Sat.May 22, 2021 - Fri.May 28, 2021

article thumbnail

Feeding America

Disaster Zone Podcast

Food insecurity is a huge issue in the United States, and it got worst during the coronavirus pandemic. One organization at the center of coordinating and providing food to people who need it is Feeding America. This podcast is an interview with Vince Davis, Director of Disasters Services for Feeding America. In our conversation we discuss their role in providing support to day-to-day food bank operations throughout the United States.

Banking 130
article thumbnail

How Much Damage Do You Want to Incur From a Major Business Interruption?

Bernstein Crisis Management

Recent burst of serious disruptions highlights need for crisis preparedness and planning. Ransomware hackers shut down a critical oil pipeline. A single ship blocks the entire Suez Canal. Animal rights protestors blockade four McDonald’s distribution centers in the UK, impacting 1,300 restaurants. Covid-19 disrupts every aspect of the global supply chain.

Pandemic 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Backup and Disaster Recovery Protects South Florida Businesses

LAN Infotech

How Backup and Disaster Recovery Protects South Florida Businesses. Many South Florida businesses operate with a sense of unrealistic optimism when it comes to data loss and disaster recovery. However, the reality can be quite different and can negatively affect your business if you’re not vigilant. As the rate of digitalization increases, so does the risk of data loss.

article thumbnail

Duty of Care: An Employer’s Guide to Legal and Moral Responsibilities

Alert Media

The post Duty of Care: An Employer’s Guide to Legal and Moral Responsibilities appeared first on AlertMedia.

article thumbnail

Are Robots Replacing You? Keeping Humans in the Loop in Automated Environments

Speaker: Erroll Amacker

As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R

article thumbnail

Get Out the Map: Why Your BCM Program Needs a Roadmap

BCM METRICS

Too many business continuity management programs are reactive rather than proactive. Good BCM programs exist in a permanent posture of executing on a roadmap, their custom-crafted plan for the future that is focused on reducing risk and increasing compliance with standards. Missing: A Coherent Set of BCM Program Goals From my perspective as […].

BCM 63

More Trending

article thumbnail

Lessons Your Business Can Learn from Colonial Pipeline Cyberattack 

LAN Infotech

Lessons Your Business Can Learn from Colonial Pipeline Cyberattack. On May 7, 2021, a ransomware attack happened to one of the biggest businesses in the United States, the Colonial Pipeline. The cyberattack created a crisis for the country, with the affected company shutting down its operations over the weekend. This led to a shortage of gasoline across 16 states.

article thumbnail

What Businesses Need to Know About Hurricane Season 2021

Alert Media

The post What Businesses Need to Know About Hurricane Season 2021 appeared first on AlertMedia.

article thumbnail

Predicting Cloud Computing Trends: 2021 Edition

Talkingpoint

During this past year of the pandemic, IT teams have had to reimagine the corporate network. Remote workforces could no longer use their office networks to connect with enterprise applications. Overnight, cloud computing became essential for getting employees back online. Many IT […]. The post Predicting Cloud Computing Trends: 2021 Edition appeared first on TierPoint.

article thumbnail

Isle of Coll Fire – A view from the frontline

Plan B Consulting

This week I talk about the recent fire on the remote island of the Isle of Coll. I discuss how the professionals and community responded and how this incident compares to others he has read about. I tell people how to manage disasters not actually take part in one! As a consultant, I tell people how to manage disasters and incidents, but rarely do I get caught up in one, nor am I involved in the response.

article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

Three Access Control Sessions at ISC West That You Can’t Miss

Security Industry Association

ISC West 2021 is coming up July 19-21 in Las Vegas, and the Security Industry Association (SIA) and ISC West recently revealed full conference details for the SIA Education@ISC West program, including keynote presentations from top luminaries and 65+ sessions on the most current business trends, technologies and industry developments. Among the robust lineup of conference sessions are several dynamic presentations related to access control.

article thumbnail

How To Protect Your Enterprises’ Sensitive Information

Assurance IT

With data and information being the most valuable asset in the world, how are you protecting your enterprise’s digital footprint? In this blog, we review the types of information that need to be protected and how to protect your enterprise’s sensitive information. What is Considered Sensitive Information? Sensitive enterprise information is any data or information that could be a risk to the company if it is stolen or released to a competitor or the public.

Banking 52
article thumbnail

Navigating a Safe and Stable Return to the Workplace [Webinar Recap]

Alert Media

The post Navigating a Safe and Stable Return to the Workplace [Webinar Recap] appeared first on AlertMedia.

article thumbnail

Isle of Coll Fire – A view from the frontline

Plan B Consulting

This week I talk about the recent fire on the remote island of the Isle of Coll. I discuss how the professionals and community responded and how this incident compares to others he has read about. I tell people how to manage disasters not actually take part in one! As a consultant, I tell people how to manage disasters and incidents, but rarely do I get caught up in one, nor am I involved in the response.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Why Open Source Intelligence Needs to Be Part of Your Risk Awareness Strategy

Security Industry Association

Summary: Open-source intelligence (OSINT) is a critical part of your risk profile. Properly assimilated and used, this intelligence can be extremely useful to your organization in recognizing threats and risks proactively and helping to protect lives (people), assets (buildings and fleets), operational continuity (business resilience) and reputation (brand).

