<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>News &#8211; IT Kombinat</title>
	<atom:link href="https://itkombinat.com/category/news/feed/" rel="self" type="application/rss+xml" />
	<link>https://itkombinat.com</link>
	<description>The slightly different consulting company</description>
	<lastBuildDate>Fri, 14 Nov 2025 13:41:14 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://itkombinat.com/wp-content/uploads/cropped-logo-32x32.png</url>
	<title>News &#8211; IT Kombinat</title>
	<link>https://itkombinat.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>German Bundestag passes NIS2 Implementation Act – Take the NIS2 Readiness Check now!</title>
		<link>https://itkombinat.com/german-bundestag-passes-nis2-implementation-act-take-the-nis2-readiness-check-now/</link>
		
		<dc:creator><![CDATA[Thomas Benz]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 12:43:23 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[NIS 2.0]]></category>
		<guid isPermaLink="false">https://itkombinat.com/?p=3153</guid>

					<description><![CDATA[On 13 November 2025, the German Bundestag passed the final ‘NIS 2 Implementation and Cybersecurity Strengthening Act’ (NIS2UmsuCG). This ends the uncertainty: the EU&#8217;s NIS 2 Directive is now binding German law. The 3 most important game changers in today&#8217;s decision: 1. Expanded scope of applicability: The focus is no longer solely on the traditional [&#8230;]]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="605" height="605" src="https://itkombinat.com/wp-content/uploads/NIS2-Frontmann-4.png" alt="" class="wp-image-3160" srcset="https://itkombinat.com/wp-content/uploads/NIS2-Frontmann-4.png 605w, https://itkombinat.com/wp-content/uploads/NIS2-Frontmann-4-560x560.png 560w, https://itkombinat.com/wp-content/uploads/NIS2-Frontmann-4-333x333.png 333w" sizes="(max-width: 605px) 100vw, 605px" /></figure>



<p>On 13 November 2025, the German Bundestag passed the final ‘NIS 2 Implementation and Cybersecurity Strengthening Act’ (NIS2UmsuCG). This ends the uncertainty: the EU&#8217;s NIS 2 Directive is now binding German law.</p>



<h3 class="wp-block-heading">The 3 most important game changers in today&#8217;s decision:</h3>



<h4 class="wp-block-heading">1. Expanded scope of applicability:</h4>



<h4 class="wp-block-heading">The focus is no longer solely on the traditional 2,000 or so ‘KRITIS’ operators. The categories ‘important’ (e.g. mechanical engineering, food production, chemicals) and ‘particularly important’ (e.g. energy, banking, health) facilities mean that the probability of <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-primary-color">your company</mark> (as one of a total of around 40,000) <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-primary-color">now being affected </mark>has increased massively.</h4>



<h4 class="wp-block-heading">2. Personal liability of management:</h4>



<h4 class="wp-block-heading"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-primary-color">The management boards</mark> (managing directors, board members)<mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-primary-color"> are now personally responsible</mark> for the implementation (and non-compliance!) of cybersecurity measures. They must accept the measures and monitor their implementation. Violations are subject to heavy fines that can no longer simply be passed on to the company.</h4>



<h4 class="wp-block-heading">3. Stricter requirements &amp; deadlines:</h4>



<h4 class="wp-block-heading">It is no longer just a matter of having a firewall. <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-primary-color">NIS2 requires comprehensive risk management</mark> that covers the entire supply chain. In addition, the <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-primary-color">reporting requirements for security incidents are drastically reduced</mark> (often to 24 hours for an initial report).</h4>



<h3 class="wp-block-heading">What you should do <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-primary-color">now</mark>:</h3>



<h4 class="wp-block-heading">Those who have only been analysing the situation so far must <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-primary-color">now take action</mark>. <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-primary-color">NIS2 </mark>is not purely an IT issue; it <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-primary-color">is a strategic management issue</mark> that determines the resilience and future viability of companies.</h4>



<h4 class="wp-block-heading"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-primary-color">Clarify whether you are affected:</mark> Does your company fall under the new regulations? If so, you will also have to meet the requirements of your customers/supply chains.</h4>



<h4 class="wp-block-heading"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-primary-color">Perform a gap analysis</mark>: Where do you stand? Which of the required measures are missing?</h4>



<h4 class="wp-block-heading"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-primary-color">Involve management: </mark>Top management must understand the new personal liability risks and release the necessary resources.</h4>



<h4 class="wp-block-heading"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-primary-color">Create a roadmap:</mark> Develop a clear, prioritised plan to close security gaps and implement management processes.</h4>



<h3 class="wp-block-heading">Still not quite sure what exactly to do? Then we recommend our NIS2 Readiness Check:</h3>



<div class="wp-block-file"><a id="wp-block-file--media-5e63f928-9b25-4ef3-b7c1-950eeeaee610" href="https://itkombinat.com/wp-content/uploads/NIS2_Readiness_Check_Onepager_IT_Kombinat-2.pdf">NIS2_Readiness_Check_Onepager_IT_Kombinat</a><a href="https://itkombinat.com/wp-content/uploads/NIS2_Readiness_Check_Onepager_IT_Kombinat-2.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-5e63f928-9b25-4ef3-b7c1-950eeeaee610">Download</a></div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>IT Kombinat zieht erfolgreiche Bilanz für 2024 und gründet KI-Tochtergesellschaft</title>
		<link>https://itkombinat.com/it-kombinat-zieht-erfolgreiche-bilanz-fur-2024-und-grundet-ki-tochtergesellschaft/</link>
		
		<dc:creator><![CDATA[Thomas Benz]]></dc:creator>
		<pubDate>Tue, 02 Sep 2025 09:12:49 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://itkombinat.com/?p=3101</guid>

