Researchers presented an improved version of the WPA KRACK attack

Security Affairs

Now the experts presented a new variant of the attack technique at the Computer and Communications Security (CCS) conference. The post Researchers presented an improved version of the WPA KRACK attack appeared first on Security Affairs.


IG Guru

We are looking for presentations on solutions to the IG challenges created by new and emerging technologies, the latest legal and regulatory developments that affect IG programs and professionals, practical advice and guidance on traditional IG challenges, and relevant case studies […].

Expert presented a new attack technique to compromise MikroTik Routers

Security Affairs

The experts at Tenable Research presented the technique on October 7 at DerbyCon 8.0 The post Expert presented a new attack technique to compromise MikroTik Routers appeared first on Security Affairs.

e-Records Conference 2018: Call for Presentations

The Texas Record

We are now accepting presentation proposals from state government organizations (state agencies, universities or local governments), vendors and subject matter experts from various organizations to share both their challenges and successes with managing electronic records.

2019 Conference Call for Presentations – NAID/PRISM (i-SIGMA)

IG Guru

If you have an idea for a session that would benefit those in the secure data destruction or records information management industries or an interest in presenting at the 2019 conference, now is the time to act. Answer the Call for Presentations: Suggest […].

Baltimore SharePoint User's Group Presentation


Get the slides from my presentation on "Don't Make Me Think: Getting SharePoint to be Useful, Usable, and Used": Don't Make Us Think: Getting SharePoint to be Useful, Usable, and Used from Kevin Parker, CIP. Presentation SharePointLast night I had the privilege of speaking at the Baltimore SharePoint User's Group. I really enjoyed the interaction with these professionals.

Merging Time: Past & Present Combined

Archives Blogs

This year, there are nineteen of these past-and-present combined images adorning the gallery walls. Once suitable present-day shots have been taken, they are manipulated to match the focal length and angle of the original photographs.

Contract data presents a unique GDPR challenge

Information Management Resources

Getting into compliance with the new rules will require a governance policy and framework that specifically addresses the unique challenges of information contained in contracts. GDPR Compliance Compliance systems

@CMSummit - My Presentation

John Battelle's Searchblog

Opening Slides by John Battelle, Monday June 7 View more presentations from CM Summit: Marketing in Real Time. PS - all the presentations are available on our CM Summit channel here Here's the deck I used to open the CM Summit yesterday. Enjoy!

Analytics experts discuss AI's present and future

IBM Big Data Hub

Where is AI headed? How should you be thinking about AI? What should you be doing with AI? To answer these questions, we recently convened a round table of tech influencers to discuss some of the most burning issues arising from AI — starting with why we should think of it as “augmented intelligence” rather than “artificial intelligence

e-Records Conference 2018: Call for Presentations – Deadline July 20, 2018

The Texas Record

We are still accepting presentation proposals for the annual e-Records Conference to be held on Friday, November 16, 2018. If you are interested in presenting or being a panelist, please complete the online form, Presentation Proposal Submission Form. The deadline for submitting presentation proposals is FRIDAY, JULY 20, 2018. Presentation formats could include 1-2 presenters or 3-4 panelists for 45 or 75-minute sessions.

@CMSummit - Mary Meeker's Internet Trends Presentation

John Battelle's Searchblog

The most tweeted Slideshare of the show so far is Mary's presentation. Internet Trends 2010 by Morgan Stanley Research View more presentations from CM Summit: Marketing in Real Time Here it is for your reading pleasure!

Connected Cars Present Great Opportunity for Car Rental Companies

Perficient Data & Analytics

telematics) has been around for some time, but only recently has the car rental industry truly exploited the massive opportunity it presents. Similar to mobility, connected car technology (e.g., The Internet of Things (IoT) has allowed companies to leverage new technology that better manages their fleets of cars. It’s also helping businesses, such as those that rent trucks for construction and landscaping, to closely monitor the performance and safety of their vehicles and drivers.

