New Online Course For Local Governments

The Texas Record

SLRM is excited to announce the relaunch of our Introduction to Records Management Course for local governments! You may remember a previous iteration of the IRM course available on our training page. For the uninitiated, the IRM course is a self-paced multi-subject class that covers the fundamentals of records management. For information about our trainings (like how to enroll in a course), please see our Frequently Asked Questions.

Top cyber security courses for 2018

IT Governance

Find out how to pick the best training course and qualification to advance your cyber security career. Training courses are generally tailored to specific careers, so the first thing you need to decide is what aspect of cyber security interests you most.

BCS Data Protection Courses Available for 2019!

Managing Your Information

What courses are available? Tkm is delighted to announce new data protection courses are available for 2019! We now have courses at a range of levels including those offered by BCS together with Tkm’s own qualifications, which are approved and certificated by the SQA.

CISMP training courses now available in Glasgow

IT Governance

High demand means we are now offering our CISMP training course in different locations, including Glasgow. CISMP is acknowledged across the UK, accredited by the British Computer Society and approved by the government in the Certified Professional training scheme. CISMP Training Course.

Achieve your professional potential with 15% off our courses

IT Governance

Whatever category you fall into, we have courses that will help you achieve your professional potential. To help you achieve your potential faster, we are currently offering 15% off all October and November courses if you book by 31 October. We offer courses in: GDPR and DPO.

GDPR 75

New Video Course for State Agencies

The Texas Record

We are pleased to announce a new online video course for state agency records management officers and records liaisons. we are currently revamping local government online courses as well!). Click here to access the video on the course page.

First Cyber Defence & Information Assurance courses to receive CILIP accreditation

CILIP

First Cyber Defence & Information Assurance courses to receive CILIP accreditation. CILIP is delighted to announce that Cyber Defence & Information Assurance Masters and Postgraduate Diploma courses at Cranfield University have become the first of their kind to receive CILIP accreditation, recognising their solid preparation for professional practice and a suitable base for anybody entering the information sector.

Metadata Management, Data Governance and Automation

erwin

erwin released its State of Data Governance Report in February 2018, just a few months before the General Data Protection Regulation (GDPR) took effect. Download Free GDPR Guide | Step By Step Guide to Data Governance for GDPR?. Can the 80/20 Rule Be Reversed?

Why the Certified Ethical Hacker course is for you

IT Governance

View this infographic and find out why the Certified Ethical Hacker (CEH) Training Course is for you: Book your place on the CEH Training course with IT Governance and gain the skills to be a Certified Ethical Hacker.

Data Governance Tools: What Are They? Are They Optional?

erwin

Data governance tools used to occupy a niche in an organization’s tech stack, but those days are gone. The rise of data-driven business and the complexities that come with it ushered in a soft mandate for data governance and data governance tools. Data Governance 1.0

Progress your career with an ISO 27001 Lead Implementer course

IT Governance

IT Governance offers training and qualifications in a variety of specialist areas. However, information security is a complex, multidisciplinary field, and knowing which course is right for you can be tricky. The cyber security skills gap isn’t going away.

A Certified Ethical Hacking Course with a difference

IT Governance

Michael Stout, our course trainer, has led CEH courses for more than ten years, and has worked for all the major training centres in the UK and Western Europe. He was the first CEH trainer on the continent and helped roll out training courses in a number of European markets.

New course dates for GDPR training in Edinburgh and Glasgow

IT Governance

One way this awareness can be achieved is through staff training, and IT Governance can support you every step of the way. The courses are also available in Live Online and distance learning formats for those who can’t get to a classroom. Certified EU GDPR Foundation Training Course.

GDPR 60

Vulnerability in French Government Tchap Chat App

Schneier on Security

A researcher found a vulnerability in the French government WhatsApp replacement app: Tchap. Of course the developers will fix this vulnerability. The vulnerability allows anyone to surreptitiously join any conversation.

Data Governance Tools: What Are They? Are They Optional?

erwin

Data governance tools used to occupy a niche in an organization’s tech stack, but those days are gone. The rise of data-driven business and the complexities that come with it ushered in a soft mandate for data governance and data governance tools. Data Governance 1.0

How an ISO 27001 Foundation course can help build your career path

IT Governance

The ISO 27001 Certified ISMS Foundation Training Course is the starting point for all prospective ISO 27001 project managers and auditors, or anyone who wishes to build a career in information security management. Book a course today to build you career path >> ISO 27001

Information Governance Must Change

PHIGs

Information governance (IG) is all the rules, regulations, legislation, standards, and policies with which organizations need to comply when they create, share, and use information. Governance is mandated internally and externally.

Governance, Technology, and Capitalism.

John Battelle's Searchblog

Our lives are now driven in large part by data, code, and processing, and by the governance of algorithms. Synonymous with progress, asking not for permission, fearless of breaking things – in particular stupid, worthy-of-being-broken things like government, sclerotic corporations, and fetid social norms – the technology industry reveled for decades as a kind of benighted warrior for societal good. Do they think that means there’s no governance ?

#ModernDataMasters: Nicola Askham, The Data Governance Coach

Reltio

Nicola Askham is the leading data governance training provider in the UK with over 16 years of experience and research in the field. She delivers training and consulting to major organisations to help them implement full data governance frameworks. Kate Tickner, Reltio.

Our Data Governance Is Broken. Let’s Reinvent It.

John Battelle's Searchblog

My current work is split between two projects: One has to do with data governance, the other political media. And second… Governance. Government – well for sure, I’d wager that’s increased given who’s been running the country these past two years. But Governance?

Exodus, a government malware that infected innocent victims

Security Affairs

Security researchers have found a new government spyware, tracked as Exodus, that was distributed through the Google Play Store. This time, researchers discovered more than 20 malicious apps went unnoticed by Google over the course of roughly two years.

Does it have to be called data governance?

Information Management Resources

Data governance is the foundation of all other data management disciplines (and of course therefore the most important). Data governance Data management Data quality

IT Governance featured on Gibraltar News about common cyber threats 

IT Governance

One of IT Governance’s governance and risk management consultants, Andrew Pattison, was interviewed by GBC News last week about the most common types of cyber threats after delivering IT Governance’s three-day training course on “Effective Protection against Cyber crime”.

JD Sillion on Creating Value, Promoting Trust, and Building Loyalty through Information Governance Investments

Everteam

What steps can leaders take to promote a healthy information governance culture within their organizations? Of course, making the tool amenable to the job at hand doesn’t mean giving end-users too much latitude in terms of what they can access, or how. Everteam CRO JD Sillion.

What Role Government?

John Battelle's Searchblog

( image ) As I begin to dig into the work of my next book, I’ve found myself thinking about politics and government far more than I anticipated. For initial thoughts and stats, see Government By Numbers: Some Interesting Insights ). Some do ask for our SSN, of course.

Successful Information Governance when the Bosses Just Don't Care

AIIM

We regularly discuss the value and importance of information governance - at our conference, in our training courses, in our virtual events. How can you move your organization's information governance program forward in the absence of management support or interest? What we'd suggest here is to get very specific about the value of effective information governance from a couple of different perspectives. FREE How-To Guide from AIIM: Information Governance 101].

Q&A: The troubling implications of normalizing encryption backdoors — for government use

The Last Watchdog

We know how Vladmir Putin, Xi Jinping and Kim Jung-un would answer: “Of course!”. The disturbing thing is that in North America and Europe more and more arguments are being raised in support of creating and maintaining encryption backdoors for government use. Here are excerpts edited for clarity and space: LW: What’s wrong with granting governments the ability to break encryption? Also, you have to ask what reasons the government might invoke to use the keys?

