Case Study: Enhancing Endpoint Security

Data Breach Today

Because it's inevitable that some attackers will get around defenses, Kettering Health Network added an extra layer of endpoint security to help mitigate the risks posed by ransomware and other cyberthreats, says Michael Berry, director of information security. He describes what's unusual about the approach

Case study - United Airlines Can Revisit the Past, Thanks to Hanzo’s Dynamic Website Archives

Hanzo Learning Center

Archiving Case Study web archive website preservation Hanzo Dynamic Capture dynamic web capture web archivingObjective. United Airlines has a massive, complex, ever-changing website. Because it was spending too much time creating archives that often didn’t meet its needs, United needed a dynamic capture method that would operate automatically and preserve all of its website content in a functional, future-proof format.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Microsoft’s case study: Emotet took down an entire network in just 8 days

Security Affairs

Microsoft shared details of the Emotet attack suffered by an organization named Fabrikam in the Microsoft’s Detection and Response Team (DART ) Case Report 002 , where Fabrikam is a fake name the IT giant gave the victim.

[Podcast] Pepsi's AP Automation Case Study

AIIM

On this episode of the AIIM on Air Podcast , we take a look at this interesting case study. Then, Kris Saether, Chief Commercial Officer Xait Porter, discusses how collaboration will be a key competitive differentiator in 2020 and beyond. I don't know about you, but when I think of Pepsi, I think of cool and refreshing. In fact, the last thing to come to mind is labor-intensive.

Webinar: Case Studies on Information Governance in Microsoft 365 | 1:00pm ET on April 2, 2020

IG Guru

The post Webinar: Case Studies on Information Governance in Microsoft 365 | 1:00pm ET on April 2, 2020 appeared first on IG GURU. Presented by John Isaza, Esq., VP of Information Governance, IGS, an Access Company and Atle Skjekkeland, CEO, Infotechtion Attend this session to learn how global enterprises with up to 90,000 staff are using Office 365 for information governance, records management and information privacy and protection.

A Case Study - Db2 for z/OS High-Performance DBATs

Robert's Db2

That implementation effort has involved a good bit of back-and-forth communication between myself and the Db2 administrator, and I saw that it makes for a good case study that touches on many of the issues associated with high-performance DBAT set-up, monitoring and usage. Accordingly, I decided to use this case study as the basis for a blog entry. In that case, however, the packages will be treated by Db2 as though they had been bound with RELEASE(COMMIT).

Building for Billions: Addressing Security Concerns for Platforms at Scale

Threatpost

Cloud Security InfoSec Insider Akamai BeyondCorp beyondprod case study enterprise Facebook google infosec insider scale tony lauro Zero TrustLessons from Facebook and Google show how to safely scale your environment for security.

e-Records 2020 Call for Presentations

The Texas Record

The conference gathers records management and information technology staff from the state and local level together to learn from each other by sharing case studies, solutions, best practices, challenges, and lessons learned. This year the annual e-Records conference is online!

OnDemand | Secure & Streamline Workforce and Customer Experiences

Data Breach Today

Modern Identity Customer Identity Zero Trust View this panel discussion about deployment strategies and real case studies surrounding identity modernization initiatives

Crawling COVID-19: What (and how) web archivists collect

Archive-It

In this case, that digital space is less a parallel publishing platform for institutions than a subject in and of itself, with context and character of its own to capture and represent. Case Studies COVID-19by Karl-Rainer Blumenthal, Web Archivist for Archive-It.

Introducing erwin Insights 2020: Call for Proposals & Engagement

erwin

erwin Insights 2020 will be held on October 13-14, 2020, so save the date! Next, are you willing to present a case study? We encourage you to share use cases (e.g., The post Introducing erwin Insights 2020: Call for Proposals & Engagement appeared first on erwin, Inc. We know these have been unprecedented and challenging times. While tradeshows and conferences may never be the same, social distancing doesn’t mean we stop learning.

What Can We Learn About the IG Profession from the ARMA InfoCon 2020 Taxonomy

ARMA International

Since a taxonomy is a reflection of what it organizes, in this case we’re reflecting our profession. Many of the terms added to the taxonomy this year mirror greater trends in the information profession that are reflected through the sessions presented at ARMA InfoCon 2020.

ROT 59

What belongs in a web archive? Collection development policies and goals

Archive-It

Case Studies How Toby Karl-Rainer Blumenthal, Web Archivist for Archive-It. Archive-It partners and friends gathered online this week to discuss why they collect what they collect.

