This document summarizes a presentation about managing social media content as records. It discusses how half of companies will be asked to produce social media content for legal cases by 2013. It also outlines the differences between commercial and enterprise social media tools, and provides guidance on identifying social media records and how to archive and store them.
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...Jesse Wilkins
This presentation introduced enterprise use cases for social media, described the difference between commercial and enterprise social technologies, and provided specific steps to take to manage social content as records.
20110518-4 ARMA Central Iowa Records Management 2.0Jesse Wilkins
This final session at the ARMA Central Iowa Spring Seminar focused on enterprise social business software capabilities and considerations and described steps to capture social content as records.
20110411 Archive Systems User Conference Keynote Future of EDRMJesse Wilkins
This keynote was delivered at the Archive Systems User Conference in Orlando and focused on the 8 trends that will affect document and records management
Portal Authentication: A Balancing Act Between Security Usability and Complia...PortalGuard
Virtually every organization maintains highly sensitive information to which it must
control strict access. These data sources might include customer databases, CRM
systems, repositories of financial information and the like. Increasingly, these content
sources are accessed through portals Microsoft SharePoint and other solutions.
Importantly, SharePoint is among the leaders in Gartner’s 2013 Magic Quadrant for
horizontal portalsi.
http://www.portalguard.com
Quick Start Guide to IT Security for BusinessesCompTIA
IT security is constantly changing, which means it can be hard for businesses to keep up. This guide from CompTIA educates IT solution providers on the importance of providing clients with up-to-date IT security, identifies the risks of inadequate or poor security, and examines the technology shifts and factors affecting security in in the workplace.
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...Jesse Wilkins
This presentation introduced enterprise use cases for social media, described the difference between commercial and enterprise social technologies, and provided specific steps to take to manage social content as records.
20110518-4 ARMA Central Iowa Records Management 2.0Jesse Wilkins
This final session at the ARMA Central Iowa Spring Seminar focused on enterprise social business software capabilities and considerations and described steps to capture social content as records.
20110411 Archive Systems User Conference Keynote Future of EDRMJesse Wilkins
This keynote was delivered at the Archive Systems User Conference in Orlando and focused on the 8 trends that will affect document and records management
Portal Authentication: A Balancing Act Between Security Usability and Complia...PortalGuard
Virtually every organization maintains highly sensitive information to which it must
control strict access. These data sources might include customer databases, CRM
systems, repositories of financial information and the like. Increasingly, these content
sources are accessed through portals Microsoft SharePoint and other solutions.
Importantly, SharePoint is among the leaders in Gartner’s 2013 Magic Quadrant for
horizontal portalsi.
http://www.portalguard.com
Quick Start Guide to IT Security for BusinessesCompTIA
IT security is constantly changing, which means it can be hard for businesses to keep up. This guide from CompTIA educates IT solution providers on the importance of providing clients with up-to-date IT security, identifies the risks of inadequate or poor security, and examines the technology shifts and factors affecting security in in the workplace.
Infographic winning-ecm-recipe-m-files general networks denverMike Randash
M-Files ECM. General Networks is an Authorized Service Partner located in Denver, CO. infodenver@gennet.com www.gennet.com - Quality Management, Records Management, Document Management
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your InformationAIIM International
Follow along with these webinar slides as we take a close look at what it takes to prepare for all kinds of data privacy regulations – learn how to protect your data in order to be compliant with regulators or for healthy business practices in general.
Want to follow along with the webinar replay? Download it here for free: http://info.aiim.org/protect-your-information
Building the Information Governance Business Case Within Your CompanyAIIM International
Information Governance is a critical component in today’s business world to ensure that ALL information is visible, organized, and compliant. This solution can help your business to gain a competitive edge through the strategic and economic use of information. Despite the critical need, many companies still struggle to get funding and buy-in from upper management to move initiatives forward. This presentation will highlight key focus points for IG advocates to get internal stakeholders on board.
Big data contains valuable information— some of it sensitive customer data—that can be a honeypot for internal and external attackers. Given the risk involved, organizations must proactively enhance defenses and prevent data breaches. The four steps outlined in this deck, help organizations to develop a holistic approach to data security and privacy.
