dinsdag 3 december 2013

John Colley: What's needed for effective security


By 


John Colley, Managing Director of (ISC)2 EMEA regularly publishes on Infosecurity Voice. His latest post claimed that “governance, risk management and compliance are not enough on their own”.
In the past few years, staffing, talent search and development have become increasingly significant to all industries and IT security is no exception. Given the importance of the matter, senior security executives should take the time and extensively  scrutinize new talent.
Without new talent and further development of existing personnel in the IT security field, you may have to deal with very serious consequences. Since cyber security challenges are rapidly-evolving alongside the non-stopping emergence of new technologies, companies and IT security professionals must try very hard to stay ahead of the curve.

According to a new report released by (ISC)2, based on responses from more than 1,600 c-level executives globally, the senior C-suite is aware of the security threats, but because they are busy reacting to organisational and compliance requirements, they cannot find the time to put adequate measures in place to effectively deal with security issues. 
Governance, risk management and compliance (GRC) policies take up nearly 3/4 of senior security executives’ time; especially in the fields of financial services, banking, insurance and government.
About the Author:        
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry. 

woensdag 27 november 2013

Are you keeping your work devices safe?


By 


BYOD (Bring Your Own Device) policies have been causing sleepless nights to IT managers and company executives, ever since they became popular. However, a recent survey, conducted in the UK, reveals that there is something even worse than employees using their own devices for work. What do you think it is? It’s employees using and losing their work devices. Information Age collected some shocking numbers from a recent survey of 2,500 UK adults, by Vision Critical and Trend Micro.

The most disturbing news to IT managers is that over one quarter (27% to be exact) of participants have reported having up to three work devices lost or stolen, while only 11 per cent have ever lost a personal device.

But the so-called “culture of carelessness” goes far beyond losing devices. Although 31% of participants use wireless hotspots regularly, less than half of them (44%) check security levels of networks before using them. The same percentage said they are more worried about losing personal content, such as photos, videos or banking details, than sensitive business data. Only 3% were concerned about letting cybercriminals access corporate information.

Rik Ferguson, global VP of security research at Trend Micro said: “The survey shows a worrying attitude of carelessness towards work devices and an ignorance of the full impact of losing data without the correct security measures being put in place.”

“Employees should take the same amount of care with their work device as they do with their personal ones, and be made fully aware of the procedures and risks before a device is given to them.”

About the Author:       
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry. 

vrijdag 8 november 2013

Hacker Halted Europe Interviews - Eric Svetcov


By 


In October, EC-Council’s Hacker Halted took place in Europe for the first time. Firebrand attended the conference in Reykjavik, Iceland and interviewed industry professionals about the hottest topics of cyber security.

Eric Svetcov is the CSO at MedeAnalytics, a leading company specialising in healthcare performance management solutions. At Hacker Halted Europe, his presentation focused on Cloud Computing and Critical Infrastructure Protection.

Svetcov explained that the dependence on Cloud Computing solutions is expanding rapidly and changing the ways of defending critical infrastructure. He also emphasised that understanding new risks and applying appropriate risk management are crucial, in order to control and deal with risks within the organisation.

To see what else he spoke about and how COBIT and ISO 27001 can play a role in risk management, watch this video: 



About the Author:       
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry. 

woensdag 6 november 2013

What a cyber-attack could do to you


By 


Have you ever thought about what it’s like to get hacked? Investigative journalist Adam Penenberg has, so he hired a group of ethical hackers to find out how vulnerable his privacy is. The rules disallowed the hackers to do anything unlawful, for example breaking into Adam’s house, and they also had to leave his kids out of it. Besides these two conditions, the hackers, led by SpiderLabs founder Nicholas J. Percoco, were allowed all techniques to breach Penenberg’s privacy as much as possible.

“It’s my first class of the semester at New York University. I’m discussing the evils of plagiarism and falsifying sources with 11 graduate journalism students when, without warning, my computer freezes. I fruitlessly tap on the keyboard as my laptop takes on a life of its own and reboots. Seconds later the screen flashes a message. To receive the four-digit code I need to unlock it I’ll have to dial a number with a 312 area code. Then my iPhone, set on vibrate and sitting idly on the table, beeps madly.
I’m being hacked — and only have myself to blame.” – extract from Adam L. Penenberg’s article.

