Sat.May 22, 2021 - Fri.May 28, 2021

article thumbnail

Feeding America

Disaster Zone Podcast

Food insecurity is a huge issue in the United States, and it got worst during the coronavirus pandemic. One organization at the center of coordinating and providing food to people who need it is Feeding America. This podcast is an interview with Vince Davis, Director of Disasters Services for Feeding America. In our conversation we discuss their role in providing support to day-to-day food bank operations throughout the United States.

Banking 130
article thumbnail

How Much Damage Do You Want to Incur From a Major Business Interruption?

Bernstein Crisis Management

Recent burst of serious disruptions highlights need for crisis preparedness and planning. Ransomware hackers shut down a critical oil pipeline. A single ship blocks the entire Suez Canal. Animal rights protestors blockade four McDonald’s distribution centers in the UK, impacting 1,300 restaurants. Covid-19 disrupts every aspect of the global supply chain.

Pandemic 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Backup and Disaster Recovery Protects South Florida Businesses

LAN Infotech

How Backup and Disaster Recovery Protects South Florida Businesses. Many South Florida businesses operate with a sense of unrealistic optimism when it comes to data loss and disaster recovery. However, the reality can be quite different and can negatively affect your business if you’re not vigilant. As the rate of digitalization increases, so does the risk of data loss.

article thumbnail

Duty of Care: An Employer’s Guide to Legal and Moral Responsibilities

Alert Media

The post Duty of Care: An Employer’s Guide to Legal and Moral Responsibilities appeared first on AlertMedia.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Get Out the Map: Why Your BCM Program Needs a Roadmap

BCM METRICS

Too many business continuity management programs are reactive rather than proactive. Good BCM programs exist in a permanent posture of executing on a roadmap, their custom-crafted plan for the future that is focused on reducing risk and increasing compliance with standards. Missing: A Coherent Set of BCM Program Goals From my perspective as […].

BCM 63

More Trending

article thumbnail

Lessons Your Business Can Learn from Colonial Pipeline Cyberattack 

LAN Infotech

Lessons Your Business Can Learn from Colonial Pipeline Cyberattack. On May 7, 2021, a ransomware attack happened to one of the biggest businesses in the United States, the Colonial Pipeline. The cyberattack created a crisis for the country, with the affected company shutting down its operations over the weekend. This led to a shortage of gasoline across 16 states.

article thumbnail

Predicting Cloud Computing Trends: 2021 Edition

Talkingpoint

During this past year of the pandemic, IT teams have had to reimagine the corporate network. Remote workforces could no longer use their office networks to connect with enterprise applications. Overnight, cloud computing became essential for getting employees back online. Many IT […]. The post Predicting Cloud Computing Trends: 2021 Edition appeared first on TierPoint.

article thumbnail

Isle of Coll Fire – A view from the frontline

Plan B Consulting

This week I talk about the recent fire on the remote island of the Isle of Coll. I discuss how the professionals and community responded and how this incident compares to others he has read about. I tell people how to manage disasters not actually take part in one! As a consultant, I tell people how to manage disasters and incidents, but rarely do I get caught up in one, nor am I involved in the response.

article thumbnail

Three Access Control Sessions at ISC West That You Can’t Miss

Security Industry Association

ISC West 2021 is coming up July 19-21 in Las Vegas, and the Security Industry Association (SIA) and ISC West recently revealed full conference details for the SIA Education@ISC West program, including keynote presentations from top luminaries and 65+ sessions on the most current business trends, technologies and industry developments. Among the robust lineup of conference sessions are several dynamic presentations related to access control.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

How To Protect Your Enterprises’ Sensitive Information

Assurance IT

With data and information being the most valuable asset in the world, how are you protecting your enterprise’s digital footprint? In this blog, we review the types of information that need to be protected and how to protect your enterprise’s sensitive information. What is Considered Sensitive Information? Sensitive enterprise information is any data or information that could be a risk to the company if it is stolen or released to a competitor or the public.

Banking 52
article thumbnail

What Does a Business Continuity Plan Typically Include? [Complete Guide]

LogisManager

What Does a Business Continuity Plan Typically Include? [Complete Guide]. Introduction. A business continuity plan (BCP) is your first line of defense against any challenge that threatens the core functionalities of your organization’s operations. When disaster strikes, your BCP should be there to reduce the time it takes to get things back up and running as usual again – as quickly as possible.

article thumbnail

Isle of Coll Fire – A view from the frontline

Plan B Consulting

This week I talk about the recent fire on the remote island of the Isle of Coll. I discuss how the professionals and community responded and how this incident compares to others he has read about. I tell people how to manage disasters not actually take part in one! As a consultant, I tell people how to manage disasters and incidents, but rarely do I get caught up in one, nor am I involved in the response.

article thumbnail

Why Open Source Intelligence Needs to Be Part of Your Risk Awareness Strategy

Security Industry Association

Summary: Open-source intelligence (OSINT) is a critical part of your risk profile. Properly assimilated and used, this intelligence can be extremely useful to your organization in recognizing threats and risks proactively and helping to protect lives (people), assets (buildings and fleets), operational continuity (business resilience) and reputation (brand).