[Webinar Slides] Realizing the True Value of ECM with IntegrationAIIM International
ECM should not be a stand alone system. Its true value is realized when it is integrated with your other enterprise systems such as CRM or ERP. Doing so will allow you to comprehensively manage your document-driven processes, improve productivity, and enhance governance.
Automation of Information (Cyber) Security by Joe HessmillerJoe Hessmiller
The focus is on physical and logical security vulnerabilities. Yes, locks and malware sandboxes are important. BUT, the biggest potential risk comes from inside. From the people who can - intentionally or unintentionally - expose the organization to the greatest risks. This presentation is about automating the process to control those risks.
My presentation to Bentley University’s: CS 299 – Web 2.0: Technology, Strategy, Community.
I cover:
Cloud Computing
Web 2.0 Policies for Business
Personal Knowledge Management
Professional Networking with Web 2.0
Enterprise 2.0
Data Visualization in SharePoint and Office 365AntonioMaio2
Data Visualization in SharePoint is the ability to use appropriate tools to cultivate and present data in an interactive and compelling visual representation by way of dashboard, report or chart. Although a number of data visualization tools are available, many organizations continue to struggle with making the best decisions regarding which tools to leverage and how data should be displayed. Common challenges include the proliferation of different screen types and sizes, the rapid pace of change in Microsoft’s Business Intelligence arena, and the abundance of excess data.
In this roundtable we will provide insight into the SharePoint and Microsoft BI stack and clarification on the data visualization options available. We will cover Power BI, Power Pivot, Datazen, and out-of-the-box solutions to name a few. We will also conduct a visual analysis demo on a mobile device and show rapid results with no code solutions.
The presentation delivered to the ARMA Dallas Chapter by Jesse Wilkins, AIIM Director, Systems of Engagement. The presentation looks at methods of managing web 2.0 records, such as Facebook, Twitter and everything in between.
20110427 ARMA Houston Keynote Records Management 2.0Jesse Wilkins
This luncheon keynote at the ARMA Houston Spring Seminar introduced Web 2.0 concepts and issues and provided attendees with specific steps for managing social content as part of the records program.
Infographic winning-ecm-recipe-m-files general networks denverMike Randash
M-Files ECM. General Networks is an Authorized Service Partner located in Denver, CO. infodenver@gennet.com www.gennet.com - Quality Management, Records Management, Document Management
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your InformationAIIM International
Follow along with these webinar slides as we take a close look at what it takes to prepare for all kinds of data privacy regulations – learn how to protect your data in order to be compliant with regulators or for healthy business practices in general.
Want to follow along with the webinar replay? Download it here for free: http://info.aiim.org/protect-your-information
Building the Information Governance Business Case Within Your CompanyAIIM International
Information Governance is a critical component in today’s business world to ensure that ALL information is visible, organized, and compliant. This solution can help your business to gain a competitive edge through the strategic and economic use of information. Despite the critical need, many companies still struggle to get funding and buy-in from upper management to move initiatives forward. This presentation will highlight key focus points for IG advocates to get internal stakeholders on board.
Big data contains valuable information— some of it sensitive customer data—that can be a honeypot for internal and external attackers. Given the risk involved, organizations must proactively enhance defenses and prevent data breaches. The four steps outlined in this deck, help organizations to develop a holistic approach to data security and privacy.
[Webinar Slides] Realizing the True Value of ECM with IntegrationAIIM International
ECM should not be a stand alone system. Its true value is realized when it is integrated with your other enterprise systems such as CRM or ERP. Doing so will allow you to comprehensively manage your document-driven processes, improve productivity, and enhance governance.
Automation of Information (Cyber) Security by Joe HessmillerJoe Hessmiller
The focus is on physical and logical security vulnerabilities. Yes, locks and malware sandboxes are important. BUT, the biggest potential risk comes from inside. From the people who can - intentionally or unintentionally - expose the organization to the greatest risks. This presentation is about automating the process to control those risks.
My presentation to Bentley University’s: CS 299 – Web 2.0: Technology, Strategy, Community.
I cover:
Cloud Computing
Web 2.0 Policies for Business
Personal Knowledge Management
Professional Networking with Web 2.0
Enterprise 2.0
Data Visualization in SharePoint and Office 365AntonioMaio2
Data Visualization in SharePoint is the ability to use appropriate tools to cultivate and present data in an interactive and compelling visual representation by way of dashboard, report or chart. Although a number of data visualization tools are available, many organizations continue to struggle with making the best decisions regarding which tools to leverage and how data should be displayed. Common challenges include the proliferation of different screen types and sizes, the rapid pace of change in Microsoft’s Business Intelligence arena, and the abundance of excess data.
In this roundtable we will provide insight into the SharePoint and Microsoft BI stack and clarification on the data visualization options available. We will cover Power BI, Power Pivot, Datazen, and out-of-the-box solutions to name a few. We will also conduct a visual analysis demo on a mobile device and show rapid results with no code solutions.
The presentation delivered to the ARMA Dallas Chapter by Jesse Wilkins, AIIM Director, Systems of Engagement. The presentation looks at methods of managing web 2.0 records, such as Facebook, Twitter and everything in between.
20110427 ARMA Houston Keynote Records Management 2.0Jesse Wilkins
This luncheon keynote at the ARMA Houston Spring Seminar introduced Web 2.0 concepts and issues and provided attendees with specific steps for managing social content as part of the records program.
This workshop delivered July 20, 2011 at FOSE 2011 described the elements of a social media governance framework, identified structural and policy statements to include in the social media policy, and describes strategies for capturing and managing social media-generated content as records.
20110310 ARMA Northern CO Strategies and Policies for Social MediaJesse Wilkins
This presentation delivered on March 10, 2011 described how to develop a social media policy, the elements and policy statements to include in a comprehensive policy, and other considerations for managing social media.
Knowledge Management and the Evolution of the WorkplaceSilicon Halton
Silicon Halton Meetup#16 featured a keynote by Reema Duggal from the Sitaran Group and Chris Willard from Igloo Software on the topic of Knowledge Management and the Social Workplace.
Making Informed Business Decisions with an Enterprise Information Management ...Perficient, Inc.
Perficient presents: An Enterprise Information Management (EIM) solution provides an integration of structured and unstructured information in a context that is used by users to make decisions.
EIM Solutions provide a seamless, role based set of tools that let users be more efficient in completing their key tasks
These tools can include;
Business Intelligence
Enterprise Content Management
Portal
Enterprise Search
Collaboration
E-Mail Management
This presentation to the ARMA Cincinnati Chapter introduced Web 2.0 tools, provided some use cases for each tool, and then described strategies for managing the content created by these tools.
This presentation explains Information Governance. Learn what it takes to improve the value of information, manage information risks, and reduce information costs.
SharePoint 2013 and Office 365 - Collaboration, Cloud and ComplianceJoel Oleson
SharePoint 2013, Yammer and Office 365 product families bring new capabilities for content sharing, finding, organizing, and authoring. They also create new challenges. The move to the cloud and the integration of SharePoint with the enterprise social network with yammer, and have made this release so profound and disruptive to the business. In this session we'll dig into planning and strategy for social architectures around both business process and the technologies to help ensure compliance and success. Social enterprise technology is transformative and will lead to more agile business when used correctly, but a disaster and chaos when not used properly.
Business aspects of social software and collaboration Ed Brill
Web 2.0, social software, blogs, wikis, instant messaging. New tools and new ways of approaching communication and coordination among customers, suppliers, and partners. Software to help companies share information has been around for more than 15 years. How do the new tools intersect with existing ones? How can you best leverage new technologies for faster time-to-market and increased customer satisfaction? What is the role of security in an increasingly open supply-chain communication system? We'll examine these questions and talk about current and future technologies and trends.
