This week, we will dive into how internet-connected digital devices have enabled authoritarian nation-states to spy on open democratic societies, and how to protect...
|
|
Use this tool to determine how to facilitate a transfer of knowledge between a role incumbent and a successor of a critical role.
|
|
Use this template to identify and classify important factors affecting your ability to deliver on outcomes.
|
|
Use this template as a starting point for building out an improvement plan in presentation format.
|
|
Use this categorization scheme as an example of asset-based categories, resolution codes, and statuses.
|
|
Use this template as the base to build out your standard operating procedures, to quickly inform new team members or contractors of your support approach.
|
|
Use this maturity assessment to set a baseline and identify areas of focus based on level of current and target maturity.
|
|
Use this blueprint as a guide to help you identify ways to improve your service desk.
|
|
End users have 191 passwords to remember – can infrastructure and operations make life better for users while actually enhancing security? Understand the realizable...
|
|
End users have 191 passwords to remember – can infrastructure and operations make life better for users while actually enhancing security? Understand the realizable...
|
|