Sat.Oct 26, 2019 - Fri.Nov 01, 2019

article thumbnail

The view from a super recogniser 

Crisis Response Journal

If you follow the news, it’s impossible to miss the heated debate that is currently surrounding the trial and potential roll-out of automated facial recognition technology by police forces, says Kenny Long.

article thumbnail

What Goes Into a Cyber Data Risk Assessment?

Plan B Consulting

Charlie proposes an inventory of information which your organisation should consider to conduct a cyber data risk assessment. This week, I was conducting an exercise for a government organisation. As we have worked with the company for a number of years we decided to go for a slightly different set-up, so this time we used loss-of-data as the scenario.

Banking 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Devotee

arunpraka shray

My Asia Pacific CEO wanted me to step down from my current role in a leading Finance Multi-national. I have seen better days, huge profits for the Company’s India arm, distributed fat bonuses to thousands of employees, still he wanted me out. I didn’t sleep almost for a week now, had dark circles under my eyes, and ate frugally owing to a lost appetite.

Travel 52
article thumbnail

How much risk small businesses really pose to supply chain cybersecurity?

Behavior Group

50% of large enterprises view third-party partners of any size as a cybersecurity risk, but only 14% have experienced a breach as the result of a small business partner, while 17% have been breached as the result of working with a larger partner, according to ISC2. risk, supply chain, cybersecurity The study surveyed more than… Continue reading.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

What Goes Into a Cyber Data Risk Assessment?

Plan B Consulting

Charlie proposes an inventory of information which your organisation should consider to conduct a cyber data risk assessment. This week, I was conducting an exercise for a government organisation. As we have worked with the company for a number of years we decided to go for a slightly different set-up, so this time we used loss-of-data as the scenario.

Banking 52