September, 2018

article thumbnail

More online emergency management training resources 

Crisis Response Journal

This month Rob Fagan’s blog about free emergency management training and education focuses on a very timely and useful source: the Safe + Ready Institute.

article thumbnail

Aligning BC/DR to CSIRP Challenges

eBRP

The immediate reaction to a cyber-security incident is the FUD factor (Fear, Uncertainty and Doubt); more like ‘chickens running around with their head cut off’. An agile response requires tested and documented Incident Response Plans – including Crisis Management, Business Continuity and IT Disaster Recovery Plans. Automating the workflow facilitates seamless collaboration and the ability to Monitor, Measure & Manage the activities that are critical to effective Cyber Security Incident Resp

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Duty of Care: The Three Types of Employers

Alert Media

The post Duty of Care: The Three Types of Employers appeared first on AlertMedia.

article thumbnail

Building a Solid Security Structure as the Foundation Starts to Shake

Behavior Group

Information security threats are intensifying every day. Organizations risk becoming disoriented and losing their way in a maze of uncertainty, as they grapple with complex technology, data proliferation, increased regulation and a debilitating skills shortage. Solid Security Structure, information security threats The year 2020 will dawn on a hyper-connected world where the pace and scale… Continue reading.

article thumbnail

Supply Chain Resilience Checklist

Strengthen your operations with the Supply Chain Resilience Checklist. This practical, easy-to-use tool helps your organization prepare for disruptions and ensure long-term continuity in an unpredictable world. Why Download: Identify and assess critical supply chain risks Ask the right questions to evaluate vendor preparedness Implement effective strategies to reduce vulnerabilities Improve communication, transparency, and coordination across your network What You’ll Learn: How to evaluate and m

article thumbnail

Two Simple Steps to Keep Vendors GDPR Compliant at Events Like Dreamforce

Marketpoint Recall

I am so over GDPR. GDPR came into force on May 25 and it is having a profound effect on the event and corporate entertainment industry. Dreamforce is a huge user conference but also a massive exhibitor event. And as a large percentage of the attendees are from the EU, every partner exhibiting in the Expo and running parties should be concerned about GDPR.

More Trending

article thumbnail

Survival identification syndrome and traumatic bonding 

Crisis Response Journal

Forty five years after the hostage taking that gave birth to the concept of Stockholm syndrome, Lina Kolesnikova says that emergency services workers need to be aware of the paradoxical phenomena whereby abused people develop emotional dependency on their By Lina Kolesnikova

100
100
article thumbnail

Technology Modeling – the eBRP Way

eBRP

Definition: Technology modeling is a point-in-time snapshot of an Enterprise’s IT Services – including its dependencies on infrastructure – and interfaces to other services and Business Processes which depend on them. This organizational Technology Model provides executives the critical decision support they need to understand the impacts of a service disruption.

article thumbnail

8 Driving Safety Tips for Employees

Alert Media

The post 8 Driving Safety Tips for Employees appeared first on AlertMedia.

article thumbnail

The Biggest Email Security Challenge Facing Organizations Today

Behavior Group

Email is the single most effective and commonplace way of reaching someone in the business world today. Even as other methods of digital communication have come and gone over its 40-year history, email remains the backbone of business communications with 3.7 billion users worldwide collectively sending 269 billion messages every day. Email Security Challenge But… Continue reading.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

The Importance of Emotional Intelligence and Crisis Management

Business Resilience Decoded

Episode 4: "The Importance of Emotional Intelligence and Crisis Management" with Keith Frederick of Duke Clinical Research Institute at Duke University. Contact Frederick at [link] Episode 4: "The Importance of Emotional Intelligence and Crisis Management" with Keith Frederick of Duke Clinical Research Institute at Duke University.

article thumbnail

Crisis Communications During Cyber Incidents – What you need to do now!

Plan B Consulting

Charlie looks at crisis communications and the steps you can take now to prepare your organisation for a potential cyber incident in the future. This week I am all cyber-ed up; on Monday and Tuesday I taught a great bunch of people attending our ‘Managing and Preparing for Cyber Incidents’ course, and on Wednesday morning I delivered a Cyber Briefing to a senior management team.

article thumbnail

Arab countries caught in a cycle of war and disease 

Crisis Response Journal

Mohamed ELsonpaty, Adel Aldaghbashy, Zeki Al-Droubi, and Hazem Badr examine the link between conflict in disease, in an article originally written for the Science and Development Network (SciDev.Net).