					<description><![CDATA[Monheim, 2. September 2025&#160;– Das IT Kombinat blickt auf ein außergewöhnlich erfolgreiches Geschäftsjahr 2024 zurück. Mit einem Umsatz von&#160;€5.666.337&#160;konnte das Unternehmen sein Ergebnis im Vergleich zum Vorjahr (€3.906.063) deutlich steigern. Der&#160;Bilanzgewinn von €861.920&#160;unterstreicht wirtschaftliche Stärke sowie eine überdurchschnittliche Liquidität und Innovationskraft des Unternehmens. Ein besonderes Highlight des Jahres war die&#160;Gründung der KI Kombinat GmbH, einer [&#8230;]]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-full"><img decoding="async" width="2560" height="1371" src="https://itkombinat.com/wp-content/uploads/iStock-1174954917-scaled.jpg" alt="" class="wp-image-1549" srcset="https://itkombinat.com/wp-content/uploads//iStock-1174954917-scaled.jpg 2560w, https://itkombinat.com/wp-content/uploads//iStock-1174954917-560x300.jpg 560w, https://itkombinat.com/wp-content/uploads//iStock-1174954917-1200x643.jpg 1200w, https://itkombinat.com/wp-content/uploads//iStock-1174954917-768x411.jpg 768w, https://itkombinat.com/wp-content/uploads//iStock-1174954917-1536x823.jpg 1536w, https://itkombinat.com/wp-content/uploads//iStock-1174954917-2048x1097.jpg 2048w, https://itkombinat.com/wp-content/uploads//iStock-1174954917-1120x600.jpg 1120w" sizes="(max-width: 2560px) 100vw, 2560px" /></figure>



<p></p>



<p><strong>Monheim, 2. September 2025</strong>&nbsp;– Das IT Kombinat blickt auf ein außergewöhnlich erfolgreiches Geschäftsjahr 2024 zurück. Mit einem Umsatz von&nbsp;<strong>€5.666.337</strong>&nbsp;konnte das Unternehmen sein Ergebnis im Vergleich zum Vorjahr (<strong>€3.906.063</strong>) deutlich steigern. Der&nbsp;<strong>Bilanzgewinn von €861.920</strong>&nbsp;unterstreicht wirtschaftliche Stärke sowie eine überdurchschnittliche Liquidität und Innovationskraft des Unternehmens.</p>



<p>Ein besonderes Highlight des Jahres war die&nbsp;<strong>Gründung der KI Kombinat GmbH</strong>, einer neuen Tochtergesellschaft, die sich auf die Entwicklung und Implementierung von Lösungen im Bereich Künstliche Intelligenz spezialisiert. Damit setzt das IT Kombinat ein klares Zeichen für die Zukunft und baut seine Position als Innovationsführer in der IT-Branche weiter aus.</p>



<p>„2024 war für uns ein Jahr des Wachstums und der weiteren strategischen Ausrichtung“, sagt&nbsp;<strong>Manfred Götz</strong>, Geschäftsführer des IT Kombinats. „Mit der KI Kombinat GmbH schaffen wir ein neues Zentrum für intelligente, KI-gestützte Technologien und Lösungen, dass unsere Kunden gezielt bei der digitalen Transformation unterstützt.“</p>



<p>Auch die&nbsp;<strong>Indiginox GmbH</strong>, eine weitere Tochtergesellschaft der IT Kombinat Gruppe, hat 2024 ein starkes Jahr absolviert. Als wirtschaftlich eigenständiges Unternehmen ist sie&nbsp;<strong>nicht im Jahresabschluss 2024 der IT Kombinat GmbH konsolidiert</strong>.</p>



<p>Für das Jahr 2025 sind die Weichen bereits gestellt: Das IT Kombinat setzt weiteres Wachstum sowie den gezielten Ausbau seiner Teams und Kompetenzen – insbesondere in den Bereichen&nbsp;<strong>IT/OT-Security, Softwareentwicklung und Künstliche Intelligenz</strong> bereits erfolgreich um.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>Über IT Kombinat</strong><br>IT Kombinat ist ein innovatives IT-Beratungsunternehmen mit Schwerpunkten in&nbsp;<strong>Program- und Projektmanagement, Softwareentwicklung, IT-Infrastruktur, IT/OT-Security</strong>&nbsp;sowie&nbsp;<strong>strategischem Management</strong>.</p>



<p>Das Unternehmen gehört vollständig seinen&nbsp;<strong>operativ tätigen Partnern</strong>&nbsp;– nicht Investoren. Diese Struktur ermöglicht eine langfristige Ausrichtung mit Fokus auf&nbsp;<strong>Kundenzufriedenheit, Fairness und Nachhaltigkeit</strong>. IT Kombinat, mit Sitz in Monheim, arbeitet überwiegend&nbsp;<strong>dezentral</strong>&nbsp;– in Deutschland und weltweit – und setzt auf&nbsp;<strong>flexible Arbeitsmodelle</strong>.</p>



<p>Als Mitglied im&nbsp;<strong>Bundesverband mittelständische Wirtschaft (BVMW)</strong>&nbsp;und ausgezeichnet als&nbsp;<strong>KUNUNU Top Company 2025</strong>&nbsp;steht IT Kombinat für eine moderne Unternehmenskultur, die&nbsp;<strong>Innovation, Weiterbildung und persönliche Entwicklung</strong>&nbsp;fördert.</p>



<p>Weitere Informationen finden Sie unter&nbsp;<a href="http://www.itkombinat.com">www.itkombinat.com</a> oder auf der Unternehmensseite auf LinkedIn unter <a href="https://de.linkedin.com/company/it-kombinat-gmbh">https://de.linkedin.com/company/it-kombinat-gmbh</a> .<br><br><strong>Pressekontakt:</strong><br>Thomas Benz<br>Partner/Prokurist<br>Telefonnummer: +49 (0)1515 9058793<br>E-Mail-Adresse: Thomas.Benz@itkombinat.com</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>IT Kombinat as Bronze Sponsor at GBI Europe 2024</title>
		<link>https://itkombinat.com/it-kombinat-as-bronze-sponsor-at-gbi-europe-2024/</link>
		
		<dc:creator><![CDATA[Thomas Benz]]></dc:creator>
		<pubDate>Fri, 08 Mar 2024 12:37:21 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Charity]]></category>
		<category><![CDATA[GBI]]></category>
		<category><![CDATA[Perormance]]></category>
		<guid isPermaLink="false">https://itkombinat.com/?p=1505</guid>

