Hi [[ session.user.profile.firstName ]]

Building the Business Case for Enterprise-Wide Information Governance

Information Governance does more than empower organizations to take control of their information, ensure compliance, and reduce costs. According to recent AIIM research, when asked about the biggest benefits of Information Governance, 27% of respondents said it enables them to give personalized and accurate service to customers, and 24% said it facilitates better customer/supplier relationships.
Learn what Information Governance can do for your organization in the webinar on demand: Building the Business Case for Enterprise-Wide Information Governance. You’ll learn how information governance gives organizations:
•Business agility through faster access to enterprise information
•Immediacy of information, making it easier for customers to interact with your business or brand
•Faster response to events and inquiries
•Quicker decision making at all levels of the organization
Recorded Jan 5 2015 72 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Steve Weissman, Founder and CEO, Holly Group; Theresa Resek, Director, AIIM; Greg Clark, Program Management Director, ECM, Op
Presentation preview: Building the Business Case for Enterprise-Wide Information Governance

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • VeriSM™ - Exploring the New (Service Management) Kid in Town Jul 19 2018 10:00 am UTC 45 mins
    Simon Dorst, Michelle Major-Goldsmith - Kinetic IT
    Michelle Major-Goldsmith and Simon Dorst of Kinetic IT will discuss the role of VeriSM in digital transformation, and its relation to ITIL and other service management practices.
  • [Earn 1 CPE] Practical Steps to Scale Your Vendor Risk Management Program Jun 26 2018 5:00 pm UTC 75 mins
    Rebecca Herold. Panel: Jake Olcott, BitSight; Todd Boehler, ProcessUnity; Matt Kunkel, LogicGate; Scott Schneider, CyberGRX.
    As organizations rely on third parties to grow and thrive, they’re exposed to major cybersecurity risks. Mitigating this risk means confronting the potential security vulnerabilities that are present in your third party network, but traditional vendor risk management (VRM) methods are no match for modern threats. According to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.

    Join our panel of experts on this CPE accredited webinar to learn how your organization can create a VRM program that’s ready and able to stand up to today's third party threat landscape.

    Learning objectives:

    - Find out why traditional vendor risk management programs don’t work
    - Learn how to perform quantifiable vendor security analyses
    - Discover how to build a scalable VRM program
  • IT Services Marketplace Demo Recorded: Jun 6 2018 38 mins
    Eric Lehto
    Demonstration of the Badged IT Services Marketplace and beta program overview.
  • The Future of GDPR: Compliance beyond Deadline Day Recorded: May 22 2018 60 mins
    Brian Rutledge (Spanning) | Kalani Enos (FARO Technologies) | Heather Stratford (Stronger.tech)
    May 25th 2018 is the deadline day for achieving General Data Protection Regulation (GDPR) compliance. It is also only the beginning of GDPR.

    Discover what GDPR means for your organization, how it affects US businesses and why it's important to be GDPR compliant.

    Join this interactive Q&A panel discussion with industry experts to learn more about:
    - The intersection of GDPR, privacy and cybersecurity
    - How GDPR affects data governance, breach disclosures and overall data protection
    - Recommendations for improving your organization's cyber resilience

    Speakers:
    - Brian Rutledge, Principal Security Engineer at Spanning
    - Kalani Enos, IT Security Manager, FARO Technologies
    - Heather Stratford, CEO of Stronger.tech
  • Metrics drive behaviours: How to avoid common IT metric mistakes Recorded: May 17 2018 33 mins
    Steve Morgan, Director, Syniad IT
    As organisations seek to improve the quality of IT services, perhaps through SIAM or cloud provisioning, the traditional SLA targets and performance measures we hold dear are no longer appropriate.

