Feeds

Are you managing your suppliers or are they managing you?

Register readers pour fuel on the burning issues of the day

Internet Security Threat Report 2014

Reg Events When it comes to answering the big questions in IT management, who do you ask? The big cheeses who read The Register, of course.

That’s why, following the success of our July Roundtable on IT Governance, we’re inviting our senior Reg readers to come to our next roundtable on 30 September at the Soho Hotel in Central London.

This time the topic is:

Are you managing your suppliers or are they managing you?

Once, vendor management meant choosing the restaurant when it was time to meet your supplier’s account manager. These days a CTO has to deal with distant outsourcers, bolshy contractors, rapacious software vendors and cloud service providers who won't even tell you where your data is.

How do you know you’re getting the best deal? Can you trust anything these guys tell you?

Well, whether you're looking for guidance, or want to share your tricks of the trade, our next roundtable is the place to be. You can sign up here.

The format is simple. We assemble a number of high-ranking Reg readers at the Soho Hotel in Central London. We have a formal discussion for 90 minutes, chaired by Reg contributor and former CIO Dominic Connor. We want to work out where we are now, where we should be in the future and what vendors and users need to do to get us to this new nirvana.

We then continue the discussion informally over wine and cocktails.

All of this is conducted under strict Chatham House rules, with all reports anonymised and approved by participants before being published.

The plan is to document what is and isn’t working in the view of real-world IT execs in real-world jobs. Over time, we want to build a manifesto, a call to arms if you will, for execs and suppliers who want to make technology work for the common good, not just for account managers.

So, whether you care about a brave new world of IT, or just care about swapping war stories and learning a few new tricks with your peers, come and join us by signing up here. ®

Beginner's guide to SSL certificates

More from The Register

next story
Bono apologises for iTunes album dump
Megalomania, generosity and FEAR of irrelevance drove group to Apple deal
HBO shocks US pay TV world: We're down with OTT. Netflix says, 'Gee'
This affects every broadcaster, every cable guy
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
French 'terror law' declares WAR on the INTERNET itself, say digi-rights folks
Liberté, Égalité, Fraternité: Two out of three ain't bad
SCREW YOU, EU: BBC rolls out Right To Remember as Google deletes links
Not even Google can withstand the power of Auntie
Arab States make play for greater government control of the internet
Nerds told to get lost in last-minute power grab bid at UN meeting
Zippy one-liners, broken promises: Doctor Who on the Orient Express
Series finally hits stride, but Clara's U-turn is baffling
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.