article thumbnail

Around the World with Thales: Our Upcoming Events

Thales Cloud Protection & Licensing

Around the World with Thales: Our Upcoming Events madhav Thu, 09/28/2023 - 05:01 The summer is long gone, and we are all back to work. However, there will be plenty of opportunity for us all to catch up as the Fall season is bustling with cybersecurity events worldwide. Our event booth number is H25-C70.

article thumbnail

The industry observes OpenText

OpenText Information Management

The first few months of the year have featured a major acquisition, significant technology innovations, new accolades and exciting in-person and virtual events. One important measure of this activity is how we are being discussed and described by the wider industry.

IT 94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News Alert: CybSafe CEO Oz Alashe MBE recognized as “Security Industry Innovator” for 2023

The Last Watchdog

Boston, July 7, 2023 — CybSafe, the human risk management platform, has today announced CEO Oz Alashe MBE has been named as a SecurityInfoWatch.com , Security Business and Security Technology Executive magazines’ 2023 Security Industry Innovator Award winner.

Security 145
article thumbnail

Top 3 Insights I Learned at Recent Cybersecurity Events

Dark Reading

Events like RSA Conference and Infosecurity Europe provide industry collaboration opportunities required to address the evolving cybersecurity threat landscape.

article thumbnail

The Truth About Customer Journey Mapping

Speaker: Dave Seaton, CEO of Seaton CX

Join industry visionary Dave Seaton in this exclusive new webinar as he shares his process for creating compelling customer journey maps using his DARMA method! When crafted with precision and insight, journey maps emerge as powerful catalysts, transforming customer experiences and steering businesses towards profitable growth.

article thumbnail

GUEST ESSAY: Rising global tensions put us a few lines of code away from a significant cyber event

The Last Watchdog

History shows how a small event built on daisy-chained circumstances can kick off a catastrophe, or even a shooting war. Throughout the industry, we can track countless advanced attacks and backdoors to their efforts. We must face the threat that we are only a few lines of code away from a very significant event.

Military 273
article thumbnail

The Conundrum of Events-Based Retention Periods

ARMA International

Again, both can be true at once and no more so than when records are existing within event-based periods. It becomes more difficult when a disposition is based on an event, such as termination of a contract, termination of employment, end of a patent, etc. These generally prescribe specific retention periods.