This blueprint will walk you through the process of formally defining a security service portfolio and determining demand for each service, and the resourcing need to...
|
|
Use this tool to define your security team roles, FTE hours, security service portfolio, estimate service demand, and determine your overall resourcing needs
|
|
This week's issue explains the business strategy and accelerating network effects of the world's most powerful tech platform – and why you've probably never considered it...
|
|
This comprehensive competency-based question collection provides a list of behavioral questions that help the talent acquisition specialist and hiring manager interview...
|
|
This tool will help you evaluate shortlisted technologies by using inputs along several important metrics to assign each one a value-readiness score. The results of a...
|
|
Use this template to conduct telephone screening interviews and identify qualified candidates for in-person interviews.
|
|
This template will help you record the output of the activities undertaken during the first two phases of the storyboard, Exploit Disruptive Infrastructure Technology.
|
|
This tool will help you keep track of your longlist of disruptive technologies over time. Remember: analysis of disruption is an iterative process.
|
|
This storyboard will help you create a diverse disruptive technology working group, a shortlist of disruptive technologies, and a proof of concept plan for each...
|
|
As a CIO, there is a need to move beyond day-to-day technology management with an ever-increasing need to forecast technology impacts. Not just from a technical...
|
|