The co-chairs of ACT-IAC's FITARA Implementation Project unveil its first tool for agency IT leaders. The IT Management Maturity Model can help agencies assess their maturity in five critical ...
To truly be effective, a cybersecurity program must continually evolve and improve. The problem is, many organizations don’t have a clear sense of where they are today and how to improve for tomorrow.
FAIRFAX, Va.--(BUSINESS WIRE)--The American Council for Technology and Industry Advisory Council (ACT-IAC), the premier public-private partnership dedicated to improving government through the ...
The Information Security Program Maturity Model is a useful tool in understanding the degree of sophistication of information security processes, their reliability and effectiveness in identifying, ...
Ted has worked in the security arena for over 25 years. Including 10 years with the Dept of Defense and 15 years at Keyfactor. Most business leaders recognize that when it comes to cybersecurity and ...
A new model to measure and analyze corporate strategic meetings management program development and implementation is being constructed by the NBTA Foundation and meetings technology supplier StarCite, ...
Industry Insights from Thomson Reuters Institute, a part of Thomson Reuters. Who doesn’t want to be successful? To have repeatable and controllable success is the promise of good project management.
The cyber environment is filled with threats. It’s virtually impossible to avoid “INFRASTRUCTURE FACES IMMINENT CYBER ATTACK,” or something very similar every time you encounter online or television ...