This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
On June 8, 2018 Nurses Reaching out (NRO) held a celebration event to launch its new status as a UK registered charity at the Anise Bar in London’s Cinnamon Kitchen, writes Brian Dillon.
A study from IBM reveals that nearly 60 percent of organizations surveyed are embracing the GDPR as an opportunity to improve privacy, security, data management or as catalyst for new business models, rather than simply a compliance issue or impediment. Improve Data Privacy and Security, incident response The study indicated that the majority of companies… Continue reading.
AR, VR, autonomous cars are three technologies that once seemed like futuristic science fiction, yet they are mainstream today. Facial recognition is another amazing technology that has arrived on the scene and is dramatically changing how we conduct our personal and professional lives. Singapore’s Changi airport is testing a facial recognition system to expedite travelers.
At the 2018 annual Clean Pacific conference in Portland, OR, we attended a session on volunteer planning in oil spill response. The presentation focused on the different types of volunteers that can emerge during an oil spill (affiliated, spontaneous and micro), and how they can be integrated into response planning. The Clean Pacific conference is focused on oil spill response and prevention, but volunteers can be engaged in any type of emergency response—floods, wildfires, earthquakes and acts
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
With the recent Facebook–Cambridge Analytica data scandal influencing new restrictions surrounding social media platforms, I consider whether the use of social media during incidents will change. Over the last few weeks we have seen the Facebook and Cambridge Analytica data scandal unfolding. The incident led to Facebook CEO, Mark Zuckerberg, testifying before members of Congress and answering questions on privacy, data mining and regulations.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
With the recent Facebook–Cambridge Analytica data scandal influencing new restrictions surrounding social media platforms, I consider whether the use of social media during incidents will change. Over the last few weeks we have seen the Facebook and Cambridge Analytica data scandal unfolding. The incident led to Facebook CEO, Mark Zuckerberg, testifying before members of Congress and answering questions on privacy, data mining and regulations.
Welcome to the third blog in our Human Performance series, writes Teresa Mullen, and thank you for the feedback to the second blog in this series (if you missed the blogs, you can read them here and here).
Trustwave released the 2018 Security Pressures Report based on a global survey of 1,600 full-time IT professionals who are security decision makers or security influencers within their organization. threats are turning up, managed security, security pressures, security services Findings show that a majority of IT and cybersecurity professionals experienced increased pressures in 2017 when compared… Continue reading.
“ Always set much higher sales goals than anyone else thinks you could achieve or the business will be able to handle. ” Peter Gillett is CEO of Zuant where he drives product development and client roll-outs of the company’s award-winning mobile lead capture app across US corporations. He is also CEO of Marketpoint Recall, a global recall and crisis management company.
In a recent report, the Philippine government’s Department of Information and Communications Technology (created in 2016) outlined a scale of cyber resilience based on an A to E grading system. With ‘A’ being the most robust in terms of cyber security maturity and ‘E’ being the weakest, it put the Philippines in class D. The reasoning behind this grade stems from the fact that they are reactive to attack using only the available tools and technologies.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
After spending this week in South Africa, Charlie shares his thoughts on the impact of culture on business continuity. This week I have been teaching MSc students in South Africa and I thought I would share my views on how business continuity can be affected by the culture of the country. I was only in the country for four days, so my impression was perhaps a little superficial and I may not have got my perceptions quite right.
Inspired by the stories we heard from Katherine Corbishley earlier in the season, we spoke to hospitality veteran Tuba Gursoy to find out what we can learn from someone working at the coal-face, in an industry where dealing with incidents and difficult situations is an everyday occurrence. Inspired by the stories we heard from Katherine Corbishley earlier in the season, we spoke to hospitality veteran Tuba Gursoy to find out what we can learn from someone working at the coal-face, in an industry
Don’t spend big money on that next cybersecurity product until you’ve checked these boxes first. Conduct Risk Assessments, denial of service attack The worldwide market for cybersecurity products and services will surpass $95 billion this year, according to Gartner. That’s a staggering amount of money, and it represents an 8 percent increase in the size… Continue reading.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
Your Recall Task Force These are the people who jump into action in the event of a crisis. Your recall task force are the inside experts to help guide through every aspect of the product recall. Their overall knowledge of the company and the recall process is imperative to ensure that a product recall is handled efficiently, effectively and with minimal brand damage.
