Search Results
36 results found
- Feyz International - Connecting for a better World
Feyz International is a European Consulting company providing guidance and solutions to businesses. Founded in 2018, Feyz International is specialized in legal, financial & tax advisory, and corporate event management. Our Latest News www.feyzinternational.com What challenges do companies currently face regarding security? What is their cybersecurity strategy for the future? And what role does digital sovereignty play in this?... CYBERSECURITY 2025: CLOUD SECURITY IS KEY ISSUE FOR COMPANIES EU SUSTAINABLE GROWTH REGULATIONS: THE CHALLENGES OF TRANSPARENCY, COMPARABILITY, AND LEADERSHIP With the European Green Deal of December 2019 supporting long-term signals to support green investments, and the proposed European Climate Law as a framework for... www.feyzinternational.com About Feyz International Feyz International is a European Consulting company providing guidance and solutions to businesses. Founded in 2018, Feyz International is specialized in legal, financial & tax advisory, and corporate event management. With more than 100 customers across the world, we have been rolling out solutions in major projects for many years. Recognized for their expertise and valued for their analysis and technical skills, our consultants and engineers engage across all sectors ranging from financial services and transportation, to healthcare and technology. Our experts, around Europe, design, manage and accompany transformation processes with measurable results. Our unique business model allows us to blend management consulting skills, hands-on industry expertise and functional knowledge, including such substandard competences as tax management, process optimisation, technology consulting, FDI & FPI, sourcing support, procurement strategy and much more… Feyz International’s Corporate Event management team organises customised summits, conferences and gala dinners for industry leaders with trending innovative topics and their solutions. We provide our clients a networking platform constituting of 5000+ C-level executives from different backgrounds and industries, such as Automotive, Retail, Banking or Healthcare, who can anticipate issues and help companies strive. Our team will guide and cater for our customers to have the best possible experience! Upcoming Events Zürich Learn More Targeted towards IT leaders striving to improve and create value for their businesses. Tech Leadership Conference Paris Learn More This conference provides a networking platform for pioneers in the European and French markets. Business Leadership Conference Learn More Milan IT Leadership Summit is specifically designed to share knowledge and to expand professional networks. IT Leadership Summit Milan Industries Healthcare Healthcare companies must identify ways to deliver better value for patients, fuel innovation and reduce the cost and complexity of operating systems. Learn More Our Services Management Consulting Sales & Marketing Consulting IT Consulting Feyz International provides exceptional networking events and a wide range of consultancy services to our clients through effective and cost-efficient business strategies, FDI and FPI consultancy, financial and administrative services. Our team consists of people skilled in appropriate technologies and architectures to deliver creative, innovative, flexible solutions that are reliable and exceed expectations. Find Out More Financial & Tax Advisory Audit & Risk Advisory Legal Advisory
- Services - Feyz International
Our management consulting services focus on our clients' most critical issues and opportunities: strategy, marketing, organization, operations, technology, transformation, digital, advanced analytics, corporate finance, mergers & acquisitions and sustainability across all industries and geographies. Services Our management consulting services focus on our clients' most critical issues and opportunities: strategy, marketing, organization, operations, technology, transformation, digital, advanced analytics, corporate finance, mergers & acquisitions and sustainability across all industries and geographies. Analytics Feyz International helps you extract maximum value from your data, no matter where it resides or what format it takes. Our analytics experts work closely with you to tackle your most daunting challenges so you not only see results quickly but build the internal skills you need to extend your own data mastery. Marketing Strategy Our team of international experts can help you achieve sustainable, organic growth by focusing on three critical ingredients: an external approach that puts customers first, a uniquely great customer experience and an internal capability that ensures optimum customer interaction at every touch point. Cost Transformation True cost transformation is about simplifying, refocusing and strengthening your organisation so you can continue to grow and deliver a better customer experience. Our approach is holistic and customisable, enabling you to cultivate, encourage and continuously improve a sustainable cost management culture. Advisory Services Financial & Tax Advisory Restructuring Services * Transaction Services Financial Accounting and Operations Corporate Tax Strategy International Tax Business Tax *including portfolio strategy, asset optimization, and turnaround planning Audit & Risk Advisory Risk management * Audit Services * including Forensic accounting services Legal Advisory Dispute Resolution Regulatory & Compliance Legal Entity Management Commercial Law Digital Law Corporate Law Private Clients Legal Services Advisory FDI and FPI in EEA and CIS Feyz International offers strategic advisory services to support international investors in structuring, executing, and optimizing their cross-border investments across EEA and the CIS. Our consultants, backed by region-specific legal expertise, deliver actionable insights and compliance assurance—ensuring that your ventures align with local regulations and market dynamics. Investment Entry Strategy & Regulatory Guidance Advisory on legal frameworks, investment protocols, and strategic considerations for seamless market entry and capital deployment. Business Formation & Structuring Turnkey support for establishing operational entities—subsidiaries, joint ventures, branches, or through M&A—tailored to your sector and goals. Legal Advisory & Transaction Support Comprehensive counsel through each phase of the investment lifecycle, including documentation, due diligence, and risk mitigation. Compliance & Incorporation Services End-to-end assistance with registration, licensing, and regulatory filings with national and regional authorities. * Foreign Direct Investment (FDI) and Foreign Portfolio Investment (FPI) ** European Economic Area (EEA) and the Commonwealth of Independent States (CIS) Consulting Services Management Consulting Business Process Management Sourcing & Procurement Supply Chain Management Organisational Operations Digital Strategy Organisational Strategy Business Model Transformation Corporate Strategy Human Capital Strategy HR Function Talent Management Compensation & Benefits Learning & Development Sales & Marketing Consulting Digital Marketing Customer Experience Branding Sales & Channel Management Pricing Marketing Return on Investment Insights & Analytics * * including Market research IT Consulting IT Security Data Analytics ERP services Engineering Project Management * IT Strategy / Implementation Research & Development Digital Transformation * including Technical advisory For additional information on our services, please contact our experts on : services@feyzinternational.com For existing clients and partners, please contact a Feyz International professional directly. Consulting
- Events - Feyz International
