2 Types Of Commercial Equipment That Is Better To Rent Than Own
Johannes Drooghaag
March 17, 2021
For many large organizations, the need for heavy machinery is often necessary; this may be due to substantial orders coming in or even just large stock purchases now and again. This type of heavy machinery is extensively pricey, and many make the mistake of paying top dollar for engineering. The machinery is sitting and losing value as time goes by. Individuals have spotted the market gap and are trying to fill it by offering services such as equipment hire.
See publication
Tags: Innovation, Supply Chain
Did HSBC strike a deal about Huawei?
Johannes Drooghaag
March 05, 2021
Financial institutions are obligated to comply with a complicated set of national and international regulations, which determine far reaching responsibilities for these institutions and their leadership. At the top of the chain are the UN Instruments and Other Relevant International Standards on Money-Laundering and Terrorist Financing (AML/TF) which eliminates every attempt to claim “we didn’t …
See publication
Tags: Cybersecurity, Digital Transformation, IoT
Swedish crossroads and 5G
Johannes Drooghaag
March 01, 2021
I have a very special bond with Sweden and that is not just because my Grandmother was a strong and proud Swede. The kind and open-minded people, the vast coast, its countless rivers, and even more islands of Sweden remind me a lot of The Netherlands. There is something else we have in common. We call it Koffietijd and the Swedes call it Fika. It is not an activity, it is an emotion, a culture, somewhat of a ritual. The people are what Koffietijd and Fika is all about.
See publication
Tags: Cybersecurity, 5G
Women in Cyber Security
Import from wordpress feed
September 10, 2019
Are women better at Cyber Security than men? We don’t really know, do we? There are simply not enough women in the cyber security sector to be able to evaluate performance, and there are many reasons for that. What we do know is that there are plenty men in the industry who are doing a…R
See publication
Tags: Cybersecurity, Digital Transformation, Leadership
Back to the Future Cyber Security, a Manifesto
Import from wordpress feed
August 28, 2019
With the introduction of Industry 4.0 by the German Government and the designated workgroup, a roadmap was created to introduce Artificial Intelligence, Smart Controls, Smart Automation and Industrial Internet of Things (IIoT) in combination with Big Data into the manufacturing industries in Germa
See publication
Tags: Cybersecurity, Digital Transformation, IoT
Introducing Mind Fit for Cyber Security
Import from wordpress feed
August 25, 2019
See publication
Tags: Cybersecurity, Digital Transformation, Leadership
Age discrimination exposed!
Import from wordpress feed
July 24, 2019
Age discrimination is part of reality in most parts of the world and it has become a rapidly growing problem. Although we hardly speak about it, and read about it even less, there are very clear signals through society. Especially in the field of employment, age discrimination has become the hidden
See publication
Tags: Sustainability, Leadership
Age discrimination exposed
Medium
July 24, 2019
Age discrimination is part of reality in most parts of the world and it has become a rapidly growing problem. Although we hardly speak about it, and read even less about it, there are very clear signals throughout our society. Especially in the field of employment, age discrimination has become the hidden challenge for everyone who joins the growing group of 50+ humans.
See publication
Tags: Business Strategy, Future of Work, Leadership
Global Ambassador Your Passport 2 Grow
Import from wordpress feed
July 01, 2019
As father of 2 smart and fast growing teens, I set myself a clear challenge. How can I support my children in becoming the best person they want to be? By this I don’t mean career goals or degrees, although these are of course important. I want my kids to be content with who they…Read Mo
See publication
Tags: Leadership
Cyber Security developments and demand in the Nordics
Import from wordpress feed
May 21, 2019
Fredrik Olsson (NTT Security) Yeah we see them on all the time, and it’s changing and it goes quite quickly. And I would like to mention shipping and offshore business, especially shipping because we have a long journey with shipping business in the Nordics. It started off that actually we wer
See publication
Tags: Cybersecurity, Digital Transformation, Leadership
One person can have huge impact on an entire economy!
