Five Offshore Practices That Pay Off
This outsourcing playbook discusses five best practices that can make all the difference between success and failure of an outsourcing initiative.










This outsourcing playbook discusses five best practices that can make all the difference between success and failure of an outsourcing initiative.
Master the art of client-vendor communication in IT outsourcing projects.
This comprehensive guide on best practices for communicating global outsourcing initiatives provides CIOs with detailed strategies to address communication challenges. It includes insights on managing rumors, timing communications, selecting the right communication vehicles, developing key messages, and learning from case studies. Essential for ensuring the successful implementation of global outsourcing projects.
Learn a unique dashboard based approach for evaluating the maturity of enterprise architecture in organizations. Essential for IT professionals seeking to enhance decision-making and align IT with business goals

This case study uses Gartner’s Enterprise Architecture Program Maturity Self Assessment Framework and tools to conduct a detailed assessment of the enterprise architecture program at the State of Oregon
This quick guide to data security for businesses discusses 5 key principles to stay away from trouble.
This presentation discusses a business focused approach to application modernization in the context of IT governance and application portfolio management.
This guide details the steps to integrate information security into the software development lifecycle (SDLC) and related IT projects and initiatives.
This study provides a framework to compare and assess information security governance, strategy, investment, and practices with other organizations using the ISO/IEC 17799 framework for security standards as a guide. The study was done for institutions in higher learning but its lessons can be allied to any organization.
This information security guide provides guidance to organizations and auditors on assessing the level of security risks to the organization and evaluating the adequacy of the organization’s risk management.