Data stewardship is the management and oversight of an organization’s data assets to help provide business users with high-quality data that is easily accessible in a consistent manner. Continued…
Quote of the Day
“To a large degree, the success of a data governance strategy depends on the success of its associated data stewardship efforts.” – David Loshin
What steps are key to building a data catalog?
An enterprise data catalog can be an effective tool in data and metadata management — and both IT and the business should play a role in its creation. Get expert tips for building a data catalog.
Watson’s Law: IBM preaches data stewardship as A.I. advances
IBM chairman and CEO Ginni Rometty discussed Watson’s Law and the importance of data stewardship and security at the company’s Think conference.
How data lineage tools boost data governance policies
Data lineage tools can help enterprises bridge the gap between defining data governance policies and executing them. Learn how organizations can use these tools to track how and when changes are made to data, as well as how data lineage affects root cause analysis and impact analysis processes.
Kaiser’s data governance model leans heavily on data stewards
Kaiser Permanente’s chief data governance officer discusses how he manages the data stewards who underpin the health system’s data governance model.
Quiz: Improving your data governance and data stewardship program
Test your knowledge of what is needed for a successful data governance and data stewardship program with this brief quiz.
Data management is a broad area of study that ___________ many more specialized fields.
b. is comprised of
Two-factor authentication (2FA), sometimes referred to as two-step verification or dual factor authentication, is a security process in which the user must provide two authentication factors to verify identity. Continued…
Quote of the Day
“Multifactor authentication or 2FA options are cheaper and easier to integrate than ever before and their cost certainly outweighs the potential costs of data and identity theft, financial and reputation damage, and potential lawsuits.” – Michael Cobb
How were attackers able to bypass 2FA in a Reddit breach?
Reddit was quite open after it experienced a breach by attackers who bypassed 2FA. Learn how attackers were able to bypass controls to cause the Reddit breach and how other sites can prevent this kind of attack with Judith Myerson.
How can U2F authentication end phishing attacks?
Google implemented U2F authentication and physical security keys to defend against phishing attacks. Learn why Google chose U2F over OTP and whether or not it’s an effective method.
Enterprises should reconsider SMS-based 2FA use after breach
Reddit recently revealed a data breach that was caused by threat actors intercepting SMS-based 2FA codes. Discover what this means for users and why enterprises should re-evaluate their use of SMS for authentication.
Reddit breach sparks debate over SMS 2FA
A Reddit breach was discovered to be due to an attacker compromising the SMS two-factor authentication used by employees, sparking a debate over using that 2FA method.
Risk & Repeat: Inside the Facebook 2FA fail
This Risk & Repeat podcast examines the Facebook 2FA controversy where the company admitted to using mobile numbers for advertising purposes and what that means for Facebook’s reputation and 2FA adoption in general.
The credit union website uses two-factor authentication to protect _____ members.
A PHI breach is the unauthorized access, use or disclosure of protected health information (PHI) from an electronic health record (EHR). Continued…
Quote of the Day
“A new surge of networked medical devices and wearable gadgets present possibilities for exposure to serious security breaches in healthcare, and many hospitals are unprepared to tackle the next endpoint challenge.” – Nicole Lewis
How data duplication in healthcare is diagnosed
Despite the proliferation of electronic health record systems, data duplication still plagues hospitals and can cost a large hospital around $1 million to fix. Find out how EHRs and other methods can help address duplication of patient data.
Worries rise about security breaches in healthcare as endpoints expand
In the face of increased security breaches in healthcare, hospitals will grapple with widening endpoint access and related cybersecurity risks.
To get secure cloud storage in healthcare, gauge risks first
To have secure cloud storage in healthcare, cybersecurity experts say conducting a risk assessment is a necessary step before moving to the cloud, while building a relationship between the organization and cloud provider is vital for maintaining security.
HIPAA requirements steer data protection in healthcare
HIPAA requirements are not specific about the technology to achieve data protection, but HIPAA’s weight in disaster recovery still remains considerable.
Healthcare cybersecurity must complement HIPAA compliance
A comprehensive healthcare cybersecurity plan should include network monitoring, patient record access tracking, employee training and HIPAA compliance.
Risk analysis is a _________ component of the HIPAA Security Rule because it allows an entity to target its main security loopholes and deficiencies.
A cloud service provider (CSP) is a company that offers infrastructure as a service (IaaS), software as a service (SaaS) or platform as a service (PaaS) to other businesses or individuals. Continued…
Quote of the Day
“While the cloud itself has relatively low costs initially, moving cloud workloads and dealing with multiple cloud providers can be tricky.” – John Edwards
>How to handle VDI in the cloud with multiple vendors
It is common for organizations deploying VDI in the cloud to deal with multiple vendors. See why this can be a problem and what options IT might have to migrate everything to a single cloud.