We offer a diverse range of corporate events to C-level executives and business owners, from monthly Tech/Business Leadership Conferences ideal for medium and large business owners to exclusive annual IT Leadership Summits. See below our range of event opportunities we provide, ideal for growing your network. Events We offer a diverse range of corporate events to C-level executives and business owners, from monthly Tech/Business Leadership Conferences ideal for medium and large business owners to exclusive annual IT Leadership Summits. See below our range of event opportunities we provide, ideal for growing your network. Upcoming Events Tech Leadership Conference 2025 About the Event Zürich, Switzerland Business Leadership Conference 2025 About the Event Paris, France IT Leadership Summit 2025 About the Event Milan, Italy Business Leadership Conference 2025 About the Event Brussels, Belgium Tech Leadership Conference 2025 About the Event London, UK IT Leadership Summit 2025 About the Event Istanbul, Turkey Upcoming Become our Sponsor! All attendees must submit an application and our corporate events managers will review all requests. If your application is approved, you will receive a confirmation email with more information on the event. Please note that only officially confirmed participants can attend the event. Access to the event is free* and open to individuals that meet at least one of the following criteria: - All C-level executives, SVPs, VPs and Directors from ( $1B+annual turnover ) commercial organizations - CIOs, CDOs, CTOs, CISOs, DPOs, IT Directors, CFOs, CMOs, SVPs and VPs from ( $250M-$1B annual turnover ) c ommercial organizations - CIOs, CDOs, CTOs, CISOs and DPOs from ( $250M-$25M annual turnover ) government, education, nonprofit and commercial organizations Eligible enterprises: - Large enterprises with (5,001+ ) employees - Medium enterprises with (1,001-5,000 ) employees - Small enterprises with (500-1,000 ) employees Event Registration Form To register, please take the time to fill out the information below. Company Size Continue * (some slots are open for an additional fee) There is no media and no presentation elements, it is an open and free flowing roundtable conversation. Form Testimonials " Feyz International IT Leadership Summit in Istanbul is clear and very useful for IT sector leaders. Thank you for all your efforts for this event. I was very happy to attend this event with industry leader executives. " Sait Reçber Data Management Senior Manager & CDO " This was a valuable event for IT leaders which gathered professionals and let them exchange knowledge and build relationships. It was a great experience for me and now I have highly experienced IT professionals in my network thanks to Feyz International. " Kıvanç Kantürk Chief Technology Officer " All the participants were great and I had a great time discussing various topics with different leaders. " Ata İsmet Özçelik Eastern Europe & Turkey Digital Director IT Leadership Summit / Tech Leadership Conference Technology is part of our daily lives and even more so in our professional environment. The goal of this invitation-only event is to encourage discussions and dialogue on what it means to be a successful IT executive and to provide tools and strategies to assist current and emerging leaders. We urge our leaders to confidentially share their experiences and plans while hearing from inspirational and visionary speakers. We explore and share the main topics amongst which artificial intelligence, fintech, cybersecurity and the metaverse are the most popular. We encourage you to come and meet some of the biggest players when it comes to cloud computing, big data security, customer service and enterprise technology. Coming together will not only expand your networks and knowledge, you can meet the industry specialists and learn more about their expert services. In addition to the unprejudiced atmosphere, this conference will be enlightening, energetic and fruitful. We anticipate your presence there! ITLS/TLC Business Leadership Conference After the difficult past few years, economies are slowly being restored. This is an opportunity for us to build back better, more sustainably and responsibly. Our Business Leadership conference aims to bring leaders together to discover new ideas and exchange new insights. The expectations among our business pioneers are extremely high for reuniting physically, and this is why Feyz International is bringing the new Business Leadership conference to the best hotels which will be enriched with inspiring talks, relevant content and effective networking. This conference will give you an opportunity to recognise solutions that will bring value to your business. With the new trends and cutting-edge technologies, businesses need to adopt and adapt to them to increase their efficiency. Not only you will have the chance to brainstorm on current issues but valuable advice from keynote speakers will be brought forward. An energetic Business Leadership conference awaits you. Along with the spontaneous and exceptionally straightforward atmosphere, this conference will be stimulating, vibrant and highly actionable. We look forward to welcoming you there! BLC Discover our Job Offers
- Insights & News - Feyz International
We provide clients with updates and training on the latest legislative changes and industry news. All aimed at providing important insights and competitive advantages. Access all our startup resources and latest updates on Feyz International and our portfolio companies Insights & News We provide updates and training on the latest legislative changes and industry news. All aimed at providing important insights and competitive advantages. Access all our latest resources and updates on Feyz International and our portfolio companies. What's New THE ROLE OF VENTURE CAPITAL SECURITIES IN ENTREPRENEURSHIP For entrepreneurs to flourish, they need funding: venture capital is financial capital provided to early-stage, high-potential, high-risk, growing entrepreneurial companies. Venture capital is particularly attractive for... CYBERSECURITY 2023: CLOUD SECURITY IS KEY ISSUE FOR COMPANIES What challenges do companies currently face regarding security? What is their cybersecurity strategy for the future? And what role does digital sovereignty play in this?... Load More Latest Publications CONSUMER FINANCE IN THE DIGITAL AGE: LEVERAGING BIG DATA AND TECHNOLOGY TO PERSONALIZE PROTECTION Have you ever wondered why consumers tend to make suboptimal financial decisions, and why financial firms are often in a position to exploit them? Clearly, this is due in part to consumers’ biases and limited rationality... BIG DATA AND THE LEAN STARTUP APPROACH AS TOOLS FOR INNOVATION IN LARGE FIRMS Can larger firms face and survive the challenge of startups? The one question that comes to mind these days is whether they are still capable of fostering innovation... SOCIAL ACCOUNTING: A TOOL FOR MEASURING CORPORATE SUSTAINABILITY Corporate social responsibility is an increasingly popular topic in the corporate world and beyond, highlighting a need for best practices and a stronger understanding of what it really means to be a sustainable business... EU SUSTAINABLE GROWTH REGULATIONS: THE CHALLENGES OF TRANSPARENCY, COMPARABILITY, AND LEADERSHIP With the European Green Deal of December 2019 supporting long-term signals to support green investments, and the proposed European Climate Law as a framework for... Load More
- Terms of Use - Feyz International
