Remove Course Remove Education Remove Government Remove Meeting
article thumbnail

Sophie Sayer on the IT Governance Partner Programme

IT Governance

The benefits of partnering with us, and our partner-exclusive event IT Governance launched its partner programme in 2017, which now includes more than 400 organisations. And why should organisations consider partnering with IT Governance? What is it that makes IT Governance special? What else can partners expect from the event?

article thumbnail

Meeting Evolving Business Needs – A Conversation Between RIM Educators and Thought Leaders

Information Governance Perspectives

Hunter, Dr. Tao Jin, Dr. Patricia Franks, Rae Lynn Haliday, Cheryl Pederson, and Wendy McLain on the topic of Meeting Evolving Business Needs – A Conversation Between RIM Educators and Thought Leaders. But that’s not entirely the role of the Records and Information Governance professional, is it? Are we generalists?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: MxD roundtable with White House officials highlights cybersecurity workforce needs

The Last Watchdog

Organizations gathered to discuss courses and programs to address the critical cybersecurity workforce needs in the United States. The CyMOT course series is tailored to meet the needs of each learner, including current manufacturing workers looking to upskill and future workers still learning the basics. Chicago, Ill.,

article thumbnail

How to implement data governance

Collibra

So your team has identified implementing data governance as a priority for the year. But what happens once you purchase a data governance platform? This article is meant to outline the vital steps for implementing data governance. Why a data governance roadmap is vital. 10 steps to successful data governance.

article thumbnail

IT Governance featured on Gibraltar News about common cyber threats 

IT Governance

One of IT Governance’s governance and risk management consultants, Andrew Pattison, was interviewed by GBC News last week about the most common types of cyber threats after delivering IT Governance’s three-day training course on “Effective Protection against Cyber crime”.

article thumbnail

Intelligent Information Management (IIM) Policies and the Law - Part 2

AIIM

In my first post, where we explored the principle of hearsay , we left off asking about the relationship between IIM policies and the "ordinary course of business." What's the Relationship Between IIM Policies and the "Ordinary Course of Business"? So, let's take a look. How Do Policies and Contracts differ?

Paper 159
article thumbnail

Train Your Team to Ensure You Achieve ISO 27001 Certification

IT Governance

It requires in-depth knowledge of the Standard and the skills to develop a management framework that meets the requirements of an external audit by a certification body. All team members need to be aware of the basic requirements of ISO 27001 and educated to at least an introductory (foundation) level. Leadership is key.