Remove 12
Remove 2013 Remove Education Remove IT Remove Tools
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This discussion will include methods, tools, and techniques such as using personae and identifying use cases that have high business value, while minimizing project risks. More likely, the organization will resist DT – its new tools and processes to support new business models. Part 3 will discuss how to manage the various DT risks.

article thumbnail

Chronicle of a Records Manager: Controlling the Chaos of Disaster Response and Recovery

ARMA International

The unrelenting hurricane severely affected the 12-story office building of the Archdiocese of New Orleans (ANO) located in the Central Business District of the city. I have been a member of the OAR staff at the ANO since March 2013. On the 29th of August, 2021, New Orleans felt the impacts of Hurricane Ida. Background. It was grim.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How AI Could Write Our Laws

Schneier on Security

Consider, for example, a 2013 Massachusetts bill that tried to restrict the commercial use of data collected from K-12 students using services accessed via the internet. The bill appealed to many privacy-conscious education advocates, and appropriately so. Existing AI tools can tackle all three of these.

article thumbnail

Five reasons why law firms should adopt ISO 27001

IT Governance

PwC’s 2017 survey found that the most common security incidents were phishing attacks: 12% of firms faced phishing attacks on a daily basis, and a further 30% identified such attacks on either a weekly or monthly basis . Every law firm faces information security risks. Laptops can be lost, phones stolen and paperwork misplaced.

GDPR 70
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Starting with her first desktop on a Unix machine at age 12, Eva Galperin’s contributions to cybersecurity include research on malware and privacy. Tools, methods, automation, and no BS. Read more: Top IT Asset Management Tools for Security. Markstedter actively contributes to filling the infosec education gap.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

New technologies have started innumerable economic revolutions, and the pace of change continues to accelerate. Data is not just a resource for better marketing, better service and delivery. Data is used to build products themselves. It has become a cliché that data is the new oil. change it substantially. This is “Hamlet” without the prince.

GDPR 120
article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

When you boil it down, what do those three things have in common? Those are choices. Money is not peace of mind. Money’s not happiness. Money is, at its essence, that measure of a man’s choices. This is part of the opening monologue of the Ozark series and when I first heard it, I immediately stopped the show and dropped it into this blog post.

Education 111