This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Food insecurity is a huge issue in the United States, and it got worst during the coronavirus pandemic. One organization at the center of coordinating and providing food to people who need it is Feeding America. This podcast is an interview with Vince Davis, Director of Disasters Services for Feeding America. In our conversation we discuss their role in providing support to day-to-day food bank operations throughout the United States.
Recent burst of serious disruptions highlights need for crisis preparedness and planning. Ransomware hackers shut down a critical oil pipeline. A single ship blocks the entire Suez Canal. Animal rights protestors blockade four McDonald’s distribution centers in the UK, impacting 1,300 restaurants. Covid-19 disrupts every aspect of the global supply chain.
How Backup and Disaster Recovery Protects South Florida Businesses. Many South Florida businesses operate with a sense of unrealistic optimism when it comes to data loss and disaster recovery. However, the reality can be quite different and can negatively affect your business if you’re not vigilant. As the rate of digitalization increases, so does the risk of data loss.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
Too many business continuity management programs are reactive rather than proactive. Good BCM programs exist in a permanent posture of executing on a roadmap, their custom-crafted plan for the future that is focused on reducing risk and increasing compliance with standards. Missing: A Coherent Set of BCM Program Goals From my perspective as […].
Last year’s sudden (and nearly synchronized) shift out of the office and onto the cloud was immediately followed by the start of an unending stream of high-profile data breaches. For companies across the board, the alarm has sounded on the escalating threat of these cybersecurity events. The public, too, has taken notice: consumer information, including sensitive data such as healthcare records.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Last year’s sudden (and nearly synchronized) shift out of the office and onto the cloud was immediately followed by the start of an unending stream of high-profile data breaches. For companies across the board, the alarm has sounded on the escalating threat of these cybersecurity events. The public, too, has taken notice: consumer information, including sensitive data such as healthcare records.
Lessons Your Business Can Learn from Colonial Pipeline Cyberattack. On May 7, 2021, a ransomware attack happened to one of the biggest businesses in the United States, the Colonial Pipeline. The cyberattack created a crisis for the country, with the affected company shutting down its operations over the weekend. This led to a shortage of gasoline across 16 states.
During this past year of the pandemic, IT teams have had to reimagine the corporate network. Remote workforces could no longer use their office networks to connect with enterprise applications. Overnight, cloud computing became essential for getting employees back online. Many IT […]. The post Predicting Cloud Computing Trends: 2021 Edition appeared first on TierPoint.
This week I talk about the recent fire on the remote island of the Isle of Coll. I discuss how the professionals and community responded and how this incident compares to others he has read about. I tell people how to manage disasters not actually take part in one! As a consultant, I tell people how to manage disasters and incidents, but rarely do I get caught up in one, nor am I involved in the response.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
ISC West 2021 is coming up July 19-21 in Las Vegas, and the Security Industry Association (SIA) and ISC West recently revealed full conference details for the SIA Education@ISC West program, including keynote presentations from top luminaries and 65+ sessions on the most current business trends, technologies and industry developments. Among the robust lineup of conference sessions are several dynamic presentations related to access control.
With data and information being the most valuable asset in the world, how are you protecting your enterprise’s digital footprint? In this blog, we review the types of information that need to be protected and how to protect your enterprise’s sensitive information. What is Considered Sensitive Information? Sensitive enterprise information is any data or information that could be a risk to the company if it is stolen or released to a competitor or the public.
This week I talk about the recent fire on the remote island of the Isle of Coll. I discuss how the professionals and community responded and how this incident compares to others he has read about. I tell people how to manage disasters not actually take part in one! As a consultant, I tell people how to manage disasters and incidents, but rarely do I get caught up in one, nor am I involved in the response.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
Summary: Open-source intelligence (OSINT) is a critical part of your risk profile. Properly assimilated and used, this intelligence can be extremely useful to your organization in recognizing threats and risks proactively and helping to protect lives (people), assets (buildings and fleets), operational continuity (business resilience) and reputation (brand).
