English   Deutsch   Русский   中文    
European Identity Conference 2011

Workshop Track I


Business Model for Information Security (BMIS)
13.05.2011 09:00-12:00

Business Model for Information Security (BMIS)
Rolf von Roessing, ISACA


Business Model for Information Security (BMIS)
13.05.2011 13:30-16:00

Business Model for Information Security (BMIS)
Rolf von Roessing, ISACA

top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
How Mature is your IAM Program
Maturity Models come of age already. They themselves have matured considerably. Like many other methodologies they have followed a certain hype cycle characteristics and have by now arrived on a plateau of general acceptance. Nevertheless rating the maturity of IAM/IAG programs is not easy. Therefore some questions arise when a maturity model is to be employed. What are these questions?
KuppingerCole Maturity Assessement Program
KC MAP offers a standardized approach to rate the status of current IT programs from both the Business and IT perspective. KC MAP identifies and prioritizes the fields of activity, delivers focused advice for further IT spending, advises on the current trends that are relevant to your organization.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole