This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Raising awareness for European Cyber Security Month, Charlie looks at the Equifax data hack, as an example of how cyber security incidents should not be handled. One of the things I noticed during my research when developing BC Training’s Managing and Preparing for Cyber Incidents course , was the lack of guidance on how to respond to a cyber incident.
Chief Information Officer, cio Digitalization and technological innovation are changing the nature of the job of the CIO. Leaders are rapidly scaling their digital businesses, making the remainder of this year and 2018 a defining moment for CIOs who don’t want to be left behind. The 2018 CIO Agenda Survey gathered data from a record… Continue reading.
Raising awareness for European Cyber Security Month, Charlie looks at the Equifax data hack, as an example of how cyber security incidents should not be handled. One of the things I noticed during my research when developing BC Training’s Managing and Preparing for Cyber Incidents course , was the lack of guidance on how to respond to a cyber incident.
Cybersecurity Vulnerabilities People are cautious of physical theft, but the security of digital assets is often ignored. The simplest actions can have devastating consequences for your data security. Outdated software, weak credentials, and malware all create opportunities for data exfiltration. Studies show that many users believe they won’t be targeted by hackers and aren’t aware… Continue reading.
April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content