You've requested...

Download this next:

A global look at emerging regulatory frameworks for AI governance

Artificial intelligence (AI) at scale is the end goal for many organizations. However, the uncertainty of future regulation and potential for risk - especially when it comes to Generative AI - presents challenges. This e-book unpacks how you can scale AI with ease by implementing AI governance best practices that will withstand the test of new regulations.

These are also closely related to: "6 information governance best practices"

  • Data quality emerges from Covid-19 more critical than ever

    In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.

  • Your comprehensive guide to the Fujitsu Group

    Fujitsu promotes the “Fujitsu Way,” the principle for the behavior of its people centered on a single purpose, which sets out why Fujitsu exists in society. All Fujitsu employees will seek to create value by working every day in accordance with values - aspiration, trust, and empathy – and Fujitsu’s code of conduct.

    But what is the Fujitsu Way, and what does it actually look like in practice for organizations looking to promote sustainable transformation?

    Take a deep dive into Fujitsu’s inner workings in this comprehensive e-book.

Find more content like what you just read:

  • Benefits of offensive data governance

    It’s a data-driven world. So, how can your organization succeed in it? Read this white paper to learn how, by leveraging an offensive data governance strategy, you can catalyze your business’s growth.

    Download

  • How to secure your business with the Content Cloud

    “How to secure your business with the Content Cloud” is a great overview of Box’s approach to security, governance, and compliance. Download the ebook and learn about their approach to content security, based on zero trust infrastructure, a centralized content layer in the cloud for easier management, and two other tenets.

    Download

  • Demystifying risk management

    Risk management refers to the practices and systems an organization employs to identify, monitor and remediate this risk. To shed light on risk management TechTarget has provided this article-guide, which will take you through the ins and out of risk management, as well as its importance for modern IT. Read on to learn more.

    Download

  • Drop the complexity: A refined approach to data governance

    Data governance stratagems have become so complex over the years, meaning it’s time for businesses to reimagine their governance approaches to cut down on bloat and inefficiency. Read on to learn how Alation’s data governance methodology goes a step beyond traditional approaches to ensure quality data remains compliant and generates business value.

    Download

  • Data governance for all seasons and reasons

    To promote business buy-in and avoid resistance to governance policies, programs should be business-driven, with data owners involved and the data governance committee making the decisions on standards, policies and rules. This infographic highlights some of the best practices for implementing and managing data governance programs.

    Download

  • Data governance 101: Creating a framework

    In this expert e-guide, we explore how to create an enterprise data governance framework. Uncover some strategic best practices for big data governance so that you can boost data quality and prevent critical inconsistencies.

    Download

  • 10 steps to building a data catalog

    Building a data catalog is an important initiative for many IT and data management teams. But organizations shouldn't undertake a data catalog project without getting input from business users. In this e-guide, learn why data catalogs have become a core component of the data management environment, and the 10 steps to build a data catalog.

    Download

  • Next Generation Governance. Now.

    Alation’s next generation data governance takes a people-centric approach and uses automated technology to foster a collaborative, effective governance environment. With results of up to 364% ROI and deployment within 6-12 weeks, according to one Forrester report. Access this white paper to learn more.

    Download

  • Royal Holloway: Man proposes, fraud disposes

    In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.

    Download

  • Key data governance considerations: Picking the right tool for you

    In this expert e-guide, we explore key evaluation factors for selecting the right data governance tool to suit the needs of your organization. Find out which metrics matter most when it comes to picking your tool, like handling metadata objects, managing data quality, addressing unstructured data, and more.

    Download

  • The call for data-centric security in a hybrid world

    Over 50% of organizations globally have suffered a ransomware attack that blocked access to systems or data — and more than 20% say the affected data was valuable, sensitive, or secret. With hybrid work increasingly the norm, those numbers are rising.

    Download

  • In data privacy we trust: building a strong information protection strategy in the hybrid era

    In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.

