Feeds

Are you managing your suppliers or are they managing you?

Register readers pour fuel on the burning issues of the day

Internet Security Threat Report 2014

Reg Events When it comes to answering the big questions in IT management, who do you ask? The big cheeses who read The Register, of course.

That’s why, following the success of our July Roundtable on IT Governance, we’re inviting our senior Reg readers to come to our next roundtable on 30 September at the Soho Hotel in Central London.

This time the topic is:

Are you managing your suppliers or are they managing you?

Once, vendor management meant choosing the restaurant when it was time to meet your supplier’s account manager. These days a CTO has to deal with distant outsourcers, bolshy contractors, rapacious software vendors and cloud service providers who won't even tell you where your data is.

How do you know you’re getting the best deal? Can you trust anything these guys tell you?

Well, whether you're looking for guidance, or want to share your tricks of the trade, our next roundtable is the place to be. You can sign up here.

The format is simple. We assemble a number of high-ranking Reg readers at the Soho Hotel in Central London. We have a formal discussion for 90 minutes, chaired by Reg contributor and former CIO Dominic Connor. We want to work out where we are now, where we should be in the future and what vendors and users need to do to get us to this new nirvana.

We then continue the discussion informally over wine and cocktails.

All of this is conducted under strict Chatham House rules, with all reports anonymised and approved by participants before being published.

The plan is to document what is and isn’t working in the view of real-world IT execs in real-world jobs. Over time, we want to build a manifesto, a call to arms if you will, for execs and suppliers who want to make technology work for the common good, not just for account managers.

So, whether you care about a brave new world of IT, or just care about swapping war stories and learning a few new tricks with your peers, come and join us by signing up here. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.