article thumbnail

What Does a Business Continuity Plan Typically Include? [Complete Guide]

LogisManager

What Does a Business Continuity Plan Typically Include? [Complete Guide]. Introduction. A business continuity plan (BCP) is your first line of defense against any challenge that threatens the core functionalities of your organization’s operations. When disaster strikes, your BCP should be there to reduce the time it takes to get things back up and running as usual again – as quickly as possible.

article thumbnail

CMMI certifications: A complete guide

CIO Governance

The Capability Maturity Model Integration (CMMI) helps organizations streamline process improvement and encourage behaviors that decrease risks in software, product, and service development. The model provides businesses with a framework for developing better products and services, starting with a series of appraisals of process and service development, service establishment and management, and product and service acquisition.

article thumbnail

From Emerging Trends to Cyber Risks: a Latin American Perspective

FS-ISAC

This article is also available in Portuguese and Spanish. As part of our Latin America focus for this edition of FS-ISAC Insights, we spoke with Homero Valiatti, Superintendent of Information Security at Itaú, Brazil's largest bank and the largest financial institution in the southern hemisphere. What is your take on cyber and regulatory maturity in the region?

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Planning and Preparation in Protecting Buildings Against Unrest

Security Industry Association

In this video, learn about the importance of planning in protecting public buildings and preparing to manage incidents of violent civil unrest. On April 28, the Security Industry Association (SIA) hosted Part 1 of the 2021 SIA GovSummit , the nation’s premier government security conference connecting government, security and technology. This daylong virtual conference featured insights from experts in government, industry, academia and the nonprofit sector on the security issues that matte

article thumbnail

What The Pipeline Oil Ransomware Attack TAUGHT Us

Assurance IT

With global news reporters all over the world talking about the USA Colonial Pipeline ransomware attack, you must have questions about what happened. What happened on May 7th, 2021 to the oil pipeline? Who is responsible for it? Did they pay the ransom? In this blog, we answer all of your questions and review what the pipeline oil ransomware attack taught us.

article thumbnail

How do I select a DLP solution for my business?

Behavior Group

Data loss prevention (DLP) has become even more important in the last year. Since the pandemic has made companies shift to a remote workforce model, cybersecurity threats have become increasingly complex and data security even more fragile. Companies need to adapt their DLP strategies to the new normal and harden their defense. To select a… Continue reading.

article thumbnail

Non-Financial Risks are Increasingly Financial

FS-ISAC

Banks around the world are used to quantifying financial risks such as market, credit, and liquidity risks. We have known how to measure them for centuries. Because large numbers are involved, it is largely possible to predict the future based on the past. But in a digital finance world that is quickly advancing into uncharted territory, non-financial risks – operational risk, fraud prevention, IT risk, and cybersecurity – are increasingly critical to the business.

Banking 52
article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

SIA New Member Profile: Fingerprint Cards AB

Security Industry Association

New Security Industry Association (SIA) member Fingerprint Cards AB is a leading biometrics company whose solutions are found in hundreds of millions of devices and applications and used billions of times each day. Fingerprints is headquartered in Gothenburg, Sweden, with engineering, sales and support personnel in the United States, Europe, China and Asia Pacific regions.

article thumbnail

SOX vs. SOC: What Is The Difference? [Complete Guide]

LogisManager

SOX VS SOC: What Is The Difference? Introduction. Many people confuse “SOX” and “SOC” – and rightfully so, as linguistically, they sound very similar. They also often fall within the same professional context when discussing compliance. But ultimately, SOX and SOC have very different meanings, purposes and contexts. We’ll dive into what SOX is, what SOC is, and how to apply SOX and SOC best practices at your organization in this guide.

article thumbnail

VMware tackles ESG with innovation

CIO Governance

US corporate boards are increasingly turning attention to environmental, social, and governance (ESG) issues. ESG is an organization-wide endeavor for those companies rising to the challenge, and CIOs won’t be left out.

article thumbnail

Payments: More Than a Cyber Risk

FS-ISAC

As everyone in the fincyber world knows, payments are to thieves like honey to bees. Protecting the payment gateways is key to protecting against cyber theft. But payments aren’t just interesting to miscreants, they are interesting in their own right; the payments world is rich with history, intrigue, contradictions and tensions. What is more, the payments world is changing fast.

Banking 52
article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

A Smarter, Safer Approach to Hospital Security

Security Industry Association

Zach Jory, Axon Enterprise. Hospital security is tricky. A medical center should be a place of healing and provide a welcoming atmosphere, but the reality is that hospitals and medical campuses create environments that are difficult to monitor and secure and regularly experience violence. Hospital security teams have a tough job – provide a safe environment, while largely remaining invisible to patients and staff.

article thumbnail

The bantam menace

Oz's Business Continuity Blog

Our recent bank holiday weekend didn’t go entirely to plan. It started off well enough. Mrs Oz and I spent several hours in the garden, as planned, starting on our latest project, the details of which I won’t bore you […].

Banking 52
article thumbnail

Lead with Courage

Business Continuity Today

We often think of courage in its most valorous incarnations — on the battlefield, in the grips of war, when the stakes are unspeakably high. Matters of life and death require boundless courage and we are forever joined in our awe and gratitude towards those that gave us their life to preserve our liberty. Their heroism inspires us to give valor and bravery a closer look.