Percoco and his team spent a few weeks trying to hack Penenberg and despite some difficulties in the early stages, their efforts eventually paid off. Within a relatively short time period, the hackers gained all the information, including passwords, usernames, credit card details, etc. that could ruin someone’s life for good.

Twitter account, Facebook profile, Amazon account, online banking, you name it. The hackers gained access to all of them. They even did a bit of shopping on Amazon and ordered 100 plastic spiders to Penenberg’s house, as a reminder of SpiderLabs.

At the end of the experiment Percoco gave a report to Penenberg, which listed their plans, as well as a log book of their progresses. To see the chilling results, read the full article

About the Author:       
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry. 

woensdag 30 oktober 2013

Hacker Halted Europe Interviews - Winn Schwartau


By 


In October, EC-Council’s Hacker Halted took place in Europe for the first time. Firebrand attended the conference in Reykjavik, Iceland and interviewed industry professionals about the hottest topics of cyber security.

Winn Schwartau, President and Founder of The Security Awareness Company, has been in the industry for over 30 years. He's one of the world’s top experts on IT security, privacy, cyber-terrorism and related topics. Mr Schwartau is also a renowned writer and speaker and at Hacker Halted Europe 2013 he talked about the topic of Bring Your Own Device (BYOD).

In his keynote speech, entitled “The ABC’s of BYOD”, Mr Schwartau spoke about the possible impact of poor mobile security and how insufficient Mobile Device Management (MDM) might result in serious legal consequences for your business.

Besides describing the potential threats faced by BYOD users, Mr Schwartau also discussed possible means of improving the security of mobile devices. To see what else he talked about, watch this video:


Have you watched our previous interviews? Check out the ones with EC-Council President Jay Bavisi and Facebook's Director of Security Operations, Jennifer Lesser

About the Author:       
Peter writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself.

donderdag 24 oktober 2013

Windows Service Centre Scam Calls Continue


By 

Scammers and con artists have been around for a long time. Although they might change their scams every once in a while, their intention stays the same: getting  your money.

This scam starts as follows: the phone rings and the caller – usually with a strong Asian accent – asks for the house owner, quoting their name and address before saying “I am calling from Microsoft’s Windows Service Centre. We’ve had a report from you service provider of virus problems on your computer.” 

After a couple minutes of research you can see that the following scam has been around for a long time. What’s so interesting about it then? It’s the fact that this time they called Firebrand’s Senior Microsoft Instructor, Mike Brown.

The caller, despite his strong accent, introduced himself as Richard Williams from the USA. He stated to have a long list of viruses that Mike’s computer had. In fact, he offered to prove it through the phone. He instructed Mike (funny, isn’t it?) to open Event Viewer and filter the application log to see all the error messages that were created by those so-called malicious programs on the computer. “Richard” told Mike that he had nothing to worry about, their tech department could fix it for him in no time but if the problem persisted, the "treatment" would be free. However, if the solution was successful and Mike was happy, he could pay a yearly fee of £112 to stay protected. Then Mike was given a URL address to access and download a file required to use the service.


Once the caller finished everything he wanted to say, Mike revealed himself. As a response he was transferred to a "senior manager", who began to question his expertise and quickly disconnected the call.

For more information on these calls read the Guardian’s articles - #1 and #2 - or listen to a real conversation in the following video:

 

Please be aware, share this information and don’t fall victim of this trick.

About the Author:       
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry. 

woensdag 23 oktober 2013

Hacker Halted Europe Interviews - Jennifer Lesser


By 


In October, EC-Council’s Hacker Halted took place in Europe for the first time. Firebrand attended the conference in Reykjavik, Iceland and interviewed industry professionals about the hottest topics of cyber security.

In this video Jennifer Lesser, Facebook’s Director of Security Operations speaks about her presentation on “Winning the Security Awareness Game”.

