Published content from Applications & Infrastructure
Updated: 1 hour 21 min ago
This monthly recording covers topics such as cyberthreat and regulatory trends, nation states, and cyber criminals. This month we look at several topics including the Yahoo data breach, the KnockKnock campaign, and some recent security vulnerabilities you need to know about.
Read this Executive Brief to understand why a security policy program is fundamental for any organization who wants to improve their security posture.
This phase of the blueprint, Formalize Your Security Policy Program, will help you right-size your policy suite, acquire support, and formalize governing documents for the program.
This phase of the blueprint, Develop the Security Policy Suite, will help you customize your security policies to ensure they align with business requirements, corporate culture, and security requirements.
Use Info-Tech's Audit and Accountability Policy to specify the parameters for system monitoring, analysis and investigation of system activity.
Use Info-Tech's System and Information Integrity Policy to document the process of ensuring information is received and transmitted without flaws.
This phase of the blueprint, Implement the Security Policy Program, will help you communicate the new policies, track metrics, and ensure continuous improvement of the program.
Wi-Fi Protected Access II (WPA2) is the nearly ubiquitous standard protocol used to encrypt Wi-Fi traffic and secure wireless connections – and one of its vulnerabilities has been exploited. The good news is that the issue can be dealt with through a software patch.
Read this Executive Brief to understand why traditional methods of resource management are ineffective in the context of today's matrix organization-driven work environment and how our approach works to instill a culture of capacity awareness.
Balance Supply and Demand with Realistic Resource Management Practices – Phase 1: Take Stock of Organizational Supply and Demand
This phase of the blueprint, Balance Supply and Demand with Realistic Resource Management Practices, will help you assess the current state of your resource management practices and create realistic estimates of resource capacity supply and demand.
This tool will help you assess IT's overall resource capacity to execute project work relative to the organization's overall demand, both project and non-project.
Balance Supply and Demand with Realistic Resource Management Practices – Phase 2: Design a Realistic Resource Management Process
This phase of the blueprint, Balance Supply and Demand with Realistic Resource Management Practices, will help you articulate a new resource management strategy and build a process that implements it.
Use this template to record your resource management strategy including the standard operating procedures for the process that implements the strategy.
Use this workbook as a model for your homegrown resource management solution, which can also serve as a PPM solution. This is a lightweight version of Info-Tech's Portfolio Manager 2017.
Balance Supply and Demand with Realistic Resource Management Practices – Phase 3: Implement Sustainable Resource Management Practices
This phase of the blueprint, Balance Supply and Demand with Realistic Resource Management Practices, will help you set up a pilot to test the new resource management practice before rolling it out and proactively plan stakeholder engagement.
Invest time and energy into a pilot and lower implementation risk, enhance the details and steps within a process, and improve stakeholder relations prior to a full scale resource management practice rollout.
Use this template to present your resource management practice to stakeholders.
This monthly recording covers topics such as cyber threat and regulatory trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and exposure to vulnerabilities to help you better understand the cyber security impact to business.
This checklist helps you consider all implications on the IT organization from a holistic perspective.
Read this Executive Brief to understand why traditional "red books" are dead.