    Download

  • AI in the UK: The only way is ethics

    In this e-guide, we explore how enterprises must confront the ethical implications of AI use as they increasingly roll out technology that has the potential to reshape how humans interact with machines. We also shed a little light on the use of AI within politics - specifically through the controversial Brexit campaign.

    Download

  • AI in the UK: The only way is ethics

    In this e-guide, we explore how enterprises must confront the ethical implications of AI use as they increasingly roll out technology that has the potential to reshape how humans interact with machines. We also shed a little light on the use of AI within politics - specifically through the controversial Brexit campaign.

    Download

  • How to enable responsible AI at scale

    Despite the importance of ethics, it is only one component of responsible AI. Responsible AI is a strategy for executing ethical AI while maintaining accountability, compliance, and governance to enable great customer experiences and drive growth for your business. Read on to learn how you can put it into practice.

    Download

  • IT Leader’s Guide to Successful Data Governance

    This white paper will focus on how an architecture of different technologies and technological capabilities supports data governance. Read on to learn why the key to a successful data architecture is bringing together various software to efficiently address data challenges.

    Download

  • 4 steps to get the most out of Microsoft Purview

    It’s becoming more and more important for enterprises to forge robust data governance strategies. In this white paper, you’ll discover a data governance solution suite designed to help you build a more robust data protection strategy. Read on to learn about 4 steps you can take to make the most of your business’ resources and strengthen security.

    Download

  • Examining Identity and Access Management's Function in Healthcare

    Identity and access management is a crucial component of any healthcare organization's security strategy.

    Download

  • Manage data security in one place

    More organizations want data at the center of every business decision, but the complexity of managing many stakeholders and options, combined with an evolving security landscape, has made agile, data-driven decision-making unsustainable. Brose this e-book to learn more.

    Download

  • CISSP Exam Guide Chapter 1 sample download

    In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

    Download

  • IT automation: Key FAQs, how to set goals, and scaling best practices

    In this automation architect’s guiding e-book, discover a walkthrough map of the steps required to lead your organization beyond task-centric automation toward an enterprise-wide strategy.

    Download

  • How to create a risk-aware defense

    Organizations need visibility into what’s happening, and the ability to adapt fast to external and internal factors. In this e-book, see how your organization can benefit from unlocking a common language and bringing together business and IT on a single platform, to enable integrated enterprise-wide risk management.

    Download

  • Computer Weekly – 14 March 2023: Digital dedication – the transformation of Guinness World Records

    In this week's Computer Weekly, we find out about the digital transformation at Guinness World Records – dedication, that's what you need. We examine the new space race – to launch low-orbit, low-cost communications satellites. And we look at the role of technology in sustainability strategies. Read the issue now.

    Download

  • CW ASEAN: Time to dial up defences

    In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

    Download

  • 12 top enterprise risk management trends in 2023

    Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.

    Download

  • JOYNEXT leverages AllCloudand AWS Managed Servicesto optimize their cloud cost

    As businesses struggle to balance cloud spend, security, and management, many are turning to managed cloud service providers for help. In this quick case study, learn how a managed AWS environment helped JOYNEXT lower cloud costs while focusing on the user. Read the case study here.

    Download

  • Data maturity model: The path to data excellence

    How do “data mature” firms become that way, and how can others do the same? This white paper introduces a data maturity model to provide a common framework for benchmarking and advancing data management capabilities. Read on to learn how you can drive success on your own data maturity journey.

    Download

  • Data governance more important now than ever

    As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.

    Download

  • Financial markets regulatory outlook 2017

    Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.

    Download

  • Computer Weekly – 16 July 2019: Reaping the benefits of digital transformation at Defra

    In this week's Computer Weekly, we check out the digital transformation at Defra, and see how the government department is preparing for Brexit. The new technology chief for the NHS explains how he's going to bring the health service into the digital age. And we examine how to make a success of enterprise social media platforms. Read the issue now.