Import from wordpress feed
May 18, 2019
Neville Gaunt explains that one person can have a huge impact on an entire economy. Behavioral Waste begins between your ears! Interview with Neville Gaunt, Founder of Your Passport to Grow (YP2Grow) on PTV Home with Breakfast at Home host Tauseeq Haider on Behavioral Waste, Mind Fit, Can do and wha
See publication
Tags: Leadership, Agile
TECHNOLOGY NEUTRALITY
Johannes Drooghaag
December 06, 2018
As follow up to SDG's and the Ethics of Technology, I ran a poll on Twitter to understand how my Social Media network thinks about the responsibility for the usage of technology. These are the results of that poll.
There are some interesting observations to be made from these results. Although there is no real majority for either of the options, the collective majority does believe that the creators and users of technology at least own the responsibility over the usage, either joined or individually. It is also interesting to see that the minority feels that governments and regulators carry this responsibility.
See publication
Tags: Digital Transformation, Sustainability, Agile
DISRUPTING BLOCKCHAIN
Johannes Drooghaag
November 30, 2018
In a lively discussion about blockchain and disruption, once again the question was raised “what will disrupt blockchain?”, and the answer to that question is as simple as it is straightforward. Blockchain itself will disrupt blockchain.
As carrier for disruption of many industries and applications, blockchain has become a catalyst for change and transformation. Although not yet in full scale implementation besides some successful crypto-currencies, the potential is clearly identified. Unleashing that potential into real-life and large-scale applications of blockchain based platforms will quickly turn the power of disruption on blockchain itself.
The prime USP’s of blockchain based technology are decentralization and encryption, creating a trustless environment with security-by-design. As soon as we take a closer look under the hood of this “new” technology, we quickly identify that there isn’t that much new technology involved. Analyzing the concept of decentralization beyond the label, it is true that there isn’t a central trust- or owner-body for the data involved but there are other levels of centralized control which make it significantly less decentralized as it appears. And then there is the matter of resources required to build and operate a blockchain based platform, especially when the scale goes beyond the miniature implementations we have seen so far!
Those are however all problems and challenges “underneath the hood” of the concept, and the evolution of blockchain and its technology will eventually solve these challenges. Nonetheless there is a much bigger challenge to be addressed, and experts recognize that there might not be a short term solution: legislation and compliance.
See publication
Tags: Blockchain, Digital Transformation, Agile
SDG’S AND THE ETHICS OF TECHNOLOGY
Johannes Drooghaag
September 28, 2018
In the series Star Trek: Voyager we find that the character Seven of Nine is a former Borg drone, who becomes disconnected from the Borg Collective, and faces the challenges of becoming a human individual again while still depending on Borg cybernetic implants. An important part of her survival and ability to deal with these foreign implants are the nanorobots that maintain them, along with other lifesaving functions.
Later on in the series, Seven of Nine learns to reprogram the nanorobots for specific functions, which in some instances, save the lives of other individuals. With her growing control over the nanorobots, Seven of Nine also learns to manipulate the process of replicating the nanorobots, allowing her to produce armies of designated nanorobots almost at will.
See publication
Tags: Cybersecurity, Digital Transformation, Sustainability
MARKETING ANECDOTES AND WHY THE CLOUD IS CALLED THE CLOUD
Johannes Drooghaag
July 24, 2018
There are some pretty cool anecdotes about great marketing campaigns which started with an unintended statement or misunderstanding. Some of these anecdotes might not reflect the actual events or are twisted a bit to make the story cooler but isn’t that what anecdotes are all about? These are my favorite marketing anecdotes and let’s start why the cloud is called the cloud!
See publication
Tags: Cloud, Marketing
CYBER SECURITY – COMMUNITY POLLS
Johannes Drooghaag
July 23, 2018
Experts inform us about the latest developments in the field of Cyber Security and where these developments might lead to, or not. Of course it is very interesting to follow these updates and opinions on the various channels but it is just as interesting to ask the community what they think is important Cyber Security wise. And what better platform to do so than using Twitter polls?
See publication
Tags: Cybersecurity, Digital Transformation, Risk Management
OPEN LETTER TO MR. KASPERSKY
Johannes Drooghaag
July 23, 2018
It is rare that a company and their products remain associated in a positive manner with its founder and Executive over many years. Once there was Peter Norton and his Norton Utilities but that glory passed by over time. Mr. Torvalds was once Mr. Linux and Linux was Linus Torvalds, and although he still is a leading voice in the industry, most of the current users don’t know who he is, so that recognition faded as well. Bill Gates was the front man of Microsoft for a long time and became more associates with the issues than with the successes.
