This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Anastasia Kyriacou speaks to the founder of a small charity, The Butterfly Tree, explains why its malaria prevention programme is so effective in the areas it has been implemented.
For the first episode of the second season of The BCPcast our guest is Alastair Lee. Alastair is one of the few people we spoke to who took an academic route to business continuity, and he’s had a varied career as a result, including roles at Essex County Council, The Guardian and Virgin Media. For the first episode of the second season of The BCPcast our guest is Alastair Lee.
email security In today’s hyper-connected world, email is the foundation of every organization’s collaboration, productivity, and character. And despite annual rumors of its demise, there’s no reason to believe we’ll be writing its eulogy anytime soon. With its ubiquity and universal appeal, email is a treasure trove of sensitive business information.
This week Charlie looks at the H&M hoodie scandal and outlines the lessons BC professionals can take from the incident. I didn’t hear about the H&M crisis until recently, so I thought for this week’s bulletin I would share my thoughts on what we can learn from the incident. On 7th January, H&M put up a new item of clothing on their website.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
Disaster recovery in the cloud is a hot topic for many organizations. Read why organizations are inquiring about using the cloud for disaster recovery.
Wildfires tearing across Southern California have forced thousands of residents to evacuate from their homes. Even more people fled ahead of the hurricanes that slammed into Texas and Florida earlier this year, jamming highways and filling hotels.
100
100
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Wildfires tearing across Southern California have forced thousands of residents to evacuate from their homes. Even more people fled ahead of the hurricanes that slammed into Texas and Florida earlier this year, jamming highways and filling hotels.
This week Charlie looks at the H&M hoodie scandal and outlines the lessons BC professionals can take from the incident. I didn’t hear about the H&M crisis until recently, so I thought for this week’s bulletin I would share my thoughts on what we can learn from the incident. On 7th January, H&M put up a new item of clothing on their website.
This week Charlie looks at the ways in which cyber and “normal” incidents are different and why these differences may affect how the incident is managed. Over the last ten days, I have run both a one and a two day Managing and Preparing for Cyber Incidents training course and, as a result, I am in the cyber incident management “zone” So, this week I thought I would share some feedback from the classes on what they thought were the differences between managing a cyber inci
This week Charlie looks at the ways in which cyber and “normal” incidents are different and why these differences may affect how the incident is managed. Over the last ten days, I have run both a one and a two day Managing and Preparing for Cyber Incidents training course and, as a result, I am in the cyber incident management “zone” So, this week I thought I would share some feedback from the classes on what they thought were the differences between managing a cyber inci
This week Charlie shares his thoughts on ‘The Ultimate Business Continuity Success Guide’ by Marty Fox. I am always happy to review a new business continuity book, especially a physical version, for no other reason than to have another BC book to add to my bookshelf! When Marty Fox asked me to review his new book and offered to send me a copy from the USA, how could I resist!
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
This week Charlie shares his thoughts on ‘The Ultimate Business Continuity Success Guide’ by Marty Fox. I am always happy to review a new business continuity book, especially a physical version, for no other reason than to have another BC book to add to my bookshelf! When Marty Fox asked me to review his new book and offered to send me a copy from the USA, how could I resist!
The Worst Passwords For the second year in a row, “123456” remained the worst password. The list was put together by SplashData, a company that provides various password management utilities that it compiled the list by analyzing more than five million user records leaked online in 2017. In its 2017’s Worst Passwords of the Year list,… Continue reading.
NIST Cybersecurity Framework into Reality The first version of the National Institute of Standards and Technology’s Cybersecurity Framework (NIST CSF) was published in 2014 to provide guidance for organizations looking to bolster their cybersecurity defenses. It was created by cybersecurity professionals from government, academia and various industries at the behest of President Obama and later… Continue reading.
Plan for Cyberattacks Ransomware and attacks that originate from nation-states are forcing companies to reappraise their cyber risks. Cybersecurity breaches have become almost a dime a dozen and show no signs of slowing down. Some companies know they are in the crosshairs of the best cybercriminals in the world. Here are some questions for your… Continue reading.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
Security Certifications At the recent RSA Conference USA 2017, Firemon completed a survey whose results were interesting and are summarized below: 70% of respondents would rather have smarter people than better products. 93% thought experience is more important than qualifications. 72% said it did not matter if their staff were graduates. That’s great news, right?
gdpr, gdpr training, gdpr certification With the GDPR deadline looming on May 25, 2018, every organization in the world that transmits data related to EU citizens is focused on achieving compliance. And for good reason. The ruling carries the most serious financial consequences of any privacy law to date – the greater of 20 million… Continue reading.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content