Learn more about our Terms of Use. Terms of Use Agreement to terms These Terms of Use constitute a legally binding agreement made between you, whether personally or on behalf of an entity (“you”) and Feyz International LLC ("Feyz International," “we," “us," or “our”), concerning your access to and use of the www.feyzinternational.com website as well as any other media form, media channel, mobile website or mobile application related, linked, or otherwise connected thereto (collectively, the “Site”). We are registered in France and have our registered office at 16 Allée du Puits, 92130, Issy-les-Moulineaux. SIREN number: 911672723. You agree that by accessing the Site, you have read, understood, and agreed to be bound by all of these Terms of Use. IF YOU DO NOT AGREE WITH ALL OF THESE TERMS OF USE, THEN YOU ARE EXPRESSLY PROHIBITED FROM USING THE SITE AND YOU MUST DISCONTINUE USE IMMEDIATELY. The information provided on the Site is not intended for distribution to or use by any person or entity in any jurisdiction or country where such distribution or use would be contrary to law or regulation or which would subject us to any registration requirement within such jurisdiction or country. Accordingly, those persons who choose to access the Site from other locations do so on their own initiative and are solely responsible for compliance with local laws, if and to the extent local laws are applicable. The Site is intended for users who are at least 13 years of age. All users who are minors in the jurisdiction in which they reside (generally under the age of 18) must have the permission of, and be directly supervised by, their parent or guardian to use the Site. If you are a minor, you must have your parent or guardian read and agree to these Terms of Use prior to you using the Site. Intellectuel property rights Unless otherwise indicated, the Site is our proprietary property and all source code, databases, functionality, software, website designs, audio, video, text, photographs, and graphics on the Site (collectively, the “Content”) and the trademarks, service marks, and logos contained therein (the “Marks”) are owned or controlled by us or licensed to us, and are protected by copyright and trademark laws and various other intellectual property rights and unfair competition laws of France and the EU, international copyright laws, and international conventions. The Content and the Marks are provided on the Site “AS IS” for your information and personal use only. Except as expressly provided in these Terms of Use, no part of the Site and no Content or Marks may be copied, reproduced, aggregated, republished, uploaded, posted, publicly displayed, encoded, translated, transmitted, distributed, sold, licensed, or otherwise exploited for any commercial purpose whatsoever, without our express prior written permission. User representations By using the Site, you represent and warrant that: (1) all registration information you submit will be true, accurate, current, and complete; (2) you will maintain the accuracy of such information and promptly update such registration information as necessary; (3) you have the legal capacity and you agree to comply with these Terms of Use; (4) you are not under the age of 13; (5) you are not a minor in the jurisdiction in which you reside, or if a minor, you have received parental permission to use the Site; (6) you will not access the Site through automated or non-human means, whether through a bot, script, or otherwise; (7) you will not use the Site for any illegal or unauthorized purpose; and (8) your use of the Site will not violate any applicable law or regulation. If you provide any information that is untrue, inaccurate, not current, or incomplete, we have the right to refuse any and all current or future use of the Site (or any portion thereof). Prohibited activities You may not access or use the Site for any purpose other than that for which we make the Site available. The Site may not be used in connection with any commercial endeavors except those that are specifically endorsed or approved by us. As a user of the Site, you agree not to: Systematically retrieve data or other content from the Site to create or compile, directly or indirectly, a collection, compilation, database, or directory without written permission from us. Trick, defraud, or mislead us and other users, especially in any attempt to learn sensitive account information such as user passwords. Circumvent, disable, or otherwise interfere with security-related features of the Site, including features that prevent or restrict the use or copying of any Content or enforce limitations on the use of the Site and/or the Content contained therein. Disparage, tarnish, or otherwise harm, in our opinion, us and/or the Site. Use any information obtained from the Site in order to harass, abuse, or harm another person. Make improper use of our support services or submit false reports of abuse or misconduct. Use the Site in a manner inconsistent with any applicable laws or regulations. Engage in unauthorized framing of or linking to the Site. Upload or transmit (or attempt to upload or to transmit) viruses, Trojan horses, or other material, including excessive use of capital letters and spamming (continuous posting of repetitive text), that interferes with any party’s uninterrupted use and enjoyment of the Site or modifies, impairs, disrupts, alters, or interferes with the use, features, functions, operation, or maintenance of the Site. Engage in any automated use of the system, such as using scripts to send comments or messages, or using any data mining, robots, or similar data gathering and extraction tools. Delete the copyright or other proprietary rights notice from any Content. Attempt to impersonate another user or person or use the username of another user. Upload or transmit (or attempt to upload or to transmit) any material that acts as a passive or active information collection or transmission mechanism, including without limitation, clear graphics interchange formats (“gifs”), 1×1 pixels, web bugs, cookies, or other similar devices (sometimes referred to as “spyware” or “passive collection mechanisms” or “pcms”). Interfere with, disrupt, or create an undue burden on the Site or the networks or services connected to the Site. Harass, annoy, intimidate, or threaten any of our employees or agents engaged in providing any portion of the Site to you. Attempt to bypass any measures of the Site designed to prevent or restrict access to the Site, or any portion of the Site. Copy or adapt the Site’s software, including but not limited to Flash, PHP, HTML, JavaScript, or other code. Except as permitted by applicable law, decipher, decompile, disassemble, or reverse engineer any of the software comprising or in any way making up a part of the Site. Except as may be the result of standard search engine or Internet browser usage, use, launch, develop, or distribute any automated system, including without limitation, any spider, robot, cheat utility, scraper, or offline reader that accesses the Site, or using or launching any unauthorized script or other software. Use a buying agent or purchasing agent to make purchases on the Site. Make any unauthorized use of the Site, including collecting usernames and/or email addresses of users by electronic or other means for the purpose of sending unsolicited email, or creating user accounts by automated means or under false pretenses. Use the Site as part of any effort to compete with us or otherwise use the Site and/or the Content for any revenue-generating endeavor or commercial enterprise. Use the Site to advertise or offer to sell goods and services. Sell or otherwise transfer your profile. Third-party website and content The Site may contain (or you may be sent via the Site) links to other websites ("Third-Party Websites") as well as articles, photographs, text, graphics, pictures, designs, music, sound, video, information, applications, software, and other content or items belonging to or originating from third parties ("Third-Party Content"). Such Third-Party Websites and Third-Party Content are not investigated, monitored, or checked for accuracy, appropriateness, or completeness by us, and we are not responsible for any Third-Party Websites accessed through the Site or any Third-Party Content posted on, available through, or installed from the Site, including the content, accuracy, offensiveness, opinions, reliability, privacy practices, or other policies of or contained in the Third-Party Websites or the Third-Party Content. Inclusion of, linking to, or permitting the use or installation of any Third-Party Websites or any Third-Party Content does not imply approval or endorsement thereof by us. If you decide to leave the Site and access the Third-Party Websites or to use or install any Third-Party Content, you do so at your own risk, and you should be aware these Terms