This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
From Bloomberg.com: FEMAs Demise Could Mean for Flood Insurance The announcement last week from Homeland Security Secretary Kristi Noem that she plans to eliminate the Federal Emergency Management Agency (FEMA) has cast a pall over the US governments disaster response unit. While most of the focus has been on what it would mean for disaster recovery if the agency is wound down, theres another big issue at stake: FEMAs foundational role in managing the National Flood Insurance Program (NFIP).
Pure Storage Partners with CERN openlab to Evaluate the Benefits of Flash for Scientific Research by Pure Storage Blog Summary Pure Storage and CERN openlab are working together to research how the European Laboratory for Particle Physics will use flash storage to support future research needs. Pure Storage has announced a partnership with CERN (the European Laboratory for Particle Physics), which aims, through the CERN openlab collaboration, to accelerate the development of cutting-edge ICT sol
The Jokes on Whom? Navigating Humor in Crisis Management By Ella Kate Baker Introduction by Jonathan Bernstein When Ella Baker from The University of AlabamasCollege of Communication and Information Sciences contacted me about being interviewed for this Platform Magazine article, my first response to her was Wow, what a great story angle! I have been interviewed scores of times in my career, and written very extensively, but humor in crisis management has never been a topic!
We continue to see disasters increase in size, frequency and impact. What are we doing wrong when it comes to disaster resilience, especially as it impacts our ability to adapt to the climate impacts that are experiencing and take a longer view to disaster resilience. The podcast guest is Jeff Schlegelmilch an Associate Professor for Professional Practice in Climate.
Chatbots like ChatGPT, Gemini, Microsoft Copilot and the recently released DeepSeek have revolutionized how we interact with technology, offering assistance with almost every task imaginable from drafting e-mails and generating content to writing your grocery list while keeping it within your budget. But as these AI-driven tools weave themselves into our daily routines, questions about data privacy and security are becoming harder to ignore.
Macys $154M Lesson: Why Every Company Needs Separation of Duties Last Updated: April 3, 2025 In early 2025, a scandal broke that sent shockwaves through the financial world. Macys, one of Americas most iconic retailers, revealed that an internal accounting fraud had distorted its financial results for years ( New York Post ). At the heart of the scandal was a single employee who allegedly concealed up to $154 million in delivery expenses over three yearsresulting in inflated profits and executiv
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Macys $154M Lesson: Why Every Company Needs Separation of Duties Last Updated: April 3, 2025 In early 2025, a scandal broke that sent shockwaves through the financial world. Macys, one of Americas most iconic retailers, revealed that an internal accounting fraud had distorted its financial results for years ( New York Post ). At the heart of the scandal was a single employee who allegedly concealed up to $154 million in delivery expenses over three yearsresulting in inflated profits and executiv
No Compliance, No Contracts: Why CMMC 2.0 Is a Top Security Priority March 28, 2025 Scott Ray Chief Operations Officer Cybersecurity is a must-have for every organization, perhaps nowhere more so than in the defense industry. Even unclassified information can be highly sensitive, with devastating potential in the wrong hands: espionage, theft of intellectual property, cyberattacks on critical infrastructure, supply-chain sabotage, or financial extortion, for example.
Think ransomware is your worst nightmare? Think again. Hackers have found a new way to hold your business hostage and it may be even more ruthless than encryption. Its called data extortion , and its changing the rules of the game. Heres how it works: They dont bother encrypting your files anymore. Instead, they just steal your sensitive data and threaten to leak it unless you pay up.
As one customer put it: “We spend 99% of our time on our ITSM platform and only 1% on PagerDuty.” This simple statement highlights the beauty of PagerDutyits a low-maintenance tool that just works. However, even the best tools benefit from a little governance to ensure theyre being used effectively. Enter the PagerDuty Champions a small, part-time team dedicated to keeping your incident management practices sharp and your teams productive.
The Overlooked Bottleneck in Data Visibilityand Its Impact on Cyber Resilience by Pure Storage Blog Summary Every second counts in cybersecurity. Without high-performance storage to deliver fast ingestion and processing speeds, even the best security toolsand the cyber threat hunting teams using themwill be limited. Organizations rely on security logs to help detect, respond to, and recover from cyber threats.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
In today’s fast-paced and unpredictable business landscape, preparedness is paramount. Whether facing a natural disaster, a cyberattack , or even a simple power outage, organizations must ensure they can maintain essential functions. That’s where a robust business continuity template comes into play. Why a Template Matters? A well-structured business continuity template isn’t just a document; it’s a roadmap.
Infobesity: How Much Data is Too Much? Many financial services firms have such vast hoards of data much of it unclassified legacy data that owning it causes more data governance challenges than the information is worth. Olivier Nautet, Group CISO at BNP Paribas, says that firms suffering infobesity must approach the challenge cross-functionally, with a view to operational resilience and compliance.
