This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Six months into the year, cyberattacks of all kinds have exposed vulnerabilities, cost money and instigated unrest. The biggest hacks and breaches can provide a road map for cybersecurity planning through the rest of 2022. Wired has collected the worst hacks and breaches of 2022 so far. Among the highlights: Russia/Ukraine Hacking – Russia’s digital […].
When asked, emergency managers will unfailingly say that the first critical infrastructure that needs to be restored after a disaster is communications. In this podcast I interview two T-Mobile subject matter experts, Rodney Cooper and Casey Muilenburg who, along with others, are responsible for the T-Mobile Emergency Response Team (ERT). We discuss all the components that make up an ERT, both equipment and personnel.
July 2022: Accepting responsibility and liability very early on is a critical aspect of effective crisis response, which can aid the victims’ healing and compensation process, says Tony Jaques
High-impact supply chain events are now an everyday fact of life for businesses. But while most organizations can identify the causes of these disruptions, not enough are spotting risks before they become disasters. Based on an Interos survey of 1,500 decision makers across multiple industries, the average annual cost of supply chain disruptions to each […].
Given today’s fast-paced, technology-driven environment, most IT decision-makers and business owners would agree that a server is the heart of their business. A server has multiple benefits, such as reliability, accessibility, scalability, centralized storage, data backup and collaboration. It is an essential element of an organization’s IT infrastructure.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Given today’s fast-paced, technology-driven environment, most IT decision-makers and business owners would agree that a server is the heart of their business. A server has multiple benefits, such as reliability, accessibility, scalability, centralized storage, data backup and collaboration. It is an essential element of an organization’s IT infrastructure.
If just 10 percent more students in the United Kingdom mastered Arabic, Mandarin, French, or Spanish, the economic returns could be measured in billions of British pounds. Removing the language barrier reduces trade costs.
Are you a young professional in security? Get ready – AcceleRISE 2022 is coming Aug. 1-3 to Austin, Texas! AcceleRISE, hosted by SIA’s RISE community , is the ultimate conference for young talent and newcomers to the security industry who want to take their careers to the next level. With an all-star speaker lineup, unique and interactive sessions, connections galore, after-hours fun and an exciting destination to explore, AcceleRISE is a must-attend event for the industry’s rising stars.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
Complexity tends to make everything harder, riskier, and more expensive. Think of a car engine: The more interconnected parts it has, the more avenues there are for engine failure, the more safeguards it needs to keep running, and the more likely it is to need service. The cloud is no different. Whether public, private, or hybrid, the mass migration of workloads to the cloud, while potentially starting to slow down from its breakneck pace, has introduced new levels of complexity to application d
July 2022: Phil Trendall senses that both the media and the general public see terrorism as something that is a long way down the agenda of things to be worried about
Which code or standard applies to hazardous materials? How much of a particular hazardous material can be stored or used? What floor of the building can that hazardous material be stored or used on? These are all questions some are faced with daily. There is an assumption that people, such as facility managers, building owners, and first responders, just inherently know when a material is a. [[ This is a content summary only.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
Yoon Suk-yeol, South Korea's conservative new president, has shown that he is in lockstep with U.S. President Joe Biden on foreign policy. During Biden's Indo-Pacific trip last month, their conversations in the security domain suggest Yoon's overlapping tenure with Biden heralds a golden era in the U.S.-South Korea alliance.
About two weeks ago I posted a notice about a new report titled Streamlining Emergency Management. So far I have not talked to any who has read it fully or who is planning to act on any or the recommendations. I would love to hear if anyone cares about the findings.
The Security Industry Association (SIA) is pleased to support the U.S. Department of Labor’s Occupational Information Network (O*NET) program, a free resource for millions of job seekers, employers, veterans, educators and students. SIA invites its members to participate in this important initiative by contributing information on their roles within the security industry.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
The current situation in Ukraine suggests that neither side will be able to achieve a decisive military victory that settles the disputes that led to the war. Ukraine and Russia theoretically could reach an agreement to stop the fighting, but the politics between the two sides and centuries of confrontational history do not suggest a lasting peace.
Hey SIA members! Here are the top things you need to know about our latest activities and resources, upcoming events and opportunities and more. Welcome, New Members! The Security Industry Association (SIA) would like to welcome its newest members: Atrium Health , Charlotte Water , Crux Technology & Security Solutions , Onsolve , Polaris Corporate Risk Management , SHP and Texadia Systems.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
When the war in Ukraine ends, the country will in all likelihood undergo a massive reconstruction. Ukraine could rebuild in a way that would both lower its carbon footprint and construct infrastructure resilient to the effects of climate change.
Data storage is as much about security as anything else. That’s why, in addition to our own cutting-edge, built-in data security features, we partner with the world’s leading security specialists— Cohesity, Commvault, Veritas, Rubrik, and Veeam — to help you keep your data safe. Together, we’re helping to cover every angle of your data security strategy.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
Many organizations are not well-prepared to respond to emergencies. In most cases, two factors are to blame: a lack of thought on the part of the leadership about what might … The post Practice Makes Perfect: How to Be Ready to Handle an Emergency appeared first on MHA Consulting.
Cyber-attacks are some of the most complex, common, and challenging risks for modern organizations. They’re happening at such a rapid pace now; organizations can no longer sit back and think about what they might do if they experience an attack. Today, focus must be on developing adaptable and flexible resilience plans that ensure confidence in your organization’s ability to respond when one (or multiple) attacks occur.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content