This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The UK Government has published the National Cyber Security Strategy 2016 to 2021, which sets out the government's plan to make Britain secure and resilient in cyberspace.
By Help Net Security on 22 November 2016 Kaspersky Lab revealed the current state of security threats among businesses and how their perception of threats compares to the reality of cybersecurity incidents experienced over the past year, both in North America and worldwide. A top concern of North American businesses and a leading cause… Continue reading.
Yesterday I attended a seminar on ‘Managing Community Cohesion After Major Terrorist Attacks’ at the Scottish Fire and Rescue Service Headquarters in Glasgow. There were lots of highlights, including a presentation on the use of social media during major incidents, a very frank talk on the issues of managing scenes and also the aftermath of the Lee Rigby murder.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
Episode 5 of the BCPcast investigates what happens when carefully laid, and well-rehearsed plans collide with reality. This one is about big disasters, their effects, and the positives, if any, that can come out of them. We also confront the uncomfortable paradox that many emergency planners grapple with throughout their careers - that disasters are inherently unknowable, and no amount of planning or speculation can truly emulate the chaos of real disruption.
The special Security and Crisis Management Summit was jointly organized by ACI EUROPE and ACI ASIA PACIFIC and took place in Brussels (Belgium) on November 22 – 23, 2016, writes Lina Kolesnikova.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
The special Security and Crisis Management Summit was jointly organized by ACI EUROPE and ACI ASIA PACIFIC and took place in Brussels (Belgium) on November 22 – 23, 2016, writes Lina Kolesnikova.
“Look for the robots, because robots are coming to the rescue,” said Dr Robin Murphy, Director for the Texas based Centre for Robot-Assisted Search and Rescue (CRASAR) in her enlightening TED Talk.
Public Health England has recently published a Cold Weather Plan, giving advice to help prevent the major avoidable effects on health during periods of cold weather in England, writes Roger Gomm.
On September 14-15, a high level meeting on disaster risk reduction and management, with a specific focus on innovation and technology, was held in Danang, Vietnam, writes Ørjan Karlsson.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
Yesterday I attended a seminar on ‘Managing Community Cohesion After Major Terrorist Attacks’ at the Scottish Fire and Rescue Service Headquarters in Glasgow. There were lots of highlights, including a presentation on the use of social media during major incidents, a very frank talk on the issues of managing scenes and also the aftermath of the Lee Rigby murder.
By Maria do Carmo Couto a 17 Novembro de 2016 The Certified Information Systems Auditor (CISA) is a globally recognised certification in the field of audit, control and security of information systems. CISA gained worldwide acceptance and has a high degree of visibility and recognition in the fields of IT security, IT audit, IT risk… Continue reading.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
On Friday, October 21st, we had the special privilege of joining several other technology companies in the Austin area for a day of community service coordinated by the Entrepreneurs Foundation. The Entrepreneurs Foundation was founded by former entrepreneurs and venture capitalists helping to give local technology companies the opportunity to share their time and money with the surrounding community.
This article was written on the 4 November 2016 prior to the USA election! This week I focuses my attention on the American election that is taking place next week, and its possible effect on our organisations. My first thought was to title this bulletin, ‘President Trump….What If…’, however I felt that this was inappropriate and falling into the same trap as many of us did during the Brexit election, by believing the polls.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
This article was written on the 4 November 2016 prior to the USA election! This week I focuses my attention on the American election that is taking place next week, and its possible effect on our organisations. My first thought was to title this bulletin, ‘President Trump….What If…’, however I felt that this was inappropriate and falling into the same trap as many of us did during the Brexit election, by believing the polls.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content