-
Notifications
You must be signed in to change notification settings - Fork 0
/
question.json
85 lines (85 loc) · 4.47 KB
/
question.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
[{
"text":"The company has a fully detailed and documented view of the total potential for IoT, and a vision of how IoT will impact their own industry and company, together with a range of alternative identified market development scenarios.",
"capabilities":["Identifying the potential"]
},
{
"text":"Our vision is set, owned and funded. We know how to engage with partners and we know what our competitors are doing in the IoT space.",
"capabilities":[""]
},
{
"text":"We have comprehensive and well tested processes in place for IoT idea development, evaluation, and initiation.",
"capabilities":""
},
{
"text":"We have a well developed perspective on IoT best practices and how to rethink and reengineer business models.",
"capabilities":""
},
{
"text":"Frameworks for managing governance and human resources in an IoT context exist and are well communicated within the business.",
"capabilities":""
},
{
"text":"The business solution life cycle is fully integrated into the strategic business planning process, including a feedback loop from project delivery into the business strategy function",
"capabilities":""
},
{
"text":"The IIoT solution design is based on industry best practices and is constantly optimized based on lessons learned from project implementations",
"capabilities":""
},
{
"text":"The project teams have all the capabilities needed for successful project delivery and the HR function constantly evaluates necessary skill uplifts for internal resources, while vendor management works with partners to ensure they are aware of the long-term skill set requirements of the organization",
"capabilities":""
},
{
"text":"The project management is fully alligned with other projects and all relevant BAU functions to enable the project to be delivered in scope, time, budget and quality required",
"capabilities":""
},
{
"text":"The IIoT solution in operation is constantly monitored against the defined performance requirements and the benefits are tracked against the business case.",
"capabilities":""
},
{
"text":"Data ownership, privacy, sovereignty and governanance are all subject to well-defined policies that are consistent across the business. The company has a good understanding of current (and future) laws and regulations in all markets in which it operates.",
"capabilities":""
},
{
"text":"locations, together with associated SLAs and trustworthiness metrics. The company understands the limitations of avaialble data, and how the systems landscape can be changed to support new IoT applications.",
"capabilities":""
},
{
"text":"The company maintains a list of approved technologies and techology providers. How these technologies work together is well understood and the day-to-day performance levels of IoT technology are monitored and tested against prescribed standards.",
"capabilities":""
},
{
"text":"The company has a comprehensive understanding of the relevant standards in the market and is well engaged with relevant standards bodies. Legacy deployments are actively managed towards the current environment.",
"capabilities":""
},
{
"text":"The company operates a platform-of-platforms strategy, drawing in contributions from partners with differentiated capabilities in line with a clearly defined and well managed platforms strategy.",
"capabilities":""
},
{
"text":"Risk and compliance management is applied consistently across the enterprise and based on a risk management strategy which is aligned with the strategic objectives of the organization",
"capabilities":""
},
{
"text":"All physical assets are identfied, secured, have owners and a defined change management process. An asset management strategy is in place.",
"capabilities":""
},
{
"text":"The organization has a sophisticated identity and accesss management, based on industry best practices and driven by the requirements of the defined security requirements for resources.",
"capabilities":""
},
{
"text":"The threats and vulnerabilities for the organization are well understood and preventative measures as well as incident handling processes are in place.",
"capabilities":""
},
{
"text":"The workforce is aware and trained to deal with all envisioned security risks and incidents",
"capabilities":""
},
{
"text":"The whole value network of the organization is actively engaged in preventing and mitigating security risks, as well as in handling security incidents. ",
"capabilities":""
}
]