Business of Information Technology  >   Business Management  >   Project Management  >  

Program Management

RSS Feed   
ALSO CALLED: Program Management Office, Enterprise Program Management, EPMO, Enterprise Program Management Office, PMO
DEFINITION: Holistic management of a group of projects that is interrelated or interdependent to eliminate duplicate work and allow for staffing and decisions across these projects.
Program Management Reports
1 - 25 of 44 Matches Previous Page  |  Next Page
Can a zero-trust approach fill the security perimeter void?
sponsored by SearchSecurity.com
EBOOK: Zero-trust security means more than trusting nothing and no one. It's the best way devised yet to fill the void that the disappearance of the enterprise perimeter left. Learn what steps security pros need to take to implement an effective, zero-trust approach to IT security.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

SearchSecurity.com

The 2020 State Of Security Operations
sponsored by Palo Alto Networks
WHITE PAPER: A successful data breach can have devastating impacts – from loss of data to loss of customer trust and potential litigation. This Forrester report aims to identify and understand the challenges facing security operations (SecOps) teams as they work to manage the growing threat of sophisticated data breaches.
Posted: 01 Sep 2020 | Published: 30 Apr 2020

Palo Alto Networks

Future of the SOC Forces shaping modern security operations
sponsored by Chronicle
WHITE PAPER: The age of AI, IoT, cloud computing and other disruptive technologies has driven fundamental change in security operations approaches and objectives. This white paper explores 3 fundamental forces that are shaping the need to change threat management and SOCs – read on to learn more.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

Chronicle

Data Leakage: Today’s Whitelisted Applications Are Tomorrow’s Security Breaches
sponsored by Tala Security
RESOURCE: Recently, the research team at PerimeterX disclosed what appeared to be a CSP issue at Google. While CSP may have played a part, the incident revealed a fundamental security flaw with global implications. To learn more about this discovery, read on.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

Tala Security

Don’t Just Educate: Create Cybersafe Behaviour
sponsored by Mimecast
WHITE PAPER: Building a cyber-resilient culture involves more than a cut-and-paste security training program that ticks the compliance checklist. In this Forrester study, discover how applying proven behavioral science to SA&T programs can yield organization-wide cultural change and improve security at the people-level.
Posted: 23 Jul 2020 | Published: 30 Apr 2020

Mimecast

ALIGNING CYBER RISK MANAGEMENT WITH BUSINESS PERFORMANCE
sponsored by Coalfire
WHITE PAPER: Traditionally, the realm of cybersecurity was considered a technical issue to be solved by technical people. The mindset has changed, and organizations are looking to align cybersecurity objectives with business imperatives. Download this white paper to explore how CISOs can develop a plan to mitigate risks while optimizing resources.
Posted: 15 Jul 2020 | Published: 10 Jul 2020

Coalfire

Cyber Hygiene: If Tools Could Talk
sponsored by Merlin International
WHITE PAPER: The complexity of today’s IT infrastructures coupled with security tool fragmentation and misconfiguration makes cyber hygiene challenging for companies of all sizes. Download this white paper to learn more about how your organization can improve its cyber hygiene by conducting a self-evaluation of your current posture.
Posted: 29 May 2020 | Published: 15 May 2020

Merlin International

Knock, Knock: Is This Security Thing Working?
sponsored by VMware
WHITE PAPER: 2020 is close to its halfway mark, so now is the perfect time to reflect on the current progress of cybersecurity initiatives, as well as your security posture as a whole. This SANS whitepaper provides a closer look at key issues and emerging trends in the cybersecurity landscape in order to help gauge your progress and guide your planning.
Posted: 22 May 2020 | Published: 31 Mar 2020

VMware

The Economics of Cybersecurity: Preparing for Ransomware
sponsored by BlueVoyant
EBOOK: One of the most recent evolutions of malware is ransomware, and it’s not going anywhere. In fact, it’s grown to the point where businesses need to consider it an inevitability and prepare accordingly. This e-book is designed to help you identify the cybersecurity costs needed for building a proactive defense strategy. Read on to learn more.
Posted: 12 May 2020 | Published: 12 May 2020

BlueVoyant

How to Build A World-Class Cybersecurity Practice
sponsored by BlueVoyant
EBOOK: Cybersecurity is a constant chess match between organizations and criminals. As adversary tactics evolve, so too should the methods of the organization. This e-book offers the expertise of five BlueVoyant cybersecurity leaders with regards to today’s risks, which tools to use, and tips for building your security system. Read on to get started.
Posted: 07 May 2020 | Published: 07 May 2020

BlueVoyant

Cyber Resilience for Dummies
sponsored by Mimecast
EBOOK: Today’s organizations are more connected than ever – IoT and cloud technologies enable massive, interconnected ecosystems. In order to ensure the security of these fragile networks, security leaders are opting for cyber resilience practices. Download your copy of Cyber Resilience for Dummies to learn more about the cyber resilience imperative.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Mimecast

Machina Tools — SDKs
sponsored by Ionic Security
PRODUCT OVERVIEW: An issue plaguing today’s networks is the siloed approach to security and management, allowing hackers to exploit the gaps and enter your network. In this solution brief, take a closer look at Ionic’s Machina Tools, designed to close these gaps and unify your security strategy.
Posted: 05 Mar 2020 | Published: 05 Mar 2020

