Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items tagged managed

Rss Feed Group items tagged

tech writer

Making a Success of Managing and Working Remotely | IT Governance UK - 0 views

  •  
    This book will help managers and team members alike who are about to or have already started working remotely. Manage your team successfully so you can all reap the rewards of remote working. Understand the challenges, create team cohesion and avoid isolation. Advise your employees on how to approach their work, how to balance work and outside-work demands, and deliver desired outcomes.
tech writer

Resilient Thinking: Protecting Organisations in the 21st Century | IT Governance UK - 0 views

  •  
    Use a resilient thinking approach to ensure business continuity and protect your organization. Crisis management, disaster recovery, and business continuity are covered by a lateral resilience thinking approach. Risk analysis and crisis management - make sure your organization is prepared. Resilient Thinking will revolutionize your approach to risk analysis and crisis management. Even if the worst does happen, you will be fully equipped to handle it. Be equipped. Be prepared. Be ready with this vital guide to organizational survival.
tech writer

ISO 22320 Emergency Management Foundation Training Course | IT Governance UK - 0 views

  •  
    Learn from ISO 22320 specialist consultants and get a comprehensive introduction to effective emergency management best practices. Discover the requirements of effective emergency management best practices. Learn from specialist consultants and get a comprehensive introduction to the ISO/IEC 22320:2018 standard. Learn from anywhere - choose whether you attend our courses Live Online or in person. Find out more. Our Classroom / Live Online option allows you to study your way, keeping travel and costs down to a minimum. One-day training course with full course materials. Successful completion of the course awards a certificate of attendance and 7 CPD/CPE points.
tech writer

Business Continuity Risk Management Pack | IT Governance UK - 0 views

  •  
    Understand the risks faced by your organization with the Business Continuity Risk Management Pack. Assessing your risk will enable you to implement business continuity measures to suit your organization's needs. The Business Continuity Risk Management Pack will enable you to develop business continuity plans tailored to your organization's risk appetite, and ensure your organization is fully prepared to recover critical business functions as quickly as possible in the event of a disruptive incident.
tech writer

An International Guide to Data Security and ISO27001/ISO27002 | IT Governance UK - 0 views

  •  
    Now in its seventh edition, this comprehensive book gives guidance on implementing effective information security management. It also outlines international best practices for IT governance for organizations of all sizes and sectors, and demonstrates how to: Protect and enhance your organization with an ISO 27001-compliant ISMS (information security management system); Design, develop and implement a robust governance system that covers all aspects of data protection and information security; and Defend your organization against advanced, persistent cyber threats. This updated edition reflects changes to international legislation, including the GDPR (General Data Protection Regulation), and updates to BS 7799-3 and the ISO/IEC 27000 family. It also covers key topics such as risk assessment, asset management, controls, security, supplier relationships and compliance.
tech writer

ISO 9001 2015 Standard | IT Governance UK - 0 views

  •  
    This is the newest version of ISO 9001. Users of ISO 9001:2008 should upgrade their systems to ISO 9001:2015 and will need the revised version of the Standard to keep their certificates up to date. ISO 9001:2015 specifies the requirements for a quality management system (QMS), where an organization: Needs to demonstrate its ability to consistently provide products and services that meet customer and applicable regulatory requirements. Aims to enhance customer satisfaction through the effective application of the system, including processes for continual improvement of the system and the assurance of conformity and applicable regulatory requirements. ISO 9001 is by far the world's most established quality framework and is currently used by more than a million organizations worldwide. It sets the standard not only for quality management systems but for management systems in general. All requirements of ISO 9001:2015 are generic and are intended to be applicable to all organisations, regardless of type, size and product provided. ISO 9001 helps all kinds of organisations succeed through improved customer satisfaction, staff motivation and continual improvement.
tech writer

Cyber Incident Response Management Foundation Training Course | IT Governance UK - 0 views