Copyright Notice:
This presentation is prepared by Author for Perbanas Institute as a part of Author Lecture Series. It is to be used for educational and non-commercial purposes only and is not to be changed, altered, or used for any commercial endeavor without the express written permission from Author and/or Perbanas Institute. Appropriate legal action may be taken against any person, organization, or entity attempting to misrepresent, charge, or profit from the educational materials contained here.
Authors are allowed to use their own articles without seeking permission from any person, organization, or entity.
Web governance has matured from simply ‘ownership’ and an ‘editorial board’ to providing a broad enabling framework for the people, process, technology, documentation and standards required to deliver an effective (usually multi-estate) public website.
Current trends in social media, wireless web, open technology standards and the economy mean that web governance must adopt a broader perspective:
• look outward to consider the organisation’s broader web presence beyond its website
• look inward to drive down costs and improve enterprise efficiency with KM to leverage common technology platforms, content re-utilisation, information lifecycle management and so on.
Organizations are under increasing pressure to manage the costs and risks of servicing customer requests. Whether the request is a loan, claim, or benefit, there is a need for a greater emphasis on automating and tracking inconsistent “incidents” that do not follow a well-defined process. These incidents are the result of new demands from regulators, auditors, and litigants based on external regulations. Moreover, the increased use of collaboration and social media has challenged organizations that rely on static business processes implemented in frozen legacy systems. Dynamic Case Management solves these challenges by providing a means to handle ad hoc and unstructured requests in a reliable way.
Visit us at http://www.softwareag.com Become part of our growing community: Facebook: http://www.facebook.com/softwareag Twitter: http://www.twitter.com/softwareag LinkedIn: http://www.linkedin.com/company/software-ag YouTube: http://www.youtube.com/softwareag
Similar to 20110407 NARA E-Records Forum on RM 20 (20)
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Northeast Ohio Chapter on April 9, 2024, outlined the purpose and benefits of building a RIM Playbook, described the elements of a playbook, described the elements of a ply, and outlined the steps to take to build a playbook.
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Milwaukee chapter on April 25, 2024, reviewed the 6 eras of records management, defined the characteristics of the age of privacy, outlined the concepts of defensible disposition and data minimization, and presented a recommendation to move in the direction of purpose-based retention and a personal information retention schedule.
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Oklahoma chapter on February 15, 2024, introduced attendees to the idea of a business and RIM playbook. Attendees learned about the benefits of a playbook, the elements of a playbook, and the elements of a play. The session concluded with a review of the process for building a playbook from scratch.
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...Jesse Wilkins
This presentation, delivered virtually to the ARMA Chattanooga chapter on February 13, 2024, described the elements of a business assessment, a technical assessment, and a maturity assessment in support of an information management initiative.
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...Jesse Wilkins
This presentation, delivered virtually on February 2, 2024 as part of the Austin ARMA Annual Conference, introduced the idea of a records management playbook. I described the purpose and benefits of a playbook, then outlined the elements of a playbook and the individual plays.
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Greater St. Louis Chapter on January 18, 2024, outlined how to build a records management playbook. The presentation described the benefits of building a playbook, the elements of a playbook, the elements of a play, and how to actually build and maintain one.
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Greater Kansas City Chapter on January 10, 2024, outlined how to build a records management playbook. The presentation described the benefits of building a playbook, the elements of a playbook, the elements of a play, and how to actually build and maintain one.
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....Jesse Wilkins
This presentation, delivered virtually to the ARMA Madison Chapter on December 7, 2023, outlined the value of a business playbook and, specifically, a records and information management (RIM) playbook. Attendees learned about the elements of a playbook and of individual plays and how to construct their own playbooks using a provided template.
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...Jesse Wilkins
This presentation, delivered virtually to the ARMA Florida Gulf Chapter on December 19, 2023, outlined the value of certifications and described three class of certifications including RIM, "RIM-adjacent", and "Other". Attendees received an overview of the 6 RIM certifications and a table comparing their exams and programs. The session concluded with a framework for determining how to select the most appropriate certification based on costs, context, and program visibility and market awareness.
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...Jesse Wilkins
This presentation was delivered virtually to ARMA San Diego on October 5, 2023. It compared and contrasted the various information governance / information management-related certifications and presented a framework for deciding which one(s) to pursue based on an individual's career goals.