MY TAKE: Poorly protected local government networks cast shadow on midterm elections

The Last Watchdog

It’s easy to think of it as a problem the federal government must address or something that enterprises deal with, but cybersecurity has to be addressed closer to home, as well. His company supplies a co-managed SIEM service to mid-sized and large enterprises, including local government agencies. Security of local and state government agencies takes on a higher level of urgency as we get closer to the midterm elections.

From the CTO: From Information Governance to Information Asset Management

Everteam

The first “InfoGov” wave we are starting to see is a way to show people augmented information about an information or data asset, based on how it is governed in terms of cost, risk, quality, security or value within your company. Information Governance infonomics information asset management

Records Management Training for Local Governments – Registration Open!

The Texas Record

We are hosting local government classes on September 11-12, 2019. Course descriptions. Training Local GovernmentsEach class is $20. Class size is limited to 24 people so register today! Classes are being held at our main location, Lorenzo de Zavala Archives and Library building, 1201 Brazos St., Austin, TX 78701. Introduction to Records Management – Full Day Workshop.

The Procurement Process: Key to an Information Governance Strategy

InfoGoTo

” Without exception, my response is to always include the information governance department in the procurement process. The issue only becomes known in the course of a software audit or, worse, during the discovery process of a legal matter.

The Periscope Podcast – Reporting on staff training and awareness

IT Governance

Welcome to the IT Governance Periscope Podcast. This week’s episode is an investigation into reporting on staff training and awareness, and IT Governance products and solutions for organisations that suffer a data breach. Step into the Breach.

Leaking government documents

InfoGovNuggets

So, working with a federal government agency to get confidential government information. The leakers at the government were angling for jobs at KPMG. Confidential government information belongs to the government. Conspiring with government employees to get that information is a crime. Your employer has a lot of incentives to cut you loose if you’ve committed a crime in the course of your business. No one at the government has been charged.

Poster boy for Information Governance

InfoGovNuggets

Years ago, while teaching a course to MBA students at Rice University, I used the Target credit card breach as a case study. While there have been a lot of information governance-related stories in the news over the past two years, including Equifax and Facebook and VW and Wells Fargo, my nominee for the one name associated with the most significant teaching example in information governance and compliance is the former FBI Director, James Comey.

Japanese government’s cybersecurity strategy chief has never used a computer

Security Affairs

The Japanese government’s cybersecurity strategy chief Yoshitaka Sakurada is in the middle of a heated debate due to his admission about his cyber capability. Yoshitaka Sakurada admitting he has never used a computer in his professional life, despite the Japanese Government, assigned to the politician the responsibility for cybersecurity of the 2020 Tokyo Olympics. Of course, the response shocked the audience, including Imai.

Government By Numbers: Some Interesting Insights

John Battelle's Searchblog

Of course, were such a hypothesis true, one might imagine that the over percentage of GDP represented by government workers would have gone *down* over the past few decades. For example, check out this chart of what’s growing in our government, and what’s not: Aha!

Two former Twitter employees charged of spying on Users for Saudi Arabian Government

Security Affairs

Two former Twitter employees have been charged with spying on thousands of Twitter user accounts on behalf of the Saudi Arabian government. Two former Twitter employees have been charged with spying on thousands of Twitter user accounts on behalf of the Saudi Arabian government.

Government survey reveals GDPR awareness is falling short

IT Governance

Those who are already involved in data protection or who wish to enter the field might want to consider our specialised GDPR training courses.

GDPR 72

Building a bridge to SaaS in government

CGI

Building a bridge to SaaS in government. If you find yourself wondering where to start, I recommend you review what you already have to determine the best course of action. shobana.lv@cgi.com. Sun, 10/21/2018 - 20:36.

Records Management Training for Local Governments – Registration Open!

The Texas Record

We are hosting local government classes in March and May 2019. Course descriptions. News Training Local GovernmentsEach class is $20. Class size is limited to 24 people so register today! Classes are being held at the State Records Center located at 4400 Shoal Creek Blvd., Austin, TX 78756. Introduction to Records Management – Full Day Workshop. Learn the basic concepts of records management: legal obligations, definitions, and how to read a retention schedule.