How to implement a GDPR staff awareness training programme

IT Governance

one of the biggest cyber security threats is inside your organisation , there’s never been a better time to ensure your organisation has an effective GDPR staff awareness training programme in place. . How to deliver staff awareness training – seven top tips .

GDPR 82

How to implement a GDPR staff awareness training programme

IT Governance

one of the biggest cyber security threats is inside your organisation , there’s never been a better time to ensure your organisation has an effective GDPR staff awareness training programme in place. . How to deliver staff awareness training – seven top tips .

GDPR 82

3 GDPR compliance tips for small businesses

IT Governance

Managers should get expert training. Depending on how well versed they are in the Regulation’s requirements, managers might benefit from taking a foundation training course that provides a practical demonstration of the implications and legal requirements of the GDPR for organisations.

GDPR 91

Quick Tips on How to Sell Your Data Science Model

Perficient Data & Analytics

During a five-week IBM training program, I learned a few things about how to sell data science models that I’d like to share it with you. Quick Tips for Selling Your Data Science Model. This tip may not apply to you; however, it is imperative.

Getting Certified in Records Management

The Texas Record

The answer is that we don’t – we provide training through classes, workshops, and webinars for which you are given a certificate of completion, but we do not offer something that would be recognized as a professional certification in the field. Tips Training Local Governments State Agencies

4 tips for achieving better ISO 27001 audit results

IT Governance

An ISO 27001-compliant ISMS requires ongoing maintenance and review to meet the Standard’s requirements in clauses 8 and 9. The internal audit is an essential element of this process that must be carried out as described in clause 9.2 of ISO 27001, and should be conducted at planned intervals.

How to start your career in cyber security

IT Governance

In this blog, we provide tips for getting your cyber security career started no matter your background. You should also consider following industry professionals on Twitter, as many of them provide useful tips, engage in debates and answer questions.

FAQ: Who is the custodian of this record?

The Texas Record

For emails, there can be more than two record custodians, and meeting the following criteria will assign more than one person as the custodian of the record: The message qualifies as a record. Tips Local Governments records custodian State Agencies

How to start your career in cyber security

IT Governance

Meeting people and making connections is sometimes essential for getting your foot in the door. Networking websites such as LinkedIn can also be helpful, but face-to-face meetings are much more effective. There has never been a better time to get into cyber security.

The Top 11 Mistakes to Avoid During Engineering Document Management Implementations and Upgrades, Part 1

Synergis Software

Stay tuned for Part 2, where we’ll cover the final 6 tips for a successful implementation. In order to determine the right amount of user licenses, we recommend scheduling a focused meeting with an Adept expert to thoroughly review the different types of users you have, the level of access each type requires, and the frequency of access needed. Cutting back on implementation onsite training days to “save money”.

Building the Relationship Between RM and IT

The Texas Record

The meeting was instructive, not only because of the technical help IT afforded, but also because it truly revealed a whole set of concerns and consideration IT faced that had an impact on RM decisions. Training staff on Archie meant that IT was often asked “How should I classify….”

Guest Blog: Kay Steed, State Agency RMO

The Texas Record

We have trained Records Coordinators in each division. And we have regular live training classes in records management. We also have plans to develop short videos for Records Management training, as well as continue with our live training.

To Bucket or Not to Bucket…?

The Texas Record

My first experience with bucketing was a few years ago during a presentation by Susan Cisco (from the Gimmal Group) at our local chapter ARMA meeting. With fewer record series, it becomes easier to train staff on how to understand and use the retention schedule. Tips big buckets Information Governance Local Governments records management officer Retention retention schedule development RMO State Agencies

User Conference Attendees Learn How to Maximize their DocuWare Experience

Document Imaging Report

With 200+ attendees, multi-level training sessions, two education-packed days, networking, an Ask the Expert desk open throughout the conference, panel discussions and one-on-one time with valued sponsors such as Objectif Lune, ancora Software, Inc.,

The 5 biggest ransomware pay-outs of all time

IT Governance

US local government has fast become one of the most popular targets for ransomware attacks, because they’ve proved more than willing to meet cyber criminals’ demands. After sitting on infected devices for three weeks, the Riviera Beach City Council agreedto meet the criminals’ demands.

How to create documentation to comply with the DSP Toolkit

IT Governance

Data Security Standard 3: Training. Top tips for producing DSP Toolkit documentation. Blank meeting templates.

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Mike Jordan, senior director of the Shared Assessments Program, a Santa Fe, NM-based intel-sharing and training consortium focused on third-party risks, points out that at least one of the banks that had data exposed in this latest huge data leak wasn’t even a customer of the allegedly culpable contractor. Members gain access to third-party IT security risk management best practices via case studies, surveys, whitepapers, webinars, meetings and conferences.

Risk 125

3 Steps to Take Care of Before Migrating to a Cloud-Based Document Management System

OneHub

There’s a service out there that’s sure to meet your needs. Here are a few tips. And when it comes to property deeds, meeting minutes, budgets, financial statements, and audit reports, these should be kept indefinitely. You’ll need to train and reassure everyone affected.

#ModernDataMasters: Nicola Askham, The Data Governance Coach

Reltio

Nicola Askham is the leading data governance training provider in the UK with over 16 years of experience and research in the field. She delivers training and consulting to major organisations to help them implement full data governance frameworks. Kate Tickner, Reltio.

Working Internationally for Libraries: How to write effective grant proposals

CILIP

Just to give you an example: a chat with a delegate over lunch time turned to be a golden opportunity for me, that led me to meet a professional I admire and I had only watched on YouTube speaking at the Library of Congress before!

