Info-Tech's Security Policy templates allow you to easily develop new policy documents.
|
|
Use the prefilled examples in this RFP Vendor Proposal Scoring Tool to assess which vendor proposal can best meet your infrastructure outsourcing services requirements in...
|
|
Use the Light Project Request Form if your intake processes require less friction.
|
|
If your organization designates people “project managers” but doesn’t allocate time to project management duties, you can use this blueprint to find the right balance of...
|
|
The tool is designed to identify the gaps in your organization’s service desk operation. The assessment includes metrics, processes, and technology.
|
|
Info-Tech's Security Policy templates allow you to easily develop new policy documents.
|
|
Use flowcharts and checklists to create effective SOP documents.
|
|
Developing a lean PM toolkit will free up PMs to focus on actually managing the project while still delivering accurate portfolio metrics.
|
|
Data stewards are designated employees with a mandate and accountability for improving the data quality and integrity in their particular business area or data silo. They...
|
|
This advanced guide is designed to assist in establishing and defining the project prioritization process. For organizations that warrant a formal process document, this...
|
|