article thumbnail

Finding Positive Opportunity in Social Distancing

AIIM

I delivered the first AIIM public training course in the U.S. Since then, I've delivered more than 400 workshops, seminars, breakout sessions, and training courses relating to information management – almost all in person. Self-Paced: These courses allow you to work at your own pace whenever you have time and inclination.

article thumbnail

Free resources to help you prevent and respond to data breaches

IT Governance

Green papers. This green paper explains each requirement and how you can comply. This green paper explains how you can improve your staff’s ability to identify and avoid mistakes. This blog outlines some of the free resources IT Governance offers to help organisations prevent, prepare for and respond to data breaches.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The future of RIM education

The Schedule

It would be great to see RIM systems demoed by practitioners instead of having to sit through vendor-supplied sessions that are more sales pitch than practical evaluation. So expect to see everything from more coffee chats to webinars to new SAA courses — and maybe even a track or certificate program somewhere down the line.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

And, of course the military in particular is always concerned with that and, you know, good friends of mine like Billy rails for example who most people you're probably have heard of, spend a lot of their time in classified environments, trying to figure out how to fix those issues for the government. Request Demo Learn More.

IT 52
article thumbnail

Major TTE Flaw Could Threaten Critical Infrastructure, Including Aircraft

eSecurity Planet

. “A single injection can cause TTE devices to lose synchronization for up to a second and fail to transmit tens of TT messages – both of which can cause the failure of critical systems,” the team noted in an IEEE research paper. Sending a Spacecraft Off Course. Trade Cyberthreats. ” Effective Migitations.

article thumbnail

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

The components, processes, and details of records management are, of course, the focus of exam prep. Contrary to their intentions of reeling in potential customers for follow-on conversations, the canned Web sites and some of their related demos and webinars should dissuade any logical and informed person from curiosity.

article thumbnail

Cross-domain search timing

Scary Beasts Security

I have a little demo: [link] It takes a few seconds, but if I'm not logged into Yahoo! The solution, of course, is to add it (and do the check before doing any work on the server like walking indexes)! Moving on to something real. The most usable primitive that this gives the attacker is a 1-bit leak of information. Mail, I see: DONE!

Paper 20