  •  
    Find out how to effectively manage and respond to a disruptive incident, such as a data breach or cyberattack, and take appropriate steps to limit the damage to your business, reputation, and brand. Train with cyber security experts to gain the knowledge to plan and implement an effective cyber incident response program. Learn how to protect your organization from a disruptive incident such as a cyber attack or data breach. Learn from anywhere - choose whether you attend our courses Live Online or in person. Find out more. Successful completion of this one-day course and exam awards the Cyber Incident Response Management Foundation (CIRM F) qualification and 7 CPD/CPE points.
tech writer

Certified ISO 27001 ISMS Lead Implementer Self-Paced Online Course | IT Governance UK - 0 views

  •  
    This fully accredited distance learning course covers the nine key steps involved in planning, implementing, and maintaining an ISO 27001-compliant information security management system (ISMS). Train with the ISO 27001 experts and gain the skills to lead and manage an ISO 27001-compliant ISMS (information security management system) implementation project. An industry-leading course designed to help you deliver ISO 27001 compliance and enhance your career as an ISO 27001 professional. Work at your own pace with self-paced online training, a more affordable, flexible, and less disruptive way to study. Find out more. Learn from anywhere with our Self-Paced, Classroom, and Live Online options that allow you to study your way, keeping travel and costs down to a minimum. Successful completion of the course and exam awards the Certified ISO 27001 ISMS Lead Implementer (CIS LI) qualification and 21 CPD/CPE points.
tech writer

CISM Training Course | IT Governance UK - 0 views

  •  
    An intensive and complete training course to help delegates pass the CISM exam the first time, with expert knowledge from leading trainers. Get ahead with CISM® (Certified Information Security Manager®) certification, the world-renowned standard of achievement for information security managers. Build your senior career in information security management with this specialist-led four-day exam preparation course. Learn from anywhere - choose whether you attend our courses Live Online or in person. Find out more. This course uses the official ISACA® curriculum and includes the ISACA CISM Review and Questions, Answers & Explanations study guides. Successful completion of the course leads to 28 CPD points.
tech writer

Business Continuity Management / ISO 22301 Health Check | IT Governance UK - 0 views

  •  
    This two-day on-site consultancy and assessment service evaluates an organization's business continuity plans against the international Standard ISO22301. The Business Continuity Management/ISO 22301 Health Check is a two-day on-site consultancy and assessment service. It follows a risk-based approach for evaluating the effectiveness of an organization's business continuity plans in line with the international business continuity management Standard, ISO 22301.
tech writer

Governance and Internal Controls for Cutting Edge IT | IT Governance UK - 0 views

  •  
    Shows you how to manage the risks of adopting cutting-edge technology for your business in the context of COBIT 5 and related standards. To remain competitive we rely on being early adopters of new technologies - but there are inherent risks. As we implement these technologies, how do we manage the risks without hindering the progress of the business? Governance and Internal Controls for Cutting Edge IT shows you how to manage the risks of adopting cutting edge technology for your business in the context of COBIT® 5 and related standards.
tech writer

CRISC Training Course | ITGovernance | IT Governance UK - 0 views

  •  
    Learn how to identify and manage risks with this 3-day exam preparation course enabling you to pass the CRISC exam the first time. Get ahead with CRISC® (Certified in Risk and Information Systems Control®) certification, the world-renowned standard of achievement for enterprise IT risk and information systems control managers. Build your senior career in IT risk management with a four-day exam preparation course. Learn from anywhere - choose whether you attend our courses Live Online or in person. Find out more. This course uses the official ISACA® curriculum and includes the ISACA CRISC Review and Questions, Answers & Explanations study guides. Successful completion of the course leads to 28 CPD points.
tech writer

IT Governance: An International Guide to Data Security and ISO27001/ISO27002, Sixth Edi... - 0 views

