New Online Course For Local Governments

The Texas Record

SLRM is excited to announce the relaunch of our Introduction to Records Management Course for local governments! You may remember a previous iteration of the IRM course available on our training page. For the uninitiated, the IRM course is a self-paced multi-subject class that covers the fundamentals of records management. For information about our trainings (like how to enroll in a course), please see our Frequently Asked Questions.

Top cyber security courses for 2018

IT Governance

Find out how to pick the best training course and qualification to advance your cyber security career. Training courses are generally tailored to specific careers, so the first thing you need to decide is what aspect of cyber security interests you most.

BCS Data Protection Courses Available for 2019!

Managing Your Information

What courses are available? Tkm is delighted to announce new data protection courses are available for 2019! We now have courses at a range of levels including those offered by BCS together with Tkm’s own qualifications, which are approved and certificated by the SQA.

New Video Course for State Agencies

The Texas Record

We are pleased to announce a new online video course for state agency records management officers and records liaisons. we are currently revamping local government online courses as well!). Click here to access the video on the course page.

CISMP training courses now available in Glasgow

IT Governance

High demand means we are now offering our CISMP training course in different locations, including Glasgow. CISMP is acknowledged across the UK, accredited by the British Computer Society and approved by the government in the Certified Professional training scheme. CISMP Training Course.

Achieve your professional potential with 15% off our courses

IT Governance

Whatever category you fall into, we have courses that will help you achieve your professional potential. To help you achieve your potential faster, we are currently offering 15% off all October and November courses if you book by 31 October. We offer courses in: GDPR and DPO.

Why the Certified Ethical Hacker course is for you

IT Governance

View this infographic and find out why the Certified Ethical Hacker (CEH) Training Course is for you: Book your place on the CEH Training course with IT Governance and gain the skills to be a Certified Ethical Hacker.

New course dates for GDPR training in Edinburgh and Glasgow

IT Governance

One way this awareness can be achieved is through staff training, and IT Governance can support you every step of the way. The courses are also available in Live Online and distance learning formats for those who can’t get to a classroom. Certified EU GDPR Foundation Training Course.

Progress your career with an ISO 27001 Lead Implementer course

IT Governance

IT Governance offers training and qualifications in a variety of specialist areas. However, information security is a complex, multidisciplinary field, and knowing which course is right for you can be tricky. The cyber security skills gap isn’t going away.

A Certified Ethical Hacking Course with a difference

IT Governance

Michael Stout, our course trainer, has led CEH courses for more than ten years, and has worked for all the major training centres in the UK and Western Europe. He was the first CEH trainer on the continent and helped roll out training courses in a number of European markets.

Vulnerability in French Government Tchap Chat App

Schneier on Security

A researcher found a vulnerability in the French government WhatsApp replacement app: Tchap. Of course the developers will fix this vulnerability. The vulnerability allows anyone to surreptitiously join any conversation.

How an ISO 27001 Foundation course can help build your career path

IT Governance

The ISO 27001 Certified ISMS Foundation Training Course is the starting point for all prospective ISO 27001 project managers and auditors, or anyone who wishes to build a career in information security management. Book a course today to build you career path >> ISO 27001

Governance, Technology, and Capitalism.

John Battelle's Searchblog

Our lives are now driven in large part by data, code, and processing, and by the governance of algorithms. Synonymous with progress, asking not for permission, fearless of breaking things – in particular stupid, worthy-of-being-broken things like government, sclerotic corporations, and fetid social norms – the technology industry reveled for decades as a kind of benighted warrior for societal good. Do they think that means there’s no governance ?

Successful Information Governance when the Bosses Just Don't Care


We regularly discuss the value and importance of information governance - at our conference, in our training courses, in our virtual events. How can you move your organization's information governance program forward in the absence of management support or interest? What we'd suggest here is to get very specific about the value of effective information governance from a couple of different perspectives. FREE How-To Guide from AIIM: Information Governance 101].

Our Data Governance Is Broken. Let’s Reinvent It.

