This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In the second blog in our Human Performance series, Teresa Mulllen examines how the slow slipping away from correct processes and procedures can be addressed.
Risk Management With technological advancements rapidly increasing over the past couple of years, it’s unsurprising that data breaches have slowly crept up the list of small business owners’ biggest fears. For an SME (small-to-medium enterprise) that may not have even considered the possibility of this issue, the consequences of a breach could, in some cases,… Continue reading.
Richard Bale has had a storied career working for London Buses and major American banks in the city – as well as working for recovery providers on the supplier side. We talk about generator failures, terrorist incidents, hurricanes and what really constitutes a ‘crisis’. Richard Bale has had a storied career working for London Buses and major American banks in the city – as well as working for recovery providers on the supplier side.
Now that the Canadian government has launched Alert Ready - Canada’s National Public Alerting System, it’s important to consider how this affects your business’ emergency plans , and how to modify them moving forward. Developed by federal, provincial and territorial governments, Alert Ready is designed to deliver critical and potentially life-saving alerts in real-time.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
Last week the ‘Beast from the East’ combined with Storm Emma to cause the UK’s worst weather in years. In today’s bulletin, Charlie looks at the lessons BC professionals can take from the incident to prepare for future severe weather events. In Scotland there are still dirty black piles of snow left in car parks and I saw lots of snow in the corners of fields on my train journey from London to Glasgow yesterday.
What really happens when the cloud goes down and how do you protect your critical business applications in such an event? Learn about the anatomy of a cloud outage and best practices to help your business ensure maximum uptime against all odds.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
What really happens when the cloud goes down and how do you protect your critical business applications in such an event? Learn about the anatomy of a cloud outage and best practices to help your business ensure maximum uptime against all odds.
data collected by browsers, Criminals can build Web dossiers Everybody knows by now that websites collect information about users’ location, visited pages, and other data that can help them improve or monetize the experience. But just a small minority of Internet users realizes that browsers also collect/store information that can help attackers compile a “Web… Continue reading.
Mel Gosling of Merrycon was another of our interviewees from season one. We invited him back to share recovery stories from his time as an IT Manager and the lessons he’s learned from running crisis exercises as a consultant. Mel Gosling of Merrycon was another of our interviewees from season one. We invited him back to share recovery stories from his time as an IT Manager and the lessons he’s learned from running crisis exercises as a consultant.
Moving with the times With so many aspects of organisations moving away from paper and into the digital age, it seems that the management of product recalls hasn’t quite kept up. A product recall is a serious task for any company to undertake. They therefore deserve the same technical considerations and process management as other areas of the business, instead of being managed with outdated processes such as spreadsheets and paper responses.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
Last week the ‘Beast from the East’ combined with Storm Emma to cause the UK’s worst weather in years. In today’s bulletin, Charlie looks at the lessons BC professionals can take from the incident to prepare for future severe weather events. In Scotland there are still dirty black piles of snow left in car parks and I saw lots of snow in the corners of fields on my train journey from London to Glasgow yesterday.
Security Leaders Use Your Research to Build a Wider Security and Risk Management Plan for the Enterprise. [After] you have conducted the interviews, it is important to document the results from each interviewee. Create a Matrix The simplest way to develop your matrix is to list the names, titles and business elements to which they… Continue reading.
This week Charlie shares his thoughts on the on-going KFC incident and the lessons BC professionals can take from how the crisis has been handled. Ignoring the snow outside and despite it being my third day of not leaving the house, I thought I would leave commenting on the severe weather to next week and this week, as promised, put together some thoughts on the KFC crisis.
This week Charlie shares his thoughts on the on-going KFC incident and the lessons BC professionals can take from how the crisis has been handled. Ignoring the snow outside and despite it being my third day of not leaving the house, I thought I would leave commenting on the severe weather to next week and this week, as promised, put together some thoughts on the KFC crisis.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
security infrastructure, improve security When you’re on a tight budget for cybersecurity, it can seem almost impossible to secure every part of your businesses’ network without going over budget with the latest technologies in place. You may not be able to solve all your security needs immediately with a small budget, but the important thing… Continue reading.
ISO 31000, risk management simple Damage to reputation or brand, cyber crime, political risk and terrorism are some of the risks that private and public organizations of all types and sizes around the world must face with increasing frequency. The latest version of ISO 31000 has just been unveiled to help manage the uncertainty. Risk… Continue reading.
This week Charlie revisits cyber playbooks and invites your thoughts on whether his example fits your idea of what they should contain… A while ago, I wrote what I thought were the contents of a cyber playbook, and through my reading I thought I had a consensus of what one should contain. After having delivered a number of cyber public and private training courses, I have realised that there are a large variety of documents called playbooks, and they mean different things to different peop
This week Charlie revisits cyber playbooks and invites your thoughts on whether his example fits your idea of what they should contain… A while ago, I wrote what I thought were the contents of a cyber playbook, and through my reading I thought I had a consensus of what one should contain. After having delivered a number of cyber public and private training courses, I have realised that there are a large variety of documents called playbooks, and they mean different things to different peop
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
CEO or the Idea Data from startup failures, VC/angel investor preferences and the impact CEOs can have on ideas shows that these leaders are more important than the ideas they represent. There’s no doubt that a startup’s central idea is crucial for its eventual success; if it has no originality or innovation, or the idea… Continue reading. The post What’s More Important: the CEO or the Idea?
40
40
Input your email to sign up, or if you already have an account, log in here!
Enter your email address to reset your password. A temporary password will be e‑mailed to you.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content