    This talk will look at the common pitfalls and make some recommendations as to measures which will drive the correct behaviours in your internal and external support teams.
  • From Cost Center to Profit Center Recorded: May 16 2018 41 mins
    Phyllis Drucker - Consultant, Linium
    Cloud…outsourcing…Platform as a Service…all of these could make IT irrelevant, so how do you prevent this? By providing value every day and by running IT as a Business. Great catch-phrase, but what does it mean? In a nutshell: knowing the services IT is providing, what they cost to operate and whether they provide value, and by staying on the cutting edge of technology even with todays fast pace of change, so that the business you support remains competitive. This webinar addresses the basic building blocks you need to run like a business: defining services and offerings, layering in financial management and charge-backs/show-backs so you understand the costs of these offerings and how to pull it all together in a way that helps you run as a business does, even if it’s only on paper.
  • Running IT as a Business Recorded: May 16 2018 47 mins
    Rob Akershoek, Solutions Architect at Shell
    Rob Akershoek, Solutions Architect at Shell and part of the IT4IT Forum, discuss the challenges and opportunities of running IT as a business. Running IT as a business is more than finances and cutting cost – it’s about IT quality.
  • How to Demonstrate Value - The CSI Building Blocks Recorded: May 16 2018 46 mins
    Ian MacDonald FBCS, CITP, FSM - Independent Consultant, Edenfield IT Consulting
    Today, simply meeting the service commitments of the business consistently may no longer be considered enough.

    Your business customers will over time have an expectation of increasing ‘value’ from their investment in the IT services you provide.

    Continual Service Improvement (CSI) provides an opportunity to exploit the insight, knowledge and skills of your people to identify and drive improvements to your IT services that add value to the customer and begin to positively influence their perception of getting value for money from their IT service provider.

    However, there is no value in CSI if the improvements provided are not focused on what your customer considers important to them. Equally, if the CSI improvements are not communicated to your customer and explained in a way that demonstrates tangible business value then this is a missed opportunity to demonstrate value and enhance customer satisfaction.

    In this session, we explore the essential ‘CSI Building Blocks’ required to ensure that CSI becomes a core capability for the IT service provider to demonstrate value for money from the IT services provided to their customers.

    This session will provide learning and guidance on:-
    The importance of demonstrating value to ensure commercial success….and the challenge for the IT Service Provider
    Understanding the concepts & characteristics of ‘value ‘
    Understanding how CSI can provide ‘Value Add’ and positively influence customer perception of value for money
    The essential ‘Building Blocks ‘ to enable CSI as an approach demonstrate the value provided from the IT Service providers people and capabilities

    The ‘CSI Building Blocks’ include the need to apply ‘Outside In’ thinking to your ITSM strategy, understanding the importance of purpose and contribution in motivating your people to drive CSI in the workplace, the importance of business measures to convey business value and the importance of a ‘target and tailor’ approach to customer communications.
  • Endpoint Security: The Right Balance Between Positive and Negative Approaches Recorded: Apr 26 2018 58 mins
    Forrester Senior Analyst Chris Sherman and Nyotron's Senior Director of Product Management Rene Kolga
    Endpoint security represents the frontline in your fight against cybercriminals. Despite the relative maturity of the endpoint security market, new threats and evolving attacker capabilities have proven traditional approaches inadequate - and left organizations exposed.

    Guest speaker Forrester Senior Analyst Chris Sherman and Nyotron's Senior Director of Product Management Rene Kolga will discuss the current state of endpoint security while highlighting a path forward for organizations looking to re-focus their strategies to combat current threats.

    Attendees will learn:

    • Which threats are causing the most difficulties for traditional
    endpoint security approaches
    • Why organizations need to balance positive and negative security
    approaches
    •How to layer multiple tools for maximum protection
  • The hackers are winning: Deploy your secret weapon Recorded: Apr 26 2018 46 mins
    Rob Shapland, Principal Cyber Security Consultant, First Base Technologies
    How to make your staff your first and last line of defence.

    Learn how to:
    •Identify your enemy and their tactics
    •Discover why technological defences will lose to hackers
    •Learn how to make staff genuinely care about security

    About Rob Shapland BSc (Hons) OSCP OSWP CRT Principal Cyber Security Consultant, First Base Technologies

    Rob Shapland is an ethical hacker with 9 years’ experience conducting penetration tests for hundreds of organisations, from small businesses to major international organisations.
    He specialises in simulating advanced cyber attacks against corporate networks, combining technical attacks with his other hobby of dressing up and tricking his way into company headquarters using social engineering techniques.
    He is also a regular speaker at events and conferences around Europe, and has appeared on both BBC and ITV as a cyber security adviser. He holds qualifications from SANS, Offensive Security and CREST, and has been trained in social engineering techniques by Chris Hadnagy, one of the world's leading practitioners and researchers.
  • [Panel] Building Effective Cyber Defense Recorded: Apr 25 2018 58 mins
    Amar Singh (Cyber Management Alliance) | Simon Moor (FireEye) | Bob Honour (SonicWall)
    With data breaches on the rise, enterprises worldwide are looking to implement better technologies and processes for faster breach detection and response, as well as train all employees to be cyber aware.

