Remove Authorization Remove Mitigation Remove Publishing Remove Vulnerability
article thumbnail

Book Review: Case Studies in Disaster Recovery

Recovery Diva

Publisher: Butterworth-Heinemann, Elsevier, Oxford, UK and Cambridge, Massachusetts, USA. Each chapter is written by (a) a different author(s). The discussions are based on many years of practical experience and/or research conducted by the authors. Volume Editor: Jane Kushma, Ph.D. December 2022. Pages: 272.

article thumbnail

Guest Opinion: Why It’s Time to Get Serious About the Risk of Commercial Drones

Security Industry Association

Comprehensive security program development continues to lag when it comes to drone threat assessments and risk mitigation action. Public space is more vulnerable to a myriad of threats posed by commercial drones. The plan provides eight key recommendations. What can and should the federal government do?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Identifying Important Business Functions: Your Building Blocks for DORA Compliance and Incident Management

Fusion Risk Management

The ability to be compliant and mitigate the impact of disruption through a robust incident management strategy begins with understanding the most critical business functions that comprise your organization. Doing so will also ensure that appropriate measures are taken in the case of an incident.

article thumbnail

Guest Opinion: It’s Time for Counter-Unmanned Aerial/Aircraft Systems in the Private Sector

Security Industry Association

Over a year later, in April 2022, the current administration published a national action plan concerning domestic counter-unmanned aerial/aircraft systems (CUAS). As far as CUAS goes within the private sector and public events, this is the best solution to help mitigate a nefarious act from occurring. Let’s keep the conversation going!

article thumbnail

Securing Mass Gathering Events: A Simple Design Framework That Considers the Air Domain

Security Industry Association

He is also the author and provider of a series of online training courses. Like security program development, planning for an event is a “team sport” that begins with the foundational work of a threat, vulnerability and risk assessment (TVRA) and ends with internal and external stakeholder rehearsals and exercises. He is a retired U.S.

article thumbnail

The Colonial Pipeline Hack: Failure in Risk Management

LogisManager

For example, a forensic finding made during an evaluation of Colonial Pipeline noted numerous known and preventable vulnerabilities, such as unpatched and outdated systems, that likely led to the security breach. About the Author: Steven Minksy. Data Governance.

article thumbnail

Silicon Valley Bank (SVB) Failures in Risk Management: Why ERM vs GRC

LogisManager

By taking a risk-based approach, they have been able to mitigate potential financial risks associated with third-party vendors. This mitigated the risk of losing money if the collection agency went bankrupt. Learn from successful organizations with strong Chief Risk Officers and Enterprise Risk Management programs.

Banking 98