This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
1. What are, and have been, the key challenges in coping with the Covid-19 pandemic? The first challenge is to understand the behaviour of an emerging disease caused by a new variant of a virus. This concerns its infectiousness, mode of transmission, lethality, symptoms and effects, mutation, longevity on various kinds of surface, and so on. Information on these characteristics takes a long time to assemble, as at the start the virus is new and unknown, its relationship with the host population
Intelligence from the SolarWinds Cyberattack, which is being called Sunburst, continues to come to light as security professionals around the globe are trying to understand what happened and what the risk is to them and their clients. With many of the answers likely to take months or longer to fully understand the scope of the attack here. Reuters talked to the security researcher Vinoth Kumar whom reportedly alerted SolarWinds back in 2019 that anyone could access the company’s update server u
The coronavirus pandemic forced businesses and governments to close their physical office spaces and have people begin working from their homes, with little or no planning or preparation for this momentous change in how teams function. Betty Lochner, M.Ed., SPHR, CEO of Corner Stone Coaching and Training is the expert guest. In this podcast she shares 7 Tips for Leading Virtual Teams, a great resource for managers and supervisors who were thrust into this virtual role with no training being furn
Business Continuity Policy Template This template helps you define your business continuity program and associated objectives, including roles and responsibilities. Download Crisis Management Plan Template This template guides you through the development of a management decision-making framework necessary to coordinate response activities following the onset of a disruptive incident.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
Episode Summary: Gamification is the application of game-design elements and game principles in non-game contexts. Today on the podcast, we’re talking with James MacDonnell - Director, Crisis Management and Business Continuity at BDO USA. James is a risk management, business continuity, and crisis management professional with more than 18 years of experience helping Fortune 100 clients and federal agencies prepare for and respond to crises and emerging risks.
The post Employee Safety for All: Introducing Our New Website appeared first on AlertMedia.
52
52
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Crisis Comms isn’t just for cyber and cyber is much bigger than comms. But in the Venn diagram of Business Continuity topics, there’s a lot of overlap on these two. Crisis Comms isn’t just for cyber and cyber is much bigger than comms. But in the Venn diagram of Business Continuity topics, there’s a lot of overlap on these two.
Business Continuity Policy Template. This template helps you define your business continuity program and associated objectives, including roles and responsibilities. Download. Crisis Management Plan Template. This template guides you through the development of a management decision-making framework necessary to coordinate response activities following the onset of a disruptive incident.
It’s simple – you can’t secure what you can’t see or don’t know about./strong> challenges, cloud, security In this interview, Badri Raghunathan, Director of Product Management for Container and Serverless Security at Qualys, talks about cloud security, and their approach for enabling global CISOs to focus on what’s most important. What are the main challenges… Continue reading.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
This week I share some key learning points on ransomware negotiation. This week I am going to share with you what I learned from speaking to Mike Fowler, VP of Intelligence Services at GroupSense , a specialist cyber response company. One of the services they offer is ransomware negotiation and I thought in this bulletin I would share what a ransomware negotiation is and some key learning points from the many responses he has been involved in.
When you think of Authentic Leadership Teddy Roosevelt is one man that comes to mind. Authentic is not asking people to do more with less. Saying you understand the pain. Or telling people that they have to roll up their sleeves and pull up their bootstraps. Authentic leaders ask one question, How can I help you be better. The Authentic Leader is a servant Leader.
This is my last bulletin of the year so I thought I would share some ideas with you about a subject I have been thinking about a lot. In line with last week’s bulletin, ‘Is the response to COVID-19 a business continuity issue’ I have stopped thinking about our response to the existing pandemic and have moved my thoughts to the impact of COVID-19 on the future of business continuity.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
Is it time for Business Continuity Managers to step away from the COVID-19 response? I share by thoughts on how organisations should move forward in dealing with the virus. I have been thinking about the response to COVID-19 for a while, especially as we have been conducting a number of debriefs on the incident for different organisations. The initial and obvious answer is yes, it is a business continuity issue and probably the largest incident most business continuity professionals will face in
This week I share some key learning points on ransomware negotiation. This week I am going to share with you what I learned from speaking to Mike Fowler, VP of Intelligence Services at GroupSense , a specialist cyber response company. One of the services they offer is ransomware negotiation and I thought in this bulletin I would share what a ransomware negotiation is and some key learning points from the many responses he has been involved in.
This is my last bulletin of the year so I thought I would share some ideas with you about a subject I have been thinking about a lot. In line with last week’s bulletin, ‘Is the response to COVID-19 a business continuity issue’ I have stopped thinking about our response to the existing pandemic and have moved my thoughts to the impact of COVID-19 on the future of business continuity.
Is it time for Business Continuity Managers to step away from the COVID-19 response? I share by thoughts on how organisations should move forward in dealing with the virus. I have been thinking about the response to COVID-19 for a while, especially as we have been conducting a number of debriefs on the incident for different organisations. The initial and obvious answer is yes, it is a business continuity issue and probably the largest incident most business continuity professionals will face in
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
When you think of Authentic Leadership Teddy Roosevelt is one man that comes to mind. Authentic is not asking people to do more with less. Saying you understand the pain. Or telling people that they have to roll up their sleeves and pull up their bootstraps. Authentic leaders ask one question, How can I help you be better. The Authentic Leader is a servant Leader.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content