Latest Advisory
Words – it’s in the Way That You Use Them (Effective Communication For IT Leaders)
CIOs are more than IT leaders—they’re business strategists and change-makers. To lead digital transformations, they must master impactful communication.
Words – it’s in the Way That You Use Them (Effective Communication For IT Leaders)
CIOs are more than IT leaders—they’re business strategists and change-makers. To lead digital transformations, they must master impactful communication.
Modernising Analytics In The Cloud – Governance
Enterprise Cloud environments are best managed if proper data warehouse governance is implemented through procedures, policies, and processes that promote accessibility, serviceability, integrity, and security of data in the Cloud. How can organisations build effective data governance measures to ensure the consistency and trustworthiness of their stored information?
VENDORiQ: Google Ramps Up Cloud Regions in Asia Pacific
Google adds more Cloud regions to accelerate its services in the Asia Pacific region. IBRS explores how this impacts the local industries that leverage on Cloud or intend to do so as they prepare for a successful migration.
VENDORiQ: New Australian Data Sharing Scheme to Support Government Agencies and Universities
With the passing of the Data Availability and Transparency Act 2022, it is expected to make data sharing between government agencies and universities easier. How will this impact data usage and provision of potentially sensitive domestic data?
Maturity Models – What They Are and Why They Matter
These days, maturity models seem to be everywhere. IBRS alone has published scores of research articles utilising them. But what exactly are maturity models, what are they good for, and how can they be used effectively?
This article addresses what maturity models are and are not good for – a future article will address their use.
Implementing the ASD Essential 8 – A Practical Approach
A self-assessment against the Essential 8 Maturity Model is a practical first step in implementing a cyber security framework.