John Battelle's Searchblog

My current work is split between two projects: One has to do with data governance, the other political media. And second… Governance. Government – well for sure, I’d wager that’s increased given who’s been running the country these past two years. But Governance?

Information Governance Must Change


Information governance (IG) is all the rules, regulations, legislation, standards, and policies with which organizations need to comply when they create, share, and use information. Governance is mandated internally and externally.

Exodus, a government malware that infected innocent victims

Security Affairs

Security researchers have found a new government spyware, tracked as Exodus, that was distributed through the Google Play Store. This time, researchers discovered more than 20 malicious apps went unnoticed by Google over the course of roughly two years.

The Procurement Process: Key to an Information Governance Strategy


” Without exception, my response is to always include the information governance department in the procurement process. The issue only becomes known in the course of a software audit or, worse, during the discovery process of a legal matter.

What Role Government?

John Battelle's Searchblog

( image ) As I begin to dig into the work of my next book, I’ve found myself thinking about politics and government far more than I anticipated. For initial thoughts and stats, see Government By Numbers: Some Interesting Insights ). Some do ask for our SSN, of course.

IT Governance featured on Gibraltar News about common cyber threats 

IT Governance

One of IT Governance’s governance and risk management consultants, Andrew Pattison, was interviewed by GBC News last week about the most common types of cyber threats after delivering IT Governance’s three-day training course on “Effective Protection against Cyber crime”.

From the CTO: From Information Governance to Information Asset Management


The first “InfoGov” wave we are starting to see is a way to show people augmented information about an information or data asset, based on how it is governed in terms of cost, risk, quality, security or value within your company. Information Governance infonomics information asset management

Q&A: The troubling implications of normalizing encryption backdoors — for government use

The Last Watchdog

We know how Vladmir Putin, Xi Jinping and Kim Jung-un would answer: “Of course!”. The disturbing thing is that in North America and Europe more and more arguments are being raised in support of creating and maintaining encryption backdoors for government use. Here are excerpts edited for clarity and space: LW: What’s wrong with granting governments the ability to break encryption? Also, you have to ask what reasons the government might invoke to use the keys?

MY TAKE: Poorly protected local government networks cast shadow on midterm elections

The Last Watchdog

It’s easy to think of it as a problem the federal government must address or something that enterprises deal with, but cybersecurity has to be addressed closer to home, as well. His company supplies a co-managed SIEM service to mid-sized and large enterprises, including local government agencies. Security of local and state government agencies takes on a higher level of urgency as we get closer to the midterm elections.

Records Management Training for Local Governments – Registration Open!

The Texas Record

We are hosting local government classes on September 11-12, 2019. Course descriptions. Training Local GovernmentsEach class is $20. Class size is limited to 24 people so register today! Classes are being held at our main location, Lorenzo de Zavala Archives and Library building, 1201 Brazos St., Austin, TX 78701. Introduction to Records Management – Full Day Workshop.

Leaking government documents


So, working with a federal government agency to get confidential government information. The leakers at the government were angling for jobs at KPMG. Confidential government information belongs to the government. Conspiring with government employees to get that information is a crime. Your employer has a lot of incentives to cut you loose if you’ve committed a crime in the course of your business. No one at the government has been charged.

Poster boy for Information Governance


Years ago, while teaching a course to MBA students at Rice University, I used the Target credit card breach as a case study. While there have been a lot of information governance-related stories in the news over the past two years, including Equifax and Facebook and VW and Wells Fargo, my nominee for the one name associated with the most significant teaching example in information governance and compliance is the former FBI Director, James Comey.

Government By Numbers: Some Interesting Insights

John Battelle's Searchblog

Of course, were such a hypothesis true, one might imagine that the over percentage of GDP represented by government workers would have gone *down* over the past few decades. For example, check out this chart of what’s growing in our government, and what’s not: Aha!

