Data Governance 2.0: The CIO’s Guide to Collaborative Data Governance

erwin

In the data-driven era, CIO’s need a solid understanding of data governance 2.0 … Data governance (DG) is no longer about just compliance or relegated to the confines of IT. Today, data governance needs to be a ubiquitous part of your organization’s culture.

Services Provider to Government Left Database Exposed: Report

Data Breach Today

Researcher Says Exposed Granicus Database Could Have Made Websites Vulnerable One of the largest IT services providers for U.S.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

IT modernization in Government

OpenText Information Management

IT modernization has always been high on the agenda of government CIOs. US Government agencies now have a $500 million fund they can use for their modernization projects following the Modernizing Government Technology Act becoming law.

Government Shutdown: Experts Fear Deep Cybersecurity Impact

Data Breach Today

government shutdown is impacting agencies integral to the nation's cybersecurity readiness, and experts fear its long-term impact on the country's cyberattack response capabilities, as well as the risk that it will drive away desperately needed new cybersecurity talent from entering public service

Metadata Management, Data Governance and Automation

erwin

erwin released its State of Data Governance Report in February 2018, just a few months before the General Data Protection Regulation (GDPR) took effect. Download Free GDPR Guide | Step By Step Guide to Data Governance for GDPR?. Can the 80/20 Rule Be Reversed?

Huawei Accuses US Government of Hack Attacks

Data Breach Today

White House 'Using Every Tool At Its Disposal' to Disrupt Business, Firm Claims The battle between Huawei Technologies and the White House continues to intensify, with the Chinese manufacturing giant accusing the U.S.

Can the Government Buy Its Way Around the Fourth Amendment?

WIRED Threat Level

Immigration authorities are purchasing cell phone location data, and it might be totally legal. . Security Security / Privacy

Singapore Government will run its third bug bounty program

Security Affairs

Singapore has announced the third bug bounty program aimed at assessing the security of government systems exposed online. The government of Singapore has announced its third bug bounty program aimed at assessing the level of security implemented for government systems exposed online.

Information Governance – Still Need It, Always Will

PHIGs

A while ago I was pointed to an article proclaiming that Information Governance is no longer necessary (ROFLMAO). I laughed because I think its grasp on reality is about as firm as that of whoever proclaimed that ECM is dead. information) Governance is needed.

ProtonMail denies that it spies on users for government agencies

Security Affairs

The popular privacy-focused email service ProtonMail made the headlines because it has been accused of supporting real-time surveillance carried out by law enforcement. The company clarified that it does not agree with the interpretation taken by some branches of the Swiss government.

Government Shutdown Hampers Cybersecurity

Adam Levin

Government has impacted federal cybersecurity according to several reports. Cyber Command, the Treasury Department’s IT and computer security incident response–many federal employees are doing so without pay and with minimal or greatly diminished support. “[A]

City of Albany Latest Local Government Hit With Ransomware

Data Breach Today

Attack Comes After Others That Targeted Counties Albany, New York, is the latest unit of local government hit with ransomware in recent weeks, following similar attacks reported in Georgia and North Carolina that crippled government IT systems and disrupted service for local residents

Business Process Can Make or Break Data Governance

erwin

Data governance isn’t a one-off project with a defined endpoint. It’s an on-going initiative that requires active engagement from executives and business leaders. Data governance success hinges on business process modeling and enterprise architecture.

Data Governance Makes Data Security Less Scary

erwin

Who has had access to it? percent of its global annual revenue, because 330 million hotel guests were affected by a breach in 2018. The Regulatory Rationale for Integrating Data Management & Data Governance. What data do we have and where is it? Happy Halloween!

Governance?

InfoGovNuggets

Who governs access to the White House? How do they do it? In the absence of a written rule, who governs what behavior is permitted in a press briefing within the White House? Access Controls Culture Duty Governance Government Internal controls Third parties Who is in charge The Executive or the Judiciary? “Judge Grants CNN’s Press-Pass Motion,” The Wall Street Journal , November 17, 2018 A3.

Documentation Theory for Information Governance

ARMA International

iv] Further, “the practices of government [and other public and private institutions] become formal or official to the extent that they are documented.” [v] Information is treated as though it is indifferent to its documentation.

Top 10 Data Governance Trends for 2020: Data’s Real Value Comes Into Focus

erwin

Understanding the data governance trends for the year ahead will give business leaders and data professionals a competitive edge … Happy New Year! Regulatory compliance and data breaches have driven the data governance narrative during the past few years.

Our Data Governance Is Broken. Let’s Reinvent It.

John Battelle's Searchblog

When it comes to many of the things I am going to talk about here, I am not an expert. If I am expert at anything at all, it’s asking questions of technology, and of the media and marketing platforms created by technology. It’s Broke. Let’s Fix It. But Governance?

ObliqueRAT, a new malware employed in attacks on government targets in Southeast Asia

Security Affairs

Experts from Cisco Talos discovered a new malware, tracked as ObliqueRAT, that appears a custom malware developed by a threat actor focused on government and diplomatic targets. . “CrimsonRAT has been known to target diplomatic and government organizations in Southeast Asia.”

