It Governance offentlig
[search 0]
Mer

Download the App!

show episodes
 
Manuel W. Lloyd is a top industry Virtual CIO helping healthcare and banking businesses achieve customer-vendor alignment, IT governance, and data security while avoiding costly and embarrassing data breaches. The program is supported by Holiday Delta, Inc dba Dominos Pizza, JTV Management, & Manuel W. Lloyd Consulting®
 
Loading …
show series
 
Preston Bukaty is an attorney and consultant. He specializes in data privacy GRC projects, from data inventory audits to gap analyses, contract management, and remediation planning. His compliance background and experience operationalizing compliance in a variety of industries give him a strong understanding of the legal issues presented by interna…
 
The world of work is changing. Many employees no longer hold the traditional nine-to-five job. Instead, working time is increasingly flexible. Technology has enabled a rapid rise in the number of remote workers in recent years; the TUC estimates that the number of UK people working from home increased by a fifth in the ten years to 2018, and now st…
 
The increase in commercial aviation and international travel means that pandemics now spread faster than ever before.Seasonal flu, zoonotic contagions such as Ebola, swine flu and avian flu (e.g. H5N1 and H7N9), respiratory syndromes such as SARS and MERS, and now COVID-19 (the 2019 novel coronavirus) have affected millions worldwide.Add the ever-p…
 
A new is book titled, A Guide to the Implementation and Auditing of ISMS Controls based on ISO/IEC 27001.Reasons why Bridget chose us to publish her book are:-because you're quite prominent in the marketplace and I can see what you're aiming to achieve which is, bridging the gap between what people need and what they think they need. If you know wh…
 
The modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organisational resilience. Accordingly, The Security Consultant's Handbook sets out a holistic overview of the essential core knowledge, emerging opportunities and approaches to corporate thinking that are increas…
 
Listen to an exclusive extract from Toomas Viira’s book Lessons Learned: Critical Information Infrastructure Protection – How to protect critical information infrastructure.The extract features Chapter 1: “Critical Infrastructure Services.” It explores what critical infrastructure services are, and how the definition of critical services changes ov…
 
In this exclusive interview, cyber security risk manager and IT auditor Toomas Viira discusses his book Lessons Learned: Critical Information Infrastructure Protection – How to protect critical information infrastructure and gives advice on how to protect your critical information infrastructure.Save 20% on Toomas' book if you order from the ITGP w…
 
In this exclusive interview, risk consultant and cyber security specialist Leron Zinatullin discusses the human aspects of information security and offers his advice for improving the security culture in your organisation.To save 20% on Leron's book, the Psychology of Information Security, order from the ITGP website by 31 January and enter code Ja…
 
In this podcast we are reading an extract from Alan Field's book, ISO 37001 - An Introduction to Anti-Bribery Management Systems. This extract will take you through the importance of why organisations should implement ISO37001:2016.As an early Christmas gift, receive a 20% discount on all Alan’s products when you enter the discount code FIELD20 at …
 
In our final interview with Alan Field, we discuss the importance of implementing an EnMS (energy management system) and what steps organisations should take to achieve certification.Receive a 20% discount on all Alan’s products when you enter the discount code FIELD20 at the ITGP checkout.https://www.itgovernancepublishing.co.uk/author/alan-field…
 
For this week’s podcast, Alan Field explains the differences between a gift and a bribe and he also discusses what plans an organisation should have in place for giving and receiving gifts from clients.20% discount on all Alan’s productsFor December only, save 20% discount on all Alan’s products when you enter the discount code FIELD20 at the ITGP …
 
Our first podcast in December is an interview with anti-bribery expert, Alan Field. In this interview he talks about his career to date and what he has lined up for ITGP in 2019.Save 20% on all of Alan’s productsFor December only, receive a 20% discount on Alan’s products when you enter the discount code FIELD20 at the ITGP checkout.https://www.itg…
 
In our final business continuity podcast, Robert reads a sample from his book Validating Your Business Continuity Plan. This extract emphasises the importance of exercising completed BCPs (business continuity plans).Receive a 20% discount on all Robert’s ITGP booksThis is your last chance to get 20% off Robert’s books. Use discount code BCM20 at th…
 
Robert Clark reads an extract from his book, Business Continuity and the Pandemic Threat in our latest podcast. He discusses the distinct characteristics of a pandemic and how the public often confuses a pandemic for an epidemic.20% discount on all Robert’s ITGP booksFor November only, save 20% on Robert’s books when you enter discount code BCM20 a…
 
In this week's podcast, we’re reading a passage from In Hindsight – A compendium of Business Continuity case studies. The extract shows the smaller threats that could still have a massive impact on your business continuity effectiveness.Save 20% off all of Robert’s ITGP books this November when you use discount code BCM20 at the checkout. Find the …
 
In the second episode of Robert Clark's interview, he shares his top tip for organisations trying to create a business continuity plan. We then discuss one of his bestselling titles with ITGP, Business Continuity and the Pandemic Threat.20% off all Robert’s ITGP booksReceive a 20% discount on all of Robert’s ITGP books this November when you use di…
 
Listen to our latest interview with Business Continuity expert and ITGP author, Robert Clark.In the first part of the interview, Robert discusses his career to date and how he began writing books for ITGP.For November, receive 20% discount on Robert's ITGP books when you use the code BCM20 at the checkout.His books can be found here: https://www.it…
 
In this podcast we are releasing an extract from one of our bestselling books, ISO27001/ISO27002:2013 – A Pocket Guide, discussing the seven steps that must be followed when carrying out an ISO 27001 risk assessment.Purchase this book or any other Alan Calder product in October to get a 15% discount when you use code Calder15 at the checkout.https:…
 
This book extract from the NIST Cybersecurity Framework: A Pocket Guide, will take you through the benefits of implementing the NIST (National Institute of Standards and Technology) CSF (Cybersecurity Framework).Receive a 15% discount on the NIST Cybersecurity Framework: A Pocket Guide when you use the code, CALDER15 at the checkout in October only…
 
To celebrate the release of our new audiobooks, we’re giving away an exclusive clip from one of our bestselling titles, Nine Steps to Success – An ISO27001:2013 Implementation Overview.Get 15% off this audiobook when you use the code, Calder15 at the checkout.https://www.itgovernancepublishing.co.uk/product/nine-steps-to-success…
 
In this exclusive interview with ITGP founder, Alan Calder, explains how his bestselling pocket guides can help you with your implementation projects, outlines his inspiration for introducing toolkits into the industry and discusses the work that needs to be done for organisations to become GDPR compliant.Get 15% off all of Alan’s ITGP publications…
 
In Graham Day's second interview, he talks about the benefits and the dangers of social media.Save 15% on Graham Day’s book Security in the Digital World.Enter discount code ‘SEPT15’ at the checkout.https://www.itgovernancepublishing.co.uk/product/security-in-the-digital-worldAv IT Governance Publishing
 
In this book, Kai Roer presents his Security Culture Framework, and addresses the human and cultural factors in organisational security. The author uses clear, everyday examples and analogies to reveal social and cultural triggers that drive human behaviour. He explains how to manage these threats by implementing an effective framework for an organ…
 
http://ow.ly/4qVr50ieNgrIn this book, Kai Roer presents his Security Culture Framework, and addresses the human and cultural factors in organisational security. The author uses clear, everyday examples and analogies to reveal social and cultural triggers that drive human behaviour. He explains how to manage these threats by implementing an effectiv…
 
For the month of August we are kicking off with a live interview with Build a Security Culture author Kai Roer. Back in June we caught up with our author Kair Roer this year at Infosecurity Europe, held at London Olympia. As well as interviewing Kai, we attended some really fantastic industry talks as well as helping out the free ice-cream stand by…
 
This book extract is taken from the new title by Jamie Lynn Cooke, The Power of the Agile Business Analyst, second edition – 30 surprising ways a business analyst can add value to your Agile development team.itgovernancepublishing.co.uk/product/the-power-of-the-agile-business-analyst-second-editionAv IT Governance Publishing
 
In this podcast Brian Johnson discusses his new book IT for Business (IT4B) - From Genesis to Revolution, a business and IT approach to digital transformation, co-authored with Walter Zondervan and details how the book formed from a Dutch best practice conception on data management and business information practice, into its current international f…
 
This book extract is taken from Collaborative Business Design: The Fundamentals, written by our author of the month, Brian Johnson and his co-author Léon-Paul de Rouw.Episode 1 – An introduction to IT-driven business services: “The primary focus of this guide is the needs of the business; what information must be collected, how IT is processed, wha…
 
It’s necessary for enterprises nowadays to collect massive amounts of data for their business – data concerning everything from products and services to market conditions and customer demographics. With so much information at your fingertips, it’s difficult to find the pieces that are accurate and relevant. This problem is exacerbated by the growth…
 
This video was recorded from the 1st Kickstarter live stream event at the Dec 8 2016 8:00 PM CET. The book author Helmut Schinldwick is presenting his Kickstarter book publishing project – IT Governance. During this recording you will be guided through the current progress of the funding campaign, showing the current status of the book and also pre…
 
This video explains the reason for publishing the book IT Governance. It’s necessary for enterprises nowadays to collect massive amounts of data for their business—data concerning everything from products and services to market conditions and customer demographics. With so much information at your fingertips, it’s difficult to find the pieces that …
 
In July 2010, Microsoft transitioned from providing mainstream support for Windows Server 2003 to releasing critical patches only. July 14, 2015 marks another transition, this time the end of Microsoft support for Windows Server 2003/R2. While this date may seem distant, now is the time to understand that the end of support and the end of life of W…
 
4 Essential Pieces to Any Small Business BYOD Strategy Believe it or not, once upon a time, kids at the bus stop didn’t have cell phones and the mobile device strategy of many businesses was typically you’ll take what you’re given, refrain from using it for any personal use, and the data may be scrubbed clean whenever we please. We’ve come a long w…
 
A Smarter Approach to Mobile Device Management More people today use personal mobile devices like smartphones and tablets for business purposes. Such devices, coupled with greater Wi-Fi accessibility and cloud services, have empowered us with the ability to access data and do business from practically anywhere at anytime. Needless to say, many smal…
 
3 Things to Consider Before Jumping Into BYOD You’ve read it time and time again. “Bring Your Own Device” isn’t a trend, it’s the future. Workplaces where companies let workers use their own devices for work purposes are the new normal. BYOD attracts new hires and lifts employee morale and productivity. But this doesn’t mean a small business owner …
 
Remember… Always Practice Safe BYOD No matter what blog or magazine read these days, it seems like everyone is talking about today’s increasingly mobile workforce and the BYOD (Bring-Your-Own-Device) movement. We live in an exciting time when work can be done at any time from any place. Employees love the fact that they can get work done on their i…
 
Loading …

Snabbguide

Upphovsrätt 2022 | Sitemap | Integritetspolicy | Användarvillkor
Google login Twitter login Classic login