article thumbnail

Learning, work and flexibility: a case study

CILIP

Learning, work and flexibility: a case study As part of our look at CILIP accredited courses we talk to Oona Ylinen, a part-time LIS student at UCL and Academic Support Librarian at University of Essex. Here she explains how she chose her course and her career and how an employer’s support with flexible working hours opened the door.

article thumbnail

Looking Back on the Channel Partner Event and Awards 2024

IT Governance

Previously , I had the pleasure of sitting down with Sophie Sayer, our Channel Sales Director, to talk about the IT Governance partner programme and partner event on 9 April 2024. When I asked her how the event went, she said: The Channel Partner Event and Awards 2024 in Ely was an absolute triumph!

Sales 59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: NIST’s Cybersecurity Framework update extends best practices to supply chain, AI

The Last Watchdog

Respond (RS): Outlines the actions to take in the event of a cybersecurity incident. NIST has developed quick-start guides customized for various audiences, along with case studies showcasing successful implementations, and a searchable catalog of references, all aimed at facilitating the adoption of CSF 2.0 The CSF 2.0

article thumbnail

A Case Study: Using Db2 for z/OS Monitor Reports to Zero In on a Performance Problem

Robert's Db2

This individual had been asked to assist in determining the cause of a performance problem impacting a Db2-accessing application. The first thing I look at when I see unusually large DB2 LATCH time for a Db2-accessing process is the "in-Db2 not-accounted-for time" for that process. Why did we look there first? LC05-LC08 0.00

Access 62
article thumbnail

Recent Tesla Hacks Highlight Importance of Protecting Connected Devices

eSecurity Planet

Rapid7’s Zero Day Initiative hosts an event called Pwn2Own, and at the 2023 event, computer security firm Synactiv hacked a Tesla computer within two minutes. This year, electric cars were a major focal point of the 2024 event, called Pwn2Own Automotive.

IoT 125
article thumbnail

BREAKING NEWS Q&A: What Cisco’s $28 billion buyout of Splunk foretells about cybersecurity

The Last Watchdog

As a leading supplier of advanced security information and event management ( SIEM ) technology, Splunk happens to find itself in the thick of a tectonic shift. Security teams are always looking for ways to cut SIEM costs and consolidate data access, and so naturally, they look to XDR to provide that alternative.

article thumbnail

Sophie Sayer on the IT Governance Partner Programme

IT Governance

The benefits of partnering with us, and our partner-exclusive event IT Governance launched its partner programme in 2017, which now includes more than 400 organisations. What else can partners expect from the event? Once a year, we also like to get all our partners in one room at our annual partner event.