Ms Lesser talked about how Facebook turned its internal security awareness campaign into a game engaging everyone in the company. She explained that Facebook wanted to create a program that fit into its organisational culture. So they created “Hacktober”, a month-long event, when employees are encouraged to hack and protect themselves from getting hacked.

In the course of “Hacktober” Facebook simulates a series of attacks on its own network. These include malicious emails, breaching the company’s physical perimeter, phishing and more. To find out more about how Facebook turned security awareness into a company-wide game, watch the full interview. 



Click here to watch the first Hacker Halted Europe interview with EC-Council President, Jay Bavisi.

About the Author:       
Peter writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself.

donderdag 17 oktober 2013

Hacker Halted Europe Interviews - Jay Bavisi


By 


In October, EC-Council’s Hacker Halted took place in Europe for the first time. Firebrand attended the conference in Reykjavik, Iceland and interviewed industry professionals about the hottest topics of cyber security.

The first speaker is EC-Council’s co-founder and president Jay Bavisi, who recollects the main ideas of his speech - “The Cyber Security Quagmire: Finding the Panacea”.


His keynote presentation compared the obstacles faced by IT security companies to those faced by pharmaceutical companies. Mr Bavisi pointed out that while the pharmaceutical industry already managed to overcome diseases such as polio through vaccinations, the IT security industry struggles to achieve similar success against cyberspace threats.


He also mentioned that EC-Council would be launching new secure coding training courses, as well as a new E|CSA & L|PT exam in 2014. The new exam will be 100% practical, requiring students to perform a penetration test on EC-Council’s virtual bank.




Make sure you check back on the blog everyday, as we'll post more interviews from Hacker Halted Europe 2013.

About the Author:       
Peter writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself.

woensdag 16 oktober 2013

Firebrand Training Nordic breaks records and wins award


By 


Since 2009, Firebrand Training Nordic has grown by an extraordinary 1430% and became one of the five regional winners of 2013's Gazelle Awards.



However, it's not the only astonishing achievement associated with Firebrand. The company is the first and only partner, ever awarded the “Microsoft Training Partner of the Year” title in Denmark for 3 years in a row.

Managing Director Frank Højgaard said: “We’re constantly thinking about how to keep ourselves fresh and there is no doubt that our mix of ambition, courage and thoroughness creates results for our clients, while winning awards for us.”

He also added: "We are very proud to have created new jobs and sustainable growth in a time of crisis. Since we started the business here in the Nordic region we have doubled the number of our employees and there is nothing to suggest that growth stops here. We believe in our instincts and our product and we are not the ones that rest on our laurels."

In the upcoming years, Firebrand Training will open multiple offices in Sweden and further expand the capacity of its Training Centre in Helsingborg. 

About the Author:       
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry. 

donderdag 10 oktober 2013

More companies invest in Big Data


By 


Big Data is large and complex data that can challenge your traditional database systems. It's often described by the classic 3V model, which refers to high volume, high velocity and high variety. However, its definition is not carved into stone and thus there are many other aspects of characterising Big Data.  

Regardless of which description you decide to go with, one thing's for sure: Big Data became a big deal. According to Gartner, the world’s leading IT research and advisory company, more and more organisations will be using Big Data technology in the upcoming years. In fact, they found out that the number of companies investing in Big Data tech increased by 6% (from 58 to 64 per cent) since 2012. The results also showed that 19% intends to make an investment within the next 12 months, while a further 15% thinks about investing in the next two years.

Lisa Kart, research director at Gartner, said: “While there are many areas companies would like to address, a slightly different picture emerges when we ask about the priority of these categories.

Different industries have different priorities when it comes to Big Data. Industries that are driving the customer experience priority are retail, insurance, media and communications, and banking, while process efficiency is a top priority for manufacturing, government, education, healthcare and transportation organisations.”

James Riley, global head of innovation at HCL Technologies, commented:  “The excitement around Big Data quickly needs to be translated into business value to justify the not inconsiderable investments required. Big Data projects typically fail because organisations try to do too much too soon and don’t have the necessary underlying technological architecture or people to properly support it. So [they] need to fully understand what is possible with Big Data and how it can help them achieve their corporate goals.”