of Use no longer govern. You should review the applicable terms and policies, including privacy and data gathering practices, of any website to which you navigate from the Site or relating to any applications you use or install from the Site. Any purchases you make through Third-Party Websites will be through other websites and from other companies, and we take no responsibility whatsoever in relation to such purchases which are exclusively between you and the applicable third party. You agree and acknowledge that we do not endorse the products or services offered on Third-Party Websites and you shall hold us harmless from any harm caused by your purchase of such products or services. Additionally, you shall hold us harmless from any losses sustained by you or harm caused to you relating to or resulting in any way from any Third-Party Content or any contact with Third-Party Websites. Site management We reserve the right, but not the obligation, to: (1) monitor the Site for violations of these Terms of Use; (2) take appropriate legal action against anyone who, in our sole discretion, violates the law or these Terms of Use, including without limitation, reporting such user to law enforcement authorities; (3) in our sole discretion and without limitation, refuse, restrict access to, limit the availability of, or disable (to the extent technologically feasible) any of your Contributions or any portion thereof; (4) in our sole discretion and without limitation, notice, or liability, to remove from the Site or otherwise disable all files and content that are excessive in size or are in any way burdensome to our systems; and (5) otherwise manage the Site in a manner designed to protect our rights and property and to facilitate the proper functioning of the Site. Privacy policy We care about data privacy and security. Please review our Privacy Policy . By using the Site, you agree to be bound by our Privacy Policy, which is incorporated into these Terms of Use. Please be advised the Site is hosted in the EU, Canada and the United States of America. If you access the Site from any other region of the world with laws or other requirements governing personal data collection, use, or disclosure that differ from applicable laws in the EU, Canada and the U.S., then through your continued use of the Site, you are transferring your data to the EU, Canada and the U.S., and you agree to have your data transferred to and processed in the EU, Canada and the U.S.. Term and termination These Terms of Use shall remain in full force and effect while you use the Site. Without limiting any other provision of these terms of use, we reserve the right to, in our sole discretion and without notice or liability, deny access to and use of the site (including blocking certain ip addresses), to any person for any reason or for no reason, including without limitation for breach of any representation, warranty, or covenant contained in these terms of use or of any applicable law or regulation. We may terminate your use or participation in the site or delete your account and any content or information that you posted at any time, without warning, in our sole discretion. Modifications and interruptions We reserve the right to change, modify, or remove the contents of the Site at any time or for any reason at our sole discretion without notice. However, we have no obligation to update any information on our Site. We also reserve the right to modify or discontinue all or part of the Site without notice at any time. We will not be liable to you or any third party for any modification, price change, suspension, or discontinuance of the Site. We cannot guarantee the Site will be available at all times. We may experience hardware, software, or other problems or need to perform maintenance related to the Site, resulting in interruptions, delays, or errors. We reserve the right to change, revise, update, suspend, discontinue, or otherwise modify the Site at any time or for any reason without notice to you. You agree that we have no liability whatsoever for any loss, damage, or inconvenience caused by your inability to access or use the Site during any downtime or discontinuance of the Site. Nothing in these Terms of Use will be construed to obligate us to maintain and support the Site or to supply any corrections, updates, or releases in connection therewith. Governing law These conditions are governed by and interpreted following the laws of the French Republic, and the use of the United Nations Convention of Contracts for the International Sale of Goods is expressly excluded. If your habitual residence is in the EU, and you are a consumer, you additionally possess the protection provided to you by obligatory provisions of the law of your country of residence. Feyz International LLC and yourself both agree to submit to the non-exclusive jurisdiction of the courts of Nanterre, which means that you may make a claim to defend your consumer protection rights in regards to these Terms of Use in France, or in the EU country in which you reside. Dispute resolution Binding Arbitration Any dispute arising from the relationships between the parties to this contract shall be determined by one arbitrator who will be chosen in accordance with the Arbitration and Internal Rules of the European Court of Arbitration being part of the European Centre of Arbitration having its seat in Strasbourg, and which are in force at the time the application for arbitration is filed, and of which adoption of this clause constitutes acceptance. The seat of arbitration shall be Paris, France. The language of the proceedings shall be French. Applicable rules of substantive law shall be the law of France. Restrictions The Parties agree that any arbitration shall be limited to the Dispute between the Parties individually. To the full extent permitted by law, (a) no arbitration shall be joined with any other proceeding; (b) there is no right or authority for any Dispute to be arbitrated on a class-action basis or to utilize class action procedures; and (c) there is no right or authority for any Dispute to be brought in a purported representative capacity on behalf of the general public or any other persons. Exceptions to Arbitration The Parties agree that the following Disputes are not subject to the above provisions concerning binding arbitration: (a) any Disputes seeking to enforce or protect, or concerning the validity of, any of the intellectual property rights of a Party; (b) any Dispute related to, or arising from, allegations of theft, piracy, invasion of privacy, or unauthorized use; and (c) any claim for injunctive relief. If this provision is found to be illegal or unenforceable, then neither Party will elect to arbitrate any Dispute falling within that portion of this provision found to be illegal or unenforceable and such Dispute shall be decided by a court of competent jurisdiction within the courts listed for jurisdiction above, and the Parties agree to submit to the personal jurisdiction of that court. Corrections There may be information on the Site that contains typographical errors, inaccuracies, or omissions, including descriptions, pricing, availability, and various other information. We reserve the right to correct any errors, inaccuracies, or omissions and to change or update the information on the Site at any time, without prior notice. Disclaimer The site is provided on an as-is and as-available basis. You agree that your use of the site and our services will be at your sole risk. To the fullest extent permitted by law, we disclaim all warranties, express or implied, in connection with the site and your use thereof, including, without limitation, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. We make no warranties or representations about the accuracy or completeness of the site’s content or the content of any websites linked to the site and we will assume no liability or responsibility for any (1) errors, mistakes, or inaccuracies of content and materials, (2) personal injury or property damage, of any nature whatsoever, resulting from