Search Results
36 items found
- Article (Data footprint) - Feyz International
SUSTAINABLE DEVELOPMENT THANKS TO THE DATA FOOTPRINT Since the start of the COVID-19 pandemic, companies have had to accelerate their digital transformation. This implies increased investments, so substantial that they require C-level support. The stakes are high for organizations. From accelerating sales to optimizing operational processes, digital impacts the value chain in every aspect. If the digital revolution generates an inevitable modernization of companies and a hope of value generation, it also provokes a major challenge for organizations: Data. Data from transactions, customers, products, etc. invades the daily operations of organizations, constituting a potentially valuable asset, but above all an important challenge in terms of governance and management. Organizations must increase the understanding of these data as part of their transformation. In the very short term and in an uncertain time, data becomes more crucial than ever to identify the levers of performance of companies. Optimizing costs, increasing business revenues, and driving process efficiency are all initiatives based on the availability of relevant data. As the decision cycles accelerate, many decision-makers will no longer be able to drive their businesses with approximate and often inaccurate data. Having good data - and just in time - has become a pressing necessity. But this prospect seems attainable only if the data heritage is better mastered. This is precisely the purpose of the "Data Footprint" method designed by Kearney and Essec. Evaluating the data footprint now constitutes an essential approach to secure investments and increase control over data assets. The Data Footprint approach introduces a virtuous practice that aims to understand the data heritage, risks, challenges and limits linked to data within organizations. The Data Footprint is an evaluation process based on a 360° analysis of the data required as part of a company initiative steered by the entity in charge of Data Governance. The aim of the Data Footprint is to assess the data assets to establish a risk assessment score. Based on multiple dimensions of analysis such as data quality or security, our method allows a quantified assessment of the data heritage in an organization. Today, the data heritage is still poorly controlled and exploited in many companies. What is the quality level of critical data sets in the organization (e.g customers/suppliers’ data)? What is the level of risk associated? What is the degree of control and ownership of data in the organization? These questions are often asked by decision makers without concrete answers based on a structured assessment. The complexity of information systems combined with the lack of governance make the data equation often complex and costly. The Data Footprint allows companies to get a tangible data assessment across multiple dimensions in order to establish a risk score. The purpose of such a measure is to be able to accurately assess areas of weakness and to monitor data heritage improvements. The approach also allows internal and external benchmarks based on a standardized analysis grid. The strategy for implementing a Data Footprint should be progressive while focusing on the critical data sets in the context of companies’ major programs, projects or business transformation initiatives. The approach should involve several collaborators, at least representatives of business lines and IT, who jointly use a score sheet based on the following five dimensions:accessibility and availability,quality, ownership,risks, and identification of the future users. The overall score calculated on these five dimensions can range between 0 and 15, the lower the score the higher the risk related to the enterprise initiative. Consider as an example a company specializing in the distribution of electronic equipment to the general public through its distribution network of more than 2,000 stores. As part of its data strategy, the company decides to launch a priority project that deploys a “Customer-centric” approach in order to increase customer value. The objective is to capture a better understanding of customer preferences in order to meet their expectations. The company anticipates a significant potential risk linked to data (availability, quality, etc.) and decides to launch a Data footprint approach. The total Data risk score for this company was less than 5 in the evaluation exercise. On the recommendation of the Chief Data Officer in agreement with the rest of the team, the decision to launch the project is postponed pending the implementation of a specific data related action plan. This approach allowed the company to apprehend a major risk related to data on this project. Indeed, a rapid launch of this project without prior assessment would have potentially led to failure with economic consequences (losses estimated at a few hundred thousand euros). The approach also made it possible to initiate collaborative work around the data over the entire duration of this assessment (one month), and thus avoiding internal misunderstandings about the responsibilities of the various stakeholders (Business lines, IT teams, etc.). Finally, a clear action plan could be drawn justifying the investment of technical and human resources to upgrade the information system. by Jeroen Rombouts , 19.10.20 Source : Knowledge Lab Essec
- (Article) Library - Feyz International
Library CONSUMER FINANCE IN THE DIGITAL AGE: LEVERAGING BIG DATA AND TECHNOLOGY TO PERSONALIZE PROTECTION Have you ever wondered why consumers tend to make suboptimal financial decisions, and why financial firms are often in a position to exploit them? Clearly, this is due in part to consumers’ biases and limited rationality... BIG DATA AND THE LEAN STARTUP APPROACH AS TOOLS FOR INNOVATION IN LARGE FIRMS Can larger firms face and survive the challenge of startups? The one question that comes to mind these days is whether they are still capable of fostering innovation... SOCIAL ACCOUNTING: A TOOL FOR MEASURING CORPORATE SUSTAINABILITY Corporate social responsibility is an increasingly popular topic in the corporate world and beyond, highlighting a need for best practices and a stronger understanding of what it really means to be a sustainable business... DOING GOOD WHILE DOING WELL: THE CASE OF BUSINESS IT INITIATIVES How can organizations do good (help the environment) while doing well (boosting economic growth)? While both worthy goals, they can be at odds with each other, creating a dilemma for organizations... GDPR COMPLIANCE IN LIGHT OF HEAVIER SANCTIONS TO COME - AT LEAST IN THEORY Ridiculously low ceilings on administrative fines hindered the effectiveness of EU data protection law for over twenty years. US tech giants may have seen these fines as a cost of doing business... EU SUSTAINABLE GROWTH REGULATIONS: THE CHALLENGES OF TRANSPARENCY, COMPARABILITY, AND LEADERSHIP With the European Green Deal of December 2019 supporting long-term signals to support green investments, and the proposed European Climate Law as a framework for... HOW TO BUILD A PROACTIVE WORKFORCE: TRAINING PROBLEM SOLVERS OR STRATEGIC CHANGE AGENTS? Employees who take a proactive approach at work – who speak up with suggestions, try to bring about improvements, and take initiative – generally perform better, are more satisfied with their job, and progress more quickly in their career... SUSTAINABLE DEVELOPMENT THANKS TO THE DATA FOOTPRINT From accelerating sales to optimizing operational processes, digital impacts the value chain in every aspect. If the digital revolution generates an inevitable modernization of companies and a hope of value generation, it also provokes a major challenge for organizations: Data... A DAWN OF DATA REVOLUTION AND WHAT'S AT STAKE? It is estimated that by year 2025, individuals and businesses alike will produce about 463 exabytes of data per day globally and there will be an estimated 175 zettabytes of data in the global data sphere. Businesses use data for a variety of reasons; including but not limited to analyzing customer behavior...
