article thumbnail

Case Study: Enhancing Endpoint Security

Data Breach Today

Because it's inevitable that some attackers will get around defenses, Kettering Health Network added an extra layer of endpoint security to help mitigate the risks posed by ransomware and other cyberthreats, says Michael Berry, director of information security. He describes what's unusual about the approach.

Security 175
article thumbnail

Case Study: How IU Health Manages Vendor Security Risk

Data Breach Today

What are some of the most important aspects in managing vendor security risk when taking on third-parties to handle sensitive data? Mitch Parker, CISO of Indiana University Health, explains the critical steps his organization is taking in its approach to vendor risk.

Risk 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OFFICE/RECORDS CENTER MOVE – A CASE STUDY (AND PRIMER) Wednesday, November 8, 2023 – 6:00 PM to 7:00 PM via Metro Maryland ARMA Chapter

IG Guru

Free November Webinar OFFICE/RECORDS CENTER MOVE – A CASE STUDY (AND PRIMER) Wednesday, November 8, 2023 – 6:00 PM to 7:00 PM via Zoom Earl Johnson, CRM will present a case study of a major office move that he led while at Ernst & Young in Atlanta, complete with lessons learned.

Risk 87
article thumbnail

GUEST ESSAY: NIST’s Cybersecurity Framework update extends best practices to supply chain, AI

The Last Watchdog

The National Institute of Standards and Technology (NIST) has updated their widely used Cybersecurity Framework (CSF) — a free respected landmark guidance document for reducing cybersecurity risk. It seeks to establish and monitor your company’s cybersecurity risk management strategy, expectations, and policy. by diverse organizations.

article thumbnail

Are You Ready For Predictive Analytics?

Speaker: Anita Lauper Wood, Product Strategist

There are risks that need to be consciously addressed, and successful implementation requires the right strategy. Join Anita Lauper Wood, Product Strategist, for a valuable session for product and technology leaders who want to learn: Case studies showing value derived from predictive analytics.

article thumbnail

The Data Breach Case Study & Protection Guide

Record Nations

What Happened Even the tiniest serious gap can pose serious risks. The post The Data Breach Case Study & Protection Guide appeared first on Record Nations. After a $5.5 Recently […].

article thumbnail

Webinar: Case Studies on Information Governance in Microsoft 365 | 1:00pm ET on April 2, 2020

IG Guru

The post Webinar: Case Studies on Information Governance in Microsoft 365 | 1:00pm ET on April 2, 2020 appeared first on IG GURU. Presented by John Isaza, Esq., Few enterprises found SharePoint on-premise good enough for managing records, […].

article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.