This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Sitting in the cold, windowless basement of an apartment block that he shares with his wife and two young children in Amman, Abu Ahmad describes himself as "one of the lucky ones.
This week Charlie discusses the lessons learned from threats from within an organisation. My blog last month was ‘Beware the cuckoo in the nest!’ which talked about the danger of insider threat. On Wednesday I watched the news reports of the Germanwings aircraft crash in the French Alps. Like with all similar plane crashes there was a lot of speculation about what had caused the crash.
NIST Cybersecurity Framework using COBIT 5 It’s official: The NEW Course and certification exam Implementing the NIST Cybersecurity Framework using COBIT®5 was released today. As an ISACA COBIT® 5 Licensed Training Provider and as APMG ATO, Behaviour Group is proud to announce that the new offical course and exam from ISACA, Implementing the NIST… Continue reading.
In CRJ 10:2 Bernie Gravett looked at human trafficking as a societal crisis, examining how this crime feeds upon vulnerability, creating instability and affecting every country in a variety of forms across Europe.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
This week Charlie discusses the lessons learned from threats from within an organisation. My blog last month was ‘Beware the cuckoo in the nest!’ which talked about the danger of insider threat. On Wednesday I watched the news reports of the Germanwings aircraft crash in the French Alps. Like with all similar plane crashes there was a lot of speculation about what had caused the crash.
cybercrime The pressure is on, regardless the security maturity level of any organization. After an incredibly year for security incidents, intrusions and data loss, it is obvious that cybercrime have advantage. Hackers are operating with different requirements and motivations, and employing increasingly sophisticated techniques. According to Cyber Threat Report Yearbook, the number of successful cyber-attacks on… Continue reading.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
cybercrime The pressure is on, regardless the security maturity level of any organization. After an incredibly year for security incidents, intrusions and data loss, it is obvious that cybercrime have advantage. Hackers are operating with different requirements and motivations, and employing increasingly sophisticated techniques. According to Cyber Threat Report Yearbook, the number of successful cyber-attacks on… Continue reading.
Implement ISO 22301 Management System ISO 22301 – Business Continuity Management Systems – help organizations, regardless of their size, location or activity, to be better prepared and more confident to deal with any disruptive incident. Disruptive incidents can impact the normal operations of an organization at any time. Implement ISO 22301 Management System helps… Continue reading.
This week Charlie discusses the lessons learned from media scandals and how businesses should deal with similar incidents. I thought this week I would comment on an item in the news. The lead item in this lunchtime’s news (Monday 16th March) was the Police Watchdog investigation into alleged corruption in the Metropolitan Police, including claims it covered up child sex offences because of the involvement of police officers and MPs.
This week Charlie discusses the lessons learned from media scandals and how businesses should deal with similar incidents. I thought this week I would comment on an item in the news. The lead item in this lunchtime’s news (Monday 16th March) was the Police Watchdog investigation into alleged corruption in the Metropolitan Police, including claims it covered up child sex offences because of the involvement of police officers and MPs.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content