Business of Information Technology  >   Business Management  >   Project Management  >  

EPMO

RSS Feed   
EPMO Reports
 
How to Build Out Your Cybersecurity Technology Stack
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: For organizations beginning their journey towards establishing a cybersecurity program, there can be an overwhelming number of vendors to choose from. This white paper is designed to guide organizations as they begin their selection process by providing advice for what to look for when evaluating vendors and service providers.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Arctic Wolf Networks, Inc.

Manage your risk at the new U.S. Security Operations Center (SOC) in Columbia, S.C.
sponsored by Capgemini
RESOURCE: Security operations centers (SOCs) enable organizations to outsource their cybersecurity needs to experts who can monitor, identify and mitigate security threats. Continue to learn more about the new SOC in Columbia, SC, and leverage the perspective of experts at Capgemini as they discuss SOCs and the importance of cloud cybersecurity.
Posted: 17 Dec 2019 | Published: 17 Dec 2019

Capgemini

Executing your strategy 4: Synthesis
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This is the fourth of six part guide which explains the key steps of the Strategic Execution Framework, developed by the Stanford Advanced Management Programme.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Implementing Effective Cyberprotection Demands New Approaches
sponsored by NWN Corporation
WHITE PAPER: As cyberattackers become more skilled and launch harder-to-detect campaigns, organizations need to revise their security strategies to match the pace of modern attacks. Use this white paper to explore the 7 essential services that your chosen provider should include.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

NWN Corporation

Digital Transformation: Market Opportunity & Threats for MSPs
sponsored by PortSys
RESOURCE: In 2019, at least 13 managed service providers (MSPs) were compromised by ransomware. MSPs remain attractive targets for hackers, which will likely lead to a rise in breach attempts. So, can MSPs be trusted as secure partners? This blog post breaks down the market opportunity and potential security risk for MSPs.
Posted: 27 Feb 2020 | Published: 19 Feb 2020

PortSys

SANS 2019 Threat Hunting Survey: The Differing Needs of Hunters
sponsored by DomainTools
WHITE PAPER: In this year’s SANS Threat Hunting Survey, explore how threat hunting teams are tasked in an environment, where they hunt & how they hunt. The results of the study provide several key takeaways and action items to consider adopting for your hunting program. Download the report to unlock the insights.
Posted: 31 Jan 2020 | Published: 31 Oct 2019

DomainTools

Top 10 Project Management Trends for 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: A global panel of experts identify the top 10 trends in project management in 2013
Posted: 05 Jan 2012 | Published: 24 Jan 2013

ComputerWeekly.com

The global state of the project management office
sponsored by ComputerWeekly.com
IT BRIEFING: This global benchmarking study from ESI international identifies the key challenges and successes experienced by project and programme management offices (PMO) and draws recommendations for the future.
Posted: 05 Jan 2012 | Published: 05 May 2011

ComputerWeekly.com

Quantifying the Point Solution Nightmare
sponsored by Tanium
WHITE PAPER: Forrester, in partnership with Tanium, conducted research into the current state of security and operations tools, teams, and trends to quantify the complexity of endpoint security management and integration. Read on to uncover the results and conclusions.
Posted: 22 Nov 2019 | Published: 31 May 2019

Tanium

Who needs security orchestration, automation and response?
sponsored by SearchSecurity.com
EBOOK: Who needs SOAR? Only those companies with understaffed, overworked IT security teams. Or in other words; most security teams. Learn how SOAR tools can help ease the burden of required security tasks and free up security pros for more challenging IT security projects.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info