Articles & blogs by James Gooch

Closing the IT security risk management gap: 3 Ways to connect IT & the Board

access-all-areas
Join us, and our expert panel, as we discuss just exactly why some IT teams make the business case successfully and ensure that sufficient budget is granted and that it is invested in the optimum areas – whilst some don’t – and what you need to do to turn process into something meaningful that actually delivers improved confidence.
04 Dec 2013

Data governance – measuring and managing quality (Available on-demand)

Big data artwork
The aim of this web seminar is to guide you through the stages of creating a durable and effective data governance strategy.
11 Sep 2013

Third party applications – a chink in your armour

Security threats - password theft
Third party applications – a chink in your armour. During this web seminar we will explore how to mitigate the risk from third party applications using a step by step guide to patch management as part of a complete endpoint security management programme.
12 Dec 2012

How SMEs can punch above their weight (Available on-demand)

Join me Stuart Sumner, as our expert panel looks at what organisations of the same size as yours are doing as we discover why small is usually more beautiful than big.
21 Nov 2012

The on-premise vs cloud equation: where now for enterprise applications? (Available on-demand)

During this web seminar we will explore the on-premise vs in-the-cloud equation, including the factors that organisations should be considering as they struggle with the apparently opposing forces of flexibility and scalability on the one hand and security and control on the other.
11 Jul 2012

The small business office of the future (Available on-demand)

Live: 18th July at 10am. Join our expert panellists and case studies to find out how IT managers in SMEs are dealing with these trends and to understand how technology and new working practices will shape the SME office of the future
27 Jun 2012

Learning to love BYOD - watch now

Learning to love BYOD. Now available on-demand.
08 Jun 2012

Top 10 causes of IT disasters – and how to deal with them (Available on-demand)

During this web seminar we will be looking at the sorts of incidents that can bring data centres grinding to a halt and what can be done about them.
22 May 2012

3 steps to effective data security

Available on-demand. During this web seminar we look at how to achieve a best-in-class approach to data protection with a view to coming up with a best practice guide. We will also be showing you how you can gauge the maturity of your security systems, enabling you to plug any holes before your precious data starts to leak through them. Register for this free event now.
09 Mar 2012

BPM: the critical first 100 days - on-demand

During this Computing web seminar we will be looking at the critical things to get right in the first 100 days of a BPM project, from establishing metrics and achieving buy-in to evaluating success and learning lessons for the next phase. Register for this free event now.
07 Mar 2012