This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Watch here! Dr. Paul G. Stoltz presented at TEDx Hotelschool The Hague. . #TEDx #AQ #PEAK #Adversity. . WATCH ON YOUTUBE TEDx The post TEDx Talk with Dr. Paul G. Stoltz – Feb. 28, 2020 appeared first on PEAK Learning.
In disaster risk reduction circles, there is an almost desperate reliance on 'community' and a strong growth in studies and plans to "involve the community" in facing up to risks and impacts (Berkes and Ross 2013). The intentions are laudable, as DRR needs to be democratised if it is to function. However,'community' is contentious concept (Barrios 2014).
I normally firewall my Facebook persona from my Twitter and LinkedIn personas, keeping FB personal and the others professional. This keeps me from letting my personal views on issues and politics interfere with being completely dedicated to my clients and eliminates any judgments I may have of my clients' views, even perceptually, from influencing my opinion of them or the advice I give.
Roger Gomm comments on the World Economic Forum’s (WEF) new report, Cybercrime Prevention principles for internet service providers, published this January.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
This week I look at what tools and techniques are available to help those leading incident teams on how to make decisions during a crisis. This week I have spent eight hours in conference calls, working with a dedicated team to go through the suggested amendments on ISO 22361 which is going to replace prTS17091 ‘Crisis management – Guidance for developing a strategic capability’ One thing I have wanted to write about for a while is about decision making during a crisis and the applic
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
This week I look at what tools and techniques are available to help those leading incident teams on how to make decisions during a crisis. This week I have spent eight hours in conference calls, working with a dedicated team to go through the suggested amendments on ISO 22361 which is going to replace prTS17091 ‘Crisis management – Guidance for developing a strategic capability’ One thing I have wanted to write about for a while is about decision making during a crisis and the applic
A study found that 97 percent of IT leaders say insider breach risk is a significant concern. Insider Data Breaches are a Major Concern, IT leaders Uncontrolled access to personal data undermines confidence in the digital society. The logistics industry and Egress announced the results of its second Global Insider Data Breach survey, which looks… Continue reading.
February 20, 2020 NexusTek Again Ranked on CRNs 2020 Elite 150 & MSP 500 Lists Managed IT services provider recognized as one of the top providers in the IT Industry Denver, CO (February 20, 2020) NexusTek , a top national cloud, managed IT services and cyber security provider (MSP), today announced its placement in the Elite 150 and MSP 500 by CRN.
“I’m so tired, I can’t seem to focus on anything.”. “The house is so messy, but I haven’t the energy to clean.”. “My boss is running me ragged. There’s too much work, I’ll have to work overtime!”. Do these phrases sound familiar? Have you often found yourself exhausted from the strain of day-to-day life? You’re not alone.
Larissa Sotieva is a peacebuilding and humanitarian expert with over 25 years of experience working in academia, research and NGOs in the former Soviet Union.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
This week I look at what tools and techniques are available to help those leading incident teams on how to make decisions during a crisis. This week I have spent eight hours in conference calls, working with a dedicated team to go through the suggested amendments on ISO 22361 which is going to replace prTS17091 ‘Crisis management – Guidance for developing a strategic capability’ One thing I have wanted to write about for a while is about decision making during a crisis and the applic
62% of CISOs think the global cybersecurity talent shortage will get worse over the next five years, according to Global Snapshot: The CISO in 2020, a report that explores the role and demographics of CISOs. ciso, cybersecurity, The Cybersecurity Talent Shortage Even as cybercriminals continue to get better at what they do, people are becoming… Continue reading.
