How to: Find and Clean out Your Dark Data with


We talk a lot about how you need to get control of the dark data spread across disconnected silos in your company. Now let’s show you how you can do with our tools; in this case, with is our file analytics product, and it’s very easy to use.

ROT 80

How to Improve Governance, Risk and Compliance

eSecurity Planet

VIDEO: Alissa Johnson, CISO at Xerox and former Deputy CIO at the White House, outlines compliance steps that could help all enterprises

How to use a lean approach to data governance

Information Management Resources

Getting a data governance initiative started can be extremely challenging. Data strategy Data management Data governanceThis is especially true if you work in an unstructured manner.

How to leverage data governance to boost customer retention

Information Management Resources

Data governance helps remove uncertainties about how to handle customer data or why businesses need the information at all. Data strategy Data governance Customer experience

How to succeed in a career in data governance

Information Management Resources

If you want to transition to a data governance career, it's possible to do so and embark on a path that leads to lasting satisfaction and success. Career moves Data governance Data Scientist Career planning

How to handle a ransomware attack

IT Governance

So, your computer screen has been hijacked by criminals who are demanding money to return your systems. That’s a question more organisations are having to ask themselves nowadays, with at least 55 ransomware attacks reported in the first half of 2019. How are they supposed to do work?

How to write a good data governance policy

Information Management Resources

As with all things data governance, I don't think that there is such a thing as a standard approach, and there certainly is not one for a data governance policy. Data governance Data management Data strategy

How to detect a data breach

IT Governance

Having systems in place to help identify and contain breaches promptly should be a priority for all management teams. Organisations must also deploy modern breach detection tools, and keep as up to date as possible with the constantly evolving threat landscape. The need for speed.

How to Create an Effective Cybersecurity Routine

IG Guru

by James Daily When it comes to your business security and company safety, there’s currently nothing more important than cybersecurity. However, it’s not impossible to stay safe from cyber-attacks and protect your confidential data […].

How to prepare for the California Consumer Privacy Act

Thales eSecurity

state to pass its own data privacy law. A key variation with GDPR is the word “household” which adds more complexity to the implementation of the Act. Similar to GDPR, the CCPA excludes from its scope information that is publicly available. Looking into to the future.

How to improve your cyber resilience

IT Governance

It’s not as simple as finding off-the-shelf tools to plug into your organisation. Rather, you must tailor your approach to your needs, assessing the way any one solution affects the whole. Cyber resilience is the ability to prepare for, respond to and recover from cyber attacks.

Risk 89

How to write a disaster recovery plan

IT Governance

All organisations experience disruptions, whether that’s from a cyber attack, IT failure, weather event or something else, and they need to be prepared. The longer it takes to address an issue, the more the costs will spiral and the harder it will be to recover.

How to create a risk assessment matrix

IT Governance

To comply with ISO 27001 , the international standard for information security, you need to know how to perform a risk assessment. This process is at the core of your compliance measures, as it helps you identify the threats you face and the controls you need to implement.

Risk 84

How to recover from a cyber attack

IT Governance

One in three UK organisations fell victim to a cyber attack in 2018, costing £17.8 Your first – obviously valid – thought might be that we all need to get better at preventing security incidents, but it’s not the whole story. See also: How to handle a ransomware attack.

How to: Setting Up Exceptions for Information Policies in everteam.policy


Then you’ve got some work to do. Let’s have a look at how to set up exceptions for information policies. For this article, we will focus on retention rules for multiple jurisdictions, but keep in mind this applies to any type of information policies and its rules.

How to make sure your cyber insurance policy pays out

IT Governance

With the ever-present danger of data breaches and cyber attacks, organisations must be sure that they have the financial backing to respond appropriately. Most policies include provisions requiring organisations to follow certain information security best practices.

GDPR Data Subject Access Requests: How to Respond

IT Governance

The EU GDPR (General Data Protection Regulation) grants data subjects the right to access their personal data. Subject access requests are not new, but the GDPR introduced several changes that make responding to them more challenging. 1) You can’t charge a fee to comply.

How to benefit from cutting edge AI technologies

DXC Technology

In contrast to the popular belief that technologies such as AI are going to leave skilled and unskilled workers high and dry, recent research into the effects of automation indicate it can lead to increased demand, creating new job opportunities. Analytics Robotics Uncategorized artificial intelligence Data Governance

How to Master Slack eDiscovery & Information Governance in 3 easy steps

Hanzo Learning Center

ediscovery information governance Slack discovery legal hold spoliation Hanzo Hold enterprise Slack infogov record retention defensible deletionSlack is huge, showing a massive growth rate since its launch—and it’s a huge ediscovery problem.

How to Get Rich and Be Super Creepy

Adam Levin

FaceApp allows users to tap into the power of artificial intelligence to see what they might look like with a perfect Hollywood smile, different hair, no hair, facial hair, or, alternately, as a much older version of themselves. There Ought to Be A Law.

