article thumbnail

Gone With the Wind: 12 BCM Practices That Have Become Outdated 

MHA Consulting

A partial list would include: the 9/11 terrorist attacks, the rise of the internet and cell phones, the spread of cybercrime, globalization and the lengthening of supply chains, the COVID pandemic, the growing impact of climate change, growing international tensions, the shortening of attention spans, and the rise in cloud computing.

BCM 98
article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

How to prepare for a NIST Audit: Checklist What is a security impact analysis? What is a Security Impact Analysis Security Impact Analysis (SIA) is a critical process used to evaluate the potential effects of changes or modifications to an information system on the system’s security posture.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

How to prepare for a NIST Audit: Checklist What is a security impact analysis? What is a Security Impact Analysis Security Impact Analysis (SIA) is a critical process used to evaluate the potential effects of changes or modifications to an information system on the system’s security posture.