Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Corporate Training

RSS Feed   
Corporate Training Reports
 
Technology Industry Survey 2014
sponsored by ComputerWeekly.com
RESOURCE: From CTOs to Software Developers, Enterprise Architects to digital entrepreneurs, this extensive report captures the opinions of people at the forefront of shaping what is next for our industry.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

Collaborative Learning in a Project Environment
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from ESI International explains how organisations can harness collaborative learning to drive better project management.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

ComputerWeekly.com

Executing your strategy 4: Synthesis
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This is the fourth of six part guide which explains the key steps of the Strategic Execution Framework, developed by the Stanford Advanced Management Programme.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Women in IT: Rebecca George
sponsored by ComputerWeekly.com
PRESENTATION: Rebecca George partner at Deloitte, offers career tips for women IT professionals in this presentation for Computer Weekly's Most Influential Women in IT awards.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

ComputerWeekly.com

BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

Women in IT: Labour shadow minister, Chi Onwura
sponsored by ComputerWeekly.com
PRESENTATION: Labour's shadow cabinet office minister, with responsibility for cyber security, Chi Onwura, gives her views on tackling the gender balance in this PowerPoint presentation.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

ComputerWeekly.com

Royal Bank of Scotland Reduces Phishing Susceptibility
sponsored by Proofpoint
CASE STUDY: The Royal Bank of Scotland (RBS) recognized that its email users presented a significant attack surface. As they began experiencing phishing attacks, RBS saw the need to educate their employees on the damage phishing attacks can cause. In this case study, learn how RBS was able to do this using Proofpoint Security Awareness Training.
Posted: 05 Jun 2019 | Published: 28 Feb 2019

Proofpoint

Big Data analytics: Adoption and employment trends
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The report is first of its kind to identify current and future adoption rates for big data by type and size of organisation in the UK with information supplied by 1,000 businesses across the country.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

Big Data and Content Analytics: measuring the ROI
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Early adopters of big data analytics are achieving good results that are helping to drive decision making in the business, this independent research by AIIM reveals.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

ComputerWeekly.com

Information Security Asean July 2015
sponsored by TechTarget ANZ
EZINE: Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info