Protection and Privacy

Learn how to:

Protect information assets regardless of where they are
Guard against fraud and comply with regulations 
Reduce risk and cost by eliminating what you don’t need  
Attack your most obvious content problem -- email

1 - 10 Results out of 112

AIIM Forum Europe

Join AIIM International and your peers as we deliver thought leadership, market insights and expert advice through a one-day programme of educational seminars and a major showcase of the latest information management innovations in London, UK.

Top Tips to Bridge the Gap Between Security Awareness and Security Action

By shifting the conversation of how you think about – and secure – all your information assets, you’ll be in a much better position to bridge the gap between security awareness and security action. This webinar will provide you with top tips to help your organization.

Bridging the Gap Between Security Awareness and Action

Infographic

Download this FREE infographic to learn about the 5 key elements of an effective information security strategy and your 4-step plan to put it all into action.

Bridging the Gap Between Security Awareness and Action

eBook

The key to keeping your business' name out of the data breach headlines comes down to strategy. Learn about 5 key objectives to a successful information security strategy.

5 Key Data Points About Information Overload and Automating Governance

Infographic

In this FREE infographic we outline 5 key data points about information overload and automating governance - consider it a life raft to keep you afloat in the rising tide.

Blockchain Is Coming to an Organization Near You— Is Yours Next?

Alan Pelz-Sharpe – a leading expert on blockchain – will explain how blockchain provides indisputable Proof of Authenticity 1) to all the content you capture, store, and share; and 2) to all the transactions you process.

Clearing the Air – What You Really Need to Know About Content Services in the Cloud

After all the hype about moving content to the Cloud over the past few years, there are still many misconceptions about when and how to deploy content services in the cloud. In this webinar, we'll discuss everything you need to know about content services in the cloud.

5 Lines of Business that Require Good Governance

eBook

In this eBook, we will highlight how good governance practices around retention management, defensible discovery, and security policies will help drive digital transformation. Specifically, how they make legal, finance, HR, marketing, and sales departments more productive while reducing corporate risk.

Information Security Made Easy – Best Practices to Enhance Your Processes and Practices

No matter where an organization is in the process of developing and implementing security controls in your various system and applications, there are always new techniques and innovations emerging to help you avoid any potential problems along the way. In this webinar, we’ll outline and illustrate some of these latest techniques and innovations. We’ll share best practices to reduce and eliminate holes in your data security by: ensuring controlled access to your data, no matter what the file type, to whomever is supposed to receive, access, or interact with that data at that point in time; and enabling secure collaboration at every appropriate point in the workflow; engaging the right annotations and redactions to continue the work in the process flow to its completion.

Robotic Process Automation – Your GDPR Hero

For our UK and European community.  Now with GDPR compliance in full force and effect, one of the major aspects of this is around finding, accessing, and rectifying data. As you may know, EU citizen can now ask you to review their own data that you have, ask you to “rectify and amend” that data, and even invoke their right to be forgotten. Join us for this FREE webinar and learn how Robotic Process Automation (RPA) can help you: find, access, and rectify the requested information rapidly and handily; ensure that you’re finding every instance of the citizen’s data regardless where that information resides (official repositories, in the cloud, local drives, etc.); make all the necessary amendments in all the places you need; and ensure you’re finding all the data in the first place, especially if your ingestion processes are not consistent.

Back to Top Back to Top