ISO 27001:2022 vs ISO 27001:2013 What Changed from 2013?

The ISO 27001:2013 certification standard is the most commonly used framework to provide assurance of an organization’s information security management system. It has been updated by the ISO 27001:2022 standard, which took effect on April 1st, 2018. In this article, we will discuss what changed since 2013 and why it was important for organizations to undergo …

Data Science – Role vs Responsibility

As they say- Data Scientist is the Finest job of the 21st century. However, I must say that the interview process for Data Science is the messiest one of all time. One of the main reasons for not having a clear, concrete or streamlined interview process is the confusion around the job titles vs. responsibilities expected …

Aligning The Learning Strategies With Talent Needs And Business Goals

“Whatever function L&D do should align completely to the top management objectives, organizational goals & strategies, and only then will our function be successful!” In a world where information can be accessible within two to three clicks, it is easy to create plans that can sidetrack your organization from its actual goals. It is great to …

Why Does Training Need Assessment?

A Training need assessment identifies individual’s current level of competency, skill or knowledge one or more areas and compares that competency level to the required competency standard established for their position or the other positions within the organization. The difference between the current and required competencies can help determine training needs. So now the question is, …

L&D and Business Alignment

This space will help you to have a perspective, fundamentally things don’t change it’s all about business partnership. One thing that helps to get success in your business will be aligned to the business. The answer to the questions is – It is important to assess ourselves and find out if we really have a hold …

Data Science for Cyber Security- Opportunities vs. Challenges

The field of cybersecurity — both offensive and defensive security has come along a long way since the first computer virus called Creeper, created by Bob Thomas in 1971, that successfully disguised itself to move from one host to another within the intranet and leaving its trail on the hosts. The program was a research project, and it was not …