Learn actionable steps to provide a high-level plan for implementing a privacy program in conjunction with your existing organizational RIM/IG program(s).
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/data-privacy-for-the-im-practitioner-practical-advice-for-preparedness-and-prevention
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...AIIM International
Learn how to develop a clear business case for why your organization needs a legacy system replacement and how YOU can be the champion driving success.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/legacy-system-replacement
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...AIIM International
How do you balance information access with necessary controls? Get a firsthand look at two different successful cloud content management projects.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/cloud-content-management-success-stories
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...AIIM International
Learn how these Intelligent Automation best practices can help you save time, money, and effort by freeing up your manually-driven and paper-based processes.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/intelligent-automation-proven-practices-for-saving-time-money-and-effort
[Webinar Slides] New Approaches to Classification and Retention for Organizat...AIIM International
In this webinar, we explore a new approach to managing your Organizational Intelligence that won’t disrupt user’s work habits.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/new-approaches-to-classification-and-retention-that-wont-disrupt-users-work-habits
Shadow IT is on the rise. While it does have its downsides, it's here to stay, and that means IT needs to embrace these activities. In fact, doing so can create added business value by improving the end user experience.
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...AIIM International
Learn how to develop a clear business case for why your organization needs a legacy system replacement and how YOU can be the champion driving success.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/legacy-system-replacement
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...AIIM International
How do you balance information access with necessary controls? Get a firsthand look at two different successful cloud content management projects.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/cloud-content-management-success-stories
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...AIIM International
Learn how these Intelligent Automation best practices can help you save time, money, and effort by freeing up your manually-driven and paper-based processes.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/intelligent-automation-proven-practices-for-saving-time-money-and-effort
[Webinar Slides] New Approaches to Classification and Retention for Organizat...AIIM International
In this webinar, we explore a new approach to managing your Organizational Intelligence that won’t disrupt user’s work habits.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/new-approaches-to-classification-and-retention-that-wont-disrupt-users-work-habits
Shadow IT is on the rise. While it does have its downsides, it's here to stay, and that means IT needs to embrace these activities. In fact, doing so can create added business value by improving the end user experience.
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Zia Consulting
Recent technology acquisitions, enhanced user needs, new security risks, and varying governance requirements all contribute to the changing landscape of the enterprise content management (ECM) industry and the move toward complete content solutions. Most major corporations recognize that ECM tools can bring about substantial improvements in process efficiency, error reduction, and cost savings, but can be difficult to achieve with legacy systems and outdated methods.
As the complexity of content continues to grow, you need a modern content solution that can respond quickly. However, in this rapidly changing space, it can be hard to understand the available solutions and what to consider in the buying process. Join Zia Consulting, Ephesoft, and ASG Technologies for a discussion on transforming how your organization interacts with your information assets, covering topics such as:
Building business processes that work
Automating information governance
Integrating your content management system with other tools
How to drive actionable data intelligence
Cloud-first/hybrid approach
During this presentation, you will learn how our customers have made significant technology changes and advancements to revolutionize how they do business and manage information. You’ll also hear how we have built solutions that meet the needs of their business faster than ever before.
This session took us through the highs and lows of the ground-breaking research survey conducted by HD to determine the current state of IT organisations’ business focus and process maturity.
How to get a HR system in place fast. Five principles that can help your organisation deploy and leverage new HR technologies. By Owen Pagan, Director of Strategy and Growth at CoreHR. This was originally presented at the CIPD HR Software Show in the Olympia London on June 19th 2014. The presentation discusses Gartner's Nexus of Forces, how it is influencing strategic HR and the development of HR technology by CoreHR.
Kit Collingwood, Principal Consultant at ThoughtWorks, Kit has a wealth of experience in building successful product delivery teams, and helping organisations to utilise and transform data and insight. Kit's expertise lies in helping clients evolve their organisations as they adapt to the constantly changing technological market landscape, balancing business needs with fulfilling customer expectations. Previously Head of Data Transformation at the Department of Work and Pensions, Kit led the strategic and cultural move to modernise the Government department into a fully data-led operation. She spearheaded the One TeamGov initiative and is passionate about offering radically improved services to citizens.
