Remove tag risk-based-approach
Remove Computer and Electronics Remove Conference Remove Government
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Part 3 will discuss how to manage the various DT risks. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

Fortunately, there are those in the InfoSec world, who are actively looking at the subject and speaking out at conferences, such as Black Hat. Cherne: The name of this talk at Black Hat this year is a “Survivor-centric, Trauma-informed Approach to Stalkerware.” Both involve technology. Cherne: My name is Lodrina Cherne.