Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of f-georgesifri

f-georgesifri

Send f-georgesifri an email

Latest from f-georgesifri

  • Risk management: Implementing an enterprise program
    Security

    Risk management: Implementing an enterprise program

    George Sifri looks at success factors involved with the risk management program implemented at his company. He discusses the lessons learned and offers advice on hurdles to expect on the road to risk management.

    f-georgesifri
    Published:  December 15, 2008, 8:30 PM PST Modified:  December 15, 2008, 8:30 PM PST Read More See more Security
  • Risk management: Defining the threat and developing the framework
    Security

    Risk management: Defining the threat and developing the framework

    George Sifri outlines the steps his company took to define threats and opportunities and rate their possible impacts. Find out how you can prepare your company to handle risk.

    f-georgesifri
    Published:  December 9, 2008, 2:53 AM PST Modified:  December 9, 2008, 2:53 AM PST Read More See more Security
  • Risk management: Identifying the need
    Security

    Risk management: Identifying the need

    The early adoption of a comprehensive risk management program can reduce the probability of major IT disasters. Here's how one company recognized the critical need for a risk management plan.

    f-georgesifri
    Published:  December 2, 2008, 9:15 PM PST Modified:  December 2, 2008, 9:15 PM PST Read More See more Security
  • Choosing and deploying a project priority selection system
    CXO

    Choosing and deploying a project priority selection system

    A centralized project priority selection system provides a comprehensive approach to aligning your projects with organizational strategy. George Sifri explains how to pick the right project priority selection system and make the process pay off for you.

    f-georgesifri
    Published:  November 20, 2008, 10:00 PM PST Modified:  November 20, 2008, 10:00 PM PST Read More See more CXO
  • Prioritize projects to align with strategic plan
    CXO

    Prioritize projects to align with strategic plan

    Every project should support your company's strategic plan. Here's how project management relates to the strategic planning process. Also, get tips on how to make sure planning and projects work together.

    f-georgesifri
    Published:  November 18, 2008, 10:51 PM PST Modified:  November 18, 2008, 10:51 PM PST Read More See more CXO
  • Tuning a project management information system for top performance
    Project Management

    Tuning a project management information system for top performance

    George Sifri looks at the key functions and modules of a project management information system (PMIS) and where the system fits into the project management life cycle.

    f-georgesifri
    Published:  October 7, 2008, 8:00 PM PDT Modified:  October 7, 2008, 8:00 PM PDT Read More See more Project Management
  • When to consider a project management information system
    Project Management

    When to consider a project management information system

    A project management information system (PMIS) can provide a framework to help guide the progress of IT projects. Here's how one company decided that a PMIS was needed to help increase project success rates.

    f-georgesifri
    Published:  October 7, 2008, 1:40 AM PDT Modified:  October 7, 2008, 1:40 AM PDT Read More See more Project Management
  • Tips for passing the PMP certification exam
    Project Management

    Tips for passing the PMP certification exam

    These tips and techniques will help you prepare for the Project Management Professional certification exam offered by the Project Management Institute.

    f-georgesifri
    Published:  June 5, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:42 AM PDT Read More See more Project Management
  • Derailed projects: Developing and conducting the recovery plan
    CXO

    Derailed projects: Developing and conducting the recovery plan

    So you know you need to turn a project around, but how do you proceed once you've assessed the situation? The answer is planning and implementing your recovery plan. Here's your road map.

    f-georgesifri
    Published:  April 9, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:23 AM PDT Read More See more CXO
  • Derailed projects: Building an assessment plan
    Project Management

    Derailed projects: Building an assessment plan

    This series helps even experienced project managers recover troubled projects. Here's a structured process you can use to assess the situation.

    f-georgesifri
    Published:  April 2, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:30 AM PDT Read More See more Project Management
  • 1
  • 2
  • Next
15 results

TechRepublic Premium

  • TechRepublic Premium

    Employee privacy policy

    PURPOSE This policy describes the organization’s employee privacy guidelines and outlines employee privacy expectations. From the policy: POLICY DETAILS The organization’s IT equipment, services and systems are intended for business use only. However, the organization acknowledges that staff, consultants and volunteers occasionally require opportunities to make or receive personal phone calls, access personal email, utilize ...

    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Security response policy

    PURPOSE The purpose of this Security Response Policy from TechRepublic Premium is to outline the security incident response processes which must be followed. This policy will assist to identify and resolve information security incidents quickly and effectively, thus minimizing their business impact and reducing the risk of similar incidents recurring. It includes requirements for both ...

    Downloads
    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    End user data backup policy

    PURPOSE This policy from TechRepublic Premium provides guidelines for reliable and secure backups of end user data. It outlines the responsibilities of IT departments and employees to identify tasks and action items for each group. The policy can be customized to fit the needs of your organization. From the policy: IT STAFF RESPONSIBILITIES IT staff ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 5:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Electronic communication policy

    This policy from TechRepublic Premium provides guidelines for the appropriate use of electronic communications. It covers topics such as privacy, confidentiality and security; ensures electronic communications resources are used for appropriate purposes; informs employees regarding the applicability of laws and company policies to electronic communications; and prevents disruptions to and misuse of company electronic communications ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 3:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice