e-Governance Project Delivery Framework

Leadership and Direction for Value, Quality, and Security in Project Delivery 1. Value Delivery Governance ensures projects deliver measurable benefits aligned with funded strategy and stakeholder legitimate interests Understanding of globally influencing standards: – ISO/BS: Strategic alignment, benefits realization, continual improvement – PMI (PMBOK): Business case, value delivery system, performance domains -,PRINCE2: Business case primacy, […]

Reimagining Teaching Methodology with Artificial Intelligence

Knowledge Pointer Do IT Training Guide Educators’ Training on Reimagining Teaching Methodology with Artificial Intelligence  Purpose: The purpose of this training is to provide educators and educational administrators with a comprehensive understanding of how artificial intelligence (AI) can transform teaching methodologies. The training aims to equip participants with the knowledge and skills needed to effectively […]

Developing Privacy Management Manual

The work challenge is to guide the useful and relevant preparation and content development of a documented guidance on the “what and how” of protecting the privacy of personal data in digital technology-enabled services of engaging a person with a right to be “let alone.” The privacy management manual communicates acceptable, actionable, and auditable knowledge […]

Requiring Data Privacy Impact Assessment

In the Republic of the Philippines, any security incident associated with a personal data breach in the information and communication system of a government agency or business enterprise brings forward the question of done security level assessment and the application of information security measures as listed and described in Rule VI of the implementing rules […]

Referencing Validity of Data Privacy by Design

How to determine that the user or consumer requirements for data privacy are embedded into the design, build, integration, test, and release of a new product or service? What are the indicators in the product or service development and operation lifecycles that assure information confidentiality, process integrity, system availability, data privacy, and user safety? The […]

Planning Assumptions in Cybersecurity Strategy

How to determine, describe, document, and demonstrate the elements that compose the valid and verifiable cybersecurity strategy and plan in order to prevent, respond to, and recover from security incidents that are considered cybercrimes? The desk research and product marketing assumptions of subject matter experts, that are associated with cybersecurity requirements, have to be affirmed […]

Gauging results of competence in cybersecurity

Cyberthreat is a product that exploits and does harm. It is continuously developed, integrated, and delivered by cyber threat agents. The threat agent’s means of achieving purpose are what are commonly considered unethical, illegal, and harmful to the life and privacy of a person inside the cyber of digital technology-enabled services of engaging customer, citizen, […]

Developing a Cybersecurity Management Manual

In the Republic of the Philippines, the valid and auditable practice of cybersecurity and data privacy ENSUE from government agencies and business enterprises that have been acting the legal obligations of securing the CYBER of data, information, application, network, storage infrastructure, and people that are threatened by CYBERCRIME and DATA PRIVACY VIOLATION in the information […]

Composing Competence in Cybersecurity, Information Security and Data Privacy

I AM of the digital customer, consumer, or work I AM online… Identified, Authorized, and Monitored inside the network, storage, application, and middleware of service delivery acquired by a controller named TRUST. I AM is… Identity Authenticated and Matched to access privilege and authorized functions that are monitored by a director named SECURE. I AM […]