- Cookie Policy - Feyz International
Cookie Policy This is the Cookie Policy for Feyz International, accessible from www.feyzinternational.com . What Are Cookies As is common practice with almost all professional websites this site uses cookies, which are tiny files that are downloaded to your computer, to improve your experience. This page describes what information they gather, how we use it and why we sometimes need to store these cookies. We will also share how you can prevent these cookies from being stored however this may downgrade or 'break' certain elements of the sites functionality. How We Use Cookies We use cookies for a variety of reasons detailed below. Unfortunately in most cases there are no industry standard options for disabling cookies without completely disabling the functionality and features they add to this site. It is recommended that you leave on all cookies if you are not sure whether you need them or not in case they are used to provide a service that you use. Disabling Cookies You can prevent the setting of cookies by adjusting the settings on your browser (see your browser Help for how to do this). Be aware that disabling cookies will affect the functionality of this and many other websites that you visit. Disabling cookies will usually result in also disabling certain functionality and features of the this site. Therefore it is recommended that you do not disable cookies. The Cookies We Set Account related cookies If you create an account with us then we will use cookies for the management of the signup process and general administration. These cookies will usually be deleted when you log out however in some cases they may remain afterwards to remember your site preferences when logged out. Login related cookies We use cookies when you are logged in so that we can remember this fact. This prevents you from having to log in every single time you visit a new page. These cookies are typically removed or cleared when you log out to ensure that you can only access restricted features and areas when logged in. Forms related cookies When you submit data to through a form such as those found on contact pages or comment forms cookies may be set to remember your user details for future correspondence. Site preferences cookies In order to provide you with a great experience on this site we provide the functionality to set your preferences for how this site runs when you use it. In order to remember your preferences we need to set cookies so that this information can be called whenever you interact with a page is affected by your preferences. Third Party Cookies In some special cases we also use cookies provided by trusted third parties. The following section details which third party cookies you might encounter through this site. This site uses Google Analytics which is one of the most widespread and trusted analytics solution on the web for helping us to understand how you use the site and ways that we can improve your experience. These cookies may track things such as how long you spend on the site and the pages that you visit so we can continue to produce engaging content. For more information on Google Analytics cookies, see the official Google Analytics page. Third party analytics are used to track and measure usage of this site so that we can continue to produce engaging content. These cookies may track things such as how long you spend on the site or pages you visit which helps us to understand how we can improve the site for you. The Google AdSense service we use to serve advertising uses a DoubleClick cookie to serve more relevant ads across the web and limit the number of times that a given ad is shown to you. For more information on Google AdSense see the official Google AdSense privacy FAQ. We also use social media buttons and/or plugins on this site that allow you to connect with your social network in various ways. For these to work the following social media sites including; LinkedIn, Instagram, Facebook, will set cookies through our site which may be used to enhance your profile on their site or contribute to the data they hold for various purposes outlined in their respective privacy policies. More Information Hopefully that has clarified things for you and as was previously mentioned if there is something that you aren't sure whether you need or not it's usually safer to leave cookies enabled in case it does interact with one of the features you use on our site. If you would like to contact us to understand more about this Policy or wish to contact us concerning any matter relating to it, you may send an email to : data-protection@feyzinternational.com This document was last updated on March 31, 2024
- Sitemap - Feyz International
Sitemap Homepage Industries - Feyz International Services - Feyz International Events - Feyz International - Our Sponsors Insights & News - Feyz International - (News) Library - Latest news (Cyber risks) - Latest news (Security access services) - Latest news (Venture capital securities) - Latest news (Cloud security) - (Article) Library - Article (Big data) - Article (Social accounting) - Article (Consumer finance) - Article (Doing good while doing well) - Article (GDPR compliance) - Article (Sustainability) - Article (Proactive Workforce) - Article (Data footprint) - Article (Dawn of Data Revolution) About Us - Feyz International - Our Company - Our Offices - Contact Us Careers - Feyz International Terms of Use Privacy Policy Legal Information Cookie Policy Cookie Settings Search Results
- Insights & News - Feyz International
Insights & News We provide updates and training on the latest legislative changes and industry news. All aimed at providing important insights and competitive advantages. Access all our latest resources and updates on Feyz International and our portfolio companies. What's New THE ROLE OF VENTURE CAPITAL SECURITIES IN ENTREPRENEURSHIP For entrepreneurs to flourish, they need funding: venture capital is financial capital provided to early-stage, high-potential, high-risk, growing entrepreneurial companies. Venture capital is particularly attractive for... CYBERSECURITY 2023: CLOUD SECURITY IS KEY ISSUE FOR COMPANIES What challenges do companies currently face regarding security? What is their cybersecurity strategy for the future? And what role does digital sovereignty play in this?... Load More Latest Publications CONSUMER FINANCE IN THE DIGITAL AGE: LEVERAGING BIG DATA AND TECHNOLOGY TO PERSONALIZE PROTECTION Have you ever wondered why consumers tend to make suboptimal financial decisions, and why financial firms are often in a position to exploit them? Clearly, this is due in part to consumers’ biases and limited rationality... BIG DATA AND THE LEAN STARTUP APPROACH AS TOOLS FOR INNOVATION IN LARGE FIRMS Can larger firms face and survive the challenge of startups? The one question that comes to mind these days is whether they are still capable of fostering innovation... SOCIAL ACCOUNTING: A TOOL FOR MEASURING CORPORATE SUSTAINABILITY Corporate social responsibility is an increasingly popular topic in the corporate world and beyond, highlighting a need for best practices and a stronger understanding of what it really means to be a sustainable business... EU SUSTAINABLE GROWTH REGULATIONS: THE CHALLENGES OF TRANSPARENCY, COMPARABILITY, AND LEADERSHIP With the European Green Deal of December 2019 supporting long-term signals to support green investments, and the proposed European Climate Law as a framework for... Load More
- Article (GDPR compliance) - Feyz International
GDPR COMPLIANCE IN LIGHT OF HEAVIER SANCTIONS TO COME—AT LEAST IN THEORY Ridiculously low ceilings on administrative fines hindered the effectiveness of EU data protection law for over twenty years. US tech giants may have seen these fines as a cost of doing business. Now, over two years after the commencement of the European Union’s widely heralded General Data Protection Regulation (GDPR), the anticipated billion-euro sanctions of EU Data Protection Authorities, or ‘DPAs’, which were to have changed the paradigm, have yet to be issued. Newspaper tribunes and Twitter posts by activists, policymakers and consumers evidence a sense of unfulfilled expectations. DPA action has not supported the theoretical basis for GDPR sanctions—that of deterrence. However, the experience to date and reactions to it inspire recommendations for DPAs and companies alike. In our working paper, EU General Data Protection Regulation Sanctions in Theory and in Practice , forthcoming in Volume 37 of the Santa Clara High Technology Law Journal later in 2020, we explore the theoretical bases for GDPR sanctions and test the reality of DPA action against those bases. We use an analysis of the various functions of sanctions (confiscation, retribution, incapacitation, etc.) to determine that their main objective in the GDPR context is to act as a deterrent, inciting compliance. To achieve deterrence, sanctions must be severe enough to dissuade. This has not been the case under the GDPR as shown through an examination of the actual amount of the sanctions, which is paradoxical, given the substantial increase in the potential maximum fines under the