October, 2017

article thumbnail

Fifteen years after Moscow theatre siege, questions still remainĀ 

Crisis Response Journal

This week marks the 15th anniversary of the Moscow Dubrovka theatre siege, where hundreds of people died during rescue operations after a group of terrorists stormed a theatre and took more than 900 people hostage.

100
100
article thumbnail

Beyond GDPR: Data protection as a competitive advantage

Behavior Group

Data protection, GDPR advantage A new McAfee report shows that 48 percent of organizations will migrate their data to a new location because of regulations like GDPR. A similar amount will migrate their data because of changing geopolitics or the approach to relevant policies in the United States. Seventy percent of respondents believe the implementation… Continue reading.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why You Canā€™t Just Send an Email

Alert Media

The post Why You Canā€™t Just Send an Email appeared first on AlertMedia.

article thumbnail

Equifax UK ā€“ How not to manage the communications of a cyber breach

Plan B Consulting

Raising awareness for European Cyber Security Month, Charlie looks at the Equifax data hack, as an example of how cyber security incidents should not be handled. One of the things I noticed during my research when developing BC Trainingā€™s Managing and Preparing for Cyber Incidents course , was the lack of guidance on how to respond to a cyber incident.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What Youā€™ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

Humanitarian aid: Itā€™s a matter of trustĀ 

Crisis Response Journal

When the need for ever-greater humanitarian action is required in so many parts of the world, is interest in helping others increasingly reticent?

100
100

More Trending

article thumbnail

Accessible radiation detectionĀ 

Crisis Response Journal

Radiation is constantly being emitted into the environment. There are two main types of radiation: non-ionizing and ionizing. Non-ionizing radiation includes visible light, microwaves and radio frequency.

100
100
article thumbnail

6 Best Practices that Reduce Third-Party Cybersecurity Risk

Behavior Group

Reduce Third-Party Cybersecurity Risk, cybersecurity risk Cybersecurity threats are increasingly sophisticated and targeted. Hackers who want your information or want to disrupt your operations are looking for any way into your network. In an interconnected world, these hackers are increasingly looking to an organizationā€™s supply chain partners, especially those with network access but without effective… Continue reading.

article thumbnail

Why wait to be breached? Three reasons to secure your data now

Behavior Group

secure your data, iso 27001 training, information security training ā€œIā€™m working on it.ā€ ā€œWe donā€™t have room in this yearā€™s budget.ā€ ā€œSomething else more important came up.ā€ ā€œWell, weā€™ve not been breached beforeā€¦ā€ ā€œThe risk of it happening is so small and itā€™s hard to quantifyā€¦ā€ These are some of the most common excuses companies… Continue reading.

article thumbnail

Information Security Management System auditors welcome ISO/IEC 27007 publication

Behavior Group

ISO/IEC 27007, Information technology, ISO 27001, ISO 27007 To continue providing us with the products and services that we expect, businesses will handle increasingly large amounts of data. The security of this information is a major concern to consumers and companies alike fuelled by a number of high-profile cyberattacks. The havoc caused by such attacks… Continue reading.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

5 Basic Rules to Build an Effective Security Awareness Program

Behavior Group

Security Awareness Program The Battle of Thermopylae, also known as ā€œThe Hot Gates,ā€ fought in 480 B.C. is often put in the context that 300 Spartans held off a huge Persian army. In reality, the 300 Spartans were not alone during the battle. Alongside of them fought Athenians, Thebes, Thespians, and a variety of other… Continue reading. The post 5 Basic Rules to Build an Effective Security Awareness Program appeared first on Behaviour Portugal.

article thumbnail

The city of the future will be shaped by standards

Behavior Group

city of the future, world standard, world smart city Smart cities are more than just a buzzword. With expanding urban areas expected to host up to 70 % of the total world population by 2050, they are a necessity. ā€œStandards make cities smarterā€ is the theme of World Standards Day 2017, celebrated on 14 October… Continue reading. The post The city of the future will be shaped by standards appeared first on Behaviour Portugal.

