October, 2019

article thumbnail

Disaster Tip of The Week: Set Meeting Points to Reunite With Family and Loved Ones

Disaster Preparedness

Meeting Points. It's hard to believe I wrote a brief post about this over ten years ago - Have a Designated Meeting Place For Your Family. Today, I'd like to expand on this a bit more. Odds are when a disaster or other unexpected event occurs you are likely to be at work. Your spouse or significant other will also be at work and your kids, they'll probably be at school.

article thumbnail

A man walks into a room

Emergency Planning

A man walks into the room. He is extremely handsome and quite tall (at least for his time, about 520 years ago). He is neither fat nor thin. In fact he likes his food and drink, he is fond of convivial dinners with good food and wine. His circle of friends is small but select, much more so than his large circle of enemies and opponents. One of his friends is his neighbour, Lisa Gherardini.

Fashion 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The view from a super recogniser 

Crisis Response Journal

If you follow the news, it’s impossible to miss the heated debate that is currently surrounding the trial and potential roll-out of automated facial recognition technology by police forces, says Kenny Long.

article thumbnail

7 mistakes that ISO 27001 auditors make

IT Governance BC

When organisations are seeking ISO 27001 compliance, they rely on auditors to give them good advice. Most of the time they’ll do just that – it’s what they’re paid to do. But as with any profession, some auditors are better than others. How can you tell if your auditor isn’t to be trusted? Keep an eye out for these seven mistakes: 1. They impose their opinions without facts.

Audit 64
article thumbnail

Are Robots Replacing You? Keeping Humans in the Loop in Automated Environments

Speaker: Erroll Amacker

As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R

article thumbnail

The Devotee

arunpraka shray

My Asia Pacific CEO wanted me to step down from my current role in a leading Finance Multi-national. I have seen better days, huge profits for the Company’s India arm, distributed fat bonuses to thousands of employees, still he wanted me out. I didn’t sleep almost for a week now, had dark circles under my eyes, and ate frugally owing to a lost appetite.

Travel 52

More Trending

article thumbnail

How much risk small businesses really pose to supply chain cybersecurity?

Behavior Group

50% of large enterprises view third-party partners of any size as a cybersecurity risk, but only 14% have experienced a breach as the result of a small business partner, while 17% have been breached as the result of working with a larger partner, according to ISC2. risk, supply chain, cybersecurity The study surveyed more than… Continue reading.

article thumbnail

The Backlog Trap

Plan B Consulting

Following this week’s CBCI Certification Course , Charlie shares his thoughts on the backlog trap. This week I have been teaching the CBCI Certification Course. After the course finished on Thursday evening I went to London City Airport to get my plane home. All went well until I was sitting at the gate and the plane was promptly cancelled. As it was about 6:45pm, there was no other transport which I could catch back to Scotland, either by plane or train, so I joined the long queue for reb

article thumbnail

How the TERRIFIC project is helping CBRN first responders 

Crisis Response Journal

Rob Munro outlines the TERRIFFIC – Tools for early and Effective Reconnaissance in cbRne Incidents providing First responders Faster Information and enabling better management of the Control zone – project and the many benefits it will bring to the critia By Rob Munro

article thumbnail

A University’s Duty of Care: What You Need to Know

Alert Media

The post A University’s Duty of Care: What You Need to Know appeared first on AlertMedia.

article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

“Prepare for” an Audit or “We are Ready” for an Audit – Big Difference!

Prism International

Early Monday morning an email from the Compliance Officer (CO) of a large client organization has been received by the Operations Manager (OM). Not the ideal way to start the week. Planning to visit the record and data center on Wednesday, he requests the OM suggest a convenient time. There is no “rule” that a Covered Entity (CE) must forewarn the service provider of a site visit, only professional courtesy.

Audit 52
article thumbnail

Cyber Security Tip: Detecting Attacks Over Low-Traffic Ports

NexusTek

READ TIME: 4 MIN October 29, 2019 Cyber Security Tip: Detecting Attacks Over Low-Traffic Ports Last year, cyber security experts witnessed an increase in the number of encrypted web application, highly targeted phishing and ransomware attacks. IoT (Internet of Things) attacks also increased by 217.5 percent when compared with 2017 numbers. In the wake of vulnerabilities like Spectre, Meltdown, Foreshadow, and PortSmash, threat researchers have identified processor vulnerabilities as a major secu

article thumbnail

65% of stressed-out cybersecurity and IT workers are thinking about quitting

Behavior Group

A recent report found that the average tenure of a chief information security officer (CISO) is only 18 to 24 months, citing constant stress and urgency of the job as the core reasons. For comparison, the average tenure of a chief financial officer is 6.2 years and the average tenure of a chief executive officer… Continue reading. The post 65% of stressed-out cybersecurity and IT workers are thinking about quitting appeared first on Behaviour Portugal.

article thumbnail

The Backlog Trap

Plan B Consulting

Following this week’s CBCI Certification Course , Charlie shares his thoughts on the backlog trap. This week I have been teaching the CBCI Certification Course. After the course finished on Thursday evening I went to London City Airport to get my plane home. All went well until I was sitting at the gate and the plane was promptly cancelled. As it was about 6:45pm, there was no other transport which I could catch back to Scotland, either by plane or train, so I joined the long queue for reb

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Fifteen years after Beslan hostage tragedy, questions still remain 

Crisis Response Journal

This year marks the 15th anniversary of the Beslan school hostage taking in North Ossetia, Alania (Russia), writes Advisor Panel Member Lina Kolesnikova. More than 1,000 hostages were held by terrorists for three days.