Public cloud workload success requires IT leadership
Public cloud workload success rates improve when IT departments adapt to the reality that the business side of an organization can circumvent IT to procure and provision cloud resources themselves.
Two cloud backup problems that organizations need to consider
Possible cloud backup problems — such as cost and bandwidth impact — should not be underestimated. Within those areas, there are several important considerations for organizations.
Evaluate public IaaS options based on these key features
Before you go all in with a public IaaS provider, there is a lot to consider, ranging from compute options to support for emerging technology, like AI.
Cost management the next big issue in multi-cloud computing
Multi-cloud computing is here, but enterprises struggle to manage their resources and costs across cloud boundaries. There are tools that can help, but they are not a cure-all yet.
Brokers must work closely with cloud providers, while also _________ their services to appeal to customers.
Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices in order to gain access to systems, networks or physical locations, or for financial gain. Continued…
Quote of the Day
“The best defense against attackers using social engineering scams is and will always be awareness.” – Reda Chouffani
Social engineering scams must be on hospitals’ radars
Social engineering scams targeting the healthcare industry are becoming increasingly common. Fortunately, in addition to security software, there are some practical tips that can help combat these types of attacks.
Robot social engineering works because people personify robots
Robot social engineering could be a viable attack vector in the future, according to Brittany ‘Straithe’ Postnikoff, both because of the various social abilities that robots can use and because robot manufacturers don’t focus on security.
Social engineering techniques are becoming harder to stop, experts say
Social engineering techniques have evolved as more personal and corporate information is shared on the Web, leaving enterprise to adopt new training methods to keep data safe.
What is behind the growing trend of BEC attacks?
Business email compromise attacks do not require the use of a malicious payload or URL, making them popular among cybercriminals. Learn more about how to recognize possible BEC attacks.
Phishing threats still dwarf vulnerabilities, zero-days
Email security vendor Proofpoint released its Human Factor 2018 report, which details how phishing threats are evolving and still beating enterprise defenses.
____ can you trust? Social engineering tactics are so sneaky and phishing attempts are so sophisticated that you’re afraid to click a link in an email from your boss or your bank.
Customer experience management (CEM or CXM) is the collection of processes a company uses to track, oversee and organize every interaction between a customer and the organization throughout the customer lifecycle. Continued…
Quote of the Day
“From a CEM standpoint, it’s not enough to understand a customer at the tail end when they already made a purchase. You need to understand the full experience.” – Cesar Coba
Improving customer experience strategy with digital tweaks vs. transformation
Don’t worry about endless lists of technologies to improve customer experience strategy. Read about companies that figured out how to choose the CEM technology that worked best for their customers — and reaped the benefits.
Invest in people for better customer experience in marketing
In an effort to improve customer experience in marketing, research firms IDC and Gartner found that organizations are increasingly hiring staff with designated CX responsibilities.
Guide to customer experience management best practices, technologies
Learn why customer experience management (CEM) is growing. Read about technologies, strategies and customer experience management best practices that businesses are applying to their CEM.
Open data, customer experience AI the focus for retail automation
Like it or not, customer experience AI will infuse sales and marketing for years to come. At Ignite 2018, SAP, Adobe and Microsoft band together to standardize data models in preparation.
The role and responsibilities of a customer relationship manager
What exactly does a CRM manager do? Is the role of the CRM manager different from a customer relationship manager? Get the answers here.
The question on everyone’s _____ is how to improve customer experience and cut costs at the same time.
Process mining software is a type of program that analyzes data in enterprise application event logs in order to learn how business processes are actually working. Continued…
Quote of the Day
“Process mining is all about automatically discovering the as-is business process from the data that an organization generates — it’s like an X-ray or MRI machine for your business.” – Alexander Rinke
Celonis’ process mining software helps manufacturer improve efficiency
Process mining software from Celonis helped manufacturing company Chart Industries understand its accounts payable and accounts receivable processes, leading to improved process efficiency. The company began a digital transformation by identifying candidates for robotic process automation.
Process mining software provides an inside view of SAP systems
Process mining software helps Vodafone get an inside look at its SAP business processes to improve operational efficiency and prepare for an S/4HANA upgrade.
What software features are key for process manufacturing ERP?
One expert shares the keys to finding the right process manufacturing ERP software features and why industry identification is critical.
Siemens uses process mining software to improve manufacturing visibility
Siemens implemented process mining software to improve visibility into its manufacturing systems and is seeing a big payoff.
