article thumbnail

Business Continuity 2025 – What Will Future Incidents Look Like?

Plan B Consulting

In the first bulletin of his new ‘Business Continuity 2025’ series, Charlie discusses what incidents might look like in 2025. I intend to write a series of bulletins over the next few months where I imagine what business continuity might look like in 2025. appeared first on PlanB Consulting.

article thumbnail

Business Continuity 2025 – What Will Future Incidents Look Like?

Plan B Consulting

In the first bulletin of his new ‘Business Continuity 2025’ series, Charlie discusses what incidents might look like in 2025. I intend to write a series of bulletins over the next few months where I imagine what business continuity might look like in 2025. appeared first on PlanB Consulting.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Everything You Need to Know About Business Continuity Plans

Erwood Group

Everything You Need to Know About Business Continuity Plans. Business Continuity Plans. Chances are if you’re visiting this page, you are new to the concept of Business Continuity Plans (BCPs) and business continuity overall. Definition of Business Continuity Plan.

article thumbnail

Cyber Incident Management – Looking Through the Wrong End of the Telescope

Plan B Consulting

Business recovery and continuity of operations If we carry out reputation and stakeholder management, we can limit the impact of the cyber incident. Lastly, existing business recovery and continuity of operation plans should also be used during a cyber breach. Reputation and stakeholder management 2.

article thumbnail

Cyber Incident Management – Looking Through the Wrong End of the Telescope

Plan B Consulting

Business recovery and continuity of operations. Lastly, existing business recovery and continuity of operation plans should also be used during a cyber breach. The incident management framework developed for business continuity incidents can be adopted to deal with cyber incidents, with a few tweaks.