Understanding GDPR requirements – Part 3 Cyber & Risk / Peter Hall Understanding GDPR requirements – Part 3 Read More »
Three levers tightening up the cyber security of Australia Cyber & Risk / James Turner Three levers tightening up the cyber security of Australia Read More »
IT management leadership role in risk management Cyber & Risk / Alan Hansell IT management leadership role in risk management Read More »
Activities of successful business analysts Leadership & People / Peter Bickerton Activities of successful business analysts Read More »
Running IT-as-a-Service Part 41: Understanding private Cloud transition critical success factors Strategy & Transformation / Wissam Raffoul Running IT-as-a-Service Part 41: Understanding private Cloud transition critical success factors Read More »
PMO – Models and structures Project Assurance / Sue Johnston PMO – Models and structures Read More »
Can IBRS provide information on the establishment and maintenance of multi-lingual Web sites? Strategy & Transformation / Joseph Sweeney Can IBRS provide information on the establishment and maintenance of multi-lingual Web sites? Read More »
Canberra-based Azure is about much more than security Strategy & Transformation / Joseph Sweeney Canberra-based Azure is about much more than security Read More »