IBM Information Management Software - The New Information Agenda
By: IBM View more from IBM >>
Download this next:
Top 10 information management stories of 2019
By: TechTarget ComputerWeekly.com
Type: eGuide
Consolidation and acquisition marked the supplier side of the IT industry in respect of information management in 2019. The question of how modern BI and analytics software shapes up to non relational big data is addressed and suggests that data integration is the enduring, difficult problem for CIOs to solve. Here are Computer Weekly’s top 10 information management stories of 2019.
These are also closely related to: "IBM Information Management Software - The New Information Agenda"
-
Infographic: 6 information governance best practices
By: TechTarget ComputerWeekly.com
Type: Infographic
Information governance can streamline an organization's data management, cut storage costs and ensure compliance, which are all critical for content management.
To ensure appropriate content management, organizations need to have controls, permissions and acceptable use policies for data assets. However, as organizations rely more on cloud storage to streamline remote access to content amid the pandemic, content management professionals should reexamine their information governance policies.
Best practices, such as forming a committee, accounting for collaboration tools and creating reports, can guide the way.
-
Information siloed is not information at all - It is just data
By:
Type: Video
In any organization and in any setting, whether it be the intelligence game or internal risk management and governance, siloed information is nothing more than bits and bytes taking up space. To break down information silos requires a place to store the information, interlink it and display it, and brave party to lead the discovery of that means for their information. Instead of focusing on the different aspects of the information we hold, we need to focus on what our part contributes to enriching a greater view. This presentation looks at the evolving story of one client with Archer and how it is starting to attract other areas outside of its silo to share their information and work from a common base or tool.
Find more content like what you just read:
-
Information siloed is not information at all - It is just data
By:
Type: Replay
In any organization and in any setting, whether it be the intelligence game or internal risk management and governance, siloed information is nothing more than bits and bytes taking up space. To break down information silos requires a place to store the information, interlink it and display it, and brave party to lead the discovery of that means for their information. Instead of focusing on the different aspects of the information we hold, we need to focus on what our part contributes to enriching a greater view. This presentation looks at the evolving story of one client with Archer and how it is starting to attract other areas outside of its silo to share their information and work from a common base or tool.
-
Self-service Information Consumption Using Data Catalog (APAC)
By:
Type: Replay
Market research shows that around 70% of the self-service initiatives fare “average” or below. Denodo 7.0 information self-service tool will offer data analysts, business users and app developers searching and browsing capability of data and metadata in a business friendly manner for self-service exploration and analytics. Attend this session to learn: - How business users will be able to use Denodo Platform integrated google-like search for both content and catalog - With web based query UI how business users can refine queries without SQL knowledge - With tags and business categorization, how to standardize business / canonical views while decoupling development artifacts from the business users Agenda: - The role of information self-service tool - Product demonstration - Summary & Next Steps - Q&A
-
Information technology skills guide
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Author and IT consultant, Terry Critchley, looks at potential solutions to the apparent skills crisis facing the IT industry, in this special guide for Computer Weekly.
-
Cyber Winter Wonderland: Enhancing Resilience in Information Security
By:
Type: Video
Step into the cyber wonderland with us as we explore the core functions of cybersecurity and the governance required to navigate the uncertainties of future cyber risks. Whether you're a CISO, manager or IT admin, this webinar offers a holistic perspective for securing your organization's digital ecosystem. Agenda: Strategies for Today: - Keeping up with the ever-changing cyber risk landscape - Unraveling the inadequacies of traditional information security strategies in today's dynamic environment - Exploring identity as the new frontier in cybersecurity - Understanding essential posture management techniques - Constructing cyber resilience for the future - Governance for Tomorrow: - Developing strategies for both the known unknowns and unknown unknowns - Crafting effective governance, risk management, and compliance (GRC) policies - Anticipating shifts in regulations and compliance frameworks - Implementing expert guidance amidst uncertainty *Important Notice: This pertains to a webinar recording, and any prize giveaways featured in the recording are deemed null and void.
