214Results for "Post Merger Integration"
-
Develop a plan for post-merger integration success2m
Develop a plan for post-merger integration success
From: Strategic Financial Management in Corporations
Video
-
Understanding post-merger outcomes2m
Understanding post-merger outcomes
From: Understanding the Impact of a Merger for IT Teams
Video
-
End-to-end M&A business process: Post-merger4m
End-to-end M&A business process: Post-merger
From: Managing Your Cybersecurity Program through a Merger or Acquisition
Video
-
A Beginner’s Guide to Mergers and Acquisitions1h 2m
A Beginner’s Guide to Mergers and Acquisitions
By: CRFT Productions and Keith Thomson
Course
-
Measuring success and performance post-merger3m
Measuring success and performance post-merger
From: A Beginner’s Guide to Mergers and Acquisitions
Video
-
Managing Your Cybersecurity Program through a Merger or Acquisition1h 34m
Managing Your Cybersecurity Program through a Merger or Acquisition
By: Reet Kaur
Course
-
Growing through acquisitions4m
Growing through acquisitions
From: Designing Growth Strategies
Video
-
End-to-end M&A business process: Pre-merger5m
End-to-end M&A business process: Pre-merger
From: Managing Your Cybersecurity Program through a Merger or Acquisition
Video
-
Risk management overview1m
Risk management overview
From: Program Management for Cybersecurity Managers: From Planning to Cross-Functional Coordination
Video
-
Supporting change management3m
Supporting change management
From: Successful Mergers and Acquisitions: How You Can Help
Video
-
Solution: Core competencies2m
Solution: Core competencies
From: Program Management for Cybersecurity Managers: From Planning to Cross-Functional Coordination
Video
-
The need for management3m
The need for management
From: Program Management for Cybersecurity Managers: From Planning to Cross-Functional Coordination
Video
-
Managing the third-party lifecycle5m
Managing the third-party lifecycle
From: Supply Chain Cybersecurity: Preventing Supply Chain Attacks
Video
-
Manage software installation and configuration risks9m
Manage software installation and configuration risks
From: CertNexus Certified IoT Security Practitioner Cert Prep by InfoSec
Video
-
Sources of controls3m
Sources of controls
From: Program Management for Cybersecurity Managers: From Planning to Cross-Functional Coordination
Video
-
The information security management system (ISMS) and its scope (Clauses 4.3 and 4.4)4m
The information security management system (ISMS) and its scope (Clauses 4.3 and 4.4)
From: ISO 27001:2022-Compliant Cybersecurity: Getting Started
Video
-
Key cybersecurity steps in M&A7m
Key cybersecurity steps in M&A
From: Managing Your Cybersecurity Program through a Merger or Acquisition
Video
-
Essential functions of a program2m
Essential functions of a program
From: Program Management for Cybersecurity Managers: From Planning to Cross-Functional Coordination
Video
-
Integrate social selling to campaigns that lead to lower CAC4m
Integrate social selling to campaigns that lead to lower CAC
From: How to Measure LinkedIn Social Selling to Pipeline
Video
-
Application management5m
Application management
From: Certified Information Security Manager (CISM) Cert Prep (2022): 3 Information Security Program
Video
-
Application management3m
Application management
From: CompTIA Security+ (SY0-701) Cert Prep (2024)
Video
-
Integrate your sales strategy with marketing efforts1m
Integrate your sales strategy with marketing efforts
From: Align Sales Operations with Business Strategy
Video
-
Management review and approval2m
Management review and approval
From: Certified Information Security Manager (CISM) Cert Prep (2022): 1 Information Security Governance
Video
-
Configuring global application management6m
Configuring global application management
From: Building a Mobile Endpoint Management Solution with Intune
Video
-
Developing a security budget3m
Developing a security budget
From: Certified Information Security Manager (CISM) Cert Prep (2022): 1 Information Security Governance
Video
-
Merging networks5m
Merging networks
From: CompTIA Advanced Security Practitioner (CASP+) (CAS-004) Cert Prep
Video
-
Shift left to manage the right of your development lifecycle6m
Shift left to manage the right of your development lifecycle
From: Building a Cloud Security Program
Video
-
How to use GRC as a starting point2m
How to use GRC as a starting point
From: SIEM: Event Management with Splunk Security
Video
-
The importance of documentation2m
The importance of documentation
From: Understanding the Impact of a Merger for IT Teams
Video
-
Integrated risk management7m
Integrated risk management
From: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep
Video
-
Risk management overview3m
Risk management overview
From: Building and Managing a Cybersecurity Program
Video
-
Integrated asset acquisitions4m
Integrated asset acquisitions
From: Asset Accounting: Acquisitions in SAP S/4HANA
Video
-
Generate ideas to manage top risks4m
Generate ideas to manage top risks
From: Measuring and Managing Top Cyber Risks
Video
-
What makes an MDR program8m
What makes an MDR program
From: Managed Detection and Response (MDR) Fundamentals
Video
-
DevOps-powered risk management program2m
DevOps-powered risk management program
From: Governance, Risk, and Compliance (GRC) for the Cloud-Native Revolution
Video
-
Building corporate device process for iOS5m
Building corporate device process for iOS
From: Building a Mobile Endpoint Management Solution with Intune
Video
-
Legal and regulatory considerations3m
Legal and regulatory considerations
From: A Beginner’s Guide to Mergers and Acquisitions
Video
-
Meeting the CISM experience requirements4m
Meeting the CISM experience requirements
From: Certified Information Security Manager (CISM) (2022) Exam Tips
Video
-
Automation and vulnerabilities that cannot be patched3m
Automation and vulnerabilities that cannot be patched
From: Mitigating Cybersecurity Vulnerabilities
Video
-
Deploying an iOS corporate device4m
Deploying an iOS corporate device
From: Building a Mobile Endpoint Management Solution with Intune
Video
-
CompTIA Data+ (DA0-001) Cert Prep: 2 Data Mining1h 27m
CompTIA Data+ (DA0-001) Cert Prep: 2 Data Mining
By: Mike Chapple
Course
-
Cloud security standards and policies for speed4m
Cloud security standards and policies for speed
From: Building a Cloud Security Program
Video
-
Identity and access management in AWS7m
Identity and access management in AWS
From: Cloud Security and Audit Fundamentals: AWS, Microsoft Azure, and Google Cloud
Video
-
Reviewing user and group identities2m
Reviewing user and group identities
From: Building a Mobile Endpoint Management Solution with Intune
Video
-
The need for management2m
The need for management
From: Building and Managing a Cybersecurity Program
Video