Domain

IT Operations Knowledge – Page 67

A Guide to Virtualization Solutions

This guide provides a definition of virtualization, key categories of virtualization and discusses key technologies to enable virtualization in the enterprise.

Why Information Security Governance?

This presentation discusses the business need for information security governance. Why Information Security Governance? The following topics are discussed: What is information security governance? Why is information security governance important? What are the key business drivers for information security governance? An example of information security governance at work A discussion

Information Security Governance Assessment Tool

Introducing a comprehensive Information Security Governance Assessment Tool, designed for CIOs to gain a high-level view of key security vulnerabilities. Based on the recommended ISG framework, this tool aids in aligning IT security with business objectives, ensuring a robust and compliant security posture.

Cloud Computing and Legal Issues

This presentation discusses the three key legal issues related to cloud computing namely, privacy, digital evidence and e-Discovery. This is a good starting point for this discussion but a lot more needs to be said and understood!

Cloud Computing Technologies

Cloud Computing Technologies

This presentation provides an under the covers view of cloud computing using key software as a service applications.

The Skinny on Cloud Computing

This presentation provides an overview of cloud computing, cuts through the hype on cloud computing benefits and answers the simple question: Is Cloud Computing Overhyped and Overrated?

Privacy and Cloud Computing

This report discusses cloud computing privacy – issues related to privacy and confidentiality of personal and business information in the cloud

CIO Portal