This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
This blog has been updated to reflect industry updates. Originally published 6 August 2018. The EU GDPR (General Data Protection Regulation) requires organisations to respond to serious data breaches within 72 hours of detection. This places a significant burden on organisations: taking the appropriate measures to comply with the law while simultaneously dealing with the collateral impact of a breach is not a picnic!
Why would a high-profile company think it was a smart idea to launch a hashtag asking customers and the public to share photos and messages about how much they love the brand?
With more than 16,500 known security vulnerabilities being catalogued, 2018 set a new record over last year’s previous record of 14,714. CEOs and security teams of all businesses should take note of this issue, given the recent enforcement of the General Data Protection Regulation (GDPR), which penalizes corporate data/privacy breaches of EU citizens with staggering… Continue reading.
Not another BCM Program audit? Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 4 minutes Another Business Continuity Management (BCM) Program audit. Again? Some organizations think of audits as tedious, and often unnecessary, accounting procedures, rather than as a powerful business tool that can be used to improve the organization’s capabilities.
Strengthen your operations with the Supply Chain Resilience Checklist. This practical, easy-to-use tool helps your organization prepare for disruptions and ensure long-term continuity in an unpredictable world. Why Download: Identify and assess critical supply chain risks Ask the right questions to evaluate vendor preparedness Implement effective strategies to reduce vulnerabilities Improve communication, transparency, and coordination across your network What You’ll Learn: How to evaluate and m
In preparation of Brexit, Charlie looks at how we can start to identify areas of exposure within our organisation. I imagine a lot of us haven’t yet prepared for Brexit, and our organisations have continued on quite happily doing what they do. The problem is what to prepare for, as there seems to be a different flavour of Brexit every day. Are we heading towards a Canada-plus, a Customs Union, a Norway deal (plus or minus), no deal or the Prime Minister’s plan A – she doesn’t really
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
In preparation of Brexit, Charlie looks at how we can start to identify areas of exposure within our organisation. I imagine a lot of us haven’t yet prepared for Brexit, and our organisations have continued on quite happily doing what they do. The problem is what to prepare for, as there seems to be a different flavour of Brexit every day. Are we heading towards a Canada-plus, a Customs Union, a Norway deal (plus or minus), no deal or the Prime Minister’s plan A – she doesn’t really
‘Gharib Nawaz se mera jhagda hain (I have a row with Gharib Nawaz)’ when I asked him about his performances at the Ajmer Sharif Dargah. A young, hungry Ghulam (Not the one, the iconic Sufi Qawwal we know of today) was loitering in the lanes of Ajmer. He had finished off his last few Indian rupees that very morning while buying a small breakfast of puri-sabzi, he hadn’t eaten well for the last few days.
Companies globally could incur $5.2 trillion in additional costs and lost revenue over the next five years due to cyberattacks, as dependency on complex internet-enabled business models outpaces the ability to introduce adequate safeguards that protect critical assets. cybercrime, cybercrime cost Based on an Accenture survey, the report —Securing the Digital Economy: Reinventing the Internet… Continue reading.
Not another BCM Program audit? Last Updated on May 31, 2020 by Alex Jankovic. Reading Time: 4 minutes. Another Business Continuity Management (BCM) Program audit. Again? Some organizations think of audits as tedious, and often unnecessary, accounting procedures, rather than as a powerful business tool that can be used to improve the organization’s capabilities.
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
In preparation of Brexit, Charlie looks at how we can start to identify areas of exposure within our organisation. I imagine a lot of us haven’t yet prepared for Brexit, and our organisations have continued on quite happily doing what they do. The problem is what to prepare for, as there seems to be a different flavour of Brexit every day. Are we heading towards a Canada-plus, a Customs Union, a Norway deal (plus or minus), no deal or the Prime Minister’s plan A – she doesn’t really
Cyber disruptions – and their impact on both reputations and profitability – have risen to the top of nearly every recent risk study. These increasing concerns weigh heavily on Executive Suites and Boards. In the IT realm, CIO’s and CISO’s now focus their efforts on mitigating those risks, and planning responses to potential data breaches, malware and other cyber threats.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
It can be challenging to accurately estimate the full cost to deploy and operate a service management solution. This requires taking a clear, comprehensive look at how an organization currently operates, and what that really costs. service management According to a 2018 Forrester report, many companies are moving from IT Service Management (ITSM) to Enterprise… Continue reading.
Risk Assessment – Is it worth the time and effort? Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 3 minutes Should your organization execute a Risk Assessment? Is it worth the time and effort? It is often a long and complicated process, which may discourage some organizations from fully committing to it. This article will address the importance of the Risk Assessment as a general business tool, as well as in the context of Business Continuity Planning.
This week Charlie shares his business continuity predictions for 2019. Happy new year to all readers. I hope you have had a good Christmas and New Year. For the first bulletin of the year, I am going to be bold and make five business continuity predictions for 2019. We can then revisit them at the end of the year and see if they come true! Volatility globally is going to get worse.
April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.
Bolstered by hundreds of millions of telemetry data points, Predictive Insights is able to deliver compelling, data-driven IT guidance so customers experience improved ROI on Veritas appliances.
Customers and employees say they want companies to take a stand on high-profile social and political issues. But that can come with a costly downside, says Dr Tony Jaques.
If you want senior executives to buy into cybersecurity, you need to prove the value cybersecurity brings to the core business. Read your organization’s annual reports, corporate governance documents, shareholder statements and the like. These documents will give you a better sense for what drives your organization and, in turn, what your executives are thinking… Continue reading.
Risk Assessment – Is it worth the time and effort? Last Updated on May 31, 2020 by Alex Jankovic. Reading Time: 3 minutes. Should your organization execute a Risk Assessment? Is it worth the time and effort? It is often a long and complicated process, which may discourage some organizations from fully committing to it. This article will address the importance of the Risk Assessment as a general business tool, as well as in the context of Business Continuity Planning.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
This week Charlie shares his business continuity predictions for 2019. Happy new year to all readers. I hope you have had a good Christmas and New Year. For the first bulletin of the year, I am going to be bold and make five business continuity predictions for 2019. We can then revisit them at the end of the year and see if they come true! Volatility globally is going to get worse.
The current threat level for international terrorism in the UK is Severe and has not been below this level since August 2014. Roger Gomm asks: Is it still justified?
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
A hacker has targeted and released private data on German chancellor Angela Merkel and other senior German lawmakers and officials. The data was leaked from a Twitter account, since suspended, and included email addresses, phone numbers, photo IDs and other personal data on hundreds of senior political figures. Hacker leaks data, According to a government… Continue reading.
New flexible working practices could pose a security risk to small businesses, with one in five of employees (21%) stating they are most productive when working in public spaces like a cafe or library, but only 18% concerned with the security implications this could have. SMBs therefore face the challenge of keeping their business secure,… Continue reading.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content