About three years ago, Steven Adler was running the privacy consulting practice at IBM. As he talked with IBM customers, he discovered that many of the large customers had some pretty complex IT ...
“Data is the new oil” being cliche only highlights the statement’s relevance. As data volumes continue to multiply, so do the complexities of management — especially in cybersecurity. Cribl Inc. is ...
Staying ahead of the competition is a constant refrain law firms hear, but how do they know if they are in front of the curve or falling behind when it comes to data maturity? This session will ...
MCLEAN, Va.--(BUSINESS WIRE)--Verato, the identity experts for healthcare, today announced the launch of an online assessment for the Verato Identity Data Management Maturity Model. The Verato ...
The EDM Council has completed the first draft of its Data Management Maturity (DMM) model and expects to release a final version to the industry by 2012, Inside Reference Data has learned. In 2009, ...
Today’s organizations are committed to collecting and analyzing as much data as possible from sources new, old and evolving. But they continue to have variable levels of success distilling and ...
CTO, AtScale, empowering customers to democratize data, implement self-service BI and build more agile analytics for better decision making. Analytics teams are actively working to redefine their ...
THE WOODLANDS, Texas--(BUSINESS WIRE)--McKesson Specialty Health announced today that its Risk Evaluation and Mitigation Strategies (REMS) program has been appraised at Level 2 of the CMMI Institute’s ...
Ted has worked in the security arena for over 25 years. Including 10 years with the Dept of Defense and 15 years at Keyfactor. Most business leaders recognize that when it comes to cybersecurity and ...
The supply chain risk management maturity model has long been an industry standard, but today's pace of disruption is stretching even its most advanced stages. This session will explore how ...