We begin the year by focusing on processes, tools, and a multitude of administered organizational services, and their relationship to Security, Information Governance, and Data Privacy. To access the full Peer to Peer, please click on the image or link at the bottom of the page.
Information Rights Management: The Missing Piece of the Puzzle? #Securityby Jeff Brandt Connected Devices and the Increasing Regulatory Focus on Cybersecurity #Securityby John Tomaszewski IG and Ediscovery: A Symbiotic Relationship #Securityby Ricky Brooman AI Brings Technological Maturity to Email #Securityby Peter Darling Will Need-to-Know Security Destroy KM? #Security #KnowledgeManagementandSearchby Ben Weinberger
Why I Am a Big Security Ninja in a Small Security Pond #Securityby Betsy Horn Why I Read Outside Counsel Guidelines #Securityby Jon Washburn Building an Effective Defense on a Limited Budget #Securityby Frank Schipani