Seven ways to fail your first consulting interview

Interviews are inherently challenging and stressful for candidates, and everyone makes mistakes during an interview. Avoiding these seven common mistakes does not guarantee that a candidate will not advance to the second interview at a consulting firm; however, candidates who commit multiple of these (particularly concurrently) won’t be asked back.

IAM market consolidation looms in 2017

Our fifteen-year legacy of organizations implementing the relevant regulatory standards and still suffering cyber security breaches has led forward-thinking organizations to focus on risk management rather than compliance for compliance’s sake.

Launch your own privileged insider attacks for under $1,500 USD

This article will examine the costs and budgetary considerations for a new bad actor, lacking global resources, to set up a single privileged identity theft campaign to be able to launch insider attacks. The costs shown will assume corporate targets in the greater Seattle metropolitan area. This article will also briefly examine countermeasures.

The good news is that it is still possible to become an evil villain for an initial investment of under $1,500 USD, despite rising labor costs.

@Pebble is Shutting Down. Can They Take Two-Factor Authentication for #Cybersecurity With Them?

However, the biggest utility for my Pebble was two-factor authentication from my bank. My bank has had a somewhat tortured Consumer Identity and Access Management rollout over the years. They initially had single-factor authentication – a username and password. They briefly flirted with pictures, until they realized the Internet has an insatiable love of cats. They then deployed Knowledge-Based Authentication, safe in the knowledge that no-one would post their first spouse’s name, the name of their elementary school, and their favorite band on Facebook. Thus, they reluctantly deployed SMS-based two-factor authentication.

The buyer’s guide for onsite vs. offsite professional services

Attitudes towards remote professional services engagements have changed as technologies have improved to encompass screen sharing, audio, and video. However, there is a persistent myth from the Marissa Mayer school of management theory that work can only happen when people are physically together. This article explores where many common types of professional services can be delivered.

Five lessons learned about paying consultants for Net Promoter Scores

Since our initial deployment of the Net Promoter Score (NPS) for variable compensation at my Professional Services Organization (PSO) two years ago, there are five lessons learned that are broadly applicable for other PSOs that are considering adding NPS to the mix. We chose to deploy NPS because consultants can strongly influence the outcome and benefit from the results. NPS measures whether or not your consultants are creating advocates or adversaries for your brand, which is critical to landing add-on sales at existing clients as well as new customers.

How communication lapses can destroy the reputation of a small professional services firm

A significant portion of new business for small professional services firms comes through referrals. How many times have you as an individual consultant or professional services manager let an email sit in your inbox for a day or two, from a frustrated client? Alternatively, chose to let their phone call ring through to voicemail rather than answering? Or they gave up in a convoluted IVR system that your operations manager recommended as a 'cost savings measure'? Moreover, what is the reputational risk to your business when that disaffected client becomes a 'Detractor' on the Net Promoter Score spectrum?