This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
There are earthquake risks in about every corner of the United States. This podcast looks at earthquakes in Western Washington State. Bill Steele, Director of Communications and Outreach at University of Washington, Pacific Northwest Seismic Network is interviewed. In addition to talking about plate tectonics and the three different types of earthquakes the region is subject to, there is a discussion about the most recent work to institute a ShakeAlert System here in Washington State.
A special guest blog from emergency preparedness and disaster survival author, Virginia Nicols. Make sure it doesn’t happen this way in your community. On October 26, 2020, over a period of. The post Near-Evacuation Reveals Dangerous Gaps in Communications for Senior Community appeared first on DisasterDoc.
Solve BCP Headaches. Welcome to the third and final installment of our series on how Shield can solve BCP headaches. Last time we talked about how Shield helps the newcomer to Business Continuity get started on the plan development process. Today we’ll look at challenges that can come up after you finally have that plan written. Headache #1: Updating contact information is so time consuming!
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
Never Ignore Backup and Disaster Recovery. Experts estimate that humans produce 2.5 quintillion bytes of data every day. That is a lot of information. However, having a poor backup strategy can wipe out all or vast portions of your data in a single click. From accidental deletions and malicious attacks to natural disasters, there are multiple ways by which you can lose your business data.
Despite recent volatility, more than 60% of risk executives surveyed in a recent PwC US Pulse Survey were optimistic about the global economy, as well as the state of the pandemic recovery. This optimism could stem from a greater alignment between risk functions and the business. Fifty percent of risk management executives reported interacting more with the C-suite, and 42% said they interact more with the board level.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Despite recent volatility, more than 60% of risk executives surveyed in a recent PwC US Pulse Survey were optimistic about the global economy, as well as the state of the pandemic recovery. This optimism could stem from a greater alignment between risk functions and the business. Fifty percent of risk management executives reported interacting more with the C-suite, and 42% said they interact more with the board level.
Of all the many ways IT organizations are measured, maximizing uptime has to be one of the most important. After all, if employees and customers can’t access mission-critical systems, none of the rest of what IT does really matters. In […]. The post The Path to Maximum Data Center Uptime appeared first on TierPoint.
There are two kinds of risk assessment. In today’s blog we’ll look at what they are and why your company would benefit from performing one of each type, once every year. The Two Types of Risk Assessment A lot of people who come to the blog are looking for basic information on risk assessment as […]. The post Calculated Risk: The Two Kinds of Risk Assessment appeared first on BCMMETRICS.
ISC West 2021 is coming up July 19-21 in Las Vegas, and the Security Industry Association (SIA) and ISC West recently revealed full conference details for the SIA Education@ISC West program, including keynote presentations from top luminaries and 65+ sessions on the most current business trends, technologies and industry developments. Among the robust lineup of conference sessions are several dynamic presentations that will help security integration businesses succeed.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
While both data warehouses and lakes are big data storage solutions, they are useful in distinctly different situations. Data warehouses store structured data that can be accessed and interpreted by anyone with permission to do so, whereas a data lake is an unstructured storage space for large quantities of raw data.
FOR IMMEDIATE RELEASE : June 7, 2021. Gilmore Services, an i-SIGMA Associate member, and a data and document security company based out of Pensacola, Florida, has rebranded itself to honor the legacy of its founder, Jim Gilmore, who started the company in 1955 on the foundations of building relationships with customers, employees, and the community.
Tired of BCP Headaches? We hope you enjoyed Part 1 on how KingsBridge Shield can solve some of your Business Continuity Planning (BCP) information security headaches. Part 2 of our series focuses on how Shield can cure the headaches of anyone starting BCP. Let’s start with a common problem: management assigned you the responsibility of heading up the company’s BCP program but you don’t know where to begin.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
What Is ESG? [Complete Guide]. Introduction. “ESG” is a term that’s been making headlines over the past year in the midst of today’s rapidly evolving federal and state requirements and our continuously disruptive environment. So what exactly is ESG, what does your organization need to do to be compliant with ESG best practices, and how can you close gaps in your program to become more aligned with ESG?