Which platform for machine learning is right for your enterprise?
Does your company need a platform for machine learning, which helps turn data into insights, informing outcomes? The big names in tech, like Google, Microsoft, Amazon and others, offer machine learning platforms. Learn more about each and which is best for your business.
As change is constant, you should have a process for ______ improvement of your controls and compliance efforts.
Emotional intelligence (EI) is the area of cognitive ability that facilitates interpersonal behavior. Continued…
Quote of the Day
“A bot may be good enough for customer service interactions, but more personal situations demand a higher level of emotional intelligence and the ability to respond naturally to unexpected prompts.” – Ed Burns
Digital voice assistants seek their place in healthcare
Digital voice assistants are being adopted for consumer use, but have yet to find a solid footing in healthcare. Microsoft and Google are hoping to change that by adding new capabilities to their tools.
Emotional intelligence in the workplace makes a difference
If you want to make an organization agile, master emotional intelligence in the workplace. Companywide change starts with empathy, not the newest tool set or acronym.
AI in healthcare spurs advanced uses such as emotional intelligence
AI in healthcare is spawning advanced applications, such as using data about emotion and socioeconomic conditions to personalize care and post-treatment.
Customer support chatbots set to transform service functions
Customer support chatbots are starting to penetrate customer service teams in enterprises, promising to streamline operations and improve efficiency.
Finding internal data science talent: The right stuff
Fierce competition for data science talent means that CIOs must look internally for people with the right stuff. At the Global Artificial Intelligence Conference in Boston last week, AI experts shared tips on what attributes to look for.
Although she was not __________________, the CEO soon learned to cultivate the soft skills that made her an effective leader.
a. to the manner born
b. to the manor born
A center of excellence (CoE) is a team of skilled knowledge workers whose mission is to provide the organization they work for with best practices around a particular area of interest. Continued…
Quote of the Day
“The center of excellence is more than just an idea: It should have well-defined roles, responsibilities, authority and supporting business processes.” – Eric Kimberling
Data literacy training offerings key to BI vendors
Data literacy training, or training on how to understand and use data, is something that both BI vendors Qlik and Tableau agree is important in today’s world.
Artificial intelligence center of excellence emerges as best practice
The dust is not close to settling on how to apply AI in the enterprise. One way for enterprises to formulate an AI strategy is to establish an artificial intelligence center of excellence. But CIOs should be careful to tailor the CoE to the business appetite and need for AI.
Maximize the ROI of ERP projects with an ERP center of excellence
Learn the benefits of establishing an ERP center of excellence from a consultant who helps organizations get the most from their ERP projects.
RPA trends: Adoption at scale calls for governance, change management
The top RPA trends in automation deployment include a need for governance, change management and business-technology cooperation. Find out more in our overview of the recent UiPath Forward robotic process automation event.
RPA tools lead to better customer service: Three case studies
RPA tools promise to automate repetitive, manual tasks to free up workers to focus on bigger and better business goals. Here’s how three companies and their workers fared after deploying robotic process automation.
An executive can _______ a business intelligence dashboard to get an up-to-the moment snapshot of how some element of the business is performing.
Rugged DevOps is an approach to software development that places a priority on ensuring that code is secure at all stages of the software development lifecycle. Continued…
Quote of the Day
“It’s possible to develop code that’s even more secure than before the move to DevOps if you approach DevOps and security properly.” – Johna Till Johnson
Best practices for DevOps compliance and reusability
To get to a compliant model-driven approach, organizations should follow these best practices for DevOps. Your DevOps model should be compliant an reusable in order to scale.
Help ops to begin a DevOps implementation the right way
Everyone knows a successful DevOps implementation can be tricky. Stephen Bigelow outlines how ops pros newly introduced to DevOps should proceed.
The secret to DevOps test automation? Pick your battles
DevOps test automation is perhaps the biggest sticking point in any company engaged on the path. But an Australian-based app maker may have the right idea. Here’s how Airtasker came to understand test automation is not all or nothing and why this will matter to your organization.
DevOps security takes on the dark side of digital transformation
Immature digital transformation efforts expose the global economy to the risk of security breaches, with serious impacts that rival the 2008 financial crisis. Enterprise DevOps security efforts might reduce that risk, but must overcome skills shortages and industry inertia.
DevOps security requires new mindset and tools for visibility, automation
DevOps security has to be as close to continuous as possible. Early DevOpsSec adopters share tips on how to defend the cloud’s continuous improvement model.
Once the business owner saw the benefits of attending an ______________ improved.
A. Agile retrospective, his participation
B. Agile retrospective his participation