your access to and use of the site, (3) any unauthorized access to or use of our secure servers and/or any and all personal information and/or financial information stored therein, (4) any interruption or cessation of transmission to or from the site, (5) any bugs, viruses, trojan horses, or the like which may be transmitted to or through the site by any third party, and/or (6) any errors or omissions in any content and materials or for any loss or damage of any kind incurred as a result of the use of any content posted, transmitted, or otherwise made available via the site. We do not warrant, endorse, guarantee, or assume responsibility for any product or service advertised or offered by a third party through the site, any hyperlinked website, or any website or mobile application featured in any banner or other advertising, and we will not be a party to or in any way be responsible for monitoring any transaction between you and any third-party providers of products or services. As with the purchase of a product or service through any medium or in any environment, you should use your best judgment and exercise caution where appropriate. Limitations of liability In no event will we or our directors, employees, or agents be liable to you or any third party for any direct, indirect, consequential, exemplary, incidental, special, or punitive damages, including lost profit, lost revenue, loss of data, or other damages arising from your use of the site, even if we have been advised of the possibility of such damages. Notwithstanding anything to the contrary contained herein, our liability to you for any cause whatsoever and regardless of the form of the action, will at all times be limited to 100 (€) euro. Certain international laws do not allow limitations on implied warranties or the exclusion or limitation of certain damages. If these laws apply to you, some or all of the above disclaimers or limitations may not apply to you, and you may have additional rights. Indemnification You agree to defend, indemnify, and hold us harmless, including our subsidiaries, affiliates, and all of our respective officers, agents, partners, and employees, from and against any loss, damage, liability, claim, or demand, including reasonable attorneys’ fees and expenses, made by any third party due to or arising out of: (1) use of the Site; (2) breach of these Terms of Use; (3) any breach of your representations and warranties set forth in these Terms of Use; (4) your violation of the rights of a third party, including but not limited to intellectual property rights; or (5) any overt harmful act toward any other user of the Site with whom you connected via the Site. Notwithstanding the foregoing, we reserve the right, at your expense, to assume the exclusive defense and control of any matter for which you are required to indemnify us, and you agree to cooperate, at your expense, with our defense of such claims. We will use reasonable efforts to notify you of any such claim, action, or proceeding which is subject to this indemnification upon becoming aware of it. User data We will maintain certain data that you transmit to the Site for the purpose of managing the performance of the Site, as well as data relating to your use of the Site. Although we perform regular routine backups of data, you are solely responsible for all data that you transmit or that relates to any activity you have undertaken using the Site. You agree that we shall have no liability to you for any loss or corruption of any such data, and you hereby waive any right of action against us arising from any such loss or corruption of such data. Electronic communications, transactions, and signatures Visiting the Site, sending us emails, and completing online forms (including event registration forms) constitute electronic communications. You consent to receive electronic communications, and you agree that all agreements, notices, disclosures, and other communications we provide to you electronically, via email and on the Site, satisfy any legal requirement that such communication be in writing. You hereby agree to the use of electronic signatures, contracts, orders, and other records, and to electronic delivery of notices, policies, and records of transactions initiated or completed by us or via the site. You hereby waive any rights or requirements under any statutes, regulations, rules, ordinances, or other laws in any jurisdiction which require an original signature or delivery or retention of non-electronic records, or to payments or the granting of credits by any means other than electronic means. Miscellaneous These Terms of Use and any policies or operating rules posted by us on the Site or in respect to the Site constitute the entire agreement and understanding between you and us. Our failure to exercise or enforce any right or provision of these Terms of Use shall not operate as a waiver of such right or provision. These Terms of Use operate to the fullest extent permissible by law. We may assign any or all of our rights and obligations to others at any time. We shall not be responsible or liable for any loss, damage, delay, or failure to act caused by any cause beyond our reasonable control. If any provision or part of a provision of these Terms of Use is determined to be unlawful, void, or unenforceable, that provision or part of the provision is deemed severable from these Terms of Use and does not affect the validity and enforceability of any remaining provisions. There is no joint venture, partnership, employment or agency relationship created between you and us as a result of these Terms of Use or use of the Site. You agree that these Terms of Use will not be construed against us by virtue of having drafted them. You hereby waive any and all defenses you may have based on the electronic form of these Terms of Use and the lack of signing by the parties hereto to execute these Terms of Use. Contact us In order to resolve a complaint regarding the Site or to receive further information regarding use of the Site, please contact us at: Feyz International LLC 16 Allée du Puits 92130, Issy-les-Moulineaux France Phone: +33 7 57 83 83 33 data-protection @feyzinternational.com This document was last updated on November 29, 2024
- Article (GDPR compliance) - Feyz International
Ridiculously low ceilings on administrative fines hindered the effectiveness of EU data protection law for over twenty years. US tech giants may have seen these fines as a cost of doing business. Now, over two years after the commencement of the European Union’s widely heralded General Data Protection Regulation (GDPR), the anticipated billion-euro sanctions of EU Data Protection Authorities, or ‘DPAs’, which were to have changed the paradigm, have yet to be issued. GDPR COMPLIANCE IN LIGHT OF HEAVIER SANCTIONS TO COME—AT LEAST IN THEORY Ridiculously low ceilings on administrative fines hindered the effectiveness of EU data protection law for over twenty years. US tech giants may have seen these fines as a cost of doing business. Now, over two years after the commencement of the European Union’s widely heralded General Data Protection Regulation (GDPR), the anticipated billion-euro sanctions of EU Data Protection Authorities, or ‘DPAs’, which were to have changed the paradigm, have yet to be issued. Newspaper tribunes and Twitter posts by activists, policymakers and consumers evidence a sense of unfulfilled expectations. DPA action has not supported the theoretical basis for GDPR sanctions—that of deterrence. However, the experience to date and reactions to it inspire recommendations for DPAs and companies alike. In our working paper, EU General Data Protection Regulation Sanctions in Theory and in Practice , forthcoming in Volume 37 of the Santa Clara High Technology Law Journal later in 2020, we explore the theoretical bases for GDPR sanctions and test the reality of DPA action against those bases. We use an analysis of the various functions of sanctions (confiscation, retribution, incapacitation, etc.) to determine that their main objective in the GDPR context is to