{"id":4088910,"date":"2025-11-12T17:23:30","date_gmt":"2025-11-12T22:23:30","guid":{"rendered":"https:\/\/www.computerworld.com\/video\/4088910\/louvre-breach-sap-overhaul-landmark-data-ruling-ep-14.html"},"modified":"2025-11-20T14:02:03","modified_gmt":"2025-11-20T19:02:03","slug":"louvre-breach-sap-overhaul-landmark-data-ruling-ep-14","status":"publish","type":"video_episodes","link":"https:\/\/www.computerworld.com\/video\/4088910\/louvre-breach-sap-overhaul-landmark-data-ruling-ep-14.html","title":{"rendered":"Louvre Breach, SAP Overhaul, Landmark Data Ruling | Ep. 14"},"content":{"rendered":"<div id=\"remove_no_follow\">\n\n\n\n\n\n\n\n<div class=\"transcript\" id=\"transcript\" role=\"region\" aria-label=\"Transcript\" data-transcript-blocks=\"6\">\n            <h2 class=\"transcript__title\" id=\"transcript\">Transcript<\/h2>\n            <div class=\"transcript__text\">\n                <div class=\"transcript__list\" role=\"list\"><div class=\"transcript__item\" role=\"listitem\"><div class=\"transcript__item-meta\">\n                    <time>00:04<\/time> \n                    <button class=\"transcript__jump-button\" data-time=\"4\" aria-label=\"Jump to 00:04 in video\">\n                        <i class=\"icon-play\"><svg><use xlink:href=\"#icon-play\"><\/use><\/svg><\/i>\n                    <\/button>\n                <\/div><div class=\"transcript__content\" data-paragraphs=\"2\" data-readmore=\"Show more\" data-readless=\"Show less\"><p class=\"transcript__paragraph\">Hello, and welcome to your 2-Minute Tech Briefing from ComputerWorld. I'm your host, Arnold Davick, reporting from the floor of the New York Stock Exchange. Here, the top I.T news stories you need to know for Wednesday, November 12th. Let's dive in &mdash; from Computerworld.<\/p><p class=\"transcript__paragraph\">A digital security lapse at the Louvre.<\/p><\/div><\/div><div class=\"transcript__item\" role=\"listitem\"><div class=\"transcript__item-meta\">\n                    <time>00:20<\/time> \n                    <button class=\"transcript__jump-button\" data-time=\"20\" aria-label=\"Jump to 00:20 in video\">\n                        <i class=\"icon-play\"><svg><use xlink:href=\"#icon-play\"><\/use><\/svg><\/i>\n                    <\/button>\n                <\/div><div class=\"transcript__content\" data-paragraphs=\"2\" data-readmore=\"Show more\" data-readless=\"Show less\"><p class=\"transcript__paragraph\">The world famous Louvre Museum in Paris is under fire after a burglary revealed longstanding cyber security issues. Thieves broke in through a second floor window last month, stealing eight pieces of jewelry.<\/p><p class=\"transcript__paragraph\">Alarm systems worked as expected and police responded within minutes, but a French audit report shows the museum has been struggling for years to update outdated windows software, including its video surveillance systems.<\/p><\/div><\/div><div class=\"transcript__item\" role=\"listitem\"><div class=\"transcript__item-meta\">\n                    <time>00:45<\/time> \n                    <button class=\"transcript__jump-button\" data-time=\"45\" aria-label=\"Jump to 00:45 in video\">\n                        <i class=\"icon-play\"><svg><use xlink:href=\"#icon-play\"><\/use><\/svg><\/i>\n                    <\/button>\n                <\/div><div class=\"transcript__content\" data-paragraphs=\"2\" data-readmore=\"Show more\" data-readless=\"Show less\"><p class=\"transcript__paragraph\">A full security review with new governance policies upgraded cameras and updated cyber security protocols is expected by the end of the year. And from CIO at SAP Tech Ed Berlin, the ERP giant announced a major change to how I.T professionals earn certifications.<\/p><p class=\"transcript__paragraph\">Instead of multiple choice exams, SAP will now test candidates in real world environments, allowing them to use any resource from AI tools to online references.<\/p><\/div><\/div><div class=\"transcript__item\" role=\"listitem\"><div class=\"transcript__item-meta\">\n                    <time>01:13<\/time> \n                    <button class=\"transcript__jump-button\" data-time=\"73\" aria-label=\"Jump to 01:13 in video\">\n                        <i class=\"icon-play\"><svg><use xlink:href=\"#icon-play\"><\/use><\/svg><\/i>\n                    <\/button>\n                <\/div><div class=\"transcript__content\" data-paragraphs=\"2\" data-readmore=\"Show more\" data-readless=\"Show less\"><p class=\"transcript__paragraph\">The company says this approach reflects real world problem solving and rewards professionals who know how to find the right answers, not just memorize them. The new format debuts with six certifications this year. And finally from CSO.