-
PRB: Informative session for consultancies and providers supporting PRB banks
By:
Type: Talk
Principles for Responsible Banking: Informative session for consultancies and providers supporting PRB banks The Principles for Responsible Banking (PRB) are a unique framework for ensuring that the strategies and practices of signatory banks align with the vision that society has set out for its future in the Sustainable Development Goals and the Paris Climate Agreement. Over 270 banks representing over 45% of banking assets worldwide have now joined this movement for change. We acknowledge that many consultancies, service, and assurance providers are supporting banks in their PRB implementation or providing assurance for their annual reports. The objective of this webinar is to offer to these finance professionals, a comprehensive explanation of PRB requirements, impact analysis and target setting expectations, and highlight key documents for the implementation. Agenda: • Principles for Responsible Banking requirements • Impact analysis expectations • What a good target under PRB is • Assurance requirements
-
3 tips for improved information risk management
By: Tanium
Type: White Paper
Many businesses have identified a gap between their ideas of information risk management strategies and the maturity of their implementations. Through considering the experiences of 12 security professionals, the “Information Risk Management—Expectations Versus Reality” report explores this gap. Continue reading to unlock insights.
-
How do cybercriminals steal credit card information?
By: TechTarget ComputerWeekly.com
Type: eGuide
Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
-
How to tackle information overload
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.
-
Metropolitan Police Freedom of Information disclosure on investigations into WikiLeaks
By: TechTarget ComputerWeekly.com
Type: Resource
Letter from the Met Police to Stefania Maurizi, an investigative journalist with Italy's La Repubblica newspaper, confirming that the police service shared correspondence about one or more of three named WikiLeaks British editorial staff with the US Department of Justice. The letter is a response to a freedom of information request by Maurizi.
-
What is PHI (Protected Health Information)?
By:
Type: Video
Protected health information, or PHI -- sometimes also referred to as personal health information -- is any information collected via healthcare services that can potentially identify an individual. This includes medical histories, test results, insurance information, and more. PHI is important for treating individuals and aids in research initiatives, but is also a target for hackers. If not secured properly, PHI can be stolen, sold, or encrypted.
-
Share your tech purchasing decisions for 2024
By: TechTarget
Type: Landing Page
TechTarget and Enterprise Strategy Group are conducting this survey to understand how your technology research journey and your tech buying team have changed over the past two years.
-
Security Think Tank: Biden's Cyber Security Plan
By: TechTarget ComputerWeekly.com
Type: eGuide
As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
-
Where to find MyPension365 information
By:
Type: Video
Where to find MyPension365 information for Advisors, Employers and Employees.
-
From Technical Writer To Information Architect
By:
Type: Talk
In this episode of Coffee and Content, we chat with Brendon Paucek, an Information Architect at Jamf. Brendon will share his professional journey, transitioning from a technical writer to an information architect. We plan to explore the steps involved in moving from creating product documentation to designing information experiences. We'll chat with Paucek about the skills that connect tech writing and information architecture (IA), and how these roles work together to enhance customer experiences. We'll invite him to share real-life examples that illustrate the synergy between technical writing and IA. Additionally, we'll ask for his insights on how both disciplines enhance content strategy and boost customer satisfaction. Can’t make it? Register, and we’ll send you a link you can use to watch a recording when it’s convenient for you. Coffee and Content is brought to you by The Content Wrangler and sponsored by Heretto, a powerful component content management (CCMS) platform to deploy help and API docs in a single portal designed to delight your customers.
-
Drive digital transformation by changing ITSM processes in tandem
By: ServiceNow
Type: eGuide
If digital transformation is on your CIO agenda, then a top-of-class ITSM strategy had better be also. In this expert guide, Emily McLaughlin, Content Development Strategist at searchCIO, converses with several notable CIOs who identify their organizations' biggest ITSM pain points, including business-user expectations and risk.