					<description><![CDATA[What is the GBI? The Global Biking Initiative (GBI) is an international cycling charity event that was founded by Vodafone employees in 2008 and since then has organized an annual European Tour with the support of sponsors. Up to 400 international cyclists collect donations for aid organizations. The event still has a strong Vodafone connection [&#8230;]]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img decoding="async" width="1200" height="800" src="https://itkombinat.com/wp-content/uploads/Raus-aus-der-Garage_pexels-mali-maeder-101666-1200x800.jpg" alt="" class="wp-image-1513" srcset="https://itkombinat.com/wp-content/uploads//Raus-aus-der-Garage_pexels-mali-maeder-101666-1200x800.jpg 1200w, https://itkombinat.com/wp-content/uploads//Raus-aus-der-Garage_pexels-mali-maeder-101666-560x373.jpg 560w, https://itkombinat.com/wp-content/uploads//Raus-aus-der-Garage_pexels-mali-maeder-101666-768x512.jpg 768w, https://itkombinat.com/wp-content/uploads//Raus-aus-der-Garage_pexels-mali-maeder-101666-1536x1024.jpg 1536w, https://itkombinat.com/wp-content/uploads//Raus-aus-der-Garage_pexels-mali-maeder-101666-2048x1365.jpg 2048w, https://itkombinat.com/wp-content/uploads//Raus-aus-der-Garage_pexels-mali-maeder-101666-1120x747.jpg 1120w" sizes="(max-width: 1200px) 100vw, 1200px" /></figure>



<p>What is the GBI?</p>



<p>The Global Biking Initiative (GBI) is an international cycling charity event that was founded by Vodafone employees in 2008 and since then has organized an annual European Tour with the support of sponsors. Up to 400 international cyclists collect donations for aid organizations. The event still has a strong Vodafone connection and is primarily aimed at employees from the ITC sector.&nbsp; In addition to the sporting and charitable challenge, it is always a good opportunity for networking.</p>



<p>This time, the GBI Europe 2024 Tour brings a reunion with the Swiss mountains. From Bologna in the heart of Emilia-Romagna, we will travel along the northern Italian lakes, crossing the St. Gotthard Pass and through beautiful Switzerland to our tour destination in Zurich.</p>



<p>Date: June 9 &#8211; 15, 2024 (Regular registration possible until the end of March 2024)</p>



<p>In addition, we will of course support all our employees who are interested in taking part and offer all participating employees two additional days of vacation. We will also support fundraising with a contribution of EUR 100 per employee.</p>



<p>More about this:<br><br><a href="https://www.gbi-event.org/de/events/gbi-europe-2024.html">https://www.gbi-event.org/de/events/gbi-europe-2024.html</a><br><a href=" https://www.gbi-event.org/de/generalfaq_de.html">https://www.gbi-event.org/de/generalfaq_de.html</a><br></p>



<p><br></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>First shareholders&#8217; meeting: the founding year in figures</title>
		<link>https://itkombinat.com/first-shareholders-meeting-the-founding-year-in-figures/</link>
		
		<dc:creator><![CDATA[Thomas Benz]]></dc:creator>
		<pubDate>Mon, 04 Mar 2024 15:27:04 +0000</pubDate>
				<category><![CDATA[Financial Data]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Growth]]></category>
		<category><![CDATA[ITLeadership]]></category>
		<category><![CDATA[Jahresabschluss]]></category>
		<category><![CDATA[Performance]]></category>
		<category><![CDATA[Wachstum]]></category>
		<guid isPermaLink="false">https://itkombinat.com/?p=1479</guid>

					<description><![CDATA[The first shareholders&#8217; meeting of IT Kombinat took place on Friday, March 01, 2024, Managing Director Manfred Götz presented the financial figures for 2023, which were then formally adopted by the shareholders in the annual financial statements. IT Kombinat had an incredibly positive founding year in 2023, generating sales totalling EUR 3.9 million with 10 [&#8230;]]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image"><img decoding="async" width="933" height="700" src="https://itkombinat.com/wp-content/uploads/Bild1.jpg" alt="" class="wp-image-1483" srcset="https://itkombinat.com/wp-content/uploads//Bild1.jpg 933w, https://itkombinat.com/wp-content/uploads//Bild1-560x420.jpg 560w, https://itkombinat.com/wp-content/uploads//Bild1-768x576.jpg 768w" sizes="(max-width: 933px) 100vw, 933px" /></figure>



<p><br>The first shareholders&#8217; meeting of IT Kombinat took place on Friday, March 01, 2024, Managing Director Manfred Götz presented the financial figures for 2023, which were then formally adopted by the shareholders in the annual financial statements.</p>



<p>IT Kombinat had an incredibly positive founding year in 2023, generating sales totalling EUR 3.9 million with 10 different customers in the company&#8217;s first 10 months. After deducting accruals, provisions, depreciation, amortisation and taxes, the company generated a net profit of EUR 178 thousand.&nbsp; By the end of the year, the company had grown to 19 internal and over 20 external employees.</p>



<p>The company is starting the new year with a cash balance of EUR 534 thousand. Available external funds therefore did not have to be utilised. The current order backlog already ensures good capacity utilisation throughout 2024.</p>



<p>The shareholders have decided not to distribute the profits generated but to continue investing in the company. The company is therefore planning further moderate organic growth in 2024 and, if applicable,&nbsp; an inorganic option to increase sales and employees in the medium term.</p>



<p>The management and shareholders see the increasing internationalisation of their customers&#8217; IT development as the greatest challenge, which the company intends to meet by further expanding its nearshore capacities in countries such as Ukraine, Kosovo, Romania and Poland.</p>



<p>The founders agreed that the current rapid technological leap in the field of artificial intelligence will lead to fundamental changes in IT consulting in the medium term. They would like to focus on this development in the coming years and expand the business model with various in-house developments, possibly also as part of government-funded projects.<br><br></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Adversarial Machine Learning is Accelerating Malware Development</title>
		<link>https://itkombinat.com/adversarial-machine-learning-is-accelerating-malware-development/</link>
		
