
Volume 4: Compliance Management The Business of Keeping the Business in Business
This guide provides in-depth insights into achieving and maintaining digital compliance, emphasizing the role of digital trust.

This guide provides in-depth insights into achieving and maintaining digital compliance, emphasizing the role of digital trust.

Liquid Security: Digital Trust When Time, Place and Platform Don’t Matter. Volume 5 of the Digital Trust: IT security as a Technology Strategy series.

eThreats and Countermeasures: Just When You Thought It Was Safe to Go Out. Volume 6 of Digital Trust: IT security as a Technology Strategy series.

This document explores effective methods for quantifying and assuring digital trust, crucial in the digital age.

This guide brings together the essence of digital trust, offering a strategic direction for future developments in this crucial field.
 This report explores the drivers, strategies, technologies and standards at each level and presents a set of principles for how to architect for the networked business.
 Overview of eSourcing Capability Model (eSCM) provides an in depth description of the eSCM framework and explain how it will revolutionize the business of outsourcing.
 This presentation discusses the central decision prior to any outsourcing: should we build it or buy it from someone else?
The Project Portfolio Planning (P3) Methodology provides an organized and comprehensive process for developing project portfolios that support the business. The methodology is most appropriate for organizations that continually generate myriads of projects and project ideas that compete for a limited number of available resources. Issues addressed by the methodology include harvesting new project ideas, documenting the business case, evaluating projects on a consistent basis, prioritizing projects, selecting the best portfolio, and planning required resources.
 How the Economic Downturn Is Impacting IT Leaders and Their Organizations.