20230719 ARMA Canada Professional Development.pptxJesse Wilkins
This presentation, delivered at the ARMA Canada Information Conference on July 19, 2023 in Toronto, outlined a framework for professional development in the IM industry. Attendees learned about the 4 types of learning and the 5 domains IM professionals need to understand. Attendees also received a professional development plan template.
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptxJesse Wilkins
This presentation, delivered on July 17, 2023, at the ARMA Canada Information Conference, compared and contrasted the various IM and IM-adjacent certifications. Attendees also learned how to determine the right certification for them based on their career goals.
20230919 ARMA New England Keynote on IG Industry Trends.pptxJesse Wilkins
This keynote, delivered at the ARMA New England Win with IG seminar on September 19, 2023, outlined the state of the IG industry from three perspectives: what industry analysts are talking about, what the key conference sessions are about, and what individual chapters and vendors are talking about. The session concluded with ways for individuals to keep abreast of developments in IG.
20230117 ARMA MHD Building Your RM Playbook.pptxJesse Wilkins
This presentation, delivered to the ARMA Mile High Denver Chapter on January 17, 2023, outlined the value and benefits of building a records management playbook. Attendees learned about the elements of a playbook and the individual plays within the playbook. The session concluded with a discussion of how to actually build a RM playbook.
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social MediaJesse Wilkins
This presentation, delivered to the ARMA Boston Chapter on June 2, 2016, outlined how to apply information governance practices to social media posts. It described specific social media security threats and gave attendees an opportunity to participate in roundtable discussions.
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...Jesse Wilkins
This presentation, delivered at the MER conference in Chicago on May 23, 2023, introduced attendees to the concept of an information governance playbook. Attendees learned the purpose and value of a playbook, as well as the structure of a playbook and of individual plays. The session concluded with a discussion of how to build and maintain a playbook.
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...Jesse Wilkins
This presentation, delivered to the AIIM True North chapter virtually on September 12th, introduced ChatGPT and other generative AI tools. I briefly introduced and demonstrated ChatGPT and some other generative AI tools. We reviewed some of the more popular use cases and benefits of using generative AI. We also reviewed some of the challenges these tools present for the organization. Finally, we discussed some practices to use these tools safely and effectively in support of real business outcomes.
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptxJesse Wilkins
This session provided the conclusion to the ARMA Nebraska 2023 Spring Seminar in Omaha, Nebraska. Attendees learned what a playbook is, what plays are, and how to develop a RIM/IG playbook tailored to their organization.
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptxJesse Wilkins
This session, delivered at the ARMA Nebraska Spring Seminar 2023 on April 19, 2023, introduced the professional development matrix and walked attendees through how to leverage the matrix to develop their own personal professional development plans.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
20110407 NARA E-Records Forum on RM 20
1. Managing Content Generated by Social Media Tools as Records Jesse Wilkins, CRM AIIM International April 7, 2011 NARA E-Records Forum
2. About AIIM International - Members in 146 countries Independent - Unbiased and vendor neutral Implementation Focused - Processes, not just technology Industry Intermediary - users, suppliers, consultants, analysts, and the channel http://www.aiim.org
3. Jesse Wilkins, CRM Director, Systems of Engagement, AIIM Background in electronic records management, email management, ECM, and social technologies Director, ARMA International Board of Directors (2007-2010) Frequent industry speaker and author AIIM ERM Expert Blogger Instructor for AIIM Certificate Programs 3
4. It’s just a fad…. By the end of 2013, half of all companies will have been asked to produce material from social media websites for e-discovery. Source: “Social Media Governance: An Ounce of Prevention”, Gartner
5. Agenda Use cases for social technologies Commercial vs. enterprise social technologies Managing social content as records
20. Identity management - commercial Need separate accounts for most sites Many sites leveraging identity management Facebook Connect Twitter OAuth
21. Identity management - enterprise Integration into identity infrastructure Ensure security and confidentiality Provide accountability Support for groups and ethical walls Access to other resources inside the organization 21
22. Archiving - commercial Doesn’t exist for most sites Available for Facebook since Oct 2010 Some third-party services available
24. Integration with other systems - commercial Some using FB Connect, Oauth Very little integration into line of business systems - today
25. Integration with other systems - enterprise Allow import from other systems Allow export to other systems 25
26. Auditing and reporting - commercial Most commercial services offer very little in the way of analytics and auditing Some third-party services available, especially for Twitter Social “listening platforms” and CRM (sCRM)
27. Auditing and report - enterprise Significant amounts of information available for reporting Who has done what What has been done to a particular article/item/etc. Any changes made to the system, security, etc. 27
35. Is it a record? Is the information unique and not available anywhere else? Does it contain evidence of an agency’s policies, business, mission, etc.? Is the tool being used in relation to an agency’s work? Is there a business need for the information? Does it document a transaction or decision?
