Why Digital Transformation Is So Hard

Organizations aren’t falling behind well-established standards so much as “struggling to keep up with accelerating standards,” the PwC report said. It’s clear “most are not ready for what comes next – as technologies continue to combine and advance and new ways of doing business go from inception to disruption seemingly overnight,” it added.

Another way of saying that is that the technical skills in hand in the IT organization may be the same or greater than before, but executives’ conception of what will be needed in the near future is outstripping those skills. Welcome to the age of digital transformation…

Most companies have not kept up with the need to transform digitally “as powerful new tools crowd into the marketplace,” the report warned. The scale against which the executives are measuring their digital preparedness is not a static one but the fast-moving environment in which they now find themselves. The companies may actually be smarter about technologies they’re using “but the questions keep getting harder,” the report noted.

The above is taken from, “The Need to Go Digital Is Clear; Not Everyone Can Get There” in InformationWeek

InfoGov Links Of The Week 03-31-2017

AIIM 2017 State of Information Management

For purposes of context for our survey, we positioned digital transformation as the concept of being paperless, using multi-channel inbound capture, and the impact digital transformation will have on individuals, business organizations, and operational processes. What we found is that there is progressive movement, albeit not the hockey stick inclination everyone hopes for, but movement nonetheless.

Digital transformation drives interest in governance, predictive analytics

Three trends that will grow due to digital transformation in the workplace are:

  1. Shifting From a Legacy Culture to the Cloud
  2. A New Approach Due To Data Governance Due to IoT
  3. Using Predictive Analytics to Make Better Decisions

GDPR Is Looming: How ECM Can Help Businesses Meet the Challenge

Metadata can play an important role in helping companies comply with the various GDPR requirements. When leveraged within an ECM system, metadata helps companies correctly categorize and manage PII according to GDPR requirements.

Are We Really Having the ‘ECM is Dead’ Conversation Again?

ECM describes the overarching strategy or concept of operations for managing unstructured information. Technology is of course important, but is just one third of our traditional view of implementing technology into an organization: People, Process and Technology.

The Right Way to Make Your Data Deliver

When data is only used for things like risk management, fraud prevention and compliance-related activities, its awesome potential is never realized and money is left on the proverbial table.

But business intelligence can also successfully tie profits and losses back to everything from promotional campaigns to the weather patterns affecting individual store sales.

Twitter stops counting usernames in replies toward the 140-character limit

Twitter’s 140-character limit is essential to its existence, but the company realizes how annoying it can be to trim your thoughts when composing a reply because the person you’re chatting with has a long username. Twitter has decided to no longer count a username toward your 140 characters, a change now rolling out to its iOS and Android apps as well as Twitter.com.

Millions of Stolen US University Email Credentials for Sale on the Dark Web

Stolen email addresses and passwords from the largest US universities are offered for sale on the Dark Web at anywhere from $3.50 to $10 apiece…

With the help of research firm ID Agent, they found 13,930,176 credentials from those big schools, with the University of Michigan (122,556), Penn State (119,350), University of Minnesota (117,604), Michigan State (115,973), and Ohio State (114,032), with the most credentials for sale, and MIT with the biggest ratio of stolen and spoofed email addresses to number of enrolled and staff, 2.81:1, followed by Carnegie Mellon University, 2.4:1, Cornell University, 2.39:1, and others.

“I’ve been scraping the Dark Web since 2009. There were 2.2 million .edu [emails] there back in 2015, 2.8 million in 2016, and now almost 14 million a year later. That’s a significant spike,” says Brian Dunn, managing partner at ID Agent.


InfoGov Links Of The Week 03-17-2017

Forces of Change In Content Management – Keynote from John Mancini at AIIM17

Slide 11 has several questions on these forces of change, the most pertinent one being, “What Does The Business Want? Enhanced Customer Experience.”  This makes me ask the question of how am I empowering employees to have access and insight information to enhance the customer experience so we can get the highest ROI from records and information and not waste time wading through junk looking for the right information.

