Remove Document Remove eBook Remove Insurance Remove Strategy
article thumbnail

Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy

The Security Ledger

In this Spotlight Podcast, a companion to our new eBook, Rethinking Third Party Cyber Risk Management, we go deep on the topic of building a mature third party cyber risk program with Dave Stapleton the Director of Assessment. Download our new ebook: Rethinking Third-Party Cyber Risk Management. Read the whole entry. »

Risk 40
article thumbnail

More articles about information management than any sane person should write

AIIM

Over 100 eBooks, Guest articles, and Tip Sheets from the past year or so -- 107 of them to be exact. Creating a Digital Transformation Strategy that Builds Upon What You Have. From Documents to Content to Data. 10 Strategies to Navigate the Shift from ECM to Content Services. of Document Management. Tip Sheets.

ECM 90
article thumbnail

Zero Trust Is a Journey and Businesses Have Many Rivers to Cross

Thales Cloud Protection & Licensing

“An organization's employees that were once protected under a company network are now working from home, with or without proper VPNs, segmented networks, and possibly with unsecured devices, so your mitigation and incidence response strategy now includes elements outside of your traditional scope.”. More About This Author >.