August, 2018

article thumbnail

Human performance: Take note of error precursors 

Crisis Response Journal

Welcome to the fifth blog in our Human Performance series and thank you for the feedback to the fourthblog in this series (if you have missed my previous blogs, you can catch up here).

100
100
article thumbnail

How to allocate budget for a well-rounded cybersecurity portfolio

Behavior Group

Getting the C-levels to approve an IT security budget is probably one of the most difficult and exasperating tasks that security professionals and IT managers have to do each year. cybersecurity portfolio, endpoint detection and response, malware protection Information security doesn’t contribute directly to the bottom line in most companies and management often views it… Continue reading.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Deal or No Deal

Plan B Consulting

This week Charlie looks at Brexit and the role of the business continuity manager. At lunchtime yesterday, I asked everyone in the office whether there was a specific subject I should be writing this bulletin on. There weren’t any sensible suggestions this week! Whilst packing up to go home, I put the radio on and it became clear what I should talk about; contingency planning for a Brexit ‘no deal’.

article thumbnail

The Sudden spring of Delhi

arunpraka shray

15 August 2018. 07:48. It’s been ages since I have listened to a Mehfil e Sama at Hazrat Nizamuddin Auliya’s royal courtyard in Delhi. Yesterday was my long awaited meeting with my friend & author Meher Murshed , his nine years of research has resulted into ‘Song of the Dervish’, a bloomsbury gem. Almost three years back I had heard Fareed Ayaz Saab in the same courtyard at a short recital hosted by Peerzada Altamash Nizami .

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Strategise to minimise #BrandDamage

Marketpoint Recall

Crises may be inevitable, but it is how they are handled that makes a massive difference. Research shows that companies today have an 82% chance of experiencing a corporate disaster of some kind, which, within a 5 year period, can result in a 20% loss of market value. 20 years ago, the likelihood was just 20%. An evident consequence of our evolving digital world and free flow of information that can spread so rapidly.

More Trending

article thumbnail

A world at your fingertips – developing your career through online learning 

Crisis Response Journal

In the first instalment of my blog on free international training and education to develop your careers, I highlighted the flagship of emergency management distance learning from the United States - the Emergency Management Institute.

Education 100
article thumbnail

Not enough CISOs and business leaders cooperate on a cybersecurity plan and budget

Behavior Group

With the proliferation of more and more sensitive data, expanding connectivity, and the adoption of automated processes, new research from Accenture reveals that C-suite and IT decision makers need to embrace a different approach to cybersecurity to effectively protect against future cyber risks. cybersecurity plan and budget, cybersecurity strategy While most companies have a CISO or assigned… Continue reading.

article thumbnail

Deal or No Deal

Plan B Consulting

This week Charlie looks at Brexit and the role of the business continuity manager. At lunchtime yesterday, I asked everyone in the office whether there was a specific subject I should be writing this bulletin on. There weren’t any sensible suggestions this week! Whilst packing up to go home, I put the radio on and it became clear what I should talk about; contingency planning for a Brexit ‘no deal’.

article thumbnail

eBIA – The eBRP Way

eBRP

Definition: A Business Impact Analysis (BIA) is the cornerstone of creating a BCM program. Basically, a BIA helps prioritize restoration efforts in the initial response activities following an operational disruption. A secondary objective of a BIA is identification of all operational dependencies to enable successful business restoration.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Disaster Recovery You'll Want to Use

VOX Veritas

Failure happens. There is nothing you can do to stop it. Disaster recovery only helps after something bad happens. Resiliency Platform's full automation and orchestration identifies risks to protect against disruptions as well as automates recovery when disruption still occurs.

article thumbnail

3 Post-Hurricane Safety Precautions for Facility Managers

Alert Media

The post 3 Post-Hurricane Safety Precautions for Facility Managers appeared first on AlertMedia.

article thumbnail

The importance of record keeping and the pocket notebook in emergency incidents 

Crisis Response Journal

The police are used to keeping records and use notebooks at incidents as a matter of routine, but not so other emergency responding services, according to Jon Chapman, who takes a short look at record keeping at and around incidents, and why this is so vi By Jon Chapman