    Download

  • Build security for generative AI in federal government

    The potential for massive improvement to productivity and the citizen experience has organizations rushing to deploy generative artificial intelligence (AI) applications. In the public sector eBook you will discover how to begin envisioning and implementing protective measures for your generative AI workloads.

    Download

  • Harness the power of data for financial services

    Today, traditional financial organizations fail to harness the power of data, leading to a competitive disadvantage that is only increasing. Download this e-book to learn how Hitachi Vantara works with these organizations to ensure that they don’t squander data.

    Download

  • Financial maturity roadmap: 4 steps for success

    Today, manufacturing and distribution companies face more pressure than ever to improve efficiency and reduce costs while still getting superior products to market quickly. However, poor technology can be the reason you don’t achieve your goals. Browse this guide to learn more.

    Download

  • Build an effective API security strategy with this guide

    95% of companies have had an API security incident in the past 12 months, with API attack traffic growing by 681%. So, how do you develop an effective API security strategy to combat this? Dive into this whitepaper to get started.

    Download

  • The currency of trust: why banks and insurers must make customer data safer and more secure

    Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.

    Download

  • Global Risks Report 2017

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

    Download

  • Managing risk in the age of data privacy regulation

    If your business is a victim of a data breach, you’ll possibly face not only financial and reputational damage but also legal repercussions. And as more data privacy regulations emerge, it becomes even more challenging for your organization to ensure across-the-board compliance. Inside this white paper, discover tips for managing regulatory risk.

    Download

  • Combine your IG and BI programs for a 1-2 punch of data value

    Use this expert guide to explore the myriad of benefits that an information governance system can provide your business. Discover how records management can be improved when used alongside newer technologies such as analytics and BI.

    Download

  • AI-powered software delivery workflows: Your essential overview

    Read this e-book to discover how AI-Powered DevSecOps for the enterprise can increase innovation and accelerate the time-to-market at your company.

    Download

  • Dutch organisations demand more from government

    In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.

    Download

  • 25 Questions Leaders Should Ask About the Use of AI For GRC

    The use of artificial intelligence (AI) in risk management is on the rise, enhancing efficiency and speed in ways that simply cannot be done with other tools. However, the associated risks of AI must be taken into consideration so that your organization can develop a strategy that supports long-term success and scalability. Read on to learn more.

    Download

  • Essential Guide: APAC women in cyber security

    In Asia-Pacific, men continue to outnumber women in the growing field of cyber security - even as more women are entering the industry. The lack of awareness of the profession among students and unconscious biases in hiring processes are just some of the challenges that we must overcome before we can see more women in the profession.

    Download

  • Expert guide: Best enterprise content management software of 2022

    Enterprise content management (ECM) software can be an expensive, heavily involved purchase, so it's important to understand options before arriving at a decision. In this expert guide, we listed 10 important ECM platforms to consider while making a buying decision.

    Download

  • 7 core skills for today’s modern CFO

    With uncertainty abound, now is the perfect time for CFOs to step up to the plate and excel. Download this white paper to access 7 core skills for today’s modern CFO and learn how to push your business beyond the expected.

    Download

  • Computer Weekly - 16 March 2021: Containers play a key role in post-pandemic IT architectures

    In this week's Computer Weekly, our latest buyer's guide examines the key role that container technology will play in post-pandemic IT architectures. The UK government is under fire for its opaque approach to gigabit broadband strategy. And we assess the storage options for the growing volumes of unstructured data. Read the issue now.

    Download

  • Defining an effective data governance strategy

    Data governance is like a multi-player game. Creating a strategy that worksfor your organization will require input from multiple stakeholders, witheveryone contributing to the cause. Read on to learn more about the key aspects of establishing an effective data governance strategy.

    Download

  • 5 tips for digital transformation success: Tackling digital risk

    Read Digital Transformation & Risk For Dummies, 2nd ServiceNow Special Edition to learn how you can manage and tackle digital risk with a single platform that unlocks a common language between business and IT.

    Download