User Centred Design or Design Thinking Leadership & People / Sue Johnston User Centred Design or Design Thinking Read More »
Running IT-as-a-Service Part 32: Efficiency gains demand process integration Strategy & Transformation / Wissam Raffoul Running IT-as-a-Service Part 32: Efficiency gains demand process integration Read More »
Can IBRS provide a Checklist for reporting to the Board on Cyber Security? Cyber & Risk / James Turner Can IBRS provide a Checklist for reporting to the Board on Cyber Security? Read More »
Cracking terror’s codes is becoming increasingly difficult for governments – The Australian – 23 June 2017 Cyber & Risk / James Turner Cracking terror’s codes is becoming increasingly difficult for governments – The Australian – 23 June 2017 Read More »
Australia’s decryption plan seen as untenable – Computer World – 21 June 2017 Cyber & Risk / James Turner Australia’s decryption plan seen as untenable – Computer World – 21 June 2017 Read More »
Mobile Security is really about risk and identity management – ZDNet – 7 June 2017 Cyber & Risk / Joseph Sweeney Mobile Security is really about risk and identity management – ZDNet – 7 June 2017 Read More »
Sourcing Monthly April 2017 – May 2017 IT Operational Excellence / Irene Pimentel Sourcing Monthly April 2017 – May 2017 Read More »
How to become the next CIO and remain there Leadership & People / Peter Bickerton How to become the next CIO and remain there Read More »
Use Market Scans to qualify ICT Vendors IT Operational Excellence / Alan Hansell Use Market Scans to qualify ICT Vendors Read More »