GDPR. Sanctions prior to the GDPR, with certain exceptions, were generally capped at amounts under €1 million (e.g. £500,000 in the UK, €100,000 in Ireland, €300,000 in Germany and €105,000 in Sweden). Since the GDPR has applied, sanctions have ranged from €28 for Google Ireland Limited in Hungary to €50 million for Google Inc in France, far below the potential maximum fine of 4% of turnover, or approximately €5.74 billion for Google Inc. based on 2019 turnover. While the highest sanctions under the GDPR have been substantially greater than those assessed under the prior legislation, they have been far from the maximum fines allowed under the GDPR. Nonetheless, this failure of DPAs, especially the Irish DPA responsible for overseeing most of the US Tech Giants, has not gone unnoticed, as shown by EU institutional reports on the GDPR’s first two years. Indeed, increased funding of DPAs and greater use of cooperation and consistency mechanisms are called for, highlighting the DPAs’ current lack of means. Here, we underscore the fact that, in the area of data protection, there has been perhaps too much reliance on national regulators whereas in other fields (banking regulation, credit rating agencies, etc.), the European Union has tended to move toward centralization of enforcement. Despite these short-fallings, the GDPR’s beefing-up of the enforcement toolbox has allowed for actions by non-profit organizations mandated by individuals (such as La Quadrature du Net that took action against tech giants after the GDPR came into force), making it easier for individuals to bring legal proceedings against violators in the future, and an EU Directive on representative actions for the protection of consumer collective interests is in the legislative pipeline. On the side of businesses, there has been a lack of understanding of certain key provisions of the GDPR and, as compliance theorists tell us, certain firms may be overly conservative and tend to over-comply out of too great a fear of sanction. This seems to be the case with the GDPR’s provisions regarding data breach notifications, where unnecessary notifications have overtaxed DPAs. The one-stop-shop mechanism, which is admittedly complex, also created misunderstanding. This mechanism allows the DPA of the main establishment in the European Union of a non-EU company to become the lead supervisory authority in procedures involving that company, which potentially could lead to companies’ forum-shopping on this basis. However, there is also a requirement that the main establishment has decision-making power with respect to the data processing to which the procedure relates. Failure to consider the latter requirement could result in companies selecting main establishments in countries where there is not such decision-making power, and thereby halt attempts at forum-shopping for a lead supervisory authority for certain processing. One example of this culminated in the French DPA (CNIL)’s largest fine so far, imposed on Google, whereas the latter argued that the Irish DPA was its lead supervisory authority. As we explain in our paper, a lack of GDPR enforcement carries risks. Not only does it undercut the deterrent effect of the GDPR, but it also provides a tenuous basis for risk assessment by companies. While the GDPR’s first two years involved a sort of grace period when DPAs focused on educating companies and spent time painfully investigating complaints to litigation-proof their cases, some companies model their risk assessment of regulation based on enforcement histories. If there is a push for greater enforcement, which EU institutional reports would tend to foreshadow, the basis for companies’ models will be inaccurate. Furthermore, such dependence on risk evaluation ignores potential benefits to firms of increased trust and efficiency involved with expanding compliance to adopt a higher data protection compliance standard applied to customers worldwide. Thus, we argue, not only should DPAs sanction offenders, but DPAs should sanction them severely when justified, establishing the necessary deterrence effect for EU data protection law. Moreover, DPA’s communication should in many cases be modified to stop downplaying sanctions: such communication is counterproductive to the desired effect of sanctions. Companies, on the other hand, should take efforts to fully understand the GDPR, and embrace compliance, leaving behind data protection forum-shopping as a potentially ineffective action. Furthermore, the typical securities lawyer warning that, ‘past performance is no guarantee of future results’, may be a forewarning to companies using past sanctions to create their compliance risk-assessment models that the results may not be accurate for the future. W. Gregory Voss is an Associate Professor in the Human Resources Management & Business Law Department at TBS Business School Hugues Bouthinon-Dumas is an Associate Professor in the Public and Private Policy Department at ESSEC Business School. by Hugues Bouthinon-Dumas , 04.12.20 Source : Knowledge Lab Essec
- Latest news (Cyber risks) - Feyz International
Why cyber risk assessments should be a part of your business strategy Every day brings with it the news of yet another company falling victim to a cyberattack. The costs the affected businesses face are enormous: lost critical data, stolen assets and damaged reputations. But despite these very real threats, company leaders may resist committing the necessary resources to prevent them. After all, no one wants to pay for more than they need. This goes for cybersecurity as much as any other business expense. That’s why it’s vital for C-suites to include cybersecurity as part of their capital planning. And the key to that is determining what “just enough security” is for the organization to meet its business goals. What’s the best way to determine how much security is “just enough”? Most C-level executives are accustomed to making overall business decisions based on risk. An effective risk management program identifies true risks to the business and determines how to reduce those risks to an acceptable level. Including an acceptable level of cyber risks into the organizational risk management program makes cybersecurity a part of the overall business strategy. And the best way to do this is to undergo a cybersecurity-related risk assessment. This helps translate the costs of what it could take to prevent unacceptable levels of cybersecurity risks or to reduce them to an acceptable level. These costs can then be included in budgetary calculations and overall risk management plans. According to the SANS Institute , “the ability to perform risk management is crucial for organizations hoping to defend their systems. There are simply too many threats, too many potential vulnerabilities that could exist, and simply not enough resources to create an impregnable security infrastructure. Therefore every organization, whether they do so in an organized manner or not, will make priority decisions on how best to defend their valuable data assets. Risk management should be the foundational tool used to facilitate thoughtful and purposeful defense strategies.” Many frameworks and industry standards, such as those offered by the National Institute of Standards and Technology (NIST) and ISO, provide guidelines for conducting risk assessments and implementing controls (best practices) to mitigate or prevent security risks. In general, risk assessments help organizations determine their inherent security risks by doing the following: Identifying, estimating, and prioritizing risk to their operations. Determining the possible threats from bad actors that can compromise the confidentiality, integrity, or availability of the information they are processing, storing, or transmitting. Identifying what measures or controls are in place to protect the critical assets and what measures/controls are lacking. Following recommending preventive measures and investing in security upgrades to reduce high levels of risk. What does this mean? It depends on the type of business. Because as these examples show, not all risks are created equal. A bank storing and processing large amounts of financial data or a hospital maintaining extensive patient records would be very concerned with the confidentiality of their data and the damage to their customers and patients if hackers accessed or leaked it. A risk assessment could tell them that they need to prioritize their resources toward protecting the confidentiality of their data with privacy-related controls and other security measures. The risk assessment might also indicate that they are vulnerable to a ransomware attack, so they should implement a recovery plan and perform daily and weekly system backups. But the risk assessment may indicate there is less risk to the availability or integrity of their data, so they would not need to invest as much in these areas. Researchers developing intellectual property may be concerned both about outside actors wanting to steal their discoveries or insiders willing to sell them to competitors. The risk assessment might indicate that they are indeed vulnerable to such attacks. So they might prioritize increasing resources on instituting protective, access and monitoring best practices . They might also invest in awareness training to educate staff on recognizing phishing emails and other social media campaigns as well as internal threats. The risk assessment could suggest they have fewer risks to the confidentiality of this data, so they would not concentrate resources on protecting this area. Once company leaders have identified the critical assets they most want to protect, have an idea of what cyber threat might attack these assets and how vulnerable their assets are to an attack, and understand how severe such an attack would be to their ability to function, they can make informed decisions on how to target their resources toward addressing the risks with the most significant impact to their business. A risk assessment turns intangible concepts such as security, risk, and prevention into tangible realities with actual costs attached. Undetected/unprevented cyberattack equals financial ruin. And that’s an inevitability that every C-suite must face in today’s interconnected world. by Baan Alsinawi , 05.11.21 Source: www.securitymagazine.com