  •  
    This is sixth edition of THE definitive guide to ISO27001 and ISO27002 compliant information security and management. New for 2015: the Sixth edition of the definitive guide to ISO 27001-compliant information security management by Alan Calder and Steve Watkins. The textbook for the Open University's postgraduate information security course. The recommended textbook for all IBITGQ ISO 27001 courses. Available in softcover or eBook format. IT Governance USA is the leading global provider of books, tools, training and consultancy for cybersecurity, IT governance, risk management and compliance. The customer base ranges from government departments and market leading organizations, to small businesses and individuals looking to further their knowledge, ability and qualifications.
tech writer

Top Electronic Filing Solutions for Streamlined Business Processes | FabSoft - 0 views

  •  
    Fabsoft & Electronic Filing: Discover top Electronic Filing solutions at Fabsoft, perfect for streamlining business processes and optimizing productivity in today's digital world. [Digital Document Submission, Electronic Record Keeping, Digital Paperwork Submission, Electronic Document Management, Online File Storage, Electronic Data Submission, Digital Record Keeping, Online Document Filing, Electronic File Storage, Electronic Paperwork Management, Online Data Filing, Digital File Management, Electronic Record Submission]
tech writer

Nitro Pro 13, 5 users, multilingual - 0 views

  •  
    Give your teams the tools they need to work better with documents and with each other. Create PDFs and combine files. Create PDFs from almost any document, image, or file type. Create and combine PDFs with drag-and-drop. Insert, delete and organize pages in a PDF file. Combine different files and file types in one PDF file. Comprehensive integration with Office 365, Sharepoint 365, OneDrive for Business, Dropbox, Box, and Google Drive. Copy and paste selected parts of a PDF file with undamaged formatting. Create PDF files in batches. Convert files to and from PDF. Convert Word, PowerPoint, and Excel files into editable PDFs. Convert PDFs into editable Word, PowerPoint, and Excel files. Convert scanned documents into editable and searchable PDFs. Convert PDFs to JPEG, TIFF, or PNG image formats. Convert web pages into interactive PDFs, complete and with links. Convert CAD files to PDF. Convert PDF files of all types to PDF/A classes 1 and 2. Extract text and images. Postscript based document conversion. Ensure the security of PDFs. Provide PDFs with password protection and permissions. Revise to permanently remove sensitive information from PDFs. Create protected PDF files that prevent copying and editing. Protect PDFs with Microsoft Rights Management Services (RMS) 2.0. Encryption support for 64-, 128- and 256-bit (with R6 support). Working with digital signatures with a chain of trust support. Managing Digital Signature Profiles and Certificates. Create and manage digital IDs. Batch security. Document version tracking.
tech writer

Bitdefender GravityZone Integrated Patch Management - 0 views

  •  
    GravityZone Patch Management module ensures the security and efficiency of your cybersecurity GravityZone cloud or on-premise solution with an additional layer of control. With the GravityZone Patch Management module organizations can keep their operating systems and software applications up to date and enjoy a comprehensive view of the patch status across their entire Windows install base. The automated patching module delivers updates for an organization's entire fleet of workstations, physical servers, or virtual servers.
tech writer

Ayoa - Stress less, achieve more - 0 views

  •  
    Ayoa's Task Management and Mind Mapping all-in-one solution are all about taking the time to be creative and deciding what needs to be done before taking action - so you can stress less and achieve more! (Software, Saas, Whiteboard, Task Management, Mind Map, Productivity, Ayoa).
tech writer

VMware Cloud on AWS Deploy and Manage 2021 Training | AWSDCM2021-OE | Learning Tree - 0 views

  •  
    VMware Cloud on AWS Deploy and Manage 2021 Training | AWSDCM2021-OE | Learning Tree - In this 3-day VMware course, you will gain skills for deploying and managing a VMware Cloud™ on AWS infrastructure. Through a mix of lectures and labs.
tech writer

Certified Information Security Manager (CISM) Training and Certification | Learning Tree - 0 views

  •  
    Certified Information Security Manager (CISM) Training and Certification | Learning Tree - In this course, you will gain the knowledge and skills needed to successfully pass the CISM certification exam and become a Certified Information Security Manager.
« First ‹ Previous 41 - 60 of 495 Next › Last »
Showing 20 items per page