Take back control
This interactive panel will discuss the key issues, techniques and technologies needed to gain visibility and control in order to tame rogue devices ...
This interactive panel will discuss the key issues, techniques and technologies needed to gain visibility and control in order to tame rogue devices ...
The event, organised by IRM, runs from 19th to 21st May 2014
In June 2012, the Monetary Authority of Singapore (MAS) created a new set of guidelines based on Internet Banking and Technology Risk Management (TRM).
Most organisations have come to accept that it's no longer a matter of 'If' they'll be breached, but 'When'.
Securing your network against unwanted and unknown threats has become mission critical. Many organizations, however are in the dark...
Like most organizations, you've probably invested heavily in your SAP environment. Protecting this investment means ensuring that the underlying infra...
The emphasis has switched from a strategy of preventing breaches, to one of being able to detect them and respond faster
Are you getting the most value for money of your in-house IT model ... or your outsource model ... or your hybrid?
Results of recent survey of organisations in the UK and US
This meeting will address what CIOs are doing to build relevant and appropriate IT Strategies and how they are developing them in partnership with peers.