments and resolutions immediately.

4. Infrastructure security

When hacking a system, most cybercriminals attack the operational system (OS) and database (DB) first because they are the easiest to infiltrate. For this reason, it is important to patch and update the OS and the DB without undue delay and enforce practices around strong passwords for this layer. Additionally, profile parameters should be continuously monitored and controlled, as well as routers, Web dispatchers, gateways, and Java systems.

5. Change management

During development, testing, and production, companies must securely transport code without the risk of intrusion and corruption. Whether received from an internal or external source, all transported content should be inspected before the next stage in the release process. Otherwise, preventable risks may be introduced to the target system. Additionally, it is critical to remain vigilant by encrypting communication and controlling transport paths to meet business needs.

Attention to the fundamentals of IT integrity defuses preventable exposure

The vulnerability of systems to cyberattacks is nothing more than a ticking time bomb. Missing any aspect of cybersecurity puts everyone at risk. For the good of the business, their employees, their customers, and the economy, executives need to rethink their cybersecurity strategies now to protect the company from preventable breaches and the consequences that will follow an attack.

For more insights into securing your SAP software investments and strategy, watch the replay of the Americas’ SAP Users’ Group (ASUG) Webcast “Achieving Baseline Security Within the SAP Environment,” featuring Virtual Forge CEO Markus Schumacher.


Paul Kurchina

About Paul Kurchina

Paul Kurchina is a community builder and evangelist with the Americas’ SAP Users Group (ASUG), responsible for developing a change management program for ASUG members.

Human Skills for the Digital Future

Dan Wellers and Kai Goerlich

Technology Evolves.
So Must We.

Technology replacing human effort is as old as the first stone axe, and so is the disruption it creates.
Thanks to deep learning and other advances in AI, machine learning is catching up to the human mind faster than expected.
How do we maintain our value in a world in which AI can perform many high-value tasks?

Uniquely Human Abilities

AI is excellent at automating routine knowledge work and generating new insights from existing data — but humans know what they don’t know.

We’re driven to explore, try new and risky things, and make a difference.
We deduce the existence of information we don’t yet know about.
We imagine radical new business models, products, and opportunities.
We have creativity, imagination, humor, ethics, persistence, and critical thinking.

There’s Nothing Soft About “Soft Skills”

To stay ahead of AI in an increasingly automated world, we need to start cultivating our most human abilities on a societal level. There’s nothing soft about these skills, and we can’t afford to leave them to chance.

We must revamp how and what we teach to nurture the critical skills of passion, curiosity, imagination, creativity, critical thinking, and persistence. In the era of AI, no one will be able to thrive without these abilities, and most people will need help acquiring and improving them.

Anything artificial intelligence does has to fit into a human-centered value system that takes our unique abilities into account. While we help AI get more powerful, we need to get better at being human.

Download the executive brief Human Skills for the Digital Future.

Read the full article The Human Factor in an AI Future.


About Dan Wellers

Dan Wellers is founder and leader of Digital Futures at SAP, a strategic insights and thought leadership discipline that explores how digital technologies drive exponential change in business and society.

Kai Goerlich

About Kai Goerlich

Kai Goerlich is the Chief Futurist at SAP Innovation Center network His specialties include Competitive Intelligence, Market Intelligence, Corporate Foresight, Trends, Futuring and ideation.

Share your thoughts with Kai on Twitter @KaiGoe.heif Futu


Finance And HR: Friends Or Foes? Shifting To A Collaborative Mindset

Richard McLean

Part 1 in the 3-part “Finance and HR Collaboration” series

In my last blog, I challenged you to think of collaboration as the next killer app, citing a recent study by Oxford Economics sponsored by SAP. The study clearly explains how corporate performance improves when finance actively engages in collaboration with other business functions.

As a case in point, consider finance and HR. Both are being called on to work more collaboratively with each other – and the broader business – to help achieve a shared vision for the company. In most organizations, both have undergone a transformation to extend beyond operational tasks and adopt a more strategic focus, opening the door to more collaboration. As such, both have assumed three very important roles in the company – business partner, change agent, and steward. In this post, I’ll illustrate how collaboration can enable HR and finance to be more effective business partners.

Making the transition to focus on broader business objectives

My colleague Renata Janini Dohmen, senior vice president of HR for SAP Asia Pacific Japan, credits a changing mindset for both finance and HR as key to enabling the transition away from our traditional roles to be more collaborative. She says, “For a long time, people in HR and finance were seen as opponents. HR was focused on employees and how to motivate, encourage, and cheer on the workforce. Finance looked at the numbers and was a lot more cautious and possibly more skeptical in terms of making an investment. Today, both areas have made the transition to take on a more holistic perspective. We are pursuing strategies and approaching decisions based on what delivers the best return on investment for the company’s assets, whether those assets are monetary or non-monetary. This mindset shift plays a key role in how finance and HR execute the strategic imperatives of the company,” she notes.

Viewing joint decisions from a completely different lens

I agree with Renata. This mindset change has certainly impacted the way I make decisions. If I’m just focused on controlling costs and assessing expenditures, I’ll evaluate programs and ideas quite differently than if I’m thinking about the big picture.

For example, there’s an HR manager in our organization who runs Compensation and Benefits. She approaches me regularly with great ideas. But those ideas cost money. In the past, I was probably more inclined to look at those conversations from a tactical perspective. It was easy for me to simply say, “No, we can’t afford it.”

Now I look at her ideas from a more strategic perspective. I think, “What do we want our culture to be in the years ahead? Are the benefits packages she is proposing perhaps the right ones to get us there? Are they family friendly? Are they relevant for people in today’s world? Will they make us an employer of choice?” I quite enjoy the rich conversations we have about the impact of compensation and benefits design on the culture we want to create. Now, I see our relationship as much more collaborative and jointly invested in attracting and retaining the best people who will ultimately deliver on the company strategy. It’s a completely different lens.

Defining how finance and HR align to the company strategy

Renata and I believe that greater collaboration between finance and HR is a critical success factor. How can your organization achieve this shift? “Once the organization has clearly defined what role finance and HR must play and how they fundamentally align to the company strategy, then it’s more natural to structure them in a way to support such transformation,” Renata explains.

Technology plays an important role in our ability to successfully collaborate. Looking back, finance and HR were heavily focused on our own operational areas because everything we did tended to consume more time – just keeping the lights on and taking care of our basic responsibilities. Now, through a more efficient operating model with shared services, standard operating procedures, and automation, we can both be more business-focused and integrated. As a result, we’re able to collaborate in more meaningful ways to have a positive impact on business outcomes.

In our next blog, we’ll look at how finance and HR can work together as agents of change.

For a deeper dive, download the Oxford Economics study sponsored by SAP.

Follow SAP Finance online: @SAPFinance (Twitter)LinkedIn | FacebookYouTube


Richard McLean

About Richard McLean

Richard McLean, regional CFO for SAP Asia Pacific Japan, oversees all key finance and administrative functions for field and regional headquarters, supporting more than 16,000 employees. He has more than 20 years of experience in senior finance roles with leading global companies across a range of industries, including financial services, investment banking, automotive, and IT. He joined SAP in 2008.