October, 2017

article thumbnail

Fifteen years after Moscow theatre siege, questions still remain 

Crisis Response Journal

This week marks the 15th anniversary of the Moscow Dubrovka theatre siege, where hundreds of people died during rescue operations after a group of terrorists stormed a theatre and took more than 900 people hostage.

100
100
article thumbnail

Beyond GDPR: Data protection as a competitive advantage

Behavior Group

Data protection, GDPR advantage A new McAfee report shows that 48 percent of organizations will migrate their data to a new location because of regulations like GDPR. A similar amount will migrate their data because of changing geopolitics or the approach to relevant policies in the United States. Seventy percent of respondents believe the implementation… Continue reading.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Equifax UK – How not to manage the communications of a cyber breach

Plan B Consulting

Raising awareness for European Cyber Security Month, Charlie looks at the Equifax data hack, as an example of how cyber security incidents should not be handled. One of the things I noticed during my research when developing BC Training’s Managing and Preparing for Cyber Incidents course , was the lack of guidance on how to respond to a cyber incident.

article thumbnail

Why You Can’t Just Send an Email

Alert Media

The post Why You Can’t Just Send an Email appeared first on AlertMedia.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Telephone terrorism continues to target Russian towns and cities 

Crisis Response Journal

Some Russian cities have been near-paralysed after being targeted by repeated, simultaneous mass bomb threats phoned through to police and emergency services, reports Lina Kolesnikova, who says that hackers are thought to be behind the attacks.

100
100

More Trending

article thumbnail

Humanitarian aid: It’s a matter of trust 

Crisis Response Journal

When the need for ever-greater humanitarian action is required in so many parts of the world, is interest in helping others increasingly reticent?

100
100
article thumbnail

6 Best Practices that Reduce Third-Party Cybersecurity Risk

Behavior Group

Reduce Third-Party Cybersecurity Risk, cybersecurity risk Cybersecurity threats are increasingly sophisticated and targeted. Hackers who want your information or want to disrupt your operations are looking for any way into your network. In an interconnected world, these hackers are increasingly looking to an organization’s supply chain partners, especially those with network access but without effective… Continue reading.

article thumbnail

Why wait to be breached? Three reasons to secure your data now

Behavior Group

secure your data, iso 27001 training, information security training “I’m working on it.” “We don’t have room in this year’s budget.” “Something else more important came up.” “Well, we’ve not been breached before…” “The risk of it happening is so small and it’s hard to quantify…” These are some of the most common excuses companies… Continue reading.

article thumbnail

Information Security Management System auditors welcome ISO/IEC 27007 publication

Behavior Group

ISO/IEC 27007, Information technology, ISO 27001, ISO 27007 To continue providing us with the products and services that we expect, businesses will handle increasingly large amounts of data. The security of this information is a major concern to consumers and companies alike fuelled by a number of high-profile cyberattacks. The havoc caused by such attacks… Continue reading.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

5 Basic Rules to Build an Effective Security Awareness Program

Behavior Group

Security Awareness Program The Battle of Thermopylae, also known as “The Hot Gates,” fought in 480 B.C. is often put in the context that 300 Spartans held off a huge Persian army. In reality, the 300 Spartans were not alone during the battle. Alongside of them fought Athenians, Thebes, Thespians, and a variety of other… Continue reading. The post 5 Basic Rules to Build an Effective Security Awareness Program appeared first on Behaviour Portugal.

article thumbnail

The city of the future will be shaped by standards

Behavior Group

city of the future, world standard, world smart city Smart cities are more than just a buzzword. With expanding urban areas expected to host up to 70 % of the total world population by 2050, they are a necessity. “Standards make cities smarter” is the theme of World Standards Day 2017, celebrated on 14 October… Continue reading. The post The city of the future will be shaped by standards appeared first on Behaviour Portugal.

52
article thumbnail

Equifax UK – How not to manage the communications of a cyber breach

Plan B Consulting

Raising awareness for European Cyber Security Month, Charlie looks at the Equifax data hack, as an example of how cyber security incidents should not be handled. One of the things I noticed during my research when developing BC Training’s Managing and Preparing for Cyber Incidents course , was the lack of guidance on how to respond to a cyber incident.

article thumbnail

The changing role of the Chief Information Officer CIO

Behavior Group

Chief Information Officer, cio Digitalization and technological innovation are changing the nature of the job of the CIO. Leaders are rapidly scaling their digital businesses, making the remainder of this year and 2018 a defining moment for CIOs who don’t want to be left behind. The 2018 CIO Agenda Survey gathered data from a record… Continue reading.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

5 Cybersecurity Vulnerabilities That People Still Forget About

Behavior Group

Cybersecurity Vulnerabilities People are cautious of physical theft, but the security of digital assets is often ignored. The simplest actions can have devastating consequences for your data security. Outdated software, weak credentials, and malware all create opportunities for data exfiltration. Studies show that many users believe they won’t be targeted by hackers and aren’t aware… Continue reading.

article thumbnail

The global impact of huge cyber security events

Behavior Group

cyber security events The past 12 months have seen a number of unprecedented cyber-attacks in terms of their global scale, impact and rate of spread. Already causing widespread public concern, these attacks only represent a small sample of the wide array of cyber threats we now face. Europol’s Executive Director Rob Wainwright: “The global impact… Continue reading.

article thumbnail

Salary Survey Extra: Deep Focus on ISACA CRISC

Behavior Group

isaca crisc, crisc, crisc training, crisc certification, Certified in Risk and Information Systems Control Professional training, Certified in Risk and Information Systems Control Professional certification Risky business used to be a Tom Cruise movie from the ’80s, but in 2017 it’s a pretty fair description of the just about any commercial endeavor.

article thumbnail

Improving cybersecurity governance in the boardroom

Behavior Group

cybersecurity governance To tackle increasing data threats, companies need to put cybersecurity at the very heart of the business. The risk landscape for corporations is constantly changing with new threats, regulations, and evolving cybersecurity vulnerabilities and attack methods. The recently disclosed Equifax data breach is the latest high-profile event that has stirred senior executives and… Continue reading.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Earn CISM, CISA, CEH, CCISO & CISSP cybersecurity certifications with preparation trainings

Behavior Group

CISM, CISA, CEH, CCISO & CISSP Become a cybersecurity professional without going back to school. With [these training courses], learn best practices and the groundwork to help you pass the CISM, CISA, CEH, CCISO & CISSP certification exams. Demand for high-quality cybersecurity professionals has never been higher, especially in light of the influx of high… Continue reading.

article thumbnail

A beginner’s guide to cyber security’ webinar

Plan B Consulting

Thank you to Sadia Anwar for delivering this month’s webinar, giving us an insight into cyber security and helping raise awareness, as part of European Cyber Security Month. We hope you all enjoyed the webinar as much as we did. If you missed the webinar, you can view the recording by clicking on the YouTube video below. Details about our next webinar will be released in due course.

article thumbnail

A beginner’s guide to cyber security’ webinar

Plan B Consulting

Thank you to Sadia Anwar for delivering this month’s webinar, giving us an insight into cyber security and helping raise awareness, as part of European Cyber Security Month. We hope you all enjoyed the webinar as much as we did. If you missed the webinar, you can view the recording by clicking on the YouTube video below. Details about our next webinar will be released in due course.

article thumbnail

The 5 cyber attacks you’re most likely to face

Behavior Group

The 5 cyber attacks Don’t be distracted by the exploit of the week. Invest your time and money defending against the threats you’re apt to confront. As a consultant, one of the biggest security problems I see is perception: The threats companies think they face are often vastly different than the threats that pose the greatest… Continue reading.

article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha