Remove Education Remove Information governance Remove Insurance Remove Ransomware
article thumbnail

Using Information Governance with a Privacy Compliance Plan as the Fulcrum for Data Privacy and Continuous Compliance

Information Governance Perspectives

In May of 2020 I was honored to speak at the MERv conference with John Frost of Box on the topic of Using Information Governance with a Privacy Compliance Plan as the Fulcrum for Data Privacy and Continuous Compliance. Just think about ransomware. Below are some excerpts from my transcribed remarks. People tend to forget that.

article thumbnail

Meeting Evolving Business Needs – A Conversation Between RIM Educators and Thought Leaders

Information Governance Perspectives

Hunter, Dr. Tao Jin, Dr. Patricia Franks, Rae Lynn Haliday, Cheryl Pederson, and Wendy McLain on the topic of Meeting Evolving Business Needs – A Conversation Between RIM Educators and Thought Leaders. But that’s not entirely the role of the Records and Information Governance professional, is it?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Resolving Disputes During & Post COVID

Information Governance Perspectives

We know for example that Ransomware pirates are now even targeting law firms just as much as other sectors such as healthcare. My wife, who happens to be an insurance defense attorney, well, we were closely following some of the court challenges, specifically in Wisconsin as they relate to public health measures in response to COVID.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This part also discusses managing CS risks such as ransomware, privacy, change management, and user adoption. A sinister variation of the SaaS model is Ransomware as a Service (RaaS), in which criminals on the dark web rent the service in order to launch attacks on targets. RaaS is a new business model for ransomware developers.