Remove 12
Remove 2009 Remove 2013 Remove Manufacturing Remove Security
article thumbnail

Observations on the Cybersecurity Executive Order and Presidential Policy Directive

Hunton Privacy

On May 29, 2009, the President promised to avoid security regulations even though he acknowledged that “the vast majority of our critical information infrastructure in the United States is owned and operated by the private sector.” After all, no elected official wants to appear weak on security.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

ARMA defines data as “Any symbols or characters that represent raw facts or figures and form the basis of information” (ARMA 2016, p 12). That is almost 2000 times more data in less than 20 years (Press 2013, Patrizio 2018). IDC estimated the world created.16 16 ZB (zettabytes) of data in 2006, then 2.83 One use case is supply chains.