However, growing investments are not the only indicators of how important Big Data is becoming. To make good use of the massive amounts of information stored in data centres, IBM decided to open up its Accelerated Discovery Lab dedicated to Big Data-related research.



Laura Haas of IBM Research said that the lab’s prime purpose is to help people get insight out of their data faster than ever before. While saying that “it is still really hard to get the right kind of insight”, she stays confident that the lab can bring all the talent, skills and expertise together to tackle the arising difficulties. 

About the Author:       
Peter writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself.

woensdag 9 oktober 2013

What Windows Server 2012 R2 can do for your business

October 18 - the new version of Windows Server finally hits the stores along with other new Microsoft products. So let’s see what tech expert Mary Branscombe thinks about the new features. 

The new version has improved storage, virtualisation and high availability so your server systems can keep running. It provides wider support to users wanting to connect to your systems with Android, iOS, Windows or Windows RT devices.

These connections can use the new remote access in Windows Server 2012 R2; giving you the means to allow iOS, Android, Windows RT and Windows 8.1 users do a workplace join instead of joining your Active Directory.

First level: it gives you a record of connected devices and allows you to publish web apps through the Web application proxy so only your users get access.

Second level: lets you control settings on those devices – not as many as with Group Policy.

To further promote wider user support Microsoft, for the first time, is creating remote desktop clients for users of Android, iOS and Mac OS X, all available by the end of this month. 

Work Folders

If you have to access files from your server whilst on the go, without a remote connection, you’ll like the new Work Folders feature. It will sync a folder from a share on the office file server and update it with your changed documents, without you connecting via VPN.

Upon the release of Windows Server 2012 R2 the feature will work with Windows 8.1. But in the first half of 2014, the company will release clients for Windows 7 and iOS. However, Windows 8 users will be required to update to 8.1.

Work Folders still isn't a replacement for offline files, as it syncs the entire file when something changes, not just the changes. It also tries to sync the entire folder on the file server. It knows when there are too many files for your device and it will not attempt to copy them all, but for now, you cannot pick the files you want to sync unless you are willing to put them in a separate folder.

As future Windows Server updates arrive, selective sync is a top priority on the Work Folders team’s to-do-list – however we're not expecting the next version of Windows Server to arrive as quickly as R2 did.

What's an R2 release?

Principal program manager Jeff Woolsey said: "The way we think about R2 is that we're going to keep the kernel changes to a minimum and we're going to be very surgical about that. We will include new code, but we won't make wholesale changes to the kernel." So basically you get new features, but the R2 version does not cost as much as a completely new version (where the year changes) would.  

For instance, if you have client access licences for Server 2012 features, you don't need to buy more CALs. Plus if you purchase Windows Server on a volume licence (available to small businesses too) the upgrade is free. Otherwise Windows Server 2012 R2 Standard and Essentials are the same price as Server 2012. If you need more cloud features and you also want to give your users increased mobile options R2 seems like the logical upgrade, if your budget and schedule allow.

To see what Mary wrote about adding Azure to the new version, read her full article here.

dinsdag 8 oktober 2013

Microsoft Insights 2013 - expert panel


By 


Do you want to broaden your skills or kick-start your new career in the field of technology? Do you have some burning questions to ask? Join IT Pros, Developers, Students, Educators, and Partners on the Microsoft Insights 2013 online event on October 29. In this dynamic and interactive panel discussion you’ll learn about emerging opportunities in technology, their earning potential and the ways of getting the skills needed.



This expert panel will feature senior executives from DicePayscale.com and the Center of Excellence for Information & Computing Technology, to share their views on technology employment trends and how you can exploit these new opportunities.

If you want to know how to succeed in the field of technology, participate in this live event on October 29 at 5.00 PM CET. Registration is free and now open.

About the Author:       
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry. 

dinsdag 1 oktober 2013

Keep your IT infrastructure simple

A lot of small companies put great effort into creating an IT infrastructure that's easy to manage, understand and maintain. However, without regular checks they can quickly become large, slow, complex, problematic and difficult to maintain. In order to avoid the frustration and rising management costs caused by an infrastructure gone off the leash, it’s worth thinking about regular revision and keeping it as simple as possible.

Think about the following to maintain an efficient IT infrastructure:

Retire old servers

You would be surprised to hear how many firms leave old servers running, even when they became completely irrelevant to the day-to-day activities of the infrastructure. It may be easier to solve problems with more hardware, but consider making use of your existing hardware before doing so. A reduction in the number of servers will save your company time, effort and of course money.

Reduce application sprawl

It’s not hard to lose track of all the applications running in the background and then comes the shock: You have too many of them, causing you rising costs and increasing complexity. Monitor all running applications, and see which ones are essential and which ones can be replaced by existing alternatives.

Cabling is enabling

Cabling gets little consideration, if any at all. But it’s more important than you would believe. Imagine you are installing new servers and devices, and suddenly your data center became a labyrinth of cables. Your IT team will have a hard time with maintenance and fixing potential problems.

Relocate to the cloud

The easiest way of keeping IT infrastructure simple is by having someone else take care of it. Moving everything to the cloud will take the burden off of your shoulders, but then again it’s worth doing some research on how cloud computing can help you best.

For further information check out Modern Infrastructure

vrijdag 13 september 2013

Firebrand maakt de winnaar van Free Training For Life bekend


By 


Afgelopen maart ging onze Free Training For Life competitie van start. De prijs was onbeperkte toegang tot ons hele portfolio met cursussen, voor de rest van je leven.

Na zeven maanden en meer dan 18.000 inzendingen, is het nu dan eindelijk zover. Met genoegen kondigen we de winnaar aan. Misschien zal hij ooit het wereldrecord van de meest gekwalificeerde persoon ooit verbreken?

En de winnaar is...

Gefeliciteerd, Joseph Guthrie!

Joseph is een Eindgebruiker Support Executive bij The Cloud, in St Albans, Engeland. Vanaf nu zal hij voor de rest van zijn leven zoveel Firebrand cursussen gratis kunnen bijwonen als hij wil.



In het volgende korte interview laat Joseph weten hoe hij zich voelde toen hij het nieuws hoorde en wat zijn toekomstplannen nu zijn, nu iedere cursus die hij maar kan bedenken voor het oprapen ligt.

Firebrand: Wat was je reactie, toen je het nieuws hoorde?

Joseph: "Ik kon niet geloven dat ik Free Training For Life gewonnen had. Het duurde het hele weekend voordat het daadwerkelijk tot me doordrong. Tot dan toe waren mijn gevoelens een mix van blijdschap, opgetogenheid en ongeloof. Toen ik de omvang van deze prijs echt doorhad voelde ik niets dan opgewondenheid en verwachting."

Firebrand: Wat betekent het voor je, dat je FTFL gewonnen hebt?

Joseph: "Ik verwacht dat ik over een jaar of 10 directeur zal zijn. Firebrand heeft me een geweldige kans gegeven dit waar te maken. De rest hangt van mijn eigen inzet af."

Firebrand: Welke cursus ben je van plan eerst te volgen, en waarom?

Joseph: "De eerste cursus die ik graag wil volgen is de Certified Ethical Hacker cursus. Dat is iets dat ik altijd al heb willen doen. De beste parallel die je aan hacken kunt trekken is Star Wars. Er is de goede zijde van de kracht, en de duistere zijde van de kracht. Ethical hacking zit aan de goede zijde, en daar wil ik graag bij horen."

CEO Robert Chapman: "Free Training For Life overspoelde heel Europa, met meer dan 18.000 inzendingen uit meer dan 24 landen. We staan versteld van hoe populair de competitie is, en ook laat het zien dat er onder Europeanen een enorme honger naar het leren van vaardigheden heerst. We kijken ernaar uit om Joseph bij onze trainingscentra te verwelkomen. Hoeveel certificaten hij ook maar wil, voor hem staan Firebrand’s deuren wijd open."

Zorg ervoor dat je deze website in de gaten houdt en van Joseph's vooruitgang op de hoogte blijft. 

About the Author:        
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry. 

woensdag 7 augustus 2013

Kodu - Teach your kids to code the fun way


By 


Kodu logoIt’s not an easy job to teach kids the complexities of coding, unless you do it the fun way with games like Kodu.

