Remove 2013 Remove Education Remove Examples Remove Government Remove Presentation
article thumbnail

How to Address AI Security Risks With ISO 27001

IT Governance

AI penetration tests, user education, and more Artificial intelligence is taking the world by storm. Just the person to talk to about: The impact of AI on security; User education and behavioural economics; and How ISO 27001 can help address such risks and concerns. For example, suppose a user has seen a list of passwords.

Risk 86
article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. I wrote the essay below in September 2013. I paged through weekly reports, presentation slides from status meetings, and general briefings to educate visitors. Answer: your name.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mobile Libraries: Culture on the Go

Unwritten Record

A library is a place that stores information, a place where people from all walks of life have the opportunity to obtain textual and audiovisual material for education, entertainment, and enlightenment. government used bookmobiles to promote a concept known as “cultural diplomacy.” In the aftermath of the Second World War, the U.S.

article thumbnail

Malaysian Data Protection Law Takes Effect

Hunton Privacy

On November 14, 2013, the Minister of the Malaysian Communications and Multimedia Commission (the “Minister”) announced that Malaysia’s Personal Data Protection Act 2010 (the “Act”) would be going into effect as of November 15, marking the end of years of postponements. It is unclear exactly what is meant by “a regular practice” in Malaysia.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Humans have used technology to transform their societies from prehistoric times up to the present. Finally, Part 3 will look to the future, will present next steps, and will discuss key takeaways. That is almost 2000 times more data in less than 20 years (Press 2013, Patrizio 2018). Introduction. IDC estimated the world created.16

article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

But, as amazing as all that sounds, there are tradeoffs -- in privacy, for example. But it wasn’t an example of “I know everything, follow me.” And there's very little hands on education process. Otherwise I'm not allowed to present myself as a professional person in this industry. Massive numbers.

article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

But, as amazing as all that sounds, there are tradeoffs -- in privacy, for example. But it wasn’t an example of “I know everything, follow me.” And there's very little hands on education process. Otherwise I'm not allowed to present myself as a professional person in this industry. Massive numbers.