October, 2017

article thumbnail

Humanitarian aid: It’s a matter of trust 

Crisis Response Journal

When the need for ever-greater humanitarian action is required in so many parts of the world, is interest in helping others increasingly reticent?

100
100
article thumbnail

Beyond GDPR: Data protection as a competitive advantage

Behavior Group

Data protection, GDPR advantage A new McAfee report shows that 48 percent of organizations will migrate their data to a new location because of regulations like GDPR. A similar amount will migrate their data because of changing geopolitics or the approach to relevant policies in the United States. Seventy percent of respondents believe the implementation… Continue reading.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why You Can’t Just Send an Email

Alert Media

The post Why You Can’t Just Send an Email appeared first on AlertMedia.

article thumbnail

Equifax UK – How not to manage the communications of a cyber breach

Plan B Consulting

Raising awareness for European Cyber Security Month, Charlie looks at the Equifax data hack, as an example of how cyber security incidents should not be handled. One of the things I noticed during my research when developing BC Training’s Managing and Preparing for Cyber Incidents course , was the lack of guidance on how to respond to a cyber incident.

article thumbnail

Supply Chain Resilience Checklist

Strengthen your operations with the Supply Chain Resilience Checklist. This practical, easy-to-use tool helps your organization prepare for disruptions and ensure long-term continuity in an unpredictable world. Why Download: Identify and assess critical supply chain risks Ask the right questions to evaluate vendor preparedness Implement effective strategies to reduce vulnerabilities Improve communication, transparency, and coordination across your network What You’ll Learn: How to evaluate and m

article thumbnail

Telephone terrorism continues to target Russian towns and cities 

Crisis Response Journal

Some Russian cities have been near-paralysed after being targeted by repeated, simultaneous mass bomb threats phoned through to police and emergency services, reports Lina Kolesnikova, who says that hackers are thought to be behind the attacks.

100
100

More Trending

article thumbnail

6 Best Practices that Reduce Third-Party Cybersecurity Risk

Behavior Group

Reduce Third-Party Cybersecurity Risk, cybersecurity risk Cybersecurity threats are increasingly sophisticated and targeted. Hackers who want your information or want to disrupt your operations are looking for any way into your network. In an interconnected world, these hackers are increasingly looking to an organization’s supply chain partners, especially those with network access but without effective… Continue reading.

article thumbnail

Why wait to be breached? Three reasons to secure your data now

Behavior Group

secure your data, iso 27001 training, information security training “I’m working on it.” “We don’t have room in this year’s budget.” “Something else more important came up.” “Well, we’ve not been breached before…” “The risk of it happening is so small and it’s hard to quantify…” These are some of the most common excuses companies… Continue reading.

article thumbnail

Information Security Management System auditors welcome ISO/IEC 27007 publication

Behavior Group

ISO/IEC 27007, Information technology, ISO 27001, ISO 27007 To continue providing us with the products and services that we expect, businesses will handle increasingly large amounts of data. The security of this information is a major concern to consumers and companies alike fuelled by a number of high-profile cyberattacks. The havoc caused by such attacks… Continue reading.

article thumbnail

5 Basic Rules to Build an Effective Security Awareness Program

Behavior Group

Security Awareness Program The Battle of Thermopylae, also known as “The Hot Gates,” fought in 480 B.C. is often put in the context that 300 Spartans held off a huge Persian army. In reality, the 300 Spartans were not alone during the battle. Alongside of them fought Athenians, Thebes, Thespians, and a variety of other… Continue reading. The post 5 Basic Rules to Build an Effective Security Awareness Program appeared first on Behaviour Portugal.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

The city of the future will be shaped by standards

Behavior Group

city of the future, world standard, world smart city Smart cities are more than just a buzzword. With expanding urban areas expected to host up to 70 % of the total world population by 2050, they are a necessity. “Standards make cities smarter” is the theme of World Standards Day 2017, celebrated on 14 October… Continue reading. The post The city of the future will be shaped by standards appeared first on Behaviour Portugal.