Kodu is a visual programming tool developed by Microsoft’s FUSE Labs which allows any user to create and design their own game. The games aim is to teach basic programming skills to children, whilst they are playing on their PCs or Xbox to improve the big skills gap in IT.

Kodu was recently mentioned in Microsoft’s WPC 2013 conference and has gotten a lot of attention in the press.

Anyone can create a game let it be young children or adults. It’s simple to use, fun and requires no design or programming skills. According to FUSE Labs “Kodu Teaches more than Programming”:

  • It’s a rich tool for narrative creation and storytelling
  • Demonstrates that programming is a creative medium
  • Helps children with critical thinking, breaking a complex goal into manageable steps
  • Introduces the logic and problem solving of programming
  • Introduces conditions and sequences, which teaches cause and effect
  • Students learn about cooperation, logic and creativity in addition to programming





Bill Gates, Mark Zuckerberg and Jack Dorsey, three of the brightest, most inspirational and lets not forget richest tech leaders of our generation have one thing in common; they all learnt to code from a very young age. Here’s an inspirational video on coding that went live earlier this year on “what schools don’t teach”.


You can check out the original video on Code.org's YouTube page - What most schools don't teach

About the Author:        
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry. 

vrijdag 3 mei 2013

Survey: Is Cloud vital to the success of a company?



By 


CFO and Google, recently did a survey on senior financial executives in U.S companies and found that the majority of executives see cloud as an asset for their companies.

80% of those questioned believe that the success of their companies relies heavily on cloud computing strategies and will be vital for the coming 12 to 18 months.

The survey also found that 70% said they are saving more money due to lower hardware-related costs. In addition, two-thirds of executives said they have reduced their companies’ operational costs by 20%.

Matt Surka, the research editor at CFO Research stated that “The cloud certainly offers cost savings, but finance executives are most interested in using the cloud to redirect IT resources to high-value activities — not strip resources out of IT."

It was also found that over 70% of respondents stated that cloud improved employee’s mobility, increasing their productivity. This survey was based on 310 electronic study responses.

Do you believe cloud technology will have a considerable impact on your company in the near future?

About the Author:
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry.

woensdag 23 januari 2013

What is Six Sigma?


So, what is Six Sigma, and why it's so popular?

Six Sigma Logo
Six Sigma is a business management strategy that provides quality management methods, which go from business and cost-benefit analysis, thought-process mapping customer surveys, to control charts and regression analysis.

Six Sigma puts on measurements as the starting point of culture change and decision making processes, which is what makes it different from other business models.

There are four different levels of Six Sigma - Yellow Belt, Green Belt, Black Belt and Champion:

Yellow Belts have basic knowledge of Lean Six Sigma, and usually carry out performance improvements within their teams.


Green Belts are certified and trained at a more advanced level of Lean Six Sigma. They tackle change within their business in addition to their other responsibilities. 

Black Belts are trained at an even more advanced level and are fluent in the use of the Lean Six Sigma approach and tools. They deliver major performance or efficiency transformations for a business. They usually are Change Leaders for a business.

Champions are those that sponsor performance improvement projects. They are usually managers of processes and business areas that are trained to pinpoint where transformations / improvements are needed to and help remove barriers to the implementation of changes.

The Six Sigma method has had great success and is widely used by all types of organizations. Demand for Six Sigma Green Belt and Black Belt certifications has increased dramatically at Firebrand Training especially with the combination of the Green Belt and Black Belt, which will get you both the certifications in just 10 days.

George Eckes gives an effective explanation and introduction of what Six Sigma is through the video below.


He uses an interesting story called 3 blind men and an elephant to describe why Sig Sigma is so important. The story goes like this: 

Three blind men touch different parts of the elephant and draw very different conclusions. One touches the tusk and says it’s a spear; the other touches his torso and says it’s a wall, and the third blind man touches the tail and says it’s a snake.


The point of the story is that depending on your perspective and viewpoint, it can mean very different things. Six Sigma is a metric, it’s an improvement methodology, it’s a management philosophy and it creates a common language throughout the whole organisation.

You can watch his introduction to Six Sigma in this two part video: