Search in

New Course: Strategies in IT Service Management Implementation

This two-day course enables participants to gain a quick appreciation of the fundamental concepts of IT Service Management based on the internationally recognised ITIL® (IT Infrastructure Library), and to learn how an organisation can effectively implement ITSM to improve IT to Business alignment and Service Quality.

The participants will appreciate the evolution of ITIL® and understand the full lifecycle of IT Service Management from Service Strategy to Design, Transition, Operation through to Continual Service Improvement. The inter-relationships of processes to services will be explained. Implementation approaches will be explored at both a strategic and tactical level. Pitfalls will be discussed as well as Service Management tools and techniques.

Click here for details.

New Course: Modern Cyber Security Technologies for Senior Managers

This course updates senior cyber security professionals in an urgent and compact manner on all key cyber security developments, e.g. how the landscape has changed very quickly and which would be the best solution to attack the many “hot” and pressing problems that the organisation is now facing. By making sense of new trends and attack incidents that often appear confusing, it creates Eureka moments to resolve conflicting requirements with urgent deadlines via a methodology that makes the complex easy to understand. More importantly, it explains how the implementation strategy could be quickly internalised, communicated and then converted into fast action. Its powerful narrations will highlight the new types of cyber security opportunities, exposing many such well kept secrets. Interestingly, many are with almost no cost. A key take-away will be its comprehensive coverage of all strategic transformations in the cyber security industry today, e.g. the need for automation, non-signature defences, the rise of cloud security and Docker containers, big data security, mobile security, new cryptography and new hardware like Intel’s security instruction sets and GPUs.

Programme Benefits
The course addresses continual learning and the shortfall in knowledge and experience regarding latest developments, as many busy executives have been struggling to keep up with new solutions and the high complexity of today’s digital revolution. Critically, it provides key insights and advice for practical and much needed problem solving, which will build up confidence for decision making. This will  protect the organisation from the menace of organised cyber crime and advanced state attackers, avoiding massive losses or even company closure when successfully attacked (no longer if, but just when). By providing guidance on the latest or pending future products, a large part of the cyber security expenditure will be saved or the money will be better spent. In addition, it helps the student to communicate the urgency required, not only when in crisis but also in everyday planning.

Click here for details.


Professor Alex Siow receiving award for outstanding leadership as the first President of the PMI Chapter from 2001 to 2012

Professor Alex Siow of the School of Computing, NUS, receiving an award from the Secretary-General of the NTUC and Minister in the Prime Minister's Office, Mr Chan Chun Sing, on the 10 Mar 2016 during the Regional Symposium of the PMI Singapore Chapter, for outstanding leadership as the first President of the PMI Chapter from 2001 to 2012.

Workshop: Embracing Big Data Applications – Transform or Become Obsolete! (29 April 2016)


What is the World’s largest hotel chain? Not Starwood or Hilton, but Airbnb, and they don’t even own any hotels. What is the world’s largest taxi company? It’s Uber, and they don’t own any taxis. What is the world’s largest phone company? Not Vodafone or China Mobile. It is WhatsApp and WeChat, and they don’t even own any telecommunication infrastructure.

The question for you is: What opportunities do my company have in this new wave of new technologies revolution? What are the threats? How can I still stay relevant?

Our lives are going through rapid changes in this digital age. Driverless cars, drone deliveries, e-Doctors and robotic housekeepers are just some of the more popular innovations. They no longer remain just in the imagination of creative writers. At the same time, the new technology data-rich companies such as Google, Facebook and Amazon continue to dominate the world, outperforming almost all traditional giants in the stock markets. Concurrently, brand names such as Kodak and Borders are rendered obsolete and are no longer in business.

Many senior leaders of traditional companies are under intense pressure to change. However, they are struggling with both the direction and strategies. The technologies, business models, operations, as well as the go-to market strategies are no longer the same as what they had used to leverage and achieve success in the past.

We want to set you thinking in this 1-day workshop. We want to guide you on developing innovative ideas and strategies for your business that will keep you moving in this digital age.  


The workshop will cover the driving forces of the rapid changes in the digital age, especially on Big Data, mobility, and the Internet of Things (IOT). We will also cover the impacts of technologies on our lives and the traditional industries arising from these driving forces, address the risk of becoming irrelevant if unable to change and keep up, as well as the strategies and opportunities that can be used as anchorage for such transformation.

Upon completion of this workshop, participants will acquire the knowledge of today’s fast-changing environment, the skills needed to assess the impact of the new environment to their own businesses and to develop their transformation plans to capitalize on this massive change in the world.

Program Topics:

  • Module 1: Our Changing Lives and industries
  • Module 2: A Big Picture: Technologies and Trends Impacting Our Lives and the industries
  • Module 3: Harnessing Big Data – Big Data Applications
  • Module 4: Transforming a Traditional Business
  • Module 5: Capturing Opportunities in Big Data Revolution

Click here for details


New Course: Managing Innovations with Security

This course uniquely covers key concerns from cyber security or IT leaders when managing their new IT developments, operational risks and innovation challenges, striving to balance the need to move technology forward quickly but still requiring a strong dose of caution and the wisdom to avoid disastrous failures or expensive mistakes. It is a primer for difficult risk taking and agile execution, enriched with practical guidance and advice, encompassing a comprehensive set of both technical and non-technical issues. The content is solidly anchored on the sound principles of Security, Privacy and Resiliency by Design.

Programme Benefits
The course improves competitive capabilities via faster project execution and decision making. It identifies the key areas that require cultural and organisational transformation that will facilitate higher agility and stronger efficiency using lean methods and DevOps. As it offers an easy to follow methodology that will start the projects on a right path, by incorporating security designing as the core of strong system architecture, it reduces both project risks and costs. In gist, it facilitates smart procurement and shows how to maintain highly effective cyber defences without stoppages, despite fast changing technologies. Importantly, the course also shows how to fight off high level state-sponsored cyber attackers and criminals, as it focuses on how to build cyber defences comprehensively; hence getting organisation and senior managers ready for Smart Nation, as we face its impending pervasive computing and IoT roll-outs. This will be especially pertinent for those operating Critical Infrastructure.

Topics Covered:

  • Introduction to Innovation with Security
  • The new disruptions from Cloud, IoT , Fintech, Big Data and Mobile Systems
  • Driving and seeding corporate innovation and partnership
  • Risk taking as a science and as an art
  • Agile development and DevOps
  • Case studies based on past large projects
  • Technical examples: Hybrid Cloud, Big Data and real-time intelligence
  • Bring Your Our Device (BYOD) mobile system challenges
  • Maintaining and upgrading cyber defences as technology changes
  • Security by Design
  • Defeating advanced attacks
  • Critical infrastructure issues, including Privacy and Resiliency by design
  • Smart procurement
  • Human resource development & talent management
  • People issues of cyber security and Shadow IT
  • Security awareness user training, made easy

Click here for details.