May, 2018

article thumbnail

Liverpool University leads evaluation of large-scale emergency exercise

Crisis Response Journal

A research team from the University of Liverpool has provided evaluation and support to a multi-agency exercise, codenamed ‘Operation Raptor’, at the second busiest airport in the world, London Heathrow.

article thumbnail

COMPONENTS OF A BUSINESS CONTINUITY PLAN

CCEM Strategies

Ensuring business continuity during an emergency is simply good business. For everyone. Business continuity planning (BCP) is a critical component of emergency preparedness. Hands down, no exceptions. Literally, every organization in the world that provides a product or service, interacts with customers or community members, or generally, you know, exists at the whim of others, must have a business continuity plan in place.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A review of TSB’s communications in response to their failed IT upgrade

Plan B Consulting

In the midst of TSB’s ongoing online banking meltdown, Charlie shares his thoughts on how the organisation has been managing the communications aspect of the incident. Last night I was doing what I always tell the readers of this bulletin to do and was looking at how TSB bank have been responding to the failed upgrade of their main banking platform.

article thumbnail

EDPS welcomes agreement on new data protection rules for the EU institutions and bodies

Behavior Group

new data protection rules Just two days from now, the General Data Protection Regulation (GDPR) will become fully applicable to all companies and organisations operating within the EU. We welcome the news that the EU legislator has now reached a political agreement on equivalent rules on data protection in the EU institutions and bodies and… Continue reading.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

What GDPR Means for Marketers?

Marketpoint Recall

Sarah and Zach dive into what marketers can expect in a world with GDPR. Plus a little color commentary on the royal wedding. Special guest Peter Gillett of Zuant talks more about what marketers need to know about GDPR.

More Trending

article thumbnail

In depth: The societal resilience narrative – bringing the chapters together 

Crisis Response Journal

Laurence Marzell introduces CRJ's new in-depth, longer read blogs, by examining how a more unified and coherent approach to societal resilience might be achieved.

article thumbnail

Threats, Impacts, BCPs

eBRP

Within Business Continuity circles there is ongoing debate about the relevance and role of Risk Assessment in developing a BCM program. Having been in the industry for more than 20 years, I understand the issue from both the sides. Traditional, formalized Risk Assessment aims to identify the threats to which our organization is vulnerable. Once this threat-vulnerability pairing is identified, the next step is to assign a probability of such an occurrence – based on experience or other exte

BCM 52
article thumbnail

A review of TSB’s communications in response to their failed IT upgrade

Plan B Consulting

In the midst of TSB’s ongoing online banking meltdown, Charlie shares his thoughts on how the organisation has been managing the communications aspect of the incident. Last night I was doing what I always tell the readers of this bulletin to do and was looking at how TSB bank have been responding to the failed upgrade of their main banking platform.

article thumbnail

There are many reasons why a certification can be a valuable career asset

Behavior Group

career asset, certification Many people who have experience with computers and information technology (IT), or even just have an interest in the field, have probably found themselves asking a simple question: Should I get certified or not? There’s essentially no option to enter some professions without obtaining some form or certification or licensure.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

AlertMedia Recognized As One of Ten IOT Start-ups To Watch

Alert Media

The post AlertMedia Recognized As One of Ten IOT Start-ups To Watch appeared first on AlertMedia.

52
article thumbnail

EMERGENCY PREPAREDNESS SQUAD: ARE YOUR STUDENTS PREPARED?

CCEM Strategies

With floods and wildfires on the rise, we need to think outside of our offices and homes, and take a look at our schools, too. It’s one thing for teachers to be Masters of Disasters, but what about your students? Have you trained them to be ready for earthquakes, floods and lockdowns? If you’d like to educate your students in interactive, yet fun lessons but aren’t sure where to start, DreamRider’s Emergency Preparedness Squad might just be the resource you’re looking for!

article thumbnail

TSB Bank IT failure: Déjà vu all over again 

Crisis Response Journal

TSB bank in the UK has been experiencing severe computer issues, with customers unable to log into their online accounts or use the bank’s app and struggling to log in or make online payments.

Banking 100
article thumbnail

The BCM Challenge: Executive Buy-In

eBRP

As a Business Continuity Management (BCM) solution provider, the first question I ask potential clients is: What are your major program challenges? Here’s what I hear: We don’t have a seat at the executive table where major decisions are made. The program lacks executive buy-in. BCM is at the bottom of the priorities list for business users (No stakeholder engagement).