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

CMMI certifications: A complete guide

CIO Governance

The Capability Maturity Model Integration (CMMI) helps organizations streamline process improvement and encourage behaviors that decrease risks in software, product, and service development. The model provides businesses with a framework for developing better products and services, starting with a series of appraisals of process and service development, service establishment and management, and product and service acquisition.

article thumbnail

From Emerging Trends to Cyber Risks: a Latin American Perspective

FS-ISAC

This article is also available in Portuguese and Spanish. As part of our Latin America focus for this edition of FS-ISAC Insights, we spoke with Homero Valiatti, Superintendent of Information Security at ItaĂş, Brazil's largest bank and the largest financial institution in the southern hemisphere. What is your take on cyber and regulatory maturity in the region?

article thumbnail

What The Pipeline Oil Ransomware Attack TAUGHT Us

Assurance IT

With global news reporters all over the world talking about the USA Colonial Pipeline ransomware attack, you must have questions about what happened. What happened on May 7th, 2021 to the oil pipeline? Who is responsible for it? Did they pay the ransom? In this blog, we answer all of your questions and review what the pipeline oil ransomware attack taught us.

article thumbnail

Planning and Preparation in Protecting Buildings Against Unrest

Security Industry Association

In this video, learn about the importance of planning in protecting public buildings and preparing to manage incidents of violent civil unrest. On April 28, the Security Industry Association (SIA) hosted Part 1 of the 2021 SIA GovSummit , the nation’s premier government security conference connecting government, security and technology. This daylong virtual conference featured insights from experts in government, industry, academia and the nonprofit sector on the security issues that matte

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

How do I select a DLP solution for my business?

Behavior Group

Data loss prevention (DLP) has become even more important in the last year. Since the pandemic has made companies shift to a remote workforce model, cybersecurity threats have become increasingly complex and data security even more fragile. Companies need to adapt their DLP strategies to the new normal and harden their defense. To select a… Continue reading.

article thumbnail

Non-Financial Risks are Increasingly Financial

FS-ISAC

Banks around the world are used to quantifying financial risks such as market, credit, and liquidity risks. We have known how to measure them for centuries. Because large numbers are involved, it is largely possible to predict the future based on the past. But in a digital finance world that is quickly advancing into uncharted territory, non-financial risks – operational risk, fraud prevention, IT risk, and cybersecurity – are increasingly critical to the business.

Banking 52
article thumbnail

SOX vs. SOC: What Is The Difference? [Complete Guide]

LogisManager

SOX VS SOC: What Is The Difference? Introduction. Many people confuse “SOX” and “SOC” – and rightfully so, as linguistically, they sound very similar. They also often fall within the same professional context when discussing compliance. But ultimately, SOX and SOC have very different meanings, purposes and contexts. We’ll dive into what SOX is, what SOC is, and how to apply SOX and SOC best practices at your organization in this guide.

article thumbnail

SIA New Member Profile: Fingerprint Cards AB

Security Industry Association

New Security Industry Association (SIA) member Fingerprint Cards AB is a leading biometrics company whose solutions are found in hundreds of millions of devices and applications and used billions of times each day. Fingerprints is headquartered in Gothenburg, Sweden, with engineering, sales and support personnel in the United States, Europe, China and Asia Pacific regions.

article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha

article thumbnail

VMware tackles ESG with innovation

CIO Governance

US corporate boards are increasingly turning attention to environmental, social, and governance (ESG) issues. ESG is an organization-wide endeavor for those companies rising to the challenge, and CIOs won’t be left out.

article thumbnail

Payments: More Than a Cyber Risk

FS-ISAC

As everyone in the fincyber world knows, payments are to thieves like honey to bees. Protecting the payment gateways is key to protecting against cyber theft. But payments aren’t just interesting to miscreants, they are interesting in their own right; the payments world is rich with history, intrigue, contradictions and tensions. What is more, the payments world is changing fast.

Banking 52
article thumbnail

The bantam menace

Oz's Business Continuity Blog

Our recent bank holiday weekend didn’t go entirely to plan. It started off well enough. Mrs Oz and I spent several hours in the garden, as planned, starting on our latest project, the details of which I won’t bore you […].

Banking 52
article thumbnail

A Smarter, Safer Approach to Hospital Security

Security Industry Association

Zach Jory, Axon Enterprise. Hospital security is tricky. A medical center should be a place of healing and provide a welcoming atmosphere, but the reality is that hospitals and medical campuses create environments that are difficult to monitor and secure and regularly experience violence. Hospital security teams have a tough job – provide a safe environment, while largely remaining invisible to patients and staff.

article thumbnail

What Businesses Need to Know About Hurricane Season 2021

Alert Media

The post What Businesses Need to Know About Hurricane Season 2021 appeared first on AlertMedia.