Sat.Jan 26, 2019 - Fri.Feb 01, 2019

article thumbnail

2018 Set a New Record for Security Vulnerabilities

Behavior Group

With more than 16,500 known security vulnerabilities being catalogued, 2018 set a new record over last year’s previous record of 14,714. CEOs and security teams of all businesses should take note of this issue, given the recent enforcement of the General Data Protection Regulation (GDPR), which penalizes corporate data/privacy breaches of EU citizens with staggering… Continue reading.

article thumbnail

Not another BCM Program audit?

Stratogrid Advisory

Not another BCM Program audit? Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 4 minutes Another Business Continuity Management (BCM) Program audit. Again? Some organizations think of audits as tedious, and often unnecessary, accounting procedures, rather than as a powerful business tool that can be used to improve the organization’s capabilities.

Audit 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NFPA 1600: What It Is and Why You Need It

Alert Media

The post NFPA 1600: What It Is and Why You Need It appeared first on AlertMedia.

article thumbnail

Cyber Incident Management – Looking Through the Wrong End of the Telescope

Plan B Consulting

This week Charlie discusses why it is important for senior managers to be involved in cyber incident management. This week, I thought we might give Brexit a break, I think we all need one! I have been wanting to write this bulletin for a while, and I have now finally got the time to do it. It also nicely ties in with my preparation and update of our ‘Managing and Preparing for Cyber Incidents’ course, which takes place on the 4th-5th March 2019, in London.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

Cybercrime Could Cost Companies $5.2 Trillion Over Next Five Years

Behavior Group

Companies globally could incur $5.2 trillion in additional costs and lost revenue over the next five years due to cyberattacks, as dependency on complex internet-enabled business models outpaces the ability to introduce adequate safeguards that protect critical assets. cybercrime, cybercrime cost Based on an Accenture survey, the report —Securing the Digital Economy: Reinventing the Internet… Continue reading.

More Trending

article thumbnail

Polar Vortex

Disaster Recovery

Educational institutions and commercial establishments in the north central region of the country continued to remain closed on Thursday, February 1, owing to sub zero temperatures. The polar vortex has wreaked havoc throughout the week, including fatalities, injuries and damage to property. The public were strongly advised against venturing outdoors.

article thumbnail

Cyber Incident Management – Looking Through the Wrong End of the Telescope

Plan B Consulting

This week Charlie discusses why it is important for senior managers to be involved in cyber incident management. This week, I thought we might give Brexit a break, I think we all need one! I have been wanting to write this bulletin for a while, and I have now finally got the time to do it. It also nicely ties in with my preparation and update of our ‘Managing and Preparing for Cyber Incidents’ course, which takes place on the 4th-5th March 2019, in London.

article thumbnail

Machine learning for proactive support: Veritas Predictive Insights can do that

VOX Veritas

Bolstered by hundreds of millions of telemetry data points, Predictive Insights is able to deliver compelling, data-driven IT guidance so customers experience improved ROI on Veritas appliances.

40
article thumbnail

Vendor Malpractice

Business Resilience Decoded

Episode 14: "Vendor Malpractice" with Vicky McKim of Aureon Consulting. Contact Vicky McKim at: [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 14: "Vendor Malpractice" with Vicky McKim of Aureon Consulting. Contact Vicky McKim at: [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Cost-effective DR with AWS and Resiliency Platform

VOX Veritas

View this video to see how Veritas Resiliency Platform and AWS provide cost-effective recovery.

article thumbnail

Vendor Malpractice

Business Resilience Decoded

Episode 14: "Vendor Malpractice" with Vicky McKim of Aureon Consulting. Contact Vicky McKim at: [link]. Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 14: "Vendor Malpractice" with Vicky McKim of Aureon Consulting. Contact Vicky McKim at: [link]. Business Resilience Decoded: www.drj.com/decoded/ twitter.

article thumbnail

Vicky McKim 014

Business Resilience Decoded

"Vendor Malpractice" with Vicky McKim of Aureon Consulting. Contact Vicky McKim at: [link]. Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded "Vendor Malpractice" with Vicky McKim of Aureon Consulting. Contact Vicky McKim at: [link]. Business Resilience Decoded: www.drj.com/decoded/ twitter.