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
This talk will review the breadth of the Internet of Things (IoT), the challenges of Identity Management and the IoT and the impact to Industrial Enterprise.
How To Choose The Right HR Software - 7 Steps To SuccessCoreHR
CIPD HR Software Show 2015, what a great two days!
This was our showcase presentation 'How To Choose The Right HR Software - 7 Steps To Success' if you missed us at the event.
Selecting a new piece of HR software can be a daunting task. There’s a lot to think about. At the end of the day, the chosen software won’t just affect the HR department – it’ll affect the organisation as a whole.
Visit our website at www.corehr.com for more information on the latest HR and Payroll technology.
Join RES Software and other industry guests as we discuss the trends and obstacles that IT organizations should be prepared to face in the coming year. Get insight into what you can do today to prepared for future changes within your organization.
Creating an IT Revolution within your Organization - QuickBase, Inc. at CIO V...QuickBase, Inc.
CIO Visions presentation by QuickBase, Inc. highlighting the major market trends of Digital Transformation, Citizen Development, Unification of Business & IT, and the Broadening App Ecosystem. Ankit Shah, Senior Manager, Product Marketing
Jeffrey Sweet - Third Party Risk Governance - Why? and How?centralohioissa
In this session information will be presented on Third Party Risk Governance. The presenter will provide a better understand of the what’s, why’s and how’s of a Third Party Risk Governance program and provide some suggestions on sources for a program as well as some of the typical “gotchas”. This presentation will also provide common objections from the recipients of assessments and how to overcome those objections as well as discuss contract language that can be added to your products and services contracts.
Flexible and Secure Workspaces for the Modern EnterpriseRES
Join webinar guest ESG analyst and industry expert Mark Bowker as he talks through top challenges faced by IT in enabling today’s workforce and the steps that your organization can take to begin delivering more secure and flexible workspaces to workers.
Watch the full webinar at www.ressoftware.com/voice
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...Aggregage
In this interactive discussion, Wrike’s Nick Roco, Steve Luch, and Alexis Barone will provide recommendations on how to deliver employee experiences that separate you from your competition.
William Diederich - Security Certifications: Are They Worth the Investment? A...centralohioissa
The IT world seems to be exploding with certifications, with new ones being offered practically every month. How does one chose from all of the options available, and are they worth it?
This session discusses the plethora of Governance, Risk, Compliance, Security and Technology related certifications being offered today. What are the benefits, and which are the most highly valued? Most importantly, which ones are right for you? Can one get too many certifications, and what’s the balance?
Practical tips and recommendations are offered to help the person who decides on attaining certifications. Including, how to select the best certifications, how to plan a roadmap for achieving them, and successfully completing the plan they set out.
Lastly, the benefits of certifications are discussed, and how to maximize their value.
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...TrustArc
Raising capital is necessary, and a sometimes painful task most companies endure. Positioning your company, team, and product in a way that is irresistible for investors is an art. So why do you need to think about your Privacy Program when knocking on investors' doors?
A strong privacy understanding and prioritization will be a differentiator with investors. Every business must deal with privacy in some capacity, but those who can incorporate it into their DNA will establish they are planning forward.
Our special guest, Beatrice Botti, VP - Global Data & Privacy Officer at DoubleVerify will discuss how privacy plays a role in her company growth, and our expert panellists will help you identify the right steps to make privacy a key differentiator that will set you apart even more in your next funding round.
This webinar reviews:
- Why building a privacy program will benefit your company
- How to build a robust privacy management program that’s ready for investor questions
- How to grow privacy as a competitive differentiator while building your company
- How PrivacyCentral will scale with you and optimize Privacy - workflows
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Zia Consulting
Recent technology acquisitions, enhanced user needs, new security risks, and varying governance requirements all contribute to the changing landscape of the enterprise content management (ECM) industry and the move toward complete content solutions. Most major corporations recognize that ECM tools can bring about substantial improvements in process efficiency, error reduction, and cost savings, but can be difficult to achieve with legacy systems and outdated methods.
