Remove 11
Remove 2014 Remove Access Remove Computer and Electronics Remove Education Remove Government
article thumbnail

Me on the Equifax Breach

Schneier on Security

Additionally, I am a Fellow and Lecturer at the Harvard Kennedy School of Government --where I teach Internet security policy -- and a Fellow at the Berkman-Klein Center for Internet and Society at Harvard Law School. The attackers got access to full names, Social Security numbers, birth dates, addresses, and driver's license numbers.

article thumbnail

Chronicle of a Records Manager: Controlling the Chaos of Disaster Response and Recovery

ARMA International

I have overseen two significant projects: an electronic discovery production and disaster response and recovery effort. My responsibilities include creating and maintaining RIM policies and procedures concerning access, maintenance, retention, preservation, and arrangement of all business and archival records. It was grim.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. Srivastav 2014, p 18). Take the example of the pandemic: only some governments engaged pandemic experts to develop actions plans. Risk Management and DT Experience. Uncertainty and risk are not the same.

article thumbnail

List of data breaches and cyber attacks in May 2020 – 8.8 billion records breached

IT Governance

Hackers exploit vulnerability to access email accounts of Estonian dignitaries (unknown). GoDaddy notifies users after hacker accesses its servers (unknown). Hacker sold personal info of Unacadamy students online (11 million). Russian military accessed Chancellor Angela Merkel’s emails in 2015 hack (unknown).