Why should electric utilities take a closer look at supply chain risk management?

Why should electric utilities take a closer look at supply chain risk management?

Three years ago, I managed the vendor evaluation process for a utility assessing wireless options for telecom connectivity to substations. The field was limited to two vendors and cybersecurity was an important topic we wanted to explore in more detail with each. One specific area we sought to understand was the process used to address any cybersecurity issues that might arise with the...

Read More
Fishing Analytics – Getting ‘Hooked’ on Python and Power BI

Fishing Analytics – Getting ‘Hooked’ on Python and Power BI

What’s more satisfying than finding a way to combine two of your passions? I asked myself this as I cranked out Python code to process online fish stocking records in a recent fishing analytics pet project. But let’s take a step back first. Our CEO Kevin McCarty was recently published in a Forbes magazine article discussing how tech nerds become successful commercial technologists.…

Read More
Azure SQL DW Identity Column Bugs

Azure SQL DW Identity Column Bugs

Those of you who are seasoned at implementing SQL Server have probably used the identity column feature. It is a great tool for generating surrogate keys in your tables without needing to include logic in your code. With any new feature, comes the good and the bad. The good news if you looking at Azure SQL Data Warehouse (SQL DW) for your next implementation is that Microsoft introduced...

Read More
When Design Thinking Meets Data Science

When Design Thinking Meets Data Science

In the world of big data and predictive analytics the standard approach for gathering and analyzing data follows the CRISP-DM approach. While the CRISP-DM model has been a good approach on which to structure many projects, it suffers from the same issues waterfall-style requirements gathering approaches to software design have suffered from, including: Longer time to understand the...

Read More
For Life Sciences Companies, GDPR is Now Law.  Have you made a ‘Good-Faith Effort’ to comply?

For Life Sciences Companies, GDPR is Now Law. Have you made a ‘Good-Faith Effort’ to comply?

The General Data Protection Regulation (GDPR) consolidates existing European state-based laws into a single set of requirements for the collection and processing of personal data of individuals within the European Economic Area. The GDPR took effect on May 25, 2018 and applies to companies established within and outside the EU that process personal data of EU-based individuals, including...

Read More
Is My Organization in Scope for GDPR?

Is My Organization in Scope for GDPR?

Starting May 25th, the EU’s General Data Protection Regulation (GDPR) is taking effect. Despite the looming start date, there are many organizations that are still unclear about the language of the regulation and why organizations in the US should be aware. A good starting point for understanding how GDPR may affect your organization is to determine if GDPR even applies, and if so, what is...

Read More
On My Mind: Cloud and Security

On My Mind: Cloud and Security

The market is at a pivotal point where use of cloud technologies has become the norm rather than the exception. With any new technology there is always an adoption curve. If your organization isn’t using cloud technologies you are likely behind the curve. For example, the Performance Services team at West Monroe has been converting the underlying tools we use to support clients to cloud...

Read More
Why Humans Matter Most When Designing Bots: UX Best Practices for Conversational Interface Design

Why Humans Matter Most When Designing Bots: UX Best Practices for Conversational Interface Design

Advanced digital capabilities in Artificial Intelligence (AI) and Natural Language Processing (NLP) will alter how people interact with data. The growing adoption of voice platforms like Amazon Alexa and Google Assistant, as well as messaging platforms like Facebook Messenger and Slack, means humans will interact increasingly more with technology through conversational interfaces (CI), rather...

Read More
Don’t Take the Bait: Phishing Attacks

Don’t Take the Bait: Phishing Attacks

Phishing is one of the most pervasive security threats today and it’s only getting worse Over the last few years, phishing attacks have continued to rise as attackers refine strategies, execute successful programs, and make money. Attackers are taking advantage of end users to steal credentials or get them to click on malicious links.…

Read More
Pre-emptive Cybersecurity: Spend a Little Now or Pay a Lot Later

Pre-emptive Cybersecurity: Spend a Little Now or Pay a Lot Later

Several news outlets are reporting recently that over the past month, the City of Atlanta has been struggling with a ransomware attack – specifically, an attack by SamSam ransomware, which encrypts data and holds decryption keys for a cryptocurrency ransom. The City of Atlanta opted not to pay the roughly $50,000 ransom and instead is expected to spend more than $2.5 million on recovery...

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons