You have been temporarily restricted. Please be more thoughtful when adding content for your portfolio. Your portfolio and digital media kit and should be reflective of the professional image you wish to convey. Accounts may be temporarily restricted if we receive reports of spamming or if the system detects excessive entries.
Membership
Publish your original ideas on the Thinkers360 platform!
This feature is available for Pro and Pro-Plus Members Only.
Speaker Bureau functionality whereby individuals can be featured speakers within our Speaker Bureau service and enterprises can find and work with speakers.
This feature is available for Pro, Pro-Plus, Premium and Enterprise Members Only.
Highlight your featured products and services within our company directory for enhanced visibility to active B2B buyers worldwide. This feature is available for Pro, Pro Plus, Premium and Enterprise Members Only.
Contribute to the Thinkers360 Member Blog and have your thought leadership featured on our web site, newsletter and social channels. Reach our opt-in B2B thought leader community and influencer marketplace with over 100M followers on social media combined!
You’ve reached your daily limit for entering quotes. Please only add personally-authored content which is reflective of your digital media kit and thought leadership portfolio.
Thinkers360 Content Library
For full access to the Thinkers360 content library, please join ourContent Planor become a contributor by posting your own personally-authored content into the system viaAdd PublicationorImport Publication.
Dashboard
Unlock your personalized dashboard including metrics for your member blogs and press releases as well as all the features and benefits of our member plans!
Interested in getting your own thought leader profile? Get Started Today.
Johannes Drooghaag
Founder & CEO at Spearhead Management
Königswinter, Germany
Dr. ir Johannes Drooghaag is an experienced international Executive, Coach, Speaker, Consultant and Social Media Strategist. Main focus on the Human Factor in Cyber Security, Leadership, Artificial Intelligence, and Blockchain and other technology, bringing the Digital Transformation to live with a strong background in process optimization, Design Thinking, Lean and Agile Business Management.
"If you can't describe what you are doing as a process, you don't know what you are doing"
Available For: Authoring, Consulting, Influencing, Speaking Travels From: Germany Speaking Topics: Cyber Security, Emotional Competence, Agile Business Management
Johannes Drooghaag
Points
Academic
10
Author
64
Influencer
92
Speaker
65
Entrepreneur
40
Total
271
Points based upon Thinkers360 patent-pending algorithm.
ReVista — Ressourcen- und verfügbarkeitsorientierte Instandhaltungsstrategien
WZL
March 03, 2013
In den meisten Unternehmen sind die realen Energie- und Stoffströme sowie deren Zuordnung zu den Verursachern nicht bekannt. Das Projekt ReVista widmet sich deshalb der Entwicklung einer ganzheitlichen, ressourcen- und verfügbarkeitsorientierten Instandhaltungsstrategie, die eine material- und energieeffiziente Produktion ermöglicht und eine bedarfsgerechte Verfügbarkeit im Betrieb sicherstellt. Dazu wird ein Expertensystem („lernende Sensorik“) zur Analyse des Abnutzungsverhaltens in Abhängigkeit der Prozessparameter entwickelt. Dieses System soll Prognosen zur Ausfallwahrscheinlichkeit verbessern und somit die Nutzungsdauer der Bauteile verlängern. Weiterhin wird der Ressourcenverbrauch der Anlagen und ihrer Nebenaggregate in Abhängigkeit des Werkzeugverschleißes und der Prozessparameter untersucht und in einer „Betriebspunktdatenbank“ zusammengeführt. So können die Energiebedarfe prognostiziert und energieeffiziente Betriebspunkte eingestellt werden. Das Softwareinstrument „ReVista-Cockpit“ verarbeitet diese Informationen, so dass die Instandhaltungsstrategie und deren Abstimmung mit der Produktion bewertbar werden. Die Methode zur ressourcenschonenden und verfügbarkeitsorientierten Produktions- und Instandhaltungsplanung ist ein weiteres wichtiges Projektergebnis. Die ReVista-Tools können in allen produzierenden Unternehmen zum Einsatz kommen.
Tags: Digital Transformation, Agile, Business Strategy
28 Article/Blogs
2 Types Of Commercial Equipment That Is Better To Rent Than Own
Johannes Drooghaag
March 17, 2021
For many large organizations, the need for heavy machinery is often necessary; this may be due to substantial orders coming in or even just large stock purchases now and again. This type of heavy machinery is extensively pricey, and many make the mistake of paying top dollar for engineering. The machinery is sitting and losing value as time goes by. Individuals have spotted the market gap and are trying to fill it by offering services such as equipment hire.
Did HSBC strike a deal about Huawei?
