Remove 10
Remove 2021 Remove Computer and Electronics Remove Education Remove IT Remove Security
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. Commissioned by organizers to predict worst-case scenarios for the Munich games, [Georg] Sieber came up with a range of possibilities, from explosions to plane crashes, for which security teams should be prepared.

article thumbnail

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

The Last Watchdog

GCIS was a Davos-level conference with no vendors and no selling, where scores of chief security information officers (CISOs), top CEO’s, industry and government thought leaders and leading innovators discussed the myriad challenges in and around cybersecurity and possible solutions in today’s environment.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chronicle of a Records Manager: Controlling the Chaos of Disaster Response and Recovery

ARMA International

I have overseen two significant projects: an electronic discovery production and disaster response and recovery effort. On the 29th of August, 2021, New Orleans felt the impacts of Hurricane Ida. On August 27, 2021, the OAR staff worked on hurricane preparations. Covering all computers and file cabinets in plastic sheeting. .

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Security enthusiast and Linux evangelist Binni Shah consistently offers valuable tutorials, guides, and insights for the cybersecurity community. — Eva (@evacide) October 4, 2021.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

Vamosi: But as someone who wrote a book questioning the security of our mass produced IoT devices, I wonder why no one bothered to test and certify these devices before they were installed? And on the other hand, we're saying security, that's a secondary concern. But we all know how security by obscurity works in the end.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

What role might the security industry have in identifying or even stopping it? Lodrina Cherne and Martijn Grooten join the The Hacker Mind podcast to discuss their Black Hat USA 2021 presentation. In early September 2021. In a moment we'll hear from two hackers who spoke at Black Hat USA 2021. It's natural.