This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In this month’s blog on free preparedness training and education it’s Robert Fagan’s pleasure to highlight the course Staying Safe: How to Be Prepared in the Modern World from the United Kingdom’s Emergency Planning College (EPC).
Comprehensive BCM (business continuity management) measures are essential for responding effectively to a disruption and providing a minimum acceptable service during a disaster. A crucial aspect of BCM is the development of an effective BCP (business continuity plan). What is a business continuity plan? A BCP consists of the processes and procedures an organisation needs in order to continue operating during a disaster and recover as quickly as possible.
Experts from The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy, developed a list of the biggest cyber threats to watch out for in 2019. the biggest cyber threats Cryptojacking If the recent and explosive growth of ransomware is an indication of anything, it… Continue reading.
This week, Charlie looks at decision making during incidents and offers some tools and techniques that he has picked up through his research. For a while now, I have been thinking about and looking at ways of making decisions during incidents and have been looking at simple tools and techniques that I can teach to incident management teams. There is an art to good decision making and some people are either just good at it, or when a major decision needs to be made are just lucky they made the ri
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
“This isn’t working.” “I’ve changed.” “I don’t see a future with you.” Those ‘breakup’ lines may apply to your Business Continuity Management software or your latest paramour. Not all relationships succeed. When things go awry, goodbye may be the best solution. But that may seem impossible – even when you know it’s necessary. You’ve invested countless hours and piles of capital (both monetary and political) populating your current BCM software.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
“This isn’t working.” “I’ve changed.” “I don’t see a future with you.” Those ‘breakup’ lines may apply to your Business Continuity Management software or your latest paramour. Not all relationships succeed. When things go awry, goodbye may be the best solution. But that may seem impossible – even when you know it’s necessary. You’ve invested countless hours and piles of capital (both monetary and political) populating your current BCM software.
Any organisation that imagines that a business continuity plan makes it ‘crisis prepared’ is due for a big and costly surprise, says Dr Tony Jaques Crisis management should be recognised as both a tactical and a strategic responsibility, which extends fa By Dr Tony Jaques
All organisations experience disruptions, whether that’s from a cyber attack, IT failure, weather event or something else, and they need to be prepared. The longer it takes to address an issue, the more the costs will spiral and the harder it will be to recover. A disaster recovery plan gives organisations a process for responding to a variety of incidents.
Security experts have lined up to warn consumers of a deluge of phishing and gift card scams as Cyber Monday kicks off today. fraud alert, cyber monday, phishing , gift card scams The US online sales blitz has also become something of a staple across some European countries, especially in the UK where it’s predicted… Continue reading. The post Fraud Alert as Cyber Monday Sales Kick Off appeared first on Behaviour Portugal.
This week, Charlie looks at decision making during incidents and offers some tools and techniques that he has picked up through his research. For a while now, I have been thinking about and looking at ways of making decisions during incidents and have been looking at simple tools and techniques that I can teach to incident management teams. There is an art to good decision making and some people are either just good at it, or when a major decision needs to be made are just lucky they made the ri
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
A meat-seller website was offering 33% discount on Lamb, curry cut. Been buying from them for almost two years now. Ordered a kg online. This site had a delivery tracking option and delivered in 120 minutes. An impressive track of delivery, I must say. Washed the meat in cold water & marinated with yogurt & spices before keeping it in the fridge for an hour, covered with a cling wrap.
ALERTT is the Advanced Law Enforcement Rapid Response Training centre in Texas State University, and it provides the best research-based active shooter training in the US, writes Brian Dillon.
Whether you’re creating a disaster recovery or business continuity plan, you must conduct a risk assessment and a BIA (business impact analysis). These processes inform your decision making and are often grouped together because they tackle similar issues, but don’t think you can get away with doing only one. Think of them instead as two parts of a whole.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
In a world of increasingly punitive regulations like GDPR, the combination of unstructured data and human error represents one of the greatest risks an organization faces. Understanding the differences between unstructured and structured data – and the different approaches needed to secure it – is critical to achieve compliance with the many data privacy regulations… Continue reading.
Veritas recently upgraded its entire data management software portfolio with extensive support for hybrid and public clouds—including extended integration with Amazon S3. We're at AWS #reInvent this week and invite you to learn more!
Episode 9: "Managing Business Resiliency via Geographic Redundancy Strategies" with Michele Turner of Amazon. Contact Michele Turner at: [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 9: "Managing Business Resiliency via Geographic Redundancy Strategies" with Michele Turner of Amazon. Contact Michele Turner at: [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.
Charlie argues that during some crises it is best not to listen to the angry voices attacking you, but to keep quiet and weather the storm, which will quickly dissipate. This week I have been in the Caribbean where the main TV stations are American, so I have been watching a lot of CNN. Not particularly because I like CNN, but because I am fascinated by their coverage of Donald Trump.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
In this blog Kirsty McKinlay-Stewart covers a training course that one of our latest CRJ Partners, Paradigm Human Performance Ltd invited her to attend.
Ahead of the 2018 2018 Forum on Disaster Risk Reduction, Erling Kvernevik, Teresa Rubino and Rosalind Cook say that delivering a financial system that reduces disaster risk is a critical contribution to a more sustainable and safer Europe Direct and indi By Erling Kvernevik, Teresa Rubino and Rosalind Cook
Editorial Advisory Panel Member Lina Kolesnikova took part in the 20th Homeland and Global Security Forum (Crans Montana Forum), chairing the session on Cybersecurity and the Governance of Information in Geneva, Switzerland.
Ahead of the 2018 European Forum on Disaster Risk Reduction in Rome, Rosalind Cook, Professor Sirkku Juhola and Jaroslav Mysiak take a look at the pressing need for Europe to meet the challenges of a changing climate.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
Cyber-attacks are the number one business risk in the regions of Europe, North America and East Asia and the Pacific, according to a major new study from the World Economic Forum (WEF). Cyber-Attacks Are Top Business Risk Its Regional Risks for Doing Business report highlights the opinions of 12,000 executives from across the globe. While… Continue reading.
Based on the results of a new survey, the vast majority of IT security pros fail to understand the actual risks of short-lived but dangerous phishing attacks on the web, said (…) Phishing Risks, phishing attacks Conducted over a five day period, a query of 300 IT security decision makers in midsized firms in the… Continue reading. The post Most IT Security Pros Underestimate Phishing Risks appeared first on Behaviour Portugal.
The cybersecurity industry has been around for more than 30 years and undergone exponential growth, but in many ways it is still defining itself in the face of evolving threats. Technology and process are predictably playing a role. But diversity of talent has also become increasingly important to the success of security organizations and is… Continue reading.
Combining two seemingly unrelated entities to make a better, more useful creation is a keystone of innovation. Think of products like the clock radio and the wheeled suitcase, or putting meat between two slices of bread to make a sandwich, and you can see how effective it can be to combine two outwardly disparate things.… Continue reading. The post Why you should take an operational approach to risk management appeared first on Behaviour Portugal.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
New research undertaken by 247meeting has revealed senior management as being the culprits for some of the biggest lapses in workplace security. 247meeting surveyed 2,000 UK office-based workers and remote workers to understand their attitude to workplace security and the impact it has already had throughout their career. The new report aims to educate businesses… Continue reading.
A Japanese minister in charge of cybersecurity has shocked lawmakers after revealing that he doesn’t use a computer, and struggles to grasp the concept of a USB stick. Cybersecurity Minister Doesn’t Use a PC Yoshitaka Sakurada, 68, is deputy chief of the government’s cybersecurity strategy office. However, responding to an independent lawmaker at a Lower… Continue reading.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content