Sat.Aug 31, 2024 - Fri.Sep 06, 2024

article thumbnail

More Info on FEMA University

Recovery Diva

From HSToday, this article: FEMA Establishes National Disaster & Emergency Management University. Some excerpts: “FEMA has announced the agency is establishing a new university called National Disaster & Emergency Management University (NDEMU) to help train emergency managers to keep pace with the rapidly changing threat environment. By growing into a university model, NDEMU will offer comprehensive education and training programs spanning various disciplines within disaster and em

Education 189
article thumbnail

How to repair your Google search results and reclaim your online reputation

Bernstein Crisis Management

How to repair your Google search results and reclaim your online reputation By Anthony Will Anthony Will, CEO & Co-Founder Reputation Resolutions Online reputation is a brand’s most valuable asset today. How it appears – whether positive or negative – is of equal significance. A favorable online reputation can open doors of opportunity, while a detrimental one can rapidly slam them shut.

Audit 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Industry Association Announces Program for 2024 Securing New Ground Conference

Security Industry Association

Top C-suite, cybersecurity and business leaders – including keynote speaker Nasdaq’s Phil Mackintosh– will headline the security industry’s executive conference taking place Oct. 8-9 in New York City. SILVER SPRING, Md. – The Security Industry Association (SIA) has announced the schedule, speaker lineup and program for the 2024 Securing New Ground (SNG), the security industry’s executive conference, taking place Oct. 8-9 at the Westin New York Grand Central in New York City.

Security 105
article thumbnail

The State of DR and Cyber Recovery – Part 3: Choosing the Right Disaster Recovery Solution

Zerto

This post is the third in a series of three that explores some insights from the IDC white paper, sponsored by Zerto— The State of Disaster Recovery and Cyber Recovery, 2024–2025: Factoring in AI ¹. In part-1 , we looked at the top reasons for data loss and some ways to address them, while in part-2 we focused on the top disaster recovery challenges faced by organizations.

article thumbnail

Are Robots Replacing You? Keeping Humans in the Loop in Automated Environments

Speaker: Erroll Amacker

As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R

article thumbnail

A New Threat in CA – Landslides

Recovery Diva

From the WashPost: Why landslides are suddenly tearing homes apart in Southern California. Landslides have damaged or destroyed homes atop Palos Verdes’s picturesque bluffs, and threaten hundreds of them.

100
100

More Trending

article thumbnail

How to Make the Most of the Kursk Gambit

The Rand Blog

Ukraine's bold incursion into Russia's Kursk region may not be enough to deliver an absolute military victory for Kyiv. However, the Kursk offensive may work to Ukraine's advantage at the negotiating table.

98
article thumbnail

The Psychology of Preparedness: Encouraging a Preparedness Mindset

BryghtPath

In an increasingly unpredictable world, the importance of being prepared for disasters—whether natural or man-made—cannot be overstated. Yet, despite the clear benefits of preparedness, many individuals and communities remain underprepared. The psychological barriers that inhibit proactive planning often explain this paradox. Understanding these barriers and implementing strategies to overcome them is essential for fostering a … The post The Psychology of Preparedness: Encouraging a Prepar

article thumbnail

Storage and Data Protection News for the Week of September 6; Updates from Continuity, Hitachi Vantara, Veeam & More

Solutions Review

Solutions Review Executive Editor Tim King curated this list of notable storage and data protection news for the week of September 6, 2024. Keeping tabs on all the most relevant storage and data protection news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last week, in this space.

article thumbnail

Demystifying the NIS 2 Directive: Insights from Gartner®

Acronis

The NIS 2 Directive introduces rigorous cybersecurity standards to help protect critical entities that provide essential services. Read the blog to learn Gartner’s recommendations for preparing for NIS 2, and get access to the report.

article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

Equity and Social Policy: Q&A with Jessica Welburn Paige

The Rand Blog

Jessica Welburn Paige, a behavioral and social scientist, focuses on questions of race and inequality. In this interview, she discusses how AI programs being used to monitor students for suicide risk could compromise student privacy and harm vulnerable students.

article thumbnail

Active Shooter Lessons Learned: Key Strategies for Response

BryghtPath

This in-depth look at active shooter lessons learned examines crucial takeaways from past tragedies to bolster security preparedness & response efficacy. The post Active Shooter Lessons Learned: Key Strategies for Response appeared first on Bryghtpath.

article thumbnail

5 Effective Strategies to Mitigate Market Risk

Reciprocity

“Market risks” are risks specifically related to investments. These risks are defined by the behavior of the market overall, and can be caused by factors unrelated to your line of business. Really, any market fluctuations in any area might potentially affect your company’s investments. Market risk also refers to risks that are inherent to investments, in the sense that some amount of uncertainty will always be at play.

article thumbnail

Evaluating EDR and MDR: What’s the right choice for MSPs?

Acronis

Evaluating EDR and MDR doesn't boil down to a ‘this or that’ question. Many growth-minded MSPs leverage both full time and intermittently. Choosing the right solutions can optimize your security, cost efficiency and growth — at any maturity stage.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Ukraine, Kursk, and the Importance of Lines of Operation in History

The Rand Blog

Ukraine's bold incursion into Kursk mirrors historic tactics using interior lines. To withstand Russia's response, Ukraine must consolidate forces, leveraging the rapid reinforcement and supply advantages interior lines provide.