36. What is the record? Individual social network status updates or Tweets? The entire stream over a given period? Many of these tools do not lend themselves to metadata…. Policy and consistency are key
37. Duplication Determine whether content is unique If it’s already being captured elsewhere, treat as a duplicate record or as a non-record A note about co-creation
40. Records management in brief Archive selected items locally Use search queries and monitoring Store selected items locally using search queries or RSS
41. Use the native backup to store locally Store locally using built-in tools
42. Use a third-party service to store locally Store locally using third-party service
47. Conclusion Web 2.0 is here Prohibition is not a realistic option Web 2.0 tools can add significant value to the organization And they can be managed as records Lead your organization to use them effectively
48. For more information Jesse Wilkins, CRM, CDIA+ Director, Systems of Engagement AIIM International +1 (303) 574-0749 direct jwilkins@aiim.org http://www.twitter.com/jessewilkins http://www.linkedin.com/in/jessewilkins http://www.facebook.com/jessewilkins http://www.slideshare.net/jessewilkins
49. Additional Resources “How Federal Agencies Can Effectively Manage Records Created Using New Social Media Tools”, Patricia Franks, Ph.D., IBM Center for The Business of Government, 2010 Guideline for Outsourcing Records Storage to the Cloud, ARMA International, 2010 “Electronic Records Management: Blogs, Wikis, Facebook, Twitter, & Managing Public Records”, Washington State Archives, September 2009
50. Additional Resources “Managing Social Media Records”, U.S. Department of Energy, September 2010 http://cio.energy.gov/documents/Social_Media_Records_and_You_v2_JD.pdf “Best Practices Study of Social Media Records Policies”, ACT-IAC, April 2011 http://www.actgov.org/knowledgebank/whitepapers/Documents/Shared%20Interest%20Groups/Collaboration%20and%20Transformation%20SIG/Best%20Practices%20of%20Social%20Media%20Records%20Policies%20-%20CT%20SIG%20-%2003-31-11%20(3).pdf
51. Additional Resources NARA Bulletin 2011-02, “Guidance on Managing Records in Web 2.0/Social Media Platforms”, October 2010 http://www.archives.gov/records-mgmt/bulletins/2011/2011-02.html “A Report on Federal Web 2.0 Use and Value”, National Archives and Records Administration, 2010 http://www.archives.gov/records-mgmt/resources/web2.0-use.pdf
52. Additional Resources Florida Social Media Toolkit http://sites.google.com/site/flsocmed/ “Friends, Followers, and Feeds: A National Survey of Social Media Use in Government”, NASCIO, September 2010 http://www.nascio.org/publications/documents/NASCIO-SocialMedia.pdf Texas Dept of Information Resources Social Media Policy http://www.texas.gov/en/about/Pages/social-media-policy.aspx
53. Additional Resources Compliance Building Social Media Policies Database http://www.compliancebuilding.com/about/publications/social-media-policies/ 57 Social Media Policy Examples and Resources http://www.socialmediatoday.com/davefleet/151761/57-social-media-policy-examples-and-resources Web 2.0 Governance Policies and Best Practices http://govsocmed.pbworks.com/w/page/15060450/Web-2-0-Governance-Policies-and-Best-Practices
54. Additional Resources Social Media Governance policy database http://socialmediagovernance.com/policies.php “Analysis of Social Media Policies: Lessons and Best Practices”, Chris Boudreaux, December 2009 http://socialmediagovernance.com
Editor's Notes
Keep in touch with remote offices, colleagues, and even familyNetworking - personal, professional, career
Learn new things. Lots of what folks post day-in and day-out is trivial. Then again, so is the RECMGMT-L listserv – and yet how many of you are on that and swear by the value you receive from it?