act as a deterrent, inciting compliance. To achieve deterrence, sanctions must be severe enough to dissuade. This has not been the case under the GDPR as shown through an examination of the actual amount of the sanctions, which is paradoxical, given the substantial increase in the potential maximum fines under the GDPR. Sanctions prior to the GDPR, with certain exceptions, were generally capped at amounts under €1 million (e.g. £500,000 in the UK, €100,000 in Ireland, €300,000 in Germany and €105,000 in Sweden). Since the GDPR has applied, sanctions have ranged from €28 for Google Ireland Limited in Hungary to €50 million for Google Inc in France, far below the potential maximum fine of 4% of turnover, or approximately €5.74 billion for Google Inc. based on 2019 turnover. While the highest sanctions under the GDPR have been substantially greater than those assessed under the prior legislation, they have been far from the maximum fines allowed under the GDPR. Nonetheless, this failure of DPAs, especially the Irish DPA responsible for overseeing most of the US Tech Giants, has not gone unnoticed, as shown by EU institutional reports on the GDPR’s first two years. Indeed, increased funding of DPAs and greater use of cooperation and consistency mechanisms are called for, highlighting the DPAs’ current lack of means. Here, we underscore the fact that, in the area of data protection, there has been perhaps too much reliance on national regulators whereas in other fields (banking regulation, credit rating agencies, etc.), the European Union has tended to move toward centralization of enforcement. Despite these short-fallings, the GDPR’s beefing-up of the enforcement toolbox has allowed for actions by non-profit organizations mandated by individuals (such as La Quadrature du Net that took action against tech giants after the GDPR came into force), making it easier for individuals to bring legal proceedings against violators in the future, and an EU Directive on representative actions for the protection of consumer collective interests is in the legislative pipeline. On the side of businesses, there has been a lack of understanding of certain key provisions of the GDPR and, as compliance theorists tell us, certain firms may be overly conservative and tend to over-comply out of too great a fear of sanction. This seems to be the case with the GDPR’s provisions regarding data breach notifications, where unnecessary notifications have overtaxed DPAs. The one-stop-shop mechanism, which is admittedly complex, also created misunderstanding. This mechanism allows the DPA of the main establishment in the European Union of a non-EU company to become the lead supervisory authority in procedures involving that company, which potentially could lead to companies’ forum-shopping on this basis. However, there is also a requirement that the main establishment has decision-making power with respect to the data processing to which the procedure relates. Failure to consider the latter requirement could result in companies selecting main establishments in countries where there is not such decision-making power, and thereby halt attempts at forum-shopping for a lead supervisory authority for certain processing. One example of this culminated in the French DPA (CNIL)’s largest fine so far, imposed on Google, whereas the latter argued that the Irish DPA was its lead supervisory authority. As we explain in our paper, a lack of GDPR enforcement carries risks. Not only does it undercut the deterrent effect of the GDPR, but it also provides a tenuous basis for risk assessment by companies. While the GDPR’s first two years involved a sort of grace period when DPAs focused on educating companies and spent time painfully investigating complaints to litigation-proof their cases, some companies model their risk assessment of regulation based on enforcement histories. If there is a push for greater enforcement, which EU institutional reports would tend to foreshadow, the basis for companies’ models will be inaccurate. Furthermore, such dependence on risk evaluation ignores potential benefits to firms of increased trust and efficiency involved with expanding compliance to adopt a higher data protection compliance standard applied to customers worldwide. Thus, we argue, not only should DPAs sanction offenders, but DPAs should sanction them severely when justified, establishing the necessary deterrence effect for EU data protection law. Moreover, DPA’s communication should in many cases be modified to stop downplaying sanctions: such communication is counterproductive to the desired effect of sanctions. Companies, on the other hand, should take efforts to fully understand the GDPR, and embrace compliance, leaving behind data protection forum-shopping as a potentially ineffective action. Furthermore, the typical securities lawyer warning that, ‘past performance is no guarantee of future results’, may be a forewarning to companies using past sanctions to create their compliance risk-assessment models that the results may not be accurate for the future. W. Gregory Voss is an Associate Professor in the Human Resources Management & Business Law Department at TBS Business School Hugues Bouthinon-Dumas is an Associate Professor in the Public and Private Policy Department at ESSEC Business School. by Hugues Bouthinon-Dumas , 04.12.20 Source : Knowledge Lab Essec
- (Article) Library - Feyz International
Library CONSUMER FINANCE IN THE DIGITAL AGE: LEVERAGING BIG DATA AND TECHNOLOGY TO PERSONALIZE PROTECTION Have you ever wondered why consumers tend to make suboptimal financial decisions, and why financial firms are often in a position to exploit them? Clearly, this is due in part to consumers’ biases and limited rationality... BIG DATA AND THE LEAN STARTUP APPROACH AS TOOLS FOR INNOVATION IN LARGE FIRMS Can larger firms face and survive the challenge of startups? The one question that comes to mind these days is whether they are still capable of fostering innovation... SOCIAL ACCOUNTING: A TOOL FOR MEASURING CORPORATE SUSTAINABILITY Corporate social responsibility is an increasingly popular topic in the corporate world and beyond, highlighting a need for best practices and a stronger understanding of what it really means to be a sustainable business... DOING GOOD WHILE DOING WELL: THE CASE OF BUSINESS IT INITIATIVES How can organizations do good (help the environment) while doing well (boosting economic growth)? While both worthy goals, they can be at odds with each other, creating a dilemma for organizations... GDPR COMPLIANCE IN LIGHT OF HEAVIER SANCTIONS TO COME - AT LEAST IN THEORY Ridiculously low ceilings on administrative fines hindered the effectiveness of EU data protection law for over twenty years. US tech giants may have seen these fines as a cost of doing business... EU SUSTAINABLE GROWTH REGULATIONS: THE CHALLENGES OF TRANSPARENCY, COMPARABILITY, AND LEADERSHIP With the European Green Deal of December 2019 supporting long-term signals to support green investments, and the proposed European Climate Law as a framework for... HOW TO BUILD A PROACTIVE WORKFORCE: TRAINING PROBLEM SOLVERS OR STRATEGIC CHANGE AGENTS? Employees who take a proactive approach at work – who speak up with suggestions, try to bring about improvements, and take initiative – generally perform better, are more satisfied with their job, and progress more quickly in their career... SUSTAINABLE DEVELOPMENT THANKS TO THE DATA FOOTPRINT From accelerating sales to optimizing operational processes, digital impacts the value chain in every aspect. If the digital revolution generates an inevitable modernization of companies and a hope of value generation, it also provokes a major challenge for organizations: Data... A DAWN OF DATA REVOLUTION AND WHAT'S AT STAKE? It is estimated that by year 2025, individuals and businesses alike will produce about 463 exabytes of data per day globally and there will be an estimated 175 zettabytes of data in the global data sphere. Businesses use data for a variety of reasons; including but not limited to analyzing customer behavior...
