Healthcare Case Study: Identity and Access Management

Data Breach Today

How can a large healthcare delivery system efficiently handle identity and access management for thousands of clinicians and other users of patient data? Robert Siebenthaler of PeaceHealth explains how his organization, which operates 10 medical centers, has developed a fine-tuned, role-based approach

Access 164

Case Study: How IU Health Manages Vendor Security Risk

Data Breach Today

What are some of the most important aspects in managing vendor security risk when taking on third-parties to handle sensitive data? Mitch Parker, CISO of Indiana University Health, explains the critical steps his organization is taking in its approach to vendor risk

Risk 125

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Hanzo CASE STUDY: eDPM Advisory Services

Hanzo Learning Center

In this case study, we explore how Hanzo customer, eDPM Advisory Services helped their customer with preserving, collecting, producing, and presenting information from novel and challenging data sources to strengthen their case.

The Data Breach Case Study & Protection Guide

Record Nations

Even the tiniest security gap can lead to a data breach. million settlement, Nationwide Insurance’s breach serves as just one example of the growing number of data breaches each year—making it all the more important you have protections in place. The post The Data Breach Case Study & Protection Guide appeared first on Record Nations. Data Breach/ID TheftAfter a $5.5

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

Due to the complexity of information in its various forms, your local government offices and state agencies may need to create a records management data map, showing the location of the records within your organization. Demonstrate how data map supports RIM Program Objectives.

A Case Study: Implementing a Db2 for z/OS Implicit Trusted Connection

Robert's Db2

First, the backstory: the DBA's organization wanted to tighten Db2 for z/OS data security by preventing unauthorized utilization of the authentication credentials used by an application to connect to a Db2 system. The kind of application we're talking about here is one that accesses a Db2 for z/OS server through a TCP/IP link via the IBM Data Server Driver (or its predecessor, Db2 Connect).

Today We are Launching a new Series of Information Governance Case Studies


We are pleased to bring the IGI community another series of case studies about how professionals like you are tackling IG. IG Snapshots are compact case studies drawn from IGI’s interviews and discussions with our community of IG practitioners. This Snapshot highlights ways that organizations can gain insight into unstructured data and leverage existing capabilities to bring governance to the chaos.

DCMS Wordpress-based intranet case study - cheaper, quicker, and user-centred


Continuing what appears to be turning into a series on alternative intranets technologies, here is a great study from the UK about relaunching the Department for Culture, Media & Sport's intranet with Wordpress. Design with data.

Court Enters Parties’ Order for Discovery of ESI: eDiscovery Case Law

eDiscovery Daily

It’s a rare, if not unheard of, case law post that discusses an agreement between parties, not a dispute! 26(f) conference (or later if agreed) custodians, non-custodial data sources, third party data sources and inaccessible data.

A Java Program, a COBOL Program, and a DB2 Update - An Interesting Case Study

Robert's Db2

I think it makes for an interesting case study. Edward's chief concerns were locking and data integrity (locking, of course, is a mechanism for preserving data integrity). In that latter case, then, even an X-lock acquired on the row (or the row's page) by the Java program would not impede the CICS program's subsequent update operation. In that case, the same DB2 thread should be used for the Java-based SELECT and the COBOL-based UPDATE.

Take your web archives to go with these Archive-It APIs and integrations


More than that though, it is the community of partners who share that infrastructure, shape its development, and build its corpus: nearly 700 organizations and individuals archiving over a petabyte of data across 40 billion (with a b!) Case Studies How To

Opening the House Foreign Affairs Committee web archive


In total, CSUF’s web archive of the HFAC website at the end of the Royce chairmanship preserves 180 GB of data and over 69,000 individual documents. In terms of the unique value of such web archival data, press releases are text-based and thus small, as well as broadly disseminated.

Archiving and describing mass tragedy: the Web Archive on the October 1, 2017 Shooting in Las Vegas, Nevada


Reflecting on our mission to document Southern Nevada, we realized that we had a critical responsibility to preserve this history so we could study, remember, and reflect on it later. Describing two different sets of archival data in one finding aid proved to be challenging.

New choices, new directions: Piloting the 2018 Mexican Government Web Archive


We had a limited data allowance available on the Colegio’s Archive-It account. Case Studiesby Natalie Baur, Biblioteca Daniel Cosío Villegas of the Colegio de México.

Benefits of Data Vault Automation


The benefits of Data Vault automation from the more abstract – like improving data integrity – to the tangible – such as clearly identifiable savings in cost and time. So Seriously … You Should Automate Your Data Vault.

Analyze your Web Archives at Scale: The Archives Unleashed Cloud


Wayback browsing and search interfaces work for some applications, but with the rise of the digital humanities, the computational social sciences, and web science more generally, even more analysis tools can help to express archived data in new and enlightening ways. Case Studies How To

Expand the reach of Archive-It collections with these access integrations


OpenSearch can furthermore be used to pull data into an existing catalog of other items or item types. Are there more data points that you would include in yours? Partner data API calls enrich the “acquisition information” fields of SUNY Albany’s web archive descriptions.

Understanding web archive access and use with Google Analytics: Lessons and questions from the Federal Depository Library Program


This blog describes some of the methodologies used to evaluate data using Google Analytics, as well as some challenges. In August 2015, GPO began exploring methods to analyze our Archive-It data collected through Google Analytics. Case Studies How To

Saving Local News on the Web


For this year’s Endangered Data Week , the Brooklyn Public Library hosted a panel discussion at its Central Library’s Info Commons Lab on the topic of “Saving Local News on the Web.” Case Studies Community Webs

7 Questions to Determine if Your Data is an Asset


To achieve this, your data cannot be fragmented, redundant, obsolete, or inaccessible. It’s important to understand what data you have, why you have it, and why you need it - it's then that your data can be leveraged as an asset. Is your data an asset? Data strategy?