As the complexity of content continues to grow, you need a modern content solution that can respond quickly. However, in this rapidly changing space, it can be hard to understand the available solutions and what to consider in the buying process. Join Zia Consulting, Ephesoft, and ASG Technologies for a discussion on transforming how your organization interacts with your information assets, covering topics such as:
Building business processes that work
Automating information governance
Integrating your content management system with other tools
How to drive actionable data intelligence
Cloud-first/hybrid approach
During this presentation, you will learn how our customers have made significant technology changes and advancements to revolutionize how they do business and manage information. You’ll also hear how we have built solutions that meet the needs of their business faster than ever before.
This session took us through the highs and lows of the ground-breaking research survey conducted by HD to determine the current state of IT organisations’ business focus and process maturity.
How to get a HR system in place fast. Five principles that can help your organisation deploy and leverage new HR technologies. By Owen Pagan, Director of Strategy and Growth at CoreHR. This was originally presented at the CIPD HR Software Show in the Olympia London on June 19th 2014. The presentation discusses Gartner's Nexus of Forces, how it is influencing strategic HR and the development of HR technology by CoreHR.
Kit Collingwood, Principal Consultant at ThoughtWorks, Kit has a wealth of experience in building successful product delivery teams, and helping organisations to utilise and transform data and insight. Kit's expertise lies in helping clients evolve their organisations as they adapt to the constantly changing technological market landscape, balancing business needs with fulfilling customer expectations. Previously Head of Data Transformation at the Department of Work and Pensions, Kit led the strategic and cultural move to modernise the Government department into a fully data-led operation. She spearheaded the One TeamGov initiative and is passionate about offering radically improved services to citizens.
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
This talk will review the breadth of the Internet of Things (IoT), the challenges of Identity Management and the IoT and the impact to Industrial Enterprise.
How To Choose The Right HR Software - 7 Steps To SuccessCoreHR
CIPD HR Software Show 2015, what a great two days!
This was our showcase presentation 'How To Choose The Right HR Software - 7 Steps To Success' if you missed us at the event.
Selecting a new piece of HR software can be a daunting task. There’s a lot to think about. At the end of the day, the chosen software won’t just affect the HR department – it’ll affect the organisation as a whole.
Visit our website at www.corehr.com for more information on the latest HR and Payroll technology.
Join RES Software and other industry guests as we discuss the trends and obstacles that IT organizations should be prepared to face in the coming year. Get insight into what you can do today to prepared for future changes within your organization.
Creating an IT Revolution within your Organization - QuickBase, Inc. at CIO V...QuickBase, Inc.
CIO Visions presentation by QuickBase, Inc. highlighting the major market trends of Digital Transformation, Citizen Development, Unification of Business & IT, and the Broadening App Ecosystem. Ankit Shah, Senior Manager, Product Marketing
Jeffrey Sweet - Third Party Risk Governance - Why? and How?centralohioissa
In this session information will be presented on Third Party Risk Governance. The presenter will provide a better understand of the what’s, why’s and how’s of a Third Party Risk Governance program and provide some suggestions on sources for a program as well as some of the typical “gotchas”. This presentation will also provide common objections from the recipients of assessments and how to overcome those objections as well as discuss contract language that can be added to your products and services contracts.
Flexible and Secure Workspaces for the Modern EnterpriseRES
Join webinar guest ESG analyst and industry expert Mark Bowker as he talks through top challenges faced by IT in enabling today’s workforce and the steps that your organization can take to begin delivering more secure and flexible workspaces to workers.
Watch the full webinar at www.ressoftware.com/voice
De-Siloing Project Coordination: Why You Need to Prioritize The Employee Expe...Aggregage
In this interactive discussion, Wrike’s Nick Roco, Steve Luch, and Alexis Barone will provide recommendations on how to deliver employee experiences that separate you from your competition.
William Diederich - Security Certifications: Are They Worth the Investment? A...centralohioissa
The IT world seems to be exploding with certifications, with new ones being offered practically every month. How does one chose from all of the options available, and are they worth it?