Johannes Drooghaag
March 05, 2021
Financial institutions are obligated to comply with a complicated set of national and international regulations, which determine far reaching responsibilities for these institutions and their leadership. At the top of the chain are the UN Instruments and Other Relevant International Standards on Money-Laundering and Terrorist Financing (AML/TF) which eliminates every attempt to claim “we didn’t …
Swedish crossroads and 5G
Johannes Drooghaag
March 01, 2021
I have a very special bond with Sweden and that is not just because my Grandmother was a strong and proud Swede. The kind and open-minded people, the vast coast, its countless rivers, and even more islands of Sweden remind me a lot of The Netherlands. There is something else we have in common. We call it Koffietijd and the Swedes call it Fika. It is not an activity, it is an emotion, a culture, somewhat of a ritual. The people are what Koffietijd and Fika is all about.
Women in Cyber Security
Import from wordpress feed
September 10, 2019
Are women better at Cyber Security than men? We don’t really know, do we? There are simply not enough women in the cyber security sector to be able to evaluate performance, and there are many reasons for that. What we do know is that there are plenty men in the industry who are doing a…R
Tags: Cybersecurity, Digital Transformation, Leadership
Back to the Future Cyber Security, a Manifesto
Import from wordpress feed
August 28, 2019
With the introduction of Industry 4.0 by the German Government and the designated workgroup, a roadmap was created to introduce Artificial Intelligence, Smart Controls, Smart Automation and Industrial Internet of Things (IIoT) in combination with Big Data into the manufacturing industries in Germa
Tags: Cybersecurity, Digital Transformation, Leadership
Age discrimination exposed!
Import from wordpress feed
July 24, 2019
Age discrimination is part of reality in most parts of the world and it has become a rapidly growing problem. Although we hardly speak about it, and read about it even less, there are very clear signals through society. Especially in the field of employment, age discrimination has become the hidden
Age discrimination is part of reality in most parts of the world and it has become a rapidly growing problem. Although we hardly speak about it, and read even less about it, there are very clear signals throughout our society. Especially in the field of employment, age discrimination has become the hidden challenge for everyone who joins the growing group of 50+ humans.
Tags: Business Strategy, Future of Work, Leadership
Global Ambassador Your Passport 2 Grow
Import from wordpress feed
July 01, 2019
As father of 2 smart and fast growing teens, I set myself a clear challenge. How can I support my children in becoming the best person they want to be? By this I don’t mean career goals or degrees, although these are of course important. I want my kids to be content with who they…Read Mo
Cyber Security developments and demand in the Nordics
Import from wordpress feed
May 21, 2019
Fredrik Olsson (NTT Security) Yeah we see them on all the time, and it’s changing and it goes quite quickly. And I would like to mention shipping and offshore business, especially shipping because we have a long journey with shipping business in the Nordics. It started off that actually we wer
Tags: Cybersecurity, Digital Transformation, Leadership
One person can have huge impact on an entire economy!
Import from wordpress feed
May 18, 2019
Neville Gaunt explains that one person can have a huge impact on an entire economy. Behavioral Waste begins between your ears! Interview with Neville Gaunt, Founder of Your Passport to Grow (YP2Grow) on PTV Home with Breakfast at Home host Tauseeq Haider on Behavioral Waste, Mind Fit, Can do and wha
TECHNOLOGY NEUTRALITY
Johannes Drooghaag
December 06, 2018
As follow up to SDG's and the Ethics of Technology, I ran a poll on Twitter to understand how my Social Media network thinks about the responsibility for the usage of technology. These are the results of that poll.
There are some interesting observations to be made from these results. Although there is no real majority for either of the options, the collective majority does believe that the creators and users of technology at least own the responsibility over the usage, either joined or individually. It is also interesting to see that the minority feels that governments and regulators carry this responsibility.
Tags: Digital Transformation, Sustainability, Agile
DISRUPTING BLOCKCHAIN
Johannes Drooghaag
November 30, 2018
In a lively discussion about blockchain and disruption, once again the question was raised “what will disrupt blockchain?”, and the answer to that question is as simple as it is straightforward. Blockchain itself will disrupt blockchain.
As carrier for disruption of many industries and applications, blockchain has become a catalyst for change and transformation. Although not yet in full scale implementation besides some successful crypto-currencies, the potential is clearly identified. Unleashing that potential into real-life and large-scale applications of blockchain based platforms will quickly turn the power of disruption on blockchain itself.
