April, 2018

article thumbnail

Humanitarian assistance in West Africa 

Crisis Response Journal

Editorial Advisory Panel Member Brigadier General Alois Hirschmugl describes a recent course held in West Africa that aims to break down walls between civil society, the military and police, so as to encourage more co-operation in times of crisis and disa By Alois Hirschmugl

100
100
article thumbnail

How to Use Security to Drive Sales

Behavior Group

Security to Drive Sales Making information security a priority within an organization isn’t easy. Security is usually seen as a specialized technical function within the organization and often isn’t aligned with organizational strategy or even day-to-day business tactics. Instead, information security teams are often siloed from the effects of their decisions and hyper-focused on detection,… Continue reading.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Could GDPR Have Averted Facebook's Data Debacle?

Marketpoint Recall

Welcome to my monthly column series, Around the World , where we will explore what’s new in marketing and sales from a global perspective. This column will focus primarily on technology innovations and the impact they are making in helping companies achieve their growth objectives. Note: I intentionally include both marketing and sales innovations. The reason is most effective organizations employ collaborative marketing and sales teams who work together to achieve shared goals.

article thumbnail

S2, Episode 7 - John Robinson

The Business Continuity Podcast

Another returning favourite, John Robinson is a Business Continuity consultant and the Managing Director of Inoni. In this episode we look at the importance of the information flows in a crisis to determine escalation and guide decision making. Another returning favourite, John Robinson is a Business Continuity consultant and the Managing Director of Inoni.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

Don’t get hung up on the scenario when planning a business continuity exercise

Plan B Consulting

This week I look at the objectives, format and scenario of business continuity exercises, and I explain why scenarios are not the most important factor when planning an exercise. I have seen many a business continuity manager, both experienced and not so experienced, devising the most fiendish and clever scenario they can think of and working the entire exercise around that scenario.

More Trending

article thumbnail

The Tennis ball

arunpraka shray

‘Life is a balance of holding on & letting go’ ….one of those quintessential Rumi quotes. This was my ‘well thought over tagline’ to share on my forthcoming short talk on Sufism at a unique platform in Bangalore called Human Library, and I got shortlisted to play a human book waiting to be chosen by a reader, later this month. Yesterday being a Sunday, I just prepared my topic, with the quotes & anecdotes.

52
article thumbnail

GDPR And What It Means for Your Business

Behavior Group

GDPR, dpo, data protection Beginning May 25, 2018, a new law will greatly affect how adtech companies comply with the collection and processing of personal data. The law, the General Data Protection Regulation (GDPR), is actually a European Union law, but it could have far-reaching effects beyond European borders, as U.S.-based companies will have to… Continue reading.

article thumbnail

Crisis Management – Reduce impact on your brand

Marketpoint Recall

It’s all very well being told to 'keep calm and carry on' in the face of a crisis, but when it's your company involved, your team, stakeholders and customers will undoubtedly be stressed and concerned. It is likely that a plan of action will be needed immediately and a team to be sprung in to action to execute it, things will be getting tough for a while… Did you know there are ways you can reduce the negative effect a crisis can have on your brand and company?

article thumbnail

S2, Episode 6 - Katherine Corbishley

The Business Continuity Podcast

Katherine Corbishley is Business Continuity Supervisor at a large, global corporate law firm. We discuss her experience of dealing with power outages around the world and how prior experience in the hospitality industry has helped her as a continuity professional. Katherine Corbishley is Business Continuity Supervisor at a large, global corporate law firm.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Don’t get hung up on the scenario when planning a business continuity exercise

Plan B Consulting

This week I look at the objectives, format and scenario of business continuity exercises, and I explain why scenarios are not the most important factor when planning an exercise. I have seen many a business continuity manager, both experienced and not so experienced, devising the most fiendish and clever scenario they can think of and working the entire exercise around that scenario.

article thumbnail

OpenStack Summit Boston kicks off

VOX Veritas

I was at Red Hat Summit in Boston and am now here as another OpenStack Summit kicks off. The open source momentum seems to be continuing unabated. There was tremendous energy at the packed keynote with various users showcasing their projects. I am excited to talk to customers and participate in analyst discussions especially since we announced availability of our HyperScale for OpenStack offering today.

40
article thumbnail

The Certified Chief Information Security Officer (CCISO) program

Behavior Group

Certified Chief Information Security Officer, CISO The Certified CISO (CCISO) Program is an exclusive program designed to produce top-level information security leaders by focusing on both technical skills and information-security management strategies in accordance to the executive management’s goals. CCISO arms information security executives with the right weapons to prevent potential cyber-attacks from arising and… Continue reading.

article thumbnail

6 Ways for SMBs to Improve Security, with Little Security Expertise

Behavior Group

Improve Security, Little Security Expertise There is a children’s book, “Inside, Outside, Upside Down” featuring The Berenstain Bears, that teaches young children about spatial concepts. When it comes to securing your organization’s data, it may feel like you need to cover all of the spaces: inside, outside, and even upside down. It’s no wonder, since… Continue reading.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Cyber Risk Management. Approaching cybersecurity

Behavior Group

Cyber Risk Management Approaching cybersecurity first requires a thorough risk assessment. Completing that assessment is not as complicated as you might think. Cybersecurity is a hot topic in the industrial control system (ICS) world. What does cybersecurity mean to your organization and how do you implement proper cybersecurity? Determining how or what control an organization… Continue reading.

article thumbnail

Data Protection: Towards Data Disarmament

Behavior Group

Data protection, Data Disarmament Data is power, and we must restrict the amount of power we allow others to have over us. There’s a sense of fatalism about privacy these days: that it really doesn’t exist any more, and given the amount of data we generate, given the amount of data that devices are able… Continue reading. The post Data Protection: Towards Data Disarmament appeared first on Behaviour Portugal.

article thumbnail

The time is now to begin or expand on your container strategy

VOX Veritas

Today, Veritas enters the container storage ecosystem with the announcement of a new open source software solution that allows customers to package applications in “containers” for portability as well as gain predictable and consistent performance, through policies. Read the announcement!

article thumbnail

Confusion-Free Licensing for your SDS Needs

VOX Veritas

When Veritas Technologies, the benchmark in Software-Defined Storage solutions, updated the Storage Foundation Suite to the InfoScale Family, we adjusted our licensing options to simplify purchasing and deployment without sacrificing flexibility, selection options, and most importantly meeting your company’s compliance policies

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Announcing HyperScale for Openstack 1.1

VOX Veritas

It is an inmense pleasure to announce the availability of HyperScale for OpenStack version 1.1. HyperScale for OpenStack helps organizations realize the speed and economic benefits of deploying applications on OpenStack through predictable performance and storage quality of service (QoS).

article thumbnail

Tackling exabytes and zettabytes: Make your storage smarter

VOX Veritas

We’ve all heard about the growth in data—the explosions and tsunamis—the exabytes and zettabytes and yottabytes (oh my!). While this staggering rate and volume of data growth is impressive, what does it really mean? Read the blog.

40
article thumbnail

How do you make an appliance more than just an appliance

VOX Veritas

Veritas Technologies announced a new storage appliance—the Access 3340. Read why they're calling it the "Un-Appliance".

article thumbnail

Knowledge of Data is Vital to Regulatory Compliance

VOX Veritas

The clamor over the impending European Union (EU) General Data Protection Regulation (GDPR) has raised awareness of regulatory compliance to the boardroom level.

40
article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Software was eating the world but now it’s all about the information

VOX Veritas

Marc Andreessen wrote his software is eating the world article a few years ago and today it is likely that no one will take a contrary position. Indeed, that viewpoint has evolved further so that software is now programming the world. Improved chip economics are leading to unprecedented proliferation in devices capable of capturing ever more and diverse data.

40
article thumbnail

CEH, the new version for cybersecurity professionals

Behavior Group

CEH, certified ethical hacker Last week, EC-Council announced the creation of a new learning track to train and certify a new breed of well-rounded cybersecurity experts. Is there anybody out there who hasn’t heard the musty old joke about how the phrase “military intelligence” is a true oxymoron, or “a combination of contradictory or incongruous… Continue reading.