White House National Cyber Strategy: An Analysis

Data Breach Today

Security Experts Examine Administration's Document and Rhetoric A national cybersecurity strategy document released by the White House last week - along with comments from a top Trump administration official that the U.S.

Developing a PaaS Migration Strategy

Perficient Data & Analytics

In this blog we will look at the steps to create a migration strategy to PaaS including re-platforming legacy applications. Application migrations are often tied to a larger business-level, digital-transformation strategy.

The US National Cyber Strategy

Schneier on Security

Last month the White House released the " National Cyber Strategy of the United States of America. And the strategy includes no details. I generally don't have much to say about these sorts of documents. They're filled with broad generalities.

FDA Reacts to Critique of Medical Device Security Strategy

Data Breach Today

Watchdog Agency Cited Deficiencies, But Agency Says Many Have Already Been Addressed The FDA's procedures for handling cybersecurity concerns in medical devices once they are on the market are deficient, according to a new federal watchdog agency report.

Go-To-Market Strategy in the Clouds

Perficient Data & Analytics

After more than four years as part of the management consulting team, I am now responsible for launching our go-to-market (GTM) strategy for our firm’s cloud services. I’ve embarked on a new journey with Perficient.

OpenText Extends Cloud Strategy with the Release of OpenText OT2

OpenText Information Management

I’m pleased to announce that today’s release of OpenText products, platforms and services further extends our enterprise cloud strategy, completing the need of our customers to access their business-critical information in the most convenient, secure and agile ways possible.

The Reaction to New White House Cybersecurity Strategy

Data Breach Today

Leading the latest edition of the ISMG Security Report: The reaction to the recently released White House cybersecurity strategy. Also featured: A discussion of GDPR's impact on class action lawsuits

Understanding the role of automation in data management strategies

Information Management Resources

If you want to be fast and agile with your data, you need a strategy built on enabling you to do that. But your data strategy needs to include more than just raw processing power. Automation Data strategy Data management

A Successful Strategy for Fighting Phishing

Data Breach Today

Brent Maher of Johnson Financial Group Offers Real-World Lessons Learned The key to lowering the risk of employees becoming victims of phishing is to adopt an "adult learning" approach to training, says Brent Maher, CISO at Johnson Financial Group

4 Tips for Implementing a Mature Endpoint Security Strategy

Data Breach Today

Insights on Vulnerability Management and Incident Response An effective endpoint security strategy can be as layered as you want it to be. But you'll have a strong foundation if you build off of these four key steps

Tips 136

Three Fundamental Digital Preservation Strategies

IG Guru

The post Three Fundamental Digital Preservation Strategies appeared first on IG Guru.

Best practices for aligning business strategy with data management

Information Management Resources

Data management Data strategy Data transparencyData is the engine that supports both strategic and operational decisions; these decisions depend on what you know and what you know depends on the information provided by the data.

Exploring Cyber's Role in the New National Security Strategy

Data Breach Today

An analysis of the cyber component of the Trump administration's just-published National Security Strategy leads the latest edition of the ISMG Security. Also, DHS and industry establish a cyber coordinating council to help secure the U.S. electoral system

Harness Your Enterprise Data Warehouse Strategy

Perficient Data & Analytics

A proper enterprise data strategy can empower a business. A data enterprise strategy is a well-rounded direction for an organization to potentially harness data-driven capabilities. A great enterprise data strategy is composed of 4 major factors. When the strategy is relevant, the information is contextual to the organization, therefore it’s not generic. This strategy should accelerate the business.

How to Store Medical Records: Finding the Best Strategy

Record Nations

The post How to Store Medical Records: Finding the Best Strategy appeared first on Record Nations. Medical records require thoughtful and careful handling due to the sensitive information they contain. When choosing how to store your medical records, you have several option.

Three Strategies for Big Data Security

Thales Data Security

These are great tactics, but I’d like to discuss the three most common overarching strategies I see in Big Data security today. Strategies for Securing Big Data. The post Three Strategies for Big Data Security appeared first on Data Security Blog | Thales e-Security.

Preparing an Omnichannel Anti-Fraud Strategy

Data Breach Today

Many banking institutions boast of being "digital first" and enabling "omnichannel banking." But are they fully aware of the new fraud risks they also are inviting? Kimberly Sutherland and Kimberly White of LexisNexis Risk Solutions discuss how to mitigate omnichannel fraud

Data Strategy Framework: Handle with CARE

Perficient Data & Analytics

Therefore, it’s important to have data strategy framework in place. On a daily basis, I come across clients looking for a data strategy. Data Strategy Components. When developing a data strategy we like to use CARE to build the framework.

An Information Strategy with Built in Buy-in


What Information Management (IM) activities should we focus on? Are we ready to take the next steps to evolve IM

Data governance goes ambient with a digital strategy

Information Management Resources

Data governance Data ownership Data strategyData governance is a necessary investment and effort to drive value and monetize our data as well as avoid business risk. The issue at hand: Why does it have to be so hard? Why can’t data just work?

Insurers need to formalize IoT strategy

Information Management Resources

Telematics Internet of things Connected cars Connected home Growth strategies Big data Claims Property and casualty insurance Life insurance LexisNexisFour out of five carriers don't have a plan for collecting, analyzing or securing the flood of data from connected devices, according to LexisNexis survey.

