article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This discussion includes methods, tools, and techniques such as using personae and identifying use cases that have high business value, while minimizing project risks. Thus, common tools and techniques are risk matrices, risk registers, risk logs, risk breakdown structures, risk categories, Monte Carlo simulations, and sensitivity analyses.

article thumbnail

The Week in Cyber Security and Data Privacy: 11 – 18 December 2023

IT Governance

According to Delta Dental’s breach notification, affected personal data included addresses, Social Security numbers, driver’s license numbers or other state identification numbers, passport numbers, financial account information, tax identification numbers, individual health insurance policy numbers and health information.

article thumbnail

How Public AI Can Strengthen Democracy

Schneier on Security

Much like the federal Centers for Medicare & Medicaid Services (CMS) administers public health insurance programs, so too could a federal agency dedicated to AI—a Centers for AI Services—provision and operate Public AI models. .” While this is a good start, the U.S.

CMS 99