Issue link: https://epubs.iltanet.org/i/74024
article title loss prevention, hacker defense — but they all share a common set of requirements and challenges, which in large part are people-related. The Importance of People While each undertaking presents its own set of nuances, depending on the specific drivers and environment in play, there are two critical elements to a successful implementation. The first is enforcement technology that is well-suited to the task at hand, addressing the functional and performance requirements of your firm. The second is a prudent plan for making this software work in your specific environment, coupled with the skill to effectively execute it. In this regard, project management has an essential role to play in protecting the firm, because the most sophisticated technology has no value if it's not being used, and used to its greatest potential. Putting confidentiality management tools to work requires much more than addressing noteworthy technical challenges like transparently integrating with multiple software applications and data repositories. It also entails educating a variety of stakeholders, collecting, evaluating and responding to feedback, modifying internal work practices, and implementing policies and procedures that can stand the test of time after the official project concludes. This "people" side of the equation should not be underemphasized or overlooked as it is critical to the project's success. ILTA White Paper 21