August, 2018

article thumbnail

Human performance: Take note of error precursors 

Crisis Response Journal

Welcome to the fifth blog in our Human Performance series and thank you for the feedback to the fourthblog in this series (if you have missed my previous blogs, you can catch up here).

100
100
article thumbnail

Writing Incident Management Objectives

Plan B Consulting

This week, Charlie shares some advice on how to write incident management objectives. For this week’s bulletin, instead of commenting on an item in the news, I thought I would share some technical information on how to write incident objectives. During an incident, it is seemingly obvious that your objective is to solve the problem and return the organisation back to normal as quickly as possible.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to allocate budget for a well-rounded cybersecurity portfolio

Behavior Group

Getting the C-levels to approve an IT security budget is probably one of the most difficult and exasperating tasks that security professionals and IT managers have to do each year. cybersecurity portfolio, endpoint detection and response, malware protection Information security doesn’t contribute directly to the bottom line in most companies and management often views it… Continue reading.

article thumbnail

Creating a Duty of Care Policy

Alert Media

The post Creating a Duty of Care Policy appeared first on AlertMedia.

article thumbnail

Are Robots Replacing You? Keeping Humans in the Loop in Automated Environments

Speaker: Erroll Amacker

As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R

article thumbnail

The Sudden spring of Delhi

arunpraka shray

15 August 2018. 07:48. It’s been ages since I have listened to a Mehfil e Sama at Hazrat Nizamuddin Auliya’s royal courtyard in Delhi. Yesterday was my long awaited meeting with my friend & author Meher Murshed , his nine years of research has resulted into ‘Song of the Dervish’, a bloomsbury gem. Almost three years back I had heard Fareed Ayaz Saab in the same courtyard at a short recital hosted by Peerzada Altamash Nizami .

More Trending

article thumbnail

Not just for special forces training - centre has great civilian services potential 

Crisis Response Journal

Editorial Advisory Panel Member Rob McAlister takes an inside look at Jordan's special forces training centre.

100
100
article thumbnail

Writing Incident Management Objectives

Plan B Consulting

This week, Charlie shares some advice on how to write incident management objectives. For this week’s bulletin, instead of commenting on an item in the news, I thought I would share some technical information on how to write incident objectives. During an incident, it is seemingly obvious that your objective is to solve the problem and return the organisation back to normal as quickly as possible.

article thumbnail

Not enough CISOs and business leaders cooperate on a cybersecurity plan and budget

Behavior Group

With the proliferation of more and more sensitive data, expanding connectivity, and the adoption of automated processes, new research from Accenture reveals that C-suite and IT decision makers need to embrace a different approach to cybersecurity to effectively protect against future cyber risks. cybersecurity plan and budget, cybersecurity strategy While most companies have a CISO or assigned… Continue reading.

article thumbnail

3 Post-Hurricane Safety Precautions for Facility Managers

Alert Media

The post 3 Post-Hurricane Safety Precautions for Facility Managers appeared first on AlertMedia.

article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

eBIA – The eBRP Way

eBRP

Definition: A Business Impact Analysis (BIA) is the cornerstone of creating a BCM program. Basically, a BIA helps prioritize restoration efforts in the initial response activities following an operational disruption. A secondary objective of a BIA is identification of all operational dependencies to enable successful business restoration.

article thumbnail

Disaster Recovery You'll Want to Use

VOX Veritas

Failure happens. There is nothing you can do to stop it. Disaster recovery only helps after something bad happens. Resiliency Platform's full automation and orchestration identifies risks to protect against disruptions as well as automates recovery when disruption still occurs.

article thumbnail

A world at your fingertips – developing your career through online learning 

Crisis Response Journal

In the first instalment of my blog on free international training and education to develop your careers, I highlighted the flagship of emergency management distance learning from the United States - the Emergency Management Institute.