52
article thumbnail

Equifax UK – How not to manage the communications of a cyber breach

Plan B Consulting

Raising awareness for European Cyber Security Month, Charlie looks at the Equifax data hack, as an example of how cyber security incidents should not be handled. One of the things I noticed during my research when developing BC Training’s Managing and Preparing for Cyber Incidents course , was the lack of guidance on how to respond to a cyber incident.

article thumbnail

The changing role of the Chief Information Officer CIO

Behavior Group

Chief Information Officer, cio Digitalization and technological innovation are changing the nature of the job of the CIO. Leaders are rapidly scaling their digital businesses, making the remainder of this year and 2018 a defining moment for CIOs who don’t want to be left behind. The 2018 CIO Agenda Survey gathered data from a record… Continue reading.

article thumbnail

5 Cybersecurity Vulnerabilities That People Still Forget About

Behavior Group

Cybersecurity Vulnerabilities People are cautious of physical theft, but the security of digital assets is often ignored. The simplest actions can have devastating consequences for your data security. Outdated software, weak credentials, and malware all create opportunities for data exfiltration. Studies show that many users believe they won’t be targeted by hackers and aren’t aware… Continue reading.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

The global impact of huge cyber security events

Behavior Group

cyber security events The past 12 months have seen a number of unprecedented cyber-attacks in terms of their global scale, impact and rate of spread. Already causing widespread public concern, these attacks only represent a small sample of the wide array of cyber threats we now face. Europol’s Executive Director Rob Wainwright: “The global impact… Continue reading.

article thumbnail

Salary Survey Extra: Deep Focus on ISACA CRISC

Behavior Group

isaca crisc, crisc, crisc training, crisc certification, Certified in Risk and Information Systems Control Professional training, Certified in Risk and Information Systems Control Professional certification Risky business used to be a Tom Cruise movie from the ’80s, but in 2017 it’s a pretty fair description of the just about any commercial endeavor.

article thumbnail

Improving cybersecurity governance in the boardroom

Behavior Group

cybersecurity governance To tackle increasing data threats, companies need to put cybersecurity at the very heart of the business. The risk landscape for corporations is constantly changing with new threats, regulations, and evolving cybersecurity vulnerabilities and attack methods. The recently disclosed Equifax data breach is the latest high-profile event that has stirred senior executives and… Continue reading.

article thumbnail

Earn CISM, CISA, CEH, CCISO & CISSP cybersecurity certifications with preparation trainings

Behavior Group

CISM, CISA, CEH, CCISO & CISSP Become a cybersecurity professional without going back to school. With [these training courses], learn best practices and the groundwork to help you pass the CISM, CISA, CEH, CCISO & CISSP certification exams. Demand for high-quality cybersecurity professionals has never been higher, especially in light of the influx of high… Continue reading.

article thumbnail

Emergency Preparedness: Active Shooter Tabletop Exercise

April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.

article thumbnail

A beginner’s guide to cyber security’ webinar

Plan B Consulting

Thank you to Sadia Anwar for delivering this month’s webinar, giving us an insight into cyber security and helping raise awareness, as part of European Cyber Security Month. We hope you all enjoyed the webinar as much as we did. If you missed the webinar, you can view the recording by clicking on the YouTube video below. Details about our next webinar will be released in due course.

article thumbnail

A beginner’s guide to cyber security’ webinar

Plan B Consulting

Thank you to Sadia Anwar for delivering this month’s webinar, giving us an insight into cyber security and helping raise awareness, as part of European Cyber Security Month. We hope you all enjoyed the webinar as much as we did. If you missed the webinar, you can view the recording by clicking on the YouTube video below. Details about our next webinar will be released in due course.

article thumbnail

The 5 cyber attacks you’re most likely to face

Behavior Group

The 5 cyber attacks Don’t be distracted by the exploit of the week. Invest your time and money defending against the threats you’re apt to confront. As a consultant, one of the biggest security problems I see is perception: The threats companies think they face are often vastly different than the threats that pose the greatest… Continue reading.

article thumbnail

Fifteen years after Moscow theatre siege, questions still remain 

Crisis Response Journal

This week marks the 15th anniversary of the Moscow Dubrovka theatre siege, where hundreds of people died during rescue operations after a group of terrorists stormed a theatre and took more than 900 people hostage.

100
100
article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.