This session discusses the plethora of Governance, Risk, Compliance, Security and Technology related certifications being offered today. What are the benefits, and which are the most highly valued? Most importantly, which ones are right for you? Can one get too many certifications, and what’s the balance?
Practical tips and recommendations are offered to help the person who decides on attaining certifications. Including, how to select the best certifications, how to plan a roadmap for achieving them, and successfully completing the plan they set out.
Lastly, the benefits of certifications are discussed, and how to maximize their value.
TrustArc-Webinar-Slides-2022-03-01-Is Your Privacy Program Ready for a Fundin...TrustArc
Raising capital is necessary, and a sometimes painful task most companies endure. Positioning your company, team, and product in a way that is irresistible for investors is an art. So why do you need to think about your Privacy Program when knocking on investors' doors?
A strong privacy understanding and prioritization will be a differentiator with investors. Every business must deal with privacy in some capacity, but those who can incorporate it into their DNA will establish they are planning forward.
Our special guest, Beatrice Botti, VP - Global Data & Privacy Officer at DoubleVerify will discuss how privacy plays a role in her company growth, and our expert panellists will help you identify the right steps to make privacy a key differentiator that will set you apart even more in your next funding round.
This webinar reviews:
- Why building a privacy program will benefit your company
- How to build a robust privacy management program that’s ready for investor questions
- How to grow privacy as a competitive differentiator while building your company
- How PrivacyCentral will scale with you and optimize Privacy - workflows
Delivered at Trend Micro's Executive briefing events Sydney and Melbourne 5-6 June 2017 on Australia's new Mandatory Data Breach Notification legislation. YoutubeVideo available at https://youtu.be/j5nmY916H7k
Data protection: Steps Organisations can take to ensure complianceEquiGov Institute
This presentation highlights the major principles and rights enshrined in the General Data Protection Regulations (GDPR) as well as 10 steps organisations (whether large or small) can take to ensure compliance.
Records Managers within Law Firms have a tough job, providing and enforcing policies, building out defensible procedures and overseeing an information lifecycle program. Over the years process has changed, regulations have been tightened and expectations have heightened.
In this presentation, understand how Information Governance (IG) is playing a major role in the evolution of Records Management within Law Firms. Information Governance is a term being thrown around and many (or at least those brave enough to admit it) are unsure of what it really means. IG relies on automation, systems, tools and compliance to succeed. With records managers focus on risk avoidance, join us to better understand the new expectations of records managers to protect your firm as well as steps to implementing an IG Program.
The 3 Phased Approach to Data Leakage Prevention (DLP)Kirsty Donovan
https://www.securityforum.org/research/data-leakage-prevention-briefing-paper/
This presentation, drawn the the ISF's latest Data Leakage Prevention briefing paper, provides a 3-phased approach to implementing an effective data leakage prevention programme, that goes beyond installing DLP tools and technology.
By implementing a DLP programme, organisations can significantly reduce the risk of data leakage to protect their reputation, avoid litigation, meet regulatory obligations and protect IP’s.
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
My slide deck used in People Management Association of the Philippines' (PMAP) Data Privacy Act Forum held last 18 SEP 2017 at Ace Hotel & Suites, Pasig City.
As privacy and security professionals it's true: we simply can't get enough data on the costs of a data breach. This is primarily driven, of course, by our desire to quantify the risks associated with our profession in terms that organizations can understand and measure. Our quest is complicated, however, by the fact that breach cost data is so hard to come by.
This unique webinar will take data breach analysis to the next level. First we'll define our terms and review of some of the best known, publicly available data breach research. But then, we'll dive into a more detailed, exhaustive, quantitative review of breach data. This will include both case studies of a few seminal data breaches and statistical analysis of data breaches in the aggregate.
Our featured speaker for this timely webinar is Patrick Florer, Co-Founder & CTO of Risk Centric Security. Patrick, who is also a Fellow and Chief Research Analyst at the Ponemon Institute, has decades of experience in risk analysis and analytics and is considered an expert in data breach analysis.
