|
Many organizations have cybersecurity policies in place but are unsure of their effectiveness. Learn how Info-Tech can help improve your policy suite to align with best...
|
|
|
At the same time as new IT infrastructure technologies are generating demand for new skills, old systems require care and support.
|
|
|
An effective IT strategy begins with a keen understanding of business goals and is completed by clearly illustrating how IT supports those business goals.
|
|
|
The enterprise architecture (EA) team is constantly challenged to articulate the value of its function. While there may be an IT strategy documented, no EA strategy exists...
|
|
|
The privacy compliance landscape is constantly shifting. Learn how to take a quantitative, operational approach to reducing your organization's privacy risk.
|
|
|
Organizational resilience today requires a new way of thinking about backups and disaster recovery.
|
|
|
Requirements inform and set the key business, product, and IT expectations that an upcoming project or change is intended satisfy. Apply the right analysis practices to...
|
|
|
Develop foundational practices in each of the following areas: portfolio management, project management, and organizational change management.
|
|
|
Organizations need security programs that are holistic, risk-aware, and business-aligned. Watch this webinar to learn how to create a successful security strategy.
|
|
|
This webinar provides guidance for IT on inventorying existing collaboration tools, aligning them to the organization's requirements, eliminating overlaps and filling in...
|
|