article thumbnail

Why All CISOs Need to Prioritize Quantum Tech Today

FS-ISAC

Major technological shifts do not happen in a linear fashion. Quantum sensing could also be used for internet of things (IoT), mobile banking, and more. However, that does not mean you have ten years not to prioritize quantum technologies. In finance, trading requires time measurements down to the nanosecond and beyond.

article thumbnail

Why I no longer look at financial impacts when conducting a BIA

Plan B Consulting

This week I spent some time teaching the GPG course in-house for a bank. I then looked at the £10m figure, which was a real figure the company banked every day, confirmed by the finance department. This has now fallen out of fashion and I have not seen anyone using it recently. The days of taking a year to do the BIAs are gone.

Fashion 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why I no longer look at financial impacts when conducting a BIA

Plan B Consulting

This week I spent some time teaching the GPG course in-house for a bank. I then looked at the £10m figure, which was a real figure the company banked every day, confirmed by the finance department. This has now fallen out of fashion and I have not seen anyone using it recently. The days of taking a year to do the BIAs are gone.

Fashion 52
article thumbnail

Ransomware attack: Who ya gonna call, Mike?

Plan B Consulting

I was told about an organisation which had been attacked and the ransom was the exact amount the organisation had in their bank account when the attack occurred. Attacks take place over hours and days Attacks and negotiations are conducted in a speedy fashion over hours and days, not weeks and months like during a kidnap negotiation.

Travel 52
article thumbnail

Ransomware attack: Who ya gonna call, Mike?

Plan B Consulting

I was told about an organisation which had been attacked and the ransom was the exact amount the organisation had in their bank account when the attack occurred. Attacks and negotiations are conducted in a speedy fashion over hours and days, not weeks and months like during a kidnap negotiation. Attacks take place over hours and days.

Travel 52
article thumbnail

Everything You Need to Know About Business Continuity Plans

Erwood Group

Remote access capabilities (VPN) can accommodate large-scale remote access of displaced employees either in a remote or relocated fashion. Strategy 2 – Utilize Alternate Method – Notify Bank to Utilize Previous Weeks Payroll. Specialized/unique equipment at the Workplace may be destroyed/damaged/unavailable.