Remove Case Study Remove Government Remove Security Remove Strategy
article thumbnail

[Podcast] The Impact of a Pandemic on Information Governance

AIIM

Now, as our time with COVID goes on, some of the focus has shifted from short-term business concerns like how to set up a remote working strategy , how to ensure security while working from home , and how technology might be able to help contain the spread of the virus. To now, businesses are planning for the long-term.

article thumbnail

Information Governance – 3 Common Pitfalls and How to Avoid Them

AIIM

What is Information Governance, and Why is it Important? There are many benefits to constructing an Information Governance program plan. We'll also cover some strategies to avoid them. How to Avoid Information Governance Pitfalls. How to Avoid Information Governance Pitfalls. Lack of Stakeholder Support.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: NIST’s Cybersecurity Framework update extends best practices to supply chain, AI

The Last Watchdog

Here are the core components the security community knows: Govern (GV): Sets forth the strategic path and guidelines for managing cybersecurity risks, ensuring harmony with business goals and adherence to legal requirements and standards. Noteworthy updates The new 2.0 by diverse organizations. by diverse organizations. The CSF 2.0

article thumbnail

How to Manage Information - Growing Your Own Success

AIIM

This is the case for many of us; our information is just sort of there, unmanaged, invisible, and stored in a bunch of different places. Intelligent Information Management (IIM) is the tools, strategy, and planning used to fully-leverage your information. Automating Governance and Compliance (Protecting the Garden).

ROT 160
article thumbnail

Information Disaster Plan

The Texas Record

What types of information is your government creating? Where are your government’s offices geographically located? For e.g. If crossing a bridge is the only entry to the site, analyze how your government will access the information if that bridge were to collapse. So, prepare with a short-term and long-term impact in mind.

Paper 98
article thumbnail

e-Records 2023 – Call for Presentations

The Texas Record

This event is organized by the Texas State Library and Archives Commission (TSLAC) and co-sponsored with the Texas Department of Information Resources (DIR) to promote electronic records management in Texas government. Requested Presentation Formats A presentation must include 1-2 presenters or 3-4 panelists and a moderator.

Cleanup 40
article thumbnail

Why the cyber security skills gap is so damaging

IT Governance

The cyber security skills gap has been growing for years, and the problem is particularly bad in the UK. All of this means that organisations are unprepared for major security incidents, which could cause substantial damage and affect business operations. However, some cyber security experts believe the skills shortage is a “myth”.