article thumbnail

This is the old ChiefTech blog.: Avenue A | Razorfish Wiki Case Study

ChiefTech

Friday, 14 September 2007 Avenue A | Razorfish Wiki Case Study OK. Now were talking Wiki Case Study. " Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances. It does some things well, a few really well and a couple terribly.

Paper 49
article thumbnail

Can I really rely on my entire workforce to support a recovery?

IT Governance

Clark ( www.bcm-consultancy.com ), editor of January’s book of the month, In Hindsight – A compendium of Business Continuity case studies , which focuses on business continuity and disaster recovery. The author’s views are entirely his own and may not reflect the views of IT Governance. on the Richter scale.

Risk 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Shared Assessments was created in 2005 by five big banks and the Big Four accounting/consulting firms as a forum for deriving a standardized way to assess the risks of partnering with one other. The founding participants developed assessment regimes and tools, all having to do with measuring and assessing, essentially, third-party risks.

Risk 120
article thumbnail

APEC Privacy Committee Meets to Discuss CBPR System and EU Cooperation

Hunton Privacy

To operationalize the PRP, APEC will work toward integrating the PRP system into the existing CBPR governance structure over the next few months. The case studies explored the usefulness of the Referential and how companies can leverage their prior work to seek approval in one system to gain approval in the other system.

Privacy 40
article thumbnail

Press Release: Headshift appoints James Dellow and ramps up Enterprise 2.0 capabilities

ChiefTech

They have a wide range of both internationally and local case studies that highlight how the power of social software can add quantifiable value, said Dellow. He also completed a Master of Business & Technology (MBT) at UNSW in 2005. . “Headshift are one of the few global organisations that truly understand web 2.0

article thumbnail

KnowledgeShare: access to evidence for NHS staff

CILIP

1 Policy documents, guidelines and case studies of innovative practice add to this plethora. 2005 it had grown to incorporate the management of our team?s Case study: Tom Roper, Clinical Librarian, Brighton and Sussex Hospitals. Case study: Stephen Ayre, Library Services Manager, George Eliot Hospital.

Access 40
article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

In 2005, Sony BMG delivered millions of CDs with a rootkit that monitored listening habits and unintentionally left a backdoor to the device for cybercriminals. While this case study is just a snapshot, vigilance in the app store is required. Examples of Backdoor Malware Attacks. Phishing and Social Engineering.

Phishing 102