		<dc:creator><![CDATA[Thomas Benz]]></dc:creator>
		<pubDate>Thu, 08 Feb 2024 17:18:09 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[AML]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ITSecurity]]></category>
		<category><![CDATA[MachineLearning]]></category>
		<category><![CDATA[SME]]></category>
		<guid isPermaLink="false">https://itkombinat.com/?p=1467</guid>

					<description><![CDATA[Adversarial machine learning (AML) accelerates the development of malware
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-full"><img decoding="async" width="720" height="582" src="https://itkombinat.com/wp-content/uploads/AML-Malware-Blog.jpg" alt="" class="wp-image-1468" srcset="https://itkombinat.com/wp-content/uploads//AML-Malware-Blog.jpg 720w, https://itkombinat.com/wp-content/uploads//AML-Malware-Blog-560x453.jpg 560w" sizes="(max-width: 720px) 100vw, 720px" /></figure>



<p>Cybersecurity has been compared to an arms race &#8211; as monitoring and malware detection evolve, so do the tactics of cyber adversaries. One of the most concerning  developments in recent years is the emergence of adversarial machine learning (AML) which accelerates malware development. This phenomenon has profound implications for IT budget holders, as it necessitates a reevaluation of cybersecurity strategies and resource allocation to effectively counter the rise of malicious software development. </p>



<h3 class="wp-block-heading"><strong>What is Adversarial Machine Learning?</strong> </h3>



<p>Adversarial machine learning is the manipulation of machine learning models by adversaries to evade detection or cause misclassification. This is achieved by exploiting vulnerabilities in the underlying algorithms, data, or training processes to generate adversarial examples. Adversarial examples can be used as inputs that are carefully crafted to deceive or subvert a  model. </p>



<h5 class="wp-block-heading">EXAMPLE:</h5>



<p>Adversarial machine learning techniques can be categorized into various methods. These include gradient-based attacks, where adversaries perturb input data to maximize the model&#8217;s prediction error, and model inversion attacks, where adversaries attempt to infer sensitive information about the training data. An early, and well-publicized example was the <a href="https://www.bbc.com/news/technology-41845878" target="_blank" rel="noreferrer noopener">Kyushu University researchers</a> who in 2017 managed to ‘fool’ many image analysis algorithms. Single-pixel changes in images resulted in their misclassification – a turtle was recognized as a rifle and a stealth bomber was identified as a dog.</p>



<h3 class="wp-block-heading"><strong>Adversarial Machine Learning and Malicious Software Development</strong> </h3>



<p>The integration of adversarial machine learning techniques into the realm of cybersecurity has empowered cybercriminals to develop more sophisticated and evasive forms of malware. By leveraging adversarial examples, adversaries can evade detection by traditional security measures and exploit vulnerabilities in machine learning-based defenses.&nbsp;</p>



<p>Additionally, chatbots such as <a href="https://flowgpt.com/p/wormgpt-6">WormGPT,</a> <a href="https://flowgpt.com/p/fraudgpt-7">FraudGPT</a>, <a href="https://s2wjapan.com/en_darkbert/">DarkBert</a>, or DarkBART provide ways to subvert the security measures of public models for a small monthly subscription (between 60€ and 200€ per month).  </p>



<h5 class="wp-block-heading">EXAMPLE:</h5>



<p>Adversarial machine learning has been used to create stealthy malware variants that can bypass antivirus software, intrusion detection systems, and other security controls. They do this by exploiting weaknesses in machine learning models used for threat detection. <a href="https://arxiv.org/abs/1702.06280" target="_blank" rel="noreferrer noopener">Deep statistical analysis of malware variants</a> showed early promise as a method of detecting adversarial malware inputs, but this approach is now viewed only as a partial solution.</p>



<h3 class="wp-block-heading"><strong>Implications for IT Budget Holders</strong> </h3>



<p>The proliferation of adversarial machine learning poses significant challenges for IT budget holders, as it introduces new complexities and uncertainties into the cybersecurity landscape. Addressing this threat requires strategic investments in advanced security technologies, threat intelligence, and workforce training to enhance detection and response capabilities. </p>



<h5 class="wp-block-heading">EXAMPLE:</h5>



<p>According to a <a href="https://www.accenture.com/content/dam/accenture/final/capabilities/technology/security/document/11177%20Cyber%20Threatscape%20Report_Digital_AW_SH.pdf" target="_blank" rel="noreferrer noopener">2020 survey conducted by Accenture</a>, 83% of cybersecurity professionals believe that adversarial machine learning will have a significant impact on their organization&#8217;s cybersecurity strategy in the next five years. More recently, <a href="https://www.gartner.com/doc/reprints?id=1-2G6U1RDP&amp;ct=240109&amp;st=sb" target="_blank" rel="noreferrer noopener">Accenture predicts over 15% increase</a> in application- and data-security spending through 2025. </p>



<h3 class="wp-block-heading"><strong>Addressing the Challenge</strong> </h3>



<p>To effectively mitigate the impact of adversarial machine learning on malicious software development, organizations must adopt a multi-faceted approach to cybersecurity. This includes investing in robust threat detection and response capabilities, leveraging AI-driven security solutions, and prioritizing employee training and awareness programs. </p>



<h5 class="wp-block-heading">EXAMPLE:</h5>



<p>In 2021 Gartner predicted that by 2025, 30% of organisations will leverage adversarial machine learning techniques to enhance their cybersecurity defences. Furthermore the Gartner Report “<a href="https://www.gartner.com/doc/reprints?id=1-2G6U1RDP&amp;ct=240109&amp;st=sb" target="_blank" rel="noreferrer noopener">Top Trends in Cybersecurity for 2024</a>” predicts that in 2025, 40% of cybersecurity programs will deploy socio-behavioral principles (such as nudge techniques) to influence security culture across the organisation. This constitutes a dramatic rise  from less than 5% in 2021. In addition they predict that by 2027, 50% of large enterprise CISOs will have adopted human-centric security design practices. </p>



<p>Our in-house Cybersecurity expert <strong>Bernhard Borsch</strong> gives the following advice: </p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><em>“Even small and medium sized enterprises can prepare for this and other new cyberthreats. The judicious use of off-the-shelf and existing software solutions, training of in-house IT experts, and introduction of an Information Security Management System (ISMS) can improve their security posture dramatically. An important mind set to adopt is: Protection is necessary, but a prepared recovery ensures survival!”.</em></p>
</blockquote>