Essential guidance to implementing an effective IT Governance system

IT Governance

Faced with these increasing information security threats, organisations have an urgent need to adopt IT governance best practice strategies. What is IT governance? Drivers for adopting IT governance strategies.

Texas Government Agencies Hit by Ransomware

Adam Levin

The local governments and agencies from twenty-three Texas towns were hit by a coordinated ransomware campaign last week. . Although the DIR has released few details about the ransomware campaign, they did confirm that it originated from a single “threat actor.”

Welcoming the Norwegian Government to HIBP

Troy Hunt

Over the last couple of years, I've been increasingly providing governments with better access to their departments' data exposed in breaches by giving them free and unfettered API access to their domains.

Singapore Updates Its Model Artificial Intelligence Governance Framework

Data Protection Report

On 21 January 2020 at a meeting at the World Economic Forum, the Personal Data Protection Commission ( PDPC ) and Infocommunications Media Development Authority ( IMDA ) released the second edition of its Model Artificial Intelligence (“ AI” ) Governance Framework (“ Model Framework” ). It is not legally binding. Consequently, it can be adopted across all industries and businesses, regardless of the specific AI solution or technology involved.

5 Ways Data Modeling Is Critical to Data Governance

erwin

Then there’s unstructured data with no contextual framework to govern data flows across the enterprise not to mention time-consuming manual data preparation and limited views of data lineage. And the good news is that it just keeps getting better.

Data Governance Is Dead — Meetings And Spreadsheets Killed It

IG Guru

Stan Christiaens Mar 26, 2018, 08:00am CommunityVoice Forbes Technology Council We all know that data governance has perception issues (to put it mildly). True data governance is the control and enablement of any and all data management activities.

Are You Ever Finished With Information Governance?

Weissman's World

But a recent conversation with one of them raised a very interesting question: Is it possible for an organization to ever be finished? The post Are You Ever Finished With Information Governance? governance maturity infogov information governance information management

Ransomware at IT Services Provider Synoptek

Krebs on Security

Synoptek , a California business that provides cloud hosting and IT management services to more than a thousand customer nationwide, suffered a ransomware attack this week that has disrupted operations for many of its clients, according to sources.

Using Strategic Data Governance to Manage GDPR/CCPA Complexity

erwin

In light of recent, high-profile data breaches, it’s past-time we re-examined strategic data governance and its role in managing regulatory requirements. While not the first , it is the largest penalty levied since the GDPR went into effect in May 2018.

GDPR 111

Insights from information governance practitioners

OpenText Information Management

It’s no secret that “real world” needs and implementations are often very different than hypothetical, “perfect world” simulations. Information governance … The post Insights from information governance practitioners appeared first on OpenText Blogs.

Why Information Architecture is VITAL to Information Governance

Weissman's World

Our very own Kevin Parker has written another stellar piece on the importance of information architecture to information governance. You can read it in ARMA’s Information Management Magazine – and if you want to learn more, register for Kevin’s ARMA iMasters Webinar on February 27.

It’s Way Too Easy to Get a.gov Domain Name

Krebs on Security

federal government domain names, or else assume there are at least more stringent verification requirements involved in obtaining a.gov domain versus a commercial one ending in.com or.org. Then you either mail or fax it in. WHO WANTS TO BE A GOVERNMENT?

IT 285

What’s the Current State of Data Governance and Automation?

erwin

I’m excited to share the results of our new study with Dataversity that examines how data governance attitudes and practices continue to evolve. Defining Data Governance: What Is Data Governance? . 1 reason to implement data governance.

Data Governance Framework: Three Steps to Successful & Sustainable Implementation

erwin

A strong data governance framework is central to the success of any data-driven organization because it ensures this valuable asset is properly maintained, protected and maximized. With this in mind, here are three steps we recommend for implementing a data governance framework.

Solve fundamental IT issues within your business

IT Governance

As a framework in your business, governing your IT effectively helps ensure your organisation’s IT infrastructure supports and enables the corporate strategies and objectives. Find out more >> Due care is not always taken with IT and information.

IT 97

Governance in Healthcare: Seen as a Business Capability

Perficient Data & Analytics

Related to the trend of recognizing the difference between information and data, content, and knowledge is that governance of information requires it be viewed as a business capability. However, governance and tight collaboration between IT and the business continues to be critical.

Experts: Breach at IT Outsourcing Giant Wipro

Krebs on Security

Indian information technology (IT) outsourcing and consulting giant Wipro Ltd. [ NYSE:WIT ] is investigating reports that its own IT systems have been hacked and are being used to launch attacks against some of the company’s customers, multiple sources tell KrebsOnSecurity.

IT 285

Hybrid IT tactics and techniques

DXC Technology

As companies embrace hybrid IT, they must address both technology and the human side of change. There are several key actions to take: Staff and train differently: As applications move from traditional platforms to the cloud, current IT staff needs to be trained and re-skilled. Cloud DevOps Digital Transformation Platform AI automation cloud cloudops governance hybrid IT shadow IT talent

IT 74