March, 2017

article thumbnail

SAR Blog: Trouble in Paradise? Report highlights islands' search + rescue capability 

Crisis Response Journal

When you think of the Cayman Islands you picture a tropical Caribbean paradise famous for its beaches, azure seas and watersports. Most tourists wouldn’t think twice about the islands’ search and rescue capability, writes Martin Boyle.

100
100
article thumbnail

IT job profile: So you want be a CISO

Behavior Group

Want be a CISO, CISO, CISSP, CCISO, CISM, CISA, ISO 27001, Information security, Risk Management Want be a CISO? Chief Information Security Officer (CISO) is a coveted position in many IT organizations. The high demand for qualified CISOs leads to tremendous competition for capable candidates and correspondingly high salaries. But what’s the real deal behind… Continue reading.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LOCKDOWN VS. SHELTER-IN-PLACE – DETERMINING THE BEST ACTION FOR YOUR BUSINESS

CCEM Strategies

There is an emergency. You’ve deemed the safest action is to stay indoors, rather than to evacuate. Now, do you Lockdown or Shelter-in-Place? These two procedures are similar and can be confusing for both employers and personnel. In our final part of the Shelter-in-Place & Lockdown 3-part Blog Series, we explore some quick tips to determine the most appropriate actions for the situation and how to keep your employees safe. 1.

article thumbnail

Only 32 million people were watching…

Plan B Consulting

This week I have has taken on a piece of work which will involve running a live exercise. I share my thoughts and questions on possible scenarios, and asks for advice from those of you that have run many of these type of live exercises. I have been in London this week, delivering the BCI Introduction to Business Continuity Management course to a great bunch of people, including Alain who is the very first person I have trained from the Congo!

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

Which Communication Channels Should You Use During An Emergency?

Alert Media

The post Which Communication Channels Should You Use During An Emergency? appeared first on AlertMedia.

More Trending

article thumbnail

NIST CRIED: The Four Steps of Incident Mitigation

Behavior Group

cyber security education, cybersecurity response, incident mitigation, NIST cyber security framework, risk mitigation Mike Tyson notably said, “Everyone has a plan ‘till they get punched in the mouth.” So, how do you ensure the same doesn’t hold true for your company’s incident response plan when a real breach occurs? Enter the NIST Framework category titled… Continue reading.

article thumbnail

Only 32 million people were watching…

Plan B Consulting

This week I have has taken on a piece of work which will involve running a live exercise. I share my thoughts and questions on possible scenarios, and asks for advice from those of you that have run many of these type of live exercises. I have been in London this week, delivering the BCI Introduction to Business Continuity Management course to a great bunch of people, including Alain who is the very first person I have trained from the Congo!

article thumbnail

It’s Time to Change Your Perception of the Cybersecurity Professional

Behavior Group

Cybersecurity professional, cybersecurity careers, security education, security leadership, security talent gap, threat mitigation To borrow from the Nobel Prize winning songwriter, the (security) times, they are a-changin’. When the commercial Internet was young – say in 1995 – IT structure was relatively simple. It consisted of just three layers: server, network and client.