Japanese government’s cybersecurity strategy chief has never used a computer

Security Affairs

The Japanese government’s cybersecurity strategy chief Yoshitaka Sakurada is in the middle of a heated debate due to his admission about his cyber capability. Yoshitaka Sakurada admitting he has never used a computer in his professional life, despite the Japanese Government, assigned to the politician the responsibility for cybersecurity of the 2020 Tokyo Olympics. Of course, the response shocked the audience, including Imai.

The Periscope Podcast – Reporting on staff training and awareness

IT Governance

Welcome to the IT Governance Periscope Podcast. This week’s episode is an investigation into reporting on staff training and awareness, and IT Governance products and solutions for organisations that suffer a data breach. Step into the Breach.

Records Management Training for Local Governments – Registration Open!

The Texas Record

We are hosting local government classes in March and May 2019. Course descriptions. News Training Local GovernmentsEach class is $20. Class size is limited to 24 people so register today! Classes are being held at the State Records Center located at 4400 Shoal Creek Blvd., Austin, TX 78756. Introduction to Records Management – Full Day Workshop. Learn the basic concepts of records management: legal obligations, definitions, and how to read a retention schedule.

Government survey reveals GDPR awareness is falling short

IT Governance

Those who are already involved in data protection or who wish to enter the field might want to consider our specialised GDPR training courses.

Building a bridge to SaaS in government


Building a bridge to SaaS in government. If you find yourself wondering where to start, I recommend you review what you already have to determine the best course of action. Sun, 10/21/2018 - 20:36.

IT Governance for Techies


IT Governance for Techies. When they reach the role of CIO their focus needs to shift to leadership, strategy, inspiring the troops, organisation and skills, and governance. Let's try to demystify IT governance. Anonymous. Thu, 02/06/2014 - 09:35.

Digital Transformation Examples: Three Industries Dominating Digital Transformation


The following three examples highlight the extent to which digital transformation is reshaping the nature of business and government and how we – as a society – interact with the world. This article further explores digital transformation and data governance in retail.

e-Records 2017 – “Information Governance: Take Control and Succeed” Conference Recap

The Texas Record

The 2017 e-Records conference delivered on all fronts hosting a variety of vendors, local government and state agency representatives and, of course, plenty of staff from the two hosting state agencies: Department of Information Resources (DIR) and Texas State Library and Archives Commission (TSLAC).

How State Governments Can Protect and Win with Big Data, AI and Privacy

Bill Schmarzo - Dell EMC

We have historical experiences and references to revisit in discerning what the government can do to nurture our “Analytics Revolution.” Notably, the Industrial Revolution, holds many lessons regarding the consequences of late and/or confusing government involvement and guidance (see Figure 1). The government can’t afford to stand by and let the markets decide. That’s a tall order, but nothing less should be expected from our government, industry and society leaders.

Data governance: The secret ingredient for getting the most from data-centric initiatives


Data governance: The secret ingredient for getting the most from data-centric initiatives. Government and commercial organizations are becoming much more interested in leveraging their data, establishing data labs and standing up self-service environments. In the federal government, agencies are working toward meeting the President's Management Agenda (PMA) objectives in treating data as an asset. As the organization scales up, it has to add a layer of governance.

Should you be worried about missing out? Six key principles that can help relieve a government CIO’s FOMO


Six key principles that can help relieve a government CIO’s FOMO. You are not alone; most of your peers also experience this feeling, especially when it comes to deciding where to turn your attention next in a large, complex organization like a government agency.

How blockchain is like an HOA—it’s all about the governance


How blockchain is like an HOA—it’s all about the governance. federal government , drafted by a collaborative team of industry and government leaders. Whenever a group of individuals chooses—or are required—to share, they benefit from establishing a governance model that clearly articulates the framework under which the collective will operate and be managed. From an IT perspective, traditional governance models typically encapsulate: 1.

CNIL Updates Privacy Seals on Governance Procedures and Training Programs to Comply with GDPR

Hunton Privacy

So far, the CNIL has adopted four standards, namely a standard on audit procedures covering the processing of personal data, a standard on data protection training programs, a standard on “digital safe boxes” and a standard on data privacy governance procedures. The updated standards include the standard on data protection training programs and on data privacy governance procedures.