CU Boulder collects, uses and maintains a significant amount of data. This includes, but is not limited to student, employee, research and finance data. Institutional data supports CU Boulder’s ...
Adam Stone writes on technology trends from Annapolis, Md., with a focus on government IT, military and first-responder technologies. State government needs policies and procedures to ensure data is ...
Steve Durbin is Chief Executive of Information Security Forum. He is a frequent speaker on the Board’s role in cybersecurity and technology. Information security governance is the guiding hand that ...
Information governance has become a critical subject as businesses continue to generate an increasing amount of sensitive data that requires policy management and compliance. This presentation, ...
Information governance policies often end up ignored or circumvented. By measuring specific factors, you can ensure they are being followed. Most organizations understand the value of having effective ...
SCHAUMBURG, Ill.--(BUSINESS WIRE)--Following the launch of the COBIT 2019 framework last month, ISACA has published a Design Guide and an Implementation Guide to make the governance framework more ...
As with the terms telehealth and telemedicine, there is some debate about data governance versus information governance and whether they are interchangeable or have distinct definitions. Opinions vary ...
"Governance" is a badass sounding phrase that simply means establishing policies to enable consistent management by exception. Unfortunately, many so-called governance initiatives are doomed to enter ...
The past six months I have talked to a wide variety of organizations, helping them assess their content management efforts, and in the process gaining a better understanding of how the average ...
ROLLING MEADOWS, Ill.--(BUSINESS WIRE)--ISACA, the professional association for IT governance, assurance and cybersecurity professionals, today announced that it has acquired CMMI ® Institute, the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results