77
article thumbnail

Ensuring Compliance with Business Continuity Regulations

BryghtPath

In an era of constant change, learn the importance of business continuity planning. This guide breaks down ensuring compliance with business continuity regulations. The post Ensuring Compliance with Business Continuity Regulations appeared first on Bryghtpath.

article thumbnail

IT Audit Checklist for Your IT Department

Reciprocity

A disruption to your company’s information technology (IT) systems can disrupt your business operations as well, costing you time and money while employees wait for repairs. An audit of your IT systems can identify and fix those potential disruptions before they happen – and an IT audit checklist can ensure that your IT department has the necessary resources in place to keep your systems safe.

Audit 52
article thumbnail

Video: Unleashing the Power of Audio in Modern Security Systems

Security Industry Association

The Security Industry Association (SIA) Audio & Intelligent Communications Subcommittee presents the second in a series of video conversations highlighting key topics in the Safe and Sound primer on audio and intelligent communications applications for security. In this video, hosted by SIA’s senior manager of standards and technology, Adom Yusuf, industry experts delve into the growing impact of audio technology on security systems.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Book Review: 'Command' by Lawrence Freedman

The Rand Blog

Lawrence Freedman's Command explores the political aspects of military operations since World War II, focusing on the inherent challenges of command. It highlights three key dichotomies in shaping military command: politicians versus generals, delegation versus control, and obedience versus initiative.

62
article thumbnail

BCI Good Practice Guidelines 2023: A Comprehensive Guide

BryghtPath

Navigate the complexities of business continuity planning and implementation with this comprehensive guide to the BCI Good Practice Guidelines 2023! The post BCI Good Practice Guidelines 2023: A Comprehensive Guide appeared first on Bryghtpath.

article thumbnail

What Is Management Override of Internal Controls?

Reciprocity

Internal controls are the processes, procedures, tasks, and activities meant to protect an organization from fraud, financial information misreporting, cybercrime, and accidental losses. A strong internal control system is also vital to maintain compliance with all applicable laws and regulations. Internal controls do, however, have one nagging weakness: management override of those controls.

article thumbnail

What Is AMI Data and How Can Utility Companies Benefit from It?

Pure Storage

What Is AMI Data and How Can Utility Companies Benefit from It? by Blog Home Summary AMI 2.0 data is helping utility companies operate more efficiently. Leveraging this data can help them enhance operational efficiency, improve customer service, and achieve greater flexibility in managing energy distribution. Between net-zero goals, increasing energy costs, and decreasing grid reliability, utility companies are under more pressure than ever to go fully digital by leveraging the latest technolog

Outage 52
article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

The Gulf of Thailand May Be the Next U.S.-China Flashpoint

The Rand Blog

Geopolitical tensions between China and the United States have escalated in the South China Sea and Taiwan Strait, raising fears of war. The Gulf of Thailand has remained relatively calm, but that may change as Beijing undertakes controversial projects that could inflame the region.

55
article thumbnail

SIA New Member Profile: ColorID

Security Industry Association

New Security Industry Association (SIA) member ColorID provides high-quality identification solutions, tailored to meet the unique needs of its security partners. The company is headquartered in Cornelius, North Carolina, serving clients across North America and globally. SIA spoke with Danny Smith, owner of ColorID, about the company, the security industry and working with SIA.

article thumbnail

What Is an Audit of Internal Control Over Financial Reporting?

Reciprocity

In today’s complex financial landscape, trust and transparency play pivotal roles in ensuring business credibility. One essential tool that bolsters this trust is an audit of internal control over financial reporting (ICFR). But what exactly is it? At its core, an ICFR audit evaluates the operating effectiveness of a company’s internal processes and controls that safeguard its financial statements from misrepresentation, either accidental or intentional.

Audit 52
article thumbnail

Should You Conduct ‘No-Notice’ Exercises?

Plan B Consulting

In this week’s bulletin, Charlie discusses the importance of no-notice exercises and the importance of planning in an exercise. Shortly, I will conduct the largest exercise I have ever carried out. It is a live exercise involving five different teams responding to a cyber incident. The exercise will involve a full role-playing cell, with role players from both PlanB and the client playing all external parties, and our MITS platform, which simulates media, social media and the client’s website.

Media 52
article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Harnessing the Power of Foresight: Designing EU Policies for Unpredictable Futures

The Rand Blog

Ursula von der Leyen's re-election as European Commission President brings new priorities, including infrastructure, defense, and housing. Maintaining foresight is key for effective long-term EU policymaking but its role remains uncertain.

52
article thumbnail

FAST Launches “Talent for Tomorrow” Fundraiser in Conjunction With Workforce Development Month

Security Industry Association

DALLAS, Texas – The Foundation for Advancing Security Talent (FAST) is excited to announce the launch of its Talent for Tomorrow fundraiser, coinciding with Workforce Development Month. Throughout September, FAST aims to raise $10,000 to support its mission of attracting, training and retaining new talent within the security industry. This initiative is held in partnership with the Security Industry Association (SIA) and the Electronic Security Association (ESA).

article thumbnail

Top Risk Analysis Tools

Reciprocity

For many years and across industries, enterprise risk management (ERM) has always been an important part of any successful business operation. Organizations of all types and sizes face a number of external and internal factors that make it uncertain whether they will achieve their goals; ERM can bring that uncertainty to lower levels. Understanding the risks to your organization can help you make better decisions about how to reduce those risks; that’s where risk management comes in.