Learn how to source for secure and reliable IT services

The sourcing activities are the first steps on a path of a mostly long term and close relationship with a service provider. It’s often also the first opportunity to exchange expectations, to verify assumptions and the point where you start building a common understanding of the agreement that is being put in place. Including Opsasto… Read More Learn how to source for secure and reliable IT services

Trias-Politica-of-Information-Security-part-2

#defaultCountdownpart2-timer .countdown-section { background-color: ; width: 180px; height: 180px; padding-top: 40px; margin: 0 ; border: 5px initial #5b6fa5; border-radius: 5px; line-height: 1; display: inline-block; float: none !important; } #defaultCountdownpart2-timer { text-align: center; } #defaultCountdownpart2-timer .countdown-section .countdown-amount { font-size: 40px; color: #000000; } #defaultCountdownpart2-timer .countdown-section .countdown-period { font-size: 40px; color: #000000; } Trias Part 2 will… Read More Trias-Politica-of-Information-Security-part-2

The importance of the Business Impact Assessment in the Digital economy.

Most investments decisions are driven by the benefit and return we expect to get from the money we invest. There is either a business opportunity that we want to exploit or we want to increase our net gains by improving the efficiency and effectiveness of our operation. As business operations start to become more reliant… Read More The importance of the Business Impact Assessment in the Digital economy.