Tagged - technology
Strategy Exploration GuideUse this guide to understand and conduct the analyses and activities recommended by the Strategy Discovery Tool. |
|
Introducing Lisa Highfield, Principal Director of HR Research and Advisory Services at McLean & CompanyIn this Q&A, Lisa talks about her background, what drew her to this role, how we can bridge the gap between HR and IT, and the challenges at the top of HR leaders' minds. |
|
Standard PESTLE Analysis TemplateUse this template to conduct a PESTLE analysis to guide the assessment of your external environment. |
|
CHRO Roundtable: Digital transformation is here, how is HR moving forward?A distinguished panel of senior HR executives share their experiences with HR technology and the role HR can play in supporting the ongoing digital transformation... |
|
Enterprise Agile CoachThe Enterprise Agile Coach will work closely with Senior Management and IT Leadership to establish or improve their Agile practice across the enterprise. |
|
Information Security Compliance ManagerInformation Security Compliance Managers identify, manage, and report on company compliance, regulatory, legislative, and contractual requirements. |
|
Chief Information Security OfficerThe Chief Information Security Officer's role is to provide vision and leadership for developing and supporting security initiatives. |
|
Security AdministratorThe Security Administrator’s role is to manage and tune in-house computer software systems and network connections to ensure high levels of availability and security of the... |
|
Security ArchitectThe Security Architect focuses on designing and developing security architecture patterns that meet regulatory obligations and data protection requirements. |
|
Head of IT Vendor ManagementThe head of IT vendor management performs and/or manages the group with a combination of contract, performance, relationship, and risk management roles with IT vendors. |
|