On-demand recording link:https://info.trustarc.com/WB-2019-06-19-GDPR-Compliance-Convince-Customers-Partners-Board.html?utm_source=slideshare
Many companies have invested significant time and resources trying to design and implement GDPR compliance programs. Internally, they may have generated hundreds or thousands of pages of project plans, policies, processes and reports – including records of processing, DPIA reports and much more. But how can you demonstrate to internal stakeholders, clients and partners that you have a comprehensive program and that your processes and products are GDPR-compliant?
This webinar will provide these key takeaways:
-The current state of an official GDPR certification and codes of conduct
-Case studies of how companies are demonstrating compliance
-The benefits of an external third party GDPR validation
Using international standards to improve US cybersecurityIT Governance Ltd
Understand the current cyber threat facing US businesses, President Obama's proposed data protection act and how you can implement international standards to get your business cybersecure in this informative webinar with expert Alan Calder.
Current enterprise information security measures continue to fail us. Why is ...Livingstone Advisory
Conventional information security measures continue to fail our businesses in today’s rapidly changing world of cyber-risk. Adverse cyber-events manifest themselves as the usual suspects including data breaches, information theft, ransom- and malware, viruses, payment card fraud, DDOS attacks or physical loss – to name but a few.
Problem is, the tally of adverse events keeps mounting up. While headline adverse cyber incidents are now reported in the media with regularity, this represents the tip of the cyber-risk iceberg. Most known events are either unreported or hidden from public disclosure. Not helping, is the industry analysis suggesting that, on average, nearly half of all adverse cyber-risk events impacting organisations are self-inflicted and avoidable. No industry is untouched.
Delivered at the CIO Summit in Melbourne, Australia in November 2016, in this presentation, Rob offers valuable strategic insights into the problem and why it continues to be a problem.
He outlines some practical steps that will be helpful for CIOs and CISOs in reshaping their own organisation’s approach in building a more effective and resilient information security capability.
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io
Two years after Cambridge Analytica, personal data is still at the forefront of the conversation. Consumers all vehemently care about what companies do with their data. Privacy is on everyone’s mind (not just the older, wealthier bracket). The pandemic has only accelerated these concerns, which marked 2020 as a significant year for data management. As businesses face new technological challenges amid COVID-19, the topic of privacy has drawn an increasingly bright spotlight. This sensitivity regarding data privacy has only been growing — and companies are responding accordingly.
Create, Capture, Collaborate - Your Content Drives Organizational ValueAIIM International
Get an in-depth look at the first step of Intelligent Information Management (IIM) where it's all about your content – creating it, capturing it, and collaborating with it. Click through this ebook preview, to explore changing business drivers that are impacting the crucial first step in the information lifecycle.
Download a Free copy of the eBook here: https://info.aiim.org/create-capture-collaborate
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...AIIM International
Meet Your CIP Expert Panel
We thank these IIM executives – all Certified Information
Professionals (CIPs) – for their commitment to share their expertise and time in order to improve the overall level of competence and knowledge within the industry.
Quotes within this report in each CIP Expert section were made
during a special panel discussion of the survey results on March 4, 2021. The intention was to use the survey findings as a foundation for a conversation focused not just on the trends suggested by the data, but on what to do about them. To ensure confidentiality and candid perspectives, this discussion was conducted under a variation of “Chatham House” rules.
The quotes within the report are intentionally not attributed to
the individual participants in the Panel and reflect individual
perspectives rather than those of the organizations they represent.
Get a FREE copy of the report here: https://info.aiim.org/state-of-the-intelligent-information-management-industry-2021
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...AIIM International
In this webinar, we’ll show you how to truly connect the dots - from O365, to network folders, line of business applications, and beyond!
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/driving-digital-change-with-o365-and-iim
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...AIIM International
In this webinar, we’ll share the 5 Essential Capabilities every digital transformation initiative needs to succeed.