<h3 class="wp-block-heading"><strong>Conclusion</strong></h3>



<p>The rise of adversarial machine learning represents a significant challenge for organizations, as it empowers cyber adversaries to develop more sophisticated and resilient forms of malicious software. IT budget holders must recognize the urgency of addressing this threat by not only allocating resources strategically and investing in advanced cybersecurity solutions, but also by employing more human-centric approaches to cybersecurity. By increasing awareness, staying vigilant and being prepared to respond to attacks, organizations can strengthen their defenses and mitigate the risks associated with the accelerated evolution of cyber threats enabled by AML. </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Information Security Directive NIS2 and its impact on SMEs – a seminar for members of the BVMW Wirtschaftssenat</title>
		<link>https://itkombinat.com/information-security-directive-nis2-and-its-impact-on-smes-a-seminar-for-members-of-the-bvmw-wirtschaftssenat/</link>
		
		<dc:creator><![CDATA[Thomas Benz]]></dc:creator>
		<pubDate>Thu, 01 Feb 2024 12:28:03 +0000</pubDate>
				<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Operation Technology (OT) Security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[ITLeadership]]></category>
		<category><![CDATA[ITSecurity]]></category>
		<category><![CDATA[NIS2]]></category>
		<category><![CDATA[OTSecurity]]></category>
		<guid isPermaLink="false">https://itkombinat.com/?p=1456</guid>

					<description><![CDATA[The offices of IT Kombinat were the location for an engaging seminar on the topic of the Network &#38; Information Security Directive2 (NIS2) yesterday. Many thanks to Mr Herbert Schulte, Director of the Wirtschaftssenat for organising the event in partnership with IT Kombinat! Expanding on the scope of NIS1, NIS2 aims to further strengthen critical [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>  </p>



<p></p>



<figure class="wp-block-image size-full"><img decoding="async" width="1148" height="846" src="https://itkombinat.com/wp-content/uploads/BVMW-NIS2-Main.png" alt="" class="wp-image-1457" srcset="https://itkombinat.com/wp-content/uploads//BVMW-NIS2-Main.png 1148w, https://itkombinat.com/wp-content/uploads//BVMW-NIS2-Main-560x413.png 560w, https://itkombinat.com/wp-content/uploads//BVMW-NIS2-Main-768x566.png 768w, https://itkombinat.com/wp-content/uploads//BVMW-NIS2-Main-1120x825.png 1120w" sizes="(max-width: 1148px) 100vw, 1148px" /></figure>



<p></p>



<p>The offices of IT Kombinat were the location for an engaging seminar on the topic of the Network &amp; Information Security Directive2 (<a href="https://nis2directive.eu/what-is-nis2/">NIS2</a>) yesterday. Many thanks to Mr Herbert Schulte, Director of the Wirtschaftssenat for organising the event in partnership with <a href="http://itkombinat.com">IT Kombinat</a>!<br><br>Expanding on the scope of NIS1, NIS2 aims to further strengthen critical infrastructure and essential services within the EU. This should be achieved by requiring companies providing these services to implement appropriate security measures and to rapidly reportany incidents to the appropriate authorities (in Germany the <a href="https://www.bsi.bund.de/DE/Home/home_node.html">BSI</a>).<br></p>



<figure class="wp-block-image size-full"><img decoding="async" width="703" height="425" src="https://itkombinat.com/wp-content/uploads/BVMW-NIS2-1.jpg" alt="" class="wp-image-1458" srcset="https://itkombinat.com/wp-content/uploads//BVMW-NIS2-1.jpg 703w, https://itkombinat.com/wp-content/uploads//BVMW-NIS2-1-560x339.jpg 560w" sizes="(max-width: 703px) 100vw, 703px" /></figure>



<p>Bernhard Borsch, our Information Security specialist and co-founder presented a high-level perspective of NIS2, its scope, and enforcement guidelines. He also outlined the benefits of a business-centric approach to information security and the utility of a general Information Security Management System (<a href="https://en.wikipedia.org/wiki/Information_security_management">ISMS</a>) which encompasses many of the NIS2 requirements<em>.</em></p>



<p>An active and informative Q&amp;A session followed, with the attendees sharing their experiences of navigating security regulations and discussing the difficulties of recruiting and retaining good information security professionals. SMEs rarely have the resources to launch large security initiatives as some larger companies do, and the challenge of monitoring systems, diagnosing issues, analysing logs, fixing issues and informing authorities can seem daunting. Through his years of IT and OT security experience, Bernhard Borsch  was able to provide pragmatic and right-sized guidance</p>



<p>One significant area of discussion was Operation Technology security (OT security), which is a focus of NIS2. OT has traditionally not been within the remit of Information Security teams as these systems (e.g. production lines) operated only within their own networks. With the growth of Industry4.0 and other applications for operative system data, OT systems are increasingly connected to other networks and are thus vulnerable to attack. </p>



<p></p>



<figure class="wp-block-image size-full"><img decoding="async" width="697" height="469" src="https://itkombinat.com/wp-content/uploads/BVMW-NIS2-2.jpg" alt="" class="wp-image-1459" srcset="https://itkombinat.com/wp-content/uploads//BVMW-NIS2-2.jpg 697w, https://itkombinat.com/wp-content/uploads//BVMW-NIS2-2-560x377.jpg 560w" sizes="(max-width: 697px) 100vw, 697px" /></figure>



<p>We hope all attendees left the event well refreshed and well informed<em>. </em>We look forward to the next even with our Partner <a href="https://www.bvmw.de/">BVMW</a> and thank all involved for their time and attention.<br><br><br>Check the teaser slide set below or <a href="https://itkombinat.com/contact/">contact us</a> for additional information!</p>