What Does a Business Continuity Plan Typically Include? [Complete Guide]. Introduction. A business continuity plan (BCP) is your first line of defense against any challenge that threatens the core functionalities of your organization’s operations. When disaster strikes, your BCP should be there to reduce the time it takes to get things back up and running as usual again – as quickly as possible.
The Capability Maturity Model Integration (CMMI) helps organizations streamline process improvement and encourage behaviors that decrease risks in software, product, and service development. The model provides businesses with a framework for developing better products and services, starting with a series of appraisals of process and service development, service establishment and management, and product and service acquisition.
This article is also available in Portuguese and Spanish. As part of our Latin America focus for this edition of FS-ISAC Insights, we spoke with Homero Valiatti, Superintendent of Information Security at Itaú, Brazil's largest bank and the largest financial institution in the southern hemisphere. What is your take on cyber and regulatory maturity in the region?
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
In this video, learn about the importance of planning in protecting public buildings and preparing to manage incidents of violent civil unrest. On April 28, the Security Industry Association (SIA) hosted Part 1 of the 2021 SIA GovSummit , the nation’s premier government security conference connecting government, security and technology. This daylong virtual conference featured insights from experts in government, industry, academia and the nonprofit sector on the security issues that matte
With global news reporters all over the world talking about the USA Colonial Pipeline ransomware attack, you must have questions about what happened. What happened on May 7th, 2021 to the oil pipeline? Who is responsible for it? Did they pay the ransom? In this blog, we answer all of your questions and review what the pipeline oil ransomware attack taught us.
Data loss prevention (DLP) has become even more important in the last year. Since the pandemic has made companies shift to a remote workforce model, cybersecurity threats have become increasingly complex and data security even more fragile. Companies need to adapt their DLP strategies to the new normal and harden their defense. To select a… Continue reading.
Banks around the world are used to quantifying financial risks such as market, credit, and liquidity risks. We have known how to measure them for centuries. Because large numbers are involved, it is largely possible to predict the future based on the past. But in a digital finance world that is quickly advancing into uncharted territory, non-financial risks – operational risk, fraud prevention, IT risk, and cybersecurity – are increasingly critical to the business.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
New Security Industry Association (SIA) member Fingerprint Cards AB is a leading biometrics company whose solutions are found in hundreds of millions of devices and applications and used billions of times each day. Fingerprints is headquartered in Gothenburg, Sweden, with engineering, sales and support personnel in the United States, Europe, China and Asia Pacific regions.
SOX VS SOC: What Is The Difference? Introduction. Many people confuse “SOX” and “SOC” – and rightfully so, as linguistically, they sound very similar. They also often fall within the same professional context when discussing compliance. But ultimately, SOX and SOC have very different meanings, purposes and contexts. We’ll dive into what SOX is, what SOC is, and how to apply SOX and SOC best practices at your organization in this guide.
US corporate boards are increasingly turning attention to environmental, social, and governance (ESG) issues. ESG is an organization-wide endeavor for those companies rising to the challenge, and CIOs won’t be left out.
As everyone in the fincyber world knows, payments are to thieves like honey to bees. Protecting the payment gateways is key to protecting against cyber theft. But payments aren’t just interesting to miscreants, they are interesting in their own right; the payments world is rich with history, intrigue, contradictions and tensions. What is more, the payments world is changing fast.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
Zach Jory, Axon Enterprise. Hospital security is tricky. A medical center should be a place of healing and provide a welcoming atmosphere, but the reality is that hospitals and medical campuses create environments that are difficult to monitor and secure and regularly experience violence. Hospital security teams have a tough job – provide a safe environment, while largely remaining invisible to patients and staff.
Our recent bank holiday weekend didn’t go entirely to plan. It started off well enough. Mrs Oz and I spent several hours in the garden, as planned, starting on our latest project, the details of which I won’t bore you […].
We often think of courage in its most valorous incarnations — on the battlefield, in the grips of war, when the stakes are unspeakably high. Matters of life and death require boundless courage and we are forever joined in our awe and gratitude towards those that gave us their life to preserve our liberty. Their heroism inspires us to give valor and bravery a closer look.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content