Remove Case Study Remove Data breaches Remove Government Remove Risk
article thumbnail

Successful Information Governance when the Bosses Just Don't Care

AIIM

We regularly discuss the value and importance of information governance - at our conference, in our training courses, in our virtual events. How can you move your organization's information governance program forward in the absence of management support or interest? And no organization wants to make the national news for a data breach.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

The culprit: lax practices of a third-party data and analytics contractor. Related: Atrium Health breach highlights third-party risks. Third-party cyber risks are likely to persist at the current scale for a while longer. There is impetus for change – beyond the fear of sustaining a major data breach.

Risk 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 best online cyber security training courses and certifications in 2020

IT Governance

This one-day course is designed and run by real-world practitioners, who help you gain an understanding of risks through practical exercises, group discussions and case studies. You’ll learn the key principles behind ISO 27001 and how you can create an ISMS that protects your organisation from data breaches and cyber attacks.

article thumbnail

Thursday LTNY 2019 Sessions: eDiscovery Trends

eDiscovery Daily

With the advent of technology platforms that allow for indexing of documents/data, including Microsoft O365, developing processes around the technology will be transformative for the management of information. Hear lessons learned and case studies on: (i) the record classification of 1.5 RAS Enterprise Risk Management.

article thumbnail

Welcome to Relativity Fest 2019!: eDiscovery Trends

eDiscovery Daily

e-Discovery Data Management: Governance and Process Optimization. As e-discovery data continues to grow, it’s imperative for organizations to understand the exponential uptick in complexity, liability, and cost. Government Data Demands: What You, Your Clients, and Your Companies Should Know.

article thumbnail

Elearning Staff Awareness Course Overview: Ransomware

IT Governance

In his more than 30 years in the industry, he’s helped both private- and public-sector organisations reduce the risks to their on-site and Cloud-based IT environments. He also has an MSc in cyber security risk management. The course also features numerous examples and case studies. What was the inspiration behind it?

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

Common threats include misconfigurations, cross-site scripting attacks, and data breaches. This step reduces the risks of illegal access, data loss, and regulatory noncompliance, as well as protects the integrity and security of sensitive information within SaaS applications.