Business of Information Technology  >   Business Management  >   Project Management  >  

Program Management

RSS Feed   
ALSO CALLED: Program Management Office, Enterprise Program Management, EPMO, Enterprise Program Management Office, PMO
DEFINITION: Holistic management of a group of projects that is interrelated or interdependent to eliminate duplicate work and allow for staffing and decisions across these projects.
Program Management Reports
1 - 25 of 83 Matches Previous Page  |  Next Page
Cyber Hygiene: If Tools Could Talk
sponsored by Merlin International
WHITE PAPER: The complexity of today’s IT infrastructures coupled with security tool fragmentation and misconfiguration makes cyber hygiene challenging for companies of all sizes. Download this white paper to learn more about how your organization can improve its cyber hygiene by conducting a self-evaluation of your current posture.
Posted: 29 May 2020 | Published: 15 May 2020

Merlin International

Knock, Knock: Is This Security Thing Working?
sponsored by VMware
WHITE PAPER: 2020 is close to its halfway mark, so now is the perfect time to reflect on the current progress of cybersecurity initiatives, as well as your security posture as a whole. This whitepaper provides a closer look at key issues and emerging trends in the cybersecurity landscape, in order to help gauge your progress and guide your planning.
Posted: 22 May 2020 | Published: 31 Mar 2020

VMware

The Economics of Cybersecurity: Preparing for Ransomware
sponsored by BlueVoyant
EBOOK: One of the most recent evolutions of malware is ransomware, and it’s not going anywhere. In fact, it’s grown to the point where businesses need to consider it an inevitability and prepare accordingly. This e-book is designed to help you identify the cybersecurity costs needed for building a proactive defense strategy. Read on to learn more.
Posted: 12 May 2020 | Published: 12 May 2020

BlueVoyant

How to Build A World-Class Cybersecurity Practice
sponsored by BlueVoyant
EBOOK: Cybersecurity is a constant chess match between organizations and criminals. As adversary tactics evolve, so too should the methods of the organization. This e-book offers the expertise of five BlueVoyant cybersecurity leaders with regards to today’s risks, which tools to use, and tips for building your security system. Read on to get started.
Posted: 07 May 2020 | Published: 07 May 2020

BlueVoyant

HID DigitalPersona® SSO for Microsoft® Office 365
sponsored by HID Global
PRODUCT OVERVIEW: Today’s enterprise leaders are realizing the value of cybersecurity (or rather, the cost of a data breach). To meet the demands of today’s cyberthreats, security leaders are embracing authentication protocols. Read this solution brief to learn more about the challenges of implementing strong authentication, and how to overcome them.
Posted: 29 Apr 2020 | Published: 29 Apr 2020

HID Global

Skybox Security Solutions
sponsored by Skybox Security
PRODUCT OVERVIEW: As cyberattacks continue to plague organizations through a growing number of vectors, cybersecurity needs become increasingly unique for each network. Read on to unlock this guide, which highlights the key features of each of Skybox Security’s offerings.
Posted: 24 Apr 2020 | Published: 24 Apr 2020

Skybox Security

Embrace Business Change with Cyber Confidence
sponsored by ProAct
WHITE PAPER: An analogy to help IT professionals think about cybersecurity is to compare it to a chess match. To be good at chess requires anticipating your opponents moves, thinking strategically to protect key pieces, and being adaptable to how the game changes. But, how does that translate to cybersecurity? Read on to find out.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

ProAct

Mastering the Art of Fearless Cyber Security
sponsored by ProAct
WHITE PAPER: Cybersecurity has grown to the point of being at the core of most business operations, decisions, and partnerships. Read this white paper and discover a proactive approach to security that can ensure your organization is equipped with the focus, knowledge and skills to tackle modern security threats.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

ProAct

Navigate the Cybersecurity Skills Shortage with Cyber Hygiene Automation
sponsored by Automox
WHITE PAPER: For today’s IT teams and the businesses that they support, the shortage of cybersecurity professionals is a growing concern. In fact, the global security workforce would need to grow by at 145% to meet current demand. This white paper explores how organizations can address the skills gap in order to fine-tune their security approach.
Posted: 15 Apr 2020 | Published: 15 Apr 2020


The 4 Levels of Automated Remediation
sponsored by Egress Software Technologies Inc
WHITE PAPER: Automated remediation allows for organizations to save time and resources by automating security tasks that previously required manual attention. Contrary to popular belief, organizations don’t need to be at 100% automation on day 1. In this guide, discover the various levels of automation and learn how to choose the right one for you.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Egress Software Technologies Inc

Work from Home: An Application and Identity Management Guide
sponsored by EvolveIP
WHITE PAPER: Identity and access management (IAM) has enabled IT professionals to maintain security at scale, allowing organizations to continue their digital transformations. In this white paper, take a closer look into the methods and facets that make up IAM, as well as how to integrate remote workers.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

EvolveIP

Creating a Culture of Security
sponsored by TITUS
PRODUCT OVERVIEW: Effective security cultures are essential to an organization’s success. In order to compliment the investments made into security tools, executives need to encourage communication, feedback, and establish tactics for mitigating threats. This solution brief discusses how Titus may be able to help you get started.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

