This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The Jokes on Whom? Navigating Humor in Crisis Management By Ella Kate Baker Introduction by Jonathan Bernstein When Ella Baker from The University of AlabamasCollege of Communication and Information Sciences contacted me about being interviewed for this Platform Magazine article, my first response to her was Wow, what a great story angle! I have been interviewed scores of times in my career, and written very extensively, but humor in crisis management has never been a topic!
No Compliance, No Contracts: Why CMMC 2.0 Is a Top Security Priority March 28, 2025 Scott Ray Chief Operations Officer Cybersecurity is a must-have for every organization, perhaps nowhere more so than in the defense industry. Even unclassified information can be highly sensitive, with devastating potential in the wrong hands: espionage, theft of intellectual property, cyberattacks on critical infrastructure, supply-chain sabotage, or financial extortion, for example.
As this is being written the firestorm in California is continuing. It is not only government that responds to disasters and the needs of disaster survivors and victims. The Disaster Accountability Project was created to help coordinate nongovernmental organizational efforts. To date, the site has more than 900 organizations registered worldwide. Following a stringent review process, organizations are presented with information that displays proximity to a specific crisis, and the range of servi
FlashBlade//EXA Has Arrived The Data Storage Platform to Transform Large-scale AI and HPC by Pure Storage Blog Summary FlashBlade//EXA is the newest member of the FlashBlade family. Optimized for AI workloads, this ultra-scale data storage platform provides massive storage throughput and operates at extreme levels of performance and scale. Racers, start your engines!
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
Chatbots like ChatGPT, Gemini, Microsoft Copilot and the recently released DeepSeek have revolutionized how we interact with technology, offering assistance with almost every task imaginable from drafting e-mails and generating content to writing your grocery list while keeping it within your budget. But as these AI-driven tools weave themselves into our daily routines, questions about data privacy and security are becoming harder to ignore.
Governance 101: Why Separation of Duties is Non-Negotiable Last Updated: March 14, 2025 Fraud. Waste. Negligence. If your organization isnt enforcing Separation of Duties (SoD) , youre leaving the door wide open for all three. Separation of Duties isnt just another compliance checkboxits a cornerstone of good governance. It ensures that no single person can execute all parts of a transaction or process , preventing unchecked authority, reducing risk, and strengthening oversight.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Governance 101: Why Separation of Duties is Non-Negotiable Last Updated: March 14, 2025 Fraud. Waste. Negligence. If your organization isnt enforcing Separation of Duties (SoD) , youre leaving the door wide open for all three. Separation of Duties isnt just another compliance checkboxits a cornerstone of good governance. It ensures that no single person can execute all parts of a transaction or process , preventing unchecked authority, reducing risk, and strengthening oversight.
We continue to see disasters increase in size, frequency and impact. What are we doing wrong when it comes to disaster resilience, especially as it impacts our ability to adapt to the climate impacts that are experiencing and take a longer view to disaster resilience. The podcast guest is Jeff Schlegelmilch an Associate Professor for Professional Practice in Climate.
FlashBlade//EXA: The Future of AI and HPC Storage Performance by Pure Storage Blog Summary Discover the power of FlashBlade//EXA, a purpose-built, advanced data storage platform designed to support the most demanding AI and HPC workloads. A visionary company can leverage a strong core technology for many purposes.Consider the graphics processing unit (GPU), invented over 25 years ago, or Internet Protocol, developed over decades, and expected to continue advancing for many more.
Think ransomware is your worst nightmare? Think again. Hackers have found a new way to hold your business hostage and it may be even more ruthless than encryption. Its called data extortion , and its changing the rules of the game. Heres how it works: They dont bother encrypting your files anymore. Instead, they just steal your sensitive data and threaten to leak it unless you pay up.
In today’s fast-paced and unpredictable business landscape, preparedness is paramount. Whether facing a natural disaster, a cyberattack , or even a simple power outage, organizations must ensure they can maintain essential functions. That’s where a robust business continuity template comes into play. Why a Template Matters? A well-structured business continuity template isn’t just a document; it’s a roadmap.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
Infobesity: How Much Data is Too Much? Many financial services firms have such vast hoards of data much of it unclassified legacy data that owning it causes more data governance challenges than the information is worth. Olivier Nautet, Group CISO at BNP Paribas, says that firms suffering infobesity must approach the challenge cross-functionally, with a view to operational resilience and compliance.
As we look to the future of making for a more disaster resilient future, there are new building technologies that are ready for prime time. One of those is the use of 3D technology for the construction of all types of buildings and other structures. In this podcast we learn from one leader in 3D construction, Ziyou X u, Founder of RIC Technology. 3D printing using concrete uses less labor and is very flexible in how the materials can be used.
Before and during ISC West, the SIA Women in Security Forum community asks the security industry to give back in support of Dress for Success Southern Nevada. SILVER SPRING, Md. The Security Industry Association (SIA) Women in Security Forum (WISF) community has kicked off the fifth annual Essentials 4 Job Security Giveback , a program coinciding with ISC West that supports the efforts of Dress for Success Southern Nevada (DFSSN) to help women build careers and achieve financial independence.