Want to follow along with the webinar replay? Download it here for FREE: working-smarter-and-faster-in-a-digital-transforming-world
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence ChannelsAIIM International
In this webinar, we’ll show you how to get more out of your existing content with Artificial Intelligence in very achievable ways.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/using-ai-to-easily-automate-all-of-your-correspondence-channels
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...AIIM International
In this webinar, exclusively for BPOs and Outsourced Service Providers, we share with you the results of our recent survey from the leaders of capture projects. Find out how Parascript works with its partners to ensure that customers improve and update their capture platform and processes.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/capture-leaders-and-their-projects-2019
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...AIIM International
In this webinar, learn the value that e-signature workflow content automation can bring to your operations to support your digital business transformation strategy. You will also get a walk-through of an optimized workflow in SharePoint Online that will illustrate how enterprises can digitize their content processes and enhance their customer & partner journeys.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/how-to-extend-the-value-of-your-information-management-systems
[Webinar Slides] Your 2019 Information Management Resolution: Part TwoAIIM International
n this webinar, we'll explain the IIM toolkit, and how it can be applied to your everyday work to reach your digital transformation goals as well as offer practical advice on how to get started.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/your-2019-information-management-resolution-2
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
Check out these webinar slides to learn the latest ways Office 365 is providing the tools to develop and implement a modern records management strategy to take charge of the data explosion.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/data-explosion-in-your-organization-harness-it-with-a-comprehensive-records-management-strategy
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...AIIM International
Join us as we share best practices for the capturing of key information and data from paper and electronic documents and forms.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/effectively-capturing-paper-and-digital-documents-in-your-existing-applications
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...AIIM International
In this webinar, we’ll teach you how to take advantage of your Office 365 and SharePoint implementations as well as improve the ROI of your existing software investments.
Want to follow along with the webinar replay? Download it here for FREE: http://info.aiim.org/improving-your-collaborative-and-case-centric-processes
[Webinar Slides] Modern Problems Require Modern SolutionsAIIM International
In this webinar, we pinpoint common problems with meeting content strategies of today, learn how to address the struggles with legacy solutions as well as how to tackle them head-on.
Want to follow along with the webinar replay? Download it here for FREE: http://info.aiim.org/modern-problems-require-modern-solutions
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...AIIM International
In this webinar, we’ll examine ways that RPA can help your organization tackle these challenges. We’ll take a detailed look at actual customer case studies involving data migration projects large and small, and how RPA can help.
Want to follow along with the webinar replay? Download it here for FREE: http://info.aiim.org/dreading-your-data-migration-project
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...AIIM International
In a cloud and virtualized environment, information variety and volume are growing geometrically. As such, organizations are struggling to take advantage of cloud, mobile and consumer technologies while connecting to their back-end systems of record. No one person has the time or energy to sort through thousands of files to a) identify records or b) pull metadata for the records. That's where analytics enters the equation. Learn how we used analytics tools and methods to resolve our information migration challenges.
[AIIM18] Intelligent Information Management – Platinum Hit? Or Just Backgroun...AIIM International
How are user organizations using key IIM capabilities and technologies to transform their organizations? What challenges are they facing? How do they grade their own capabilities? How is IIM competence tied to business success?
And most importantly, is IIM a sustainable and long-term description of the mindset we need to address Digital Transformation challenges and the methodologies we will apply to these challenges? Will IIM ultimately be a Platinum hit? Or just background Muzak?
[AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and E...AIIM International
In this session you'll learn multiple data regulations and multiple differences, eight fair information practices and principles, additional data protection principles, as well as interesting and fun GDPR points.
[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...AIIM International
On the heels of introducing breakthrough Artificial Intelligence, Internet of Things, and "Fintech" initiatives into the enterprise, Farmers recognized a need to modernize its records and information management strategy to support and protect these new capabilities. The organization invested in talent, research, eDiscovery tools and policy development to solve some of the highly-regulated industry's most complicated challenges including email retention, legal hold defensibility and records compliance.
[AIIM18] Welcome to the Digital Age, North Carolina Courts: Our Document Auto...AIIM International
Paper filings with the North Carolina courts take up 4-1/2 miles of new shelving each year. These voluminous public records are full of sensitive information. The move to electronic filing is inevitable -- and fraught with new challenges. The practical obscurity afforded by paper files is lost, and protecting sensitive information like social security numbers becomes more challenging. The risk of dissemination increases in the digital world where information can literally circle the globe and never be retrieved. The solution to these challenges? Automation. Now, documents requested by the public are queued for intelligent redaction. Reviews for quality assurance, micrographics, and disposition are automated through workflows. While once deemed "safer" our paper-centric processes used to limit our capacity to process the permanent records of our citizens. Find out how we changed our mindsets and learned to love automation technology.
[AIIM18] When Billions are at Stake: an ECM mega project at Bradesco Bank - A...AIIM International
Bradesco is one of the largest banking and financial services companies in Brazil with over 5,000 branches and approximately $400 billion in assets. What began 7 years ago has now become an ECM project of significant scope -- hundreds of subprojects, thousands of scanners and millions of documents. How has the Bradesco implementation team managed so many moving parts and exceeded ROI? Bradesco executive, Anderson Goncalves shares the winning practices that have earned a nomination for AIIM's Innovation Award.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Accelerate your Kubernetes clusters with Varnish Caching
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for Preparedness and Prevention
1. Underwritten by:
#AIIMYour Digital Transformation Begins with
Intelligent Information Management
Data Privacy for the IM Practitioner:
Practical Advice for
Preparedness and Prevention
Presented February 26, 2020
Note – the art of this
cover slide will change.
Data Privacy for the IM Practitioner:
Practical Advice for Preparedness and Prevention
An AIIM Webinar presented February 26, 2020
2. Underwritten by:
Today’s Speakers
Kevin Craine
Content Strategist, AIIM
Host of AIIM On Air
John Montaña, J.D., FIIM, FAI
VP, Information Governance at Access
CEO, Montaña & Associates an Access Company
Host: Theresa Resek, CIP
VP, Market Intelligence
AIIM
4. Underwritten by:
Driving Demand for Data Privacy
• Data privacy is on the mind of
C-Suite leaders in all industries.
• No organization is safe from
potential cyber theft and intrusion.
• In 2019, 2.7 billion identity records
were exposed by hackers and
placed for sale on the internet.
• Legislation worldwide has become
increasingly strict.
• Expectations are ever-evolving.
• Perception is everything in the eyes
of the market.
6. Underwritten by:
Volume, Velocity, and Variety
• Organizations anticipate the volume of information
will grow from X to 4.5X in the coming year.
• Over 60% of that information sprawl is
unstructured.
• Organizations are embracing technologies and
approaches that automate governance and
compliance.
• According to AIIM research, 51% of organizations
say that they are planning to spend “more” or “a
lot more” on information governance over the next
18-24 months.
7. Underwritten by:
Inevitable and Costly
• Experts tell us that the question is
not IF it will happen, but WHEN.
• The chances of being struck by
lightning = one in a million.
• The chances of organizations getting
hacked this year = one in four.
• The average total cost of a single
data breach is estimated at nearly $4
million.
• That calculation can certainly be
much higher – legal expense, fines,
and penalties; the loss of goodwill in
the market.
8. Underwritten by:
Recommendations
Implement a formal approach.
Have a plan and stick to it.
Regularly (annually) review, evaluate, and update your plan as
needed.
Place the privacy and security of information on the front burner of
strategic concerns.
9. Underwritten by:
John Montaña, J.D., FIIM, FAI
VP, Information Governance at Access
CEO, Montaña & Associates an Access Company
Introducing our Speaker
10. Underwritten by:
You say that Legislators
don't understand how
large companies work.
What do you mean by
that?
11. Underwritten by:
Legislation is Created in a Silo
Just knowing
what’s there – it’s
a lot of law, in a
lot of places
Outright conflicts – minimum
retention requirements versus
maximum permissible retention
Interpreting
dated or
vague laws
IT configuration – how to
make it all work in a big IT
environment
Administrative complexity – how
to manage dozens or hundreds of
unique requirements
12. Underwritten by:
What are some of the
considerations that IIM
pros must deal with that
legislators miss in the mix?
13. Underwritten by:
Considerations for Applying Privacy Legislation
Applying Legislation to Today… Taking into Account Yesterday…
Legislation was written without consideration for:
• Back file of old IT systems and physical boxes of records
• Most IT systems available when the laws were written are not capable of applying
law
• Even if capable, they are often not configured in a manner that supports being
compliant
• Non-compliant implementations are difficult to undo
14. Underwritten by:
Let’s talk about specific steps
to build an effective privacy
plan. You say it’s important
to start with a thorough
understanding of the current
capabilities within the
enterprise. Isn’t that just
more “analysis paralysis?”
15. Underwritten by:
Utilize Project Management Principles
1 2 3
4 5
Develop a clearly written
initial project scope /
charter / documentation
Develop a high-level project
roadmap / framework
• What industry / data types you are trying to
apply “privacy” to
• What is the information life-cycle for PII / SI?
• Establish a timeline with realistic milestones
• Regularly adjust / incorporate PIA findings
Clearly establish roles /
responsibilities – decision
rights
• Chief Privacy Officer (CPO) / Data
Protection Officer (DPO)
• Privacy Office (PO)
Develop a communication /
marketing plan
Prepare a budget
16. Underwritten by:
Now that I’ve surveyed
the technical
environment...
what’s next?
What are some steps
to build a meaningful
project plan?
17. Underwritten by:
Building the Privacy Program
Core Components Review
Create inventory
of Personal
Information Banks
(PIBs)
Develop staff
education and
awareness training and
collateral and
Communication plan
Post Privacy Policy and
Principles on the
organization’s website
Develop Privacy Notice
signage and arrange
for posting in relevant
areas (such as those
with video capture)
Actually apply the
retention schedule and
purge data that is not
needed
Do not collect
unnecessary data
that is not required
or contains PII
18. Underwritten by:
Once I have a plan, I’ve
got to sell it...not only to
company executives, but
also other stakeholders
(regulatory boards). Can
you outline some success
tips for gaining support
and buy-in?
19. Underwritten by:
Building Relationships with Stakeholders
Stakeholders are - ALL Staff / Third Parties / Customers that contribute, come in contact with or are affected by PII / SI
• Customers
• Shareholders
• Steering CommitteeAssurance Groups – Legal, Audit,
Compliance, Risk HR
Operations – Sales, Marketing, R&D,
Field Workers etc.
Chief Privacy Officer (CPO) / Data Protection Officer (DPO) Third-Parties / Contractors
Regulatory Agencies
Privacy Office (PO)
Board of Directors / Executive Team
IT
20. Underwritten by:
What about getting
front-line workers
onboard to adapt and
use new and changed
systems and policies?
21. Underwritten by:
Privacy Training
Appropriately Train ALL staff
and Third-Parties
Types of training
Do not overcomplicate
Market your privacy program
• Train the trainer
• Executives are not exempt
• CBT
• Live / In-person
• Manuals / Guides
• Workshops
• Keep language simple/ keep
cultural differences in mind
• Recognize top performers
Frequency of the training
• Annual
• New Hire
• Incident Based
• Third party / Contractor
Test the Privacy Incident
Response Plan
• Send out mock phishing emails
• Where is more training needed
• Log results – training & testing
Everyone who belongs to, or works with, an organization is responsible to
protect the PII / SI of the company and associated stakeholders!
22. Underwritten by:
One thing that is certain,
the rate of change is not
going to slow down. How
can we design our privacy
programs so that they will
be flexible and adapt to
changes in regulations,
technologies and market
expectations?
24. Underwritten by:
How Organizations Can Successfully Move Forward
Level Set
Expectations
Understand Current
Capabilities
Make Your Case
Change Is Your Only
Constant
28. Underwritten by:
#AIIMYour Digital Transformation Begins with
Intelligent Information ManagementYour Digital Transformation begins with
Intelligent Information Management