Enterprise risk management has not lived up to its potential, and our authors have demonstrated numerous reasons why. They have also outlined numerous recommendations on how the practice, processes, and techniques underpinning ERM can be improved, as well as possibly a better way to set expectations about what ERM can and cannot do.
July 2012
In this issue:- Fixing ERM: From IT Security to Human Behavior
- IT Security: A Bottom-Up Approach to ERM
- Possibility-Based ERM
- ERM: The Next Generation
- Enterprise Risk Management: There's a Human Side, Too
- Risk Management: Could Risk Facilitation Be the Missing Link?
- The Fallacies of Modern Project Risk Management: A Process Worth Disengaging From?
June 2012
Costly, Burdensome Projects
ITIL implementations have consistently ended in cost overruns, deadline extensions, and unmet promises. The emphasis on improving IT processes instead of leveraging technology for business improvements has jeopardized companies’ profit and revenue goals. ITIL projects have diverted critical IT resources to nonproductive IT investments.
In this issue:- ITIL and IT Operational Excellence
- Outcome! The Latest "Buzz" in Service Management
- ITIL with a Shot of Capitalism
- Must You Choose Between ITIL V2 and V3?
- If All You Are Doing with ITIL Is Process, You May Be Missing the Boat
- What's the ITIL Score?
- When CMMI Is Not Enough: A Case for Using ITIL V3 in Application Lifecycle Management
May 2012
Consumerization Acts as a Catalyst
Consumerization is the impetus for a renewal of IT. BYOD will spur creativity, increase agility, and bring new benefits to business.
Consumerization Sows Confusion
Consumerization will obliterate the hard-won efficiencies of standards and bring chaos to downsized IT operations areas. BYOD is the new technical Tower of Babel.
In this issue:- The Consumerization of IT: Blessing or Curse?
- The Effects of Consumer-Driven Innovation on Enterprise IT
- What the PC Revolution Can Teach Us About the "Consumerization of IT"
- The Consumerization of IT and Its Impact on Enterprise Business Applications
- BYOD Is Not Really About Devices
- Consumerization of IT, Social Computing, and Mobility as the New Desktop
April 2012
To Battle!
The threats just keep coming in this new, interconnected world. DDoS attacks, internal security breaches, and even politically motivated "hacktivism" all but ensure that your organization will experience a security incident. Don't think if, think when.
In this issue:April 2012