- Latest news (Venture capital securities) - Feyz International
The role of venture capital securities in entrepreneurship For entrepreneurs to flourish, they need funding: venture capital is financial capital provided to early-stage, high-potential, high-risk, growing entrepreneurial companies. Venture capital is particularly attractive for new companies with a limited operating history that are too small to raise capital in the public markets, and have not reached the point where they are able to secure a bank loan or complete a debt offering. In exchange for the high risk that venture capitalists (VCs) shoulder by investing in smaller and less mature companies, venture capitalists usually get a significant portion of the company's ownership (and consequently their value). Once a VC decides to invest in a venture, the involved parties need to settle on a deal structure. When negotiating the deal structure, parties need to keep a few considerations in mind: The deal structure needs to protect the VC against losses and should encourage entrepreneurs to work hard to make the venture a success. Most VC investments are illiquid, which means that unlike shares of listed companies, they cannot be sold very easily. Finally, most investments are characterized by asymmetric information. In general, the entrepreneur knows more about the venture than the investor. VCs typically use convertible preferred equity to finance ventures. As the name suggests there are two important features of these securities: conversion and preferred. Investors of convertible preferred equity have the option of either holding a debt-like claim -preferred equity or converting into common equity. Converting into common equity implies sharing ownership in the venture with the entrepreneur. Preferred terms make it similar to a loan (debt), gives holders a right to interest payment (dividends) and additionally gives preference in payments over common equity. In other words, the preferred feature ensures that preferred investors are paid before common equity holders. In a typical deal, VCs would hold preferred equity and the entrepreneur common equity, thus the VC can get paid before the entrepreneur if the venture does not do well. However, if the venture succeeds and its value increases, the VC would convert the preferred equity into common equity and share the fruits of this success with the entrepreneur. AAnother feature of VC investments is that they are done in stages. VCs would never provide all the capital upfront to a venture; instead, they would only provide sufficient capital to reach the next milestone. Once the capital has been used up, the entrepreneur has to raise another round of financing to reach the next milestone. The advantage of staging is that VCs can stop financing if the venture is not doing well. It can also be advantageous for the entrepreneur, as the terms can be made more favorable to them if their venture is successful. Staging also helps reconcile the aforementioned asymmetric information levels between entrepreneurs and VCs, since future investments are only made based on past outcomes. Finally, in addition to providing capital, VCs also monitor and guide the venture. The structure of most deals is designed to ensure the monitoring role of VCs. While VCs do not hold the majority of shares, they would have the right to nominate members to the board of directors. These rights help the VC monitor progress and guide the venture and gives them the power to replace managers if operations are not going smoothly. Having discussed the general features of VC investments, we will now explore details of some specific securities used in VC contracting. It must be noted that convertible preferred securities come in various flavors. Dr. Arcot analyzes one such security called participating convertible preferred security (PCP), used widely in venture capital contracts (Arcot, 2014). Participating convertible preferred stock gives its holders the right to be paid first (before common shareholders generally held by the entrepreneurs) and at the same time, allows them to participate in excess earnings (i.e., the cash flow after all debt and preferred claims have been satisfied) along with the common stockholder. PCP holders thus concurrently hold both a debt-like claim (preferred equity) as well as an equity claim (participation rights). However, PCP holders lose their preferred rights if they convert this PCP stock into common stock. His research explores why venture capitalists are willing to convert their PCP stock into common equity and give up their preferred rights. He proposes a signaling model for PCP stock based on its role in venture capital exits. The two major forms of exits observed in venture capital are the initial public offerings (IPOs) and the trade sale. IPOs are exits where shares of the venture are sold to investors and then listed on the stock market and trade sale is a transaction in which a venture is sold to another company. Typically, a PCP stake is converted into common equity during an IPO exit, but is not converted in a trade sale exit. The model shows that VCs can signal the quality of their venture in an IPO by converting their PCP stake into common equity and giving up some of their cash flow rights. By giving up something during an IPO, VCs are signaling to investors that the venture is of a high quality. Signaling is of particular importance in an IPO, because in an IPO shares are sold to new investors who do not have access to documents to analyze the venture’s performance. Investors in an IPO typically have to rely on a bank to perform the due diligence and hence are thus relatively uninformed about the venture. In contrast, potential trade buyers are given access to documents, which they can analyze to reach conclusions about the venture’s quality. Since trade buyers typically come from the same industry as the venture, they are likely to have industry knowledge and are better equipped to interpret the information provided. When exit is through an IPO, the entrepreneur retains control of the firm. Thus, when the firm value is high, an IPO exit rewards the entrepreneur and should be the preferred exit route. However, the VC may be reluctant to take that route, given that investors in an IPO are less informed and the VC may not get the full value for his stake. When the firm value is high, the VCs may prefer to target investors who are more informed and get a higher value for their stake. In other words, exit through a trade sale. However, the interests of VCs and entrepreneurs are more easily aligned when the VCs convert their PCP stakes into common shares and exit through an IPO. Venture capitalists investing in start-ups use sophisticated financial instruments to structure their investments. This article provides a rationale for the use of one such instrument, PCP stock, based on the venture capitalist’s exit strategy. In doing so, it makes a connection between the exit route and entrepreneurial effort. This highlights factors that have direct implications for the incentives of venture capitalists to invest in ventures and entrepreneurs to exert effort to make them a success. by Sridhar Arcot , 04.01.22 Source: Knowledge Lab
- Terms of Use - Feyz International