Data Mapping Tools: What Are the Key Differentiators


The need for data mapping tools in light of increasing volumes and varieties of data – as well as the velocity at which it must be processed – is growing. Data mapping tools have always been a key asset for any organization looking to leverage data for insights.


Google's Data on Login Thefts

Schneier on Security

This is interesting research and data: With Google accounts as a case-study, we teamed up with the University of California, Berkeley to better understand how hijackers attempt to take over accounts in the wild. From March 2016 to March 2017, we analyzed several black markets to see how hijackers steal passwords and other sensitive data. [.].

A massive accounting hack kept clients offline and in the dark

Information Management Resources

Last week, a cyberattack took down software provider Wolters Klumer NV and presented a case study in how not to communicate with customers over a hack. Data security Cyber security Cyber attacks Malware

Why Data Now Makes Every Company a Tech Company

Perficient Data & Analytics

In fact, many of the case studies I see are focused on how tech companies have become even smarter and data-driven. Data to Assure “Operational Rhythm” Sinar Mas is responsible for 500,000 hectares of plantation–4.5x It’s about sharing data.

Fragmented Data, 1 Source of Truth: Why to Use Datorama [Webinar]

Perficient Data & Analytics

Want to connect all of your marketing data in one place in real-time? Or simply make more data-driven decisions? Real-world case studies, including a quick demo. Data & Analytics Salesforce Datorama marketing roi

Honda Is Using IBM Watson to Drive Real Changes in Quality Assurance

Information Management Resources

This IDC Case Study examines how Honda implemented a cognitive system using text analytics to help it respond faster to customer feedback. Customer-centricity Customer data

CCPA and the future of the health data economy


Organizations engaging with personal healthcare data need to pay close attention to the rapidly evolving regulatory environment. Over the next few years, the compliance requirements around personal healthcare data are set to evolve at breakneck speed. Exploring CCPA and healthcare data.

CCPA and the future of the health data economy


Organizations engaging with personal healthcare data need to pay close attention to the rapidly evolving regulatory environment. Over the next few years, the compliance requirements around personal healthcare data are set to evolve at breakneck speed. Exploring CCPA and healthcare data.

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials


In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and assess the risk it poses to millions of users. billion usernames and passwords exposed via data breaches and traded on blackmarket forums. Drawing upon Google as a case study, we find 7–25% of exposed passwords match a victim’s Google account.

Free download: A Beginner’s Guide to the DPO

IT Governance

Do you need a data protection officer? Since the GDPR (General Data Protection Regulation) came into effect in May 2018, many organisations are asking whether they’re supposed to have a DPO (data protection officer), but sometimes the answer isn’t that simple.


The 2013 Summit Arrives: Bridging Data And Humanity

John Battelle's Searchblog

The post The 2013 Summit Arrives: Bridging Data And Humanity appeared first on John Battelle's Search Blog. More on the theme: In a scant few years, data has become a critical driver of business decisions – and increasingly, a fundamental currency of all human endeavor.

Seeking good industrial use cases for virtual or augmented reality

Information Management Resources

Training is one use case where there’s some value. Then the good case studies with tangible value start to dry up. Augmented reality Virtual reality Data managementI want to see where the tools make a real and lasting difference. Remote assistance is another.


Identifying People by Metadata

Schneier on Security

In this paper, we use Twitter as a case study to quantify the uniqueness of the association between metadata and user identity and to understand the effectiveness of potential obfuscation strategies.

Finding diamonds in data


Finding diamonds in data. The right data can help cure diseases, make streets safer, improve customer service and create cost savings. It seems there’s nothing we can’t do better with the right data, along with the tools and skills to analyze it. To explore the world of big data and analytics, CGI is launching this blog to talk about new applications where people are getting value from data. Thu, 02/19/2015 - 23:24.

Attacking encrypted USB keys the hard(ware) way


Ever wondered if your new shiny AES hardware-encrypted USB device really encrypts your data - or is just a fluke? If you have, come to our talk to find out if those products live up to the hype and hear about the results of the audit we conducted on multiples USB keys and hard drives that claim to securely encrypt data. We will demonstrate how this methodology works in practice via a set of case-studies.

ALL Data as a Service (DaaS/BDaaS) - EAs in a New Role, as DaaS Enablers

Interactive Information Management

But most of all, you'd like to pay only for the data and the way it's delivered to you - not for a bunch of information technology products and services, hardware and software. You want data-as-a-service, as a consumer; i.e. explicit data units delivered via affordable service units.

Dynamics 365 Finance & Operations April 2019 release

Ascent Innovations

Continual enhancements to Common Data Model. Microsoft’s Open Data Initiative is consistently expanding and enhancing. Preview of planned features & updates for Common Data Model and Data Integration. Dynamics 365 Finance & Operations April 2019 release.

Cloud 72

The Science of Artificial General Intelligence

Perficient Data & Analytics

Take the case study of AI playing Go and defeating Lee Sedol vs AI getting trained on Chess. Data & Analytics AGI AI Artificial General Intelligence Artificial Intelligence

IT 65

Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hack

Security Affairs

This week, Mitsubishi Electric disclosed a security breach that might have exposed personal and confidential corporate data. “In a case study on its website, Trend Micro lists Mitsubishi Electric as one of the companies that run the OfficeScan suite.”

Top 10 Analytics Sessions at 2019 Oracle OpenWorld

Perficient Data & Analytics

If you attend the sessions below you will get great information on the full range of Oracle Analytics products and capabilities including: Oracle Analytics Cloud (augmented analytics, data preparation, visualizations, natural language processing, machine learning, mobile, real time analytics, etc).