Reminder that AIIM True North is presenting a webinar on March 25, 2021 at 12:00 PM ET. The presentation will be a case study of a data breach and will explore the prospects and options of approaching a "breach-proof" state. This webinar is eligible for 1.0 CEU towards renewing your CIP...
marting@conceptsearching.com Moving to the cloud has tremendous potential, cost savings, achieving ubiquitous access, and the list goes on. There are concerns and we hear them every day, that put organizations on the fence. One of the primary concerns is data privacy issues. We have a...
For companies that operate in international jurisdictions, it is vital to stay up-to-date on legislative actions that affect data retention policies and compliance. This allows companies to make internal adjustments as necessary and to avoid costly sanctions and other harmful penalties for non...
AIIM True North would like to invite you to a webinar on March 25, 2021 at 12:00 PM ET. The presentation will be a case study of data breach and will explore the prospects and options of approaching a "breach-proof" state. This webinar is eligible for 1.0 CEU towards renewing your CIP...
03-25-2021 | 12:00 - 13:00 ET
Achieved a Master of Science in Legal Studies in Data Privacy and Cybersecurity; recipient of CIP In Action AIIM International Leadership Award 2019; and the SC Media Reboot International Leadership Award (Top Manager) for a holistic approach to cyber security and information governance
Achieved a Master of Science in Legal Studies in Data Privacy and Cybersecurity; recipient of CIP In Action AIIM International Leadership Award 2019; and the SC Media Reboot International Leadership Award (Top Manager) for a holistic approach to cyber security and information governance.
05-27-2021 | 12:00 - 13:00 ET
Countries are continuing to escalate restrictions on storage location and transfers of data, with China being the most recent to follow suit. China broadened its cybersecurity initiatives significantly in 2016 with the release of the Cybersecurity Law (Law). Scheduled to come into effect June 1,...
A recent study by Verizon showed that more than 58% of the cyber security incidents in the public sector were caused by the government officials themselves
The FEDSIG is for federal information workers, whether IT professionals, knowledge or records managers, process engineers, or any of a host of related experts including access ( FOIA , Mandatory Declassification Review, Security Review ), privacy, cyber security, legal discovery, etc
1 Comment - no search term matches found in comments.