READ TIME: 3 MIN February 13, 2020 5 Reasons to Love Your IT Provider Valentines Day is approaching and hackers LOVE finding ways to get into your companys network. This is one of the reasons that having an IT provider on your business side is so important. But that isnt the only reason to love your IT provider. Here are some of the main reasons that you should absolutely love your companys IT provider : Your IT Provider keeps you safe and secure.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
The coronavirus outbreak could not occur at a more inconvenient time for Chinese leaders. 2019 was not a particularly pretty year for the Chinese Communist Party (CCP). They faced significant economic pressure from the U.S.-China trade war, international opposition to China’s human rights abuses in Xinjiang, an outbreak of swine fever that decimated China’s pork industry, and protracted civil unrest in Hong Kong.
Mark Yarnell from Refugees International reports that the Somali Government is taking positive steps to address internal displacement and while there is still a long way to go, the future is promising.
This week I explain what the minimum business continuity objective (MBCO) is and how to use it. The minimum business continuity objective (MBCO) is, in my opinion, an extremely important component of the business impact analysis (BIA). I have always thought that it is the poor cousin to the MTPD (maximum tolerable period of disruption): not used very often and not really understood by many people.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
The developments in the area of cybersecurity are alarming. As the number of smart devices in private households increases, so do the opportunities for cyber criminals to attack, TÜV Rheinland reveals. cybersecurity, privacy Uncontrolled access to personal data undermines confidence in the digital society. The logistics industry and private vehicles are increasingly being targeted by… Continue reading.
READ TIME: 5 MIN February 7, 2020 Your company was just hit with ransomware. What next? Hypothetically speaking, you open your laptop and there it is, a ransom note telling you that all your companys data has been compromised. Your emails, accounting information, customer data, everything is compromised. The message tells you that there is one way to get the data back and that is to pay large sums of money to the hackers who have your data held at ransom.
Welcome to February’s Ransomware Recap! In this monthly series, we discuss a few of the biggest ransomware stories. Let’s jump in. Hackers Find Bug in PayPal’s Google Pay Integration. Hackers have found a bug in the Google Pay integration with PayPal, and are now using it to perform unauthorized transactions. Most transactions have taken place at stores in the US, especially Target stores across New York.
In November 2019, London’s City Hall hosted the launch of the Counter Terrorism Preparedness Network (CTPN) in response to the threat of terrorism in the world’s major cities. Claire Sanders attended the event – here’s her report.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
This week I explain what the minimum business continuity objective (MBCO) is and how to use it. The minimum business continuity objective (MBCO) is, in my opinion, an extremely important component of the business impact analysis (BIA). I have always thought that it is the poor cousin to the MTPD (maximum tolerable period of disruption): not used very often and not really understood by many people.
The estimated current cybersecurity workforce is 2.8 million professionals, while the amount of additional trained staff needed to close the skills gap is 4.07 million professionals, according to (ISC)2. This makes retaining employees a top priority, but how can companies be successful at this? employees, valued Only one-third of employees surveyed plan to stay at… Continue reading.
Episode 40: "Responding to the COVID-19 Outbreak" with Dr. Lisa Koonin of Health Preparedness Partners. Contact Lisa Koonin at: [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 40: "Responding to the COVID-19 Outbreak" with Dr. Lisa Koonin of Health Preparedness Partners. Contact Lisa Koonin at: [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
Have you ever been asked to validate your backups? Maybe you utilize Veeam SureBackup to validate your backups, but need to validate a specific backup on the spot and don’t want to run the entire SureBackup job? Veeam provides the Veeam Backup Validator tool to manual validate backups immediately. The tool is so simple to use that you could start using it right away.
Following Dundee and Angus College’s recent cyber attack, Charlie looks at why their response is a good example of how to deal with a cyber incident and what we can learn from it. I thought this week we might take a break from talking about the coronavirus (COVID-19), as every man, woman and consultant seems to be posting their thoughts, response actions and checklist on social media and on business continuity websites.
Following Dundee and Angus College’s recent cyber attack, Charlie looks at why their response is a good example of how to deal with a cyber incident and what we can learn from it. I thought this week we might take a break from talking about the coronavirus (COVID-19), as every man, woman and consultant seems to be posting their thoughts, response actions and checklist on social media and on business continuity websites.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content