Top Stories

Reflection of hacker coding working hackathon at laptop

In God We Trust, All The Others We Monitor!

18-May-2020 | Thomas Frénéhard | Governance

Monitoring data, not just the perimeter, helps companies better protect the information held in their systems against insider threats.

Golden statue of a dragon in a Chinese temple

Emerging Risk: Hic Sunt Dracones

6-Apr-2020 | Thomas Frénéhard | Governance

Threats never appear without warning; the trick is to be ready for them before they turn into risks.

Baker Putting Dessert in Display Case

Agile Content Development For Software Adoption: Is Enablement Really A Piece Of Cake?

26-Mar-2020 | Sandra Policht | Governance

With the right ingredients and recipe, creating high-quality, relevant, and engaging content just-in-time is almost a piece of cake.

Latest Stories

Risk-Based…Well, Everything, Really!
Learn More

The Intelligent Public Sector Organization: Three Ways Forward
Learn More

Can A Supply Chain Be Really Transparent In A Digital World?
Learn More

New ERP? Don’t Forget The BPM!
Learn More

Digital Government: Challenge Or Opportunity?
Learn More

Technology-Driven Reforms: Game Changer For Naya (New) Pakistan
Learn More

Reducing Risk, Increasing Retention, And Recruiting Top Talent
Learn More

An Outcome-Driven Enterprise Data Strategy: Ongoing Data Maintenance
Learn More

Load more stories
← Older posts