Remove 2017 Remove Authorization Remove Outage Remove Security
article thumbnail

Dynamic Risks: Working Definitions and Implications for Risk Management Teams

On Solve

As our OnSolve leadership team reflects on 2020 and 2021, we note a trend in our conversations with Business Continuity (BC), Enterprise Risk Management (ERM), Physical Security (PS), Travel Risk Management (TRM) and Supply Chain Risk Management (SCRM) leaders. A Recent Trend. Dynamic Risks: A Working Definition. Many risks are unrelated.

article thumbnail

Business Continuity 2025 – What Will Future Incidents Look Like?

Plan B Consulting

Again, the devastating hurricanes in the Caribbean in 2017 can be seen as part of this change. When BC started, I know of a Scottish Local Authority which spent £100k on external consultants to develop their BC plans. I think cyber security is a little like car security used to be.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Business Continuity 2025 – What Will Future Incidents Look Like?

Plan B Consulting

Again, the devastating hurricanes in the Caribbean in 2017 can be seen as part of this change. When BC started, I know of a Scottish Local Authority which spent £100k on external consultants to develop their BC plans. I think cyber security is a little like car security used to be.

article thumbnail

The Best Risk Management Courses on Udemy to Consider for 2021

Solutions Review

This course also includes two case studies of what happens when risk management fails, as demonstrated by the Amazon Web Services outage and Equifax data breach that both occurred in 2017. People generally manage their affairs in order to be as happy and secure as their environment and resources will allow. GO TO TRAINING.

article thumbnail

Guest Post: Cybersecurity Incidents Lead to New Standards, Requirements

Security Industry Association

Virtually no security manufacturers are exempt from the perils of cybercrime. Because the traditional security industry relies on a multitiered model where many products go from manufacturer to distributor to security integrator to end user, manufacturers often are unaware of the final destinations of – and applications for – their products.