This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The PetaGys Powered by Oracle Solaris integrates correctly-sized hardware and data protection software into a complete onsite backup, offsite cloud, and business continuance solution. The appliance enables a fast and hassle-free setup of a comprehensive disaster recovery environment. The all-in-one solution fits perfectly for midsize IT environments with a strong support of virtualization.
What do David Lindstedt, Mark Armour, Telly Savalas, Charles Bronson and Lee Marvin have in common? What are the most effective ways to do Business Continuity (or Cyber or Crisis) planning and training? David Lindstedt and Mark Armour are spearheading Adaptive Business Continuity , a framework that brings flexible, pragmatic and iterative approaches, much like traditional 'waterfall' software development has been supplanted by Agile scrums and sprints.
David Rubens examines the supply chain disruption caused by Kentucky Fried Chicken (KFC) switching distributors in its UK operations, while Emily Hough makes some initial notes on how the company's social media handled the crisis By David Rubens
Millennials Top Cybercrime Targets The millennials are among those groups of people who are most adversely impacted by cybercrime. Data seems to point to poor awareness of basic security habits as the main reason millennials have been hit so hard. To mention just a few of their poor security habits, members of this generation tend… Continue reading.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
Fiona Davidge is the Enterprise Risk Manager at the Wellcome Trust and this episode is a little different. We’re examining disruption and crisis management from another angle – the relationship between risk and business continuity functions. Fiona Davidge is the Enterprise Risk Manager at the Wellcome Trust and this episode is a little different. We’re examining disruption and crisis management from another angle – the relationship between risk and business continuity functions.
Charlie looks at the Russell Hume meat scandal, including the organisation’s response and the implications of having a single supplier for one of your key products. This week I thought I would take a break from promoting 3gBC and provide some observations on the Russell Hume meat scandal. Although the incident took place last month, the implications are still being felt throughout the food industry.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Charlie looks at the Russell Hume meat scandal, including the organisation’s response and the implications of having a single supplier for one of your key products. This week I thought I would take a break from promoting 3gBC and provide some observations on the Russell Hume meat scandal. Although the incident took place last month, the implications are still being felt throughout the food industry.
When building out a channel program, having the right strategy and go to market plan is critical. Having the right people to deliver that strategy is the most crucial part. Where several companies fail in the channel is having a balance of both ingredients. Having a dynamic channel executive that can lead and execute that plan is sometimes difficult to find.
Despite the continued focus in organisations on cyber security and the technical methods to prevent breaches, the simple fact remains that too many people still think that the threat is purely technology-based, writes David Stewart.
Files Can Be Recovered, protect deleted data Files can be recovered. When you a delete a file, it isn’t really erased – it continues existing on your hard drive, even after you empty it from the Recycle Bin. This allows you (and other people) to recover files you’ve deleted. If you’re not careful, this will… Continue reading. The post Why Deleted Files Can Be Recovered, and How You Can Prevent It. appeared first on Behaviour Portugal.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
Vicki Gavin is Head of Business Continuity for The Economist and is a returning contributor from season one. In this episode we discuss some of the major incidents she has handled and how to deal with the natural, human fight-or-flight response called ‘panic’. Vicki Gavin is Head of Business Continuity for The Economist and is a returning contributor from season one.
Charlie looks at the Russell Hume meat scandal, including the organisation’s response and the implications of having a single supplier for one of your key products. This week I thought I would take a break from promoting 3gBC and provide some observations on the Russell Hume meat scandal. Although the incident took place last month, the implications are still being felt throughout the food industry.
David Stewart says he has seen a number of posts on various online sites recently about the importance of having a crisis communication strategy and plan.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
Fire and Rescue Services (FRS) have changed enormously over the last 10 to 20 years and yet, in some ways, have not moved on at all, says Ian Houseman. How can data and decision-making technology be of assistance?
The field of human performance is relatively unknown outside large, high hazard organisations in many parts of the world, but it can help to predict human error and its consequences, playing a vital role in resilience, says Teresa Mullen By Teresa Mullen
CISSP exam Want to become a CISSP? Here’s everything you need to know, such as how difficult the exam is, tips for studying, what’s needed to obtain a passing score and more. Everything you’ve heard about what it takes to pass the CISSP exam is true. It’s both disarmingly easy and bewilderingly difficult; at once… Continue reading.
authentication 20 years ago, everyone worked at a desktop workstation hardwired into an office building. This made network security simple and organizations felt they could depend on the time-tested method of the trusted perimeter. Firewalls were relied on to keep out external threats, and anything within the network was considered secure and safe. Today, however,… Continue reading.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
Charlie shares his notion of ‘Third Generation Business Continuity’ and the reasons why you shouldn’t employ a BC contractor to develop your business continuity. This week I travelled to London to attend a meeting with a new client who we are conducting a gap analysis for, based on their present level of business continuity. They felt what they had in the way of business continuity was too complex; they didn’t really understand what they had and wanted to simplify their documen
Charlie shares his notion of ‘Third Generation Business Continuity’ and the reasons why you shouldn’t employ a BC contractor to develop your business continuity. This week I travelled to London to attend a meeting with a new client who we are conducting a gap analysis for, based on their present level of business continuity. They felt what they had in the way of business continuity was too complex; they didn’t really understand what they had and wanted to simplify their documen
millennials lax passwords, millennials comfortable biometrics A new (…) Security study has found that people now prioritize security over convenience when logging into applications and devices. Generational differences also emerged showing that younger adults are putting less care into traditional password hygiene, yet are more likely to use biometrics, multifactor authentication and password managers to… Continue reading.
In the third instalment of 3gBC, Charlie advises BC professionals how to make their plans slimmer, both immediately and radically. I thought for this week’s bulletin I would continue sharing my ideas on Third Generation BC (3gBC), by looking at how to make your plans slimmer and more agile. Apologies to the two Julie’s who asked for an article on the KFC incident, I will try and write about it next week, as it seems the situation is still on-going.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
In the third instalment of 3gBC, Charlie advises BC professionals how to make their plans slimmer, both immediately and radically. I thought for this week’s bulletin I would continue sharing my ideas on Third Generation BC (3gBC), by looking at how to make your plans slimmer and more agile. Apologies to the two Julie’s who asked for an article on the KFC incident, I will try and write about it next week, as it seems the situation is still on-going.
Following on from his concept of ‘Third Generation Business Continuity’, Charlie provides us with his thoughts on how to reduce your BIA and the advantages of doing so. In the words of Marjorie Dawes from Little Britain, “You is fat! You one big fatty thing!” For many, this is an apt description of their BIA. It is a series of interconnected spreadsheets, which capture a significant amount of information.
Following on from his concept of ‘Third Generation Business Continuity’, Charlie provides us with his thoughts on how to reduce your BIA and the advantages of doing so. In the words of Marjorie Dawes from Little Britain, “You is fat! You one big fatty thing!” For many, this is an apt description of their BIA. It is a series of interconnected spreadsheets, which capture a significant amount of information.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content