52
article thumbnail

Equifax UK ā€“ How not to manage the communications of a cyber breach

Plan B Consulting

Raising awareness for European Cyber Security Month, Charlie looks at the Equifax data hack, as an example of how cyber security incidents should not be handled. One of the things I noticed during my research when developing BC Trainingā€™s Managing and Preparing for Cyber Incidents course , was the lack of guidance on how to respond to a cyber incident.

article thumbnail

The changing role of the Chief Information Officer CIO

Behavior Group

Chief Information Officer, cio Digitalization and technological innovation are changing the nature of the job of the CIO. Leaders are rapidly scaling their digital businesses, making the remainder of this year and 2018 a defining moment for CIOs who donā€™t want to be left behind. The 2018 CIO Agenda Survey gathered data from a record… Continue reading.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

5 Cybersecurity Vulnerabilities That People Still Forget About

Behavior Group

Cybersecurity Vulnerabilities People are cautious of physical theft, but the security of digital assets is often ignored. The simplest actions can have devastating consequences for your data security. Outdated software, weak credentials, and malware all create opportunities for data exfiltration. Studies show that many users believe they wonā€™t be targeted by hackers and arenā€™t aware… Continue reading.

article thumbnail

The global impact of huge cyber security events

Behavior Group

cyber security events The past 12 months have seen a number of unprecedented cyber-attacks in terms of their global scale, impact and rate of spread. Already causing widespread public concern, these attacks only represent a small sample of the wide array of cyber threats we now face. Europolā€™s Executive Director Rob Wainwright: ā€œThe global impact… Continue reading.

article thumbnail

Salary Survey Extra: Deep Focus on ISACA CRISC

Behavior Group

isaca crisc, crisc, crisc training, crisc certification, Certified in Risk and Information Systems Control Professional training, Certified in Risk and Information Systems Control Professional certification Risky business used to be a Tom Cruise movie from the ā€™80s, but in 2017 itā€™s a pretty fair description of the just about any commercial endeavor.

article thumbnail

Improving cybersecurity governance in the boardroom

Behavior Group

cybersecurity governance To tackle increasing data threats, companies need to put cybersecurity at the very heart of the business. The risk landscape for corporations is constantly changing with new threats, regulations, and evolving cybersecurity vulnerabilities and attack methods. The recently disclosed Equifax data breach is the latest high-profile event that has stirred senior executives and… Continue reading.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: youā€™ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect thereā€™s something going on that training canā€™t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Earn CISM, CISA, CEH, CCISO & CISSP cybersecurity certifications with preparation trainings

Behavior Group

CISM, CISA, CEH, CCISO & CISSP Become a cybersecurity professional without going back to school. With [these training courses], learn best practices and the groundwork to help you pass the CISM, CISA, CEH, CCISO & CISSP certification exams. Demand for high-quality cybersecurity professionals has never been higher, especially in light of the influx of high… Continue reading.

article thumbnail

A beginnerā€™s guide to cyber securityā€™ webinar

Plan B Consulting

Thank you to Sadia Anwar for delivering this month’s webinar, giving us an insight into cyber security and helping raise awareness, as part of European Cyber Security Month. We hope you all enjoyed the webinar as much as we did. If you missed the webinar, you can view the recording by clicking on the YouTube video below. Details about our next webinar will be released in due course.

article thumbnail

A beginnerā€™s guide to cyber securityā€™ webinar

Plan B Consulting

Thank you to Sadia Anwar for delivering this month’s webinar, giving us an insight into cyber security and helping raise awareness, as part of European Cyber Security Month. We hope you all enjoyed the webinar as much as we did. If you missed the webinar, you can view the recording by clicking on the YouTube video below. Details about our next webinar will be released in due course.

article thumbnail

The 5 cyber attacks youā€™re most likely to face

Behavior Group

The 5 cyber attacks Don’t be distracted by the exploit of the week. Invest your time and money defending against the threats you’re apt to confront. As a consultant, one of the biggest security problems I see is perception: The threats companies think they face are often vastly different than the threats that pose the greatest… Continue reading.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Weā€™ve all been there. Youā€™ve been given a pile of dry content and asked to create a compelling eLearning course. Youā€™re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this ā€œboringā€ content and create something relevant and engaging? Many instructional designers will say, ā€œBoring in means boring out.