Use this tool to compile the results of a comprehensive information asset audit after defining your information domains, project scope, and ILM operating model.
|
|
Imagine a world in which carbon is a source of value rather than a bane. Imagine carbon dioxide returning to pre-industrial levels. Weather displaying more predictable...
|
|
The Real China Plan, Part II will focus on both PRC M&A activity and broader topics in expansion, including information warfare, export imbalances, industry and supply...
|
|
In this week's discussion, the team from Aptage has described a radical, and rational, new toolset for reducing risk and increasing potential success rates in that most...
|
|
In this week's discussion, we'll look at the arcane, slow-moving, very conservative market for servers, and at the chips that drive them, to find out what's really going...
|
|
Use the Information Security Requirements Gathering Tool to identify the organizational goals and compliance obligations that shape your security strategy and define its...
|
|
Leading organizations require a unified and validated view of business capabilities that aligns initiatives, investments, and strategy in order to compete in their industry.
|
|
This template will allow you to structure how your risk management groups, including the board of directors and the IT team, will function and own different process areas.
|
|
Use this role description template to create an Cloud Demand Billing & Accounting role for both on-premises and cloud environments.
|
|
Use this purpose-built project management workbook to help your infrastructure project leads succeed at their project management responsibilities without overwhelming...
|
|