Remove Case Study Remove Presentation Remove Risk Remove Security
article thumbnail

e-Records 2023 – Call for Presentations

The Texas Record

The conference gathers records management and information technology staff from the state and local level together to learn from each other by sharing case studies, solutions, best practices, challenges, and lessons learned. Requested Presentation Formats A presentation must include 1-2 presenters or 3-4 panelists and a moderator.

Cleanup 40
article thumbnail

MER 2019 – CALL FOR PRESENTERS

IG Guru

We are looking for presentations on solutions to the IG challenges created by new and emerging technologies, the latest legal and regulatory developments that affect IG programs and professionals, practical advice and guidance on traditional IG challenges, and relevant case studies […].

FOIA 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSA Conference 2023: Meet Thales Where the World Talks Security!

Thales Cloud Protection & Licensing

RSA Conference 2023: Meet Thales Where the World Talks Security! Meet us at Booth #N-5369 for demonstrations on data security, customer and workforce identity, and post quantum cryptography – just to name a few. You can experience customer and partner presentations and learn more from one-on-one conversations with Thales experts.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Related: Atrium Health breach highlights third-party risks. And this continues to include enterprises that have poured a king’s ransom into hardening their first-party security posture. Third-party cyber risks are likely to persist at the current scale for a while longer. Uphill battle.

Risk 147
article thumbnail

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

The purpose of this presentation is to show a real-world example of how data mapping enhances the ability to manage your records effectively. Privacy – Confidential Information; Risk; PCI; PII. IT Security – Cybersecurity; Access Controls; Breach Detection. PDF of Presentation.

article thumbnail

Watch out, ransomware attack risk increases on holidays and weekends, FBI and CISA

Security Affairs

” Clearly, the FBI and CISA focus on attacks against organizations in the United States, they proposed as case studies the attacks against Colonial Pipeline , JBS , and Kaseya. “Threat actors can be present on a victim network long before they lock down a system, alerting the victim to the ransomware attack.

article thumbnail

UK government’s response to AI White Paper consultation: next steps for implementing the principles

Data Protection Report

It confirms that, for the present, the UK will follow its proposed approach of setting cross-sectoral principles to be enforced by existing regulators rather than passing new legislation to regulate AI. The principles are: Safety, security and robustness. The Response outlines key investment initiatives and regulatory steps.

Paper 63