It is not just the responsibility of the IT/IS department to keep the business safe, but the obligation of every CXO and Board member to ask for and implement stringent cyber security measures starting with zero trust, perimeter security, and employee training. The post 5 Reasons Ransomware Protection Needs to Be a Board-Level Conversation appeared first on Cloudian.
(This blog is provided for perspective only and not to be taken as legal advice). As I often remind service providers, though i-SIGMA certifications (NAID AAA/PRISM Privacy+) require drug screening prior to hiring, and either ongoing drug screening or training to recognize substance abuse, the certifications themselves do not prescribe how service providers respond to the results of those screens.
Tired of BCP Headaches? Nobody likes a headache, especially a BCP headache. Welcome to the first in our three-part series on BCP headaches and how you can use the KingsBridge Shield solution to resolve them. Today “ BCP plan access ” is the focus.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
New Security Industry Association (SIA) member Openpath is a leader in touchless, modern access control and workplace safety automation. The company is headquartered in Culver City, California, with an additional office in Fishers, Indiana, and more than 750,000 users globally. SIA spoke with James Segil, president and co-founder of Openpath, about the company, the security industry and working with SIA.
For many CISOs, overseeing identity management represents a significant challenge and a substantial component of their broader security ecosystem. In a nod to its importance, the National Cyber Security Alliance even recently kicked off the first ever Identity Management Day. It is also central to a number of critical issues that urgently need a CISO’s attention, namely data access governance, data loss prevention and cloud application security.
We must have the courage to bring our true selves to our interactions. Sometimes, that means being a less-rehearsed, less-polished version of ourselves. Being more transparent and vulnerable in this crucial way helps us to earn trust; we become more relatable by allowing stakeholders to really see us and connect with us. As we strive to be better leaders, we must learn to evolve to be our best selves.
Cyber attackers know organizations of all sizes have made a lot of operational changes because of the coronavirus pandemic, and they’re taking full advantage of them as new cyber attack vectors. Just a few weeks after much of the U.S. southeast experienced gas shortages following a hack of the Colonial Pipeline, attackers were at it again, this time targeting the world’s largest meat production facility, JBS , which resulted in the shutdown of its five largest U.S. plants and other plants in Aus
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
SILVER SPRING, Md. – On June 8, the Baltimore City Council voted 13-2 to approve what would be the most extreme ban by a local jurisdiction on personal and business applications of facial recognition technology. While the Security Industry Association (SIA) supports a related measure introduced in the Council today to establish a task force to examine the technology and make legislative recommendations, we agree with Councilmember Yitzy Schleifer, who stated during the vote that “this is backwar
READ TIME: 4 MIN June 9, 2021 3 Ways Energy & Utility Companies Can Increase IT Security Now Youve seen the panic in the news; youve experienced the fuel shortages at the gas station; youve lit your darkened home with flashlights and candles when the power failssometimes for days. The health and security of your energy companys IT systems and network infrastructure do not just impact your bottom line, but the lives of millionsor billionsof people.
We must have the courage to bring our true selves to our interactions. Sometimes, that means being a less-rehearsed, less-polished version of ourselves. Being more transparent and vulnerable in this crucial way helps us to earn trust; we become more relatable by allowing stakeholders to really see us and connect with us. As we strive to be better leaders, we must learn to evolve to be our best selves.
The bipartisan bill promotes U.S. leadership in technological advancements, including biometrics, artificial intelligence and robotics. SILVER SPRING, Md. – The Security Industry Association (SIA) commends the U.S. Senate for its passage of the U.S. Innovation and Competition Act (S. 1260), which significantly increases investment in research and development, education and training, supply chain security and the broader U.S. innovation ecosystem.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content