IG Guru

We are looking for presentations on solutions to the IG challenges created by new and emerging technologies, the latest legal and regulatory developments that affect IG programs and professionals, practical advice and guidance on traditional IG challenges, and relevant case studies […].


How to become an ISO 27001 lead implementer

IT Governance

It’s an advanced cyber security position that comes with a lot of responsibility. You’ll be given a combination of theoretical study and hands-on work, including group discussions, practical exercises and case studies.

Risk 70

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security. If you’re thinking about starting a career in cyber security, here are five things you should do. As with most industries, you’re much more likely to get ahead in cyber security if you have experience. Study.

Understanding the differences between ISO 27001 and ISO 27002

IT Governance

Anyone with an interest in information security will have encountered ISO 27001 , the international standard that describes best practice for an ISMS (information security management system). It’s a supplementary standard that provides advice on how to implement the security controls listed in Annex A of ISO 27001. This blog explains why that’s the case, helping you understand how each standard works and the differences between them.

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security, with growing demand for experts promising increased salaries and job opportunities. In this blog, we provide tips for getting your cyber security career started no matter your background.

e-Records 2019: Early Bird discount expires soon!

The Texas Record

Better Together in a Digital World: Security and Retention. The e-Records Conference is an educational opportunity for improving electronic records management in Texas government by bringing together records management and information technology staff.

What Should Be The Core Competencies For Cybersecurity For C-Suite

Cyber Info Veritas

Such information on the wrong hands can be used for misrepresentation or identity theft. Most IT specialists, board directors, and C-suite executives aren’t too familiar with matters to do with information security.

UK ICO Releases Code on Data Sharing

Hunton Privacy

On May 11, 2011, the UK Information Commissioner’s Office (the “ICO”) published a new statutory code of practice on the sharing of personal data. The UK Information Commissioner, Christopher Graham, said, “[f]ew would argue that sharing data can play an important role in providing an efficient service to consumers in both the public and private sector.

Paper 40

What did you do for European Cyber Security Month?

IT Governance

Throughout October, cyber security experts have been helping Europeans understand the importance of effective information security practices as part of Cyber Security Month. What should you remember about Cyber Security Month? Security Summit North.

Why the cyber security skills gap is so damaging

IT Governance

The cyber security skills gap has been growing for years, and the problem is particularly bad in the UK. In many cases, employees’ time and resources are spread so thinly that the quality of the work suffers. However, some cyber security experts believe the skills shortage is a “myth”.

Risk 59

Can Enterprises execute a GRC Movement?

Security Affairs

Managed security services or security operations, cloud security, GRC is one of the fastest growing solutions in the world. GLOBAL CYBER SECURITY MARKET. Enterprises can outsource cyber security, but not risk. If yes then what kind of use cases?

Risk 101

Thursday LTNY 2019 Sessions: eDiscovery Trends

eDiscovery Daily

Today is the last day to check out the show if you’re in the New York area with a number of sessions available and over 160 exhibitors providing information on their products and services, including our company, CloudNine at booth #310-312.

Cloud 39

Legaltech 2019 Preview Edition: eDiscovery Trends

eDiscovery Daily

Next week during the show, I’ll cover the sessions each day that relate to eDiscovery, Information Governance, Cybersecurity and Data Privacy to give you a complete sense of options. Custodian spoliation of electronic information. OK, everybody gets hung up on Legalweek vs. Legaltech®.

Establishing Records Management at Brandeis—The First Eighteen Months

Brandeis Records Manager

It begins with fact-finding: gathering information, learning the institution, meeting with stakeholders from various functions. These ranged from one-on-ones to a surprise fifty-person audience of administrators for an entire school (my meeting invitation indicated eight people attending, and I walked into a function hall—should have cased the joint). We made early acquaintances with Legal and Information Security leaders.

Does IT matter… in Australian supermarkets?


According to Woolworth''s CIO they selected Google Apps because: "Simplicity and ease of use of the solution, the support for mobility, activity-based working and bring-your-own-device, security and the overall value proposition,". My memories of interactions with Woolworths in the past was a company with very strict information security policies, so either an IT changing of the guard has taken place or they are confident that Google (and Yammer) can meet their standards.

Download IGI’s Whitepaper: Ameritas Leverages Technology For Improved Information Governance


This publication was written by the Information Governance Initiative as part of our ongoing series exploring issues, strategies, and techniques related to information governance. More information about Active Navigation is available at Given the multi-disciplinary nature of Information Governance (IG), it can sometimes feel like an amorphous topic. headquartered in Lincoln, Nebraska, clearly makes such a case. About this Publication.