<\/p><p class=\"transcript__paragraph\">The Fourth Circuit Court of Appeals has ruled that simply publishing stolen data on the dark web can now be considered harmful enough to justify a lawsuit.<\/p><\/div><\/div><div class=\"transcript__item\" role=\"listitem\"><div class=\"transcript__item-meta\">\n                    <time>01:36<\/time> \n                    <button class=\"transcript__jump-button\" data-time=\"96\" aria-label=\"Jump to 01:36 in video\">\n                        <i class=\"icon-play\"><svg><use xlink:href=\"#icon-play\"><\/use><\/svg><\/i>\n                    <\/button>\n                <\/div><div class=\"transcript__content\" data-paragraphs=\"2\" data-readmore=\"Show more\" data-readless=\"Show less\"><p class=\"transcript__paragraph\">The case involved an insurance company breach that exposed driver's license data for nearly 3 million customers. Previously, plaintiffs had to prove actual financial harm or fraud. The new ruling suggests dark web exposure itself creates a credible risk of fraud.<\/p><p class=\"transcript__paragraph\">That may now be enough for a claim to move forward. That's today's two minute tech briefing. For more enterprise I.T. news, visit Computerworld CIO and CSO online.<\/p><\/div><\/div><div class=\"transcript__item\" role=\"listitem\"><div class=\"transcript__item-meta\">\n                    <time>02:01<\/time> \n                    <button class=\"transcript__jump-button\" data-time=\"121\" aria-label=\"Jump to 02:01 in video\">\n                        <i class=\"icon-play\"><svg><use xlink:href=\"#icon-play\"><\/use><\/svg><\/i>\n                    <\/button>\n                <\/div><div class=\"transcript__content\" data-paragraphs=\"1\"><p class=\"transcript__paragraph\">And don't forget to like and subscribe to the show on the Tech Talk YouTube channel.<\/p><\/div><\/div><\/div>\n            <\/div>\n        <\/div>\n\n<\/div>\n","protected":false},"author":1168,"featured_media":100069412,"template":"","meta":{"__idg_published_ids":[],"__idg_published_status":"draft","embargo_date":"","multi_title":"[]","old_id_in_onecms":"","_idg_updated_flag":false,"_idg_updated_date":"","hreflang_xdefault":0,"content_type":"","suppress_html_meta":"{}","byline":"","featured_video_id":0,"supress_floating_video":false,"prevent_index":0,"has_duration":0,"teaser_paragraphs":"","is_translated_post":0,"idg_original_post_id":0,"idg_translated_post_ids":[],"idg_original_post_publication":"","idg_original_post_language":"","idg_original_post_brand":"","right_panel_heading":"","video_type":"youtube","podcast_episode_id":4088917,"yt_video_id":"R18mMDD_11I","yt_video_duration":"2.20","jw_video_id":"","jw_video_duration":"","jw_video_title":"","episode_ordering":14,"is_hosts_enabled":true,"is_guests_enabled":false,"suppress_monetization":"{}"},"categories":[1885,2492,2496,2533],"tags":[],"languages":[21],"editions":[19],"publication":[9,10],"sponsorships":[],"video_series":[24684],"coauthors":[24801],"class_list":{"0":"post-4088910","1":"video_episodes","2":"type-video_episodes","3":"status-publish","4":"has-post-thumbnail","6":"category-artificial-intelligence","7":"category-cybercrime","8":"category-data-breach","9":"category-internet-security","10":"languages-en","11":"editions-us","12":"publication-computerworld","13":"publication-us-default","14":"video_series-2-minute-tech-briefing"},"eyebrow":{"eyebrow":"Video","eyebrow_style":"default","eyebrow_feed_title":"Video","eyebrow_feed_style":"default"},"_links":{"self":[{"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/video_episodes\/4088910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/video_episodes"}],"about":[{"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/types\/video_episodes"}],"author":[{"embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/users\/1168"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/media\/100069412"}],"wp:attachment":[{"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/media?parent=4088910"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/categories?post=4088910"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/tags?post=4088910"},{"taxonomy":"languages","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/languages?post=4088910"},{"taxonomy":"editions","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/editions?post=4088910"},{"taxonomy":"publication","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/publication?post=4088910"},{"taxonomy":"sponsorships","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/sponsorships?post=4088910"},{"taxonomy":"video_series","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/video_series?post=4088910"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/coauthors?post=4088910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}