80% of companies use social media for recruitment – 95% use LinkedIn. And every recruiter and HR manager does due diligence on candidates using Google – and the top links for many are their profiles on LinkedIn, Facebook, etc.
Because information can be easily augmented with photos, videos, and links
[twitter] Web 2.0 considerations and issues[/twitter]
[twitter] Web 2.0 considerations and issues[/twitter]
The first step many organizations take to manage Web 2.0 is to try to block them. This is unrealistic for a number of reasons.
The first step is to determine whether or not something is in fact a record. Just as we know that most email messages are not records, for most organizations their Facebook fan page updates will not be records either. In other words, we have to ask the same questions about these tools that we’d ask about any other type of information:Does it document a transaction or a decision? If it does, it’s probably a record. Is it captured in another form? This is the biggest reason why most social networking sites like Facebook and Twitter wouldn’t need to be captured as records – in most cases they are being used as another transmission mechanism for information stored elsewhere. Now, just because it isn’t a record doesn’t mean it couldn’t be discoverable or a public record and subject to FOIA-type laws. Again, same considerations here as for other types of information. [twitter]Determine whether something is a record or not according to its content and context.[/twitter]
The next step is to determine exactly what is the record and must therefore be retained. Again, this will likely vary not just by content, but also by the nature of the tool. An individual social network status update or Tweet could rise to the level of a record, though I suspect this will be uncommon; in the case of a protracted discussion on someone’s wall or via Twitter, it might be the entire stream of updates on a particular topic or over a given period. This is analogous to determining when an instant message is a record. Many of these tools don’t really have metadata in the traditional sense. Twitter, for example, has the following public metadata: SenderMentions (the @ or DM it is addressed to, and could be more than one)A unique Twitter IDAn in-response-to Twitter ID if it uses the Twitter Reply capabilityA ReTweet ID if it was ReTweetedDate and time sentThe client used to send the update, if knownAny hashtags could be considered metadataBut note what there isn’t: No subject line or topic, no mechanism for filing it, no keywords (except maybe the hashtag). Other systems may offer more or less metadata but it is difficult to access some of that, even if it is retained by the system or commercial provider. The key is to have a records policy that is broad enough to encompass all of these tools and that stresses the content and context of information rather than its format. And as we noted earlier, just because it exists does not make it a record per se.[twitter] The next step is to determine exactly what is the record and must therefore be retained. [/twitter]
Finally, there are enterprise versions of every Web 2.0 application. These enterprise versions are often available to be hosted inside the firewall, meaning that security is much more robust. Access can be secured to them much more effectively. They can be integrated into the organization’s identity infrastructure – whether Active Directory or something else – such that any change, post, comment, edit, update, etc. can all be tracked and, more importantly, tracked to a specific named user. No anonymous postings here. Of course, you have to pay for an enterprise version, but what you’re really paying for is a level of peace of mind. And you still get many of the same benefits – ease of use, familiarity with the type of tool, rapid and agile collaboration across geographical and time boundaries, etc. You’re just getting a more secure and robust version of it. [twitter]Consider implementing enterprise versions. FB is FB, but internal tools might be more appropriate.[/twitter]
At this point I’d be pleased to entertain your questions.
In conclusion, Web 2.0 is not something coming down the road or over the horizon – it’s here today and is probably in your organization, whether you know about it or not. It is all but impossible to effectively prohibit them – and the tools can significantly improve an organization’s collaboration and knowledge sharing, thereby adding value to the organization. It is incumbent on records management professionals to step up and lead your organizations in the effective use and management of these tools.