100
100
article thumbnail

5 Ways Interactive Maps Improve Emergency Alert Systems

Alert Media

The post 5 Ways Interactive Maps Improve Emergency Alert Systems appeared first on AlertMedia.

Alert 52
article thumbnail

Resiliency and Performance for Tier 1 Critical Applications in VMware with InfoScale

VOX Veritas

InfoScale provides application centric storage acceleration, availability and disaster recovery for any app in VMware.

article thumbnail

The Need To Establish Public & Private Partnerships

Business Resilience Decoded

Episode 31: "The Need To Establish Public/Private Partnerships" with Dan Schreiter of Kwik Trip, Inc. Contact Dan Schreiter at: (608) 793-6394 dschreiter@kwiktrip.com [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 31: "The Need To Establish Public/Private Partnerships" with Dan Schreiter of Kwik Trip, Inc. Contact Dan Schreiter at: (608) 793-6394 dschreiter@kwiktrip.com [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Personal Information of 20 Million People in Ecuador is Breached

Behavior Group

Ecuador is investigating a data breach in which the personal data of up to 20 million people was made available online. Personal Information is Breached, data breach, leaked In a blog post, vpnMentor said that its research team, led by Noam Rotem and Ran Locar, discovered the data breach on an unsecured server located in… Continue reading. The post Personal Information of 20 Million People in Ecuador is Breached appeared first on Behaviour Portugal.

article thumbnail

Exercise Programmes – What Are They?

Plan B Consulting

In today’s bulletin Charlie looks at different exercises your organisation can carry out to verify your end-to-end business continuity solution. I am all Brexited out this week and even though I have been running a business continuity exercise in Riyadh, Saudi Arabia, I have been following the twists and turns avidly. Yesterday was almost like watching a real incident (which it is) or an exercise in play, as the changes were happening by the hour.

article thumbnail

When disaster strikes, how can you keep your staff safe? 

Crisis Response Journal

Dangerous events can take place at any time and are often unpredictable, making them a huge threat to your staff.

100
100
article thumbnail

How Lone Worker Safety Monitoring Can Transform Your Organization

Alert Media

The post How Lone Worker Safety Monitoring Can Transform Your Organization appeared first on AlertMedia.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

Orchestrated DR for NetBackup Instant Access VMs with Resiliency Platform 3.4

VOX Veritas

If you’re a NetBackup customer, extending data protection to full resiliency is totally achievable! With Veritas Resiliency Platform and Veritas NetBackup working together, your business will be prepared to fend off all kinds of downtime threats by integrating backup with proactive disaster recovery.

article thumbnail

The Need To Establish Public & Private Partnerships

Business Resilience Decoded

Episode 31: "The Need To Establish Public/Private Partnerships" with Dan Schreiter of Kwik Trip, Inc. Contact Dan Schreiter at: (608) 793-6394 dschreiter@kwiktrip.com [link]. Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 31: "The Need To Establish Public/Private Partnerships" with Dan Schreiter of Kwik Trip, Inc. Contact Dan Schreiter at: (608) 793-6394 dschreiter@kwiktrip.com [link].

article thumbnail

Cyber-Attacks Are Biggest Business Risk in Europe and US

Behavior Group

Cyber-attacks remained the biggest perceived risk of doing business for executives in North America and Europe, and second globally, according to an annual World Economic Forum (WEF) report published yesterday. Cyber-Attacks, Biggest Business Risk Compiled from the responses of over 12,900 executives in 133 countries, the Regional Risks for Doing Business 2019 report outlines “the… Continue reading.

article thumbnail

Exercise Programmes – What Are They?

Plan B Consulting

In today’s bulletin Charlie looks at different exercises your organisation can carry out to verify your end-to-end business continuity solution. I am all Brexited out this week and even though I have been running a business continuity exercise in Riyadh, Saudi Arabia, I have been following the twists and turns avidly. Yesterday was almost like watching a real incident (which it is) or an exercise in play, as the changes were happening by the hour.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

More CISOs now report directly to the CEO

Behavior Group

Businesses around the world are finally appearing to take their cybersecurity strategy to the highest level, with CEOs now often involved in the big calls. A study (…) found one in five CISOs now report directly to the CEO, highlighting the importance that security-focused roles are playing as companies look to keep their data protected.… Continue reading.

article thumbnail

What is a Brexit Operating Regime and Do I Need One?

Plan B Consulting

With the 31st October approaching, Charlie explores the idea of a Brexit Operating Regime and some preparations that your organisation can put into place. Over the last couple of weeks, I have been doing a number of Brexit workshops and exercises. As the 31st October is rapidly approaching, I thought I would share some of my ideas on how your organisation can prepare for Brexit.

article thumbnail

What is a Brexit Operating Regime and Do I Need One?

Plan B Consulting

With the 31st October approaching, Charlie explores the idea of a Brexit Operating Regime and some preparations that your organisation can put into place. Over the last couple of weeks, I have been doing a number of Brexit workshops and exercises. As the 31st October is rapidly approaching, I thought I would share some of my ideas on how your organisation can prepare for Brexit.