IT Project Management

Community information
The IT project management community on BrightTALK includes thousands of IT project and portfolio management professionals. Find relevant webinars and videos on agile methodologies, scrum strategy, project management processes and more. Attend live webinars or view on demand content presented by recognized thought leaders in the IT project management industry.

Webinars and videos

  • Problem Management is a game changer. It is critical in developing real quality in service delivery. However, very few organisations actually get this aspect of ITSM working well.

    This fourth session in the ITSM Goodness series will look at how we spend too much time focussing on efficient ‘fire-fighting’ (Incident Management), rather than looking at avoiding recurrence or eradicating faults altogether - ultimately a better solution for customer and provider alike. Often there are some simple misunderstandings around what Problem Management is or what is required to make it work. Also it can be difficult to find the right people to make Problem Management happen, particularly as it is not a simple linear process that can be ‘industrialised’ like Incident Management. This session provides simple clear guidelines on what is needed and how to make Problem Management work well for your organisation.

    This 8-part monthly series is designed to provide real-time value to newcomers and take to the next level those already familiar with the approach.

    ITSM Goodness is an approach created by Barclay Rae to deliver practical, proven, successful and accessible advice and guidance for ITSM and IT professionals. The focus is clear and simple – on achieving the right business outcomes from IT, and how this is delivered, via the Customer Experience.
  • As we continue to explore the ERP implementation process, we’re going to dive deeper into one technology solution you might consider for a successful ERP implementation. Join us as we discuss Oracle eBusiness Suite Release 12. You’ll want to join us if you’re:
    • Thinking about upgrading to release 12
    • On R12.1 and considering moving to R12.2
    • Just looking for a little ‘positive sell’ to add to that budget request so you can fund your upgrade

    Oracle eBusiness Suite Release 12 was defined as “The Global Business Release”. This doesn’t encompass just its geographic reach…the Suite is a comprehensive tool whose breadth and depth across industries and business functions is compelling for customers around the world.

    During this session, participants will learn about:
    • The changes to R12.2 including the foundational architecture improvements and financial enhancements
    • How the strength of Financials Release 12 allows businesses to work globally - across applications, divisions and regions and the tools necessary to achieve that.
    • Integration, data management and reporting

    Oracle eBusiness Suite Release 12 makes it easier and less expensive for customers to implement, manage and scale global applications - ultimately improving the overall ownership experience.
  • Rich data visualisations are a requirement nowadays for business intelligence consumers. An advanced visualisation and analytics product must be implemented in order to turn data into meaningful information to empower smarter, better-informed decisions.

    Join us for an interactive "The Secret Attributes of Great Data Visualizations" Web Seminar to learn how and what data visualisation advancements you could be making in your own organisation.

    Attend to:
    - Preview and discuss the data visualisations from within the Actuate products portfolio and its integration with other providers
    - Understand how visualisations can transform messages into meaningful insights
    - Learn how analytic visualisations need to be an integral part of workflow involving exploration of data, discovery of hidden relationships and analysis to determine actionable intelligence
  • Dans la communication avec les clients, la qualité et la quantité d’information personnalisée mise à disposition en libre service devient décisive pour construire une relation durable et constitue un véritable avantage compétitif. Pour ce faire, les applications décisionnelles de restitution d'informations personnalisées doivent être :
    -rapides à développer même en exploitant des sources de données variées
    -faciles à déployer et intégrer
    -capables de proposer des restitutions efficaces, complètes et intuitives pour l'utilisateur final.

    Participez à notre webinar du jeudi 27 mars 2014 à 11h00 pour découvrir comment la toute dernière plateforme d'Actuate vous aide à gagner en compétitivité en permettant à vos utilisateurs, quelque soit leur nombre, de visualiser leurs informations en temps réel et prendre des décisions personnalisées.