A lasting positive association between company and person is of course Steve Jobs, who is forever associated with Apple as much as Apple will always be associated with Steve Jobs. And the same applies of course to Steve “The WOZ” Wozniak. There are of course more examples of very positive associations between founder and company but there are not that many. You belong to that very rare circle and anyone who looks at the history will acknowledge that it was hard work for you and your team. You and your company, your products, and your services are associated with each other for more than 2 decades now. In the community, you are for 20+ years the personification of fighting cyber crime.
See publication
Tags: Cybersecurity
RED TEAM AND THE IMPORTANCE OF CRITICAL THINKING
Johannes Drooghaag
July 06, 2018
Three decades ago, we had an ingenious solution to protect computer systems. Passwords were no longer needed, and that wasn’t even the most brilliant part of our solution. This ingenious solution would even eliminate the need to enter an user ID! Yes, we were brilliant and our solution was going to revolutionize the world forever! We found the golden egg, that huge pot of gold at the end of the rainbow. Parents were going to name their children after us. Nobel prize acceptance speeches had to be prepared. Fame and glory was coming our way!
See publication
Tags: Cybersecurity, Digital Transformation, Leadership
THE INTERNET OF KIDS
Johannes Drooghaag
June 09, 2018
After several years of explaining adults how to protect themselves when using the internet, I found myself searching for words to explain my own child the do’s and don’ts of internet safety. During our conversation I realized that my perspective and usage of internet basically has nothing in common with how children use the internet.
There are some interesting lessons when looking at computers, internet and other technology from the perspective of kids. A computer is just a window to another world, with games and videos. Internet is when Wi-Fi is enabled. Using a smartphone to call someone is strange, parents do that. Why wait for something when you can do so much on-demand, where and when you want it? Why would anyone want to read and write emails when there are so many other cool apps to chat?
See publication
Tags: Cybersecurity, Digital Transformation, Health and Safety
BEING PASSIONATE ABOUT #CYBERSECURITY!
Johannes Drooghaag
May 17, 2018
“Why are you so passionate about raising Cybersecurity awareness?” is a question I have been asked many times in the past years. Even while discussing a project proposal for something entirely different last week, the potential customer asked me this question. In most cases I decide to give a provocative question as reply just for the sake of trying to initiate a discussion. “Why aren’t you?”. On a good day, someone will reply that this is a good question and the discussion kicks in. On a bad day, someone will reply that the IT-Department is responsible for that…
In short, I have 3 reasons to be very passionate about Cybersecurity, awareness and education and these are not in order of priority:
In the past decades, I myself became the victim of various cybercrimes.
The false sense of security and lack of taking responsibility, users and suppliers alike, is a matter of mindset, not technology.
Kids should be able to use internet safe and should neither make the mistakes I made, nor should they suffer under not understanding.
See publication
Tags: Cybersecurity, Digital Transformation
CYBERSECURITY – USER AWARENESS AND EDUCATION IS CRITICAL
Johannes Drooghaag
May 03, 2018
Most companies have implemented some level of Cybersecurity, which in many cases focuses mainly on technology and restrictions. Educating users and even customers on Cybersecurity and related risks remains undervalued when it comes to creating and implementing a Cybersecurity policy. Education in the field of Cybersecurity is not so much about the technical ins-and-outs of technology. Education in Cybersecurity should mainly focus on explaining WHY Cybersecurity is so important and WHY each and every user can make a significant difference, good or bad!
Ask security professionals about the effectiveness of security awareness training, and you’re bound to get a wide range of answers. But regardless of the state of your company’s training program, keeping your employees educated about cybersecurity is an absolute must given the volatility and sophistication of today’s threat landscape
See publication
Tags: Cybersecurity, Digital Transformation, Leadership
INDUSTRY 4.0 – BUILDING SMART DIGITAL BRIDGES
Johannes Drooghaag
April 29, 2018
Modern production facilities are loaded with sensors, systems and smart controls, all providing tons of data on the process and results. The spread of Plant Floor Data Collection (PFDC), Process Condition Monitoring (PCM) and Manufacturing Execution Systems (MES) in modern manufacturing facilities keeps growing and with that, digitizing Manufacturing Processes continues to spread just as fast as it does in our society. As soon as more data becomes available, companies are faced with the common challenges, which unfortunately are not always reflected when designing the solutions. How can we benefit from the available data? How can we benefit from combining data? In other words, how can data be transformed into information.
