Australia to Update National Cybersecurity Strategy

Data Breach Today

Government Invites Feedback on Addressing Cyber Challenges The Australian government is looking to update its national cybersecurity strategy by 2020.

Strategies for Securing Digital Transformation

Data Breach Today

PJ Maloney of DXC Technology and William "Buck" Houston of Micro Focus Global Alliances weigh in on new strategies for securing the transformation

Patch Management as a Risk Management Strategy

Data Breach Today

Chris Hallenbeck of Tanium Discusses Good Security Hygiene Significant security events have many techniques in common, says Chris Hallenbeck of Tanium, who describes why security hygiene improvement, especially patch management, is so essential

Fileless Malware: What Mitigation Strategies Are Effective?

Data Breach Today

Security Practitioners Highlight Ways to Fight Against the Threat As the threat of fileless malware continues to persist worldwide, security professionals are devising targeted risk management strategies

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

'Five Eyes' Intelligence Agencies Discuss Strategies

Data Breach Today

The latest edition of the ISMG Security Report describes a discussion among "Five Eyes" intelligence agencies at the recent CyberUK conference. Plus, an update on a Huawei 'backdoor' allegation and new research on managing third-party risk

5 steps to incorporate ethics into your artificial intelligence strategy

Information Management Resources

In the context of the five most common AI ethics guidelines, here are five lines of questioning that IT leaders should consider when determining an AI ethics strategy. Artificial intelligence Data strategy Data management

Japan's IoT Security Strategy: Break Into Devices

Data Breach Today

Nation to Allow Researchers to Brute-Force 200 Million Devices Japan plans to identity vulnerable internet of things devices the same way hackers do: by trying to log into them. The country wants to gauge its cybersecurity readiness for next year when it hosts the summer Olympics. If vulnerable devices are found, the plan is to notify device owners

The US National Cyber Strategy

Schneier on Security

Last month the White House released the " National Cyber Strategy of the United States of America. And the strategy includes no details. I generally don't have much to say about these sorts of documents. They're filled with broad generalities.

Data Strategy at Strata Data Conf New York

Perficient Data & Analytics

And to accomplish this you need a data strategy. Here are four sessions to attend to learn more about the elements of a quality data strategy. Data Strategy Sessions at Strata. Companies today are working to adopt data-driven mind-sets, strategies, and cultures.

Developing a PaaS Migration Strategy

Perficient Data & Analytics

In this blog we will look at the steps to create a migration strategy to PaaS including re-platforming legacy applications. Application migrations are often tied to a larger business-level, digital-transformation strategy.

4 strategies to drive digital maturity in the digital age

Information Management Resources

Digital transformation Data strategy Data managementThe majority of digitally maturing companies are already using technology in fundamentally different ways to conduct their everyday business.

Live Webinar | Hard Truths about Account Takeover and Strategies to Defend Your Enterprise

Data Breach Today

In this webinar, SpyCloud Head of Product Strategy Chip Witt will demonstrate how malicious actors take advantage of loopholes in your account takeover prevention plans. Protecting your enterprise from breaches and account takeovers has never been a bigger challenge.

Components of a Data Governance Strategy in Financial Services

Perficient Data & Analytics

In this post, I discuss the components needed to design a data governance strategy. A comprehensive program to manage data consists of a number of components: Data Strategy & Architecture.

FDA Reacts to Critique of Medical Device Security Strategy

Data Breach Today

Watchdog Agency Cited Deficiencies, But Agency Says Many Have Already Been Addressed The FDA's procedures for handling cybersecurity concerns in medical devices once they are on the market are deficient, according to a new federal watchdog agency report.

5 requirements for success with DataOps strategies

Information Management Resources

Data strategy Data management Data discoverySimilar to DevOps, DataOps is an emerging set of practices, processes and technologies for building an enhancing data and analytics pipelines to better meet the needs of the business.

A Fraud-Fighting Strategy for P2P Payments

Data Breach Today

Customer lifecyle data management can play an important role in cracking down on fraud tied to the growth in real-time P2P payments, says David Barnhardt of the security firm GIACT

Technology Strategies to Reduce False Positives

Data Breach Today

Save your data strategy from a nosedive

Information Management Resources

In order to compete in the age of the customer, your data strategy must be top-flight. Business intelligence Data management Data strategyThe vast majority of firms come up short in this regard.

4 Tips for Implementing a Mature Endpoint Security Strategy

Data Breach Today

Insights on Vulnerability Management and Incident Response An effective endpoint security strategy can be as layered as you want it to be. But you'll have a strong foundation if you build off of these four key steps

Tips 140

A Successful Strategy for Fighting Phishing

Data Breach Today

Brent Maher of Johnson Financial Group Offers Real-World Lessons Learned The key to lowering the risk of employees becoming victims of phishing is to adopt an "adult learning" approach to training, says Brent Maher, CISO at Johnson Financial Group

Go-To-Market Strategy in the Clouds

Perficient Data & Analytics

After more than four years as part of the management consulting team, I am now responsible for launching our go-to-market (GTM) strategy for our firm’s cloud services. I’ve embarked on a new journey with Perficient.