-
HSBCnet Account Information and Reporting
By:
Type: Video
HSBCnet Account Information and Reporting for larger CMB customers. Pre-recorded demo and Q&A
-
Business Benefits on Information Security Frameworks
By:
Type: Replay
The speed at which technology and cybercrime rapidly evolve makes it increasingly difficult for organisations to remain cyber-secure and compliant. Consequently, the need to implement effective Information Security frameworks has heightened. With these frameworks in place, organisations can define the processes and procedures to assess, monitor, and mitigate cyber risk. Our upcoming webcast, ‘Business Benefits of Information Security Frameworks’, explores the business value of Information Security frameworks and how to build a robust cyber security strategy. This 45-minute webcast will discuss: • The why and what of standards, regulations, policies, and frameworks • Business benefits associated with Information Security frameworks • Pitfalls to watch out for when engaging with Information Security frameworks • How to best approach ISO 27001 certifications
-
Business Benefits on Information Security Frameworks
By:
Type: Replay
The speed at which technology and cybercrime rapidly evolve makes it increasingly difficult for organisations to remain cyber-secure and compliant. Consequently, the need to implement effective Information Security frameworks has heightened. With these frameworks in place, organisations can define the processes and procedures to assess, monitor, and mitigate cyber risk. Our upcoming webcast, ‘Business Benefits of Information Security Frameworks’, explores the business value of Information Security frameworks and how to build a robust cyber security strategy. This 45-minute webcast will discuss: • The why and what of standards, regulations, policies, and frameworks • Business benefits associated with Information Security frameworks • Pitfalls to watch out for when engaging with Information Security frameworks • How to best approach ISO 27001 certifications
-
IT Priorities 2021 - European Topics Infographic
By: TechTarget ComputerWeekly.com
Type: eGuide
This year, a survey was conducted quizzing nearly 500 European IT sector professionals to gather what topics they identified as being imperative for 2021. In this infographic see whether remote working is here to stay, if there will be shifts in information management trends and what infrastructure tools will be deployed by most in 2021.
-
Share your tech purchasing decisions for 2024
By: TechTarget
Type: Landing Page
TechTarget and Enterprise Strategy Group are conducting this survey to understand how your technology research journey and your tech buying team have changed over the past two years.
-
Why Data Management is vital for Freedom of Information
By:
Type: Talk
Freedom of Information requests are becoming commonplace in today’s world but what about the data people who ultimately have to action them and provide the answers? This webinar will explain who the Campaign for Freedom of Information are, outline the type of question that may be presented, and consider the effecting on the receiving organisation staff tasked to respond. We will look at what options the data person tasked with producing the answers may have and why properly organised and controlled data is vital. Lee Edwards is a retired Data Architect who has served on the DAMA UK and International boards. She now volunteers as a board member for the Campaign for Freedom of information.
-
The Future of Document Processing & Information Management
By:
Type: Talk
In a world rapidly embracing digital transformation, the paradigms of document processing and information management are evolving at an unprecedented pace. Dive into the forefront of this evolution in our upcoming webinar, where we’ll explore the transformative power of intuitive AI and Workflow Automation, and how it redefines the way businesses unlock value from data. Joining us is the esteemed Tori Miller Liu, CEO of The Association for Intelligent Information Management (AIIM). With her vast experience and visionary leadership at AIIM, Tori will share insights on today's information management practices and tomorrow's innovative possibilities. Key Highlights: The Evolving Landscape: A look into the dynamic shifts in document processing and information management, propelled by technological advancements. AI at the Helm: Understanding how AI is not just an addition but is becoming central to information management strategies. Smarter Document Processing: See how KnowledgeLake is delivering on the promise of helping companies easily and cost-effectively modernize their legacy document processing and make the most out of their data. Interactive Q&A Session: Gain clarity on how best to position your organization for the future. This webinar promises to provide invaluable insights, equipping you with the knowledge to navigate the challenges and opportunities of the coming era. Limited spots available!
-
Transitioning From Tech Writing To Information Architecture
By:
Type: Talk
Join us for a presentation from Rob Hanna, co-founder of Precision Content, on transitioning from a career in technical writing to a career as an information architect. Rob Hanna has achieved notable recognition in his field, including the Fellow rank from the Society for Technical Communication (STC) and the Enterprise Content Management Specialist (ECMs) designation from AIIM. In 2013, he became an Information Mapping® Certified Consultant™ (IMCC) through Information Mapping International and also holds a Certified Information Professional (CIP) certification from AIIM. Currently, Rob serves as the President and Chief Information Architect at Precision Content Authoring Solutions Inc. in Toronto, Canada. His active involvement extends to being a member of the OASIS DITA Technical Committee, focusing on the Technical Documentation Subcommittee. Additionally, Rob has contributed as a national director for the STC and as the vice-chairman of the STC Certification Commission. Can’t make it? Register, and we’ll send you a link you can use to watch a recording when it’s convenient for you. This educational webinar is brought to you by The Content Wrangler and Precision Content and is sponsored by Heretto, a powerful component content management system (CCMS) platform to deploy help and API documentation in a single portal designed to delight your customers.
-
Share your tech purchasing decisions for 2024
By: TechTarget
Type: Landing Page
TechTarget and Enterprise Strategy Group are conducting this survey to understand how your technology research journey and your tech buying team have changed over the past two years.
