This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
What does disaster readiness look like for the Pacific Northwest from a person coming to the topic with a fresh point of view? Brian Landon , an attorney, writer and director is working on a master’s degree and his project is examining how the Cascadia Subduction Zone will impact the State of Oregon and other parts of the Northwest. He comes to the task with more of a world view having lived and worked in other countries.
As customers migrate to the cloud, many struggle to adapt business continuity and operational plans from their on-premises environments. This affects the resilience of critical business applications and can stall cloud adoption. This two-part blog series will provide guidance on implementing IT resilience strategies. In Part I, we’ll review challenges commonly experienced by executive builders.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
Autism, or autism spectrum disorder (ASD) is a complex, lifelong developmental disability. Because autism is a spectrum disorder, each person will have a distinct set of strengths and challenges. Characteristics may present as: finding it hard to communicate and interact with other people finding it hard to understand how other people think or feel getting anxious or upset about unfamiliar situations and social events taking longer to understand information repetitive thoughts or behaviours Some
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
With the right project management methodology, project management offices (PMOs) can assist their organizations in improving business outcomes — but this requires more than recognizing organizational priorities. For most companies, recent external forces such as COVID-19 and industry disruptions brought about by the pace of digital change have shifted company goals and priorities, making it necessary to re-evaluate whether the project methodologies they have in place can effectively and efficien
READ TIME: 5 MIN March 31, 2021 The Difference Between IT & “Almost” IT What is IT and Almost IT? Well, IT is a Managed Service Provider (MSP), that employs hundreds of tenured IT experts available 24/7/365. Almost IT are 10 IT professionals in a 20-person company with 200 customers. Think Amazon versus a local delivery service: one has a multitude of staff, resources, and partnerships to deliver purchases the next dayor even the same dayacross the country, and the other is a ki
In this video, learn about several recently introduced Right to Repair bills and how SIA is engaging on behalf of members on this issue. “Right to Repair” legislation, as introduced in several states in 2021, would mandate original equipment manufacturers of digital electronic equipment to provide unauthorized repair providers with diagnostic and repair information, along with tools, related parts and software – but without requiring any of the critical consumer protections afforded by authorize
Today is International Trans Day of Visibility! An annual commemoration dedicated to raising awareness of discrimination faced by transgender people worldwide, as well as a celebration of their contributions to society. One of the core tenets of the culture at AA is that everyone should feel able to come as they are, that the environment we foster shouldn’t cause anyone to feel discriminated against, or unable to be their whole selves no matter the reason.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
Employees working from home on a company-provided computer are demonstrating a clear lack of cybersecurity knowledge through high-risk behavior, according to a report released by Ivanti. passwords, consumer websites Using work passwords for consumer websites The report found that one in four consumers admit to using their work email or passwords to log in to… Continue reading.
New Security Industry Association (SIA) member Riley provides a global security risk management system that streamlines security risk management policy implementation, including duty of care compliance. The company is headquartered in Arlington, Virginia, with an additional office in St. Augustine, Florida. SIA spoke with Jake Allen, president and CEO of Riley, about the company, the security industry and working with SIA.
What Operational Resilience really means, and how it compares with business continuity. This week a couple of things have come together to inspire this bulletin. I have been working on an operational resilience exercise for a client, which is based around taking a ‘severe but plausible scenario’ and then checking whether the scenario breaches the organisation’s impact tolerances.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
John Boyd created a four-step process for making effective decisions in high-stakes situations called the OODA Loop. It involves collecting relevant information, recognizing potential biases, deciding, and acting, then repeating the process with new information. Eric McNulty and his team at the NPLI took Boyd’s concept a little farther with the POP-DOC Loop by adding two steps.
This week I shares my thoughts on the evolution of journalism and how crisis communication plans should be adapted to keep up with the changes. I have been working on some strategic/crisis level plans and have been thinking about what should go into the crisis communication section of the plans. In quite a number of plans I have seen details of how the organisation would run a press conference, especially those whose plans were written ten years or so ago.
This week I discuss credential stuffing, a type of cyber attack which you should be looking out for! “The irony of credential stuffing is that organisations that have not suffered a direct data breach often become indirect victims when their users’ accounts are compromised due to someone else’s data breach” Debbie Walkowski, F5 Labs. Look after your passwords I like to try and use my browser to save all my passwords, as I have recently been trying to change all my log in passwords so that I have
What Operational Resilience really means, and how it compares with business continuity. This week a couple of things have come together to inspire this bulletin. I have been working on an operational resilience exercise for a client, which is based around taking a ‘severe but plausible scenario’ and then checking whether the scenario breaches the organisation’s impact tolerances.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
This week I shares my thoughts on the evolution of journalism and how crisis communication plans should be adapted to keep up with the changes. I have been working on some strategic/crisis level plans and have been thinking about what should go into the crisis communication section of the plans. In quite a number of plans I have seen details of how the organisation would run a press conference, especially those whose plans were written ten years or so ago.
This week I discuss credential stuffing, a type of cyber attack which you should be looking out for! “The irony of credential stuffing is that organisations that have not suffered a direct data breach often become indirect victims when their users’ accounts are compromised due to someone else’s data breach”. Debbie Walkowski, F5 Labs. Look after your passwords.
John Boyd created a four-step process for making effective decisions in high-stakes situations called the OODA Loop. It involves collecting relevant information, recognizing potential biases, deciding, and acting, then repeating the process with new information. Eric McNulty and his team at the NPLI took Boyd’s concept a little farther with the POP-DOC Loop by adding two steps.
ROI on budget? Worried about your business continuity budget? This week I discuss how to demonstrate BC’s return on investment within your organisation. Every year you get a budget of £20,000 (some of you are already saying “I wish”) and you have this money to deliver your business continuity programme. Your organisation buys into business continuity as it feels it protects value within the organisation and there is a demand from numerous suppliers to have it in place, so it is assured tha
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
ROI on budget? Worried about your business continuity budget? This week I discuss how to demonstrate BC’s return on investment within your organisation. Every year you get a budget of £20,000 (some of you are already saying “I wish”) and you have this money to deliver your business continuity programme. Your organisation buys into business continuity as it feels it protects value within the organisation and there is a demand from numerous suppliers to have it in place, so it is assured tha
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content