Formalize a monthly cadence schedule to actively collaborate both internally and externally with the necessary threat intelligence stakeholders.
|
|
Use this template to record the portfolio criteria and processes that will be used to ensure that the portfolio is organized according to strategic goals and within...
|
|
Use this template to identify new and changing processes in your future state environment.
|
|
Use this tool to compile the results of a comprehensive information asset audit after defining your information domains, project scope, and ILM operating model.
|
|
Imagine a world in which carbon is a source of value rather than a bane. Imagine carbon dioxide returning to pre-industrial levels. Weather displaying more predictable...
|
|
The Real China Plan, Part II will focus on both PRC M&A activity and broader topics in expansion, including information warfare, export imbalances, industry and supply...
|
|
In this week's discussion, the team from Aptage has described a radical, and rational, new toolset for reducing risk and increasing potential success rates in that most...
|
|
In this week's discussion, we'll look at the arcane, slow-moving, very conservative market for servers, and at the chips that drive them, to find out what's really going...
|
|
Use the Information Security Requirements Gathering Tool to identify the organizational goals and compliance obligations that shape your security strategy and define its...
|
|
Leading organizations require a unified and validated view of business capabilities that aligns initiatives, investments, and strategy in order to compete in their industry.
|
|