This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In todays bulletin, Charlie discusses supply chains and businesscontinuity and gives an insight into some useful case studies around supply chain resilience. In early 2020, supply chain in businesscontinuity was all the rage, and there were lots of courses around, and even an annual conference.
This week I am working in the Philippines, developing businesscontinuity for a multinational building materials manufacturer. It is my first time here so I thought I would share some lessons learned from developing businesscontinuity in a different country to my own; the United Kingdom.
This week I am working in the Philippines, developing businesscontinuity for a multinational building materials manufacturer. It is my first time here so I thought I would share some lessons learned from developing businesscontinuity in a different country to my own; the United Kingdom.
Whilst Charlie was on holiday last week, he read a recently published book about Adaptive BusinessContinuity. The poor BIA is getting a hard time at the moment, with a number of practitioners questioning its usefulness and there is some debate among businesscontinuity practitioners about whether it can be dispensed with.
Whilst Charlie was on holiday last week, he read a recently published book about Adaptive BusinessContinuity. The poor BIA is getting a hard time at the moment, with a number of practitioners questioning its usefulness and there is some debate among businesscontinuity practitioners about whether it can be dispensed with.
This week Charlie shares his thoughts on ‘The Ultimate BusinessContinuity Success Guide’ by Marty Fox. I am always happy to review a new businesscontinuity book, especially a physical version, for no other reason than to have another BC book to add to my bookshelf! This is in line with the Good Practice Guidelines 2013.
This week Charlie shares his thoughts on ‘The Ultimate BusinessContinuity Success Guide’ by Marty Fox. I am always happy to review a new businesscontinuity book, especially a physical version, for no other reason than to have another BC book to add to my bookshelf! This is in line with the Good Practice Guidelines 2013.
It’s time to do that Threat Risk Assessment and determine how you will keep your business running when the ground starts shaking. originally published in 2013]. KingsBridgeBCP offers businesses of all sizes BCP Software Solutions and industry know-how based on best practices. About KingsBridge.
Charlie Maclean-Bristol lists ten areas where many businesscontinuity plans can be improved. On many of the businesscontinuity plans that I see it is not clear what the scope of the plan is. I believe it should be clear what sort of incidents should cause the businesscontinuity plan to be invoked.
Charlie Maclean-Bristol lists ten areas where many businesscontinuity plans can be improved. On many of the businesscontinuity plans that I see it is not clear what the scope of the plan is. I believe it should be clear what sort of incidents should cause the businesscontinuity plan to be invoked.
Charlie Maclean-Bristol lists ten areas where many businesscontinuity plans can be improved in. On many of the businesscontinuity plans that I see it is not clear what the scope of the plan is. I believe it should be clear what sort of incidents should cause the businesscontinuity plan to be invoked.
Charlie Maclean-Bristol lists ten areas where many businesscontinuity plans can be improved in. On many of the businesscontinuity plans that I see it is not clear what the scope of the plan is. I believe it should be clear what sort of incidents should cause the businesscontinuity plan to be invoked.
She spent over eight years in the biometrics field focused on quality assurance, information security and quality processes and has led a variety of projects, including the implementation and certification of ISO 9001:2015 Quality Management System and ISO 27001:2013 Information Security Management System (ISMS) for NEC Advanced Recognition Systems.
For a while, businesscontinuity has always had a slightly uneasy relationship with risk management. In the 2010 and 2013 GPGs we looked at threat assessments, whereas in the more recent 2018 GPG, we cover a threat and risk assessment. Nowadays, risk assessment is coming of age and it seems to be everywhere.
For a while, businesscontinuity has always had a slightly uneasy relationship with risk management. In the 2010 and 2013 GPGs we looked at threat assessments, whereas in the more recent 2018 GPG, we cover a threat and risk assessment. Nowadays, risk assessment is coming of age and it seems to be everywhere.
This week Charlie highlights to BusinessContinuity Managers the importance of Recovery Time Objectives (RTOs). Defining the RTOs of your activities, I believe is one of the most critical activities the BusinessContinuity Manager will carry out.
This week Charlie highlights to BusinessContinuity Managers the importance of Recovery Time Objectives (RTOs). Defining the RTOs of your activities, I believe is one of the most critical activities the BusinessContinuity Manager will carry out.
This week I have been doing a lot of thinking about BIAs, so I thought I would write this week’s bulletin on a strategy I think is missing from the BusinessContinuity Institutes “Good Practice Guidelines” (GPG). Diverse Sites – the activity is carried out at two sites 2. These are: 1. A few examples of this are: 1.
This week I have been doing a lot of thinking about BIAs, so I thought I would write this week’s bulletin on a strategy I think is missing from the BusinessContinuity Institutes “Good Practice Guidelines” (GPG). Diverse Sites – the activity is carried out at two sites. These are: 1. A few examples of this are: 1.
I believe it should be fairly clear what sort of incidents should cause the businesscontinuity plan to be invoked. Defining and agreeing your Recovery Time Objectives is one of the most important items you set during the analysis and design stages of the businesscontinuity lifecycle. Invocation criteria.
I believe it should be fairly clear what sort of incidents should cause the businesscontinuity plan to be invoked. Defining and agreeing your Recovery Time Objectives is one of the most important items you set during the analysis and design stages of the businesscontinuity lifecycle. Invocation criteria.
ISO 27001 compliance can be confusing because the sheer volume of standards is overwhelming, but the right program can ensure businesscontinuity. Rather than implementing controls as a checkbox activity, risk-driven organizations proactively choose controls that best mitigate their risks. What is ISO 27001? Form a Project Team.
However, there may still be room to improve your practices, and it might even be the case that your activities aren’t necessary. A version of this blog was originally published on 18 February 2013. Organisations are liable to see that a requirement has been ticked off and assume that it’s ‘mission accomplished’.
After conducting this inventory, security teams can then implement a risk-driven modernization plan that starts with business-critical and protected data (by law) systems. These activities must happen in 2024, because threat actors are in fact already targeting encrypted data, by taking a “steal and store now to decrypt later” approach.
After conducting this inventory, security teams can then implement a risk-driven modernization plan that starts with business-critical and protected data (by law) systems. These activities must happen in 2024, because threat actors are in fact already targeting encrypted data, by taking a “steal and store now to decrypt later” approach.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content