article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Wireless Policy. How wireless infrastructure devices need to be configured. Some of the assets that these policies cover are mobile, wireless, desktop, laptop and tablet computers, email, servers, Internet, etc. Legal experts need to be consulted if you want to know what level of encryption is allowed in an area.

Policies 107
article thumbnail

The power of connected ecosystems in aerospace and defense

Capgemini

His focus areas in consulting include Project Management Organizations & Methodology, Supply Chain & Quality, Transfer of Work, Lifecycle Experience & PLM, Configuration & Change Management, Controlling & Financial Systems including reporting.

IoT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

7 ways to cope with a C-level rival

CIO

The goal isn’t to change their mind, but to build trust that you won’t stab them in the back,” explains Marina Nitze, former CTO of the US Department of Veterans Affairs and the author of Hack Your Bureaucracy. Gold Associates, a business consulting and research firm. Gold, president and principal analyst at J.

article thumbnail

7 ways to cope with a C-level rival

CIO

The goal isn’t to change their mind, but to build trust that you won’t stab them in the back,” explains Marina Nitze, former CTO of the US Department of Veterans Affairs and the author of Hack Your Bureaucracy. Gold Associates, a business consulting and research firm. Gold, president and principal analyst at J.