How to succeed in a career in data governance

Information Management Resources

If you want to transition to a data governance career, it's possible to do so and embark on a path that leads to lasting satisfaction and success. Career moves Data governance Data Scientist Career planning

How to: Find and Clean out Your Dark Data with everteam.discover

Everteam

We talk a lot about how you need to get control of the dark data spread across disconnected silos in your company. Now let’s show you how you can do with our tools; in this case, with everteam.discover. Everteam.discover is our file analytics product, and it’s very easy to use.

How to write a good data governance policy

Information Management Resources

As with all things data governance, I don't think that there is such a thing as a standard approach, and there certainly is not one for a data governance policy. Data governance Data management Data strategy

How to become an ethical hacking master

IT Governance

Does the idea of being paid to hack into organisations’ systems sound appealing? The pay is good, it’s creative and you get to test your skills every day. You can implement all the defences you like, but you won’t know whether they work or not until someone tries to get past them.

GDPR Data Subject Access Requests: How to Respond

IT Governance

The EU GDPR (General Data Protection Regulation) grants data subjects the right to access their personal data. Subject access requests are not new, but the GDPR introduced several changes that make responding to them more challenging. 1) You can’t charge a fee to comply.

How to handle a ransomware attack

IT Governance

So, your computer screen has been hijacked by criminals who are demanding money to return your systems. That’s a question more organisations are having to ask themselves nowadays, with at least 55 ransomware attacks reported in the first half of 2019. How are they supposed to do work?

How to create a data governance program that works

Information Management Resources

These 11 steps can help IT executives create an effective program to ensure high-quality information supports their decision-making needs. Data governance Data ownership Data quality

How to Get Rich and Be Super Creepy

Adam Levin

FaceApp allows users to tap into the power of artificial intelligence to see what they might look like with a perfect Hollywood smile, different hair, no hair, facial hair, or, alternately, as a much older version of themselves. There Ought to Be A Law.

How to prepare for the California Consumer Privacy Act

Thales eSecurity

state to pass its own data privacy law. A key variation with GDPR is the word “household” which adds more complexity to the implementation of the Act. Similar to GDPR, the CCPA excludes from its scope information that is publicly available. Looking into to the future.

How to Create an Effective Cybersecurity Routine

IG Guru

by James Daily When it comes to your business security and company safety, there’s currently nothing more important than cybersecurity. However, it’s not impossible to stay safe from cyber-attacks and protect your confidential data […].

How to: Setting Up Exceptions for Information Policies in everteam.policy

Everteam

Then you’ve got some work to do. Let’s have a look at how to set up exceptions for information policies. For this article, we will focus on retention rules for multiple jurisdictions, but keep in mind this applies to any type of information policies and its rules.

How to make sure your cyber insurance policy pays out

IT Governance

With the ever-present danger of data breaches and cyber attacks, organisations must be sure that they have the financial backing to respond appropriately. Most policies include provisions requiring organisations to follow certain information security best practices.

How to Master Slack eDiscovery & Information Governance in 3 easy steps

Hanzo Learning Center

ediscovery information governance Slack discovery legal hold spoliation Hanzo Hold enterprise Slack infogov record retention defensible deletionSlack is huge, showing a massive growth rate since its launch—and it’s a huge ediscovery problem.

How to detect a data breach

IT Governance

Having systems in place to help identify and contain breaches promptly should be a priority for all management teams. Organisations must also deploy modern breach detection tools, and keep as up to date as possible with the constantly evolving threat landscape. The need for speed.

How to recover from a cyber attack

IT Governance

One in three UK organisations fell victim to a cyber attack in 2018, costing £17.8 Your first – obviously valid – thought might be that we all need to get better at preventing security incidents, but it’s not the whole story. See also: How to handle a ransomware attack.

How to benefit from cutting edge AI technologies

DXC Technology

In contrast to the popular belief that technologies such as AI are going to leave skilled and unskilled workers high and dry, recent research into the effects of automation indicate it can lead to increased demand, creating new job opportunities. Analytics Robotics Uncategorized artificial intelligence Data Governance

How to Automate Classification Without Losing Control

Everteam

This blog addresses ways to balance velocity, accuracy, and control to achieve the optimum outcome. Many people will often select rules-based classification because they feel it gives them control of how content is classified. Interested in seeing how it works?

How to improve your cyber resilience

IT Governance

It’s not as simple as finding off-the-shelf tools to plug into your organisation. Rather, you must tailor your approach to your needs, assessing the way any one solution affects the whole. Cyber resilience is the ability to prepare for, respond to and recover from cyber attacks.

Jesse Wilkins of AIIM provides advice on how to handle records when an employee leaves

IG Guru

The post Jesse Wilkins of AIIM provides advice on how to handle records when an employee leaves appeared first on IG GURU. AIIM IG News Information Governance information security Records Management Risk News Employee Separation Jesse Wilkins

How to create a risk assessment matrix

IT Governance

To comply with ISO 27001 , the international standard for information security, you need to know how to perform a risk assessment. This process is at the core of your compliance measures, as it helps you identify the threats you face and the controls you need to implement.

Risk 79

How to Build a Winning Data Platform

Perficient Data & Analytics

What is interesting is that Informatica, known for their products delivering the “Switzerland of Data”, is now using AI capabilities to enhance their own suite of products with CLAIRE capabilities. However, to get there, you need the basics of data platform foundation.

How to write a disaster recovery plan

IT Governance

All organisations experience disruptions, whether that’s from a cyber attack, IT failure, weather event or something else, and they need to be prepared. The longer it takes to address an issue, the more the costs will spiral and the harder it will be to recover.

Using Strategic Data Governance to Manage GDPR/CCPA Complexity

erwin

In light of recent, high-profile data breaches, it’s past-time we re-examined strategic data governance and its role in managing regulatory requirements. It’s not easy to design and deploy compliance in an environment that’s not well understood and difficult in which to maneuver.

GDPR 100

How to build a cyber incident response team

IT Governance

Having a cyber incident response team ready to go can save your organisation from disaster. Crooks are constantly poised to exploit vulnerabilities and employees use complex IT systems where mistakes are bound to happen. How to assemble the team. How to get started?

How To 101

Best practices for building an information governance program that will last

Information Management Resources

For this Q&A with Aaron Bryant, I asked about the signs that an IG program is in trouble, what the keys to success are, and how to overcome the obstacles to that success. Data governance Data management Data strategy

How to Go Paperless in Your Home Office

IG Guru

Here’s how to save your tax records digitally so you can get rid of the paper in your home office. The post How to Go Paperless in Your Home Office appeared first on IG GURU.

Paper 52

How to conduct an ISO 27001 internal audit

IT Governance

To maintain ISO 27001 compliance, your organisation needs to conduct regular internal audits. These tests check that your ISMS (information security management system) still covers the necessary requirements and help you look for ways to develop your framework.

How to Dominate the Domains of the NEW CIP - D4: Automating Governance and Compliance

AIIM

Welcome back to this continuing series on the updated Certified Information Professional (CIP) exam. In this post, I'll be focusing on Domain 4, Automating Governance and Compliance. You can also refer back to the posts for Domain 1, Creating and Capturing Information , Domain 2, Extracting Intelligence from Information , and Domain 3, Digitalizing Core Business Processes. In addition, they aren't trained to do these types of tasks.

Business Process Modeling Use Cases and Definition

erwin

A visual representation of what your business does and how it does it. According to Gartner , BPM links business strategy to IT systems development to ensure business value. The Regulatory Rationale for Integrating Data Management & Data Governance.

How to write a business continuity plan: the easy way

IT Governance

The threat of disruption looms over organisations more ominously than ever, thanks to the increasing infiltration of technology in business processes, consumer expectations and the rapid rise in cyber crime. In this blog, we explain how a BCP works, what it covers and how to create one.

Data Center Power Demands Are Fueling Environmental Emissions; Here’s How to End the Spiral

InfoGoTo

The world demand for computing power seems to be insatiable, and billions of smartphones and internet of things devices have fueled the need for increased capacity of the back-end cloud data centers that serve them. Some data centers are even being built to run on 100% renewable energy.

How to claim compensation for a data protection breach

IT Governance

Organisations need to be much clearer about what information they’re processing, what it’s being used for and how data subjects can review and request changes to their data. You might therefore prefer to make a claim directly.

How to create an ISO 27001-compliant risk treatment plan

IT Governance

An RTP (risk treatment plan) is an essential part of an organisation’s ISO 27001 implementation process, as it documents the way your organisation will respond to identified threats. This response is appropriate if the risk is too big to manage with a security control.

Risk 69

How to infuse automation with data governance to thrive in a regulated world

IBM Big Data Hub

IIRA is an AI-powered regulatory on-ramp which helps businesses comply with a variety of regulations, and is available as an add-on to IBM Cloud Private for Data (ICP for Data

Cloud 78

How to Model Risk in an Apex Predator Cyber-World

Threatpost

Critical Infrastructure Government Hacks InfoSec Insider advanced threat actors apex predators apt chronicle security corporate risk corporate security frequency open fair probability risk risk assessment risk modeling

Risk 74

How to create a business continuity plan – with free template

IT Governance

Comprehensive BCM (business continuity management) measures are essential for responding effectively to a disruption and providing a minimum acceptable service during a disaster. Details of how and when the BCP will be invoked.

How to Determine the Feasibility of Digital Archives Projects

IG Guru

With each new experience, I have gathered a series of questions, an aide-mémoire, to be explored before commencing a digital initiative. The post How to Determine the Feasibility of Digital Archives Projects appeared first on IG GURU.

How to document your information security policy

IT Governance

With cyber security affecting businesses worldwide, it is important that all organisations have a policy in place to state and record their commitment to protecting the information that they handle. The board and management have to be completely behind and committed to the ISMS.

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security, with growing demand for experts promising increased salaries and job opportunities. How much experience do you need? You should try to take an internship or volunteer, but we understand this isn’t always possible.

Tips 78

Data Governance Framework: Three Steps to Successful & Sustainable Implementation

erwin

A strong data governance framework is central to the success of any data-driven organization because it ensures this valuable asset is properly maintained, protected and maximized. With this in mind, here are three steps we recommend for implementing a data governance framework.