article thumbnail

Business Continuity 2025 – What Will Future Incidents Look Like?

Plan B Consulting

In the first bulletin of his new ‘Business Continuity 2025’ series, Charlie discusses what incidents might look like in 2025. I intend to write a series of bulletins over the next few months where I imagine what business continuity might look like in 2025.

article thumbnail

Business Continuity 2025 – What Will Future Incidents Look Like?

Plan B Consulting

In the first bulletin of his new ‘Business Continuity 2025’ series, Charlie discusses what incidents might look like in 2025. I intend to write a series of bulletins over the next few months where I imagine what business continuity might look like in 2025.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

02/04/2015 Does BC really manage the real risks to your organisation?

Plan B Consulting

This week Charlie discusses the remit of a typical Business Continuity Manager. This week I noticed that there have been large power outages in Holland effecting Schiphol Airport and also it seems, half of Turkey. The more and more I look at the BIA part of the business continuity lifecycle I am not sure it is fit for purpose.

article thumbnail

02/04/2015 Does BC really manage the real risks to your organisation?

Plan B Consulting

This week Charlie discusses the remit of a typical Business Continuity Manager. This week I noticed that there have been large power outages in Holland effecting Schiphol Airport and also it seems, half of Turkey. The more and more I look at the BIA part of the business continuity lifecycle I am not sure it is fit for purpose.

article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

There have been major cyber attacks on SCADA systems, the biggest of which is the Ukraine Power outage of 2015, leaving more than 230,000 people without power. Most of the attack on SCADA systems are people gaining access to systems and then manipulating them to cause damage or installing malware that had a similar effect.