article thumbnail

The Best Training for Records Managers

AIIM

Most turn out to be a perfect fit for AIIM's training , certification , research , webinars , or some combination of these. But I'll be the first to admit that our educational offerings aren't a perfect fit for everyone and I often get asked, "What are some of the quality training options outside of AIIM?".

article thumbnail

5 learnings from the “Meeting the CCPA Challenge” webinar

Collibra

Collibra recently partnered with Kelle O’Neal, CEO of First San Francisco Partners (FSFP), to host a joint webinar “ Meeting the CCPA Challenge ” about the complexities of the California Consumer Protection Act (CCPA) for the International Association of Privacy Professionals (IAPP). Compliance does not equal ethics.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SnapChat at the Workplace? A Look at Ephemeral Messaging Apps for Business

AIIM

I recently watched a webinar by Jason Baron called " Vanishing Acts: The Challenge of Dealing with Ephemeral and Self-Destructing Messaging Apps in the Workplace. Instant messaging, text messaging, and other communications have similar issues. Training: Prohibition is always difficult. In the U.S.,

article thumbnail

France: The CNIL publishes a practical guide on Data Protection Officers

DLA Piper Privacy Matters

The CNIL thus recommends that the DPO’s mission letter clearly states that maintenance of such record should be within the DPO missions, and in particular, based on the information relating to each processing activity that will be communicated to him/her by the internal stakeholders in charge of such processing activity.

GDPR 116
article thumbnail

The must-have checklist for maximizing the value of your data catalog and governance investments with Collibra

Collibra

Onboard and train the MVS team. Deliver training that is meaningful and accessible. As much as possible, structure your training to map it to key roles and tailor your material based on individual experience levels and availability. Maximize your Collibra investment. Implementation is just the beginning.

article thumbnail

Cyber Threat Detection: The First Layer of Defence in Depth

IT Governance

The first is vulnerability scanning – automated probes that identify security vulnerabilities in computers, internal and external networks, and communications equipment. Although organisations can use tools such as anti-malware software to protect against phishing attacks, their most effective defence is staff awareness training.

Phishing 126
article thumbnail

How to build a successful talent management strategy

IBM Big Data Hub

Watch the webinar: The Future of HR and talent in the age of generative AI Building an effective talent management strategy Organizations cannot approach talent management initiatives with half-measures. It usually involves creating a positive work environment and communicating a message of mutual respect and equality.