    Join this interactive Q&A panel to learn more about:
    - Key factors for building a successful CISO strategy
    - Why breach prevention matters
    - True costs of breaches
    - Technological solutions to consider for a more cyber resilient enterprise
    - How AI/machine learning and human talent can work together
    - Top threats to look out for in 2018

    Speakers:
    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Simon Moor, VP for Northern Europe, FireEye
    - Bob Honour, EMEA Marketing Director, SonicWall
  • [Webcam Panel] CISO Strategy & the Boardroom Recorded: Apr 24 2018 59 mins
    Dr. Christopher Pierson (Binary Sun) | Ben Johnson (Obsidian) | Deidre Diamond (CyberSN)
    Having a strong buy-in from the highest level of executive leadership in your organization is a key factor for a successful implementation of your CISO strategy. With high-profile breaches on the rise and a company's reputation at stake, cybersecurity is a top-of-mind issue for CISOs.

    Join this interactive Q&A panel to learn more about:
    - Key factors for building a successful CISO strategy
    - Selling your security strategy to the Board
    - Why your Board should be up to date on cybersecurity
    - Top threats to look out for in 2018

    Speakers:
    - Ben Johnson, CTO of Obsidian Security
    - Deidre Diamond, Founder and CEO, CyberSN
    - Dr. Christopher Pierson, CEO of Binary Sun Cyber Risk Advisors
  • Using Behavioural Economics to Raise Digital Resilience Amongst Employees Recorded: Mar 22 2018 22 mins
    Robin Smith, Head of IT Security, South Yorks NHS
    This case study examines how a major NHS organisation used Richard Thaler’s Nudge strategies to redirect employee behaviour and create a culture of cyber vigilance.

    Join this webinar presentation to learn:
    - Key lessons on the value of micro-marketing
    - Lessons from cybernetics
    - The value of cyber resilience in healthcare

    About the Presenter:
    Robin Smith is a former cybersecurity lead analyst in UK Police Service. He has authored four books on cyber security and is currently working on a documentary feature examining the impact of cyber-crime on society for release in 2018. He has previously worked in UK health sector, telecommunications and was formerly a lecturer at Loughborough University in Information Risk Strategy.
  • GDPR and Security: De-Identifying Personal Data Recorded: Feb 22 2018 29 mins
    Ashwin Chaudhary, President of Accedere
    Anonymization and Pseudonymization are ways GDPR recommends to De-Identify personal data. By making it impossible or impractical to connect personal data to an identifiable person, data controllers and processors may be able to do the processing and storage of personal data outside the scope of the GDPR.

    Join this webinar to learn the GDPR requirements for managing personal information and digital identity.
  • Remote Testing and Monitoring to Boost Fronthaul and C-RAN Efficiencies Recorded: Feb 7 2018 21 mins
    Sophie Legault, Director of T&D Business Unit, EXFO
    Listen to Sophie Legault, Director of T&D Business Unit at EXFO as she talks about the 4G to 5G transition, the implication of highly dense networks, impact on the costs of maintenance on fronthaul networks and the challenges MNOs may face. She will also delve into best practices for addressing interference and PIM in mobile networks and improving the quality of fiber-based fronthaul and CRAN deployments.
  • Digital Workplace: Transforming the Employee Experience Recorded: Jan 23 2018 60 mins
    Presenter: Robin Gareiss, President, Nemertes Research; Moderator: Irwin Lazar, VP & Service Director, Nemertes Research
    Digital workplace initiatives broadly expand applications and customization available to employees. During this webinar, we will cover:
    • What is a digital workplace initiative, and the phases of deployment?
    • What technologies and capabilities are included? Which vendors are the most critical?
    • How soon will digital workplace initiatives incorporate artificial intelligence, human-to-machine interfaces, always-on collaboration, and other advanced technologies?
    • Who is leading these initiatives? How involved are the business units, and which ones?
    • What cultural or operational changes must be considered?