    Vous découvrirez comment :

    -Créer rapidement des applications de restitution d'informations personnalisées interactives à forte capacité à monter en charge et très performantes
    -Intégrer facilement les restitutions personnalisées à une application tierce ou un portail pré-existant
    -Améliorer le taux d'adoption et le plaisir d'utilisation grâce à une interface utilisateur simplifiée et homogène
  • Applications have become competitive differentiators for businesses. Organizations who are able to deliver higher quality applications to their customers, faster than their competition, are winning the race in the Age Of The Customer. Many organizations understand this conceptually but struggle to quantify the benefits and costs of improving delivery capability. In this webinar, Kurt Bittner of Forrester Research, Principal Analyst serving Application Development and Delivery Professionals, will describe how leading organizations have gone about this analysis and how they are measuring their results.
  • Still using a file server to share documents? What about that FTP? Emailing large attachments which get stuck in your inbox? The move to cloud computing allows businesses to access information , applications and content from anywhere, anytime on any device. As individuals have demanded the need to have the same ease of use in their enterprise grade applications as in consumer applications, the move to cloud has accelerated product adoption, lowered costs and increased productivity. Learn about various companies who moved to the cloud with Box, best practices and how to easily share without on-premise technology.
  • Join Will Gilchrist as he dives into the sequel to one of our highest rated webinars, EDI Best Practices: Part 1. This webinar will help you by providing a step-by-step process which includes:

    •Simplifying business rules and mapping specs
    •Testing
    •Auditing, reconciliation and reporting
  • New research from The Economist Intelligence Unit shows how businesses are starting to view cyber-attacks as inevitable – and also as a potential opportunity. The report, sponsored by Arbor Networks, entitled “Cyber incident response: Are business leaders ready?” shows that despite 77 percent of companies suffering an incident in the past two years, over a third of firms (38 percent) still have no incident response plan in place. In fact, only 17 percent of businesses globally are fully prepared for an online security incident. Despite this, the majority (67%) of senior executives believe cyber incidents can be an opportunity to enhance their company’s reputation, provided the response is competently handled.

    Attend this webinar to learn:

    • Why the level of preparedness is being held back by lack of understanding about threats
    • How an emphasis on reputation is driving formalization of plans and processes
    • The reasons firms remain reticent about disclosing incidents and sharing intelligence about threats
  • For many businesses today, generally only two things are certain: uncertainty and an accelerating pace of change. In this environment, the ability to develop and implement new strategic initiatives and change rapidly is becoming a key differentiator. Organizations focus on defining major strategic initiatives but many companies struggle to implement those initiatives. The PMO plays a crucial role in enabling this by actively supporting the implementation of key strategic programs.

    In this session, Jennifer McCaffrey of PMI examines the capabilities necessary in the PMO in order to shift emphasis away from process and towards the more important role of contributing to value delivery. Partnering with respected research firms including The Economist Intelligence Unit, Forrester Consulting and the Boston Consulting Group PMI will provide valuable insight and statistics that reveal the critical role of the PMO - to serve as enablers of strategic change in any organization.
  • The role of Stage-Gate® and Agile in New Product Development is a hot topic of interest. Are they complementary or mutually exclusive? Michelle Jones will reveal the real reason why so many businesses have come to rely upon the Stage-Gate Idea-to-Launch System for the successful execution of their product innovation strategies. She will also discuss the pros and cons of Agile project management techniques as they relate to product innovation and offer practical advice when integrating Stage-Gate and Agile for project success.
  • IT is not the marginalized organization it used to be, and is now intertwined with the business. Creating IT-enabled business value therefore requires line of business and functional leaders, including the CIO, to work together from a common agenda. Join this session to see how to create and make that agenda visible, so that the organization as a whole understands what it is getting. Business heads will then be able to understand application requirements and consumption, and make portfolio decisions based on business need. Smart organizations are making the CIO a business partner who can tell the business exactly how and what it’s consuming and how it could be more effective.
  • Will Simmons, New Product Portfolio Support Manager at Tata Steel Europe, will take you through the processes and techniques used by Tata Steel to bring new products to market. New offerings in Tata Steel’s extensive product portfolio follow a lengthy and finely-tracked process from concept stages to R&D, and through the first years of sales, all managed with a PPM system. Join us to learn proven techniques for managing new product development based on Tata Steel’s use of PPM for areas including portfolio management, value management, and marginal analysis. David Werner of CA Technologies will join Will Simmons to answer questions submitted by the audience.
  • Realizing benefits is no easy task, especially when everyone has a different definition of value. Join Dr. Jim Noble and Alan Guibord of The Advisory Council to gain insight and insider secrets to how some of the world’s top organizations create measurable benefits from their strategic plans and operational outcomes, and thereby position the IT leadership as outcome-driven rather than as merely enablers.
  • Many organizations today are focused on making the annual planning process more strategic. There is an increased understanding that the portfolio of projects has to be managed against organizational goals and objectives. That can mean perfectly good projects must stop or change because they no longer align with what the organization needs to achieve. Simultaneously, organizations are driving themselves to become more flexible and adaptable, further driving change into projects. Are these two concepts creating a harmony among executives and execution teams, or are they causing confusion and challenges?

