This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Meeting Points. It's hard to believe I wrote a brief post about this over ten years ago - Have a Designated Meeting Place For Your Family. Today, I'd like to expand on this a bit more. Odds are when a disaster or other unexpected event occurs you are likely to be at work. Your spouse or significant other will also be at work and your kids, they'll probably be at school.
A man walks into the room. He is extremely handsome and quite tall (at least for his time, about 520 years ago). He is neither fat nor thin. In fact he likes his food and drink, he is fond of convivial dinners with good food and wine. His circle of friends is small but select, much more so than his large circle of enemies and opponents. One of his friends is his neighbour, Lisa Gherardini.
If you follow the news, it’s impossible to miss the heated debate that is currently surrounding the trial and potential roll-out of automated facial recognition technology by police forces, says Kenny Long.
When organisations are seeking ISO 27001 compliance, they rely on auditors to give them good advice. Most of the time they’ll do just that – it’s what they’re paid to do. But as with any profession, some auditors are better than others. How can you tell if your auditor isn’t to be trusted? Keep an eye out for these seven mistakes: 1. They impose their opinions without facts.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
My Asia Pacific CEO wanted me to step down from my current role in a leading Finance Multi-national. I have seen better days, huge profits for the Company’s India arm, distributed fat bonuses to thousands of employees, still he wanted me out. I didn’t sleep almost for a week now, had dark circles under my eyes, and ate frugally owing to a lost appetite.
READ TIME: 3 MIN October 29, 2019 How Trick or Treaters Can Hack Your Business! Businesses are becoming more mobile-focused to make it easier for employees to be more productive. Its nearly standard practice to issue company phones, tablets, and laptops but when employees use their devices at home and connect to unsecured networks , it creates another layer of risk to organizations.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
READ TIME: 3 MIN October 29, 2019 How Trick or Treaters Can Hack Your Business! Businesses are becoming more mobile-focused to make it easier for employees to be more productive. Its nearly standard practice to issue company phones, tablets, and laptops but when employees use their devices at home and connect to unsecured networks , it creates another layer of risk to organizations.
50% of large enterprises view third-party partners of any size as a cybersecurity risk, but only 14% have experienced a breach as the result of a small business partner, while 17% have been breached as the result of working with a larger partner, according to ISC2. risk, supply chain, cybersecurity The study surveyed more than… Continue reading.
Following this week’s CBCI Certification Course , Charlie shares his thoughts on the backlog trap. This week I have been teaching the CBCI Certification Course. After the course finished on Thursday evening I went to London City Airport to get my plane home. All went well until I was sitting at the gate and the plane was promptly cancelled. As it was about 6:45pm, there was no other transport which I could catch back to Scotland, either by plane or train, so I joined the long queue for reb
Rob Munro outlines the TERRIFFIC – Tools for early and Effective Reconnaissance in cbRne Incidents providing First responders Faster Information and enabling better management of the Control zone – project and the many benefits it will bring to the critia By Rob Munro
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
Early Monday morning an email from the Compliance Officer (CO) of a large client organization has been received by the Operations Manager (OM). Not the ideal way to start the week. Planning to visit the record and data center on Wednesday, he requests the OM suggest a convenient time. There is no “rule” that a Covered Entity (CE) must forewarn the service provider of a site visit, only professional courtesy.
READ TIME: 4 MIN October 29, 2019 Cyber Security Tip: Detecting Attacks Over Low-Traffic Ports Last year, cyber security experts witnessed an increase in the number of encrypted web application, highly targeted phishing and ransomware attacks. IoT (Internet of Things) attacks also increased by 217.5 percent when compared with 2017 numbers. In the wake of vulnerabilities like Spectre, Meltdown, Foreshadow, and PortSmash, threat researchers have identified processor vulnerabilities as a major secu
A recent report found that the average tenure of a chief information security officer (CISO) is only 18 to 24 months, citing constant stress and urgency of the job as the core reasons. For comparison, the average tenure of a chief financial officer is 6.2 years and the average tenure of a chief executive officer… Continue reading. The post 65% of stressed-out cybersecurity and IT workers are thinking about quitting appeared first on Behaviour Portugal.
Following this week’s CBCI Certification Course , Charlie shares his thoughts on the backlog trap. This week I have been teaching the CBCI Certification Course. After the course finished on Thursday evening I went to London City Airport to get my plane home. All went well until I was sitting at the gate and the plane was promptly cancelled. As it was about 6:45pm, there was no other transport which I could catch back to Scotland, either by plane or train, so I joined the long queue for reb
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
This year marks the 15th anniversary of the Beslan school hostage taking in North Ossetia, Alania (Russia), writes Advisor Panel Member Lina Kolesnikova. More than 1,000 hostages were held by terrorists for three days.
Episode 31: "The Need To Establish Public/Private Partnerships" with Dan Schreiter of Kwik Trip, Inc. Contact Dan Schreiter at: (608) 793-6394 dschreiter@kwiktrip.com [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 31: "The Need To Establish Public/Private Partnerships" with Dan Schreiter of Kwik Trip, Inc. Contact Dan Schreiter at: (608) 793-6394 dschreiter@kwiktrip.com [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
Ecuador is investigating a data breach in which the personal data of up to 20 million people was made available online. Personal Information is Breached, data breach, leaked In a blog post, vpnMentor said that its research team, led by Noam Rotem and Ran Locar, discovered the data breach on an unsecured server located in… Continue reading. The post Personal Information of 20 Million People in Ecuador is Breached appeared first on Behaviour Portugal.
In today’s bulletin Charlie looks at different exercises your organisation can carry out to verify your end-to-end business continuity solution. I am all Brexited out this week and even though I have been running a business continuity exercise in Riyadh, Saudi Arabia, I have been following the twists and turns avidly. Yesterday was almost like watching a real incident (which it is) or an exercise in play, as the changes were happening by the hour.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
If you’re a NetBackup customer, extending data protection to full resiliency is totally achievable! With Veritas Resiliency Platform and Veritas NetBackup working together, your business will be prepared to fend off all kinds of downtime threats by integrating backup with proactive disaster recovery.
Episode 31: "The Need To Establish Public/Private Partnerships" with Dan Schreiter of Kwik Trip, Inc. Contact Dan Schreiter at: (608) 793-6394 dschreiter@kwiktrip.com [link]. Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 31: "The Need To Establish Public/Private Partnerships" with Dan Schreiter of Kwik Trip, Inc. Contact Dan Schreiter at: (608) 793-6394 dschreiter@kwiktrip.com [link].
Cyber-attacks remained the biggest perceived risk of doing business for executives in North America and Europe, and second globally, according to an annual World Economic Forum (WEF) report published yesterday. Cyber-Attacks, Biggest Business Risk Compiled from the responses of over 12,900 executives in 133 countries, the Regional Risks for Doing Business 2019 report outlines “the… Continue reading.
In today’s bulletin Charlie looks at different exercises your organisation can carry out to verify your end-to-end business continuity solution. I am all Brexited out this week and even though I have been running a business continuity exercise in Riyadh, Saudi Arabia, I have been following the twists and turns avidly. Yesterday was almost like watching a real incident (which it is) or an exercise in play, as the changes were happening by the hour.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
Businesses around the world are finally appearing to take their cybersecurity strategy to the highest level, with CEOs now often involved in the big calls. A study (…) found one in five CISOs now report directly to the CEO, highlighting the importance that security-focused roles are playing as companies look to keep their data protected.… Continue reading.
With the 31st October approaching, Charlie explores the idea of a Brexit Operating Regime and some preparations that your organisation can put into place. Over the last couple of weeks, I have been doing a number of Brexit workshops and exercises. As the 31st October is rapidly approaching, I thought I would share some of my ideas on how your organisation can prepare for Brexit.
With the 31st October approaching, Charlie explores the idea of a Brexit Operating Regime and some preparations that your organisation can put into place. Over the last couple of weeks, I have been doing a number of Brexit workshops and exercises. As the 31st October is rapidly approaching, I thought I would share some of my ideas on how your organisation can prepare for Brexit.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content