Infotech

Subscribe to Infotech feed
Published content from Applications & Infrastructure
Updated: 1 hour 21 min ago

Threat Landscape Briefing – November 2017

15 hours 50 min ago
This monthly recording covers topics such as cyberthreat and regulatory trends, nation states, and cyber criminals. This month we look at several topics including the Yahoo data breach, the KnockKnock campaign, and some recent security vulnerabilities you need to know about.

Develop and Deploy Security Policies – Executive Brief

Mon, 13/11/2017 - 05:00
Read this Executive Brief to understand why a security policy program is fundamental for any organization who wants to improve their security posture.

Develop and Deploy Security Policies – Phase 1: Formalize the Security Policy Program

Mon, 13/11/2017 - 05:00
This phase of the blueprint, Formalize Your Security Policy Program, will help you right-size your policy suite, acquire support, and formalize governing documents for the program.

Develop and Deploy Security Policies – Phase 2: Develop the Policy Suite

Mon, 13/11/2017 - 05:00
This phase of the blueprint, Develop the Security Policy Suite, will help you customize your security policies to ensure they align with business requirements, corporate culture, and security requirements.

Audit and Accountability Policy

Mon, 13/11/2017 - 05:00
​Use Info-Tech's Audit and Accountability Policy to specify the parameters for system monitoring, analysis and investigation of system activity.

System and Information Integrity Policy

Mon, 13/11/2017 - 05:00
​Use Info-Tech's System and Information Integrity Policy to document the process of ensuring information is received and transmitted without flaws.

Develop and Deploy Security Policies – Phase 3: Implement the Security Policy Program

Mon, 13/11/2017 - 05:00
This phase of the blueprint, Implement the Security Policy Program, will help you communicate the new policies, track metrics, and ensure continuous improvement of the program.

WPA2 KRACK Attack Zero-Day: Threat Information Deck

Wed, 25/10/2017 - 05:00
Wi-Fi Protected Access II (WPA2) is the nearly ubiquitous standard protocol used to encrypt Wi-Fi traffic and secure wireless connections – and one of its vulnerabilities has been exploited. The good news is that the issue can be dealt with through a software patch.

Balance Supply and Demand with Realistic Resource Management Practices – Executive Brief

Wed, 18/10/2017 - 05:00
Read this Executive Brief to understand why traditional methods of resource management are ineffective in the context of today's matrix organization-driven work environment and how our approach works to instill a culture of capacity awareness.

Balance Supply and Demand with Realistic Resource Management Practices – Phase 1: Take Stock of Organizational Supply and Demand

Wed, 18/10/2017 - 05:00
This phase of the blueprint, Balance Supply and Demand with Realistic Resource Management Practices, will help you assess the current state of your resource management practices and create realistic estimates of resource capacity supply and demand.

Resource Management Supply-Demand Calculator

Wed, 18/10/2017 - 05:00
This tool will help you assess IT's overall resource capacity to execute project work relative to the organization's overall demand, both project and non-project.

Balance Supply and Demand with Realistic Resource Management Practices – Phase 2: Design a Realistic Resource Management Process

Wed, 18/10/2017 - 05:00
This phase of the blueprint, Balance Supply and Demand with Realistic Resource Management Practices, will help you articulate a new resource management strategy and build a process that implements it.

Resource Management Playbook

Wed, 18/10/2017 - 05:00
Use this template to record your resource management strategy including the standard operating procedures for the process that implements the strategy.

Portfolio Manager Lite 2017

Wed, 18/10/2017 - 05:00
Use this workbook as a model for your homegrown resource management solution, which can also serve as a PPM solution. This is a lightweight version of Info-Tech's Portfolio Manager 2017.

Balance Supply and Demand with Realistic Resource Management Practices – Phase 3: Implement Sustainable Resource Management Practices

Wed, 18/10/2017 - 05:00
This phase of the blueprint, Balance Supply and Demand with Realistic Resource Management Practices, will help you set up a pilot to test the new resource management practice before rolling it out and proactively plan stakeholder engagement.

Process Pilot Plan Template

Wed, 18/10/2017 - 05:00
Invest time and energy into a pilot and lower implementation risk, enhance the details and steps within a process, and improve stakeholder relations prior to a full scale resource management practice rollout.

Resource Management Communications Template

Wed, 18/10/2017 - 05:00
Use this template to present your resource management practice to stakeholders.

Threat Landscape Briefing – October 2017

Fri, 13/10/2017 - 05:00
This monthly recording covers topics such as cyber threat and regulatory trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and exposure to vulnerabilities to help you better understand the cyber security impact to business.

IT Implications Checklist

Thu, 05/10/2017 - 05:00
This checklist helps you consider all implications on the IT organization from a holistic perspective.

Document and Maintain Your Disaster Recovery Plan – Executive Brief

Fri, 29/09/2017 - 05:00
Read this Executive Brief to understand why traditional "red books" are dead.