Public perception often places government at the core of emergency management and planning. And while this is largely true, it doesn’t necessarily represent the full picture of emergency preparedness in Canada. With wildfire season upon us, it’s time to break down the responsibilities of emergency management - your business included. Emergency management responsibilities are shared by local and provincial governments, First Nations, critical infrastructure, businesses and individual citizens.
With the recent Facebook–Cambridge Analytica data scandal influencing new restrictions surrounding social media platforms, I consider whether the use of social media during incidents will change. Over the last few weeks we have seen the Facebook and Cambridge Analytica data scandal unfolding. The incident led to Facebook CEO, Mark Zuckerberg, testifying before members of Congress and answering questions on privacy, data mining and regulations.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
After spending this week in South Africa, Charlie shares his thoughts on the impact of culture on business continuity. This week I have been teaching MSc students in South Africa and I thought I would share my views on how business continuity can be affected by the culture of the country. I was only in the country for four days, so my impression was perhaps a little superficial and I may not have got my perceptions quite right.
Game of Thrones is a gripping, global phenomenon. One of the main reasons for its popularity is its nuanced portrayal of characters who are not 100% good or evil. CISOs, game of thrones Over seven seasons, the HBO show has spun a complex web of personas. Some reveal their motivations and fears, often at perilous… Continue reading. The post What CISOs can learn from Tyrion on Game of Thrones appeared first on Behaviour Portugal.
Malicious actors posing as well-known businesses using the guise of GDPR to steal personal data. conduct phishing attacks, GDPR, dpo, data protection Threat detection specialists have uncovered a new trend of malicious actors using GDPR compliance as a cover to target businesses with email phishing attacks. Hackers, according to cyber security company Redscan, are impersonating… Continue reading.
Despite the plethora of martech and sales enablement technologies now on the market, most sales teams are still performing at sub-optimal levels. With all these new tools making a salesperson’s job easier, there’s no excuse for your sales team not to excel. Sure new technologies in other industries can be a little daunting. Think about: AI, robotics, autonomous driving, Uber flying taxis, Amazon delivery drones.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
Panos Moutafis, Ph.D. is Co-Founder and President of Zenus Inc., which specializes in facial recognition systems for multiple applications. A computer scientist by trade, he is well-known for his work ethic, diligence, and persistence. I caught up with him over breakfast in Houston recently, keen to discover if facial recognition technology could become mainstream, or sit on the fringes like many other great ideas such as RFID and iBeacons.
Resiliency Platform allows organization to automate the resiliency of their business services. Spend the weekends with the family rather than in the data center.
Combining Corporate Responsibility with innovative data management solutions, the Veritas Manufacturing and Supply Chain team worked closely with the U.S. Environmental Protection Agency (EPA) and partners to attain ENERGY STAR certification for NetBackup 5340, Access 3340, and Flex 5340 appliances.
Following the first summit meeting between President Trump and Kim Jong-un, Charlie outlines how crisis communications can be used effectively to manage an incident and meet the expectations of stakeholders. There was no doubt that the meeting between President Trump and Supreme Leader Kim Jong-un was historic, but the debate surrounded how successful it was.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
Following the first summit meeting between President Trump and Kim Jong-un, Charlie outlines how crisis communications can be used effectively to manage an incident and meet the expectations of stakeholders. There was no doubt that the meeting between President Trump and Supreme Leader Kim Jong-un was historic, but the debate surrounded how successful it was.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content