This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
By: John Cleary, Shareholder, and Kayleigh Shuler, Associate, Polsinelli PC , Tech Transactions and Data Privacy Practice Group. Recent years have seen companies large and small continue to grapple with the much-feared cyber incident. Yet surprisingly few have meaningful and up-to-date incident response plans (IRPs) in place to manage and mitigate this threat.
The need to achieve communications interoperability has haunted public agencies for years. The terrorist attacks of 9/11/2001 highlighted the need to improve the ability for public agencies from different jurisdictions to communicate with one another. Now today, Verizon has initiated an outreach to other companies, carriers, device makers, etc. to come together to jointly work on the issue of communications interoperability.
Laviano, Province of Avellino, 1984 Monday 23rd November 2020 at 19:34 and 52.8 seconds marked the fortieth anniversary of the 1980 southern Italian earthquake in which I was directly involved as a survivor. The magnitude 6.9 tremors killed 2,914 people and injured 8,848. About 280,000 people were left homeless (including myself) and damage was reported from 628 municipalities.
Major incidents involving the malicious use of drones has highlighted that tackling hostile drone threats is a priority, says Andrew Staniforth By Andrew Staniforth
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
Should your organization be considering this powerful tactic for building both influence and audience? Once you’ve been in this business long enough you can’t seem to avoid spotting crisis management lessons everywhere. While perusing the latest entertainment news and celeb gossip (give me a break on that one, it can’t be Fortune 500 and international intrigue all the time people), I was surprised to spot valuable insights in a Washington Post article about Katherine Heigl̵
Most businesses today rely heavily on their IT systems to access and store vital data that is needed to complete daily tasks. Computers, servers, files, communication tools, and more help modern enterprises stay connected with their clients and customers and enable their teams to advance towards corporate goals. But what happens when disaster strikes, and these crucial systems go down?
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Most businesses today rely heavily on their IT systems to access and store vital data that is needed to complete daily tasks. Computers, servers, files, communication tools, and more help modern enterprises stay connected with their clients and customers and enable their teams to advance towards corporate goals. But what happens when disaster strikes, and these crucial systems go down?
Severe thunderstorms can occur anywhere in the country. Whether you’re building a new home, remodeling, or preparing for severe weather, IBHS has science-backed tips to help. Prepare now and be Thunderstorm Ready. Prepare Your Home for Spring Thunderstorms (Tornadoes and Hail). Get prepared for spring storms with these steps to reduce damage to your home.
Ransomware attacks dominated the cybersecurity landscape in 2020 and will remain a top threat in 2021, posing major challenges for both public and private institutions. The UK’s National Cyber Security Centre recently reported that it handled more than three times as many ransomware incidents as in the previous year. New variations of attacks are always testing security defenses, including more sophisticated “phishing” schemes — taking advantage of human error or vulnerabilities by duping indivi
This week I discuss the importance of contingency planning. I try not to criticise the government In this bulletin I try not to criticise the government, firstly, as they are doing a difficult job under challenging circumstances and secondly, it is easy for commentators like myself to carp from the slide lines when I am not involved in the response and don’t have a detailed understanding of the task in hand.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
. Due to COVID-19, businesses may not be operating at a normal capacity. Some may still be vacant, while others are operating at a reduced capacity or with strict COVID protocols. Additionally, this winter is unlike any we have experienced before—there is now an increased risk of COVID transmission while a high percentage of the workforce is operating from remote locations.
2020 was a year of unprecedented disruption. The COVID-19 pandemic alone cost businesses millions in managing IT demands. And despite an overall acceleration toward digital transformation, a recent survey [1] found that 60% of corporate IT leaders still say their organizations are not prepared to meet future IT needs. IBM Managed Infrastructure Services surveyed 380 CIOs and CTOs in an effort to better understand how the roles within the c-suite have evolved, and how they are preparing their tea
This week I discuss the importance of contingency planning. I try not to criticise the government. In this bulletin I try not to criticise the government, firstly, as they are doing a difficult job under challenging circumstances and secondly, it is easy for commentators like myself to carp from the slide lines when I am not involved in the response and don’t have a detailed understanding of the task in hand.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
New research from ISACA reveals critical skills gaps and insufficient training. The survey report also explores past and future trends in privacy, offering insights into privacy workforce and skills, the use of privacy by design, and the organizational structure and composition of privacy teams. Privacy, activity Privacy by design Survey findings—gathered in Q3 2020 from… Continue reading.
Larger organizations tend to move more slowly — and be more change-resistant — than smaller, more nimble competitors. Much of this can be chalked up to deep-rooted cultural issues of being a larger incumbent, and to policy- and process-based barriers, as bureaucracy tends to flourish in broader corporate environments. Still, many larger organizations seek to capture the benefits of agile development, for which they may not be naturally suited.
Business continuity and disaster recovery (BCDR) plans need to keep pace with increasing business demands and growth in physical and compute infrastructures. For a hyperconnected digital business, even a small disruptive event can ripple through the entire organization. Today most businesses have BCDR plans. But do these plans deliver operational resilience during the moment of truth?
Over the last decade, California has experienced increased, intense, and record-breaking wildfires in Northern and Southern California. These fires have resulted in a devastating loss of life and billions of dollars in damage to property and infrastructure. Electric utility infrastructure has historically been responsible for less than ten percent of reported wildfires; however, fires attributed to power lines comprise roughly half of the most destructive fires in California history.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
Episode 62: Matt Ziska of Charlotte's Web Contact Matt Ziska at: [link] Business Resilience Decoded: [link] [link] [link] [link] [link] Episode 62: Matt Ziska of Charlotte's Web Contact Matt Ziska at: [link] Business Resilience Decoded: [link] [link] [link] [link] [link]
Over the last decade, California has experienced increased, intense, and record-breaking wildfires in Northern and Southern California. These fires have resulted in a devastating loss of life and billions of dollars in damage to property and infrastructure. Electric utility infrastructure has historically been responsible for less than ten percent of reported wildfires; however, fires attributed to power lines comprise roughly half of the most destructive fires in California history.
Episode 62: Matt Ziska of Charlotte's Web Contact Matt Ziska at: [link]. Business Resilience Decoded: [link] [link] [link] [link] [link] Episode 62: Matt Ziska of Charlotte's Web Contact Matt Ziska at: [link]. Business Resilience Decoded: [link] [link] [link] [link] [link].
Episode 62: Matt Ziska of Charlotte's Web Contact Matt Ziska at: [link]. Business Resilience Decoded: [link] [link] [link] [link] [link] Episode 62: Matt Ziska of Charlotte's Web Contact Matt Ziska at: [link].
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content