TITUS

Cyber Resilience for Dummies
sponsored by mimecast
EBOOK: Today’s organizations are more connected than ever – IoT and cloud technologies enable massive, interconnected ecosystems. In order to ensure the security of these fragile networks, security leaders are opting for cyber resilience practices. Download your copy of Cyber Resilience for Dummies to learn more about the cyber resilience imperative.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

mimecast

The Hard Truth About Winning Against Cyber Threats
sponsored by Dell SecureWorks
WHITE PAPER: When developing security strategies, today’s organizations make the mistake of being overly reliant on specific tools and technologies rather than focusing on hygiene and culture. This white paper overviews key characteristics of a hygienic security approach, and highlights 5 focus areas for developing a security strategy.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Dell SecureWorks

Encrypt Everything
sponsored by Thales
WHITE PAPER: Today’s IT security leaders are tasked with ensuring enterprise-wide protection for sensitive data. However, challenges arise due to data residing in various platforms (like on-prem systems or in the cloud). In this e-book, discover an overview of a data protection method along with best practices to ensure security.
Posted: 26 Mar 2020 | Published: 30 Nov 2019

Thales

Thales Data Protection on Demand
sponsored by Thales
CASE STUDY: In this e-book, discover a collection of case studies highlighting the data protection journeys of 4 organizations as they partner with Thales to ensure the security of their encrypted data. Read on to get started.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Thales

Splunk Security: Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: Ransomware is, unfortunately, an increasingly frequent and costly attack method. It’s a subset of malware that steals data and holds it ‘hostage’ until a ransom is paid. In this white paper, learn about detecting the early signs of compromise or malicious activity by following this step-by-step journey. Read on to get started.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Splunk

Machina Tools — SDKs
sponsored by Ionic Security
PRODUCT OVERVIEW: An issue plaguing today’s networks is the siloed approach to security and management, allowing hackers to exploit the gaps and enter your network. In this solution brief, take a closer look at Ionic’s Machina Tools, designed to close these gaps and unify your security strategy.
Posted: 05 Mar 2020 | Published: 05 Mar 2020

Ionic Security

5 Key Ways CISOs Can Accelerate the Business
sponsored by Splunk
WHITE PAPER: According to a Forrester study, the role of the chief information security officer (CISO) has changed. Today's CISOs are expected to weigh in on board-level security decisions and map out security programs that meet business objectives. Read on to discover 5 key practices CISOs can implement to help them on their security journey.
Posted: 04 Mar 2020 | Published: 04 Mar 2020

Splunk

Proofpoint Security Awareness Training
sponsored by Proofpoint
DATA SHEET: While security tools allow organizations to detect and block malicious emails, one of the most effective ways to address modern cyberattacks is to train your employees in threat detection. However, it can be difficult to develop a training program. Read on to learn more about Proofpoint’s Security Awareness Training program.
Posted: 03 Mar 2020 | Published: 03 Mar 2020

Proofpoint

Interactive Training Modules
sponsored by Proofpoint
WHITE PAPER: Employee awareness training remains one of the most effective aspects of a security strategy, but it can be difficult to develop an effective program. In this white paper, discover Proofpoint’s Security Awareness Training program’s key features and the various threat types it covers.
Posted: 03 Mar 2020 | Published: 03 Mar 2020

Proofpoint

Secure Everywhere: The Power of Integrated Internet, Endpoint & Email Security
sponsored by Cisco Umbrella
RESOURCE: Organizations today are struggling to find the resources needed to identify and address security gaps within their networks. This e-book is designed to help get you started by highlighting the challenges that lead to security gaps and overviewing the benefits of an integrated approach to security. Read on to learn more.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Cisco Umbrella

Reducing Government Budget Deficits by Attacking Fraud, Waste and Abuse
sponsored by SAS
WHITE PAPER: Government fraud is at an all-time high and growing rapidly. In fact, research shows that it accounts for roughly 10% of overall government spending. But what if governments could minimize deficits by eliminating fraud, waste and abuse? Download this white paper to discover the benefits of an enterprise approach to fraud.
Posted: 27 Feb 2020 | Published: 27 Feb 2020

SAS

Machine-Learning Automation to Ensure Zero Time to Mitigation
sponsored by Radware
WHITE PAPER: DDoS attack methods are evolving, and traditional protection solutions are ineffective at mitigating the damage dealt by these campaigns. This whitepaper highlights how combining machine learning with existing DDoS prevention tactics can ensure zero-time to mitigation. Read on to learn more.
Posted: 27 Feb 2020 | Published: 27 Feb 2020

Radware

A Mandate to Execute a New Data Security Strategy
sponsored by Ionic Security
VIDEO: In this video panel, join Ionic Security experts as they discuss the age of rapidly increasing digital threats, the importance of a data-centric approach to security, the impacts of GDPR, and more.
Posted: 27 Feb 2020 | Premiered: 27 Feb 2020

Ionic Security
1 - 25 of 83 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info