7 Key Information Technology Risks
This article discusses the seven key information technology (IT) risks that a CIO must "discuss, strategise and budget for."
This article discusses the seven key information technology (IT) risks that a CIO must "discuss, strategise and budget for."
This paper describes Gartner’s program and portfolio management maturity model which can be used to assess progress against best practice goals.
This presentation makes the connection between corporate governance, information technology IT governance, information security governance, and risk management.
Improve your IT services with ITIL Process Maturity. Understand the current state of your processes, develop strategic improvement plans, allocate resources wisely, and communicate effectively with stakeholders. Learn more about this powerful tool for IT excellence.
This paper discusses the role and importance of effective Information Security Management (ISM), how it is supported by an extensive family of global standards and the way these harmonize with ITIL
This paper discusses an approach to sustain process improvements resulting from successful ITIL implementations – by using Six Sigma methodology because, the authors argue, the Six Sigma methodology is particularly compatible with ITIL.
This report discusses information technology governance at leading companies and presents a framework for IT governance with CIO responsibilities.
This cost estimating guide provides a framework, based upon best practices, that can be modified to develop, evaluate and manager IT investments’ cost estimates.
This whitepaper compares ITIL V3 and Application Services Library (ASL) – what are the similarities? What are the differences? Mapping ITIL V3 to ASL.
 This document outlines the differences between ITIL V3 and ISO/IEC 20000, from the perspective of each clause in the standard where the core 5 ITIL books either do not cover it or cover it differently.