Education 100
article thumbnail

Extreme Business Continuity – Lessons from Hurricane Maria

Plan B Consulting

Reflecting on his time in Puerto Rico, Charlie shares what he learned from the experiences of those impacted by the events of Hurricane Maria. This week I have been delivering training and exercises in Puerto Rico, whilst learning from the experiences of those who were involved in Hurricane Maria. For this bulletin, I thought I would share some of the human experiences and what I learned from interviewing a number of those impacted by the hurricane.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Why information security need to be empowered to manage data breaches

Behavior Group

2017 saw over 2 dozen major security breaches in 2017. While the public may have grown numb to the number and constant stream of data breaches reported, outrage has been building around the delays in accompanying disclosures of those breaches and questionable actions that have occurred in between when a data breach has occurred and… Continue reading.

article thumbnail

5 Steps To The Best Emergency Notification Software Implementation

Alert Media

The post 5 Steps To The Best Emergency Notification Software Implementation appeared first on AlertMedia.

article thumbnail

The importance of record keeping and the pocket notebook in emergency incidents 

Crisis Response Journal

The police are used to keeping records and use notebooks at incidents as a matter of routine, but not so other emergency responding services, according to Jon Chapman, who takes a short look at record keeping at and around incidents, and why this is so vi By Jon Chapman

100
100
article thumbnail

Victims of a ‘victimless’ crime 

Crisis Response Journal

Last May, the body of a murdered man was found in a warehouse in the neighborhood of Tepito in Mexico City.

100
100
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Innovation in healthcare: A hacker’s dream and CISO’s nightmare ?

Behavior Group

It’s hard not to be excited about artificial intelligence and machine learning in pure technology terms, but applying these innovations to the healthcare sector has the potential to do truly great things for humanity. Just imagine if these technologies could help us to diagnose and treat some of the world’s most pressing health crises. Innovation… Continue reading.

article thumbnail

New insider attack steals passwords by reading thermal energy from keyboards

Behavior Group

After entering a password, your regular computer keyboard might appear to look the same as always, but a new approach harvesting thermal energy can illuminate the recently pressed keys, revealing that keyboard-based password entry is even less secure than previously thought. steals passwords,thermal energy from keyboards Computer Science Ph.D. students Tyler Kaczmarek and Ercan Ozturk… Continue reading.

article thumbnail

Has your security evolved to counter Ocean’s Eleven of threat scenarios?

Behavior Group

In assessing how the cyber threat and mitigation landscape has evolved over time, I often think of the ways that “cops and robbers” movies have changed: In the old days, a typical scene would feature a bad guy walking into a bank with a note indicating that he had a gun, and that he wanted… Continue reading. The post Has your security evolved to counter Ocean’s Eleven of threat scenarios?

article thumbnail

Full vs. Partial Coverage of Your Data

VOX Veritas

Friday, August 10 th is your opportunity to learn more and see a live demo of Veritas Resiliency Platform. Tune into the live stream of Cloud Field Day 4 ( #CFD4 ) at 11 am pacific and see how software defined resilience can benefit your organization.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

Extreme Business Continuity – Lessons from Hurricane Maria

Plan B Consulting

Reflecting on his time in Puerto Rico, Charlie shares what he learned from the experiences of those impacted by the events of Hurricane Maria. This week I have been delivering training and exercises in Puerto Rico, whilst learning from the experiences of those who were involved in Hurricane Maria. For this bulletin, I thought I would share some of the human experiences and what I learned from interviewing a number of those impacted by the hurricane.

article thumbnail

Cloud migration can be hard, Veritas helps make it easy

VOX Veritas

Myth: Cloud migration is too complex. The truth is, Veritas can make it easy! Get clear on cloud and #TransformYourBiz.

40
article thumbnail

Deal or No Deal

Plan B Consulting

This week Charlie looks at Brexit and the role of the business continuity manager. At lunchtime yesterday, I asked everyone in the office whether there was a specific subject I should be writing this bulletin on. There weren’t any sensible suggestions this week! Whilst packing up to go home, I put the radio on and it became clear what I should talk about; contingency planning for a Brexit ‘no deal’.

article thumbnail

Deal or No Deal

Plan B Consulting

This week Charlie looks at Brexit and the role of the business continuity manager. At lunchtime yesterday, I asked everyone in the office whether there was a specific subject I should be writing this bulletin on. There weren’t any sensible suggestions this week! Whilst packing up to go home, I put the radio on and it became clear what I should talk about; contingency planning for a Brexit ‘no deal’.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!