Thursday, July 14, 2005

12 behaviors for creating a healthy risk culture


NOTE: You received this newsletter as a subscriber to the ITworld.com Site Network. See below for unsubscribe information.
Please add ITworld.com@itw.itworld.com to your address book to ensure that you receive our newsletters in your inbox.

ITworld.com Voices Special on Xtreme Programming

An eNewsletter published by ITworld.com - Part of the ITworld.com Site Network



ITworld.com Voices is a new collection of interviews, commentary and conversations with IT leaders on important technology issues. Topics this week include creating a healthy risk culture, the state of IT communication, and transforming the CIO.


New Programs This Week...

    12 behaviors for creating a healthy risk culture

    "One of the key maxims of risk management is that assumptions made are risks that you have accepted," says Dr. Robert Charette, a Fellow of the Cutter Consortium and Director of its Enterprise Risk Management and Governance practice. In this interview, Dr. Charette outlines 12 key organizational behaviors that can help IT leaders create and manage a risk culture in their organizations.

    State of IT communication - Rich interaction on the decline

    Long gone are the days of rich interactions with IT team members - the one-on-one discussions, gatherings of smaller teams, or the simple impromptu hallway conversations. Instead, more and more IT pros find their time spent on less meaningful exchanges in larger, ineffective meetings, says Tom DeMarco, author of various project management and workplace efficiency books. Here, Tom talks about the state of interaction in the workplace, why we have too many bad meetings, and how we can change the way we work.

    Transforming the CIO

    Transforming the CIO According to a recent report from the IT Leadership Academy, 16 percent of CIOs are world-class, 23 percent are good, and the rest are just average - and that's being generous. What group do you belong to? Thornton May, a self-described "CIO groupie" and long-time industry observer, speaks candidly about the challenges facing today's CIOs, and why what some of them are doing just isn't working.

    If you haven't heard enough, go to ITworld.com Voices for additional interviews.

Calling all Gadget Addicts...


    It's the Great Gadget Giveaway!

    Gotta Gadget is our new section dedicated to gadgets that we can't imagine life without. They aren't necessarily new, or leading edge, but we love them just the same. Here's where you come in... If you tell us what gadget you love and why, we'll enter you into a drawing for July's Gadget Giveaway. It's a gadget that a true gadget geek should never be without - the Swiss Memory USB - which includes a USB flash drive, LED light, Swiss Army knife and ballpoint pen.



    Advertisement


Enjoy.

Jodie
ITworld.com
jodie_naze@itworld.com


CUSTOMER SERVICE
Manage subscriptions
Newsletter FAQs
Change your email address
Instructions on how to change your email address

CONTACTS
Advertising:
Clare O'Brien,
VP of Sales
Other Inquiries:
Jodie Naze,
Director, ITworld.com Site Network

www.itworld.com   open.itworld.com   security.itworld.com   smallbusiness.itworld.com   storage.itworld.com   utilitycomputing.itworld.com   wireless.itworld.com
Privacy Policy   Copyright © 2005 Accela Communications, Inc. All rights reserved
Brought to you by:   Accela Communications, Inc.
118 Turnpike Road - Southborough, MA 01772 USA
Advertisement



Sponsored Links

Intuit Help Desk & Network Monitoring Software
Intuit provides Track-It! and Network Monitor - the leading help desk and network management solutions for call tracking, IT asset management, patch management, electronic software distribution, and network performance monitoring. Free demo & trial
OpManager - Network Monitoring Software
OpManager is a web-based network monitoring software that offers WAN, Server & Application monitoring. OpManager offers intuitive Mapping, Monitoring, Alerting & Reporting functionality. Take Control of your Network in minutes. Download Now!
Barracuda Spam and Spyware Firewall
Reclaim your Network. Stop Spam, Spyware and Viruses at the gateway. The leading solution.
Policy Management vs Vulnerability Scanning
Which is right for you? Vulnerability scanning products test for known vulnerabilities. Policy management products are pro-active by locking the doors in advance of a possible attack. Click to request our white paper.
IT Certification and .NET Developer Training
Industry leading MCSE, CCNA, CCNP, MCSD, A+ courses and more. Live instructor led training on CD. Hands-on labs, study guides, exam simulators, Around-the-Clock live educational support.
» Buy a link now


Click here to forward this message to a friend!


Click here to change or remove your subscription.



No comments: