The use and abuse of Personas for end-user computing strategies Strategy & Transformation / Joseph Sweeney The use and abuse of Personas for end-user computing strategies Read More »
Security awareness programs must seek more than mere awareness Cyber & Risk / James Turner Security awareness programs must seek more than mere awareness Read More »
Virtual Teams need new skills and behaviours Leadership & People / Peter Hall Virtual Teams need new skills and behaviours Read More »
The importance of recruiting for soft skills Leadership & People / Peter Bickerton The importance of recruiting for soft skills Read More »
Identify the baton holders for effective ICT service delivery IT Operational Excellence / Alan Hansell Identify the baton holders for effective ICT service delivery Read More »
Running IT-as-a-Service Part 28: IT-as-a-Service Procurement Maturity Model Strategy & Transformation / Wissam Raffoul Running IT-as-a-Service Part 28: IT-as-a-Service Procurement Maturity Model Read More »
Examples of Persona Templates Strategy & Transformation / Joseph Sweeney Examples of Persona Templates Read More »
IBRS SaaS Migration Methodology (Video) Strategy & Transformation / Wissam Raffoul IBRS SaaS Migration Methodology (Video) Read More »
Could IBRS assist with providing recommendations on DLP products? Cyber & Risk / James Turner Could IBRS assist with providing recommendations on DLP products? Read More »