Terms of Use Agreement to terms These Terms of Use constitute a legally binding agreement made between you, whether personally or on behalf of an entity (“you”) and Feyz International LLC (commercial name - Feyz International) ("Feyz International," “we," “us," or “our”), concerning your access to and use of the www.feyzinternational.com website as well as any other media form, media channel, mobile website or mobile application related, linked, or otherwise connected thereto (collectively, the “Site”). We are registered in France and have our registered office at 16 Allée du Puits, 92130, Issy-les-Moulineaux. SIREN number: 911672723. You agree that by accessing the Site, you have read, understood, and agreed to be bound by all of these Terms of Use. IF YOU DO NOT AGREE WITH ALL OF THESE TERMS OF USE, THEN YOU ARE EXPRESSLY PROHIBITED FROM USING THE SITE AND YOU MUST DISCONTINUE USE IMMEDIATELY. The information provided on the Site is not intended for distribution to or use by any person or entity in any jurisdiction or country where such distribution or use would be contrary to law or regulation or which would subject us to any registration requirement within such jurisdiction or country. Accordingly, those persons who choose to access the Site from other locations do so on their own initiative and are solely responsible for compliance with local laws, if and to the extent local laws are applicable. The Site is intended for users who are at least 13 years of age. All users who are minors in the jurisdiction in which they reside (generally under the age of 18) must have the permission of, and be directly supervised by, their parent or guardian to use the Site. If you are a minor, you must have your parent or guardian read and agree to these Terms of Use prior to you using the Site. Intellectuel property rights Unless otherwise indicated, the Site is our proprietary property and all source code, databases, functionality, software, website designs, audio, video, text, photographs, and graphics on the Site (collectively, the “Content”) and the trademarks, service marks, and logos contained therein (the “Marks”) are owned or controlled by us or licensed to us, and are protected by copyright and trademark laws and various other intellectual property rights and unfair competition laws of France and the EU, international copyright laws, and international conventions. The Content and the Marks are provided on the Site “AS IS” for your information and personal use only. Except as expressly provided in these Terms of Use, no part of the Site and no Content or Marks may be copied, reproduced, aggregated, republished, uploaded, posted, publicly displayed, encoded, translated, transmitted, distributed, sold, licensed, or otherwise exploited for any commercial purpose whatsoever, without our express prior written permission. User representations By using the Site, you represent and warrant that: (1) all registration information you submit will be true, accurate, current, and complete; (2) you will maintain the accuracy of such information and promptly update such registration information as necessary; (3) you have the legal capacity and you agree to comply with these Terms of Use; (4) you are not under the age of 13; (5) you are not a minor in the jurisdiction in which you reside, or if a minor, you have received parental permission to use the Site; (6) you will not access the Site through automated or non-human means, whether through a bot, script, or otherwise; (7) you will not use the Site for any illegal or unauthorized purpose; and (8) your use of the Site will not violate any applicable law or regulation. If you provide any information that is untrue, inaccurate, not current, or incomplete, we have the right to refuse any and all current or future use of the Site (or any portion thereof). Prohibited activities You may not access or use the Site for any purpose other than that for which we make the Site available. The Site may not be used in connection with any commercial endeavors except those that are specifically endorsed or approved by us. As a user of the Site, you agree not to: Systematically retrieve data or other content from the Site to create or compile, directly or indirectly, a collection, compilation, database, or directory without written permission from us. Trick, defraud, or mislead us and other users, especially in any attempt to learn sensitive account information such as user passwords. Circumvent, disable, or otherwise interfere with security-related features of the Site, including features that prevent or restrict the use or copying of any Content or enforce limitations on the use of the Site and/or the Content contained therein. Disparage, tarnish, or otherwise harm, in our opinion, us and/or the Site. Use any information obtained from the Site in order to harass, abuse, or harm another person. Make improper use of our support services or submit false reports of abuse or misconduct. Use the Site in a manner inconsistent with any applicable laws or regulations. Engage in unauthorized framing of or linking to the Site. Upload or transmit (or attempt to upload or to transmit) viruses, Trojan horses, or other material, including excessive use of capital letters and spamming (continuous posting of repetitive text), that interferes with any party’s uninterrupted use and enjoyment of the Site or modifies, impairs, disrupts, alters, or interferes with the use, features, functions, operation, or maintenance of the Site. Engage in any automated use of the system, such as using scripts to send comments or messages, or using any data mining, robots, or similar data gathering and extraction tools. Delete the copyright or other proprietary rights notice from any Content. Attempt to impersonate another user or person or use the username of another user. Upload or transmit (or attempt to upload or to transmit) any material that acts as a passive or active information collection or transmission mechanism, including without limitation, clear graphics interchange formats (“gifs”), 1×1 pixels, web bugs, cookies, or other similar devices (sometimes referred to as “spyware” or “passive collection mechanisms” or “pcms”). Interfere with, disrupt, or create an undue burden on the Site or the networks or services connected to the Site. Harass, annoy, intimidate, or threaten any of our employees or agents engaged in providing any portion of the Site to you. Attempt to bypass any measures of the Site designed to prevent or restrict access to the Site, or any portion of the Site. Copy or adapt the Site’s software, including but not limited to Flash, PHP, HTML, JavaScript, or other code. Except as permitted by applicable law, decipher, decompile, disassemble, or reverse engineer any of the software comprising or in any way making up a part of the Site. Except as may be the result of standard search engine or Internet browser usage, use, launch, develop, or distribute any automated system, including without limitation, any spider, robot, cheat utility, scraper, or offline reader that accesses the Site, or using or launching any unauthorized script or other software. Use a buying agent or purchasing agent to make purchases on the Site. Make any unauthorized use of the Site, including collecting usernames and/or email addresses of users by electronic or other means for the purpose of sending unsolicited email, or creating user accounts by automated means or under false pretenses. Use the Site as part of any effort to compete with us or otherwise use the Site and/or the Content for any revenue-generating endeavor or commercial enterprise. Use the Site to advertise or offer to sell goods and services. Sell or otherwise transfer your profile. Third-party website and content The Site may contain (or you may be sent via the Site) links to other websites ("Third-Party Websites") as well as articles, photographs, text, graphics, pictures, designs, music, sound, video, information, applications, software, and other content or items belonging to or originating from third parties ("Third-Party Content"). Such Third-Party Websites and Third-Party Content are not investigated, monitored, or checked for accuracy, appropriateness, or completeness by us, and we are not responsible for any Third-Party Websites accessed through the Site or any Third-Party Content posted on, available through, or installed from the Site, including the content, accuracy, offensiveness, opinions, reliability, privacy practices, or other policies of or contained in the Third-Party Websites or the Third-Party Content. Inclusion of, linking to, or permitting the use or installation of any Third-Party Websites or any Third-Party Content does not imply approval or endorsement thereof by us. If you decide to leave the Site and access the Third-Party Websites or to use or install any Third-Party Content, you do so at your own risk, and you should be aware these Terms of Use no longer govern. You should review the applicable terms and policies, including privacy and data gathering practices, of any website to which you navigate from the Site or relating to any applications you use or install from the Site. Any purchases you make through Third-Party Websites will be through other websites and from other companies, and we take no responsibility whatsoever in relation to such purchases which are exclusively between you and the applicable third party. You agree and acknowledge that we do not endorse the products or services offered on Third-Party Websites and you shall hold us harmless from any harm caused by your purchase of such products or services. Additionally, you shall hold us harmless from any losses sustained by you or harm caused to you relating to or resulting in any way from any Third-Party Content or any contact with Third-Party Websites. Site management We reserve the right, but not the obligation, to: (1) monitor the Site for violations of these Terms of Use; (2) take appropriate legal action against anyone who, in our sole discretion, violates the law or these Terms of Use, including without limitation, reporting such user to law enforcement authorities; (3) in our sole discretion and without limitation, refuse, restrict access to, limit the availability of, or disable (to the extent technologically feasible) any of your Contributions or any portion thereof; (4) in our sole discretion and without limitation, notice, or liability, to remove from the Site or otherwise disable all files and content that are excessive in size or are in any way burdensome to our systems; and (5) otherwise manage the Site in a manner designed to protect our rights and property and to facilitate the proper functioning of the Site. Privacy policy We care about data privacy and security. Please review our Privacy Policy . By using the Site, you agree to be bound by our Privacy Policy, which is incorporated into these Terms of Use. Please be advised the Site is hosted in Canada and the United States of America. If you access the Site from any other region of the world with laws or other requirements governing personal data collection, use, or disclosure that differ from applicable laws in Canada and the U.S., then through your continued use of the Site, you are transferring your data to Canada and the U.S., and you agree to have your data transferred to and processed in Canada and the U.S.. Further, we do not knowingly accept, request, or solicit information from children or knowingly market to children. Therefore, in accordance with the U.S. Children’s Online Privacy Protection Act, if we receive actual knowledge that anyone under the age of 13 has provided personal information to us without the requisite and verifiable parental consent, we will delete that information from the Site as quickly as is reasonably practical. Term and termination These Terms of Use shall remain in full force and effect while you use the Site. Without limiting any other provision of these terms of use, we reserve the right to, in our sole discretion and without notice or liability, deny access to and use of the site (including blocking certain ip addresses), to any person for any reason or for no reason, including without limitation for breach of any representation, warranty, or covenant contained in these terms of use or of any applicable law or regulation. We may terminate your use or participation in the site or delete your account and any content or information that you posted at any time, without warning, in our sole discretion. Modifications and interruptions We reserve the right to change, modify, or remove the contents of the Site at any time or for any reason at our sole discretion without notice. However, we have no obligation to update any information on our Site. We also reserve the right to modify or discontinue all or part of the Site without notice at any time. We will not be liable to you or any third party for any modification, price change, suspension, or discontinuance of the Site. We cannot guarantee the Site will be available at all times. We may experience hardware, software, or other problems or need to perform maintenance related to the Site, resulting in interruptions, delays, or errors. We reserve the right to change, revise, update, suspend, discontinue, or otherwise modify the Site at any time or for any reason without notice to you. You agree that we have no liability whatsoever for any loss, damage, or inconvenience caused by your inability to access or use the Site during any downtime or discontinuance of the Site. Nothing in these Terms of Use will be construed to obligate us to maintain and support the Site or to supply any corrections, updates, or releases in connection therewith. Governing law These conditions are governed by and interpreted following the laws of the French Republic, and the use of the United Nations Convention of Contracts for the International Sale of Goods is expressly excluded. If your habitual residence is in the EU, and you are a consumer, you additionally possess the protection provided to you by obligatory provisions of the law of your country of residence. Feyz International LLC and yourself both agree to submit to the non-exclusive jurisdiction of the courts of Nanterre, which means that you may make a claim to defend your consumer protection rights in regards to these Terms of Use in France, or in the EU country in which you reside. Dispute resolution Binding Arbitration Any dispute arising from the relationships between the parties to this contract shall be determined by one arbitrator who will be chosen in accordance with the Arbitration and Internal Rules of the European Court of Arbitration being part of the European Centre of Arbitration having its seat in Strasbourg, and which are in force at the time the application for arbitration is filed, and of which adoption of this clause constitutes acceptance. The seat of arbitration shall be Paris, France. The language of the proceedings shall be French. Applicable rules of substantive law shall be the law of France. Restrictions The Parties agree that any arbitration shall be limited to the Dispute between the Parties individually. To the full extent permitted by law, (a) no arbitration shall be joined with any other proceeding; (b) there is no right or authority for any Dispute to be arbitrated on a class-action basis or to utilize class action procedures; and (c) there is no right or authority for any Dispute to be brought in a purported representative capacity on behalf of the general public or any other persons. Exceptions to Arbitration The Parties agree that the following Disputes are not subject to the above provisions concerning binding arbitration: (a) any Disputes seeking to enforce or protect, or concerning the validity of, any of the intellectual property rights of a Party; (b) any Dispute related to, or arising from, allegations of theft, piracy, invasion of privacy, or unauthorized use; and (c) any claim for injunctive relief. If this provision is found to be illegal or unenforceable, then neither Party will elect to arbitrate any Dispute falling within that portion of this provision found to be illegal or unenforceable and such Dispute shall be decided by a court of competent jurisdiction within the courts listed for jurisdiction above, and the Parties agree to submit to the personal jurisdiction of that court. Corrections There may be information on the Site that contains typographical errors, inaccuracies, or omissions, including descriptions, pricing, availability, and various other information. We reserve the right to correct any errors, inaccuracies, or omissions and to change or update the information on the Site at any time, without prior notice. Disclaimer The site is provided on an as-is and as-available basis. You agree that your use of the site and our services will be at your sole risk. To the fullest extent permitted by law, we disclaim all warranties, express or implied, in connection with the site and your use thereof, including, without limitation, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. We make no warranties or representations about the accuracy or completeness of the site’s content or the content of any websites linked to the site and we will assume no liability or responsibility for any (1) errors, mistakes, or inaccuracies of content and materials, (2) personal injury or property damage, of any nature whatsoever, resulting from your access to and use of the site, (3) any unauthorized access to or use of our secure servers and/or any and all personal information and/or financial information stored therein, (4) any interruption or cessation of transmission to or from the site, (5) any bugs, viruses, trojan horses, or the like which may be transmitted to or through the site by any third party, and/or (6) any errors or omissions in any content and materials or for any loss or damage of any kind incurred as a result of the use of any content posted, transmitted, or otherwise made available via the site. We do not warrant, endorse, guarantee, or assume responsibility for any product or service advertised or offered by a third party through the site, any hyperlinked website, or any website or mobile application featured in any banner or other advertising, and we will not be a party to or in any way be responsible for monitoring any transaction between you and any third-party providers of products or services. As with the purchase of a product or service through any medium or in any environment, you should use your best judgment and exercise caution where appropriate. Limitations of liability In no event will we or our directors, employees, or agents be liable to you or any third party for any direct, indirect, consequential, exemplary, incidental, special, or punitive damages, including lost profit, lost revenue, loss of data, or other damages arising from your use of the site, even if we have been advised of the possibility of such damages. Notwithstanding anything to the contrary contained herein, our liability to you for any cause whatsoever and regardless of the form of the action, will at all times be