Ionic Security

5 Key Ways CISOs Can Accelerate the Business
sponsored by Splunk
WHITE PAPER: According to a Forrester study, the role of the chief information security officer (CISO) has changed. Today's CISOs are expected to weigh in on board-level security decisions and map out security programs that meet business objectives. Read on to discover 5 key practices CISOs can implement to help them on their security journey.
Posted: 04 Mar 2020 | Published: 04 Mar 2020

Splunk

Secure Everywhere: The Power of Integrated Internet, Endpoint & Email Security
sponsored by Cisco Umbrella
RESOURCE: Organizations today are struggling to find the resources needed to identify and address security gaps within their networks. This e-book is designed to help get you started by highlighting the challenges that lead to security gaps and overviewing the benefits of an integrated approach to security. Read on to learn more.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Cisco Umbrella

Office 365 and Microsoft 365: Security and Management
sponsored by Insight
WEBCAST: In this webinar, join security experts at Insight as they provide an overview of Microsoft 365 and Office 365; highlighting key differences between them, the importance of implementing security and management protocols, and key security tools that exist within the stack. Continue to watch the full webinar.
Posted: 28 Feb 2020 | Premiered: Feb 28, 2020

Insight

A Mandate to Execute a New Data Security Strategy
sponsored by Ionic Security
VIDEO: In this video panel, join Ionic Security experts as they discuss the age of rapidly increasing digital threats, the importance of a data-centric approach to security, the impacts of GDPR, and more.
Posted: 27 Feb 2020 | Premiered: 27 Feb 2020

Ionic Security

NEW for 2020: Ransomware Defense For Dummies - 2nd Edition
sponsored by Cisco Umbrella
EBOOK: The 2nd edition of Cisco Umbrella's popular Ransomware Defense For Dummies eBook explores the top cyber security best practices to reduce risks.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cisco Umbrella

Protecting Your Organization with Strong Security Controls
sponsored by OneNeck IT
WHITE PAPER: The Center for Internet Security (CIS) developed a standardized approach and set of best practices for businesses to use to identify their specific security requirements and develop a security strategy. This approach is known as the CIS Controls approach. Download this white paper to unlock the industry expertise outlined in the CIS Controls.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

OneNeck IT

Core - DNS - The fastest, easiest way to secure your network
sponsored by Cisco Umbrella
WHITE PAPER: IT leaders are under constant pressure to provide adequate security in an increasingly dangerous world. It can be difficult to sift through the countless security options to find a good fit for your strategy. In this white paper, take a closer look at Cisco Umbrella to determine if it would be a good fit for your team.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Cisco Umbrella

Cisco - From Privacy to Profit: Achieving Positive Returns on Privacy Investments
sponsored by Cisco Umbrella
WHITE PAPER: Privacy has become a critical business imperative, with organizations seeing significant ROI due to improvements in privacy and operational efficiency. Download this year’s Cisco Data Privacy Benchmark Study to take a closer look at the key findings around the benefits of data privacy.
Posted: 07 Feb 2020 | Published: 31 Jan 2020

Cisco Umbrella

How Government Agencies Can Enhance Security and Reduce Costs
sponsored by ServiceNow
WHITE PAPER: IT security teams in the public sector are challenged with providing security and innovation while driving down costs. Download this report to take a closer look at the challenges plaguing government agencies and discover a platform that can help to facilitate innovation without exhausting resources.
Posted: 06 Feb 2020 | Published: 31 Jan 2018

ServiceNow

Core - DNS - The Role of Predictive Intelligence in the Fight against Cyberattacks
sponsored by Cisco Umbrella
WHITE PAPER: The reactive nature of threat intelligence makes it difficult for organizations to keep pace with the increasing frequency of modern attacks. In this white paper, take a closer look at predictive intelligence and how you can monitor live activity to better anticipate when and where and attack will strike.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

Cisco Umbrella

The Value of Threat Intelligence
sponsored by DomainTools
WHITE PAPER: With over 80% of organizations reporting 1 or more security incidents over the past year, it’s safe to say that security issues are common. This study shows that while most organizations can defend against malware attacks, they fail against most other threats. Read on to view the results of Osterman’s study into the value of threat intelligence.
Posted: 05 Feb 2020 | Published: 30 Nov 2019

DomainTools

The IT Director's Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: When it comes to managing cybersecurity, IT leaders & their teams are at a disadvantage: As threat methods are increasing in frequency & complexity, security teams must ensure protection with limited resources. Download this checklist as you develop your cybersecurity strategy & make effective use of existing resources.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

Arctic Wolf Networks, Inc.

Auditing Your Company’s Use of Open Source
sponsored by Fossa
WHITE PAPER: As more and more companies continue to include open source as part of their software program, it’s critical to establish a strategy to manage consumption and ensure efficient use of resources. Download this guide for the key aspects of an open source strategy designed to keep you on track with your operational and compliance objectives.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Fossa
1 - 25 of 44 Matches Previous Page    1 2    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences