Business of Information Technology  >   Business Management  >   Project Management  >  

Enterprise Program Management Office

RSS Feed   
Enterprise Program Management Office Reports
 
A Mandate to Execute a New Data Security Strategy
sponsored by Ionic Security
VIDEO: In this video panel, join Ionic Security experts as they discuss the age of rapidly increasing digital threats, the importance of a data-centric approach to security, the impacts of GDPR, and more.
Posted: 27 Feb 2020 | Premiered: 27 Feb 2020

Ionic Security

Auditing Your Company’s Use of Open Source
sponsored by Fossa
WHITE PAPER: As more and more companies continue to include open source as part of their software program, it’s critical to establish a strategy to manage consumption and ensure efficient use of resources. Download this guide for the key aspects of an open source strategy designed to keep you on track with your operational and compliance objectives.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Fossa

How Government Agencies Can Enhance Security and Reduce Costs
sponsored by ServiceNow
WHITE PAPER: IT security teams in the public sector are challenged with providing security and innovation while driving down costs. Download this report to take a closer look at the challenges plaguing government agencies and discover a platform that can help to facilitate innovation without exhausting resources.
Posted: 06 Feb 2020 | Published: 31 Jan 2018

ServiceNow

7 Key Steps to Developing an Audit-Ready Security Program
sponsored by Ostendio
VIDEO: In this webinar, join the President and CEO of Ostendio as he provides a comprehensive overview of the 7 steps to developing an audit-ready security program, including key considerations for ensuring organization-wide buy-in. Watch now to get started.
Posted: 08 Jun 2020 | Premiered: 08 Jun 2020

Ostendio

Digital Transformation: Market Opportunity & Threats for MSPs
sponsored by PortSys
RESOURCE: In 2019, at least 13 managed service providers (MSPs) were compromised by ransomware. MSPs remain attractive targets for hackers, which will likely lead to a rise in breach attempts. So, can MSPs be trusted as secure partners? This blog post breaks down the market opportunity and potential security risk for MSPs.
Posted: 27 Feb 2020 | Published: 19 Feb 2020

PortSys

Top 10 Project Management Trends for 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: A global panel of experts identify the top 10 trends in project management in 2013
Posted: 05 Jan 2012 | Published: 24 Jan 2013

ComputerWeekly.com

Manage your risk at the new U.S. Security Operations Center (SOC) in Columbia, S.C.
sponsored by Capgemini
RESOURCE: Security operations centers (SOCs) enable organizations to outsource their cybersecurity needs to experts who can monitor, identify and mitigate security threats. Continue to learn more about the new SOC in Columbia, SC, and leverage the perspective of experts at Capgemini as they discuss SOCs and the importance of cloud cybersecurity.
Posted: 17 Dec 2019 | Published: 17 Dec 2019

Capgemini

California Federal Credit Union Bolsters Security & Compliance Using SOC-as-a-Service
sponsored by Arctic Wolf Networks, Inc.
CASE STUDY: In this case study, discover how Kern Schools Federal Credit Union, a financial institution in California, partnered with Arctic Wolf to establish a security program that allowed for comprehensive network visibility, robust reporting & flexibility to adapt – all while ensuring compliance.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Arctic Wolf Networks, Inc.

11 Best Practices for Peer Code Review
sponsored by SmartBear Software
WHITE PAPER: Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more.
Posted: 28 Aug 2012 | Published: 28 Aug 2012

SmartBear Software

Pacbase™ Transformation Factory Extending the life of your Critical Business Applications
sponsored by Hewlett-Packard Enterprise
PRESENTATION: Support for the CASE tool Pacbase will end in 2015, meaning your Pacbase-dependent business functions are at risk. In this resource, uncover new challenges that emerge as Pacbase support ends, and weigh your survival options in the post-Pacbase world.
Posted: 18 Apr 2013 | Published: 31 Dec 2012

Hewlett-Packard Enterprise
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info