limited to $100.00 usd. Certain us state laws and international laws do not allow limitations on implied warranties or the exclusion or limitation of certain damages. If these laws apply to you, some or all of the above disclaimers or limitations may not apply to you, and you may have additional rights. Indemnification You agree to defend, indemnify, and hold us harmless, including our subsidiaries, affiliates, and all of our respective officers, agents, partners, and employees, from and against any loss, damage, liability, claim, or demand, including reasonable attorneys’ fees and expenses, made by any third party due to or arising out of: (1) use of the Site; (2) breach of these Terms of Use; (3) any breach of your representations and warranties set forth in these Terms of Use; (4) your violation of the rights of a third party, including but not limited to intellectual property rights; or (5) any overt harmful act toward any other user of the Site with whom you connected via the Site. Notwithstanding the foregoing, we reserve the right, at your expense, to assume the exclusive defense and control of any matter for which you are required to indemnify us, and you agree to cooperate, at your expense, with our defense of such claims. We will use reasonable efforts to notify you of any such claim, action, or proceeding which is subject to this indemnification upon becoming aware of it. User data We will maintain certain data that you transmit to the Site for the purpose of managing the performance of the Site, as well as data relating to your use of the Site. Although we perform regular routine backups of data, you are solely responsible for all data that you transmit or that relates to any activity you have undertaken using the Site. You agree that we shall have no liability to you for any loss or corruption of any such data, and you hereby waive any right of action against us arising from any such loss or corruption of such data. Electronic communications, transactions, and signatures Visiting the Site, sending us emails, and completing online forms (including event registration forms) constitute electronic communications. You consent to receive electronic communications, and you agree that all agreements, notices, disclosures, and other communications we provide to you electronically, via email and on the Site, satisfy any legal requirement that such communication be in writing. You hereby agree to the use of electronic signatures, contracts, orders, and other records, and to electronic delivery of notices, policies, and records of transactions initiated or completed by us or via the site. You hereby waive any rights or requirements under any statutes, regulations, rules, ordinances, or other laws in any jurisdiction which require an original signature or delivery or retention of non-electronic records, or to payments or the granting of credits by any means other than electronic means. Miscellaneous These Terms of Use and any policies or operating rules posted by us on the Site or in respect to the Site constitute the entire agreement and understanding between you and us. Our failure to exercise or enforce any right or provision of these Terms of Use shall not operate as a waiver of such right or provision. These Terms of Use operate to the fullest extent permissible by law. We may assign any or all of our rights and obligations to others at any time. We shall not be responsible or liable for any loss, damage, delay, or failure to act caused by any cause beyond our reasonable control. If any provision or part of a provision of these Terms of Use is determined to be unlawful, void, or unenforceable, that provision or part of the provision is deemed severable from these Terms of Use and does not affect the validity and enforceability of any remaining provisions. There is no joint venture, partnership, employment or agency relationship created between you and us as a result of these Terms of Use or use of the Site. You agree that these Terms of Use will not be construed against us by virtue of having drafted them. You hereby waive any and all defenses you may have based on the electronic form of these Terms of Use and the lack of signing by the parties hereto to execute these Terms of Use. Contact us In order to resolve a complaint regarding the Site or to receive further information regarding use of the Site, please contact us at: Feyz International LLC 16 Allée du Puits 92130, Issy-les-Moulineaux France Phone: +33 7 57 83 83 33 data-protection @feyzinternational.com This document was last updated on November 29, 2024
- Article (EU Sustainable growth regulations) - Feyz International
EU SUSTAINABLE GROWTH REGULATIONS: THE CHALLENGES OF TRANSPARENCY, COMPARABILITY, AND LEADERSHIP With the European Green Deal of December 2019 supporting long-term signals to support green investments, and the proposed European Climate Law as a framework for achieving climate neutrality, low-carbon transition has recently featured prominently in European Union (EU) policy. “Greenwashing” (pretended concern about the environment) and false advertising in the marketing of supposedly “green” products tend to undermine this objective, and these phenomena have therefore come under scrutiny. In particular, the European Commission has adopted an Action Plan on Financing Sustainable Growth, which aims at reorienting capital flows towards sustainable investment, and fostering transparency and long-termism. The Action Plan has engendered three Regulations – “Disclosure”, “Benchmark”, and “Taxonomy” – between 2019 and 2021. The new legal framework represents a worthwhile beginning, but it is not yet fully mature. The Disclosure Regulation, the Communication from the Commission on Reporting Climate-Related Information, and soft law principles targeting green bonds specifically, have together updated the 2014 requirements on non-financial information. They have increased transparency at almost all levels in the financial value-chain: issuers, investment funds, pension funds, and hedge funds, financial advisors, asset managers (all recognized as “financial market participants” in the Regulation) and rating agencies. In addition, in order to facilitate investors’ access to data, the Commission has announced in its Capital Markets Union New Action Plan the establishment of a European Single Access Point for financial and non-financial information publicly disclosed by companies. The low-carbon Benchmark Regulation sets out the requirements for “EU Climate Transition Benchmarks” and “EU Paris-aligned Benchmarks”, while the Taxonomy Regulation establishes a unified EU classification system to label economic activity as environmentally sustainable. The Taxonomy Regulation makes clear which economic activities contribute most to meeting the EU’s environmental objectives, and thereby guides – or nudges – investors towards “green” investments (on the model of energy consumption labelling, and its colour-gradient). Under Article 8(1) of the Taxonomy Regulation, certain large undertakings that were previously required to publish non-financial information pursuant to the Non-Financial Reporting Directive, are now required to disclose information to the public on how and to what extent their activities are associated with environmentally sustainable economic activities. SMEs and non-EU companies can of course decide to disclose information on a voluntary basis for the purpose of getting access to sustainable financing or for other business-related reasons. By December 31st, 2021, the Commission will report on how to label “brown” activities that significantly harm environmental sustainability, as well as activities that have low impact. The EU’s green finance taxonomy is, in other words, directed at avoiding greenwashing by establishing criteria for activities and financial instruments that claim to be environmentally sustainable or to contribute to a social objective. This legal framework lays some groundwork for comparisons and sound decision-making on behalf of investors. However, more needs to be done in terms of standardising what is reported. In practice, the way environmental information reaches capital markets remains a sticking point. Labels, indices, and principles drawn up by various uncoordinated for-profit and nonprofit organizations have multiplied, creating complexity and confusion for companies and investors. Yet, as stressed by Robert Eccles, nonfinancial information that is of the same rigor and relevance as financial information, and that is also subject to the same degree of auditability, is indispensable for capital markets to operate sustainably. Standards for nonfinancial information for companies’ environmental (as well as social, and governance) performance are important: like accounting standards, they are accepted simplified constructs to represent a company’s performance. Though imperfect (and evolving), standards enable comparability (without preventing additional information to be provided) and only fulfil their role in practice if they are mandatory. The European Financial Reporting Advisory Group’s Project Task Force issued its final report to prepare for “the elaboration of possible EU non-financial reporting standards in a revised EU Non-Financial Reporting Directive”. The European Union plans to announce its standards in April 2022. However, because the economy is global, what is really needed are standards that are also global, in addition to being independent and rigorous. The EU has shown an interest in building up an international forum: with seven countries representing 55 % of the world’s greenhouse gas emissions and half of the world’s population and GDP, the EU launched the International Platform on Sustainable Finance (IPSF). Although the IPSF is not a standard-setting body, its work is aimed at preparing the ground for the international standard setters to develop globally applicable sustainable finance standards. As noted in the first IPSF annual report, the absence of coherent definitions of green investments (taxonomies) at the global level, and the low degree of standardisation of reporting, represent a limit to green and sustainable finance worldwide. Around the world, several countries have drawn up roadmaps for sustainable finance; various public and private bodies have also introduced frameworks to enhance standardisation. However, these uncoordinated initiatives tend to reflect local priorities and stages of market development and: they cause fragmentation. The need to overcome this situation is also recognized in the EU-US agenda for global change announced a few weeks after the election of Joe Biden. The transatlantic initiative contemplates jointly designing a global regulatory framework for sustainable finance, based on the experience of the EU taxonomy. This illustrates the leading role that Europe is in a position to play as other major economies start to prioritize a coordinated response to climate change. There is obviously a risk that collective action fails and that each entity insists on imposing its own standards rather than working towards global ones. In particular, there is a risk that the EU decides that because it can mandate standards, it should do so. Unless these are endorsed by market forces, such standards might trigger a mere compliance exercise, with little benefit to companies, investors and society as a whole. If, however, the EU recognizes that it could be at the forefront of an international effort to help global standards emerge, it will be able to foster joint work with other bodies, such as the Impact Management Project, which has engaged in an effort to reconcile the various sets of existing standards, the World Economic Forum International Business Council , which can harness commitment from the corporate community, and the Sustainability Standards Board established in September 2020 to sit alongside the International Accounting Standards Board and engage in a similar role establishing international reporting standards. Were the EU to take on the role of midwife, it could deliver to the world the standards for nonfinancial information that US and Asian companies will adopt. Meanwhile a race started since the SEC proposed in March 2022 rules regarding compulsory climate-related disclosures. by Geneviève Helleringer , 28.03.22 Source : Knowledge Lab Essec
- Istanbul IT Leadership Summit - Feyz International
Istanbul IT Leadership Summit IT and Data Executives Register Now! In-Person Event | January 12, 2023 Attending Companies Discover More Why Attend our Event? Exclusive Content – In-depth, trend-forward sessions – with tons of practical takeaways and ideas to keep you ahead in the IT space. Connections – Hundreds of seasoned IT decision makers, cyber security experts, strategists, risk managers, data heads, marketers, and more to mingle and connect with. Meet your customers, vendors, expert resources, friends and colleagues. Network with leading solution providers – As a delegate, you will experience cutting-edge technology from solution providers that can fulfil your business requirements. Showcase of Technology solutions - Gather practical perspectives from many real-world use cases shared by the market’s leading players, including early adopters and leaders from across the region. Key Topics Technology is part of our daily lives and even more so in our professional environment. The goal of this invitation-only event is to encourage discussions and dialogue on what it means to be a successful IT executive and to provide tools and strategies to assist current and emerging leaders. We urge our leaders to confidentially share their experiences and plans while hearing from inspirational and visionary speakers. We explore and share the main topics amongst which artificial intelligence, fintech, cybersecurity and the metaverse are the most popular. We encourage you to come and meet some of the biggest players when it comes to cloud computing, big data security, customer service and enterprise technology. Coming together will not only expand your networks and knowledge, you can meet the industry specialists and learn more about their expert services. Innovation & Emerging Technologies Cybersecurity, Data Protection & IT Risk Management Metaverse, Blockchain & Cryptocurrencies Leadership & Business Transformation AI, Data & Analytics Cloud, Infrastructure & Operations The Agenda The event's dynamic agenda will take you through a series of roundtable discussions, real-life use cases, and dedicated industry tracks, giving you a bird's eye view of the current market situation, the latest technological innovations and strategies for propelling your organization to meet the unique challenges of these unprecedented times. Our Upcoming Events
- Latest news (Cloud security) - Feyz International
Cybersecurity 2023: Cloud security is key issue for companies What challenges do companies currently face regarding security? What is their cybersecurity strategy for the future? And what role does digital sovereignty play in this? The results show that cloud security is the most important strategic security topic for 34% of companies in 2022 and 2023. Ranked second to fifth are secure backups/disaster recovery (20%), data security (19%), security awareness training (15%) and identity & access management (14%). Along with the strategic issues, there are also the top cybersecurity challenges faced by companies. Nearly two-thirds of respondents say their security landscapes have become more complex over the past twelve months. In addition, 69% expect complexity to increase further over the next twelve months. The top five security challenges for companies in Germany, Austria and Switzerland are security complexity (24%), data protection/privacy (21%), ransomware attacks (19%), cybersecurity skills shortage (18%) and security of networked environments (16%). Fifty-seven percent of respondents agree that they already have an urgent shortage of cybersecurity personnel or will have one in the coming year. Digital sovereignty is becoming more important The economic and political situation has made the issue of digital sovereignty more important for three out of four companies. For 26%, it is "much more important" with strategic implications, and for another 49%, it is at least "more important" with implications for day-to-day business. This also means that many companies see numerous benefits in digital sovereignty. For example, it helps respondents to shape their own transformation in a self-determined way, to strengthen the trust of customers and other stakeholders, and to promote collaboration with partners in increasingly digital ecosystems (60% each). The top 5 most common digital sovereignty challenges for companies are protecting and gaining visibility of data in clouds (31%), the cost of evaluating and adopting new technology (29%), expertise in dealing with cloud contracts and skilled employees to understand and implement individual digital sovereignty requirements (27%), the availability and cost of local compliance officers (25%), and dealing with competing requirements between regional and national jurisdictions (24%). Ransomware attacks are on the rise According to this study, 72% of companies in the German-speaking markets have been affected by ransomware. 40% have even seen an increase in cyberattacks over the past twelve months. Looking ahead, half of the respondents (50%) expect the number of attacks to increase even further. If a ransomware attack occurred, only 50% of companies were able to successfully defend against it. "To remain competitive and successfully develop their own business model, companies must respond to technological innovations and act with digital sovereignty," analyzes Frank Sauber, Global Head of Sales & Business Enablement, secunet Security Networks AG. "Besides self-determination and independence, this also means freedom of choice, for example in terms of providers, data protection or transparency. This gives companies more influence over what happens to their data and ultimately enables them to better protect themselves against cybercrime, sabotage or espionage. Companies are already complaining about the lack of skilled personnel and the complexity of the security landscape - this can only be mastered with independent partners and secure services. by Secunet, 12.07.2022 Source: Factiva