Remove Case Study Remove Education Remove Government Remove Industry
article thumbnail

Sophie Sayer on the IT Governance Partner Programme

IT Governance

The benefits of partnering with us, and our partner-exclusive event IT Governance launched its partner programme in 2017, which now includes more than 400 organisations. And why should organisations consider partnering with IT Governance? What is it that makes IT Governance special? What else can partners expect from the event?

article thumbnail

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

Due to the complexity of information in its various forms, your local government offices and state agencies may need to create a records management data map, showing the location of the records within your organization. Compliance – Regulatory; Industry Specific; Audits. Privacy – Confidential Information; Risk; PCI; PII.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Elearning Staff Awareness Course Overview: Ransomware

IT Governance

In his more than 30 years in the industry, he’s helped both private- and public-sector organisations reduce the risks to their on-site and Cloud-based IT environments. The course also features numerous examples and case studies. One of my personal favourite features is the new Colonial Pipeline case study.

article thumbnail

ROUNDTABLE: Experts react to President Biden’s exec order in the aftermath of Colonial Pipeline hack

The Last Watchdog

In response, President Biden last week issued an executive order requiring more rigorous cybersecurity practices for federal agencies and contractors that develop software for the federal government. Last Watchdog asked a roundtable of cybersecurity industry experts for their reaction. government.

article thumbnail

Protecting Against the Risks and Managing the Complexities of a Quantum World with Thales and IBM Consulting

Thales Cloud Protection & Licensing

Threats to cryptography are generally prevented by using common cybersecurity hygiene practices defined in clear and achievable governance. Thales and IBM Consulting are working together to lead and guide the industry in how to successfully address these threats and challenges. No, there are more threats that need to be addressed.

Risk 87
article thumbnail

Is the federal government ready for robotic process automation?

CGI

Is the federal government ready for robotic process automation? The federal government has also begun to make some forays into RPA and—with ongoing emphasis on digital transformation—the time is ripe for it. CGI will present a case study of RPA on the second day of the event. harini.kottees…. Thu, 07/19/2018 - 04:38.

article thumbnail

Notes and observations about the 2012 intranet innovation award winners

ChiefTech

This year, Pleio, a customised version of Elgg developed by the Dutch government , also won an award. Pleio: A social network for Dutch government on Prezi. We also deployed Elgg for a Government 2.0 Incidentally, the NSW Department of Education is also a Socialtext customer (see below).