This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Roger Gomm of our Editorial Advisory Panel, says the terrorist incident in Manchester - as well as attacks in other parts of the world - remind us that the threat is complex and evolving continually.
get serious about security, ransomware, malware, security awareness, cyber attack Wannacry Ransomware Attack Ransomware is the word on everyone’s lips this week, following the massive WannaCry ransomware attack which spread quickly all over the world. Security experts estimate that over 200 000 systems across 150 countries were affected by the attack, in which hackers took… Continue reading.
The WannaCry ransomware attack occurred last weekend and caused major disruption to the NHS, and subsequently, many other organisations. Charlie provides his thoughts and introduces our new Managing and Preparing for Cyber Incidents training course. The waters are still again and all appears to be quiet. A few are still busy recovering from the attack, but just because all seems still, as watchers of the film Jaws will know, somewhere under that still water is a massive shark biding its time bef
I am finally catching my breath after my third OpenStack Summit which came hot on the heels of Red Hat Summit and DockerCon. As expected, Boston was great to visit and I was happy to join the more than 5000 fellow Stackers to talk and learn OpenStack. Certainly the open source vibe was strong with an interesting array of speakers and discussions, not least Mark Collier’s interview with Edward Snowden.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
Dr David Rubens of Deltar-TS looks at the recent WannaCry ransomware attack, likening its effects on the UK’s National Health Service to what he terms ‘Hurricane Katrina Syndrome’ By Dr David Rubens
CRJ Editorial Advisory Panel Member Lina Kolesnikova recently took part in the annual Critical Infrastructure Protection and Resilience Europe conference in the Hague, the Netherlands.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
CRJ Editorial Advisory Panel Member Lina Kolesnikova recently took part in the annual Critical Infrastructure Protection and Resilience Europe conference in the Hague, the Netherlands.
Patrick Lagadec reflects on the use of social media in a crisis, following the European Emergency Number Association’s (EENA’s) annual conference in Budapest earlier this April.
Jay Levinson and Abraham ‘Avi’ Domb say that more than 100 years after the San Francisco earthquake of 1906, many of the issues the city experienced are still relevant today.
The International Telecommunication Union (ITU) and XPRIZE are convening the world's most respected experts in the fields of Artificial Intelligence (AI) and Sustainable Development for the AI for Good Global Summit to be held in Geneva, Switzerland, this
Martin Boyle speaks to Chris Boyer, Chief Operations Officer for the US-based National Association for Search and Rescue (NASAR) about the challenges of working across multiple states with different legislation and certification standards.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
The WannaCry ransomware attack occurred last weekend and caused major disruption to the NHS, and subsequently, many other organisations. Charlie provides his thoughts and introduces our new Managing and Preparing for Cyber Incidents training course. The waters are still again and all appears to be quiet. A few are still busy recovering from the attack, but just because all seems still, as watchers of the film Jaws will know, somewhere under that still water is a massive shark biding its time bef
cyber security, ransomware, malware, security awareness, cyber attack Both the business and technology industry are growing and making new advancements. These new improvements, such as converged systems and cloud storage systems, while strikingly beneficial, also bring with them new risks. One of the rising risks is cyber security. With many companies taking advantage of new… Continue reading.
prevent ransomware, malware, security awareness Ransomware is fast becoming a major threat to computer systems in many organisations. It is an aggressive form of attack which criminals use to infect computers and block the victim from accessing their own data unless they pay a ransom. Ransomware is not a new threat but has become more… Continue reading.
This week Charlie looks at the performance of incident management teams and how incident team members can be assessed using competencies. You get a new job and have been hired by organisation X to roll out business continuity within the company. You have just completed the crisis team exercise; luckily, it’s a small business with only one plan and one incident management team, so you can relax.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
This week Charlie looks at why he believes the business continuity profession is in decline. In my opinion, business continuity has lost its mojo over the last couple of years, and many in the profession are stumbling about trying to find a purpose for the field and their job role. In the next three bulletins, I will share my thoughts on why I believe there is a decline in the profession and why resilience isn’t the answer, along with some suggested solutions.
This week’s bulletin has been written by guest author, and consultant at PlanB Consulting, Gordon Brown. Implementing a BCMS which meets and exceeds ISO 22301 is a challenging, but important undertaking for an organisation committed to Business Continuity. I have recently been leading a project for PlanB, where we helped a marketing/logistics firm achieve ISO 22301 (with one minor non-conformity!).
This week Charlie looks at the performance of incident management teams and how incident team members can be assessed using competencies. You get a new job and have been hired by organisation X to roll out business continuity within the company. You have just completed the crisis team exercise; luckily, it’s a small business with only one plan and one incident management team, so you can relax.
This week Charlie looks at why he believes the business continuity profession is in decline. In my opinion, business continuity has lost its mojo over the last couple of years, and many in the profession are stumbling about trying to find a purpose for the field and their job role. In the next three bulletins, I will share my thoughts on why I believe there is a decline in the profession and why resilience isn’t the answer, along with some suggested solutions.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
This week’s bulletin has been written by guest author, and consultant at PlanB Consulting, Gordon Brown. Implementing a BCMS which meets and exceeds ISO 22301 is a challenging, but important undertaking for an organisation committed to Business Continuity. I have recently been leading a project for PlanB, where we helped a marketing/logistics firm achieve ISO 22301 (with one minor non-conformity!).
Physical Security, information security, cybersecurity, privacy The physical security space is changing, with emerging threats, new criminal techniques, terrorism and hostile activism just of few of the drivers of change. The implications are profound. The world of physical security systems is being invaded by multiple new and emerging technologies.
GDPR Transformation, privacy management, data regulation The General Data Protection Regulation (GDPR) effective date is just about a year out, but already we can see the work companies are doing to achieve compliance having a significant impact on the privacy. I had a great opportunity to gauge exactly how this is happening while attending the… Continue reading.
Containers bring portability to the table, as well as ease of deploying and managing software as a service. Here we discuss how to pull Veritas HyperScale image and have an enterprise grade storage service available for containerized applications on a server farm.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
With the sold out DockerCon17 over it is time to reflect on the week. The weather was certainly nice and Austin is always a great place to visit but I am proud that we were gold sponsors of this important event and able to participate in, and contribute to, the energy. I sensed a lot of excitement, noted that the ecosystem is dynamic and evolving fast and felt that containers are on the cusp of really taking off.
40
40
Input your email to sign up, or if you already have an account, log in here!
Enter your email address to reset your password. A temporary password will be e‑mailed to you.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content