The prime USP’s of blockchain based technology are decentralization and encryption, creating a trustless environment with security-by-design. As soon as we take a closer look under the hood of this “new” technology, we quickly identify that there isn’t that much new technology involved. Analyzing the concept of decentralization beyond the label, it is true that there isn’t a central trust- or owner-body for the data involved but there are other levels of centralized control which make it significantly less decentralized as it appears. And then there is the matter of resources required to build and operate a blockchain based platform, especially when the scale goes beyond the miniature implementations we have seen so far!
Those are however all problems and challenges “underneath the hood” of the concept, and the evolution of blockchain and its technology will eventually solve these challenges. Nonetheless there is a much bigger challenge to be addressed, and experts recognize that there might not be a short term solution: legislation and compliance.
SDG’S AND THE ETHICS OF TECHNOLOGY
Johannes Drooghaag
September 28, 2018
In the series Star Trek: Voyager we find that the character Seven of Nine is a former Borg drone, who becomes disconnected from the Borg Collective, and faces the challenges of becoming a human individual again while still depending on Borg cybernetic implants. An important part of her survival and ability to deal with these foreign implants are the nanorobots that maintain them, along with other lifesaving functions.
Later on in the series, Seven of Nine learns to reprogram the nanorobots for specific functions, which in some instances, save the lives of other individuals. With her growing control over the nanorobots, Seven of Nine also learns to manipulate the process of replicating the nanorobots, allowing her to produce armies of designated nanorobots almost at will.
Tags: Cybersecurity, Digital Transformation, Sustainability
MARKETING ANECDOTES AND WHY THE CLOUD IS CALLED THE CLOUD
Johannes Drooghaag
July 24, 2018
There are some pretty cool anecdotes about great marketing campaigns which started with an unintended statement or misunderstanding. Some of these anecdotes might not reflect the actual events or are twisted a bit to make the story cooler but isn’t that what anecdotes are all about? These are my favorite marketing anecdotes and let’s start why the cloud is called the cloud!
CYBER SECURITY – COMMUNITY POLLS
Johannes Drooghaag
July 23, 2018
Experts inform us about the latest developments in the field of Cyber Security and where these developments might lead to, or not. Of course it is very interesting to follow these updates and opinions on the various channels but it is just as interesting to ask the community what they think is important Cyber Security wise. And what better platform to do so than using Twitter polls?
Tags: Cybersecurity, Digital Transformation, Risk Management
OPEN LETTER TO MR. KASPERSKY
Johannes Drooghaag
July 23, 2018
It is rare that a company and their products remain associated in a positive manner with its founder and Executive over many years. Once there was Peter Norton and his Norton Utilities but that glory passed by over time. Mr. Torvalds was once Mr. Linux and Linux was Linus Torvalds, and although he still is a leading voice in the industry, most of the current users don’t know who he is, so that recognition faded as well. Bill Gates was the front man of Microsoft for a long time and became more associates with the issues than with the successes.
A lasting positive association between company and person is of course Steve Jobs, who is forever associated with Apple as much as Apple will always be associated with Steve Jobs. And the same applies of course to Steve “The WOZ” Wozniak. There are of course more examples of very positive associations between founder and company but there are not that many. You belong to that very rare circle and anyone who looks at the history will acknowledge that it was hard work for you and your team. You and your company, your products, and your services are associated with each other for more than 2 decades now. In the community, you are for 20+ years the personification of fighting cyber crime.
RED TEAM AND THE IMPORTANCE OF CRITICAL THINKING
Johannes Drooghaag
July 06, 2018
Three decades ago, we had an ingenious solution to protect computer systems. Passwords were no longer needed, and that wasn’t even the most brilliant part of our solution. This ingenious solution would even eliminate the need to enter an user ID! Yes, we were brilliant and our solution was going to revolutionize the world forever! We found the golden egg, that huge pot of gold at the end of the rainbow. Parents were going to name their children after us. Nobel prize acceptance speeches had to be prepared. Fame and glory was coming our way!
Tags: Cybersecurity, Digital Transformation, Leadership
THE INTERNET OF KIDS
Johannes Drooghaag
June 09, 2018
After several years of explaining adults how to protect themselves when using the internet, I found myself searching for words to explain my own child the do’s and don’ts of internet safety. During our conversation I realized that my perspective and usage of internet basically has nothing in common with how children use the internet.
There are some interesting lessons when looking at computers, internet and other technology from the perspective of kids. A computer is just a window to another world, with games and videos. Internet is when Wi-Fi is enabled. Using a smartphone to call someone is strange, parents do that. Why wait for something when you can do so much on-demand, where and when you want it? Why would anyone want to read and write emails when there are so many other cool apps to chat?
Tags: Cybersecurity, Digital Transformation, Health and Safety
BEING PASSIONATE ABOUT #CYBERSECURITY!
Johannes Drooghaag
May 17, 2018
“Why are you so passionate about raising Cybersecurity awareness?” is a question I have been asked many times in the past years. Even while discussing a project proposal for something entirely different last week, the potential customer asked me this question. In most cases I decide to give a provocative question as reply just for the sake of trying to initiate a discussion. “Why aren’t you?”. On a good day, someone will reply that this is a good question and the discussion kicks in. On a bad day, someone will reply that the IT-Department is responsible for that…
In short, I have 3 reasons to be very passionate about Cybersecurity, awareness and education and these are not in order of priority:
In the past decades, I myself became the victim of various cybercrimes.
The false sense of security and lack of taking responsibility, users and suppliers alike, is a matter of mindset, not technology.
Kids should be able to use internet safe and should neither make the mistakes I made, nor should they suffer under not understanding.
CYBERSECURITY – USER AWARENESS AND EDUCATION IS CRITICAL
Johannes Drooghaag
May 03, 2018
Most companies have implemented some level of Cybersecurity, which in many cases focuses mainly on technology and restrictions. Educating users and even customers on Cybersecurity and related risks remains undervalued when it comes to creating and implementing a Cybersecurity policy. Education in the field of Cybersecurity is not so much about the technical ins-and-outs of technology. Education in Cybersecurity should mainly focus on explaining WHY Cybersecurity is so important and WHY each and every user can make a significant difference, good or bad!
Ask security professionals about the effectiveness of security awareness training, and you’re bound to get a wide range of answers. But regardless of the state of your company’s training program, keeping your employees educated about cybersecurity is an absolute must given the volatility and sophistication of today’s threat landscape
Tags: Cybersecurity, Digital Transformation, Leadership
INDUSTRY 4.0 – BUILDING SMART DIGITAL BRIDGES
Johannes Drooghaag
April 29, 2018
Modern production facilities are loaded with sensors, systems and smart controls, all providing tons of data on the process and results. The spread of Plant Floor Data Collection (PFDC), Process Condition Monitoring (PCM) and Manufacturing Execution Systems (MES) in modern manufacturing facilities keeps growing and with that, digitizing Manufacturing Processes continues to spread just as fast as it does in our society. As soon as more data becomes available, companies are faced with the common challenges, which unfortunately are not always reflected when designing the solutions. How can we benefit from the available data? How can we benefit from combining data? In other words, how can data be transformed into information.
INDUSTRY 4.0 – NOW WHAT?
Johannes Drooghaag
April 26, 2018
With the introduction of Industry 4.0 by the German Government and the designated workgroup, a roadmap was created to introduce Artificial Intelligence, Smart Controls, Smart Automation and Industrial Internet of Things (IIoT) in combination with Big Data into the manufacturing industries in Germany and beyond. The roadmap for Industry 4.0 focuses on introducing information and communication technology to combine the growing demand for individualized production and the benefits of the growing digitization of society and industry. In combination with the LEAN principle of flexibility over complexity, Industry 4.0 lays the foundation for flexible smart factories.
In reality, there is however a lot of manufacturing equipment out there that barely made it through the previous industrial revolution. Big and inflexible, build for mass production and still going strong, despite not being from this modern industrial age. Even companies that own hyper modern facilities, in many cases also own and operate equipment that was installed decades ago, and given the investments made in the past and the investments needed to replace them, have no intention of shutting these facilities down in the near future. With the gap between modern Industry 4.0 and aging Industry 2.0/3.0 equipment growing annually, many facilities operating aged equipment consider the benefits of modernization and Industry 4.0 as unrealistic. Or as one Plant Manager told me recently “These machines were build before you and I were born in a country that no longer exists, and still run stable without robots and internet. How could I improve anything with modern technology when all they have is panel with ON/OFF switches?”.
MIND OVER MATTER – THE CHALLENGES OF LEADING THE TRANSITION IN LEAN, AGILE, DESIGN THINKING
Johannes Drooghaag
March 06, 2018
A recent survey of 28 executives and leading managers shows that many organizations which have set out to benefit from the autonomous delivery and execution methods, like LEAN CI/PDCA, Agile and Design Thinking, are still struggling with creating the proper environment and culture, especially in the area of empowerment, but also in true implementation and execution of the principles which make these methods what they are: rapid go-to-market solutions based on autonomous exploring of opportunities and the most efficient execution. Proven small steps over designed complete packages. Efficient flexible work cells over rigid complex production lines. Many tested prototypes over a single tested end-product.
