This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
This month Rob Fagan’s blog about free emergency management training and education focuses on a very timely and useful source: the Safe + Ready Institute.
The immediate reaction to a cyber-security incident is the FUD factor (Fear, Uncertainty and Doubt); more like ‘chickens running around with their head cut off’. An agile response requires tested and documented Incident Response Plans – including Crisis Management, Business Continuity and IT Disaster Recovery Plans. Automating the workflow facilitates seamless collaboration and the ability to Monitor, Measure & Manage the activities that are critical to effective Cyber Security Incident Resp
Information security threats are intensifying every day. Organizations risk becoming disoriented and losing their way in a maze of uncertainty, as they grapple with complex technology, data proliferation, increased regulation and a debilitating skills shortage. Solid Security Structure, information security threats The year 2020 will dawn on a hyper-connected world where the pace and scale… Continue reading.
Forty five years after the hostage taking that gave birth to the concept of Stockholm syndrome, Lina Kolesnikova says that emergency services workers need to be aware of the paradoxical phenomena whereby abused people develop emotional dependency on their By Lina Kolesnikova
Charlie discusses the importance of quality over quantity when it comes to business continuity documents. This week I have been reviewing the level of emergency response, business continuity and crisis management of a utility in the Caribbean. As part of the review, I was asked to look at their security documents and procedures. I came across an inch-thick security manual, which I had to blow the dust off before looking at the contents inside.
Charlie discusses the importance of quality over quantity when it comes to business continuity documents. This week I have been reviewing the level of emergency response, business continuity and crisis management of a utility in the Caribbean. As part of the review, I was asked to look at their security documents and procedures. I came across an inch-thick security manual, which I had to blow the dust off before looking at the contents inside.
Charlie discusses the importance of quality over quantity when it comes to business continuity documents. This week I have been reviewing the level of emergency response, business continuity and crisis management of a utility in the Caribbean. As part of the review, I was asked to look at their security documents and procedures. I came across an inch-thick security manual, which I had to blow the dust off before looking at the contents inside.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content