8 crucial factors in charting a health info exchange strategy

Information Management Resources

Providers face a range of complex options in forming a data sharing strategy, from using exchange standards to building a specialized HIE. HIE Data strategy

Meet 5 Women Shaping Microsoft's Security Strategy

Dark Reading

Profiles of some of the women currently leading Microsoft security operations - and their efforts to drive inclusivity

5 Ways PDF Solutions Transform Digital Strategy


But we need capable tools– here are 5 ways PDF solutions transform digital strategy with powerful benefits: Rapid Document Conversion. Check out this free Tip Sheet I've put together – Solve with PDF: 5 Ways PDF Solutions Transform Digital Strategy.

My Latest Article Published at Document Strategy Magazine

Getting Information Done

I attended two recent presentations that offered some practical strategies to help information governance professionals align and present project initiatives in a way that will help get them funded.

4 key steps to building a comprehensive data strategy

Information Management Resources

Data strategy Data management Data visualizationOrganizations that develop and implement a strategic plan are fundamentally better prepared to anticipate, manage and capitalize on the increasing challenges and possibilities of data.

Stop Undermining Your Recruiting Strategy


But is this recruiting strategy actually doing more harm than good? Workforce magazine “covers the intersection of people management and business strategy,” whose “content helps HR professionals approach their jobs from a more strategic, big-picture, business-results perspective.” ” On the surface, the recruiting strategy seems like a reasonable way to manage otherwise untenable workloads.

Strategies to Protect your Records from Ransomware

The Texas Record

Although there are many types of ransomware, the strategies you use to protect yourself are essentially the same. Here are some key strategies that you can employ in your office: 1.

Software should be at the center of any effective business strategy

Information Management Resources

Hardware and software Data strategy Data managementExcellence in software delivery can help an organization fend off digitally astute competitors in the Amazon mold. Software plays a key role today in almost every product and service.

A New SOC Strategy in Light of Skills Shortage

Data Breach Today

A move to a "more autonomous" security operations center is helping Encompass Health cope with a shortage of skilled cybersecurity workers while improving its response to cyber threats, says Mitch Thomas, chief security officer

LEAP makes perfect fit in OpenText™ cloud services strategy

OpenText Information Management

LEAP had truly found a home as it was the perfect fit into the OpenText™ Cloud Services strategy. It’s been one year now since we announced our acquisition of Documentum, InfoArchive, Captiva, and LEAP SaaS Platform and Applications.

Security Teams Struggle with Container Security Strategy

Dark Reading

Fewer than 30% of firms have more than a basic container security plan in place

[Guide] Improving Operations & Patient Outcomes: Strategy & Tech

Perficient Data & Analytics

Should you adjust your strategy to remain or become an industry leader? Data & Analytics Healthcare High Tech Integration & IT Modernization healthcare healthcare operations healthcare patient healthcare strategy healthcare technology healthcare wearables medical devicesDue to the emergence of value-based care, precision medicine, and consumerism, the healthcare industry continues to grow and change.

Cybersecurity and the 2017 US National Security Strategy

Schneier on Security

Commentaries on the 2017 US national security strategy by Michael Sulmeyer and Ben Buchanan. cybersecurity nationalsecuritypolicy

Majority of organizations now have a multi-cloud strategy

Information Management Resources

Investments in cloud computing continue to grow at a strong pace, and a large majority of organizations now describe their current cloud strategy as multi-cloud, with performance and innovation rising above cost savings as the top measures of success. Cloud computing Data strategy Cloud hosting

Tying an agile data management strategy to business goals

Information Management Resources

Data management Data strategy Data transparencyAs organizations evolve from regular business processes to digital businesses, those that do not have a sharp focus on data will fail to keep up with their more advanced peers.

7 top considerations in creating a hybrid integration strategy

Information Management Resources

Data strategy Data management Hardware and softwareA successful plan must support API development and management, DevOps and continuous integration patterns, offer a flexible set of deployment options and equally support older legacy systems.

Why Password Management and Security Strategies Fall Short

Dark Reading

Researchers say companies need to rethink their password training and take a more holistic approach to security

Growing skills gap taking toll on data management strategies

Information Management Resources

Data strategy Data mining Data managementNearly half of firms recently surveyed struggle to identify between data truths and manipulations. This indicates an urgent need to upskill and support workers, the report said.

Governance strategies critical to turn data into actionable information

Information Management Resources

Data governance Data management Data strategyThose organizations that have been unable to build scalable systems need governance the most, and are the least able to achieve it, says William McKnight.

The DHS Cybersecurity Strategy: Five Pillars of Cybersecurity Goals

Thales Data Security

The recent DHS Cybersecurity Strategy was released at a crucial time when today’s cyberspace has become a new frontier for warfare for both nation states and criminal hackers. All in all, the DHS Cybersecurity Strategy provides a solid framework for cybersecurity.

How Berkshire Specialty's IT strategy delivered results

Information Management Resources

CIO Jamie Roser credits the carrier’s quick expansion over its five-year lifespan as a company to its digital strategy centered on a cloud-based core system. Core conversions Core systems Claims Underwriting Predictive analytics Insurance technology Celent Berkshire Hathaway Duck Creek

White House and Pentagon Announce New Cyber Strategies

Data Matters

The Trump Administration continued to put its stamp on federal cybersecurity policy last week, as the White House issued its National Cyber Strategy while the Pentagon announced the Department of Defense Cyber Strategy. White House National Cyber Strategy. These pillars would not seem out of place in either an Obama or Bush Administration document, and, indeed the Strategy is more about continuity of approach than dramatic change. Summary of DoD Cyber Strategy.