Sat.May 22, 2021 - Fri.May 28, 2021

article thumbnail

Tornado Risk Reduction – An American Success Story

DisasterDoc

The US experiences more tornadoes than any other country on earth, with an average of over 1,000 tornadoes recorded each year. (Canada is a distant second, with around 100. The post Tornado Risk Reduction – An American Success Story appeared first on DisasterDoc.

article thumbnail

How Backup and Disaster Recovery Protects South Florida Businesses

LAN Infotech

How Backup and Disaster Recovery Protects South Florida Businesses. Many South Florida businesses operate with a sense of unrealistic optimism when it comes to data loss and disaster recovery. However, the reality can be quite different and can negatively affect your business if you’re not vigilant. As the rate of digitalization increases, so does the risk of data loss.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Duty of Care: An Employer’s Guide to Legal and Moral Responsibilities

Alert Media

The post Duty of Care: An Employer’s Guide to Legal and Moral Responsibilities appeared first on AlertMedia.

article thumbnail

Get Out the Map: Why Your BCM Program Needs a Roadmap

BCM METRICS

Too many business continuity management programs are reactive rather than proactive. Good BCM programs exist in a permanent posture of executing on a roadmap, their custom-crafted plan for the future that is focused on reducing risk and increasing compliance with standards. Missing: A Coherent Set of BCM Program Goals From my perspective as […].

BCM 63
article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Cybersecurity Experts Prioritize Data Protection in 2021

Donyati

Last year’s sudden (and nearly synchronized) shift out of the office and onto the cloud was immediately followed by the start of an unending stream of high-profile data breaches. For companies across the board, the alarm has sounded on the escalating threat of these cybersecurity events. The public, too, has taken notice: consumer information, including sensitive data such as healthcare records.

More Trending

article thumbnail

Predicting Cloud Computing Trends: 2021 Edition

Talkingpoint

During this past year of the pandemic, IT teams have had to reimagine the corporate network. Remote workforces could no longer use their office networks to connect with enterprise applications. Overnight, cloud computing became essential for getting employees back online. Many IT […]. The post Predicting Cloud Computing Trends: 2021 Edition appeared first on TierPoint.

article thumbnail

Isle of Coll Fire – A view from the frontline

Plan B Consulting

This week I talk about the recent fire on the remote island of the Isle of Coll. I discuss how the professionals and community responded and how this incident compares to others he has read about. I tell people how to manage disasters not actually take part in one! As a consultant, I tell people how to manage disasters and incidents, but rarely do I get caught up in one, nor am I involved in the response.

article thumbnail

Three Access Control Sessions at ISC West That You Can’t Miss

Security Industry Association

ISC West 2021 is coming up July 19-21 in Las Vegas, and the Security Industry Association (SIA) and ISC West recently revealed full conference details for the SIA Education@ISC West program, including keynote presentations from top luminaries and 65+ sessions on the most current business trends, technologies and industry developments. Among the robust lineup of conference sessions are several dynamic presentations related to access control.

article thumbnail

How To Protect Your Enterprises’ Sensitive Information

Assurance IT

With data and information being the most valuable asset in the world, how are you protecting your enterprise’s digital footprint? In this blog, we review the types of information that need to be protected and how to protect your enterprise’s sensitive information. What is Considered Sensitive Information? Sensitive enterprise information is any data or information that could be a risk to the company if it is stolen or released to a competitor or the public.

Banking 52
article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

What Does a Business Continuity Plan Typically Include? [Complete Guide]

LogisManager

What Does a Business Continuity Plan Typically Include? [Complete Guide]. Introduction. A business continuity plan (BCP) is your first line of defense against any challenge that threatens the core functionalities of your organization’s operations. When disaster strikes, your BCP should be there to reduce the time it takes to get things back up and running as usual again – as quickly as possible.

article thumbnail

Isle of Coll Fire – A view from the frontline

Plan B Consulting

This week I talk about the recent fire on the remote island of the Isle of Coll. I discuss how the professionals and community responded and how this incident compares to others he has read about. I tell people how to manage disasters not actually take part in one! As a consultant, I tell people how to manage disasters and incidents, but rarely do I get caught up in one, nor am I involved in the response.

article thumbnail

Why Open Source Intelligence Needs to Be Part of Your Risk Awareness Strategy

Security Industry Association

Summary: Open-source intelligence (OSINT) is a critical part of your risk profile. Properly assimilated and used, this intelligence can be extremely useful to your organization in recognizing threats and risks proactively and helping to protect lives (people), assets (buildings and fleets), operational continuity (business resilience) and reputation (brand).