- Sitemap - Feyz International
Sitemap Homepage Industries - Feyz International Services - Feyz International Events - Feyz International - Our Sponsors Insights & News - Feyz International - (News) Library - Latest news (Cyber risks) - Latest news (Security access services) - Latest news (Venture capital securities) - Latest news (Cloud security) - (Article) Library - Article (Big data) - Article (Social accounting) - Article (Consumer finance) - Article (Doing good while doing well) - Article (GDPR compliance) - Article (Sustainability) - Article (Proactive Workforce) - Article (Data footprint) - Article (Dawn of Data Revolution) About Us - Feyz International - Our Company - Our Offices - Contact Us Careers - Feyz International Terms of Use Privacy Policy Legal Information Cookie Policy Cookie Settings Search Results
- Article (Big data) - Feyz International
Can larger firms face and survive the challenge of startups? The one question that comes to mind these days is whether they are still capable of fostering innovation. Many large companies try to adapt to this new challenging environment by behaving like startups, which, as the researchers point out, is not the key to successful innovation for incumbent firms. BIG DATA AND THE LEAN STARTUP APPROACH AS TOOLS FOR INNOVATION IN LARGE FIRMS Can larger firms face and survive the challenge of startups? The one question that comes to mind these days is whether they are still capable of fostering innovation. Many large companies try to adapt to this new challenging environment by behaving like startups, which, as the researchers point out, is not the key to successful innovation for incumbent firms. Adapt or… Die Trying Previous research shows that incumbent firms find it difficult to adapt their business models (and thus their strategy) for various reasons including the complexity of the organization, a focus on short-term rather than long-term gains, and competition for resources among managers. Large companies often suffer from innovation blindness caused by the very fact that they hold onto outdated models and assumptions on how the world works. This difficulty in changing the business model makes it extremely challenging for firms to respond to the new forms of competition brought forth by startups. While changing the business model is often necessary, if not vital, there are no clear best practices and many firms have followed the route of trying to behave like a startup. This approach, however, is doomed to fail as it does not recognize the fundamental differences between the two types of organizations in areas such as resources, speed of decision-making, focus etc. Adapt. Do not adopt! There has been research encouraging large companies to adopt the lean startup methodology[1] for product innovation, suggesting that in this way, legacy companies would be able to quickly adjust and adapt the business model to create and appropriate the most value. But while a startup is by definition “an organization formed to search for a repeatable and scalable business model”, a legacy firm already has a business model. Therefore, to be economically competitive, incumbent firms need to be ambidextrous. In other words, they should be able to execute in present markets while innovating for new ones. According to Steven Seggie and his peers, incumbent firms should leverage advantages such as big data and adapt (not adopt) the lean startup methodology. Let us not forget that big firms have clear advantages in big data both through the amount that is available to them and also through the resources they have to analyze the data and act upon the results of the analysis. It is not the Size of Your Data that Matters but What You Do with it The real question then is: “How should firms leverage big data and adapt the lean startup methodology as a means of changing the business model to allow for successful innovation and successful competition with startups?” Traditionally, big data analysts have talked about the 3Vs of big data: volume, variety, and velocity.Each of these characteristics creates a learning challenge, which can then be addressed through use of parts of the lean startup methodology. Volume Volume refers to the increasing amount of data that is available. This volume leads to confirmation bias as a greater amount of data provides opportunities to confirm prior beliefs that inform decision-making. The solution provided by the lean startup methodology is to use the analysis of big data not to reach conclusions but instead to develop hypotheses, which can subsequently be tested through experimentation. Variety Variety means that firms have access to data from very different sources that were not available in the past. Although variety is seen as a good thing, it leads to an increased complexity of both the data and analysis, thus making it difficult to communicate insights for decision-making. The lean startup methodology suggests the introduction of a concept called innovation accounting[2]. It requires regular reporting on the progress of an innovation project with a decision to quit, persevere with, or pivot. The advantage is that it facilitates the access to insights throughout the process. Velocity Velocity refers to the fact that firms are getting real-time data. The richness and timeliness of the data suggest an increased ability to predict the future, and thus creates an illusion of control. The solution offered by the lean startup methodology is to include a build-measure-learn loop into the innovation process as this allows firms to engage in validated learning on an incremental basis. The risk is minimized, as all innovations are incremental in nature. So even if managers have the illusion of control, they will not be able to take large risks that may come back to haunt them in case of unexpected occurrences. Let Us Call a Spade a Spade With unprecedented amounts of Venture Capital money being invested in startups, incumbent firms are under greater pressure than ever before to maintain their status as leaders in their fields. Some of them have adopted, recklessly, the lean startup methodology with generally disastrous results. In sum, a startup is not a small version of a legacy company, neither is a legacy company just a large version of a startup. Therefore, incumbent firms should adapt the lean startup methodology instead of adopting it as it is. Firms should leverage the resource advantages they have regarding big data and combine these advantages with the adapted lean startup methodology to enable large companies to adjust their business models to allow for successful innovation. −−− [1] The lean startup methodology is a quick and iterative process that requires minimal resources compared to more traditional models of innovation (Blank, S. (2013). Why the lean startup changes everything. Harvard Business Review May, 4–9.) [2] A measurement process used to evaluate innovation throughout the innovation process by Steven Seggie , 04.10.21 Source : Knowledge Lab Essec
- Latest news (Cyber risks) - Feyz International
Every day brings with it the news of yet another company falling victim to a cyberattack. The costs the affected businesses face are enormous: lost critical data, stolen assets and damaged reputations. Why cyber risk assessments should be a part of your business strategy Every day brings with it the news of yet another company falling victim to a cyberattack. The costs the affected businesses face are enormous: lost critical data, stolen assets and damaged reputations. But despite these very real threats, company leaders may resist committing the necessary resources to prevent them. After all, no one wants to pay for more than they need. This goes for cybersecurity as much as any other business expense. That’s why it’s vital for C-suites to include cybersecurity as part of their capital planning. And the key to that is determining what “just enough security” is for the organization to meet its business goals. What’s the best way to determine how much security is “just enough”? Most C-level executives are accustomed to making overall business decisions based on risk. An effective risk management program identifies true risks to the business and determines how to reduce those risks to an acceptable level. Including an acceptable level of cyber risks into the organizational risk management program makes cybersecurity a part of the overall business strategy. And the best way to do this is to undergo a cybersecurity-related risk assessment. This helps translate the costs of what it could take to prevent unacceptable levels of cybersecurity risks or to reduce them to an acceptable level. These costs can then be included in budgetary calculations and overall risk management plans. According to the SANS Institute , “the ability to perform risk management is crucial for organizations hoping to defend their systems. There are simply too many threats, too many potential vulnerabilities that could exist, and simply not enough resources to create an impregnable security infrastructure. Therefore every organization, whether they do so in an organized manner or not, will make priority decisions on how best to defend their valuable data assets. Risk management should be the foundational tool used to facilitate thoughtful and purposeful defense strategies.” Many frameworks and industry standards, such as those offered by the National Institute of Standards and Technology (NIST) and ISO, provide guidelines for conducting risk assessments and implementing controls (best practices) to mitigate or prevent security risks. In general, risk assessments help