August, 2017

article thumbnail

Channel Manager Position – West

ChannelBloom

Unitrends is looking for a very strong individual that can deliver consistent and aggressive growth achievement through substantial channel recruitment and rapid partner development for our Western Region Territory. Unitrends utilizes a highly orchestrated sales effort between coordinating marketing, insides sales, channel marketing programs, and channel sales efforts to drive all sales opportunities. • This is a very independent work environment; however in order for this individual to succeed

article thumbnail

The five things a horse can teach you about crisis management 

Crisis Response Journal

Two years ago, despite a life-long allergy and a sworn aversion to getting even remotely close to an animal of such size and power, my curiosity got the better of me and I sat on a horse for the very first time, writes Andy Marshall, who is a Member of CR

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SIEM challenges: Why your security team isn’t receiving valuable insights

Behavior Group

SIEM challenges, information security, cybersecurity Today, many enterprises use security information and event management (SIEM) software to help detect suspicious activity on their networks. However, to be effective organizations need to surround a SIEM with security experts, advanced use cases, threat intelligence, and proven processes to investigate and respond to threats.

article thumbnail

CMS Guidelines Overview: 6 Types Of Incidents Your CMS Emergency Preparedness Plan Must Cover

Alert Media

The post CMS Guidelines Overview: 6 Types Of Incidents Your CMS Emergency Preparedness Plan Must Cover appeared first on AlertMedia.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

TULSA COMPANY SEAMLESSLY CONTINUES OPERATIONS FOLLOWING EF-2 TORNADO

Titan Data Services

TULSA COMPANY SEAMLESSLY CONTINUES OPERATIONS FOLLOWING EF-2 TORNADO Titan Data Services provides Canfield & Joseph Alternative Workspace, Data Recovery systems Tulsa, OK, August 10, 2017– Tulsa-owned company Canfield & Joseph sustained catastrophic damage in the August 6, 2017 EF-2 tornado in midtown Tulsa. Immediately following the storm, the company initiated their Titan Data Services disaster recovery plan to replicate, restore and recover valuable data.

More Trending

article thumbnail

Free Training Courtesy of President Trump

Plan B Consulting

Following President Trump’s response to the far-right rally in Charlottesville, Charlie looks at the lessons business continuity professionals can take from observing crises unravelling in the media. I have always said that some of the best education on business continuity and crisis management, apart from BC Training courses, can be found watching crises unfold on the news.

Sports 52
article thumbnail

USAR Blog: Learning the lessons from Australia's worst landslide 

Crisis Response Journal

Australia’s worst landslide disaster took place at 23:30hrs on Wednesday 30th July 1997, in Thredbo, an alpine village and ski resort in the Snowy Mountains of New South Wales (NSW), writes Blog Editor Martin Boyle.

100
100
article thumbnail

Integrating GDPR into your day to day IT practices

Behavior Group

Integrating GDPR, General Data Protection Regulation requirements, Data Protection, privacy management GDPR, four letters that when combined strike fear into the heart of any sysadmin. Luckily, there is quite some time before it comes into force, which means getting into the habit of complying should be natural by 25th May 2018. My default position on… Continue reading.

article thumbnail

Ultimate Guide: CMS Guidelines Emergency Communications Plan

Alert Media

The post Ultimate Guide: CMS Guidelines Emergency Communications Plan appeared first on AlertMedia.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

TULSA COMPANY SEAMLESSLY CONTINUES OPERATIONS FOLLOWING EF-2 TORNADO

Titan Data Services

TULSA COMPANY SEAMLESSLY CONTINUES OPERATIONS FOLLOWING EF-2 TORNADO. Titan Data Services provides Canfield & Joseph Alternative Workspace, Data Recovery systems. . Tulsa, OK, August 10, 2017– Tulsa-owned company Canfield & Joseph sustained catastrophic damage in the August 6, 2017 EF-2 tornado in midtown Tulsa. Immediately following the storm, the company initiated their Titan Data Services disaster recovery plan to replicate, restore and recover valuable data.

article thumbnail

Terrorist attacks with knives 

Crisis Response Journal

As predicted by European security experts, this summer has brought more cases of terrorist attacks in Europe, as well as around the world, writes Lina Kolesnikova.

Security 100
article thumbnail

4 Best Practices for Backing Up Endpoints in Your Business

Behavior Group

Backing Up Endpoints, risk management, information security Follow these critical steps to minimize threats to data in highly mobile environments. The risk of data loss can keep any IT manager up at night. Disappearing data can cause major expense and even serious damage to the credibility of a business and significantly affect the productivity of… Continue reading.

article thumbnail

(GDPR) General Data Protection Regulation requirements, deadlines and facts

Behavior Group

General Data Protection Regulation requirements, Data Protection, data security regulations, privacy management, data regulation GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that does business in Europe needs… Continue reading.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Separation of duties and IT security

Behavior Group

Separation of duties, Data Protection, data security regulations, privacy management, data regulation Muddied responsibilities create unwanted risk and conflicts of interest. New regulations such as GDPR now require that you pay more attention to roles and duties on your security team. Separation of duties (SoD) is a key concept of internal controls and is the… Continue reading.

article thumbnail

How to write an Information Security Architect job description

Behavior Group

Information Security Architect A good information security architect straddles the business and technical worlds. Writing a solid, clear job description ensures that both sides understand the role. Whatever the role, good communication regarding the duties and expectations of a security professional is key to that person’s success. That communication starts with a solid, thorough job… Continue reading.

article thumbnail

The Chief Information Security Officer. The New CFO of Information Security

Behavior Group

Chief Information Security Officer, CISO Traditionally, CPAs have considered the chief financial officer (CFO) as the guardian of a business’s organizational data. It was and remains the CFO’s responsibility to maintain a system of internal controls that provides reliance for the accuracy and integrity needed to prepare and attest to the financial statements.

article thumbnail

Risk Management: How to Prevent Costly Supply Chain Incidents

Behavior Group

risk management, iso 27005 risk manager, iso 31000 risk manager, supply chain security Preventable corporate scandals, as seen by headline events related to Pepsi, Wells Fargo, Volkswagen, Chipotle and Wendy’s, result from a variety of risk management failures across a variety of industries. Notable scandals include cybersecurity failures at retail organizations and restaurants, quality control… Continue reading.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

How to create an effective business continuity plan

Behavior Group

business continuity plan, Disaster Recovery, Backup and Recovery A business continuity plan outlines procedures and instructions an organization must follow in the face of disaster, whether fire, flood or cyberattack. Here’s how to create one that gives your business the best chance of surviving such an event. We rarely get advance notice that a disaster… Continue reading.

article thumbnail

The Lifecycle of Data Protection Is Evolving. Here’s What You Need To Know.

Behavior Group

Lifecycle of Data Protection, data security regulations, privacy management, data regulation In this age of widespread ransomware attacks and rampant data breaches, enterprises are reimagining their data protection strategies. It is no longer adequate to worry about a disk crashing. Nowadays, you must worry about all of your data assets being stolen and held for… Continue reading.

article thumbnail

Free Training Courtesy of President Trump

Plan B Consulting

Following President Trump’s response to the far-right rally in Charlottesville, Charlie looks at the lessons business continuity professionals can take from observing crises unravelling in the media. I have always said that some of the best education on business continuity and crisis management, apart from BC Training courses, can be found watching crises unfold on the news.

Sports 52