Share

Live Webinar April 4th, 2018 11:00 am – 12:30 pm EDT
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider:  Computer Aid Inc IT Metrics & Productivity Institute
(Rep 2733)

In this webinar Gary Cokins describes how enterprise risk management (ERM) is now being integrated with various enterprise performance management (EPM) methods.

About Gary Cokins

Gary Cokins (LinkedIn profile) is an internationally recognized expert, sought after keynote speaker, and author in advanced cost management and performance improvement systems.

Founder of Analytics-Based Performance Management, an advisory firm located in Cary, North Carolina Gary has written numerous books and mentored individuals and organizations in performance management over the last 40+ years. Gary received a BS degree (honors) in Industrial Engineering/Operations Research from Cornell University (1971) and his MBA from Northwestern University’s Kellogg School of Management (1974).

Gary began his career as a strategic planner with FMC’s Link-Belt Division. In 1981 Gary began his management consulting career first with Deloitte consulting, and then KPMG consulting. In 1992 Gary headed the National Cost Management Consulting Services for Electronic Data Systems (EDS). From 1997 until recently Gary was in business development with SAS, a provider of enterprise business analytics and intelligence software.

Gary’s two most recent books are Performance Management: Finding the Missing Pieces to Close the Intelligence Gap  and Performance Management: Integrating Strategy Execution, Methodologies, Risk, and Analytics .

His most recent book co-authored with Larry Maisel (LinkedIn profile) is Predictive Business Analytics: Forward Looking Capabilities to Improve Business Performance. Visit Mr. Cokins site at GaryCokins.com.

Click to register for:
The Integration of Enterprise Risk Management (ERM) &
Enterprise Performance Management (EPM)

1.0 0 0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

The Live Session Is Free But…

Get the recorded version of this session & over 500+ other Quality PDU Sessions with an
ITMPI Membership

Search for “2733” to see other great titles available!
Memberships Include all PDU Codes

Note: ITMPI charges a fee to obtain individual PDU codes. This fee ONLY needs to be paid if you ask the provider for the code – This code should be able to be obtained from the PMI.ORG site for free. An ITMPI Membership entitles you to receive all ITMPI PDU Codes and recordings.

Share

Live Webinar March 28th, 2018, 10:00 am – 11:00 am  EDT
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider: Gartner Webinars

Enterprises are increasingly attracted to blockchain and exploring how to make sense of this radical technology. But they are hampered by uncertainty in the business value proposition and immaturity of technology.

In this webinar, David Furlonger (LinkedIn profile, Gartner bio) VP & Gartner Fellow & Rajesh Kandaswamy (LinkedIn profile, Gartner bio) Gartner Research Director will discuss the impact of blockchain on enterprises in the near-term and present the highlights from the recent Gartner 2nd special report on blockchain.

Discussion Topics:

  • Reality of blockchain usage in enterprises
  • Technology developments and considerations for blockchain
  • What to expect for blockchain in 2018

Click to register for:
Blockchain Special Report: What To Expect In 2018

0 0 1.0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

Share

Online Webinar  – Recorded February 1st 2018
Activity Type: Education – Online or Digital Media Up to 1 PDU – Free
Provider:
ProjectManagement.com / Gantthead (REP #2488)
Once viewed your PDU Will automatically Be recorded with PMI®

ProjectManagement.com / Gantthead premium content
Is available to PMI® members.

This data security and compliance methodology is based on examining third-party vendors against the development of a three dimensional risk based model.

The final deliverables of the risk impacts, findings, enterprise requirements, and remediation are presented quantitatively.

A number of professional surveys indicated that information technology and security managers, directors and executives reported significant data breaches linked directly or indirectly to third-party access.

Unfortunately, these security breaches are trending upwards.   In addition, there is an absence of a structured and quantifiable methodology to measure the third-party risks on an enterprise, as well as what are the expected requirements from the third-party to substantiate the evidence that sound risk management practices are in place.