GDPR presents perfect opportunity to rethink data architecture

Information Management Resources

The new mandate truly creates an opportunity to restrategize and modernize systems by unifying the view or access to data assets and enforcing stricter guidelines for data protection. GDPR Data architecture Data privacy Data security

Bulgarian Presidency Presents Progress Report and Points for Debate on ePrivacy

Hunton Privacy

On June 8, 2018, the Council of the European Union’s Bulgarian Presidency presented a progress report (the “Report”) on the draft ePR to the Transport, Telecommunications and Energy Council. The Report reflects on the amendments presented in the May 2018 Examination of the Presidency text. On January 10, 2017, the EU Commission adopted a proposal for a Regulation on Privacy and Electronic Communications (“ePR”).

The Future of War (From Jan., 1993 to the Present)

John Battelle's Searchblog

( image is a shot of my copy of the first Wired magazine, signed by our founding team ). I just read this NYT piece on the United States’ approach to unmanned warfare: Do Drones Undermine Democracy?

Articles and Presentations


I'm still in the process of migrating content from my old blog - for a consolidated list of my articles, presentations and papers please see this page

Catch up with web archiving presentations from Portland


Formal presentations, breakout discussions, and hallway conversations surveyed the broad landscape of web archiving use cases, partner types, and their respective challenges; from the mandates that shape collecting scopes to the technical developments that unlock future access and use possibilities.

Threat Modeling in 2018: Attacks, Impacts and Other Updates

Adam Shostack

Conferences presentations threat modelingThe slides from my Blackhat talk, “ Threat Modeling in 2018: Attacks, Impacts and Other Updates ” are now available either as a PDF or online viewer.

Square 9 Presents 3rd Consecutive Encompass End User & Reseller Conference Encompass 2018 Offers Insight and Best Practices for Latest Innovations in Content Management

Document Imaging Report

Reseller and End User communities will gain exclusive insight into Square 9’s product innovation strategy, with a significant focus on the new Solutions Delivery Network being presented at this event. NEW HAVEN, CONN., October 3, 2018 – Square 9® Softworks welcomes its dedicated dealer channel and their customers back to Encompass 2018, an exclusive information management conference delivering three days of intuitive education, networking, and idea sharing.

PacSec presentation

Scary Beasts Security

My recent PacSec presentation (with Billy Rios), entitled "Cross-domain leakiness", is now online. You can view it via this link. There's a new way to attack SSL-enabled web apps in there ("Cookie Forcing"); a bunch of serious browser cross-domain thefts (many not yet disclosed); and attacks against the paranoid one window / one tab browsing model. The slides by themselves are a little sketchy on detail.

Puget Sound Energy achieves award-winning content management and customer engagement

OpenText Information Management

Enterprise Content Management customer communications management customer story customer video Data Archiving Document Presentment Extended ECM PSE SAPWhat happens when you successfully modernize customer communications and deliver a centralized SAP-integrated content management solution? You create a superior customer experience, improve business productivity, and win an OpenText™ Elite™ Award for SAP Integration Excellence!

Latin American ‘Biñeros’ Bond Over Fraudulent Purchase Scheme


A type of card-not-present fraud is spreading throughout the Latin American underground, uniting groups of malefactors in a communal effort to perpetrate it as widely as possible. Vulnerabilities Web Security banking identification numbers bineros card fraud card not present e-commerce Fraud latin america online checkout spanish language streaming

How to Plan a Successful Information Management Solution Implementation


At the 2016 Information Governance Conference , I presented on "How to Plan a Successful Information Management Solution Implementation". InfoGovCon Information Coalition Presentation Project ManagementGet my slide deck from SlideShare. Related: Check out my Reflections on the 2016 InfoGovCon. Summary Start with information strategy, architecture, and governance. Recruit an executive champion and cross-departmental partners. Partner with your IT organization.

Free Virtual Information Symposium 8/18


Watch the promo video: Information Coalition PresentationMy friends at Information Coalition are putting on a FREE Information Symposium on August 18. Register here for FREE: [link].

Video 52

Intranet 2.0 – have presentation, will travel


conference planned for next week where I was making a presentation has been cancelled… However, my presentation is drafted up and ready to go – so who wants to learn more about the benefits of implementing Intranet 2.0 Unfortunately it looks like the Intranet 2.0

IGI and TGCI’s “The Exchange” Presents The Information Governance Forum 2017


November 1 st , 2017-The Buckhead Club. Atlanta, GA. Colloquium Lead Moderators: Barclay T. Blair. Information Governance Initiative. Jason R. Baron. Drinker Biddle & Reath LLP. The Exchange” Information Governance Forum – Atlanta, is the first program developed and delivered through the new TGCI partnership with IGI. Building off TGCI’s successful roundtable format, this inaugural Forum will focus on facilitated conversations designed to rapidly increase your IG insight and fluency.

