The Art of Service, Standard Requirements Self AssessmentsTAOS logo
  • Store
  • Toolkit Membership
  • Services
    • E-Learning
    • Consultancy
  • KANBAN Membership
    • Kanban Membership Priority Request
  • KANBANs Published List
  • About us
    • Resource Hub
    • Reviews
  • Log in

Resource Hub

Articles

Cyber Security Risk Management – Are you Ready?

What happened during this week’s webinar? Check out the video if you missed the live session. The recording doesn’t show the actual poll questions, but you’ll get the idea. The Cyber Security Risk Management Self Assessment is available in our store okay it is nine o’clock officially we have commenced. Read more…

By Menken, 4 years7 months ago
Articles

What if you’re asking the wrong questions about Cyber Security?

Cyber Security is on everybody’s mind these days. Every day there is a news item about a breach or attack. It seems the most (if not all) businesses are vulnerable to cyber security risks. Think about it: We spend a lot of time online, between personal activities on social media Read more…

By Menken, 4 years7 months ago
Articles

GDPR is coming – do you know what to do?

The EU General Data Protection Regulation (GDPR for short) will be active from the 25th of May 2018. Irrespective of where you are located in the world, if you collect client data from persons in the EU the GDPR regulations are now part of your new standard operating procedures. You Read more…

By Menken, 4 years7 months ago
ITIL

Why do we still teach ITIL after 20 years?

Yes – just saying it out loud is scary, but it has been 20 years since I received my ITIL® Foundation certificate. It has been 16 years since I started teaching the principles and concepts of the ITIL Service Management methodology. ITIL is old news These days you hear more Read more…

By Menken, 5 years7 months ago
LAB Use Cases

How to oversee Systems Security management by competencies

USE CASE: Meet Michael Mullen, Lead Systems Programmer in Computer Software, Greater New York City Area. He needs to oversee Systems Security management by competencies. He likes to revise his understanding of Systems Security Management. That’s why he needs to keep an eye out on technologies and frameworks in the fringes of Read more…

By Menken, 6 years7 months ago

Posts navigation

Previous 1 … 14 15 16 17 Next
Recent Posts
  • Information Security Management 1 big thing: Interface with Project Managers to coordinate contract prioritization with Sourcing department.
  • Information Security Management 1 big thing: Be certain that your staff maintains an awareness of information security news and trends.
  • Information Security Management 1 big thing: Make sure the Security engineer reports to the Director, Information Security with core responsibilities.
  • Information Security Management 1 big thing: Test, configure and install network equipment in pre deployment, deployment, and post deployment phases.
  • Information Security Management 1 big thing: Be confident that your company is involved in information security practices and procedures.
Archives
TAOS logo

Our office is located at 22B/302 South Pine Road Brendale, Qld 4500 Australia

(AU)  07 32052596

Email: [email protected]

 

Facebook
Twitter
YouTube
LinkedIn
  • About us
  • What We Do
  • Toolkit Membership
  • Shipping & Returns
  • Contact Us
  • Sitemap
  • Support
  • FAQ

  • Self-Assessment Licensing
  • End User License Agreement
  • Privacy Policy
With 300+ Academic Citations our work is in the top 1.8% of most cited work worldwide.
© The Art of Service. All Rights Reserved