100
100
article thumbnail

Why information security need to be empowered to manage data breaches

Behavior Group

2017 saw over 2 dozen major security breaches in 2017. While the public may have grown numb to the number and constant stream of data breaches reported, outrage has been building around the delays in accompanying disclosures of those breaches and questionable actions that have occurred in between when a data breach has occurred and… Continue reading.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Extreme Business Continuity – Lessons from Hurricane Maria

Plan B Consulting

Reflecting on his time in Puerto Rico, Charlie shares what he learned from the experiences of those impacted by the events of Hurricane Maria. This week I have been delivering training and exercises in Puerto Rico, whilst learning from the experiences of those who were involved in Hurricane Maria. For this bulletin, I thought I would share some of the human experiences and what I learned from interviewing a number of those impacted by the hurricane.

article thumbnail

Not just for special forces training - centre has great civilian services potential 

Crisis Response Journal

Editorial Advisory Panel Member Rob McAlister takes an inside look at Jordan's special forces training centre.

100
100
article thumbnail

Victims of a ‘victimless’ crime 

Crisis Response Journal

Last May, the body of a murdered man was found in a warehouse in the neighborhood of Tepito in Mexico City.

100
100
article thumbnail

Innovation in healthcare: A hacker’s dream and CISO’s nightmare ?

Behavior Group

It’s hard not to be excited about artificial intelligence and machine learning in pure technology terms, but applying these innovations to the healthcare sector has the potential to do truly great things for humanity. Just imagine if these technologies could help us to diagnose and treat some of the world’s most pressing health crises. Innovation… Continue reading.

article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha

article thumbnail

New insider attack steals passwords by reading thermal energy from keyboards

Behavior Group

After entering a password, your regular computer keyboard might appear to look the same as always, but a new approach harvesting thermal energy can illuminate the recently pressed keys, revealing that keyboard-based password entry is even less secure than previously thought. steals passwords,thermal energy from keyboards Computer Science Ph.D. students Tyler Kaczmarek and Ercan Ozturk… Continue reading.

article thumbnail

Has your security evolved to counter Ocean’s Eleven of threat scenarios?

Behavior Group

In assessing how the cyber threat and mitigation landscape has evolved over time, I often think of the ways that “cops and robbers” movies have changed: In the old days, a typical scene would feature a bad guy walking into a bank with a note indicating that he had a gun, and that he wanted… Continue reading. The post Has your security evolved to counter Ocean’s Eleven of threat scenarios?

article thumbnail

Full vs. Partial Coverage of Your Data

VOX Veritas

Friday, August 10 th is your opportunity to learn more and see a live demo of Veritas Resiliency Platform. Tune into the live stream of Cloud Field Day 4 ( #CFD4 ) at 11 am pacific and see how software defined resilience can benefit your organization.

article thumbnail

Extreme Business Continuity – Lessons from Hurricane Maria

Plan B Consulting

Reflecting on his time in Puerto Rico, Charlie shares what he learned from the experiences of those impacted by the events of Hurricane Maria. This week I have been delivering training and exercises in Puerto Rico, whilst learning from the experiences of those who were involved in Hurricane Maria. For this bulletin, I thought I would share some of the human experiences and what I learned from interviewing a number of those impacted by the hurricane.

article thumbnail

Creating a Duty of Care Policy

Alert Media

The post Creating a Duty of Care Policy appeared first on AlertMedia.

article thumbnail

Cloud migration can be hard, Veritas helps make it easy

VOX Veritas

Myth: Cloud migration is too complex. The truth is, Veritas can make it easy! Get clear on cloud and #TransformYourBiz.

40
article thumbnail

Writing Incident Management Objectives

Plan B Consulting

This week, Charlie shares some advice on how to write incident management objectives. For this week’s bulletin, instead of commenting on an item in the news, I thought I would share some technical information on how to write incident objectives. During an incident, it is seemingly obvious that your objective is to solve the problem and return the organisation back to normal as quickly as possible.

article thumbnail

Writing Incident Management Objectives

Plan B Consulting

This week, Charlie shares some advice on how to write incident management objectives. For this week’s bulletin, instead of commenting on an item in the news, I thought I would share some technical information on how to write incident objectives. During an incident, it is seemingly obvious that your objective is to solve the problem and return the organisation back to normal as quickly as possible.