How to build a cyber incident response team

IT Governance

Having a cyber incident response team ready to go can save your organisation from disaster. Crooks are constantly poised to exploit vulnerabilities and employees use complex IT systems where mistakes are bound to happen. How to assemble the team. How to get started?

Paper 106

Metadata Management, Data Governance and Automation


erwin released its State of Data Governance Report in February 2018, just a few months before the General Data Protection Regulation (GDPR) took effect. Download Free GDPR Guide | Step By Step Guide to Data Governance for GDPR?. How to automate data mapping.

How to Prepare for the Brazil Data Protection Law


With the new August 2020 effective date of the Brazil data protection law moving ever closer, organizations subject to its requirements may want to implement changes now, so they will be fully ready.

B2B 56

How to Build a Winning Data Platform

Perficient Data & Analytics

What is interesting is that Informatica, known for their products delivering the “Switzerland of Data”, is now using AI capabilities to enhance their own suite of products with CLAIRE capabilities. However, to get there, you need the basics of data platform foundation.

How to document the scope of your ISMS

IT Governance

If you’re planning to implement an ISMS (information security management system), you’ll need to document the scope of your project – or, in other words, define what information needs to be protected. There are three steps to defining the scope of your ISMS.

How to Automate Classification Without Losing Control


This blog addresses ways to balance velocity, accuracy, and control to achieve the optimum outcome. Many people will often select rules-based classification because they feel it gives them control of how content is classified. Interested in seeing how it works?

How to Model Risk in an Apex Predator Cyber-World


Critical Infrastructure Government Hacks InfoSec Insider advanced threat actors apex predators apt chronicle security corporate risk corporate security frequency open fair probability risk risk assessment risk modeling

Risk 104

How to Ensure Your Digital Security During the Rugby World Cup

Thales eSecurity

Now that it’s September, the excitement is beginning to build in earnest for the 2019 Rugby World Cup. Sports fans aren’t the only ones who are looking forward to this event. We urge you to take precautions to protect your personal information when you are on the Internet.

IoT 112

How to write a business continuity plan: the easy way

IT Governance

The threat of disruption looms over organisations more ominously than ever, thanks to the increasing infiltration of technology in business processes, consumer expectations and the rapid rise in cyber crime. In this blog, we explain how a BCP works, what it covers and how to create one.

Beyond RIM (Webinar 11/21): How to Incorporate Data Privacy into your Enterprise IG Program

IG Guru

The post Beyond RIM (Webinar 11/21): How to Incorporate Data Privacy into your Enterprise IG Program appeared first on IG GURU.


How to document your information security policy

IT Governance

With cyber security affecting businesses worldwide, it is important that all organisations have a policy in place to state and record their commitment to protecting the information that they handle. The board and management have to be completely behind and committed to the ISMS.

How to claim compensation for a data protection breach

IT Governance

Organisations need to be much clearer about what information they’re processing, what it’s being used for and how data subjects can review and request changes to their data. You might therefore prefer to make a claim directly.

GDPR 103

Business Process Modeling Use Cases and Definition


A visual representation of what your business does and how it does it. According to Gartner , BPM links business strategy to IT systems development to ensure business value. The Regulatory Rationale for Integrating Data Management & Data Governance.

How to write an ISO 27001-compliant risk assessment procedure

IT Governance

As part of your ISO 27001 certification project, your organisation will need to prove its compliance with appropriate documentation. There are five simple steps that you should take to conduct a successful risk assessment : Establish a risk management framework.

Risk 52

How to Go Paperless in Your Home Office

IG Guru

Here’s how to save your tax records digitally so you can get rid of the paper in your home office. The post How to Go Paperless in Your Home Office appeared first on IG GURU.

Paper 52

How to become a certified DPO

IT Governance

The EU GDPR (General Data Protection Regulation) requires certain organisations to appoint a DPO (data protection officer) to help them comply with the Regulation. The GDPR stipulates that DPOs should have appropriate experience and qualifications to fulfil the role.

How to create an ISO 27001-compliant risk treatment plan

IT Governance

An RTP (risk treatment plan) is an essential part of an organisation’s ISO 27001 implementation process, as it documents the way your organisation will respond to identified threats. This response is appropriate if the risk is too big to manage with a security control.

Risk 77

How to manage records during a corporate move – part 2

TAB OnRecord

In last week’s blog post we started to tackle the massive challenge of managing records during a corporate move. As we learned, there are some essential steps to take before the move begins.

How to create a business continuity plan – with free template

IT Governance

Comprehensive BCM (business continuity management) measures are essential for responding effectively to a disruption and providing a minimum acceptable service during a disaster. Details of how and when the BCP will be invoked.

Using Strategic Data Governance to Manage GDPR/CCPA Complexity


In light of recent, high-profile data breaches, it’s past-time we re-examined strategic data governance and its role in managing regulatory requirements. It’s not easy to design and deploy compliance in an environment that’s not well understood and difficult in which to maneuver.

GDPR 110