Remove Education Remove Presentation Remove Security Remove Study
article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

article thumbnail

GUEST ESSAY: Now more than ever, companies need to proactively promote family Online Safety

The Last Watchdog

In response to continuing waves of data breaches and network disruptions, companies have made a concerted effort and poured substantial resources into promoting data security awareness among employees, suppliers and clients. Cybersecurity education for kids is therefore a smart investment. Tools and approaches. Offer employee perks?

Education 203
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LibTech EdTech – transition, challenges and contradictions

CILIP

CILIP Copyright COnference 2024 By Gary Horrocks THE summer 2023 issue of UKeiG’s open access journal, eLucidate , featured my reflections on the implications of a Members’ Day presentation by Ken Chad on the “library technology ecosystem". Ken notes there is “a dichotomy between the provision of library resources and learning resources.”

article thumbnail

MER 2019 – CALL FOR PRESENTERS

IG Guru

We are looking for presentations on solutions to the IG challenges created by new and emerging technologies, the latest legal and regulatory developments that affect IG programs and professionals, practical advice and guidance on traditional IG challenges, and relevant case studies […].

FOIA 40
article thumbnail

How Jamworks protects confidentiality while integrating AI advantages

IBM Big Data Hub

“AI is driving a revolution in education, accessibility and productivity. For enterprises dealing with sensitive information, it is vital to maintain state-of-the-art data security in order to reap the rewards,” says Stuart Winter, Executive Chairman and Co-Founder at Lacero Platform Limited, Jamworks and Guardian.

Cloud 106
article thumbnail

GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy

The Last Watchdog

The question isn’t whether we should educate children about online safety, but how we can best inspire them to learn to be thoughtful, careful, and safe in the cyber world for their lifetime. Teaching children about good cyber security habits starts with helping them realize their power to learn to make smart choices.

Privacy 203
article thumbnail

How to Get the Most Out of Your E-Learning Programme

IT Governance

Did you know that when presented with new information, we will forget half of it within a day? You can probably attest to this anecdotally, but it also presents major issues in the workplace – particularly when it comes to staff awareness training. Take information security staff awareness for instance.