Darin Stahl
Darin Stahl
Principal Consulting Analyst
Info-Tech Research Group

A Business Continuity Plan (BCP) is a complex project that touches all aspects of the organization, and yet often has few or no dedicated resources. It’s work that you hope to get done in between other projects, or at home at night after the kids go to bed. It’s no surprise so many organizations struggle with BCP.

Please join me and subject matter experts on Thursday, April 24, at 4 p.m. EDT for a webinar “Developing a Business Continuity Plan: Should it be IT or the Business?” Project ownership is just one of the challenges of Business Continuity Planning we’ll be discussing in this webinar.

Go here to register for this Webinar
(Video replay will be available at this link after the event)

Info-Tech Research Group webinars occur during the early weeks of our research projects. Attendees will weigh-in on several key polls and will be able to pose questions to the group.We want to work closely with our members and potential members as we build out our research to ensure we are thoroughly meeting your needs.

 

Share on FacebookShare on Google+Share on LinkedInTweet about this on Twitter
Barry Cousins
Barry Cousins
Senior Consulting Analyst
Info-Tech Research Group

Many IT projects fail because planning fixates on technology and underestimates the importance of organizational change.Human behavior tends to be a planning blind spot, especially for IT professionals with technology backgrounds. People don’t follow rules and instructions in the same prescribed and predictable way that technology does.  To ensure project success and maximize benefits, you need to set aside time to plan and facilitate the “soft” side of organizational change.

Please join me on Thursday, March 27, 2014 at 4:00 pm EDT  for a Webinar on, “Change Management: Do You Have a Blind Spot?”

Register Here For This Webinar

In this Webinar we will discuss the challenges you are facing and possible solutions including:

  • How can you prevent users from refusing or failing to adopt new systems and policies?
  • What can be done to counteract the costs due to post-implementation helpdesk volume, retraining, ongoing design or functionality and change requests (or worse, full roll-back)?
  • How can you ensure IT’s ability to successfully manage change and avoid the erosion of IT’s ability to work with the business

We will hear from guest panelists who have experience in this space. Attendees will weigh-in on several key polls and will be able to pose questions to the group.

Info-Tech Research Group webinars occur during the early weeks of our research projects. We want to work closely with our members and potential members as we build out our research to ensure we are thoroughly meeting your needs.

Share on FacebookShare on Google+Share on LinkedInTweet about this on Twitter

identity securityTraditional security strategy sees organizations focusing outward on their perimeter – protecting their network and data (in transit or otherwise). What’s missing is turning attention towards one of an organization’s weakest links – its users.

And we are not just talking about disgruntled, recently let go users who attempt to steal data post-firing. All of your users, malicious or not, pose potential threats to your organization’s security.

Why?

Your users are not security experts – nor do you necessarily expect them to be – and while they understand they have passwords, those passwords need to be complicated and must be changed periodically, and as such users aren’t always diligent about managing their work identities (Passwords on Post-Its, anyone?).

External employees, meaning contractors or vendors, pose an obvious threat being relative outsiders, potentially being granted access into your internal systems.

Adding to the potential security risks, your internal users are likely costing you money you don’t have to be spending. Help desk calls related to passwords, password resets, etc. can make up to 30% of your call volume. These types of help desk tickets calls can cost an average of $60 a ticket – if these calls are happening once a day, that’s $20,000 spent in a year on something that could be easily mitigated.

identity_security
Click Image To See Full Infographic

As you can see, it’s essential to manage and protect the warm bodies attached to the identities that are deeply involved with the data and networks you are also trying to secure.

Managing and securing identities requires a bit of time commitment, especially if you’re a large organization. Start by identifying your top 5 applications, identify critical user groups within those applications and work from there.

Auditing your users is a manual process. Using Info-Tech’s Identity Security Services Plan, we give you the tools to streamline your audit process by focusing on your critical applications and systems. With that re-executable process, you can then work through the rest of your applications and system. Following that, using the IAM Controls Analysis Tool – we help you identify the key controls your organization needs to pursue to strengthen their identity management tactics.

For your identity management resources, refer to Info-Tech’s Build an Identity Security Services Plan Blueprint.

Share on FacebookShare on Google+Share on LinkedInTweet about this on Twitter
Ben Dickie
Ben Dickie
Senior Consulting Analyst
Info-Tech Research Group

Despite being an important function of the IT department, most organizations view application maintenance as a necessary evil and do not give it the attention and resources it deserves. Ad-hoc application maintenance results in:

  • Poor application quality
  • Dissatisfied business users
  • Large amounts of rework
  • Higher costs

Please join me on March 6th 2014 at 1:00 pm EST for a Webinar on “Application Maintenance – Is it time to get serious?”

Register Here For This Webinar

In this webinar we will discuss the challenges you are facing and share key insights. We will discuss questions such as:

  • How do I match application/project to maintenance effort?
  • How to prioritize maintenance requests?
  • What methods can be used to motivate staff to work on maintenance efforts?
  • How much time should I spend on different types of maintenance tasks?

We will hear from guest panelists who have experience in this space. Attendees will weigh-in on several key polls and will be able to pose questions to the group.

Info-Tech Research Group webinars occur during the early weeks of our research projects. We want to work closely with our members and potential members as we build out our research to ensure we are thoroughly meeting your needs.

Share on FacebookShare on Google+Share on LinkedInTweet about this on Twitter
Altaz Valani
Altaz Valani
Senior Consulting Analyst
Info-tech Research Group

Mobile started out in the consumer space and is now entering the corporate enterprise space in a big way. A sustainable platform strategy is required in developing for so many mobile devices, operating systems, and form factors. That strategy must account for existing capital investments, people, and processes.

Please join me on March 5th 2014 at 3:00 pm EST for a Webinar on “Mobile – Can you embrace it?”

Register Here For This Webinar

In this webinar we will discuss the challenges you are facing and share key insights. We will discuss such challenges as:

  • Creating a mobile application that can withstand mobile device churn and operating system upgrades
  • Finding skilled resources
  • Integration with back end systems
  • Reusing development tool chain
  • Modifying requirements definition

We will hear from guest panelists who have experience in this space. Attendees will weigh-in on several key polls and will be able to pose questions to the group.

Info-Tech Research Group webinars occur during the early weeks of our research projects. We want to work closely with our members and potential members as we build out our research to ensure we are thoroughly meeting your needs.

Share on FacebookShare on Google+Share on LinkedInTweet about this on Twitter