Remove Case Study Remove Education Remove Examples Remove Security
article thumbnail

Information Governance – 3 Common Pitfalls and How to Avoid Them

AIIM

Your IG program should help your organization understand the value of the information you have and put processes and procedures in place to not only store this information securely but also provide access when and where required. Case studies and examples of peers in other organizations can be powerful techniques.

article thumbnail

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

The purpose of this presentation is to show a real-world example of how data mapping enhances the ability to manage your records effectively. IT Security – Cybersecurity; Access Controls; Breach Detection. Lastly, KPMG educated the RIM Committee members on: What RIM is. Legal – eDiscovery; Legal Holds; Consistency.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sophie Sayer on the IT Governance Partner Programme

IT Governance

In more recent months, we launched the channel partner programme in Europe and America, with training and security testing proving especially popular. We are the market leader in data privacy and cyber security risk management solutions, so it makes sense to partner with us. What is it that makes IT Governance special?

article thumbnail

Why the cyber security skills gap is so damaging

IT Governance

The cyber security skills gap has been growing for years, and the problem is particularly bad in the UK. All of this means that organisations are unprepared for major security incidents, which could cause substantial damage and affect business operations. However, some cyber security experts believe the skills shortage is a “myth”.

article thumbnail

What Should Be The Core Competencies For Cybersecurity For C-Suite

Cyber Info Veritas

On July 2017, one of the most devastating incidents in the history of cyber attacks took place when a group of elite hackers hacked into Equifax, one of the largest credit bureaus in the globe and stole private data including social security numbers, credit card numbers etc of around 145 million clients.

article thumbnail

M&T Bank’s Modernization Journey Enabled by Strong Partners like Rocket

Rocket Software

While an intermediary in business can sometimes lead to communication breakdowns, Derek Powe, M&T vice president, zPlatform manager says with Rocket, “that wasn’t the case.”. This is both an opportunity and challenge, as firms invest in new hardware optimized for speed and insight, employee education and partnering.

article thumbnail

Elearning Staff Awareness Course Overview: Ransomware

IT Governance

He also has an MSc in cyber security risk management. Now, Damian is our head of GRC consultancy, providing clients with pragmatic consultancy advice and support around information security, risk management and ISMSs (information security management systems). The course also features numerous examples and case studies.