BCM 52
article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Developing a Reputation Risk Management Framework

Plan B Consulting

This week, I apply the PESTLE framework to business continuity, in response to finding other risk management frameworks too restricting. Over the last few weeks I have been thinking a lot about risk management frameworks for business continuity. The more I look at business continuity, the more I feel that basing the risk and threat assessment on PPRS (people, premises, resources and suppliers) or even on the new Good Practice Guideline’s list of buildings and work environment, IT, equipment, pro

article thumbnail

GDPR: Seeing Beyond Compliance to 3 Business Benefits

Behavior Group

GDPR, gdpr benefits, data protection Cybersecurity breaches make headline news, seemingly on a daily basis. Private data for millions of consumers is compromised at greater frequency. Organizations scramble to remediate damages and restructure their cyber defense tactics. To address this new normal and further protect personal information from data breaches, the European Union will formally… Continue reading.

article thumbnail

Protecting Against Cloud Downtime: Maximize Business Uptime Even When the Cloud is Down

VOX Veritas

Myth: The cloud provider is responsible for app uptime. Get clear on cloud. Read the Truth in Cloud report.

40
article thumbnail

PET PREPAREDNESS: HOW TO PREPARE YOUR PET FOR EMERGENCIES

CCEM Strategies

Now more than ever, businesses across the country are embracing pet-friendly work environments, so it’s important to ensure they’re just as prepared for emergencies as you are. But as a pet parents, how are you preparing your furry friends? To save valuable time in preparation, we’ve rounded up a list of pet essentials, so you’re not scrambling when the big one strikes - no matter what. 1.

52
article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Developing a Reputation Risk Management Framework

Plan B Consulting

This week, I apply the PESTLE framework to business continuity, in response to finding other risk management frameworks too restricting. Over the last few weeks I have been thinking a lot about risk management frameworks for business continuity. The more I look at business continuity, the more I feel that basing the risk and threat assessment on PPRS (people, premises, resources and suppliers) or even on the new Good Practice Guideline’s list of buildings and work environment, IT, equipment, pro

article thumbnail

Cybercriminals are turning to Telegram due to its security capabilities

Behavior Group

Cybercriminals are turning to Telegram, Cybercriminals, security capabilities Check Point researchers have revealed that cybercriminals are increasingly exploiting the popular messaging app, Telegram, to exchange information, recruit new partners and evade authorities. Criminals are turning to Telegram because law enforcement has been successful recently in taking down Dark Web marketplaces and forums, such as Hansa… Continue reading.

article thumbnail

EMERGENCY PREPAREDNESS: TECHNOLOGY TIPS

CCEM Strategies

Technology is becoming prevalent now more than ever - we rely heavily on it to communicate with everyone around us, use it to read breaking news, and are alerted in the event of an emergency with Alert Ready. But in the event of an emergency, how should you be using your technology to reap the benefits? Just in time for Emergency Preparedness Week, here are our top tips: Put it in writing Gone are the days of relying solely on voice communication.

article thumbnail

How to Use the NIST Cybersecurity Framework

Behavior Group

NIST Cybersecurity Framework Version 1.0 of the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF) celebrated its fourth birthday in February. The CSF is a “risk-based approach to managing cybersecurity risk… designed to complement existing business and cybersecurity operations.” I recently spoke with Matthew Barrett, NIST program manager for the CSF, and he provided me… Continue reading.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Put Password Pain in the Past with Multi-Factor Authentication

Behavior Group

Multi-Factor Authentication Feeling reckless? Hopeless? Frustrated and impulsive? You’re not alone. Employees around the world are fed up with trying to do their work efficiently without exposing their networks to hackers. In fact, restless, hopeless and frustrated were the exact words people used to describe their feelings in a study about cybersecurity published by NIST.… Continue reading.

article thumbnail

War, what is it good for…?

Plan B Consulting

With the West on the brink of conflict with Syria and its Russian allies, I suggest business continuity professionals should be aware of world events and consider the potential impact on their organisations. At the time of writing this bulletin, nothing has happened since the USA and its allies threatened to bomb Syria. The threat came after Syria’s alleged use of chemicals against the population of Douma on 7 April, which killed at least 34 people and possibly more.

article thumbnail

War, what is it good for…?

Plan B Consulting

With the West on the brink of conflict with Syria and its Russian allies, I suggest business continuity professionals should be aware of world events and consider the potential impact on their organisations. At the time of writing this bulletin, nothing has happened since the USA and its allies threatened to bomb Syria. The threat came after Syria’s alleged use of chemicals against the population of Douma on 7 April, which killed at least 34 people and possibly more.