-
Fast Cash: The Many Faces of Information theft
By:
Type: Talk
Information is everything, especially to a cybercriminal. Things like credit card numbers and credentials are worth cash but on the darkweb medical records can be worth ten times as much. Step into the bizarre world of information theft and trading where nothing is useless in the wrong hands. Find out some of the top ways data leaves an organisation and what steps you can take to stop it.
-
The Golden Triangle: How Data Should Inform Controls
By:
Type: Video
Data is at the heart of the golden triangle. So, shouldn't we use it to inform controls? Join Jack Poller, Senior Analyst at Enterprise Strategy Group (ESG), and Ari Weil to learn: How Cloud migration has changed the data security landscape The impact of Cloud migration on technology, people, and processes How to use this knowledge to inform security controls
-
Enterprise Information Archiving
By:
Type: Replay
Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content. So what is the best way for you to develop and implement a new secure approach to your data archiving challenges? Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving: In this demo, we'll share how you can: - Mitigate reputational risk - Stay compliant with industry rules and regulations - Improve visibility into your archived data
-
The difficulties of defending against web tracking
By: TechTarget ComputerWeekly.com
Type: Research Content
This article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.
-
The Modern Secure Information Gateway
By:
Type: Replay
In this short 20 minute webinar, we will explore best practice design for Modern Information Gateways to creating an architecture that focuses on optimising applications' performance and security. We will also explore in more detail, methods to help filter for DDoS attacks, TLS offloading, and more. Come join us for this short webinar!
-
Regulatory and Compliance Webcast
By:
Type: Talk
Topics on the agenda include: - Consolidated Audit Trail (CAT) and Customer and Account Information System (CAIS) (2e) - IRA Distribution Errors
-
Information Protection is More Important Now Than Ever
By:
Type: Video
Data breaches and leaks can be extremely costly, hurting both your company’s bottom line as well as reputation. Unfortunately, we continue to see more and more attacks. Modern enterprises must address these data security challenges with solutions that guard against employee negligence, stop data breaches and help you remain compliant with data privacy laws. Join Proofpoint experts as they discuss why legacy, on-premises DLP technology falls short of addressing modern data security risks and requirements. In this 45-minute session, we’ll cover: - Data security challenges of today and what to expect tomorrow - How people-centric information protection can give you a protective edge - The imperative to modernize DLP today
-
Does a Microsoft Only Approach to Information Governance Make Sense?
By:
Type: Talk
There’s no universal approach to information governance. Strategies are diverse and, because they dictate your information governance policies and procedures, getting it right matters. One popular option is a Microsoft-based setup. But how effective is that? This webinar can help! Michael Sampson of Osterman Research and Laurence O’Brien from Micro Focus lead a discussion around the pros and cons of using Microsoft 365 to manage your information governance. Among other topics, we’ll cover: • Correctly classifying every information type in an organization’s data landscape. • Discerning the data requiring special protections from more expendable files. • Deciding how to store and otherwise manage data from the point of creation. • Ensuring only those authorized can access different groupings of data. • Using automated mechanisms to audit access and mitigate over-exposure. • Providing the ability to audit communication for compliance. • Filtering repositories to identify data potentially responsive to eDiscovery requests. • Excluding irrelevant data before creating a collection for external review. Don’t miss this research-driven discussion. Register for our webinar now.
-
How to Automate Access and Retrieval of Information for Your Agents
By:
Type: Video
Watch this 5 minute video to see an example of how to automate access and retrieval of information for an agent during a customer call.
-
MicroScope – October 2020: Get in touch with remote network security
By: MicroScope
Type: Ezine
In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption
-
Compliance Webcast
By:
Type: Talk
Topics on the agenda include: - Consolidated Audit Trail (CAT) and Customer and Account Information System (CAIS) (2e) - Continuing Education Updates for 2023
-
Coffee and Content: How Information Fuels Exponential Growth
By:
Type: Talk
Join Patrick Bosek and Scott Abel with angel investor and serial entrepreneur, Salim Ismail, co-founder of Singularity University for a chat about the role that information plays in exponential business growth. You'll learn how organizations that aim to grow exponentially value and utilize the information and data they produce to fend off competition from disruptive competitors and you'll discover new and exciting ways organizations around the globe are turning the information they create into new products and services. You'll leave with a solid understanding of why the world's leading institutions are working to transform themselves into information-enabled organizations. Coffee & Content is brought to you by The Content Wrangler and Heretto.
