Social Media for Business: What You Need to Know

WatchIT
Show More

Related videos

Red Teams: Securing the Enterprise
To protect business critical networks and applications from a malicious cyber-attack, organizations today often employ Red Teams to challenge and test enterprise system defenses. The Red Team's goal is to covertly seek out vulnerabilities and identify them before the "bad guys" can do any damage. In this report, expert and…
Designing and Implementing Enterprise Mobile Strategies
There is no question that businesses are going toward more mobile computing. Mobile solutions enable the enterprise to respond quickly to customer and market demands, increase productivity and improve internal collaboration. In order to maximize the benefits and minimize the risks with mobile solutions, organizations need to plan and implement…
Effective Global Program Management for IT
Part of the Series: IT Project Management Collection
Today's technology and business initiatives have broken free of the local enterprise by expanding to involve organizations and workers across the far reaches of the globe. In this report, Paula Wagner, project management expert and co-author of the popular new book, Global Program Management, discusses the rise of global program…
The Role of Technology in Counter-Terrorism
Through the tragedy of 9/11, the Boston Marathon bombings and the recent NSA surveillance controversy, we have become aware of the critical nature of technology in the detection and investigation of terrorist threats and actions today. From biometrics and communication intercepts to airport security and chemical weapons detection, technology is…
Virtual Teams: Strategies for Success
Part of the Series: IT Project Management Collection
Organizations that have successfully incorporated virtual teams into their business practices have realized significant benefits. Benefits including reduced business costs, accelerated product delivery and improved levels of competitive advantage. However, along with the advantages virtual teams can offer come many unique challenges that must be addressed in order to deliver…
Cyber Attacks and Security Breaches: Coping with External Threats
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, Anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to…
Cyber Terror and Cyber Risk: What You Need To Know
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and…
Business Intelligence: Best Practices for Successful Project Management
Part of the Series: Business Intelligence Collection
Managing a business intelligence (BI) project is more involved than managing other types of IT projects. For this reason, BI project management requires different techniques and methods to succeed. This program discusses best practices for organizing and managing a BI project. David Sterling, CEO and principal consultant for Sterling International…
Cyber Attacks: The Best Defense is a Good Offense
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and…
Passion For Excellence with Tom Peters
There is a revolution underway, in business, government, and education, people are challenging the "gospel," thinking the unthinkable, and achieving the impossible. Behind it all are people who have a passion for excellence. In A Passion for Excellence, Tom Peters describes and illustrates how successful organizations create and sustain their…
In Search of Excellence
Motivate your employees to be more innovative, responsive and committed than ever before! The In Search of Excellence video is one of the best selling training programs of all time. As you watch this intriguing and inspiring program - Tom Peters and Bob Waterman are your hosts and guides for…
Technology Economics: A Driving Force Behind Business Today
Part of the Series: IT Project Management Collection
Combined technology spending in today's global economy now tops $4.2 trillion dollars, a number larger than the gross domestic product of most nations. This rising global "Technology Economy" is most certainly a driving force in business today. In this program, IT benchmarking expert, Dr. Howard Rubin, introduces us to "Technology…