Data Retention and Document Holds
Trial by Tech: The Evolution of the Digital Courtroom – Speaking of Litigation Video Podcast
Information Security and ISO 27001
No Password Required: LIVE From Sunshine Cyber Con
Calculating eDiscovery Costs: Tips from Brett Burney
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Managing Large Scale Review Efficiency: Tips From a GC
DE Under 3: US DOL Inspector General’s Office Report Cites IT Modernization & Security Concerns
RegFi Episode 8: The Technological Path to Outcomes-Based Regulation with Matt Van Buskirk
Podcast: Discussing Information Blocking with Eddie Williams
The Data Center Cooling Conundrum With Leland Sparks - TAG Infrastructure Talks Podcast
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Everything Dynamic Everywhere: Managing a More Collaborative Microsoft 365
Law Firm ILN-telligence Podcast | Episode 62: Pierre Hurt, Lutgen & Associes | Luxembourg
ATL1, Atlanta Infrastructure and More With Brandon Peccoralo of Databank - TAG Infrastructure Talks Podcast
Expanded Information Block Rules Go into Effect
5 Key Takeaways | Current Perspectives Around the Convergence of Life Sciences and IT
No Password Required: A Child of the 1980s With a Knack for Storytelling, Comedic Timing, and Building an Elite Cybersecurity Team
Changing Hands: Keys To Downstream M&A IT Integration
Mia Reini and Monica Lopez Reinmiller on a Risk-Based Approach to Managing Employee Hotlines
Cutting over to a new Energy Trading and Risk Management (ETRM) system is a significant undertaking. The process involves transitioning data, configurations, and business processes from your legacy system to the new one,...more
Upgrading critical applications has become a common challenge for corporate IT departments. Software vendors can deploy major releases more quickly because of improvements in coding and testing tools and some tie eligibility...more
Maintaining a robust system is essential in the ever-evolving landscape of energy trading and risk management (ETRM). RightAngle, a flagship solution by ION, has been a linchpin for organizations navigating the complexities...more
In today's digital landscape, where data is often dubbed the "new oil," ensuring the smooth operation of databases is crucial for businesses. Regular oversight, including monitoring database metrics, is essential to optimize...more
Process inefficiency can create problems that quietly stifle productivity and potential growth. In an era of rapid digitalization, companies that lag in business process improvement risk falling behind competitors who embrace...more
The name denotes the systems are focused on improving operations in trading and risk, but what’s in it for other business stakeholders who support the transaction lifecycle? We will highlight the top advantages our team has...more
In the first part of Risk Management 101, we focused on the foundational elements of risk management. In part two, we’ll look at how the people who keep your organization running, with their unique insights, skills and...more
Business processes can get complicated over time in any organization. A fitting example of a core business process is the processing of payable invoices. The old-fashioned way of processing invoices is to receive the invoices...more
[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more
Learn More About: - Recent Regulatory Changes - The Scope & Complexity of Cybersecurity Risk - Tips to Join Forces with the IT Department - - Mapping Cybersecurity Risks to Controls & Operations - IT Frameworks to...more
The Pandemic Crisis has offered the financial services sector a live stress test environment to assess its planning, systems, and processes for Operational Resilience. To explore this and see how institutions have fared so...more