<div class="wp-block-file"><a id="wp-block-file--media-27ba330c-e9f4-45c3-9a1b-2919ae6e7d40" href="https://itkombinat.com/wp-content/uploads/2024-01-31-BVMW-NIS2-Teaser-1.pdf">2024-01-31-BVMW-NIS2-Teaser-1</a><a href="https://itkombinat.com/wp-content/uploads/2024-01-31-BVMW-NIS2-Teaser-1.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-27ba330c-e9f4-45c3-9a1b-2919ae6e7d40">Download</a></div>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Navigating the Digital Landscape: Five Crucial Roles of Successful IT Leaders – Pt5 &#8211; Aligning IT &#038; Business Goals </title>
		<link>https://itkombinat.com/navigating-the-digital-landscape-five-crucial-roles-of-successful-it-leaders-pt5-aligning-it-business-goals/</link>
		
		<dc:creator><![CDATA[Thomas Benz]]></dc:creator>
		<pubDate>Thu, 25 Jan 2024 10:09:43 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Business Goals]]></category>
		<category><![CDATA[IT Leadership]]></category>
		<category><![CDATA[Strategy]]></category>
		<guid isPermaLink="false">https://itkombinat.com/?p=1162</guid>

					<description><![CDATA[IT Leaders must bridge the gap between technical complexities and business objectives, ensuring that IT strategies directly contribute to improved efficiency, cost savings, and enhanced customer experiences.]]></description>
										<content:encoded><![CDATA[
<p></p>



<h3 class="wp-block-heading">5. Aligning IT with Business Goals</h3>



<figure class="wp-block-image size-large"><img decoding="async" width="900" height="1200" src="https://itkombinat.com/wp-content/uploads/MicrosoftTeams-image-4-1-900x1200.jpg" alt="IT Leadership - Navigating the Digital Landscape" class="wp-image-1157" srcset="https://itkombinat.com/wp-content/uploads//MicrosoftTeams-image-4-1-900x1200.jpg 900w, https://itkombinat.com/wp-content/uploads//MicrosoftTeams-image-4-1-420x560.jpg 420w, https://itkombinat.com/wp-content/uploads//MicrosoftTeams-image-4-1-768x1024.jpg 768w, https://itkombinat.com/wp-content/uploads//MicrosoftTeams-image-4-1-1152x1536.jpg 1152w, https://itkombinat.com/wp-content/uploads//MicrosoftTeams-image-4-1-840x1120.jpg 840w, https://itkombinat.com/wp-content/uploads//MicrosoftTeams-image-4-1.jpg 1536w" sizes="(max-width: 900px) 100vw, 900px" /></figure>



<p>Ultimately, the success of an IT department is measured by its contribution to the overall success of the business. IT leaders play a crucial role in aligning IT initiatives with the broader goals of the organisation. They must bridge the gap between technical complexities and business objectives, ensuring that IT strategies directly contribute to improved efficiency, cost savings, and enhanced customer experiences.&nbsp;</p>



<p>Although it sometimes feel like it, IT is not an island – we are the people enabling large parts of our business, whether they are customer-facing solutions or ‘under the hood’ business processes. Understanding, testing, deploying and managing technology is our specialty and it is often easy to misplace the importance of the aligning with the business needs and goals, especially when they are not well communicated to us. </p>



<p>Nevertheless, as IT leaders it is our responsibility to understand the business goals, avoid “<a href="https://en.wikipedia.org/wiki/Shiny_object_syndrome">Shiny Object Syndrome</a>” and align technology stacks to them. This can be a battle, especially when corporate leadership changes make business goals obscure or when stakeholders resist changing away from a trusted technology &#8211; don’t touch a running system, right..!?&nbsp;</p>



<p>However, if you have the support of a capable and cohesive team, who are accustomed to change, ready to innovate, and aligned with your vision and goals it should not be a big problem to focus them on clearly communicated business goals. In fact, it should help focus their innovation efforts and guide their response to change.&nbsp;</p>



<p>In conclusion, the importance of leadership in IT cannot be overstated. As organisations increasingly rely on technology to drive their success, effective IT leadership becomes the linchpin that holds everything together. A visionary and adaptive IT leader not only ensures the smooth functioning of IT operations but also propels the organisation forward in the ever-evolving digital landscape.&nbsp;</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“Information technology and business are becoming inextricably interwoven. I don&#8217;t think anybody can talk meaningfully about one without the talking about the other.” </p>
<cite>Bill Gates</cite></blockquote>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Scaling Agile Down: Is SAFe Beneficial for Small Companies? </title>
		<link>https://itkombinat.com/scaling-agile-down-is-safe-beneficial-for-small-companies/</link>
		
		<dc:creator><![CDATA[Thomas Benz]]></dc:creator>
		<pubDate>Fri, 22 Dec 2023 11:30:39 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://itkombinat.com/?p=1434</guid>

					<description><![CDATA[Many view small companies as agile and fast by nature, so are the principles of SAFe a help or a hindrance to growth?]]></description>
										<content:encoded><![CDATA[
<p>The Scaled Agile Framework (SAFe) is often viewed as a solution tailored for large enterprises dealing with complex, multi-team projects. However, the question arises: Can SAFe be useful for smaller companies striving for growth, or does it just create unnecessary overhead? Let&#8217;s explore how SAFe, despite its roots in scaling Agile for larger organisations, can bring value to smaller companies.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="973" height="1200" src="https://itkombinat.com/wp-content/uploads/SAFe-for-small-companies_feature-image-973x1200.png" alt="SAFe for smaller companies" class="wp-image-1435" srcset="https://itkombinat.com/wp-content/uploads//SAFe-for-small-companies_feature-image-973x1200.png 973w, https://itkombinat.com/wp-content/uploads//SAFe-for-small-companies_feature-image-454x560.png 454w, https://itkombinat.com/wp-content/uploads//SAFe-for-small-companies_feature-image-768x947.png 768w, https://itkombinat.com/wp-content/uploads//SAFe-for-small-companies_feature-image-1246x1536.png 1246w, https://itkombinat.com/wp-content/uploads//SAFe-for-small-companies_feature-image-1661x2048.png 1661w, https://itkombinat.com/wp-content/uploads//SAFe-for-small-companies_feature-image-909x1120.png 909w" sizes="(max-width: 973px) 100vw, 973px" /><figcaption class="wp-element-caption">Many view small companies as agile and fast by nature, so are the principles of SAFe a help or a hindrance to growth?</figcaption></figure>