Organizations struggle at various levels with creating the right culture to let go of the classical models and systems, and that struggle in most cases starts at the top. There are still organizations with LEAN managers at local plant level, which continue to determine the LEAN projects and structures at centralized corporate level, instead of allowing the Small Group Activities and CI/PDCA process to maximize the benefits of the plants for the plants. There are organizations with Agile declarations which still have top-down roadmaps set at executive level with fixed scope and timeline, without enabling the responsible teams to explore benefits and best implementation. There even are organizations which proudly use Design Thinking in their internal and external communication, without even putting a single prototype out there.
MIND OVER MATTER – THE EMOTIONAL COMPETENCE OF TRANSITION TOWARDS AGILE BUSINESS MODELS AND AUTONOMOUS IMPLEMENTATION
Johannes Drooghaag
February 27, 2018
A major challenge when transitioning from the classical controlled project execution models to autonomous project execution like Agile, LEAN PDCA or Design Thinking, is to develop and maintain the proper mindset towards boundaries. The strength of these autonomous methods is the ability to provide rapid go-to-market results combined with continuous improvements based on findings and facts. The challenge during exploring the best business benefits is to objectively identify the real must-have and nice-to-have features and options, especially when the organization is undergoing the transition towards an agile business model.
In the classical controlled delivery and execution models, requirements are given and the main objective is to fulfill these requirements. Managing such project is mainly focused on timelines, budgets and delivery. The road towards completion might change slightly but the requirements are rigid. In an autonomous agile business model, the team is not working against rigid requirements and needs to explore the path towards optimal business benefits. This does however not mean that there are no boundaries to respect and explore.
Johannes Drooghaag Consulting
Johannes Drooghaag
January 01, 2013
° Executive ° Consultant ° Author ° Coach ° Speaker ° Social Media Strategist ° Brand and Product Ambassador °
My name is Johannes Drooghaag, but most people call me JD. I specialize in the organizational aspects of transition and change, by combining the Human Factor with the opportunities of technology. With almost 30 years of Executive experience combined with Military Leadership, and promotions in Applied Information Technology, Manufacturing, and Operations Management, I still learn every single day from the people I interact with.
From Emotional Competence Coach, to Agile Business Coach, from Change Leadership Champion to LEAN Manufacturing, and more, I have the experience to be able to filter the noise from the music. Together we will find the optimal mix that works for your organization, and I am already looking forward to learning from you at least as much as you will learn from me. In all those years of experience, I have made plenty of mistakes and learned more from those than from any formal education. I will share my mishaps and the lessons they taught me. Are you willing to share what you learned?
I am a people-person, and that is what I focus on. The right and the wrong we do is determined by our mindset and our attitude. We will never gain any benefit from technology and transformation when we approach it with the wrong mindset and attitude. Growing the right mindset to face the challenges ahead is what matters. You and your team have the potential within yourselves, and I will help you reach that potential to the fullest.
Tags: Cybersecurity, Digital Transformation, Marketing
The cybersecurity Power 100
Aghiath Chbib
September 11, 2019
Johannes ranked 6th on The cybersecurity Power 100 published by Aghiath Chbib https://www.rise.global/the-cybersecurity-power-100/p/6238729/r/2628160 via @Risedotglobal
Tags: Cybersecurity, Digital Transformation, Marketing
Top 1000 Tech Bloggers
Rise Social Media
September 11, 2019
Johannes ranked 4th on Top 1000 Tech Bloggers #tech_1k published by Rise Social Media https://www.rise.global/tech_1k/p/6238729/r/2628126 via @Risedotglobal
Tags: Cybersecurity, Digital Transformation, Leadership
The Blockchain Power 100
Rise Global Media
September 11, 2019
Johannes ranked 10th on The Blockchain Power 100 published by Aghiath Chbib https://www.rise.global/the-blockchain-power-9/p/6238729/r/2627900 via @Risedotglobal
Tags: Blockchain, Digital Transformation, Digital Disruption
The ArtificialIntelligence Power 100
Rise Global Media
September 11, 2019
Johannes ranked 8th on The ArtificialIntelligence Power 100 published by Aghiath Chbib https://www.rise.global/the-artificialintelligence-power-3/p/6238729/r/2627892 via @Risedotglobal
Tags: AI, Digital Transformation, Digital Disruption
6 Keynotes
Ethical Technology Development
Johannes Drooghaag
September 11, 2019
Ethical Technology Development - Will Artificial Intelligence be the next Manhattan project? It will if we don't start applying a framework of ethical standards around the evolving technology and it's community.
Tags: Cybersecurity, Digital Transformation, Agile
The devaluation of Privacy in the age of Social Media, Facial Recognition, Artificial Intelligence, Machine Learning, Digital Twins, Profiling, and Derived and Aggregated Data.
Johannes Drooghaag
September 11, 2019
The devaluation of Privacy in the age of Social Media, Facial Recognition, Artificial Intelligence, Machine Learning, Digital Twins, Profiling, and Derived and Aggregated Data.
Does GDPR apply to information generated by an algorithm?
Tags: Blockchain, Cybersecurity, Digital Transformation
Blockchain and Endpoint Security
Johannes Drooghaag
January 01, 2019
Blockchain and Endpoint Security - No need to hack blockchain itself when the endpoint devices are much easier to crack. Blockchain can work against you when your devices are exposed to hackers. This keynote is part of The Crypto Roadshow. Read all about The Crypto Roadshow and book your tickets for a great educational event on Cryptocurrencies and Blockchain!
Tags: Blockchain, Cybersecurity, Digital Transformation
Agile Business reality check
Johannes Drooghaag
January 01, 2019
Agile Business reality check - Agile itself is a good concept to achieve flexibility and true market obsession. The real transformation to become Agile is however (almost) always blocked by treating it as a way to do more-with-less by the development teams. Wake up, Execs. Agile is not another badge for the website, and will not solve resource restrictions or bad planning.
What keeps Johannes Drooghaag up at night?
Scott Schober
October 10, 2018
Johannes Drooghaag is CEO at Spearhead Management and owner of his own successful consultancy firm under his own name discusses his worst cybersecurity fears with Scott.
Johannes Drooghaag is an author, researcher, lecturer and speaker on Cyber Security, Artificial Intelligence, Blockchain, Industrial Automation, IoT and Startup Advisory Board Member and Brand Ambassador for various startups and corporations.
Recent publications by Johannes include a manifesto on protecting factories and infrastructure from cyber threats, an Internet safety for kids blog and an upcoming book entitled Cybersecurity for Road Warriors and Couch Potatoes.
Scott Schober is a #cybersecurity and wireless technology expert, author of Hacked Again, host of 2 Minute CyberSecurity Briefing video podcast and CEO of Berkeley Varitronics Systems who appears regularly on Bloomberg TV, Fox Business & Fox News, CGTN America, Canadian TV News, as well as CNN, CBS Morning Show, MSNBC, CNBC, The Blaze, WPIX as well as local and syndicated Radio including Sirius/XM & Bloomberg Radio and NPR.
Cybersecurity, AI, and Industry 4.0 With Johannes Drooghaag: #AskTheCEO Episode 68
Avrohom Gotheil Ask The CEO Media
September 03, 2018
Dr. Johannes Drooghaag is the CEO of Spearhead Management, in Germany. He is an accomplished speaker in the areas of Executive Leadership, Blockchain, Artificial Intelligence, Agile Business Management. He has authored many publications on areas of High-tech, such as Cybersecurity, as well as other business related topics.
Currently, he mentors executives and startups on areas of IT, Cybersecurity, Artificial Intelligence, Blockchain, Agile Business Management, Supply Chain, Executive Leadership, and Emotional Competence.
He earned a doctorate in Operations Management, Manufacturing, and Applied Information Technology, an Executive MBA in Executive Leadership, and an MBA in Manufacturing Supply Chain.
Tags: Cybersecurity, Digital Transformation, Innovation
5 Panels
CYBERSECURITYTALKS – PART 5
NTT Security
February 01, 2019
Traditional Security awareness seems to be a kind of burden and necessary evil. Online trainings were designed and rolled out but do not deliver expected changes in behavior. What should we do different? Or what works from your point of view? Incident Response plans are still quite weak and often not really tested in a real life scenario. How do you see IRP and handling?
Tags: Cybersecurity, Digital Transformation, Leadership
CYBERSECURITYTALKS – PART 4
NTT Security
January 31, 2019
Quite often I’m irritated by the AI hype for SOC services and the many tools claiming that they deliver best machine learning engines. From my point of view the AI tools are only part of a SOC strategy and AI is not the holy grail for Cybersecurity. As we say for years, AI needs learning and good data as a foundation for the intelligence. Does it really work? Do we need no people anymore? What is your experience with incident handling?
Tags: Cybersecurity, Digital Transformation, Leadership
CYBERSECURITYTALKS – PART 3
NTT Security
January 30, 2019
We see new technologies around the Blockchain arising in Fintech, new requirements for Open banking, Shipping industry becoming, connected cars, etc. world is changing. What does it mean for Cybersecurity strategies?
Tags: Cybersecurity, Digital Transformation, Leadership
CYBERSECURITYTALKS – PART 2
NTT Security
January 29, 2019
Our society is changing – we they connection everywhere and smart cities will change the way we live. But all changes that will benefit the good of the society will come with some risk, because we need connectivity, agility and data. So discussions around IoT, Cloud and Machine Intelligence are all round us. From your point of view is the biggest risk from a security point of view? What is limiting the digitization – on top of limited bandwidth due to missing 5G networks? What is your experience and recommendations with Cloud/IoT etc. implementations.
Tags: Cybersecurity, Digital Transformation, Smart Cities
CYBERSECURITYTALKS – PART 1
NTT Security
January 28, 2019
We see massive investment in Cybersecurity, new technologies get hyped but we still see massive exposure and breaches. Why has the Security industry not succeeded or do we fight at the wrong hill? GDPR was hot all last year – but where are we now? What was/Is the impact of GDPR for Cybersecurity reality?
Tags: Cybersecurity, Digital Transformation, Leadership
12 Videos
Internetsicherheit fuer Eltern von schlaue Kids
Johannes Drooghaag
September 19, 2019
Hallo, mein Name ist Johannes Drooghaag und ich bin Experte und Sprecher für Cybersicherheit.
Als Vater von 2 sehr intelligenten und neugierigen Kindern wurde ich selbst mit der Realität konfrontiert, dass meine Kinder das Internet nutzen und es gibt nicht viel, was ich tun kann oder tun möchte, um es zu vermeiden. Das Internet ist zu einem Teil unserer Gesellschaft geworden, und es ist wichtig, dass wir lernen, wie wir das Internet sicher genießen können. Und das gilt natürlich auch für unsere Kinder.
Dieses Programm wird von Eltern für Eltern und mit Unterstützung von Kindern für Kinder konzipiert. Bitte nehmen Sie sich die Zeit, dieses Video anzusehen und dann das Video für Kinder mit Ihren Kindern anzusehen.
Dies ist keine magische Lösung, aber es wird Ihnen und Ihren Kindern helfen, das Internet sicherer zu genießen. Für Feedback oder Fragen können Sie sich jederzeit an johannesdrooghaag.com wenden.
Sie können mich für Fragen, Feedback oder Informationen unter johannesdrooghaag.com kontaktieren.
Das Programm Internet Safety for Kids wurde in Zusammenarbeit mit Your Passport to Grow YP2Grow.com entwickelt.
Tags: Cybersecurity, Digital Transformation, Social
Internetsicherheit fuer schlaue Kids (und ihre Eltern)
Johannes Drooghaag
September 19, 2019
Dies ist Teil 2, für Kinder. Sie finding Teil 1 für Eltern hier: https://youtu.be/F2msBgnUqmA
Hallo, mein Name ist Johannes Drooghaag und ich bin Experte und Sprecher für Cybersicherheit.
Als Vater von 2 sehr intelligenten und neugierigen Kindern wurde ich selbst mit der Realität konfrontiert, dass meine Kinder das Internet nutzen und es gibt nicht viel, was ich tun kann oder tun möchte, um es zu vermeiden. Das Internet ist zu einem Teil unserer Gesellschaft geworden, und es ist wichtig, dass wir lernen, wie wir das Internet sicher genießen können. Und das gilt natürlich auch für unsere Kinder.
Dieses Programm wird von Eltern für Eltern und mit Unterstützung von Kindern für Kinder konzipiert. Bitte nehmen Sie sich die Zeit, dieses Video anzusehen und dann das Video für Kinder mit Ihren Kindern anzusehen.
Dies ist keine magische Lösung, aber es wird Ihnen und Ihren Kindern helfen, das Internet sicherer zu genießen. Für Feedback oder Fragen können Sie sich jederzeit an johannesdrooghaag.com wenden.
Sie können mich für Fragen, Feedback oder Informationen unter johannesdrooghaag.com kontaktieren.
Das Programm Internet Safety for Kids wurde in Zusammenarbeit mit Your Passport to Grow YP2Grow.com entwickelt.
Tags: Cybersecurity, Digital Transformation, Social
Internet Safety for Parents
Johannes Drooghaag
September 19, 2019
Hello, my name is Johannes Drooghaag and I am an expert and speaker on cyber security.
As a father of 2 very intelligent and curious children, I was confronted with the reality that my children use the Internet and there is not much I can or want to do to avoid it. The Internet has become a part of our society and it is important that we learn how to enjoy the Internet safely. And that goes for our children too, of course.
This program is designed by parents for parents and with the support of children for children. Please take the time to watch this video and then watch the children's video with your children.