AI Automation Starts To Transform The Legal Profession

While AI and big data make processes such as document review more efficient, it is at its most effective when combined with human expertise. “The system may identify and classify a clause that pertains to transfer rights, but the model will be unable to confidently assess whether the particular clause actually prohibits or permits the transfer of rights and obligations between parties,” says Orlando Conetta. “A lawyer would need to read the clause and make that determination, while AI ensures that the lawyer can find the clause quickly and only needs to assess the provision once, across all the documents it may be found in.”…

Richard Susskind co-developed the world’s first commercially available legal AI system in the 1980s and has recently co-written The Future of the Professions about the impact of technology on professional jobs. “In the 2020s, legal professionals will have a stark choice – compete with machines or build the machines,” he says. “By competing with machines, I have in mind that human lawyers will be doing things that machines cannot.

“By building the machines, I have in mind recognising that there will be AI solutions in the future for many of the problems that bring clients to their lawyers today; and so the way to meet clients’ needs will be to be involved in building these AI systems.”

Susskind says AI is likely to carry out work including due diligence reviews in transaction work, predictions of court decisions and online dispute resolution. “All of this means that legal professionals will not just be legal advisers, they will also be legal knowledge engineers, legal data scientists, legal technologists and legal process analysts.”

Information Management Fuels Your Digital Transformation Experience

Digital transformation ultimately means digitizing processes for improved process transparency and accuracy, ease and speed of transaction, customization and satisfaction from the customer experience.

What Trump’s Skinny Budget Says About Cybersecurity

President Donald Trump’s 2018 budget blueprint, released Thursday, touts major investments in cybersecurity, including a $61 million hike to help the FBI and the Justice Department combat criminals and terrorists’ use of encrypted communication tools.

The document is light on specifics, however, and does not include a top line figure for cyber investments.

Trump’s Homeland Security Adviser Tom Bossert pledged a broad plan to improve federal cybersecurity during his first formal address Wednesday, including by investing in modernized government technology and sharing cybersecurity services between agencies but stopped short of suggesting dollar figures. Trump plans to “put his money where his mouth is” on improving cybersecurity, Bossert said.

Ensuring The Next Data Breach Isn’t Yours

As the use of the cloud grows the severity of data breaches rises. This year’s breaches have proven that organizations should never think they are exempt from a breach. Rather, they should accept a “when,” not “if,” mentality, and have policies in place to detect and prevent sensitive data from falling into the wrong hands.

How To Compete In The Age of Analytics

If your organization has not started on the path toward building out a big data environment, you are behind the curve. Big data is here to stay and providing several benefits and new capabilities. One of the primary drivers behind the first wave of implementations is to lower the cost structure of storing the ocean of data that organizations are swimming in. Traditional data platforms are costly and do not provide an economical solution for storing massive amounts of information. By leveraging low-cost, commodity hardware, companies can store petabytes of information at very reasonable cost.

AI Is The Most Important Development in Tech, and the Deadline for Adapting was Yesterday

After speaking with about 10 people from across the AI/Big Data spectrum — from investors and startups to corporates and techies with opinions — there seems to be a sense of inevitability about the fact that AI will play a significant role in the day-to-day lives of the average person.

Which means the next 5-10 years are to be defined by our ability to adapt to AI technology and its disruptive impact. Unlike the Internet in 1990, a lot of ‘old school’ people (like governments, traditional SMEs and large corporations) seem to recognise AI as a potentially disruptive technology.

How did Yahoo get breached? Employee got spear phished, FBI suggests

The indictment unsealed Wednesday by US authorities against two agents of the Russian Federal Security Service, or FSB, (Dmitry Dokuchaev and Igor Sushchin) and two hackers (Alexsey Belan and Karim Baratov) provides some details of how Yahoo was pillaged of user data and its own technology over a period of over two years. But at a follow-up briefing at the FBI office here today, officials gave fresh insight into how they think the hack began—with a “spear phishing” e-mail to a Yahoo employee early in 2014.

Malcolm Palmore, the FBI special agent in charge of the bureau’s Silicon Valley office, told Ars in an interview that the initial breach that led to the exposure of half a billion Yahoo accounts likely started with the targeting of a “semi-privileged” Yahoo employee and not top executives. He said social engineering or spear phishing “was the likely avenue of infiltration” used to gain the credentials of an “unsuspecting employee” at Yahoo.



InfoGov Links of The Week 03-10-2017

Blockchain & ECM

Blockchain in some ways defeats the point of centralized records management but the likelihood is that more specialized applications will be adding this kind of functionality to their systems.  Potentially disrupting the traditional approach to RIM.

The More Things Change – ECM Isn’t Really Dead

ECM is not a technology, methodology, or process. Rather, it is a mindset or framework designed to get the right information to the right audience, in the right context, at the right time. ECM is enabled by tools and processes that help capture, manage, store, preserve, and deliver information…relabelling ECM is rather pointless. I’m fairly certain the buyers don’t care, and the vendors are going to have to use terminology that resonates with the buyers. “Wanna buy ECM? or “Wanna buy Content Services?” are likely to get the same none too friendly response. Content Services is not a market. Content services are what content management tools provide and it’s been that way ever since someone coined the term “Enterprise Content Management”.

Why It’s Time to Think Differently About Information Management

Do the processes we ask end users to go through align with the way they work? Or are they at odds with modern working life?1

It’s essential to build easy-to-use information management practices for how users work today — not how things worked 20 or 30 years ago.

How to Make Your Information Management Program Successful

You’d think that if the program’s stakeholders get it right by understanding their current environment (e.g., being attuned to the needs of the business and planning the major organizational elements of their program, systems, and organization of content, etc.), that they would be primed for success. Well, they are, but ultimately, enterprise programs aren’t successful because the board approves the project. They are successful because they are executed well. In too many cases, leaders, who have exceptional strategic skills, lack the day-in/day-out, persistent approach needed to deliver on a three-year vision.

5 Trends Shaping Information Management

  1. Data Teams Bridge the Gap Between IT and Business
  2. The tools of the Clouds Era Emerge
  3. Security Gets Worse Before It Gets Better
  4. IoT Transforms Physical Environments and Social Conventions
  5. Opportunity Spikes in Cloud Management Arena




InfoGov Links Of The Week 03-03-2017

AWS, Microsoft and Google take different paths to the cloud

An outage at Amazon Web Services Tuesday rekindled the debate about whether it is wise to rely too heavily on one cloud service provider. Such snafus are rare for AWS so CIOs worry more about the potential for vendors to turn off their service without notice.

But CIOs who bet on multiple providers often invite challenges, including committing resources to work with each vendor…
Understanding the keys to enterprise information management success
all information, whether structured or unstructured, electronic or printed, or raw or derived, can benefit from the same kind of asset management discipline and EIM program. I’d like to see the day in which all forms of data/information/content/records are managed under some unified approach.

6 Personal Observations about “ECM” and “Content Services”

  1. In the end analysis, “Content Services” is just another label.
  2. The term “ECM” DOES need retirement and/or modification.
  3. “Content Services” means applications and processes are center stage.
  4. “Content Services” DOES need a definition.
  5. The change represented by “Content Services” is a fundamental one for solution providers.
  6. “Content Services” ultimately is a story of disruption.

Technology Standards and the New EDRM

Standardization of technology has the promise to cut business and legal risks through the identification of challenges and development of mechanisms to prevent actual and potential issues and downtime. Standardization also many times is the precursor to the rapid uptake of new and beneficial approaches to solving problems with technology. If the EDRM, under its new leadership, can contribute to industry standardization by helping create technology standards besides task and process frameworks, the development of data and legal discovery technologies may see a new level of acceleration that should positively impact all members of the eDiscovery ecosystem.

