Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Continuing Education

RSS Feed   
Continuing Education Reports
 
Harnessing Business-Led IT
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues
Posted: 22 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

Key trends for IT leaders in 2016 Part I
sponsored by ComputerWeekly.com
EBOOK: Albert Ellis, CEO of recruitment company Harvey Nash Group, considers the key skill, careers and recruitment trends for 2016 in this PowerPoint presentation.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

ComputerWeekly.com

Driving Real Behaviour Change
sponsored by Proofpoint
EBOOK: There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.
Posted: 16 Oct 2020 | Published: 30 Jun 2020

Proofpoint

BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

Defining the Business Change Agenda
sponsored by ComputerWeekly.com
ANALYST REPORT: Is business transformation really the key to success ? This research from analyst group Freeform Dynamics offers some answers.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

Jim Norton: The boardroom view of IT
sponsored by ComputerWeekly.com
PRESENTATION: Jim Norton, former BCS president and chartered director, explains the 5 key roles of the CIO and offers tips to CIOs on building credibility with the board.
Posted: 07 Sep 2012 | Published: 05 Sep 2012

ComputerWeekly.com

The Deloitte CIO Survey 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This ground breaking study from Deloitte, based on a survey of 700 CIOs world wide, gives you the latest trends in IT spending, technology and business priorities and CIO's career aspirations.
Posted: 08 Nov 2013 | Published: 08 Nov 2013

ComputerWeekly.com

Governance of IT, an executive guide to ISO/IEC 38500
sponsored by ComputerWeekly.com
BOOK: This extract from the book: Governance of IT, an executive guide to ISO/IEC 38500, tells you the key things you need to consider before you start a project implementation.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

ComputerWeekly.com

How to Solve Security Problems Within Your Organization
sponsored by Wisegate
EGUIDE: Access this e-guide for expert insight on the need for risk management, and why data protection alone isn't enough. Click now to explore how proper education will enable a more robust and knowledgeable IT security team.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

Wisegate

Information Security ANZ July 2015
sponsored by TechTarget ANZ
EZINE: Analysts and security experts discuss the current risk factors in the ANZ region.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info