    We look forward to sharing this information with you!
  • Q&T SIG Talk Series: Ep. 4 Performance Engineering Personnel Mining Recorded: Jan 9 2018 27 mins
    Petar Puskarich
    Performance Engineering Personnel Mining

    How frustrating is it to find qualified and reliable performance engineering talent in today’s hiring market? This talk will cover some challenges and success strategies in hiring that basic scripter all the way up to the rare full stack performance engineering unicorn. What to look for, what to avoid, how to handle technology interview fraud.

    Join us for the next Quality & Testing SIG Talk on Tuesday, February 13, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1057043&group=.
  • 6 Key Tech Disruptions and Our Point of View Recorded: Aug 16 2017 63 mins
    Chris Hsu
    HPE Software EVP & GM Chris Hsu hosts: 6 Key Tech Disruptions and Our Point of View

    As part of the planned Software spin-off and merger with Micro Focus, HPE’s Software organization is undergoing a major transformation to shape the combined company as uniquely positioned to help customers on challenges across a hybridized environment.

    And hybrid is much more than a buzzword. In today’s reality, not only do businesses have to deal with the rapidly changing technologies and multiple deployment models, but they also have to deal with the pressure of reducing their run costs and to constantly innovate.

    During this transformation, we have interviewed thousands of customers, conducting deep market research, allowing us to gain unprecedented market insights. Join this webcast and learn about the new waves of tech disruptors, and how, our combined, software pure-play company is going to shape the industry.

    “When you prepare for a global merger of this scale, it gives each company an unprecedented opportunity to look at all of their processes and take steps to optimize. We have had the luxury of stepping back and asking how do we transform our IT platform to support our strategy for tomorrow? Few of us ever get this opportunity.”
  • The Future belongs to the Fast, Transform your Business with IT Management Recorded: Jan 31 2017 30 mins
    Genefa Murphy, Roy Ritthaler, HPE
    Join Roy Ritthaler, VP of Product Marketing IT Operations Management and Genefa Murphy, VP of Partner and Product Marketing, Application Delivery Management at Hewlett Packard Enterprise Software, as they discuss the challenges and opportunities of digital transformation in organizations today. They will also discuss how IT management can accelerate your transition to the digital enterprise. Transformation is driven by business needs, and innovations in application delivery and testing, hybrid cloud, machine learning, collaboration and mobility. By leveraging these innovations you can manage risk while also realizing rapid time to value and to market.
  • IT Operations and Real-Time Performance Monitoring: Keys to Efficient Healthcare Recorded: Jan 12 2017 49 mins
    John Smith, Principle Solutions Architect from ExtraHop, Darren Carr, Sr. Technology Architect, from Cerner
    Modern Healthcare IT infrastructures are a complex blend of technologies, from mission-critical Electronic Health Record (EHR) applications to the security solutions protecting patient data from ransomware and other threats. Overseeing an entire healthcare system's networks and infrastructure, as well as managing patient data in a private cloud, can be time consuming, costly and pose potential cybersecurity threats and data breaches. That’s why fast, reliable IT is crucial to every step of the patient’s journey through your organization—and why you need a new approach to IT operations and monitoring.

    Learn where your visibility gaps lie, and how closing those gaps with real-time performance monitoring will dramatically improve the quality of care and IT security that your organization provides.
Technical Webinars on Enterprise Technology
The IT Specialist Network is one of the leading online networks with over 500,000 members and growing. Our speakers are leading IT professionals and executives with a wealth of knowledge and experience in the selection, evaluation and implementation of information technology.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Building the Business Case for Enterprise-Wide Information Governance
  • Live at: Jan 5 2015 2:35 pm
  • Presented by: Steve Weissman, Founder and CEO, Holly Group; Theresa Resek, Director, AIIM; Greg Clark, Program Management Director, ECM, Op
  • From:
Your email has been sent.
or close