Remove 12
Remove 2013 Remove Education Remove Examples Remove Strategy
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Gartner (2021) has two related definitions: Digital Transformation: “can refer to anything from IT modernization (for example, cloud computing), to digital optimization, to the invention of new digital business models.” That is almost 2000 times more data in less than 20 years (Press 2013, Patrizio 2018).

article thumbnail

How AI Could Write Our Laws

Schneier on Security

But lobbying strategies are not always so blunt, and the interests involved are not always so obvious. Consider, for example, a 2013 Massachusetts bill that tried to restrict the commercial use of data collected from K-12 students using services accessed via the internet. This process is called fine-tuning.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chronicle of a Records Manager: Controlling the Chaos of Disaster Response and Recovery

ARMA International

The unrelenting hurricane severely affected the 12-story office building of the Archdiocese of New Orleans (ANO) located in the Central Business District of the city. I have been a member of the OAR staff at the ANO since March 2013. Information Governance: Concepts, strategies, and best practices. Background. Peterson, A.

article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

In fact, those guys are all pretty good examples of the ability to build amazing things from the ground up and I'm sure that many of you reading this have sat down and started building something with the same enthusiasm as, say, Zuckerberg did with Facebook in 2004. Banking is below that. Medical even lower.

Education 111
article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

More and more, directors are viewing cyber-risk under the broader umbrella of corporate strategy and searching for ways to help mitigate that risk. Aligning cyber risk with corporate strategy. Implementing a Targeted Guidance Strategy. Adopting the NIST Cybersecurity Framework. Encrypting critical data assets.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

The biggest changes since our debates on the Data Protection Act 1998, or even the early stages of the GDPR, which I was involved in as a Minister at the MoJ from 2010 to 2013, is that the threat to civil liberties and personal freedoms now comes not only from agencies of the state but from corporate power as well.

GDPR 120
article thumbnail

A Flurry of Recent Cybersecurity Activity from the Trump Administration

Data Matters

For example, in 2013, the Federal Bureau of Investigation (FBI) partnered with Microsoft to disrupt more than 1,400 Citadel botnets. Awareness and education are needed ,” as users, developers, manufacturers, and infrastructure operators all can lack the knowledge and capabilities to protect the Internet. in isolation.”.