Types of risk a third-party may have on an enterprise when third-parties store, access, transmit or perform business activities.

It represents a probable risk exposure for the enterprise. The degree of risk and the material effect are highly correlated with the sensitivity and the transaction volume of data.

Outsourcing certain activities to a third-party poses potential risk to the enterprise.

Some of those risk factors could have adverse impacts in the form of, but not limited to, strategic, reputational, financial, legal or information security issues. Other adverse impacts include service disruption and regulatory noncompliance.

Examples of third-parties’ services include, but are not limited to, technology service providers; payroll services; accounting firms; invoicing and collection agencies; benefits management companies; consulting, design and manufacturing companies.

Most third-party commercial relationships require sending and receiving information, accessing the enterprise networks and systems, and using the enterprise’s computing resources. The risk posed at different levels and the impacts range from low to very significant.

Join Robert Putrus (LinkedIn profile) and learn how you as a program or project manager can adopt this methodology  in its entirety or adjust it to fit your enterprise’s uniqueness then build your own PMBOK process groups and knowledge areas.

Note: You have to sign in to ProjectManagement.com with your PMI® credentials to register for this opportunity. If you are not signed in with your PMI® credentials you will not see the “Register for this webinar” link

Click to register for:
A Risk-Based Management Approach
To Third-Party Data Security, Risk & Compliance

1.0 0 0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

Share

Online Webinar Recorded – Dec 12, 2013
Activity Type: Education – Online or Digital Media 1 PDU – Free
Provider:  TechGIG

The session will explain definition of stakeholders and their importance in a project.

Some stories around stakeholder will be presented to describe how they can influence a project success or failure.

A details process of identification of the stakeholder using Onion diagram will be explained.

Presenter: Raghuraman Kadambi Sr. (LinkedIn profile) Consultant/Principal Instructor  Project Management, SKIL GLobal

Or Watch On YouTube:
Project Stakeholders Identification:
Critical Process In Project Management

1.0 0 0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

Share

Live Webinar February 15th, 2018, 11:00 am – 12:00 pm EST
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider: Gartner Webinars

Addressing software as a service (SaaS) change management is ranked among the top five SaaS challenges for technical professionals.

Current software change management strategies are unsuitable for SaaS solutions as changes are typically rapid and inconsistent.

New change management strategies need to be formed specifically for a SaaS portfolio and take into account that the majority of changes will be pushed and controlled by the SaaS provider, not IT.

In this webinar Kyle Davis (LinkedIn profile, Gartner bio) Gartner Research Director will discuss the Gartner agile and risk-oriented approach that enables IT to perform SaaS change management focusing only on the upcoming changes that may disrupt the business and impact enterprise users.

Discussion Topics:

  • Why change management is one of the top 5 issues for technical professionals implementing SaaS
  • Using risk levels to determine if and when IT should control change management
  • Using shorter cycles for SaaS testing to keep up with change cadence

Click to register for:
How To Address SaaS Change Management

0 0 1.0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

Top Cybersecurity Trends For 2018

Share

Live Webinar February 12th, 2018, 10:00 am – 11:00 am EST
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider: Gartner Webinars

Cybersecurity concerns continue as organizations globally grapple with technology changes affecting them.

Threats to that technology and its supporting process are increasing in number and sophistication.

Traditional IT security leaders have now become digital security leaders as they expand support to address risks for technology-savvy engineering and physical environments while embracing expanded roles for cloud and mobile services.

In this webinar Earl Perkins, (LinkedIn profile, Gartner bio) reviews the cybersecurity lessons learned and informs you how to use the past to create the future.

Discussion Topics:

  • What technology and market trends are occurring to meet the changing digital security landscape
  • Which security technologies and processes have changed to accommodate the demands of digital business
  • How digital security leaders in organizations can use these trends to their advantage

Click to register for:
Top Cybersecurity Trends For 2018

0 0 1.0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.