See publication
Tags: Digital Transformation, Innovation, Agile
INDUSTRY 4.0 – NOW WHAT?
Johannes Drooghaag
April 26, 2018
With the introduction of Industry 4.0 by the German Government and the designated workgroup, a roadmap was created to introduce Artificial Intelligence, Smart Controls, Smart Automation and Industrial Internet of Things (IIoT) in combination with Big Data into the manufacturing industries in Germany and beyond. The roadmap for Industry 4.0 focuses on introducing information and communication technology to combine the growing demand for individualized production and the benefits of the growing digitization of society and industry. In combination with the LEAN principle of flexibility over complexity, Industry 4.0 lays the foundation for flexible smart factories.
In reality, there is however a lot of manufacturing equipment out there that barely made it through the previous industrial revolution. Big and inflexible, build for mass production and still going strong, despite not being from this modern industrial age. Even companies that own hyper modern facilities, in many cases also own and operate equipment that was installed decades ago, and given the investments made in the past and the investments needed to replace them, have no intention of shutting these facilities down in the near future. With the gap between modern Industry 4.0 and aging Industry 2.0/3.0 equipment growing annually, many facilities operating aged equipment consider the benefits of modernization and Industry 4.0 as unrealistic. Or as one Plant Manager told me recently “These machines were build before you and I were born in a country that no longer exists, and still run stable without robots and internet. How could I improve anything with modern technology when all they have is panel with ON/OFF switches?”.
See publication
Tags: Digital Transformation, Innovation, Agile
MIND OVER MATTER – THE CHALLENGES OF LEADING THE TRANSITION IN LEAN, AGILE, DESIGN THINKING
Johannes Drooghaag
March 06, 2018
A recent survey of 28 executives and leading managers shows that many organizations which have set out to benefit from the autonomous delivery and execution methods, like LEAN CI/PDCA, Agile and Design Thinking, are still struggling with creating the proper environment and culture, especially in the area of empowerment, but also in true implementation and execution of the principles which make these methods what they are: rapid go-to-market solutions based on autonomous exploring of opportunities and the most efficient execution. Proven small steps over designed complete packages. Efficient flexible work cells over rigid complex production lines. Many tested prototypes over a single tested end-product.
Organizations struggle at various levels with creating the right culture to let go of the classical models and systems, and that struggle in most cases starts at the top. There are still organizations with LEAN managers at local plant level, which continue to determine the LEAN projects and structures at centralized corporate level, instead of allowing the Small Group Activities and CI/PDCA process to maximize the benefits of the plants for the plants. There are organizations with Agile declarations which still have top-down roadmaps set at executive level with fixed scope and timeline, without enabling the responsible teams to explore benefits and best implementation. There even are organizations which proudly use Design Thinking in their internal and external communication, without even putting a single prototype out there.
See publication
Tags: Digital Transformation, Leadership, Agile
MIND OVER MATTER – THE EMOTIONAL COMPETENCE OF TRANSITION TOWARDS AGILE BUSINESS MODELS AND AUTONOMOUS IMPLEMENTATION
Johannes Drooghaag
February 27, 2018
A major challenge when transitioning from the classical controlled project execution models to autonomous project execution like Agile, LEAN PDCA or Design Thinking, is to develop and maintain the proper mindset towards boundaries. The strength of these autonomous methods is the ability to provide rapid go-to-market results combined with continuous improvements based on findings and facts. The challenge during exploring the best business benefits is to objectively identify the real must-have and nice-to-have features and options, especially when the organization is undergoing the transition towards an agile business model.
In the classical controlled delivery and execution models, requirements are given and the main objective is to fulfill these requirements. Managing such project is mainly focused on timelines, budgets and delivery. The road towards completion might change slightly but the requirements are rigid. In an autonomous agile business model, the team is not working against rigid requirements and needs to explore the path towards optimal business benefits. This does however not mean that there are no boundaries to respect and explore.
See publication
Tags: Agile, Digital Disruption, Digital Transformation
AUTONOMOUS PROJECT EXECUTION – DEVELOP THE CULTURE TO DELIVER
Johannes Drooghaag
February 21, 2018
Companies large and small have discovered the benefits of autonomous project execution in combination with short go-to-market cycles as seen in Design Thinking, Scrum & Agile and the LEAN continuous improvement concept of PDCA. Dynamic teams of experts and developers are assigned objectives and within the scope of the project, they will explore and deliver the optimal solutions. Decisions are made by the team based on facts and findings, and the unknown is tested as early as possible. By breaking down the larger objectives in smaller stages, results can be battle-tested in the field much quicker and improvements find their way into operations long before the final products and processes are launched.
The involvement of experts, technicians and developers, but also for example sales specialists and marketing experts throughout the delivery cycles, require availability and involvement of these resources for the team, without which the project would be doomed to fail. The involvement of these resources provide such significant benefits that every organization should make sure that they are available. The continuous exchange and review of information and findings between the members of the team eliminate the dreaded “but that is not what the customer wanted” and the even worse “but that is what the specification says”. This involvement throughout the process also leads to natural knowledge transfer within the team and organization.
See publication
Tags: Agile, Digital Disruption, Digital Transformation
OPERATIONS MANAGEMENT – THE HIDDEN MACHINE IN COMMUNICATION AND COOPERATION
Johannes Drooghaag
August 29, 2015
There is a secret code to get the full attention of everyone in the areas of Production, LEAN, OPEX and even the Finance Department: “The Hidden Machine”. With the term Hidden Machine, we describe improvements in efficiency and effectiveness by which we can produce more with the same equipment and manpower. More output as if we had installed additional machines, hence the name Hidden Machine. Our efforts focus at first mainly on technical and logistical improvements, further along the path we modify for example production lines into flexible work-centers or optimize tact and capacity between processes. The many success stories from all the production facilities I visited all over the globe over the years are truly impressive and motivate to keep looking for the next Hidden Machine.
There is however a Hidden Machine which we are not paying enough attention to: the Hidden Machine in improving Communication & Cooperation (C&C). C&C between departments, between Managers, shifts, even operators, the entire organization. In short, inefficiency in Communication & Cooperation can, and in most cases does, cost us more than just a Hidden Machine. During my coaching and training sessions, I use the following practical example from my own experience to show the full impact and potential.
See publication
Tags: Leadership, Agile, Change Management
CHANGE MANAGEMENT
Johannes Drooghaag
January 23, 2013
A practical example I use in our Master Classes “Change Management”:
When asked by the Steering Committee to lead a project which had already accumulated 1 year delay and was 42% over it’s original budget of 5 million EURO, my first action was to understand what caused this project to go so far off track. 5-why on a large scale.
The repeating message from various sources was very clear: “Operations and especially the Operations Manager, is sabotaging the project. Not cooperating, not willing to accept the new project and making unrealistic demands and claims.”. The Director Technology added a very interesting detail: “10 years ago, when we installed the current systems, the same man was opposing that system and now he doesn’t want to replace it”. This might be someone simply opposing change, so this was the man to speak with, learn his motives and find an opening to move forward.
See publication
Tags: Leadership, Agile, Change Management
Internetsicherheit fuer Eltern von schlaue Kids
Johannes Drooghaag
September 19, 2019
Hallo, mein Name ist Johannes Drooghaag und ich bin Experte und Sprecher für Cybersicherheit.
Als Vater von 2 sehr intelligenten und neugierigen Kindern wurde ich selbst mit der Realität konfrontiert, dass meine Kinder das Internet nutzen und es gibt nicht viel, was ich tun kann oder tun möchte, um es zu vermeiden. Das Internet ist zu einem Teil unserer Gesellschaft geworden, und es ist wichtig, dass wir lernen, wie wir das Internet sicher genießen können. Und das gilt natürlich auch für unsere Kinder.
Dieses Programm wird von Eltern für Eltern und mit Unterstützung von Kindern für Kinder konzipiert. Bitte nehmen Sie sich die Zeit, dieses Video anzusehen und dann das Video für Kinder mit Ihren Kindern anzusehen.
Dies ist keine magische Lösung, aber es wird Ihnen und Ihren Kindern helfen, das Internet sicherer zu genießen. Für Feedback oder Fragen können Sie sich jederzeit an johannesdrooghaag.com wenden.
Sie können mich für Fragen, Feedback oder Informationen unter johannesdrooghaag.com kontaktieren.
Das Programm Internet Safety for Kids wurde in Zusammenarbeit mit Your Passport to Grow YP2Grow.com entwickelt.
Video production: Kaya Hoschek
Music: bensound.com
Vielen Dank!
Dr. ir Johannes Drooghaag
See publication
Tags: Cybersecurity, Digital Transformation, Social
Internetsicherheit fuer schlaue Kids (und ihre Eltern)
Johannes Drooghaag
September 19, 2019
Dies ist Teil 2, für Kinder. Sie finding Teil 1 für Eltern hier: https://youtu.be/F2msBgnUqmA
Hallo, mein Name ist Johannes Drooghaag und ich bin Experte und Sprecher für Cybersicherheit.
Als Vater von 2 sehr intelligenten und neugierigen Kindern wurde ich selbst mit der Realität konfrontiert, dass meine Kinder das Internet nutzen und es gibt nicht viel, was ich tun kann oder tun möchte, um es zu vermeiden. Das Internet ist zu einem Teil unserer Gesellschaft geworden, und es ist wichtig, dass wir lernen, wie wir das Internet sicher genießen können. Und das gilt natürlich auch für unsere Kinder.
Dieses Programm wird von Eltern für Eltern und mit Unterstützung von Kindern für Kinder konzipiert. Bitte nehmen Sie sich die Zeit, dieses Video anzusehen und dann das Video für Kinder mit Ihren Kindern anzusehen.
Dies ist keine magische Lösung, aber es wird Ihnen und Ihren Kindern helfen, das Internet sicherer zu genießen. Für Feedback oder Fragen können Sie sich jederzeit an johannesdrooghaag.com wenden.
Sie können mich für Fragen, Feedback oder Informationen unter johannesdrooghaag.com kontaktieren.
Das Programm Internet Safety for Kids wurde in Zusammenarbeit mit Your Passport to Grow YP2Grow.com entwickelt.
Video production: Kaya Hoschek
Music: bensound.com
Vielen Dank!
Dr. ir Johannes Drooghaag
See publication
Tags: Cybersecurity, Digital Transformation, Social
Internet Safety for Parents
Johannes Drooghaag
September 19, 2019
Hello, my name is Johannes Drooghaag and I am an expert and speaker on cyber security.
As a father of 2 very intelligent and curious children, I was confronted with the reality that my children use the Internet and there is not much I can or want to do to avoid it. The Internet has become a part of our society and it is important that we learn how to enjoy the Internet safely. And that goes for our children too, of course.
This program is designed by parents for parents and with the support of children for children. Please take the time to watch this video and then watch the children's video with your children.
This is not a magic solution, but it will help you and your children enjoy the Internet more safely. For feedback or questions you can always contact johannesdrooghaag.com.
The program Internet Safety for Kids was developed in cooperation with Your Passport to Grow YP2Grow.com.
Video production: Kaya Hoschek
Music: bensound.com
Thank you very much!
Dr. ir Johannes Drooghaag
See publication
Tags: Cybersecurity, Digital Transformation, Social
Internet Safety for Kids (and their parents)
Johannes Drooghaag
September 19, 2019
This is part 2 for kids. You can find part 1 for parents here: https://youtu.be/dGZc9VmVTbg
Hello, my name is Johannes Drooghaag and I am an expert and speaker on cyber security.
As a father of 2 very intelligent and curious children, I was confronted with the reality that my children use the Internet and there is not much I can or want to do to avoid it. The Internet has become a part of our society and it is important that we learn how to enjoy the Internet safely. And that goes for our children too, of course.
This program is designed by parents for parents and with the support of children for children. Please take the time to watch this video and then watch the children's video with your children.
This is not a magic solution, but it will help you and your children enjoy the Internet more safely. For feedback or questions you can always contact johannesdrooghaag.com.
The program Internet Safety for Kids was developed in cooperation with Your Passport to Grow YP2Grow.com.
Video production: Kaya Hoschek
Music: bensound.com
Thank you very much!
Dr. ir Johannes Drooghaag
See publication
Tags: Cybersecurity, Digital Transformation, Social
Internetveiligheid voor ouders
Johannes Drooghaag
September 19, 2019
Hallo, mijn naam is Johannes Drooghaag en ik ben een expert en spreker over cyberveiligheid.
