article thumbnail

EP18: The Bus is Coming! What do we do? | David Lindstedt Mark Armour James Green

The Failover Plan Podcast

Guest Bios: Dr. David Lindstedt is a speaker, author, and champion for business continuity. Along with Mark Armour he founded AdaptiveBCP.org and authored Adaptive Business Continuity: A New Approach. He is the founder of Adaptive BC Solutions (AdaptiveBCS.com) and creator of three BC software systems.

Logistics 130
article thumbnail

COVID-19 and your response

KingsBridge BCP

If you take only one thing from this post, let it be this: Most do not realize that if they have been planning for ‘the big 4 results’ of any business interruption: no building, no people, no systems and no third-party suppliers, along with following the direction of health authorities, they likely have everything they need. .

BCP 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Create a Data Breach Response Team

Pure Storage

This role could be an in-house team, outsourced, or hybrid. If outsourced or hybrid, a designated employee should act as a liaison. Local law enforcement authorities and the FBI , to whom possible compliance breaches and potential penalties should be reported, and where you might get additional support.

article thumbnail

Regulatory Changes Have the Potential to Enhance Client Engagement and Service Provider Profits

Prism International

In some cases, the Compliance Officer is even required to register with the relevant data protection authority.). Under the regulations, the requirement to have a Compliance Officer can be outsourced. Among the changes to these regulations is a renewed and enhanced requirement for service providers (a.k.a.

article thumbnail

Capita Hack: A Case Study of What Not To Do …

Plan B Consulting

About Capita Capita is a large outsourcing company based in the United Kingdom. The company specialises in providing business process outsourcing, professional support services, and technology-enabled solutions, to both public and private sector organisations. It might also deter organisations from using their cyber services.

article thumbnail

Cyber Incident Response Plans – Turning Words into Action

Bernstein Crisis Management

Or in outsourcing the creation of an IRP to an outside consultant. This includes technical team members of course, but also legal, human resources and public relations experts, as well as the executive or executives with authority to act quickly and decisively in an emergency. This brings us to the first challenge.

article thumbnail

Successfully Navigating Identity Management Strategies

Risk Management Monitor

Data security spans two areas of organizational risk: unauthorized data use and privacy issues associated with authorized data processes. Traditional data loss prevention approaches, such as full data discovery, have arduous requirements and usually involve mandatory outsourcing for development and monitoring.