How to Avoid Big Data Mistakes

Looking for a way to keep your customers happy and feeling safe, your bosses relaxed and confident, and the rest of your company’s teams protected from major mistakes? Just as a solid accounting system ensures and demonstrates that a business is being well managed, a data governance program is a necessary element of any business today that deals with data. And that’s basically all businesses.

Best Practices For Lowering Ransomware Risk

While ransomware actors in many cases return the data as promised, they may leave backdoors to return for more money, time and time again, or may not return data at all.

How I Pulled Myself Out Of The Waterfall

I was an IT executive several years ago at a large biotech company that was drowning in the waterfall method and our team knew it had to stop. We instituted an early experiment in DevOps, an organizational construct that calls for software developers and operations teams to exit their silos and collaborate closely to accelerate the frequency of code releases into production.

Top Cybersecurity Posture Also Aids Organizations With Innovation

cybersecurity is no longer just a means to avoiding a PR disaster, but rather it’s become a necessity for engendering digital innovations, goodwill, and user loyalty, as well as driving revenue growth. Those companies that refuse to invest in it are doomed to be left behind.




#InfoGov Links Of The Week 02-24-2017

Why Technology Won’t Solve Your Business Process Problem

When I talk with folks about workflow issues, the focus of discussion typically turns to technology or the potential use of it. Until we understand the underlying reasons for the issue, technology alone will not resolve it completely and, in fact, has amplified the issue in some cases. My point is that in order to address workflow issues, organizations need to be aware of and embrace the concept that process management and automation are about more than just the technology.

ECM or Content Services? What Is the Big Deal?

The acknowledgement of a single platform for enterprise content has never worked, which came as no surprise. Most practitioners have been pointing to the fallacy of a single repository for years. ECM platforms had stopped being used to manage web pages and rich media years ago. In fact, documents have started to move outside of their traditional platforms and into line of business and operational content solutions, like contract life cycle management.

How Cybersecurity Analytics Are Evolving

Predictive analytics analyzes behavior that indicates threats, vulnerabilities, and fraud. Slowly, but surely, cybersecurity budgets, analytics, and mindsets are shifting from prevention to detection and remediation because enterprises need to assume that their networks have been breached.

Gartner Study Finds a 31% Spike in IoT Worldwide

There is always the chance that security concerns will cool the consumer’s desire for smart products in the home. The 2016 distributed denial of service attack from a botnet of insecure connected cameras and DVRs is expected to have an impact. Said Middleton, “It could cause consumers to think twice about employing connected devices.”

ARMA International points out that in addition to security concerns, a host of information governance concerns should be addressed, particularly in the business market for these devices. Privacy concerns are already hitting the marketplace and cost considerations go beyond the cost of the devices. Businesses using these devices are collecting large quantities of data, which must be handled responsibly. Information governance experts have an opportunity to help organizations maximize the value of the information collected while putting safeguards in place to ensure the information is handled responsibly.

‘Liberating’ data to drive insights at Northwell Health

The job of the chief data officer is to break down the silos, remove roadblocks to innovation and help move this whole thing along with a degree of urgency that can only occur if the CDO has a direct link into the senior leadership group—which has to buy in and support that individual.

4 Steps to Better Manage Cybersecurity Risks

  1. Double down on the basics
  2. Watch and secure the supply chain
  3. Invest in employee training
  4. Track metrics and work as a team

Information Management: The Critical Thing You’re Overlooking in the Digital Workplace

In most organizations, information management policies are not a priority of end-users. Few of them have deep understanding or the policies or the expertise to apply them correctly.

But information is useless if it can’t be found in a timely and efficient manner. Organizations need to have policies to ensure the data is organized and complete, as well as to address when data can be deleted.