    The recent research report Top Down Planning and Bottom Up Execution – Harmony or Discord? reveals some surprising results. Join the author of the report, Andy Jordan, as he discusses the findings and offers recommendations to ensure your projects stay aligned with strategic objectives. Topics will include:

    • Open communication around planning
    • Importance of a formal portfolio
    • Frequency of planning cycles
    • The role of Agile in planning
    • Importance of PPM maturity level

    David Werner from CA Technologies will join Andy for the live presentation and Q&A from the audience. All attendees will receive a complimentary copy of the report.
  • Nearly all business transformations today are technology-dependent and focus on breaking traditional business silos. CIOs are in a unique position to exploit their knowledge of both business and technology to influence or even drive the direction of the transformation. Join this session featuring guest speaker Marc Cecere of Forrester Research to unveil the different types of roles CIOs play in business transformation. Determine which role you can play as Leader, Diplomat, Influencer, and Tactician to achieve success.
  • Communications is a rapidly evolving channel employed by organizations for internal messaging, employee collaboration and messaging. As a result, many organizations are seeking ways to consolidate the technology platforms used for these communications. This presentation will discuss some of these efforts and what’s behind them, as well as explore what the communication platforms of the future will look like in the businesses and homes of tomorrow. The following topics will be covered:
    1.)Unified Communication platforms
    2.)Social Media and tools for business collaboration
    3.)The “Internet of Everything“

    As a result of the webinar, participants will:
    - Understand the how to develop a high level strategy for the design and implementation of appropriate communication technologies for their respective organization
    - Learn what technologies are available to stay abreast of changes communication platforms.
    - Understand the importance of a network infrastructure to support new communication platforms
    - Be aware of how hiring strategies will need to be examined in order to obtain and retain the younger generations moving into the business world based on the advent of new communication methods.
  • Although NTP reflection/amplification attacks have been observed in the wild for many years, recent high-profile attacks have drawn more attention to them. In this webinar, a member of the Arbor Security Engineering and Response Team (ASERT) will conduct a deep dive into some recent NTP attacks. Network-scalable best practices for detection, classification, trace-back and mitigation of high-impact attacks, ranging from the tens of Mbps up to more than 300 Gbps in size, will be addressed.
  • Make no mistake – your Service Desk is THE focal point and flagship of IT.

    Regardless of how good your technical resources and capabilities are, the perception of your overall service quality will be highly influenced by your Service Desk. It needs to be supported and invested in – both financially and in terms of management commitment and support.

    So how can your Service Desk be excellent?

    This third session in the ITSM Goodness series looks at what makes an excellent Service Desk – what is needed to achieve this, including both internal Service Desk measures and what support is needed from across the whole IT and service delivery organisation. In addition this session identifies exactly what is needed from management in terms of relevant resources and support, in order to enable your Service Desk to fulfill its brief of delivering excellent and efficient customer service. We will also look at what is needed from other teams to support their Service Desk and how the role of Service Desk Manager is key and central to the success of the ITSM operation.

    This 8-part monthly series is designed to provide real-time value to newcomers and take to the next level those already familiar with the approach.

