Sat.Apr 03, 2021 - Fri.Apr 09, 2021

article thumbnail

Reputation Management in Seussville

Bernstein Crisis Management

The following, from author Kristopher Scott, originally appeared in Platform Magazine’s March edition. Thanks to Kris and the crisis experts quoted, including Dorothy Crenshaw, Jason Mudd, and BCM founder Jonathan Bernstein for giving us permission to reprint! Reputation Management: The Next Seussville Classic. One fish, two fish. Black fish, white fish.

article thumbnail

Leveraging Building Resilient Infrastructure and Communities (BRIC) Funding

Disaster Zone Podcast

Emergency management is primarily known as a profession that responds to disasters. Another very important aspect of the discipline of emergency management is disaster mitigation. This podcast focuses on a relatively new federal program called Building Resilient Infrastructure Communities (BIRC). Derrick Hiebert, Deloitte is the mitigation expert interviewed in this recording.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Disaster Recovery (DR) Architecture on AWS, Part I: Strategies for Recovery in the Cloud

AWS Disaster Recovery

As lead solutions architect for the AWS Well-Architected Reliability pillar , I help customers build resilient workloads on AWS. This helps them prepare for disaster events, which is one of the biggest challenges they can face. Such events include natural disasters like earthquakes or floods, technical failures such as power or network loss, and human actions such as inadvertent or unauthorized modifications.

article thumbnail

Leading by Example: Employee Safety Lessons From Industry Leaders

Alert Media

The post Leading by Example: Employee Safety Lessons From Industry Leaders appeared first on AlertMedia.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Ransomware: Cybersecurity’s Biggest Threat Yet

LAN Infotech

Ransomware: Cybersecurity’s Biggest Threat Yet. Ransomware is likely today’s biggest threat to cybersecurity, and it’s only getting more dangerous. Do you know how to defend against it? You’ve probably heard a lot about ransomware and other cybercrime threats. It’s easy to hype up the doom and gloom about cybercrime — fear is often a great motivator.

Malware 52

More Trending

article thumbnail

IT Resilience Within AWS Cloud, Part II: Architecture and Patterns

AWS Disaster Recovery

In Part I of this two-part blog , we outlined best practices to consider when building resilient applications in hybrid on-premises/cloud environments. We also showed you how to adapt mindsets and organizational culture. In Part II, we’ll provide technical considerations related to architecture and patterns for resilience in AWS Cloud. Considerations on architecture and patterns.

article thumbnail

What Businesses Need to Know About Open Source Intelligence (OSINT)

Alert Media

The post What Businesses Need to Know About Open Source Intelligence (OSINT) appeared first on AlertMedia.

article thumbnail

What Questions Should You Ask When Choosing An IT Services Company?

LAN Infotech

What Questions Should You Ask When Choosing An IT Services Company? The process of finding an IT services provider for your business is as unique as your business, but one challenge everyone shares is how to know if an IT firm is the right partner for your needs. How can you tell if an IT services provider is right for your business? That depends on the IT firm’s understanding of your IT needs, which depends on you asking the right questions. ?.

article thumbnail

Nearly 40% of new ransomware families use both data encryption and data theft in attacks

Behavior Group

Data-stealing ransomware attacks, information harvesting malware, and supply chain attacks are among the critical threats to organizations, according to F-Secure. data encryption, data theft, attacks One of the most notable trends highlighted is the evolution of ransomware – attacks that extort organizations by preventing them from accessing their data.

Malware 52
article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

SIA New Member Profile: York Electronic Systems, Inc.

Security Industry Association

New Security Industry Association (SIA) member York Electronic Systems, Inc. , is a Native American woman-owned company that provides design, engineering, consulting, construction, installation and service for building technology solutions, including safety, security, communications and audio-visual systems. The company is headquartered in Broken Arrow, Oklahoma, and provides services in Oklahoma and northwest Arkansas, as well as through its partner network throughout North America.

article thumbnail

Occam’s Razor and Business Continuity

Business Continuity Today

William of Occam was an English Franciscan friar and philosopher who lived from 1287 to 1347. Perhaps his most famous contribution to philosophy (and a variety of other fields, such as mathematics, biology, religion, and others) is what has become known as Occam’s razor. The principle is usually stated as: “Entities should not be multiplied without necessity.

article thumbnail

SIA Board of Directors Updates Bylaws to Enhance Member Engagement

Security Industry Association

On March 23, 2021, the Security Industry Association (SIA) Board of Directors unanimously approved several amendments to the SIA Bylaws to better reflect association best practices and increase overall member engagement. . Among the key approved changes, the SIA Nominations Committee will manage a formal process for SIA members to recommend individuals for consideration as potential members of the SIA Board of Directors.

article thumbnail

Occam’s Razor and Business Continuity

Business Continuity Today

William of Occam was an English Franciscan friar and philosopher who lived from 1287 to 1347. Perhaps his most famous contribution to philosophy (and a variety of other fields, such as mathematics, biology, religion, and others) is what has become known as Occam’s razor. The principle is usually stated as: “Entities should not be multiplied without necessity.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Security Industry Association Announces Program for Part 1 of the Virtual 2021 SIA GovSummit

Security Industry Association

SIA’s annual public policy and government security technology conference will take place as a three-part virtual event starting April 28. SILVER SPRING, Md. – The Security Industry Association (SIA) has announced the agenda and speaker lineup for Part 1 of the 2021 SIA GovSummit , its annual public policy and government security technology conference.