Cyberwar Talk Is Getting Real

“Our democracy itself is at risk,” he said. Russia had crossed a “red line”, and America’s ability to win in cyberspace depends on its ability to deliver “meaningful consequences”.

“Unfortunately, we still do not have clear proportionate response policies for striking back against nation-states,” McCaul said. “Today, in some cases, the United States government is fighting 21st century threats with 20th century technology, and a 19th century bureaucracy.”

Will agencies get the full value of their information?

As the government continues to adopt analytics technology, it is vital that agencies invest in the talent and knowledge necessary to enable those efforts. Addressing the skills gaps is the first step in getting ahead of future information management requirements. Doing so will allow the government to unlock the full potential of analytics by boosting faster decision making, driving cost savings, creating program efficiencies and unleashing the potential of agency information.


#InfoGov Links Of The Week 02-17-2017

Yesterday I passed two parts of the ICRM exam.  The lead up to it caused me to delay links of the day.  Sorry for the delay.  Please read, enjoy, share and do your part to mature the InfoGov community.

Companies Still Struggle With Information Governance, Survey Finds

Despite years of talking about information governance and compliance, less than half of companies surveyed have a compliance culture  — and many companies apparently have no governance strategy at all.

The Need for Information Governance Has Never Been Greater

Corporations need information governance programs in order to minimize compliance risk and reduce costs associated with eDiscovery and litigation response. Corporations must establish consistent and logical frameworks for how employees handle data. They can do this through information governance policies and procedures that help guide organizations and their employees in handling electronically stored information.

Future Technology Be My Valentine

when it comes to information management solutions too often businesses accept a box, err, I mean a list of “appropriate” solutions providers from experts. Unfortunately, some of these lists are born from criteria often outdated and not indicative of what your organization is actually looking to achieve. Blindly following leaves companies to bend to the limitations of poorly selected solutions. I have witnessed amazing human work-arounds that serve solely to overcome such tragic shortcomings, I refer to these human heroes as our “ultimate integrators”. My advice, push to ensure your solutions can interoperate, play nice, and aid in empowering your entire business ecosystem. Your environment is unique and only you know the complete picture, while these lists can inform you, do not blindly accept them. Perform your due diligence and research to understand if a solution will grow with your business objectives and strategic roadmaps.

7 ways MDM threatens employee privacy

  1. SSL MITM exposes private communications
  2. Wide open access to users’ browsing histories
  3. Mobile apps give MDM access to personal info
  4. Location data revealed
  5. Poor User Experience
  6. Risk of personal data loss
  7. Restrict core device functionality

The Conflict between Data Science and Cybersecurity

Cybersecurity is in direct conflict with the basis tenants of data analysis, especially big data analysis, predictive analytics and data mining. Data analysis, especially big data, is about opening access to a lot of the data in an organization to find new some interesting ways to solve business problems. For example, giving a marketing team information that they typically don’t use so they can find new and interesting ways of positioning your products or do some predictive analytics for sales forecasting.

5 ECM Lessons from a Non Verbal Communication Expert

  1. Spoken or written words are only part of the story
  2. Classification starts by objectively defining basic elements
  3. Classification is ongoing
  4. Use multiple viewpoints to guard against bias
  5. Overconfidence in accuracy of results may be misplaced

Big Data: Why Should You Be Aware of It

  1. Customer Engagement
  2. Increase the Accuracy of your projections
  3. More Efficient PRoject Performance
  4. Understanding the impact on clients

Only 39% of hospital CIOs are working on a digital health strategy

The survey of 112 hospital CIOs found that 38% are making electronic health records integration their top spending priority, followed by accountable care (population health technology) and consumer, clinical and operational analytics at 21% and 16%, respectively. Other technology spending priorities for hospital CIOs include virtual/telehealth technology enhancements at 13%, revenue cycle systems and replacement at 7% and enterprise resource planning systems at 6%.