Als vader van 2 zeer intelligente en nieuwsgierige kinderen werd ik geconfronteerd met de realiteit dat mijn kinderen het internet gebruiken en er is niet veel dat ik kan of wil doen om het te vermijden. Het internet is een onderdeel geworden van onze samenleving en het is belangrijk dat we leren hoe we veilig van het internet kunnen genieten. En dat geldt natuurlijk ook voor onze kinderen.
Dit programma is ontworpen door ouders voor ouders en met de steun van kinderen voor kinderen. Neem de tijd om deze video te bekijken en vervolgens de video voor de kinderen met uw kinderen te bekijken.
Dit is geen magische oplossing, maar het zal u en uw kinderen helpen om veiliger van het internet te genieten. Voor feedback of vragen kunt u altijd contact opnemen op johannesdrooghaag.com.
Het programma Internet Safety for Kids is ontwikkeld in samenwerking met Your Passport to Grow YP2Grow.com.
Video production: Kaya Hoschek
Music: bensound.com
Hartelijk dank!
Dr. ir Johannes Drooghaag
See publication
Tags: Cybersecurity, Digital Transformation, Social
Internetveiligheid voor Kids (en hun ouders)
Johannes Drooghaag
September 19, 2019
Dit is deel 2 voor de kids. Deel 1 voor de ouders is hier: https://youtu.be/n67hiYCiRQQ
Hallo, mijn naam is Johannes Drooghaag en ik ben een expert en spreker over cyberveiligheid.
Als vader van 2 zeer intelligente en nieuwsgierige kinderen werd ik geconfronteerd met de realiteit dat mijn kinderen het internet gebruiken en er is niet veel dat ik kan of wil doen om het te vermijden. Het internet is een onderdeel geworden van onze samenleving en het is belangrijk dat we leren hoe we veilig van het internet kunnen genieten. En dat geldt natuurlijk ook voor onze kinderen.
Dit programma is ontworpen door ouders voor ouders en met de steun van kinderen voor kinderen. Neem de tijd om deze video te bekijken en vervolgens de video voor de kinderen met uw kinderen te bekijken.
Dit is geen magische oplossing, maar het zal u en uw kinderen helpen om veiliger van het internet te genieten. Voor feedback of vragen kunt u altijd contact opnemen op johannesdrooghaag.com.
Het programma Internet Safety for Kids is ontwikkeld in samenwerking met Your Passport to Grow YP2Grow.com.
Video production: Kaya Hoschek
Music: bensound.com
Hartelijk dank!
Dr. ir Johannes Drooghaag
See publication
Tags: Cybersecurity, Digital Transformation, Social
Thoughts on Cyber Security by Johannes Drooghaag
Johannes Drooghaag
September 15, 2019
Collection of thoughts and quotes on Cyber Security
See publication
Tags: Cybersecurity, Digital Transformation, Leadership
Thoughts Industrial Cyber Security by Johannes Drooghaag
Johannes Drooghaag
September 15, 2019
Collection of thoughts and quotes on Industrial Cyber Security by Johannes Drooghaag
See publication
Tags: Cybersecurity, Digital Transformation, Leadership
Thoughts on Digital Transformation by Johannes Drooghaag
Johannes Drooghaag
September 15, 2019
Collection of thoughts and quotes on Digital Transformation by Johannes Drooghaag
See publication
Tags: Agile, Cybersecurity, Digital Transformation
Thoughts on Leadership by Johannes Drooghaag
Johannes Drooghaag
September 15, 2019
Collection of thoughts and quotes on Leadership by Johannes Drooghaag
See publication
Tags: Cybersecurity, Digital Transformation, Leadership
Thoughts on Sustainability and Inclusion by Johannes Drooghaag
Johannes Drooghaag
September 15, 2019
Collection of thoughts and quotes on Sustainability and Inclusion by Johannes Drooghaag
See publication
Tags: Sustainability, Leadership, Future of Work, Diversity and Inclusion
Thoughts on Blockchain by Johannes Drooghaag
Johannes Drooghaag
September 15, 2019
Collection of Thoughts and Quotes on Blockchain by Johannes Drooghaag
See publication
Tags: Blockchain, Cybersecurity, Digital Transformation