When it comes to running a business, most owners consider aspects like quality customer service, reliable products or services, and closely monitored P&Ls as reasons for company success or failure. Most never consider one other sneaky element that is often overlooked as a make-or-break factor because its a boring necessity. What is it? Your technology.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
Given the current climate in the federal government, it’s critical that public sector IT leaders find innovative solutions to do more with less. Thats a real challenge for these leaders who must balance with current alert backlogs against their agency limited IT budget and resources. Everyday, more than a thousand alerts to track down and as response times are slowing and some incident managers are burning out.
The Convergence of Business and Cyber - Risk Management Through a Bigger Lens Where cybersecurity and operations converge as they increasingly do -- financial services firms must view cyber risks as operational risks. That integration is a sign of cyber maturity, says Matt Harper, Aflacs Vice President and Global Practice Lead, Product Security, and Program Strategy, but it affects the practice of risk management.
Every April, BMC celebrates Climate Action Month, and the world marks annual Earth Day celebrations, which makes it a great time to revisit the intersection of environmental sustainability and technology. This year, the socioeconomic and geopolitical conversation around environmental sustainability is evolving at a rapid pace while enterprises themselves are losing important ground.
Modeled on legislation passed in New York in 2024, California AB 976 would offer small retailers a tax credit for security improvements. SILVER SPRING, Md. On March 24, 2025, the Security Industry Association (SIA) testified before the California Assembly Committee on Revenue and Taxation in support of California Assembly Bill 976, legislation that would establish a tax credit program for small retailers in disadvantaged communities who purchase or install security equipment.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
Mark your calendars: October 14, 2025 the day Windows 10 officially reaches its end of life. After this date, Microsoft will no longer provide security updates, bug fixes or technical support for Windows 10. But what does this mean for your business applications and productivity tools? If youre still using Windows 10 after the cutoff date, its not just your operating system that will be at risk your critical business applications could be affected too.
In disaster recovery , resilience is the ultimate goal. Weve explored the critical roles that speed and integrity play in recovery, but theres one more critical piece to the equation: flexibility. True resilience doesnt just rely on how quickly or how precisely you can recover; it depends on your ability to adapt to any situation, any environment, and any challenge.
Governance: What a CISO Needs to Succeed Identifying and managing risk is fundamental to good governance, says Claus Norup, Managing Director and Group CISO, Euroclear, but thats only part of the job. Success in a CISO role depends on leaderships buy-in, the ability to translate information to its audience, and the degree to which the function is embedded in overall governance, among other factors.
How to Set Up a Secure Isolated Recovery Environment (SIRE) by Pure Storage Blog If youve suffered a breach, outage, or attack, theres one thing you should have completed and ready to go: a secure isolated recovery environment (SIRE). This should be set up in advance, tested, and in a ready state to be transitioned into quickly after an event. With these steps completed, your infrastructure will be in place, giving you one less thing to worry about when youre being pressured to get the business
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
ISC West 2025 is coming up March 31 April 4 in Las Vegas, Nevada, and the Security Industry Association (SIA) and ISC West have revealed full conference details for the SIA Education at ISC West program , including keynote presentations from top luminaries and over 115 sessions from top industry expert speakers on the most current business trends, technologies and industry developments.
Tired of duplicating compliance efforts? Stop treating each compliance framework as a separate mountain to climb and start navigating the regulatory landscape with a cohesive, efficient approach that saves thousands of hours annually. Ready to streamline your compliance program across SOC 2, GDPR, ISO 27001, and more? Book a demo with ZenGRC today and turn compliance from an operational burden into a foundation for building customer trust.
In todays bulletin, Charlie discusses supply chains and business continuity and gives an insight into some useful case studies around supply chain resilience. Around 2010, I wrote a supply chain course which was then adopted by the BCI and delivered by its training partners worldwide. I had a similar version of it, which I delivered to PlanB Consultings clients, as either in-house training courses or as part of a supply chain piece of consultancy.
Data Security in a Demanding Regulatory Environment Data security regulation is accelerating many firms data protection processes, says Karl Schimmeck, Executive Vice President and CISO of Northern Trust. However, complying with multiple jurisdictions reporting regimes around privacy, incident disclosures, and decision process documentation can be tough.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
Japanese consumer electronics company Casio recently fell victim to a ransomware attack, causing widespread outages across the company. Casios company systems were down for a week, and employee and customer data were leaked.
New Security Industry Association (SIA) member KFactor Global is a consulting firm specializing in security modernization. The company is headquartered in the Los Angeles, California, metropolitan area and provides services to clients worldwide. SIA spoke with Kasia Hanson, CEO and founder of KFactor Global, about the company, the security industry and working with SIA.
Solutions Review Executive Editor Tim King curated this list of notable storage and data protection news for the week of March 28, 2025. Keeping tabs on all the most relevant storage and data protection news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last week in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content