-
December ezine: Tech for good
By: MicroScope
Type: Ezine
Read about why more CEOs are discussing the positives of technology and why the channel will need to do the same
-
In data privacy we trust: building a strong information protection strategy in the hybrid era
By: TechTarget ComputerWeekly.com
Type: eBook
In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.
-
A New Technology Information Hub Powered By AI
By:
Type: Video
A new technology information hub powered by AI that combines a semantic search engine, a news aggregator, and a new, trainable feature providing a customizable learning source
-
A New Technology Information Hub Powered By AI
By:
Type: Replay
A new technology information hub powered by AI that combines a semantic search engine, a news aggregator, and a new, trainable feature providing a customizable learning source
-
Ethical Challenges and Intriguing Opportunities for Information Developers
By:
Type: Talk
Join Megan Gilhooly and Scott Abel in a chat with digital transformation guru, Ray Gallon, about the challenges facing information developers today. Gallon, president of the Information 4.0 Consortium, and co-founder of the Transformation Society, will discuss why he believes the opportunities awaiting information developers are "our time to shine." The Content Advantage is brought to you by Zoomin Software — helping customers find the product answers they need while empowering support agents to deliver fast, relevant and efficient support.
-
Demystifying the Tradecraft of a Threat Informed Defense
By:
Type: Talk
Traditionally, threat hunting and intelligence are reliant on what has already happened: where the adversary has been, what they deployed, and how they got in. We’re following in their tracks and usually, this results in a wild goose chase that can go on for days and weeks at a time. As adversaries continue to get stronger, faster, and smarter, it is no longer enough to reactively chase down the latest threat of the week. That’s where threat-informed defense comes in. Understanding your defensive posture and vulnerabilities (everyone has them) and the exigent threats preying on them (everyone has those too) takes you from chasing the adversary two steps behind to blocking them out before they even get in. In Demystifying the Tradecraft of a Threat Informed Defense, join our panel of threat hunting and secops experts as they divulge what threat-informed defense means to them and how to turn analysis into action so that you can truly grasp where your security posture stands from the adversary’s perspective. Because once you know that you can begin to fill in gaps and mobilize a more strategic defense posture. Some points the panelists will touch on include: - Challenges to achieving threat-informed defense and how to overcome them - The necessary skills and maturity it takes to action threat intelligence - Emerging trends that must be integrated into a SOC - How to utilize and adapt traditional and emerging purple team exercises for your organization Register now to join the conversation and learn how to prepare your organization for any and every threat that comes your way. Speakers Robert Wallace, Senior Director, Mandiant Paul Caiazzo, Chief Growth Officer, SnapAttack Arve Kjoelen, Vice President & Global Chief Security Officer, SnapAttack
-
The future of SAP ECC - Make an informed decision about your ERP roadmap
By: TechTarget ComputerWeekly.com
Type: eGuide
Standard support is being extended to 2027, while SAP will continue to offer extended support until 2030, in a bid to get businesses to migrate to S/4 Hana. Should you run legacy business software for 15 more years? Following SAP's decision to extend ECC support, that is a question many CIOs will ask.
-
Semarchy xDM - Information Quality and Semantics
By:
Type: Video
Semarchy xDM Information Quality and Semantics: Data quality is a core capability of the intelligent data hub, supporting an end-to-end approach that includes profiling, dashboards, comprehensive data enrichment, quality as well as match and merge.
-
How to Assemble a Future-ready Information Security Ecosystem
By:
Type: Replay
Learn How to Assemble a Future-ready Information Security Ecosystem as Roman Dushkov, Product Marketing & Presales Manager, Security Vision provides a comprehensive guide to assembling a future-ready information security ecosystem, addressing current challenges, core components, building resilience, fostering a security-conscious culture, and looking ahead to future innovations.
-
Coverage Mapping with Threat-Informed Defense
By:
Type: Replay
Ian Davila, Lead Adversary Emulation Engineer at Tidal Cyber, explains how Threat-Informed Defense has supported the evolution of security teams and their need to focus only on relevant threats - and he workshops how to actively do this, supported by relevant use cases.
-
CIO Trends #4
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we look at the topics that should be high on the agenda for anyone wanting to stay on top of their game- and the challenges that come with that. Find out what makes a successful IT leader in 2017, from looking outwards to learning lessons from digital transformation, and how to converge IT and digital skills in your organisation.