Considerations for ERM Implementations


On 5/17/2017 I presented to the Northern Virginia Chapter of ARMA on "Considerations for ERM Implementations". ARMA customer experience Digital Transformation Presentation Records Management thought leadershipI created this talk with all the highlights I would make if I had only one shot to provide some lessons learned on ERM solution projects. Records Management is an essential component of every organization's Information Management capabilities.

I Think We are Moving to a World Where We Will Keep Everything Forever. Here’s Why.

Barclay T Blair

Tagged: AHIMA , big data , E-Discovery , InfoGovCon , Information Governance , Keynote , Presentation. Big Data E-Discovery Information Governance Social Media Videos AHIMA big data InfoGovCon Keynote PresentationTranscript. An edited and condensed transcript of this speech is available here. .

Request for Enterprise 2.0 Case Studies: Present Your Environment in Boston

Collaboration 2.0

A major component of this research, which we will be presenting at the Enterprise 2.0 The Open Enterprise 2009 study, which I am conducting with Stowe Boyd, will be a snapshot of the state of Enterprise 2.0 adoption mid 2009. Conference in Boston USA on June 23, will be how modern collaborative technologies are actually working

Why Is Providing Patients Access to Records So Challenging?

Data Breach Today

Access 156

Protecting the Industrial Internet of Things

Data Breach Today

Asif Effendi of GE Oil and Gas Offers Risk Mitigation Insights The industrial internet of things presents a significant new risk paradigm, says Asif Effendi of GE Oil and Gas, who offers threat mitigation tips

Cyberinsurance Tries to Tackle the Unpredictable World of Hacks

WIRED Threat Level

Insuring against hacks and breaches can be a lucrative business—but also presents unique challenges. Security

The Do's and Don'ts of Reporting to the Board

Data Breach Today

CISOs increasingly are summoned to present to their Boards of Directors. But too often these presentations fail to frame the right topics with the right metrics, says Jacob Olcott of BitSight. He offers advice for maximizing the opportunity in front of the Board

54 Percent of Energy Companies Lack Security Skills for IoT

eSecurity Planet

Just 2 percent say IoT presents no new security challenges

Flood of Attacks Spread Ransomware via Remote Desktop Protocol

eSecurity Planet

The attacks present a particular threat to small businesses

Best practices for defending against insider email threats

Information Management Resources

Insider email threats presents a significant challenge for security operations teams, and the increasing popularity of Microsoft Office 365 has deepened cyber vulnerability. Data security Encryption Malware

Battling the Insider Threat: What Works?

Data Breach Today

He'll discuss how to start an insider threat program in a presentation at Information Security Media Group's Security Summit: London, to be held Oct. Education plays a critical role in any program designed to combat insider threats, says Christopher Greany, head of group investigations at Barclays.

Groups 114

This is the old ChiefTech blog.: Brad's talks about his presentation on tagging and the enterprise


Thursday, 14 February 2008 Brad's talks about his presentation on tagging and the enterprise Brad Hinton has written a series of posts about his Tagging and the Enterprise at a conference last week. BTW I havent found Brads presentation on SlideShare just yet, but in the meantime youll find some other examples. This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at ©2005-2009.

What's Riding on 5G Security? The Internet of Everything

Data Breach Today

But there are goods reasons the government is worried: Standards haven't been set in stone yet, and 5G will present a bevy of new security challenges. 5G Brings Great Speed But Also Great Complexity The U.S.

'No Slowdown' for HIPAA Enforcement, But Audits Ending

Data Breach Today

But he told ISMG following the presentation that there will be no phase 3 for HIPAA compliance audits

My Latest Article Published at Document Strategy Magazine

Getting Information Done

I attended two recent presentations that offered some practical strategies to help information governance professionals align and present project initiatives in a way that will help get them funded.

Overcoming the top obstacles to digital transformation success

Information Management Resources

The road to digital presents numerous challenges as organizations strive to leverage advanced digital technologies to meet business demands, speed time to value and improve agility. Data strategy Data management Data transparency