    ITSM Goodness is an approach created by Barclay Rae to deliver practical, proven, successful and accessible advice and guidance for ITSM and IT professionals. The focus is clear and simple – on achieving the right business outcomes from IT, and how this is delivered, via the Customer Experience.
  • Please join us on March 6th, 2014 at 10am GMT for our latest Webinar Event: Turning Obstacles into Advantages by leveraging big data analytics.

    The explosion of new data sources enables companies to gain insights that were not previously available, but with these new opportunities also come new challenges like resource scarcity and Big Data integration. Companies are turning to advanced analytics and innovative new technologies to answer critical customer-centric questions faster than the competition. But resources, especially Data Scientists and Hadoop experts are rare. BIRT Analytics, Actuate’s predictive analytics and visual data mining solution, helps business users rapidly uncover these insights and effectively build a customer-centric strategy with advanced, easy-to-use analytics.

    You will learn how to:

    -Create sustainable business growth by uncovering revenue-generating customer opportunities
    -Leverage exploratory, descriptive, and predictive analytical and statistical techniques to drive customer-focused strategies
    -Drill down into data to identify patterns and hidden relationships, profile top buyers and accurately forecast trends and profits
    -Arm business users with information to make decisions without burdening the data scientist, nor interrupting IT in its core competencies
  • Wall Street expects it and customer demand it – accountability from Sr. Executives for the future direction of their organizations. How can executives ensure their strategic plans are in action and on track? How can they shift and pivot to changing market conditions along with the risks and impacts to the long-term vision and goals? How do you thread accountability from planning to execution to results? Join this session, where Mary Cauwels, Sr. Director of Solution Marketing, CA Technologies, speaks with Rick Morris, R2 Consulting to ways to bring more accountability through your strategic plan.
  • Join Klocwork and Electric Cloud as they discuss how to make your embedded software development more secure and more efficient. This is just a precursor to what they will talk about at Embedded World in Nuremberg, Germany the following week.
  • It may sound simple to say that we need to define our services, but what do we actually mean by services?

    Questions come up like:

    - How are our services linked?
    - Do we include applications and hardware?
    - Is email a service?
    - Do we include all aspects of technology in the delivery of a service?

    When these and many other questions come up, there is still little real practical definition of how to do this (SLM and Service Catalog) in the best practice world.

    This second session in the ITSM Goodness Series is a straightforward walk-through of how to define your services, how to structure these into a useful format and create a hierarchy that can then be developed into a number of other useful tools, as well as forming the basis of your service delivery and reporting.

    This 8-part monthly series is designed to provide real-time value to newcomers and take to the next level those already familiar with the approach.

    ITSM Goodness is an approach created by Barclay Rae to deliver practical, proven, successful and accessible advice and guidance for ITSM and IT professionals. The focus is clear and simple – on achieving the right business outcomes from IT, and how this is delivered, via the Customer Experience.
  • Most new executives look to make their mark on their organizations by crafting ground-breaking strategic plans. Join Dr. Jim Noble and Alan Guibord of The Advisory Council to gain insight and insider secrets to how some of the world’s top organizations envision the compelling point of arrival, and leverage technology and IT into practical tactics for success
  • Even with the extensive history and experience behind ERP, the ERP implementation process continues to be a very complex initiative for organizations of all sizes. There are several stages that organizations must work through to ensure a successful implementation, and despite careful planning and well-designed program management, implementation missteps and failures are still real concerns for many organizations.

    During this session, we’ll share practical tips on what organizations must consider prior to, during and after an ERP implementation, highlighting real-world case studies to illustrate how many organizations go wrong. We will share 2014 ERP trends and what you should be doing now to ensure your organization can benefit from this ever-changing project landscape.