#ModernDataMasters: Carl Smith, PZ Cussons

Reltio

For example, I did some systems training in the supply-chain area early in my career at Office Depot. I was taught how to press a button, but I needed to understand the “why” behind the processes we were being trained to follow. Kate Tickner, Reltio.

MDM 56

NARA’s Past, Present, and Future Leadership in SNAC (Social Networks and Archival Context): Always Collaborating, Always Cooperating

Archives Blogs

Make sure to follow for all the latest information about SNAC and to learn helpful tips on using it. If you attend the SAA meeting in Austin, Texas, this coming August, make sure to look for the SNAC information station in the SAA registration area.

Archive-It Partner News, March 2018

Archive-It

Save the Date: Archive-It’s Annual Partner Meeting. Internet Archive staff, Archive-It partners, and friends will meet at ARCHIVES*RECORDS 2018 , the joint annual meeting of CoSA, NAGARA, and SAA in Washington, DC. Tech and Training. Advanced training.

Treating cybersecurity like workplace safety

CGI

When I worked with a major global chemical manufacturer, every meeting began with a PowerPoint presentation on safety, highlighting the importance of the topic. Heaven help the person whose power cord was stretched across the pathway where someone could trip and fall in one of those meetings.

Archive-It Partner News, January 2018

Archive-It

To catch up on the web archiving discussions at meetings and conferences from coast to coast, check out the summary blog post: Notes from the field: Fall/Winter 2017. Tech and Training. Have your say: Web archiving training needs. Recorded and upcoming advanced training.

The Relationship Between AI And Cybersecurity

Cyber Info Veritas

For instance, by collecting this behavioral data, Facebook, Amazon, and Google can offer their users tips and strategies on how to keep their data safe. As our use of computers and the internet increases, cyber threats also increase.

Atos says they are winning the war on email, using Bluekiwi

ChiefTech

Atos hope to be email-free internally by the end of 2013 and may start to target other issues, like unproductive meetings and the mis-use of PowerPoint. I'm also reminded of the 70-20-10 workplace learning model , with Atos describing the typical working day of an Atos employee as being "divided between training, working creatively and collaboratively.". Hat tip Paul Wallbank Back in 2011 lots of people were skeptical about Atos CEO, Thierry Breton, and his war on email.

IT 63

Social Networks and Archival Context (SNAC), Phase II (November 2017-October 2019)

Archives Blogs

During this new phase, SNAC will welcome additional members as the cooperative builds the capacity to ingest new sets of data and train editors. A major focus will be on expanding capacity in training editors and ingesting new batches of data.

Treating cybersecurity like workplace safety

CGI

When I worked with a major global chemical manufacturer, every meeting began with a PowerPoint presentation on safety, highlighting the importance of the topic. Heaven help the person whose power cord was stretched across the pathway where someone could trip and fall in one of those meetings. Tips to prioritize cybersecurity. Treating cybersecurity like workplace safety. pallavi.m@cgi.com. Tue, 05/15/2018 - 04:16.

Treating cybersecurity like workplace safety

CGI

When I worked with a major global chemical manufacturer, every meeting began with a PowerPoint presentation on safety, highlighting the importance of the topic. Heaven help the person whose power cord was stretched across the pathway where someone could trip and fall in one of those meetings. Tips to prioritize cybersecurity. Treating cybersecurity like workplace safety. pallavi.m@cgi.com. Thu, 04/19/2018 - 02:18.

Preparing for a PCI audit

IT Governance

Follow the suggestions below to maximise your chances of meeting your compliance requirements. Instead, compliance is determined by whether cardholder data is kept secure by meeting all of the requirements, all of the time.

Einstein, Lightning & More in the Sales Cloud Summer ’18 Release

Perficient Data & Analytics

This gives management the insight to know if they are going to hit their target, and if not, what course corrections need to be taken so that they can meet their goals and objectives. Guidance and Tips Support Reps Along the Way.

Sales 52

ARTICLE 29 WORKING PARTY GUIDANCE – DATA BREACH NOTIFICATIONS

DLA Piper Privacy Matters

state of the art threat detection and data loss prevention applications); appropriately trained staff who know how to recognise a threat and how to respond; clear procedures and policies to ensure prompt and consistent risk assessments can be made to allow controllers to notify supervisory authorities and regulators where required, plus regular training and effective governance.

GDPR 40

White collar productivity

MIKE 2.0

We spend a lot of time training blue collar workers how to do individual tasks in the safest and most and productive way. We’re already seeing tips pop-up based on the tasks that we’re trying to do. To illustrate, most of us have tools that include the capability to block-out time to protect time from distraction, alerts for meetings added in the distant future that are time wasters and the ability to delegate tasks.

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

Last week I tweeted about drafting up this post and I had a number of people contact me with their own tips. You might not necessarily think of that as a personal finance tip, but it can have a fundamental impact on your ability to earn money. Patience. Frugality. Sacrifice.

Tuesday’s Relativity Fest 2019 Sessions: eDiscovery Trends

eDiscovery Daily

Attend this session to learn how leading legal teams are meeting these challenges, and designing workflow that complement features within Relativity. They want them dealt with as efficiently and cheaply as possible, while still meeting their obligations to the ICO and the requester.

You May Be a User of Predictive Coding Technology and Not Realize It: eDiscovery Trends

eDiscovery Daily

But first, this week’s eDiscovery Tech Tip of the Week is about Boolean Searching. Using OR operators between search terms helps expand recall by retrieving documents that meet ANY of the criteria; while using AND or AND NOT operators between search terms help improve precision by only retrieving documents that are responsive if they include all terms (AND) or exclude certain terms (AND NOT). You’re training the system.