Remove Document Remove Examples Remove Government Remove Presentation
article thumbnail

Malicious file analysis – Example 01

Security Affairs

Cyber Security Specialist Zoziel Pinto Freire shows an example of malicious file analysis presented during his lecture on BSides-Vitória 2022. My objective with this series of articles is to show examples of malicious file analysis that I presented during my lecture on BSides-Vitória 2022. Microsoft Office Documents.

Libraries 103
article thumbnail

Documentation Theory for Information Governance

ARMA International

Documentation the Emblem of Modern Society? Documentation is a central feature of the contemporary world. We are immersed in documents in nearly every sphere of life and constantly engage with them. Our lives, in many ways, are “document-pervaded.” [i] Documents are the lifeblood of institutions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Understanding and Documenting the Basis of Retention Periods

ARMA International

For example, OSHA (Occupational Safety and Health Act) regulations 29 CFR 1904 et. That is just one example of many regulations that specify retention periods. Highly regulated industries have even more of a recordkeeping burden, but those should be documented as well. April is Records and Information Management (RIM) Month.

article thumbnail

AI model governance: What it is and why it’s important

Collibra

If you strive to be data-driven and are leveraging AI technologies to gain a competitive edge, increase efficiency, and drive innovation, then you need to recognize, in addition to its potentially remarkable benefits, generative AI also presents significant risks. AI models and governance An AI model is, at its core, a mathematical construct.

article thumbnail

China-linked APT Sharp Panda targets government entities in Southeast Asia

Security Affairs

China-linked APT group Sharp Panda targets high-profile government entities in Southeast Asia with the Soul modular framework. CheckPoint researchers observed in late 2022, a campaign attributed to the China-linked APT group Sharp Panda that is targeting a high-profile government entity in the Southeast Asia.

article thumbnail

e-Records Conference 2018: Call for Presentations

The Texas Record

This event promotes improved electronic records management in Texas government by bringing together staff responsible for and interested in records management and information technology. Presentation formats could include 1-2 presenters or 3-4 panelists for 45 or 75-minute sessions. Visit the conference website for more details.

article thumbnail

A step-by-step guide to setting up a data governance program

IBM Big Data Hub

In our last blog , we delved into the seven most prevalent data challenges that can be addressed with effective data governance. Today we will share our approach to developing a data governance program to drive data transformation and fuel a data-driven culture.