    As a result of webinar, participants will:
    • Understand how to prepare for the three broad phases of ERP implementation;
    - Pre-implementation – developing a roadmap for success
    - Implementation – effective execution with a well-developed yet flexible implementation plan
    - Post-implementation – ensuring that program objectives are met while establishing the framework for continued effectiveness.
    • Hear case studies on ERP failures and lessons learned.
    • Identify key ERP trends to watch in 2014 to stay current.
  • 85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
  • As additional details on the Target breach - and other retail attacks - leak out, we see that Point of Sale (POS) malware continues to be a significant threat. There are several attack methodologies at play and many forms of new malware, including Dexter, Project Hook, Alina, BlackPoS/Kartoxa, JackPoS, VSkimmer and others. All continue to compromise organizations large and small. In this webinar, Curt Wilson, Senior Research Analyst for Arbor's Security Engineering and Response Team (ASERT) will explore a newly discovered POS attacker’s toolkit, as well as the structure and behavior of typical POS malware and key indicators of compromise.

    Additionally, this talk will review a survey of observed POS infrastructure vulnerabilities that include well-known and lesser- known POS threats that continue to evolve. Attendees should leave with an expanded sense of the threat surface that retailers – including ecommerce organizations – must face. The session will wrap up with an overview of best practices for protecting, detecting, and addressing these evolving threats.

    Attend this webinar to learn about:

    • The various types of POS malware threats and the implications of experiencing an attack

    • The tools and processes that retail IT infrastructure teams need to have in place to protect their organizations from attacks

    • Best practices for dealing with a POS attack; actionable “now what” steps for organizations who have been compromised by POS malware
  • While it's true that VANs have become a commodity, they are no less important to your business. Would you want to pay for electricity or WiFi that constantly failed? My guess is no. So, when choosing a VAN, why would you choose simply based upon price alone? How do you know that you are using the best VAN for your money?

    Paul Lockart, VP Operations with Liaison Technologies, will share five points to investigate when choosing a new provider, or evaluating your existing one. Not all VANs are created equal and this could mean hidden losses to your bottom line!
  • Whether your company is large, small or somewhere in between, business systems, applications and third-party IT services often require significant corporate investments in effort and cost. But because these purchases are infrequent and technology evolves so quickly, many approach these projects with trepidation and employ a myriad of resources to aid in their decision. Although every situation is different, there are some basic actions that every company can take to effectively prepare to choose the options that best meet their needs.

    Whether you are trying to rationalize the continued use of a current tool, identify a new tool to deploy or select a third- party vendor to serve your needs, this webinar will provide you with a helpful roadmap! By utilizing a proven, systemic and phased approach, any size decision can become more objective and manageable – and place more responsibility on prospective vendors to “prove” they are the right choice for your company’s unique requirements.

    By attending this webinar, participants will:
    • Understand the steps of systemically conducting a business application and / or third-party vendor selection assessment in the following phases:
    - Preparation
    - Selection
    - Post-Selection (Implementation Planning)
    • Quantify the benefits of a methodical and objective process
    • Review “Lessons Learned” in order to avoid process pitfall
  • Traditionally catalog syndication has been a tedious, time consuming and error prone manual process that disrupted suppliers’ abilities to effectively update catalogs or item information with their customers. As product lead times shorten, and cycle frequencies increase, syndication is becoming tougher and more critical to manage As a result it can become more expensive to build and maintain, due to the market demands for more dynamic repositories. Continuing existing catalog syndication can be an inefficient model, but one that can easily be changed without risking the benefits of your existing on-prem Item management solution. The benefits are easy to find, and the ROI easy to recognize.



    Hugh Collins, Senior Client Executive at Liaison technologies, will discuss these benefits through case studies and use cases. Whether it be product catalog syndication for retail, or industries such as manufacturing or hospitality, there are benefits that exist across the board.
  • Today, a transformation is underway and we are witnessing the next great frontier in computing. Law firms are trading in legacy software and desktop PCs for tools that are more flexible, affordable and allow them to tap into information from applications, smart phones and tablets. The need to facilitate secure communication and collaboration internally and externally on any device and at anytime is essential. The rise of new cloud-based applications and mobile technologies are transforming the delivery of legal services. Many lawyers are abandoning traditional technology in favor of online alternatives, including secure cloud collaboration tools. Learn how law firms can use cloud applications effectively and securely in this webinar.

    Join this webinar to learn:
    -- Common misperceptions about cloud services
    -- How law firms are using cloud and mobile technologies to deliver better legal services
    -- What law firms should be looking for when choosing cloud service providers