Management Briefs

Order by : Name | Date | [ Ascending Order ]
The Forum has compiled this report for the benefit of its members, following the Forum’s involvement in the recent Association of Chief Police Officers (ACPO) eCrime Conference, which took place on 8-9 February 2012 in Manchester.
Ref: W1026 Security/Business Continuity
Leading the way, or in the way?
Ref: Architecture/Strategy, Infrastructure, Operations/Service Management, Technologies
Over the last couple of years the Forum has regularly discussed sustainable IT and various green strategies and issues that have an impact on members. This bulletin brings together a number of resources and distills them into one, easy to read document which lays out current corporate IT thinking on sustainability.
Ref: Architecture/Strategy, Business Relations, Operations/Service Management
Mar 2010
Virtualisation and cloud — bedfellows or alternatives?Popular!   Cloud Computing Bulletin - Virtualisation and cloud — bedfellows or alternatives?
In preparation for the Forum's Cloud Conference in March 2010 attendees were surveyed as to their maturity in this area, the results of this survey have been combined with a number of other Forum resources, to produce this interesting insight into the corporate IT world's view of cloud computing.
Ref: W770 Applications, Architecture/Strategy, Infrastructure, Operations/Service Management, Security/Business Continuity, Supplier Management/Procurement, Technologies
This survey was conducted prior to the Information Security Service's PCI DSS: Conference for Merchants that took place on 10th June 2009 in London. The aim of this survey was to investigate the current compliance status of large corporate and public sector organisations in relation to the Payment Card Industry's Data Security Standard (PCI DSS).
Ref: W721 Governance, Operations/Service Management, Programme Management, Security/Business Continuity
The use of wireless networks is increasing. The drive for a more mobile workforce, the increased use of portable devices and easier implementation are pushing companies into considering such deployments. There are many infrastructural issues that need to be dealt with, such as cost, scalability and performance. This paper, however, deals solely with the security issues related to deploying a corporate wireless network.
Ref: Architecture/Strategy, Infrastructure, Security/Business Continuity
Feb 2005
Security Flyer
This is a IT Security Fact sheet identifying items which affect every IT user, from User responsibilities to how to protect their data.
Ref: HR, Security/Business Continuity
Feb 2005
PDA
The popularity and wide spread use of personal digital assistants (PDA) by all segments of the business and personal community has created a double-edged sword. Many companies have few if any security tools, tips or best practices for governing the use of PDAs. This brief is intended as a starting point for securing what may be a weak link in your organisation's security chain.
Ref: HR, Security/Business Continuity, Technologies
This is an example of a IT Security Screen Saver. 
Ref: HR, Infrastructure, Security/Business Continuity
An almost constant series of security-related incidents is affecting millions of computer systems and networks throughout the world, and as a result, it is becoming increasingly important for companies to have planned and tested processes for dealing with these incidents in order to protect their day to day business.
Ref: Operations/Service Management, Security/Business Continuity
Feb 2005
Data Retention
The objective of this executive guideline is to highlight the risks and benefits of adopting a data retention policy. It will describe how the retention policies will ensure compliance with legislation and offer a return of investment through reduction in storage overheads, apply disciplined management of information processes and the potential risks of reputational harm.
Ref: Governance, HR, Security/Business Continuity
The third part of the Employment Practices Data Protection Code was published by the Information Commissioner on 11th June 2003 as three documents; Guide, Guide for small business, Supplementary Guidance. These give practical advice on how companies can comply with the Data Protection Act 1998 when monitoring employees at work. Failure to comply with the legislation can lead to criminal action against the company.
Ref: HR, Operations/Service Management, Security/Business Continuity
Unparalleled Learning

Members Include

dmg-media-logo-colour-RGB-WEB-250px
johnlewis
mcdonalds
united biscuits
travis perkins
southwestwater
rexam
landregistry
HMRC
gchq
eon
dhl
EnvironmentAgency
BalfourBeatty
coop
BAE
aviva
01/17 
start stop bwd fwd

"Just wanted to say thanks; another great day where I have come out with more knowledge than I entered with"

"Many thanks; [the event was] very good and beneficial"

"I have never not found a day interesting"

"The Corporate IT Forum is a fantastic level check, free of vendor sell and consultancy hype. I like the open sharing of experience…"

"We get valuable knowledge and experience from members of The Corporate IT Forum. This helps us to make better and informed decisions to reach our business goals…"

"The knowledge from other people on what they are doing/have done is invaluable to my team"

"The workshop validated the marketplace for supplier apps; participants were of a uniformly high standard; personally, I value highly the ethos of the Forum in the fact that it is supplier independent"

Tel: +44 (0) 1442 866634
info@corporateITforum.com

Banner
Banner