Emergency management course offers flexibility and innovative experiential learning
Crisis Response Journal
MARCH 21, 2019
Emergency management course offers flexibility and innovative experiential learning By Rob Fagan
Crisis Response Journal
MARCH 21, 2019
Emergency management course offers flexibility and innovative experiential learning By Rob Fagan
Alert Media
MARCH 27, 2019
The post 4 Must-Have Emergency Notification Message Templates appeared first on AlertMedia.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Behavior Group
MARCH 27, 2019
According to the 2019 State of the Call Center Authentication report (…), one of the most exploited areas in a company’s security chain is the call center. call centers, virtualized calls a top threat, ATO attacks, cybersecurity Companies may be investing more in their cybersecurity defenses, but fraudsters are evolving in their tactics. As such,… Continue reading.
SRM
MARCH 26, 2019
What constitutes a cyber-mature organisation? Here’s a clue: it has nothing to do with size or age, sector or niche specialism, whether it is online or has a physical shop presence. It has everything to do with the corporate mindset. The cyber mature organisation is one with full board-level buy in. But, above all, its approach to data security is proactive rather than reactive.
Advertisement
Strengthen your operations with the Supply Chain Resilience Checklist. This practical, easy-to-use tool helps your organization prepare for disruptions and ensure long-term continuity in an unpredictable world. Why Download: Identify and assess critical supply chain risks Ask the right questions to evaluate vendor preparedness Implement effective strategies to reduce vulnerabilities Improve communication, transparency, and coordination across your network What You’ll Learn: How to evaluate and m
Plan B Consulting
MARCH 22, 2019
Charlie discusses the use of dark websites for crisis communication. I thought this week I would discuss the use of dark websites for crisis communication. When you hear about a crisis on the news, I always suggest you take a look at the organisation’s website and see how they are portraying the incident. A dark website is a website which is hidden from existing users and only deployed when an incident occurs.
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Crisis Response Journal
MARCH 19, 2019
Larissa Sotieva looks at how, in the process of giving up our online privacy, we are actually in danger of making ourselves more prone to manipulation, and examines this paradox within the context of regions affected by violent conflict.
Alert Media
MARCH 20, 2019
The post Finding the Best Emergency Notification System Vendor: Tips for Your Evaluation Process appeared first on AlertMedia.
Behavior Group
MARCH 22, 2019
Government inspectors have uncovered serious deficiencies in NASA’s information security program which they claim could threaten operations. NASA’s Poor Cybersecurity, threat, information security The findings come from the latest Office of the Inspector General (OIG) review of the space agency for fiscal year 2018, under the Federal Information Security Modernization Act of 2014 (FISMA).
VOX Veritas
MARCH 4, 2019
At its most basic definition, IT resilience is ensuring your company can recover from both planned and unplanned disruption.
Speaker: Erroll Amacker
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
Plan B Consulting
MARCH 22, 2019
Charlie discusses the use of dark websites for crisis communication. I thought this week I would discuss the use of dark websites for crisis communication. When you hear about a crisis on the news, I always suggest you take a look at the organisation’s website and see how they are portraying the incident. A dark website is a website which is hidden from existing users and only deployed when an incident occurs.
Business Resilience Decoded
MARCH 14, 2019
Episode 17: "Optimizing Your Multi-Tier Recovery Strategy" with Joseph George of Sungard Availability Services. Contact Joseph George at: [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 17: "Optimizing Your Multi-Tier Recovery Strategy" with Joseph George of Sungard Availability Services. Contact Joseph George at: [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.
Crisis Response Journal
MARCH 19, 2019
Distance and online education change as quickly as the technology, pedagogy and adult education that support such learning morphs from one system to the next, writes Robert Fagan.
Marketpoint Recall
MARCH 26, 2019
In a crisis, time is not on your side. A crisis creates a vacuum, an informational void that gets filled one way or another. The longer a company or other organization at the center of the crisis waits to communicate, the more likely that void will be filled by critics. That’s exactly what’s happening to Boeing. On March 10, Ethiopian Airlines flight ET302 crashed outside Addis Ababa shortly after takeoff, killing all 157 passengers on board.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
Behavior Group
MARCH 18, 2019
Nearly 15 billion identity records circulated in underground communities in 2018, a 71% increase over the year as hackers targeted smaller organizations more widely, according to a new report (…). breaches and Leaks, breaches, leaks, hackers, cybercrime, cybersecurity, cyber-criminals The identity intelligence company scanned the surface, social, deep and dark web for identity related breaches… Continue reading.
Emergency Planning
MARCH 7, 2019
Myth 1: Disasters are truly exceptional events. Reality: They are a normal part of daily life and in very many cases are repetitive events. Myth 2: Natural disasters are an inevitable result of Mother Nature's fury. Reality: The triggering phenomena are natural, and virtually nothing can be done to stop earthquakes, floods or tropical storms, for example.
Plan B Consulting
MARCH 8, 2019
Charlie looks at the latest spate of parcel bombs and why now might be a good time to review your plans, procedures and awareness. This week I was down in London delivering the Managing and Preparing for Cyber Incidents course. I noticed in the news at lunchtime that parcel bombs had been sent to Heathrow Airport, Waterloo Station and London City Airport.
Business Resilience Decoded
MARCH 14, 2019
Episode 17: "Optimizing Your Multi-Tier Recovery Strategy" with Joseph George of Sungard Availability Services. Contact Joseph George at: [link] [link] [link]. Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 17: "Optimizing Your Multi-Tier Recovery Strategy" with Joseph George of Sungard Availability Services. Contact Joseph George at: [link] [link] [link].
Advertisement
April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.
Crisis Response Journal
MARCH 17, 2019
The mission of the London Office for Rapid Cybersecurity Advancement (LORCA) is to scale the most promising companies that can help ensure the UK is the safest place to be online, writes Lydia Ragoonanan By Lydia Ragoonanan
Crisis Response Journal
MARCH 10, 2019
The second part of this series discusses updates in some pertinent cases of returning ISIS members and examines the implications of statements surrounding the issue made by leading political figures, specifically in how they affect government policy – and By Casey Brunelle
Behavior Group
MARCH 13, 2019
CISO roles – both full-time and fractional – are on the rise. Their skills can help a growing organization enhance its security program, keep it on track, and guide in times of crisis and change. However, finding the right CISO can be tricky business, especially if this role is new to your organization. Here are… Continue reading. The post 5 Key Skills Every Incoming CISO Should Have appeared first on Behaviour Portugal.
Plan B Consulting
MARCH 8, 2019
Charlie looks at the latest spate of parcel bombs and why now might be a good time to review your plans, procedures and awareness. This week I was down in London delivering the Managing and Preparing for Cyber Incidents course. I noticed in the news at lunchtime that parcel bombs had been sent to Heathrow Airport, Waterloo Station and London City Airport.
Advertisement
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
Behavior Group
MARCH 8, 2019
In 2017, Merck, a pharmaceutical company, was one of many companies targeted by a ransomware attack, known as “WannaCry.” incident response, cybersecurity, cyberattack, ransomware Reuters reported that this attack “disrupted production of some Merck medicines and vaccines,” at a high cost for the company. In addition, work was disrupted for a huge number of the… Continue reading.
Behavior Group
MARCH 6, 2019
Top password manager products have fundamental flaws that expose the data they are designed to protect, rendering them no more secure than saving passwords in a text file, according to a new study (…). password managers, password, malware attacks, security 100 percent of the products that ISE analyzed failed to provide the security to safeguard… Continue reading.
Behavior Group
MARCH 4, 2019
Aon’s 2019 Cyber Security Risk Report features eight risks that may impact organizations in the next 12 months, no matter where they are on their digital journey. cybersecurity risks, cybersecurity, threat,vulnerabilities “In 2018 we witnessed that a proactive approach to cyber preparation and planning paid off for the companies that invested in it, and in… Continue reading.
Plan B Consulting
MARCH 15, 2019
Charlie looks at how the CBCI Certification Course (GPG) has changed over the last ten years. Just before I start this week’s bulletin, our thoughts are with the people of New Zealand after the attack on the two mosques today. This week I have been teaching the CBCI Certification Course (GPG) in Glasgow and I found myself thinking about how the course and the Good Practice Guidelines (GPG) has changed over time.
Speaker: Sierre Lindgren
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
Plan B Consulting
MARCH 15, 2019
Charlie looks at how the CBCI Certification Course (GPG) has changed over the last ten years. Just before I start this week’s bulletin, our thoughts are with the people of New Zealand after the attack on the two mosques today. This week I have been teaching the CBCI Certification Course (GPG) in Glasgow and I found myself thinking about how the course and the Good Practice Guidelines (GPG) has changed over time.
Plan B Consulting
MARCH 1, 2019
Charlie discusses developing a new kind of playbook which could help you plan for different types of cyber-attack. This week I have had a bit of an epic journey. I started off in Shetland and ended the week in Abu Dhabi, having spent a couple of days in Riyadh, Saudi Arabia. I only visited one company in Saudi, but their business continuity was pretty impressive.
Plan B Consulting
MARCH 1, 2019
Charlie discusses developing a new kind of playbook which could help you plan for different types of cyber-attack. This week I have had a bit of an epic journey. I started off in Shetland and ended the week in Abu Dhabi, having spent a couple of days in Riyadh, Saudi Arabia. I only visited one company in Saudi, but their business continuity was pretty impressive.
Let's personalize your content