This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Why would a high-profile company think it was a smart idea to launch a hashtag asking customers and the public to share photos and messages about how much they love the brand?
Not another BCM Program audit? Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 4 minutes Another Business Continuity Management (BCM) Program audit. Again? Some organizations think of audits as tedious, and often unnecessary, accounting procedures, rather than as a powerful business tool that can be used to improve the organization’s capabilities.
Companies globally could incur $5.2 trillion in additional costs and lost revenue over the next five years due to cyberattacks, as dependency on complex internet-enabled business models outpaces the ability to introduce adequate safeguards that protect critical assets. cybercrime, cybercrime cost Based on an Accenture survey, the report —Securing the Digital Economy: Reinventing the Internet… Continue reading.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
‘Gharib Nawaz se mera jhagda hain (I have a row with Gharib Nawaz)’ when I asked him about his performances at the Ajmer Sharif Dargah. A young, hungry Ghulam (Not the one, the iconic Sufi Qawwal we know of today) was loitering in the lanes of Ajmer. He had finished off his last few Indian rupees that very morning while buying a small breakfast of puri-sabzi, he hadn’t eaten well for the last few days.
Cyber disruptions – and their impact on both reputations and profitability – have risen to the top of nearly every recent risk study. These increasing concerns weigh heavily on Executive Suites and Boards. In the IT realm, CIO’s and CISO’s now focus their efforts on mitigating those risks, and planning responses to potential data breaches, malware and other cyber threats.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Cyber disruptions – and their impact on both reputations and profitability – have risen to the top of nearly every recent risk study. These increasing concerns weigh heavily on Executive Suites and Boards. In the IT realm, CIO’s and CISO’s now focus their efforts on mitigating those risks, and planning responses to potential data breaches, malware and other cyber threats.
Not another BCM Program audit? Last Updated on May 31, 2020 by Alex Jankovic. Reading Time: 4 minutes. Another Business Continuity Management (BCM) Program audit. Again? Some organizations think of audits as tedious, and often unnecessary, accounting procedures, rather than as a powerful business tool that can be used to improve the organization’s capabilities.
It can be challenging to accurately estimate the full cost to deploy and operate a service management solution. This requires taking a clear, comprehensive look at how an organization currently operates, and what that really costs. service management According to a 2018 Forrester report, many companies are moving from IT Service Management (ITSM) to Enterprise… Continue reading.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
This week Charlie shares his business continuity predictions for 2019. Happy new year to all readers. I hope you have had a good Christmas and New Year. For the first bulletin of the year, I am going to be bold and make five business continuity predictions for 2019. We can then revisit them at the end of the year and see if they come true! Volatility globally is going to get worse.
Bolstered by hundreds of millions of telemetry data points, Predictive Insights is able to deliver compelling, data-driven IT guidance so customers experience improved ROI on Veritas appliances.
Risk Assessment – Is it worth the time and effort? Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 3 minutes Should your organization execute a Risk Assessment? Is it worth the time and effort? It is often a long and complicated process, which may discourage some organizations from fully committing to it. This article will address the importance of the Risk Assessment as a general business tool, as well as in the context of Business Continuity Planning.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
If you want senior executives to buy into cybersecurity, you need to prove the value cybersecurity brings to the core business. Read your organization’s annual reports, corporate governance documents, shareholder statements and the like. These documents will give you a better sense for what drives your organization and, in turn, what your executives are thinking… Continue reading.
This week Charlie shares his business continuity predictions for 2019. Happy new year to all readers. I hope you have had a good Christmas and New Year. For the first bulletin of the year, I am going to be bold and make five business continuity predictions for 2019. We can then revisit them at the end of the year and see if they come true! Volatility globally is going to get worse.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
Customers and employees say they want companies to take a stand on high-profile social and political issues. But that can come with a costly downside, says Dr Tony Jaques.
Risk Assessment – Is it worth the time and effort? Last Updated on May 31, 2020 by Alex Jankovic. Reading Time: 3 minutes. Should your organization execute a Risk Assessment? Is it worth the time and effort? It is often a long and complicated process, which may discourage some organizations from fully committing to it. This article will address the importance of the Risk Assessment as a general business tool, as well as in the context of Business Continuity Planning.
A hacker has targeted and released private data on German chancellor Angela Merkel and other senior German lawmakers and officials. The data was leaked from a Twitter account, since suspended, and included email addresses, phone numbers, photo IDs and other personal data on hundreds of senior political figures. Hacker leaks data, According to a government… Continue reading.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
This week Charlie shares his thoughts on the recent drone incidents at Heathrow and Gatwick airport. Following the incident at Heathrow Airport on Tuesday, with one of the runways having to close, and with the recent shut down at Gatwick Airport I thought I would write this week’s bulletin on drones. When the shutdown of Gatwick occurred on the 19 – 21 December I posted three observations on the incident onto LinkedIn, and so, this week’s bulletin is going to be based around the replies an
The current threat level for international terrorism in the UK is Severe and has not been below this level since August 2014. Roger Gomm asks: Is it still justified?
This blog has been updated to reflect industry updates. Originally published 6 August 2018. The EU GDPR (General Data Protection Regulation) requires organisations to respond to serious data breaches within 72 hours of detection. This places a significant burden on organisations: taking the appropriate measures to comply with the law while simultaneously dealing with the collateral impact of a breach is not a picnic!
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
New flexible working practices could pose a security risk to small businesses, with one in five of employees (21%) stating they are most productive when working in public spaces like a cafe or library, but only 18% concerned with the security implications this could have. SMBs therefore face the challenge of keeping their business secure,… Continue reading.
This week Charlie shares his thoughts on the recent drone incidents at Heathrow and Gatwick airport. Following the incident at Heathrow Airport on Tuesday, with one of the runways having to close, and with the recent shut down at Gatwick Airport I thought I would write this week’s bulletin on drones. When the shutdown of Gatwick occurred on the 19 – 21 December I posted three observations on the incident onto LinkedIn, and so, this week’s bulletin is going to be based around the replies an
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content