Blockchain for Identity Management: Early Examples

Data Breach Today

Early experiments are demonstrating how blockchain, the distributed and immutable ledger behind virtual currencies, potentially could play an important role in identity management, says Avivah Litan, a Gartner Research analyst

Digital Transformation Examples: How Data Is Transforming the Hospitality Industry

erwin

The rate at which organizations have adopted data-driven strategies means there are a wealth of digital transformation examples for organizations to draw from. Digital Transformation Examples: Hospitality – Data, Data Everywhere.

Another example of email misuse

IT Governance

Another week, another example of an email using the Cc (carbon copy) field instead of the Bcc (blind carbon copy) field. This time, it was West Ham United Football Club. . The email was sent to a group of supporters regarding ticket allocations for an away football match. .

Real-life examples of social engineering

IT Governance

Social engineering is something that we’ve all done, whether we’ve realised it or not. When we were children it’s likely that we played one parent off against the other to get our own way, telling each that the other had said we could do something we couldn’t – like have another packet of crisps.

GDPR: lawful bases for processing, with examples

IT Governance

For example, when you process staff data for payroll purposes, contractual obligations will apply, as staff will have signed a contract of employment. What is a lawful basis for processing under the GDPR? Do you always need individuals’ consent to process their data?

An Example of Deterrence in Cyberspace

Schneier on Security

In 2016, the US was successfully deterred from attacking Russia in cyberspace because of fears of Russian capabilities against the US. I have two citations for this.

MicroStrategy World: AI Best Practices and Real-World Examples

Perficient Data & Analytics

Christine Livingston, Chief Strategy for AI at Perficient spoke on AI best practices and gave some real world examples on how it would work. Where are analytics heading?

How to write an ISO 22301-compliant business continuity plan – with example template

IT Governance

Below is an example of a customisable business continuity plan template from the bestselling ISO22301 BCMS Documentation Toolkit. ISO 22301 certification requires organisations to demonstrate their compliance with appropriate documentation , including a business continuity plan.

How to write a GDPR privacy notice – with documentation template example

IT Governance

Below is an example of a customisable privacy notice template available from IT Governance. Example of IT Governance’s GDPR privacy notice template. The post How to write a GDPR privacy notice – with documentation template example appeared first on IT Governance Blog.

How to write a GDPR privacy notice – with documentation template example

IT Governance

Below is an example of a customisable privacy notice template, available from the market-leading EU GDPR Documentation Toolkit. Example of the privacy notice template included in the EU GDPR Documentation Toolkit.

Pwned Passwords in Practice: Real World Examples of Blocking the Worst Passwords

Troy Hunt

For example, the list MAY include, but is not limited to: Passwords obtained from previous breach corpuses. Like "Nutella", for example! For example, Bittylicious: In February 2018 we integrated with the excellent HaveIBeenPwned service by @troyhunt to protect users from insecure passwords [link] pic.twitter.com/3Z6W99OqMQ — Bittylicious (@Bittylicious_) May 22, 2018.

3 Brilliant Examples of Interactive Digital Marketing and Why They're Compliance Risks

Hanzo Learning Center

Every department in an organization is a potential source of risk that compliance professionals need to understand, measure, and prepare for. Sales and finance departments need to know the regulatory compliance basics and warning signs of bribery, corruption, money laundering, and fraud.

Here’s an Example of a Phishing Email I Received and What I Did About It: Cybersecurity Best Practices

eDiscovery Daily

The post Here’s an Example of a Phishing Email I Received and What I Did About It: Cybersecurity Best Practices appeared first on CloudNine.

Hacking on TV: 8 Binge-Worthy and Cringe-Worthy Examples

Dark Reading

From the psycho-drama Mr. Robot to portraying the outright dangers of ransomware taking down a hospital in Grey's Anatomy, hacking themes now run deep in today's TV shows

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example

CGI

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example. For example, a supermarket that makes home grocery deliveries has empty vehicles returning from those deliveries. Another example could be cities taking advantage of data from cars, which are becoming an important information hub, to improve planning, traffic and maintenance. Take a modern film, for example.

Meltdown/Spectre: The First Large-Scale Example of a 'Genetic' Threat

Dark Reading

These vulnerabilities mark an evolutionary leap forward, and companies must make fighting back a priority

Examples of companies who put their intranet on the internet

ChiefTech

Here are some more examples, both supermarkets in the UK, who make their employee ''intranet'' accessible (i.e. I''ve previously written about the Royal Mail''s externally accessible staff website (unfortunately, if you are outside the UK they have now geoblocked the content). not behind a login or VPN) over the public Web: Asda Green Room blog. Out Tesco , which also includes information about staff benefits and working at Tesco.

Social business is more than adding a social layer: A banking example

ChiefTech

For example, another second tier Australian bank is also talking about overhauling their core banking systems.

Do you have any examples of where any sort of civic engagement outreach/campaigns affected legislation?

Daradiction

Do you have any examples of where any sort of civic engagement outreach/campaign affected legislation? I’m looking for more granular examples than a response like “the civil rights movement&# , but more so examples of specific petitions or letter writing campaigns that might have contributed to getting some sort of legislation passed. Hey gang- Huge BIG favor that might be really easy for you.

Two Contrarian Thinkers who went Unheeded

Troy Hunt

History Innovation Examples & Lessons contrarian Konrad Kellen Lansdowne letter Lord Lansdowne thinker unheeded Vietnam warLord Lansdowne.

Extending intranets to hard-to-reach staff: Controlled documents kiosk example

ChiefTech

The IBF list the following examples of hard-to-reach staff: factory workers retail staff field engineers building inspectors consultants sales teams flight and rail workers catering staff building inspectors call centre representatives insurance assessors.

Artificial Intelligence Is Set to Rewrite the Rules of Insurance

InfoGoTo

For example, Progressive Insurance has handed out more than $700 million in discounts to customers who let the company track where and how they drive. Few industries stand to gain as much by adopting artificial intelligence as insurance.

AI Is Becoming a Trusted Sidekick for Legal and HR Departments

InfoGoTo

For example, starting with a knowledge base of language that is common to problematic contracts, machine learning algorithms can scour millions of similar contracts to find other warning signs that humans might miss.

6 Health IT Conferences in 2019 That Might Actually Be Worth the Trip

InfoGoTo

Why you might want to show up: If you want to learn through real-world examples and bring home actionable information (and hear the CTO of the HHS speak), this might be the conference for you.

A Strategic Storage Plan Lays the Groundwork for Digital Transformation

InfoGoTo

For example, they can identify fields like date, price, SKU numbers and addresses in scanned receipts and load that information into a database.

Machine Learning is Carving the Path toward Digital Transformation

InfoGoTo

For example, geolocation capabilities in smart phones gave rise to ridesharing services, real-time driving directions and contextual marketing. For example, machine learning algorithms can churn through huge volumes of email and organize messages according to content.

Two New Proposed Rules Would Increase Interoperability of Health Information

InfoGoTo

Examples of this include when a healthcare organization or vendor charges fees for exchanging information that make it cost prohibitive or when policies or contract terms are in place that prevent or dissuade the sharing of information.

CMS 63

HR Automation: Making a Strong Business Case

InfoGoTo

A sound business case should discuss: Cost savings — For example, say the out-of-pocket expense for a new hire is $5,000. Return on Investment (ROI) — In our example, there was a $1,000 cost saving per new hire, a $16,000 gain in productivity, and an HR automation investment of $500 per new hire, netting an ROI of $16,500 per new hire. Human resources (HR) professionals have recently been focusing more on the strategic aspect of their job to become better strategic partners.

Business Tax Preparation Made Easier

InfoGoTo

For example, there are now much stricter limits on deducting expenses for meals and entertainment. Preparing business taxes is nobody’s idea of fun, and it’s even more complicated this year, thanks to new tax laws and deduction changes. That means that even if your business tax preparation process was a well-oiled machine in years past, it’s time for a reboot. Here are some tips to make things easier this year, and every year from now on. Know What Has Changed.

Tips 40

Privacy Is Paramount in a Digital Workplace

InfoGoTo

These are just two examples of what IG must handle on a daily basis. For the past several years, one of the biggest challenges many organizations have faced is transitioning to a digital workplace.

This is the old ChiefTech blog.: Internal blogging is just one example of open information sharing inside an organisation

ChiefTech

Sunday, 24 June 2007 Internal blogging is just one example of open information sharing inside an organisation Linking to Seven Reasons for Your Company to Start an Internal Blog on CIO.com , Jack Vinson reflects on a separate discussion about the value of blogging to knowledge management : " In a recent discussion on the ACT-KM discussion list, someone mentioned that blogging is just one means of communication - that it isnt the be-all, end-all of knowledge sharing.

Data Destruction in the Cloud: It’s Complicated

InfoGoTo

For example, if only selected records need to be destroyed, they must be decrypted and re-encrypted with a different key, a task that will likely be left up to the customer. As organizations move more data to the cloud, some are asking a new question about the data lifecycle management process: How do you reliably perform data destruction on storage devices you don’t own?

How Would YOU Describe the Mortgage Lender of the Future?

InfoGoTo

Alternatively, borrowers with more complex situations such as self-employed income or those purchasing a unique property, for example, may require extra personalization from the lender to help them find the best mortgage to fit their specific needs.

Disrupting Call Center Fraud With Voice Biometrics

Data Breach Today

Nuance Communications and Royal Bank of Scotland Share a Case Study Jason Costain of the Royal Bank of Scotland and Brett Beranek of Nuance Communications share a real world example of mitigating fraud with voice biometrics in a call center

Survey Finds Machine Learning is Taking Information Governance by Storm

InfoGoTo

For example, the percentage of organizations using automation to manage non-important content more than quadrupled to 28% from 6% in 2013. Judging by the results of a new survey, machine learning software is rapidly becoming the records manager’s best new friend. The global study of opinions by 195 decision-makers conducted by AIIM found that 81% consider deep learning and machine learning technologies to be key to their future technology and business plans.

Be Aware of Non-Obvious Healthcare Cybersecurity Threats

InfoGoTo

For example, pretty much every healthcare organization has invested in a firewall, anti-virus, and web filtering. Let’s look at a few examples of non-obvious cybersecurity threats many healthcare organizations face. Needless to say, healthcare CIOs and their CISOs are in really challenging positions when it comes to healthcare cybersecurity. However, the good news is that most healthcare organizations are finally getting their hands around the obvious security efforts.

Public Shaming of Companies for Bad Security

Schneier on Security

Troy Hunt makes some good points , with good examples. psychologyofsecurity securityengineering securitypolicies

Medical Practice to Close in Wake of Ransomware Attack

Data Breach Today

Doctors Decide to Retire Rather Than Pay Ransom or Restore Systems A small Michigan medical practice that plans to permanently shut down in the wake of a recent ransomware attack is an example of the devastation that can result from a serious cyberattack

Former Insider Indicted for Criminal HIPAA Violations

Data Breach Today

Latest Rare Example of Prosecutors Pursuing a HIPAA Case A federal grand jury in Pennsylvania has indicted a former patient coordinator on several counts of wrongfully obtaining and disclosing the health information of others.

6 Health IT Conferences in 2019 That Might Actually Be Worth the Trip

InfoGoTo

Why you might want to show up: If you want to learn through real-world examples and bring home actionable information (and hear the CTO of the HHS speak), this might be the conference for you. Love ’em or hate ’em, health IT conferences can do a lot more than just get you out of the office and into some fresh scenery. The right ones can break down your professional silos and update you on industry shifts and trends.