This is not a magic solution, but it will help you and your children enjoy the Internet more safely. For feedback or questions you can always contact johannesdrooghaag.com.
The program Internet Safety for Kids was developed in cooperation with Your Passport to Grow YP2Grow.com.
Video production: Kaya Hoschek
Tags: Cybersecurity, Digital Transformation, Social
Internet Safety for Kids (and their parents)
Johannes Drooghaag
September 19, 2019
This is part 2 for kids. You can find part 1 for parents here: https://youtu.be/dGZc9VmVTbg
Hello, my name is Johannes Drooghaag and I am an expert and speaker on cyber security.
As a father of 2 very intelligent and curious children, I was confronted with the reality that my children use the Internet and there is not much I can or want to do to avoid it. The Internet has become a part of our society and it is important that we learn how to enjoy the Internet safely. And that goes for our children too, of course.
This program is designed by parents for parents and with the support of children for children. Please take the time to watch this video and then watch the children's video with your children.
This is not a magic solution, but it will help you and your children enjoy the Internet more safely. For feedback or questions you can always contact johannesdrooghaag.com.
The program Internet Safety for Kids was developed in cooperation with Your Passport to Grow YP2Grow.com.
Video production: Kaya Hoschek
Tags: Cybersecurity, Digital Transformation, Social
Internetveiligheid voor ouders
Johannes Drooghaag
September 19, 2019
Hallo, mijn naam is Johannes Drooghaag en ik ben een expert en spreker over cyberveiligheid.
Als vader van 2 zeer intelligente en nieuwsgierige kinderen werd ik geconfronteerd met de realiteit dat mijn kinderen het internet gebruiken en er is niet veel dat ik kan of wil doen om het te vermijden. Het internet is een onderdeel geworden van onze samenleving en het is belangrijk dat we leren hoe we veilig van het internet kunnen genieten. En dat geldt natuurlijk ook voor onze kinderen.
Dit programma is ontworpen door ouders voor ouders en met de steun van kinderen voor kinderen. Neem de tijd om deze video te bekijken en vervolgens de video voor de kinderen met uw kinderen te bekijken.
Dit is geen magische oplossing, maar het zal u en uw kinderen helpen om veiliger van het internet te genieten. Voor feedback of vragen kunt u altijd contact opnemen op johannesdrooghaag.com.
Het programma Internet Safety for Kids is ontwikkeld in samenwerking met Your Passport to Grow YP2Grow.com.
Tags: Cybersecurity, Digital Transformation, Social
Internetveiligheid voor Kids (en hun ouders)
Johannes Drooghaag
September 19, 2019
Dit is deel 2 voor de kids. Deel 1 voor de ouders is hier: https://youtu.be/n67hiYCiRQQ
Hallo, mijn naam is Johannes Drooghaag en ik ben een expert en spreker over cyberveiligheid.
Als vader van 2 zeer intelligente en nieuwsgierige kinderen werd ik geconfronteerd met de realiteit dat mijn kinderen het internet gebruiken en er is niet veel dat ik kan of wil doen om het te vermijden. Het internet is een onderdeel geworden van onze samenleving en het is belangrijk dat we leren hoe we veilig van het internet kunnen genieten. En dat geldt natuurlijk ook voor onze kinderen.
Dit programma is ontworpen door ouders voor ouders en met de steun van kinderen voor kinderen. Neem de tijd om deze video te bekijken en vervolgens de video voor de kinderen met uw kinderen te bekijken.
Dit is geen magische oplossing, maar het zal u en uw kinderen helpen om veiliger van het internet te genieten. Voor feedback of vragen kunt u altijd contact opnemen op johannesdrooghaag.com.
Het programma Internet Safety for Kids is ontwikkeld in samenwerking met Your Passport to Grow YP2Grow.com.
Tags: Blockchain, Cybersecurity, Digital Transformation
1 Visiting Lecturer
The devaluation of Privacy in the age of Social Media
Johannes Drooghaag
September 11, 2019
The devaluation of Privacy in the age of Social Media, Facial Recognition, Artificial Intelligence, Machine Learning, Digital Twins, Profiling, and Derived and Aggregated Data.
Does GDPR apply to information generated by an algorithm?
Location: Global Date Available:
October 01st, 2019 Fees: 1000
Submission Date:
October 01st, 2019 Service Type: Service Offered
Dr. Johannes Drooghaag delivers eye-opening keynotes, workshops and speeches on Cyber Security, Leadership, Sustainability, Agile Business Management and Privacy.
Join Thinkers360 for free! Are you a Reader/Writer, Thought Leader/Influencer (looking to increase your earnings), or an Enterprise User (looking to work with experts)?