organizations determine their inherent security risks by doing the following: Identifying, estimating, and prioritizing risk to their operations. Determining the possible threats from bad actors that can compromise the confidentiality, integrity, or availability of the information they are processing, storing, or transmitting. Identifying what measures or controls are in place to protect the critical assets and what measures/controls are lacking. Following recommending preventive measures and investing in security upgrades to reduce high levels of risk. What does this mean? It depends on the type of business. Because as these examples show, not all risks are created equal. A bank storing and processing large amounts of financial data or a hospital maintaining extensive patient records would be very concerned with the confidentiality of their data and the damage to their customers and patients if hackers accessed or leaked it. A risk assessment could tell them that they need to prioritize their resources toward protecting the confidentiality of their data with privacy-related controls and other security measures. The risk assessment might also indicate that they are vulnerable to a ransomware attack, so they should implement a recovery plan and perform daily and weekly system backups. But the risk assessment may indicate there is less risk to the availability or integrity of their data, so they would not need to invest as much in these areas. Researchers developing intellectual property may be concerned both about outside actors wanting to steal their discoveries or insiders willing to sell them to competitors. The risk assessment might indicate that they are indeed vulnerable to such attacks. So they might prioritize increasing resources on instituting protective, access and monitoring best practices . They might also invest in awareness training to educate staff on recognizing phishing emails and other social media campaigns as well as internal threats. The risk assessment could suggest they have fewer risks to the confidentiality of this data, so they would not concentrate resources on protecting this area. Once company leaders have identified the critical assets they most want to protect, have an idea of what cyber threat might attack these assets and how vulnerable their assets are to an attack, and understand how severe such an attack would be to their ability to function, they can make informed decisions on how to target their resources toward addressing the risks with the most significant impact to their business. A risk assessment turns intangible concepts such as security, risk, and prevention into tangible realities with actual costs attached. Undetected/unprevented cyberattack equals financial ruin. And that’s an inevitability that every C-suite must face in today’s interconnected world. by Baan Alsinawi , 05.11.21 Source: www.securitymagazine.com
- Contact Us - Feyz International
Find all the information needed to stay in touch with us! We will do our best to respond as fast as possible. Stay connected! Contact Us Thank you for your interest. Please use the form below to get in touch and we will respond to you within one business day. Or you can give us a call . To learn more about our service offerings and industry expertise, please visit our Services or Industries pages. To submit a Request for proposal or to inquire about the Service or Industry of your interest, please email the contact(s) listed on the Services/Industries page. For existing clients and partners, please contact a Feyz International professional directly. Our customer care center: customercare@feyzinternational.com If you face any technical issues, please contact: support@feyzinternational.com For media: media@feyzinternational.com Contact Feyz International - contact@feyzinternational.com - Tel: +33 7 57 83 83 33 I agree to the terms of use Submit We'll reply as soon as we can! Anchor 1
- Article (Data footprint) - Feyz International
From accelerating sales to optimizing operational processes, digital impacts the value chain in every aspect. If the digital revolution generates an inevitable modernization of companies and a hope of value generation, it also provokes a major challenge for organizations: Data. SUSTAINABLE DEVELOPMENT THANKS TO THE DATA FOOTPRINT Since the start of the COVID-19 pandemic, companies have had to accelerate their digital transformation. This implies increased investments, so substantial that they require C-level support. The stakes are high for organizations. From accelerating sales to optimizing operational processes, digital impacts the value chain in every aspect. If the digital revolution generates an inevitable modernization of companies and a hope of value generation, it also provokes a major challenge for organizations: Data. Data from transactions, customers, products, etc. invades the daily operations of organizations, constituting a potentially valuable asset, but above all an important challenge in terms of governance and management. Organizations must increase the understanding of these data as part of their transformation. In the very short term and in an uncertain time, data becomes more crucial than ever to identify the levers of performance of companies. Optimizing costs, increasing business revenues, and driving process efficiency are all initiatives based on the availability of relevant data. As the decision cycles accelerate, many decision-makers will no longer be able to drive their businesses with approximate and often inaccurate data. Having good data - and just in time - has become a pressing necessity. But this prospect seems attainable only if the data heritage is better mastered. This is precisely the purpose of the "Data Footprint" method designed by Kearney and Essec. Evaluating the data footprint now constitutes an essential approach to secure investments and increase control over data assets. The Data Footprint approach introduces a virtuous practice that aims to understand the data heritage, risks, challenges and limits linked to data within organizations. The Data Footprint is an evaluation process based on a 360° analysis of the data required as part of a company initiative steered by the entity in charge of Data Governance. The aim of the Data Footprint is to assess the data assets to establish a risk assessment score. Based on multiple dimensions of analysis such as data quality or security, our method allows a quantified assessment of the data heritage in an organization. Today, the data heritage is still poorly controlled and exploited in many companies. What is the quality level of critical data sets in the organization (e.g customers/suppliers’ data)? What is the level of risk associated? What is the degree of control and ownership of data in the organization? These questions are often asked by decision makers without concrete answers based on a structured assessment. The complexity of information systems combined with the lack of governance make the data equation often complex and costly. The Data Footprint allows companies to get a tangible data assessment across multiple dimensions in order to establish a risk score. The purpose of such a measure is to be able to accurately assess areas of weakness and to monitor data heritage improvements. The approach also allows internal and external benchmarks based on a standardized analysis grid. The strategy for implementing a Data Footprint should be progressive while focusing on the critical data sets in the context of companies’ major programs, projects or business transformation initiatives. The approach should involve several collaborators, at least representatives of business lines and IT, who jointly use a score sheet based on the following five dimensions:accessibility and availability,quality, ownership,risks, and identification of the future users. The overall score calculated on these five dimensions can range between 0 and 15, the lower the score the higher the risk related to the enterprise initiative. Consider as an example a company specializing in the distribution of electronic equipment to the general public through its distribution network of more than 2,000 stores. As part of its data strategy, the company decides to launch a priority project that deploys a “Customer-centric” approach in order to increase customer value. The objective is to capture a better understanding of customer preferences in order to meet their expectations. The company anticipates a significant potential risk linked to data (availability, quality, etc.) and decides to launch a Data footprint approach. The total Data risk score for this company was less than 5 in the evaluation exercise. On the recommendation of the Chief Data Officer in agreement with the rest of the team, the decision to launch the project is postponed pending the implementation of a specific data related action plan. This approach allowed the company to apprehend a major risk related to data on this project. Indeed, a rapid launch of this project without prior assessment would have potentially led to failure with economic consequences (losses estimated at a few hundred thousand euros). The approach also made it possible to initiate collaborative work around the data over the entire duration of this assessment (one month), and thus avoiding internal misunderstandings about the responsibilities of the various stakeholders (Business lines, IT teams, etc.). Finally, a clear action plan could be drawn justifying the investment of technical and human resources to upgrade the information system. by Jeroen Rombouts , 19.10.20 Source : Knowledge Lab Essec