100
100
article thumbnail

AI and its Impact on Sales and Marketing | Peter Gillett Interview with Neal Howard @TalkersFM

Marketpoint Recall

Peter Gillett is CEO of Zuant where he’s responsible for driving product development and client roll-outs of the company’s award-winning mobile lead capture app across US corporations. He is also CEO of Marketpoint Recall, a global recall and crisis management company. A pioneer in database marketing since the late 1970s, Peter is a serial entrepreneur.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Duty of Care Case Law And Your Business

Alert Media

The post Duty of Care Case Law And Your Business appeared first on AlertMedia.

article thumbnail

Three Ways to Justify the IT Security Budget You Need

Behavior Group

Advocating for the return on investment (ROI) in IT security has traditionally been a challenge for IT professionals to communicate to management. IT teams are responsible for the complicated task of balancing budget limitations with strong protection that will reduce the risk of a cyberattack in today’s dynamic threat landscape. However, according to a recent… Continue reading.

article thumbnail

The Importance of Emotional Intelligence and Crisis Management

Business Resilience Decoded

Episode 4: "The Importance of Emotional Intelligence and Crisis Management" with Keith Frederick of Duke Clinical Research Institute at Duke University. Contact Frederick at [link] Episode 4: "The Importance of Emotional Intelligence and Crisis Management" with Keith Frederick of Duke Clinical Research Institute at Duke University. Contact Frederick at [link].

article thumbnail

Don’t Pay By The Inch

Plan B Consulting

Charlie discusses the importance of quality over quantity when it comes to business continuity documents. This week I have been reviewing the level of emergency response, business continuity and crisis management of a utility in the Caribbean. As part of the review, I was asked to look at their security documents and procedures. I came across an inch-thick security manual, which I had to blow the dust off before looking at the contents inside.

article thumbnail

Emergency Preparedness: Active Shooter Tabletop Exercise

April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.

article thumbnail

This is not a drill: Five reasons why experts are worried about the next pandemic 

Crisis Response Journal

Ali Moore, Vice Chancellor's Fellow at the University of Melbourne, examines whether Australia is prepared for the next health outbreak.

Pandemic 100
article thumbnail

How brands are using AI to avoid a social media crisis

Marketpoint Recall

In February 2018, the fast-food chicken chain KFC ran out of chicken. Because of a supply chain glitch, KFC was unable to get chicken to many of its United Kingdom restaurants. But it became more than a logistics problem when fans took to social media to voice their discontent, with some even reaching out to police via social media channels when the chain was forced to close many stores temporarily.

Media 52
article thumbnail

How to Improve Lone Worker Safety

Alert Media

The post How to Improve Lone Worker Safety appeared first on AlertMedia.

article thumbnail

How to Protect Against Human Vulnerabilities in Your Security Program

Behavior Group

When it comes to cybersecurity, no doubt humans are the weakest link. No matter how many layers are added to your security stack, nor how much phishing education and awareness training you do, threat actors continue to develop more sophisticated ways to exploit the human vulnerabilities with socially engineered attacks. In fact, as security defenses… Continue reading.

article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

Racing With Blindspots

Business Resilience Decoded

Episode 3: "Racing With Blindspots" with Mike Mooney of Mooney Consulting Group. For more information, visit [link] - [link] - [link] Episode 3: "Racing With Blindspots" with Mike Mooney of Mooney Consulting Group.

article thumbnail

Don’t Pay By The Inch

Plan B Consulting

Charlie discusses the importance of quality over quantity when it comes to business continuity documents. This week I have been reviewing the level of emergency response, business continuity and crisis management of a utility in the Caribbean. As part of the review, I was asked to look at their security documents and procedures. I came across an inch-thick security manual, which I had to blow the dust off before looking at the contents inside.

article thumbnail

It' s time for CEOs to think more about crisis 

Crisis Response Journal

A new study at Harvard has revealed a shocking statistic: CEOs spent just one per cent of their time working on crisis management.

article thumbnail

5 Signs You Need to Upgrade Your Mass Notification System

Alert Media

The post 5 Signs You Need to Upgrade Your Mass Notification System appeared first on AlertMedia.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Racing With Blindspots

Business Resilience Decoded

Episode 3: "Racing With Blindspots" with Mike Mooney of Mooney Consulting Group. For more information, visit [link] - [link] - [link] Episode 3: "Racing With Blindspots" with Mike Mooney of Mooney Consulting Group. For more information, visit [link] - [link] - [link].

article thumbnail

Developing a Successful Crisis Management Program

Business Resilience Decoded

Episode 1: "Developing a Successful Crisis Management Program" with Regina Phelps of Emergency Management & Safety Solutions. Website: [link] LinkedIn: [link] Episode 1: "Developing a Successful Crisis Management Program" with Regina Phelps of Emergency Management & Safety Solutions.

article thumbnail

America's Talent Pipeline – People Continuity

Business Resilience Decoded

Episode 2: "America's Talent Pipeline – People Continuity" with Cheyene Marling of Firestorm People Solutions. Website: [link] LinkedIn: [link] Episode 2: "America's Talent Pipeline – People Continuity" with Cheyene Marling of Firestorm People Solutions.

36