The Reaction to New White House Cybersecurity Strategy

Data Breach Today

Leading the latest edition of the ISMG Security Report: The reaction to the recently released White House cybersecurity strategy. Also featured: A discussion of GDPR's impact on class action lawsuits

4 key elements to a successful data governance strategy

Information Management Resources

Data governance Data management Data strategyEnsuring leaders understand they are responsible for their organization’s data and managing that data is not the sole duty of IT staff can lead to a stronger data stewardship program.

China's AI Strategy and its Security Implications

Schneier on Security

Allen at the Center for a New American Security has a new report with some interesting analysis and insights into China's AI strategy, commercial, government, and military. Gregory C.

Apply Military Strategy to Cybersecurity at Black Hat Trainings Virginia

Dark Reading

This special October event in Alexandria, Virginia offers unique, practical courses in everything from data breach response to military strategy for cybersecurity

Exploring Cyber's Role in the New National Security Strategy

Data Breach Today

An analysis of the cyber component of the Trump administration's just-published National Security Strategy leads the latest edition of the ISMG Security. Also, DHS and industry establish a cyber coordinating council to help secure the U.S. electoral system

Consumerization Is Going to Force Your Healthcare Data Management Strategy Hand

InfoGoTo

A few years back, healthcare data management strategies generally stopped at the walls of clinical and revenue cycles. Benefits of a Patient-Centered Data Management Strategy. Value-based care already has a good portion of the industry shifting their perspective, and your data management strategy should be no different. How to Align Your Data Management Strategy.

OpenText Extends Cloud Strategy with the Release of OpenText OT2

OpenText Information Management

I’m pleased to announce that today’s release of OpenText products, platforms and services further extends our enterprise cloud strategy, completing the need of our customers to access their business-critical information in the most convenient, secure and agile ways possible.

Three Fundamental Digital Preservation Strategies

IG Guru

The post Three Fundamental Digital Preservation Strategies appeared first on IG Guru.

Is Data Management Strategy Coming to Healthcare’s Rescue?

InfoGoTo

” The difference between the success of two cinematic universes holds a lesson in building a healthcare data management strategy that complements overall business strategy. It’s a lot, but other industries have faced similar problems and responded successfully with forward-thinking data management strategies. Still, in an age of big data, this is only the beginning of what a proactive data management strategy can mean for healthcare organizations.

Embrace Full-Scale Cloud Adoption with a Comprehensive Cloud Data Management Strategy

Data Breach Today

Like many risk-averse organizations, state and local governments are missing out on the benefits of full-scale cloud adoption because they are paralyzed by the complexities associated with trusting their data to a third party. It's no surprise that government agencies have concerns about storing citizen data in the cloud, considering a total of 4.5 billion records were compromised in the first half of 2018 alone

Stronger Defenses Force Cybercriminals to Rethink Strategy

Dark Reading

Researchers see the rise of new relationships and attack techniques as criminals put companies' resilience to the test

4 best practices for improving governance strategies

Information Management Resources

Data governance Data management Data strategyA failure to articulate the correct approach to IT governance could result in costly mistakes that prevent the organization from being successful.

Preparing an Omnichannel Anti-Fraud Strategy

Data Breach Today

Many banking institutions boast of being "digital first" and enabling "omnichannel banking." But are they fully aware of the new fraud risks they also are inviting? Kimberly Sutherland and Kimberly White of LexisNexis Risk Solutions discuss how to mitigate omnichannel fraud

Why capture is a key foundation of information management strategies

OpenText Information Management

Effectively connecting … The post Why capture is a key foundation of information management strategies appeared first on OpenText Blogs. Today’s number one business challenge is keeping track of information.

The Procurement Process: Key to an Information Governance Strategy

InfoGoTo

When it comes to enforcing an IG strategy, I am often asked, “What is the one thing you would do to improve my program?” From this perspective, it is obvious that including the IG department in the procurement process makes perfect sense as part of the overall IG strategy.

Three Strategies for Big Data Security

Thales eSecurity

These are great tactics, but I’d like to discuss the three most common overarching strategies I see in Big Data security today. Strategies for Securing Big Data. The post Three Strategies for Big Data Security appeared first on Data Security Blog | Thales e-Security.

Harness Your Enterprise Data Warehouse Strategy

Perficient Data & Analytics

A proper enterprise data strategy can empower a business. A data enterprise strategy is a well-rounded direction for an organization to potentially harness data-driven capabilities. A great enterprise data strategy is composed of 4 major factors. When the strategy is relevant, the information is contextual to the organization, therefore it’s not generic. This strategy should accelerate the business.

Planning Your Information Governance Technology Strategy

IG Guru

By Dan Griffith As part of your Information Governance strategy, you need a technology strategy. Your information governance technology strategy is a key element of your overall governance strategy […].