article thumbnail

Turning Information Into Outcomes: What Governance Really is About

Weissman's World

For years, youve heard me exhort you to implement information governance because you collected all that information for a reason, right? and infogov is how you get value from it. And while thats true, Im not sure I ever completely brought that sentiment to ground. So let me now close that gap.

article thumbnail

Government contractor Conduent disclosed a data breach

Security Affairs

In January, Conduent confirmed a cyberattack caused service disruptions after agencies in multiple US states reported outages. Wisconsin and Oklahoma noted impacts on payments and customer support. ” reads the FORM-8K filed with SEC. ” reads the FORM-8K filed with SEC. The company holds cyber insurance and informed federal authorities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China-linked threat actors compromised multiple telecos and spied on a limited number of U.S. government officials

Security Affairs

government officials. telecoms, compromising networks to steal call records and access private communications, mainly of government and political figures. A cyberattack tied to the Chinese government penetrated the networks of a swath of U.S. broadband providers is still ongoing, government experts are assessing its scope.

article thumbnail

Massive cyberattacks hit French government agencies

Security Affairs

A series of “intense” cyberattacks hit multiple French government agencies, revealed the prime minister’s office. “Several “intense” cyberattacks targeted multiple French government agencies since Sunday night, as disclosed by the prime minister’s office.” ” reported the French newspaper Le Monde.

article thumbnail

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy. When data deletion becomes applicable.

article thumbnail

China-linked APT Mustang Panda upgrades tools in its arsenal

Security Affairs

Mustang Panda has been active since at least 2012, targeting American and European entities such as government organizations, think tanks, NGOs , and even Catholic organizations at the Vatican. In the 2022 campaigns, threat actors used European Union reports on the conflict in Ukraine and Ukrainian government reports as lures.

IT 166
article thumbnail

VMware failed to fully address vCenter Server RCE flaw CVE-2024-38812

Security Affairs

” Chinese law requires researchers to disclose zero-day vulnerabilities to the government. . ” Chinese law requires researchers to disclose zero-day vulnerabilities to the government. Experts speculate that the Chinese government was aware of the flaw and may have exploited it as a zero-day. reads the advisory.

article thumbnail

Use It, Save It, Or Lose It: Spring Cleaning for Information Governance

Speaker: Speakers Michelle Kirk of Georgia Pacific, Darla White of Sanofi, & Scott McVeigh of Onna

Information governance for unstructured data. Join Onna, Georgia Pacific, and Sanofi for this on-demand webinar as they discuss proactive, practical steps for kicking off your organization's own digital cleanup. Watch this webinar on-demand to learn about: Data lifecycle management. Making “cleaning” a regular part of your routine.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

Government agencies can no longer ignore or delay their Zero Trust initiatives. The DHS compliance audit clock is ticking on Zero Trust. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc.,

article thumbnail

How to Overcome the Pain Points of Your CRM

However, as a company, sales stack, and database grow, it becomes difficult to uphold structure and governance to keep a CRM up-to-date. The promise of a CRM ( customer relationship management ) led organizations to believe each could digitally transform its businesses through tracking touchpoints throughout the buyer’s journey.

article thumbnail

How to Effectively Equip Your IG Program for the Perilous Journey Into the Future

Speaker: Andrew Ysasi, Vice President of Advocacy for Vital Records Control, President of IG GURU®, MS, FIP, FIIM, CIPM, CIGO, CISM, PMP, CRM, IGP, CIP, CSAP

An information governance framework shows how an organization manages specific data, like personal information, as well as how this information is stored. Over the past couple of years, these frameworks have proven to be ineffective and in need of updating. Information privacy is a critical part of an IG program.

article thumbnail

Open Source & Open Standards: Navigating the Intricacies of a Symbiotic Partnership

Speaker: Guy Martin, Executive Director of OASIS Open

The role of foundations/consortiums in providing neutral open governance. In the early days of technology, the building blocks of strong open standards combined with open source code that implemented these standards set the stage for breakthrough innovations. How to address challenges and find common ground between the communities.