Quick Reads 2020

CILIP

Discover the books on the 2020 Quick Reads list. The Reading Agency announced the titles on the 2020 list on 20 February 2020: Candice Carty-Williams , Notting Hill Carnival: A West Side Story (Trapeze, Orion). Visit our case studies page for inspiration and evidence of impact.

CIPL Publishes Article on COVID-19 as a Case Study for Privacy Accountability

Hunton Privacy

On April 14, 2020, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP published an article entitled “ COVID-19 Meets Privacy: A Case Study for Accountability ” (the “Article”).

Wednesday LTNY 2020 Sessions: eDiscovery Trends

eDiscovery Daily

In addition, as we look ahead to the 2020 elections, we’ll examine the legal and technical aspects of alleged hacked elections, and what all these data privacy and protection challenges mean for you. A look ahead to the 2020 elections and its data privacy & protection challenges.

COVID-19 collections and resouces: An update for web archivists

Archive-It

Case studies. Case Studies Collaborative Collecting COVID-19 How Toby Karl-Rainer Blumenthal, Web Archivist for Archive-It. Web archiving partners of all kinds are collecting the records of COVID-19 on the web. At the time of writing, nearly 200 distinct collections have already been created represent different aspects of the global crisis.

Learn more about web archiving with Archive-It Advanced Training

Archive-It

Case Studies How Toby Jillian Lohndorf, Web Archivist for Archive-It. There are lots of ongoing training opportunities for web archivists of all experience levels. In particular, the Archive-It Advanced Training series of webinars features lessons, technology updates, and more tips and tricks from the Internet Archive’s staff and web archiving partners around the world!

Welcome to Legaltech New York 2020!: eDiscovery Trends

eDiscovery Daily

Case studies where DApps have been successfully deployed. In just 10 years the case law around eDiscovery AI & Analytics has exploded. Survey the key case law governing the application of machine learning to eDiscovery. The post Welcome to Legaltech New York 2020!:

Using Disinformation to Cause a Blackout

Schneier on Security

Using Greater London as a case study, we show that such disinformation can indeed lead to unwitting consumers synchronizing their energy-usage patterns, and result in blackouts on a city-scale if the grid is heavily loaded.

Paper 99

Career Choice Tip: Cybercrime is Mostly Boring

Krebs on Security

“The message put out there is that cybercrime is lucrative and exciting, when for most of the people involved it’s absolutely not the case.”

Archive-It Partner News, July 2020

Archive-It

In case you missed it… Recorded : Supporting Open Science Data Curation, Preservation, and Access by Libraries , a June 25 webinar with the Center for Open Science and Internet Archive. by the Archive-It team. Community News. Join us online.

5 best online cyber security training courses and certifications in 2020

IT Governance

To help you on your way, we have made a number of our courses available remotely, enabling you to study from the comfort of your own home and without jeopardising your health. This one-day course is designed and run by real-world practitioners, who help you gain an understanding of risks through practical exercises, group discussions and case studies. The post 5 best online cyber security training courses and certifications in 2020 appeared first on IT Governance UK Blog.

[Podcast] Achieving Cloud Content Harmony – Access with Control

AIIM

On this episode, your host Kevin Craine interviews Cresyl’s Jim Ongena to dig deeper into this balancing act with cloud content management – the topic of Jim’s session at The AIIM Conference 2020. Cloud Content Management has the power to change the game for businesses of all sizes and types.

Analysis: A Better Approach to Cyber Defense

Data Breach Today

Plus, a case study on cross-border payment fraud, and an expert's take on security for the 2020 elections The latest edition of the ISMG Security Report discusses why cyber defense teams need to think more like attackers.

Emotat Malware Causes Physical Damage

Schneier on Security

The Emotet payload was delivered and executed on the systems of Fabrikam -- a fake name Microsoft gave the victim in their case study -- five days after the employee's user credentials were exfiltrated to the attacker's command and control (C&C) server.

[Podcast] The Impact of a Pandemic on Information Governance

AIIM

Also on this episode, an AIIM case study exploring the real-world application of Intelligent Information Management (IIM) techniques and capabilities. This case study features Alogent and their recent efforts with Silver State Schools Credit Union.

Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hack

Security Affairs

“In a case study on its website, Trend Micro lists Mitsubishi Electric as one of the companies that run the OfficeScan suite.” Chinese hackers have exploited a zero-day vulnerability the Trend Micro OfficeScan antivirus in the recently disclosed hack of Mitsubishi Electric.

[Podcast] What's it like to be a University Records Officer?

AIIM

We finish off the episode with a brief case study. We're packing in the fun with this month's podcast episode by exploring 3 important intelligent information management topics. First, we ask - What’s it like to be a Records Officer at a major college or university?

Security Affairs newsletter Round 258

Security Affairs

addresses two zero-days exploited in the wild Microsofts case study: Emotet took down an entire network in just 8 days New Coronavirus-themed campaign spread Lokibot worldwide. A new round of the weekly newsletter arrived! The best news of the week with Security Affairs.

[Podcast] Tips for Staying Cyber-Safe While Working from Home

AIIM

And finally, on this episode, hear an AIIM member case study of how Laserfiche helped Mille Lacs Corporate Ventures migrate their contract management process to the cloud. Remote working comes with a number of benefits both for the employee and the employer. Employees enjoy a better work-life balance, the comfort of their home office, and can avoid the stress of a commute. Businesses can save money, improve employee retention, and more.

[Podcast] IIM Challenges and Opportunities in the Energy Industry

AIIM

Also on this episode, explore a case study session from The AIIM Conference detailing how Hyland Software helped Heinen's Grocery Stores successfully migrate their Human Resources to the cloud. The energy industry plays a crucial role in all our lives. Without it, we wouldn't be able to keep the lights on.or the wifi, or the computers.and so on, but what is it that powers this critical industry?

Retail Privacy Network

Data Matters

This interactive meeting will include hot topics in UK/EU data privacy and cybersecurity with practical case studies on retail industry issues. Thursday, February 27, 2020. You are invited to join privacy professionals in the retail sector for topical conversation, learning and networking at the first Retail Privacy Network meeting. The agenda will include discussions on: Lessons learned from GDPR enforcement actions and update on cookies. Erasure and back-ups.

[Podcast] Titans of Technology Innovation

AIIM

Also on the episode, Kevin explores an AIIM Member Case Study. All around us, technology is changing everything. Many can remember having to go to their local video store to rent a movie. Now, with the click of a button from the comfort of your own living room, you can access an endless amount of streaming movies. Even the simpler things in life, like flipping on a light switch, are being replaced by technology.

[Podcast] Transforming How Mortgage Insurance Applications Are Processed

AIIM

On this episode of the AIIM on Air Podcast , Kevin Craine explores an interesting case study about how Zia Consulting helped a large U.S. There may be no other industry that could benefit more from automation than the mortgage banking industry. This industry is full of time-consuming, error-prone, and paper and labor-intensive processes, all perfectly-suited for automation.

New book tackles the challenges of discovery in the (post-Google) era

CILIP

Facet Publishing announce the release of Resource Discovery for the Twenty-First Century Library: Case studies and perspectives on the role of IT in user engagement and empowerment, edited by Simon McLeish. Published: 06 July 2020.

[Podcast] Tips and Advice for Legacy Replacement

AIIM

Also, on this episode , an AIIM member case study featuring Freeport LNG and Shinydocs. We're now operating twenty years into a new millennium. But despite the futuristic potential, many organizations continue to operate with systems and software that are a decade or more behind the times. Organizations that continue to operate in the past will be challenged to keep pace today – and in the future. Think about the technology you use in your personal life.

Role of Library and Knowledge Specialists in Moving Education and Training Online

CILIP

Training and teaching in various aspects of information literacy for students and learners, which will equip them with skills to study online and to tackle the growing amounts of mis-information, dis-information and fake news. The Information Literacy Group is here to support library and knowledge specialists in the shift to online training, by sharing case studies and resources, and facilitating knowledge sharing. Published: 31 July 2020.

CIPL Releases Report on Effective Data Privacy Accountability

Hunton Privacy

On June 3, 2020, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP published its report, What Good and Effective Data Privacy Accountability Looks Like: Mapping Organizations’ Practices to the CIPL Accountability Framework (“Report”). The Report also includes 46 case studies from 17 participating organizations from different sectors, geographies and sizes – including two SMEs and a university.

RMS Section Meeting: teasers!

The Schedule

In this case study, the author explores the university archivist’s role in identifying opportunities for collaboration with academic campus museums; in the identification and management of records with permanent value to the museum and/or archival value; and in policymaking