<h3 class="wp-block-heading"><strong>Understanding SAFe&#8217;s Adaptability</strong>&nbsp;</h3>



<p>SAFe&#8217;s core principles revolve around customer-centricity, iterative development, collaboration, and adaptability—traits that are relevant irrespective of company size. These principles, when applied thoughtfully, can benefit smaller companies aiming for structured growth and streamlined processes.&nbsp;</p>



<h4 class="wp-block-heading">Flexibility in Implementation&nbsp;</h4>



<p>While SAFe offers a comprehensive framework designed for enterprise-level agility, its flexibility allows adaptation to smaller settings. The modular nature of SAFe allows companies to cherry-pick elements that align with their size, needs, and growth goals. Tailoring SAFe to suit smaller teams or projects can provide a structured approach without overwhelming the organization with unnecessary complexities.&nbsp;</p>



<h3 class="wp-block-heading"><strong>So, what are the benefits for Smaller Companies?</strong>&nbsp;</h3>



<h4 class="wp-block-heading">Streamlined Communication and Alignment&nbsp;</h4>



<p>Even in smaller companies, communication gaps can hinder progress. SAFe promotes clear communication channels, aligning teams and stakeholders toward shared goals. Implementing SAFe&#8217;s communication frameworks can enhance clarity and reduce misunderstandings, facilitating smoother workflows.&nbsp;</p>



<h4 class="wp-block-heading">Improved Collaboration&nbsp;</h4>



<p>Smaller teams can still benefit from SAFe&#8217;s emphasis on cross-functional collaboration. By implementing SAFe&#8217;s collaborative practices, such as Program Increment (PI) Planning, small companies can align efforts, synchronize schedules, and identify dependencies, fostering a more cohesive work environment.&nbsp;</p>



<h4 class="wp-block-heading">Scalability Preparation&nbsp;</h4>



<p>As small companies grow, they often face scalability challenges. Implementing SAFe at an early stage can lay the groundwork for scaling Agile practices seamlessly as the company expands. It establishes a mindset and foundational practices that can easily adapt to larger teams and more complex projects in the future.&nbsp;</p>



<h4 class="wp-block-heading">Enhanced Visibility and Adaptability&nbsp;</h4>



<p>SAFe&#8217;s emphasis on metrics and continuous improvement is invaluable for smaller companies seeking to enhance visibility into their processes and adapt swiftly to market changes. By leveraging SAFe&#8217;s metrics and feedback mechanisms, these companies can make data-driven decisions, fostering adaptability and resilience.&nbsp;</p>



<h3 class="wp-block-heading"><strong>Challenges and Considerations</strong>&nbsp;</h3>



<h4 class="wp-block-heading">Over-Engineering and Complexity&nbsp;</h4>



<p>Implementing SAFe in smaller companies requires caution to avoid over-engineering or introducing unnecessary complexity. Tailoring SAFe to suit the organization&#8217;s size and needs is crucial to prevent overwhelming teams with processes designed for larger enterprises.&nbsp;</p>



<h4 class="wp-block-heading">Cultural Shift and Adaptation&nbsp;</h4>



<p>Introducing SAFe might require a cultural shift within smaller teams accustomed to more informal Agile practices. Adequate training, communication, and gradual implementation can ease this transition and ensure acceptance and adoption across the organization.&nbsp;</p>



<h3 class="wp-block-heading">Conclusion</h3>



<p>While SAFe was initially crafted for larger enterprises, its principles and adaptability make it a potentially valuable framework for smaller companies. By selectively adopting and tailoring SAFe&#8217;s components, small organizations can harness its benefits—streamlined communication, improved collaboration, scalability preparation, and enhanced adaptability—while mitigating potential challenges.&nbsp;</p>



<p>Ultimately, the decision to implement SAFe in a smaller company hinges on thoughtful consideration of the organization&#8217;s size, goals, and existing Agile maturity. When applied intelligently, SAFe can serve as a guiding framework propelling smaller companies toward structured growth, efficient operations, and sustained agility in an ever-evolving business landscape.&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Navigating the Digital Landscape: Five Crucial Roles of Successful IT Leaders – Pt4 &#8211; Building Strong Teams </title>
		<link>https://itkombinat.com/five-crucial-roles-of-successful-it-leaders-pt4-building-strong-teams/</link>
		
		<dc:creator><![CDATA[Thomas Benz]]></dc:creator>
		<pubDate>Thu, 14 Dec 2023 09:58:10 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://itkombinat.com/?p=1159</guid>

					<description><![CDATA[4. Building Strong Teams Behind every successful IT initiative is a team of skilled and motivated professionals. Leadership in IT involves more than just technical expertise; it requires the ability to build and lead high-performing teams. This includes cultivating a positive work culture, providing professional development opportunities, and fostering effective communication. A cohesive and well-functioning [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p></p>



<p></p>



<h3 class="wp-block-heading">4. Building Strong Teams</h3>



<figure class="wp-block-image size-large"><img decoding="async" width="900" height="1200" src="https://itkombinat.com/wp-content/uploads/MicrosoftTeams-image-4-1-900x1200.jpg" alt="" class="wp-image-1157" srcset="https://itkombinat.com/wp-content/uploads//MicrosoftTeams-image-4-1-900x1200.jpg 900w, https://itkombinat.com/wp-content/uploads//MicrosoftTeams-image-4-1-420x560.jpg 420w, https://itkombinat.com/wp-content/uploads//MicrosoftTeams-image-4-1-768x1024.jpg 768w, https://itkombinat.com/wp-content/uploads//MicrosoftTeams-image-4-1-1152x1536.jpg 1152w, https://itkombinat.com/wp-content/uploads//MicrosoftTeams-image-4-1-840x1120.jpg 840w, https://itkombinat.com/wp-content/uploads//MicrosoftTeams-image-4-1.jpg 1536w" sizes="(max-width: 900px) 100vw, 900px" /></figure>