Solutions Review’s Executive Editor Tim King compiled this roundup of World Backup Day quotes from experts for 2025, part of our ongoing coverage of the enterprise storage and data protection market. In the age of AI, ransomware, and relentless cyber threats, data protection is no longer just an IT issue its a boardroom imperative. As part of Solutions Review’s ongoing coverage of the enterprise storage, data protection, and backup and disaster recovery markets, our editors bring yo
When it comes to running a business, most owners consider aspects like quality customer service, reliable products or services, and closely monitored P&Ls as reasons for company success or failure. Most never consider one other sneaky element that is often overlooked as a make-or-break factor because its a boring necessity. What is it? Your technology.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
Modeled on legislation passed in New York in 2024, California AB 976 would offer small retailers a tax credit for security improvements. SILVER SPRING, Md. On March 24, 2025, the Security Industry Association (SIA) testified before the California Assembly Committee on Revenue and Taxation in support of California Assembly Bill 976, legislation that would establish a tax credit program for small retailers in disadvantaged communities who purchase or install security equipment.
Given the current climate in the federal government, it’s critical that public sector IT leaders find innovative solutions to do more with less. Thats a real challenge for these leaders who must balance with current alert backlogs against their agency limited IT budget and resources. Everyday, more than a thousand alerts to track down and as response times are slowing and some incident managers are burning out.
The Convergence of Business and Cyber - Risk Management Through a Bigger Lens Where cybersecurity and operations converge as they increasingly do -- financial services firms must view cyber risks as operational risks. That integration is a sign of cyber maturity, says Matt Harper, Aflacs Vice President and Global Practice Lead, Product Security, and Program Strategy, but it affects the practice of risk management.
Finding a True Partner in ZenGRC When a ZenGRC Customer needed to build a comprehensive GRC program during a period of rapid growth, they found more than just a software solution in ZenGRCthey discovered a trusted collaborative partner. When the organization, which has requested to remain anonymous, implemented ZenGRC as their central platform for vendor management, compliance, and risk assessment, they established a “single source of truth” for their GRC information they also experi
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
Mark your calendars: October 14, 2025 the day Windows 10 officially reaches its end of life. After this date, Microsoft will no longer provide security updates, bug fixes or technical support for Windows 10. But what does this mean for your business applications and productivity tools? If youre still using Windows 10 after the cutoff date, its not just your operating system that will be at risk your critical business applications could be affected too.
Every April, BMC celebrates Climate Action Month, and the world marks annual Earth Day celebrations, which makes it a great time to revisit the intersection of environmental sustainability and technology. This year, the socioeconomic and geopolitical conversation around environmental sustainability is evolving at a rapid pace while enterprises themselves are losing important ground.
AI and automation have cemented themselves as pillars of enterprise operations. Both have brought measurable benefits to organizations: efficiency gains, streamlined operations, and new revenue opportunities, to name a few. And with new capabilities like agentic AI bursting onto the scene, AI and automation will only become more impactful in the coming years.
Governance: What a CISO Needs to Succeed Identifying and managing risk is fundamental to good governance, says Claus Norup, Managing Director and Group CISO, Euroclear, but thats only part of the job. Success in a CISO role depends on leaderships buy-in, the ability to translate information to its audience, and the degree to which the function is embedded in overall governance, among other factors.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
How to Set Up a Secure Isolated Recovery Environment (SIRE) by Pure Storage Blog If youve suffered a breach, outage, or attack, theres one thing you should have completed and ready to go: a secure isolated recovery environment (SIRE). This should be set up in advance, tested, and in a ready state to be transitioned into quickly after an event. With these steps completed, your infrastructure will be in place, giving you one less thing to worry about when youre being pressured to get the business
Tired of duplicating compliance efforts? Stop treating each compliance framework as a separate mountain to climb and start navigating the regulatory landscape with a cohesive, efficient approach that saves thousands of hours annually. Ready to streamline your compliance program across SOC 2, GDPR, ISO 27001, and more? Book a demo with ZenGRC today and turn compliance from an operational burden into a foundation for building customer trust.
Japanese consumer electronics company Casio recently fell victim to a ransomware attack, causing widespread outages across the company. Casios company systems were down for a week, and employee and customer data were leaked.
New Security Industry Association (SIA) member KFactor Global is a consulting firm specializing in security modernization. The company is headquartered in the Los Angeles, California, metropolitan area and provides services to clients worldwide. SIA spoke with Kasia Hanson, CEO and founder of KFactor Global, about the company, the security industry and working with SIA.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
Data Security in a Demanding Regulatory Environment Data security regulation is accelerating many firms data protection processes, says Karl Schimmeck, Executive Vice President and CISO of Northern Trust. However, complying with multiple jurisdictions reporting regimes around privacy, incident disclosures, and decision process documentation can be tough.
Solutions Review Executive Editor Tim King curated this list of notable storage and data protection news for the week of March 28, 2025. Keeping tabs on all the most relevant storage and data protection news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last week in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy
From the WashPost: Myanmar just had the big one. It should be a wake-up call for California. The famed San Andreas Fault in California is nearly identical to the one that caused the destructive tremor in Myanmar, and is also overdue for an earthquake. April 1, 2025 at 11:13 a.m.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content