Practices

Cyber Security Access Control

An Executive’s Guide to Identity and Access Management. An IBRS Special Report

The limited exposure of non-technical staff to the basics of identity and access management (IAM) can result in serious consequences for the organisation’s exposure to security breaches. This guide aims to bridge the knowledge gap in best practices for enterprises that need to develop a business case for IAM, and to realise its organisation-wide impacts.

Read More »
Cloud Computing

Disaster Recovery in the Cloud

The disaster recovery (DR) plan and DR preparedness can not be set and forget. This is as important when your ICT services are delivered in the Cloud as much as it is on-premise.

Read More »

Sourcing Monthly November 2022

This month we are still seeing the impact of recent cyber security incidents, together with organisations looking for transformational growth, and the need for projects that address the continuing skilled staff shortage.

Read More »

CIO Handbook – Part 4

The CIO handbook is designed to assist new CIOs in understanding their role, and experienced CIOs to consider whether they could do things differently.

Read More »

Search