Digital Transformation Examples: Three Industries Dominating Digital Transformation


Digital transformation examples can be found almost anywhere, in almost any industry. Amazon began as a disruptor to brick-and-mortar bookstores, eventually becoming one of the most obvious digital transformation examples as it went on to revolutionize online shopping. The following three examples highlight the extent to which digital transformation is reshaping the nature of business and government and how we – as a society – interact with the world.

Blockchain for Identity Management: Early Examples

Data Breach Today

Early experiments are demonstrating how blockchain, the distributed and immutable ledger behind virtual currencies, potentially could play an important role in identity management, says Avivah Litan, a Gartner Research analyst


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

GDPR: lawful bases for processing, with examples

IT Governance

An ‘affirmative act’ means the data subject has to opt-in – you cannot assume their consent, for example by using pre-ticked boxes on your website. The post GDPR: lawful bases for processing, with examples appeared first on IT Governance UK Blog. First published June 2018.


Example Statement of Objectives for a Needs Assessment

National Archives Records Express

As part of our Federal Electronic Records Modernization Initiative (FERMI) , we are working to make it easier for Federal agencies to obtain electronic records management (ERM) services and solutions that will meet their needs.

The Evolution of the Data Team: Lessons Learned From Growing a Team From 3 to 20

Speaker: Mindy Chen, Director of Decision Science, Hudl

In this webinar, we will unpack how data team structures have evolved by drawing on examples from our customers at Snowplow and discussing the pros and cons of the different structures that we have seen. We will be joined by Mindy Chen, Director of Decision Science at Hudl, who will take us on a journey through the challenges and opportunities during her experience of growing her data team from 3 to 20.

5 ways to detect a phishing email – with examples

IT Governance

In this blog, we use real-life examples to demonstrate five clues to help you spot phishing scams. For example, emails from Google will read ‘’. Take this example of a scam mimicking PayPal: Image: WeLiveSecurity. In this scam, the ethical hacker, Daniel Boteanu, could see when the link was clicked, and in one example that it had been opened multiple times on different devices. Take this example of a scam imitating Windows: Image: KnowBe4.

Another example of email misuse

IT Governance

Another week, another example of an email using the Cc (carbon copy) field instead of the Bcc (blind carbon copy) field. This time, it was West Ham United Football Club. . The email was sent to a group of supporters regarding ticket allocations for an away football match. . Upon discovering the error, an attempt was made to recall the mass email – but the follow-up email apologising for the error resulted in the email addresses being shared again. . This email read : .

Planning a Bug Bounty Program? Follow Shopify's Example

Dark Reading

Four years, $1 million in payouts, and the identification of 950 bugs later, Shopify provides an excellent example for organizations looking to launch their own programs


Digital Transformation Examples: How Data Is Transforming the Hospitality Industry


The rate at which organizations have adopted data-driven strategies means there are a wealth of digital transformation examples for organizations to draw from. Online start-ups such as Airbnb, HomeAway and Couchsurfing are some of the most clear cut digital transformation examples in the hospitality industry. Digital Transformation Examples: Hospitality – Data, Data Everywhere.

Real-life examples of social engineering ? part 2

IT Governance

Last month, I published an article looking at two examples of the use of social engineering in everyday life. I’d like to continue the theme of that article by talking about three other social engineering attacks that caused great damage. Diamonds, diamonds, DIAMONDS. If you’re planning on stealing USD$27.9 million worth of diamonds, then all you need is some chocolate and a smile. No, seriously.

Testing at Every Stage of Development

Up to 80% of new products fail. The reality is harsh and the reasons why are endless. Perhaps the new product couldn’t oust a customer favorite. Maybe it looked great but was too hard to use. Or, despite being a superior product, the go-to-market strategy failed. There’s always a risk when building a new product, but you can hedge your bets by understanding exactly what your customers' expectations truly are at every step of the development process.

Real-life examples of social engineering

IT Governance

Social engineering is something that we’ve all done, whether we’ve realised it or not. When we were children it’s likely that we played one parent off against the other to get our own way, telling each that the other had said we could do something we couldn’t – like have another packet of crisps. Fast-forward a little bit and you’ll remember telling your teachers that your dog really did eat your homework. For most of us, it stopped there. But only most of us….

IT 48

Anatomy of a spear phishing attack – with example scam

IT Governance

Let’s take a look at how it works, along with an example to help you spot the clues of an attack. An example of a spear phishing email. Here’s an example of a real spear phishing email. All the above are typical examples of emotional manipulation. This 45-minute course uses examples like the one above to explain how phishing emails work, the clues to look for and the steps to take to avoid falling victim.

CIPL Submits Response to the EDPB Guidelines on Examples Regarding Data Breach Notification

Hunton Privacy

On March 2, 2021, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth submitted its response to the European Data Protection Board (“EDPB”) consultation on draft guidelines on examples regarding data breach notification (the “Guidelines”).

From iPhone to NT AUTHORITYSYSTEM – exploit ‘Printconfig’ dll with a real-world example

Security Affairs

From iPhone to NT AUTHORITYSYSTEM – As promised in my previous post , I will show you how to exploit the “Printconfig” dll with a real world example.

GDPR: lawful bases for processing, with examples

IT Governance

For example, when you process staff data for payroll purposes, contractual obligations will apply, as staff will have signed a contract of employment. You don’t yet have a contract with someone, but they’ve asked you to do something as an initial step (for example, provide a quote) and you need to process their personal data to do so. What is a lawful basis for processing under the GDPR? Do you always need individuals’ consent to process their data?


How to write an ISO 22301-compliant business continuity plan – with example template

IT Governance

Below is an example of a customisable business continuity plan template from the bestselling ISO22301 BCMS Documentation Toolkit. Example of the business continuity plan template included in the ISO22301 BCMS Documentation Toolkit, with author comments providing instructions on how to complete the template. ISO 22301 certification requires organisations to demonstrate their compliance with appropriate documentation , including a business continuity plan.

Examples of data processing activities that require a DPIA

IT Governance

The Regulation doesn’t define what ‘high risk’ is, so this blog provides examples of processing activities that require a DPIA. Before we crack on with our examples, we should explain how you can identify high-risk data processing activities. For example, organisations might monitor an employee’s browsing habits to make sure they aren’t using the Internet for illicit purposes. Face and iris recognition and fingerprint scans are the most common examples.

Examples of ISO 27001 interested parties and your compliance requirements

IT Governance

Examples of interested parties. For example, a common issue involves the lack of control over the way you manage employees at third parties. For example, employees want clear instructions on how to handle sensitive data, suppliers want achievable contractual agreements, and the media want transparency regarding security incidents. There’s a subtler example of this dichotomy in your relationship with customers. Clause 4.2

B2B CRM Systems: Benefits, Features, and Real Examples


Both B2C and B2B companies need effective customer relationship management systems. However, the content and features of these CRMs will be different, as each business type has its specifics. Thus, Guest Post

B2C 32

Transitioning to a Remote Workforce: A Great Example of Business Resiliency


We have historically focused on efficiency at the expense of resiliency.


How to write a GDPR privacy notice – with documentation template example

IT Governance

Below is an example of a customisable privacy notice template available from IT Governance. Example of IT Governance’s GDPR privacy notice template. The post How to write a GDPR privacy notice – with documentation template example appeared first on IT Governance Blog. Updated 8 November 2018. This blog was originally published before the GDPR took effect in May 2018.


How intelligents 5 Real-Life IoT Examples To Prove Its Soaring Demand


The post How intelligents 5 Real-Life IoT Examples To Prove Its Soaring Demand first appeared on Cllax - Top of IT. If we see the world happier today, smiling all the time, living in the era of technologies that we once thought about in the future, then that’s the magic of.

IoT 26

Hacking on TV: 8 Binge-Worthy and Cringe-Worthy Examples

Dark Reading

From the psycho-drama Mr. Robot to portraying the outright dangers of ransomware taking down a hospital in Grey's Anatomy, hacking themes now run deep in today's TV shows

How to document PCI DSS-compliant policies and procedures – with template example

IT Governance

Misconfigured databases, email attachments sent to the wrong person and records that are improperly disposed are common examples the ways staff compromise information. Below is an example of one of the customisable templates in our Documentation Toolkit: It contains all the information you need to ensure PCI DSS compliance; all you need to do is fill in the sections that are relevant to your organisation. Technology can only do so much to protect an organisation from data breaches.

How to write a GDPR privacy notice – with documentation template example

IT Governance

Below is an example of a customisable privacy notice template, available from the market-leading EU GDPR Documentation Toolkit. Example of the privacy notice template included in the EU GDPR Documentation Toolkit. An integral part of your EU General Data Protection Regulation (GDPR) compliance project is producing appropriate documentation, which includes a privacy notice.


Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example


Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example. For example, a supermarket that makes home grocery deliveries has empty vehicles returning from those deliveries. Another example could be cities taking advantage of data from cars, which are becoming an important information hub, to improve planning, traffic and maintenance. Take a modern film, for example.

3 Brilliant Examples of Interactive Digital Marketing and Why They're Compliance Risks

Hanzo Learning Center

Every department in an organization is a potential source of risk that compliance professionals need to understand, measure, and prepare for. Sales and finance departments need to know the regulatory compliance basics and warning signs of bribery, corruption, money laundering, and fraud. IT teams prepare for cybersecurity, phishing, hacking, and other technology-driven risks, and the regulatory and reputational implications of them, on a daily basis.

Meltdown/Spectre: The First Large-Scale Example of a 'Genetic' Threat

Dark Reading

These vulnerabilities mark an evolutionary leap forward, and companies must make fighting back a priority


MicroStrategy World: AI Best Practices and Real-World Examples


Christine Livingston, Chief Strategy for AI at Perficient spoke on AI best practices and gave some real world examples on how it would work. Where are analytics heading? Notice that while you spend a lot of time early on with descriptive reports, the higher up the maturity curve you go, the more you need tools that are a key part of the artificial intelligence continuum. What is AI? Consumer products like Alexa, Cortana, etc. They aren’t intelligent systems.

Here’s an Example of a Phishing Email I Received and What I Did About It: Cybersecurity Best Practices

eDiscovery Daily

The post Here’s an Example of a Phishing Email I Received and What I Did About It: Cybersecurity Best Practices appeared first on CloudNine. When you get an email from your boss asking you to help him with something, your natural tendency is to take it seriously and drop what you’re doing so that you can help. But, if you’re not careful, you could find out that you’re the victim of a phishing email.

Examples of companies who put their intranet on the internet


Here are some more examples, both supermarkets in the UK, who make their employee ''intranet'' accessible (i.e. I''ve previously written about the Royal Mail''s externally accessible staff website (unfortunately, if you are outside the UK they have now geoblocked the content). not behind a login or VPN) over the public Web: Asda Green Room blog. Out Tesco , which also includes information about staff benefits and working at Tesco.

What belongs in a community web archive? New collecting guidelines and examples from Community Webs partners


Even as web archiving becomes more widely practiced, publicly available examples of collection development policies to guide these decisions can be hard to find and adapt for local use. Here are a few examples of the policy documents that Community Webs cohort members developed: DC Public Library’s Web Archiving Policy. by Sylvie Rollason-Cass, Web Archivist for Archive-It. What belongs in a web archive? And what doesn’t?

An Example of Deterrence in Cyberspace

Schneier on Security

In 2016, the US was successfully deterred from attacking Russia in cyberspace because of fears of Russian capabilities against the US. I have two citations for this. The first is from the book Russian Roulette: The Inside Story of Putin's War on America and the Election of Donald Trump , by Michael Isikoff and David Corn. Here's the quote: The principals did discuss cyber responses. The prospect of hitting back with cyber caused trepidation within the deputies and principals meetings.

IT 53

Do you have any examples of where any sort of civic engagement outreach/campaigns affected legislation?


Do you have any examples of where any sort of civic engagement outreach/campaign affected legislation? I’m looking for more granular examples than a response like “the civil rights movement&# , but more so examples of specific petitions or letter writing campaigns that might have contributed to getting some sort of legislation passed. Hey gang- Huge BIG favor that might be really easy for you.

IT 50

Social business is more than adding a social layer: A banking example


For example, another second tier Australian bank is also talking about overhauling their core banking systems. Australia’s big four banks (Commonwealth Bank, Westpac, ANZ and NAB) might well be the most profitable in the developed world, but its all relative in their home markets when they are all jostling for customers. How much is social business playing a part in this competition? It wasn't that long ago that the Australian banking sector was lagging behind the rest of the world.

Pwned Passwords in Practice: Real World Examples of Blocking the Worst Passwords

Troy Hunt

For example, the list MAY include, but is not limited to: Passwords obtained from previous breach corpuses. Like "Nutella", for example! For example, Bittylicious: In February 2018 we integrated with the excellent HaveIBeenPwned service by @troyhunt to protect users from insecure passwords [link] — Bittylicious (@Bittylicious_) May 22, 2018.

Extending intranets to hard-to-reach staff: Controlled documents kiosk example


The IBF list the following examples of hard-to-reach staff: factory workers retail staff field engineers building inspectors consultants sales teams flight and rail workers catering staff building inspectors call centre representatives insurance assessors.

Two Contrarian Thinkers who went Unheeded

Troy Hunt

History Innovation Examples & Lessons contrarian Konrad Kellen Lansdowne letter Lord Lansdowne thinker unheeded Vietnam warLord Lansdowne. Henry Charles Keith Petty-Fitzmaurice (1845 – 1927), the 5th Marquess of Lansdowne, was a distinguished British statesman who held senior positions in both Liberal Party and Conservative Party governments. He had served as the fifth Governor General of Canada, Viceroy of India, Secretary of State for War, and Secretary of State for Foreign Affairs.

The Dark Side of AI: Previewing Criminal Uses

Data Breach Today

Threats Include Social Engineering, Insider Trading, Face-Seeking Assassin Drones "Has anyone witnessed any examples of criminals abusing artificial intelligence?" A new report has identified likely ways in which such attacks might occur and offers examples of threats already emerging