<p>Behind every successful IT initiative is a team of skilled and motivated professionals. Leadership in IT involves more than just technical expertise; it requires the ability to build and lead high-performing teams. This includes cultivating a positive work culture, providing professional development opportunities, and fostering effective communication. A cohesive and well-functioning team is not only more productive but also better equipped to handle the complexities of IT projects.&nbsp;</p>



<p>Many of us know leaders who seem to effortlessly inspire their teams and I am sure some rare individuals build great teams intuitively but for the most part, it only <span style="text-decoration: underline;">appears</span> effortless. The vast literature around team building isolates a few (5 -8) key principles implemented by leaders of successful teams. A key point to acknowledge here is that the focus switches to how the team members interact with each other, rather than with their leader(s). This can be difficult for some leaders to grasp and act on, especially if leaders do not also actively participate as ‘hands-on” team members.&nbsp;&nbsp;&nbsp;</p>



<p>Over half of all tasks within companies are implemented by teams rather than individuals, so the importance of building cohesive and empowered teams cannot be ignored. The complexity of the task is however high and I found <a href="https://www.amazon.de/s?k=9780190056964&amp;i=stripbooks&amp;linkCode=qs" target="_blank" rel="noreferrer noopener">Salas &amp; Tannenbaum (2020)</a> most helpful regarding practical tips and also contextual guidance. More conceptual and thought-provoking guidance can be had from <a href="https://www.amazon.de/Survival-Hive-Leadership-Lessons-Beehive/dp/1481749722/ref=sr_1_1?__mk_de_DE=%C3%85M%C3%85%C5%BD%C3%95%C3%91&amp;crid=1ZJYHU718EQU5&amp;keywords=Survival+of+the+Hive%3A+7+Leadership+Lessons+from+a+Beehive&amp;qid=1699963708&amp;sprefix=survival+of+the+hive+7+leadership+lessons+from+a+beehive+%2Caps%2C73&amp;sr=8-1" target="_blank" rel="noreferrer noopener">Harrington &amp; Mackin (2013)</a>.&nbsp;</p>



<p>Teams are complex and require care and support from their leaders, but the rewards of maintaining a strong team can be a real force multiplier for any IT organization, or as Michael Jordan put it:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p> “<em>Talent wins games, but teamwork and intelligence win championships</em>”.&nbsp;</p>
<cite>Michael Jordan</cite></blockquote>



<p>Check out previous blogs in this series:</p>



<p>Part 1 &#8211; <a href="https://itkombinat.com/navigating-the-digital-landscape-five-crucial-roles-of-successful-it-leaders-pt1-visionary-guidance/">Visionary Guidance</a></p>



<p>Part 2 &#8211; <a href="https://itkombinat.com/five-crucial-roles-of-successful-it-leaders-pt2-driving-innovation/">Driving Innovation</a></p>



<p>Part 3 &#8211; <a href="https://itkombinat.com/five-crucial-roles-of-successful-it-leaders-pt3-managing-change/">Managing Change</a></p>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Navigating the Digital Landscape: Five Crucial Roles of Successful IT Leaders – Pt3 &#8211; Managing Change </title>
		<link>https://itkombinat.com/five-crucial-roles-of-successful-it-leaders-pt3-managing-change/</link>
		
		<dc:creator><![CDATA[Thomas Benz]]></dc:creator>
		<pubDate>Thu, 14 Dec 2023 09:13:33 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://itkombinat.com/?p=1156</guid>

					<description><![CDATA[IT Leadership - Managing Change]]></description>
										<content:encoded><![CDATA[
<p></p>



<h3 class="wp-block-heading">3. Managing Change</h3>



<figure class="wp-block-image size-large"><img decoding="async" width="900" height="1200" src="https://itkombinat.com/wp-content/uploads/MicrosoftTeams-image-4-1-900x1200.jpg" alt="" class="wp-image-1157" srcset="https://itkombinat.com/wp-content/uploads//MicrosoftTeams-image-4-1-900x1200.jpg 900w, https://itkombinat.com/wp-content/uploads//MicrosoftTeams-image-4-1-420x560.jpg 420w, https://itkombinat.com/wp-content/uploads//MicrosoftTeams-image-4-1-768x1024.jpg 768w, https://itkombinat.com/wp-content/uploads//MicrosoftTeams-image-4-1-1152x1536.jpg 1152w, https://itkombinat.com/wp-content/uploads//MicrosoftTeams-image-4-1-840x1120.jpg 840w, https://itkombinat.com/wp-content/uploads//MicrosoftTeams-image-4-1.jpg 1536w" sizes="(max-width: 900px) 100vw, 900px" /></figure>



<p>The IT landscape is dynamic, with constant changes in technology, regulations, and business needs. Leadership in IT involves not only anticipating these changes but also effectively managing them. Leaders must be agile, adaptable, and capable of steering their teams through transitions, whether it&#8217;s implementing new software, adopting agile methodologies, or adapting to the latest cybersecurity threats. A skilled IT leader can turn challenges into opportunities for growth.&nbsp;</p>



<p>Change management can seem to contradict some aspects of being a good leader. Humans often resist change and prefer fixed goals, strategies, and processes, so developing your team to be open for change can be a challenge. There are many books written on change management within organisations and many principles can be applied to smaller teams, such as clearly communicating the context surrounding the change, the impact and urgency of the change. If all you have for your team is “<em>Management has instructed us to do this</em>” then don’t expect a fully-motivated approach to implementation or adoption.&nbsp;</p>



<p>When implemented correctly, change management can actually strengthen your position as a leader and reinforce trust in you. So, ensure you have the full picture before communicating changes and also display your own readiness to embrace change – only then will you be able to motivate your team and have their full support during implementation.&nbsp;</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><em>“Leadership is an achievement of trust”</em> </p>
<cite>Peter Drucker</cite></blockquote>



<p>Check out previous parts of this blog series:</p>



<p>Part 1 &#8211; <a href="https://itkombinat.com/navigating-the-digital-landscape-five-crucial-roles-of-successful-it-leaders-pt1-visionary-guidance/">Visionary Guidance</a></p>



<p>Part 2 &#8211;<a href="https://itkombinat.com/five-crucial-roles-of-successful-it-leaders-pt2-driving-innovation/"> Driving Innovation</a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