article thumbnail

CMMI certifications: A complete guide

CIO Governance

The Capability Maturity Model Integration (CMMI) helps organizations streamline process improvement and encourage behaviors that decrease risks in software, product, and service development. The model provides businesses with a framework for developing better products and services, starting with a series of appraisals of process and service development, service establishment and management, and product and service acquisition.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

From Emerging Trends to Cyber Risks: a Latin American Perspective

FS-ISAC

This article is also available in Portuguese and Spanish. As part of our Latin America focus for this edition of FS-ISAC Insights, we spoke with Homero Valiatti, Superintendent of Information Security at Itaú, Brazil's largest bank and the largest financial institution in the southern hemisphere. What is your take on cyber and regulatory maturity in the region?

article thumbnail

What The Pipeline Oil Ransomware Attack TAUGHT Us

Assurance IT

With global news reporters all over the world talking about the USA Colonial Pipeline ransomware attack, you must have questions about what happened. What happened on May 7th, 2021 to the oil pipeline? Who is responsible for it? Did they pay the ransom? In this blog, we answer all of your questions and review what the pipeline oil ransomware attack taught us.

article thumbnail

Baltimore City Council Advances Extreme Ban on Facial Recognition Tech for Personal, Business Use

Security Industry Association

Proposed Ordinance Would Criminalize Use of Common Consumer Products. SILVER SPRING, Md. – The Baltimore City Council’s Public Safety & Government Operations Committee moved on May 26, 2021, to advance a proposal that would ban nearly all applications of facial recognition technology in the city. Prior to the vote, the Security Industry Association (SIA) and other leading technology and business groups wrote a letter to the committee expressing concerns about the profound negative impact of

Retail 52
article thumbnail

How do I select a DLP solution for my business?

Behavior Group

Data loss prevention (DLP) has become even more important in the last year. Since the pandemic has made companies shift to a remote workforce model, cybersecurity threats have become increasingly complex and data security even more fragile. Companies need to adapt their DLP strategies to the new normal and harden their defense. To select a… Continue reading.

article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha

article thumbnail

Non-Financial Risks are Increasingly Financial

FS-ISAC

Banks around the world are used to quantifying financial risks such as market, credit, and liquidity risks. We have known how to measure them for centuries. Because large numbers are involved, it is largely possible to predict the future based on the past. But in a digital finance world that is quickly advancing into uncharted territory, non-financial risks – operational risk, fraud prevention, IT risk, and cybersecurity – are increasingly critical to the business.

Banking 52
article thumbnail

SOX vs. SOC: What Is The Difference? [Complete Guide]

LogisManager

SOX VS SOC: What Is The Difference? Introduction. Many people confuse “SOX” and “SOC” – and rightfully so, as linguistically, they sound very similar. They also often fall within the same professional context when discussing compliance. But ultimately, SOX and SOC have very different meanings, purposes and contexts. We’ll dive into what SOX is, what SOC is, and how to apply SOX and SOC best practices at your organization in this guide.

article thumbnail

Planning and Preparation in Protecting Buildings Against Unrest

Security Industry Association

In this video, learn about the importance of planning in protecting public buildings and preparing to manage incidents of violent civil unrest. On April 28, the Security Industry Association (SIA) hosted Part 1 of the 2021 SIA GovSummit , the nation’s premier government security conference connecting government, security and technology. This daylong virtual conference featured insights from experts in government, industry, academia and the nonprofit sector on the security issues that matte

article thumbnail

VMware tackles ESG with innovation

CIO Governance

US corporate boards are increasingly turning attention to environmental, social, and governance (ESG) issues. ESG is an organization-wide endeavor for those companies rising to the challenge, and CIOs won’t be left out.

article thumbnail

Raising All Boats

FS-ISAC

At Mastercard, we have a security view as broad as the entire global payments system, and as focused as phishing awareness within our own company. With cyber threats evolving and growing in sophistication, it is critical that cybersecurity become a part of our daily lives, not only the province of cybersecurity professionals. We leverage our global scale and deep domain expertise to increase cybersecurity awareness and elevate defenses, not just internally but also with our entire ecosystem.

article thumbnail

The bantam menace

Oz's Business Continuity Blog

Our recent bank holiday weekend didn’t go entirely to plan. It started off well enough. Mrs Oz and I spent several hours in the garden, as planned, starting on our latest project, the details of which I won’t bore you […].

Banking 52
article thumbnail

A Smarter, Safer Approach to Hospital Security

Security Industry Association

Zach Jory, Axon Enterprise. Hospital security is tricky. A medical center should be a place of healing and provide a welcoming atmosphere, but the reality is that hospitals and medical campuses create environments that are difficult to monitor and secure and regularly experience violence. Hospital security teams have a tough job – provide a safe environment, while largely remaining invisible to patients and staff.

article thumbnail

What Businesses Need to Know About Hurricane Season 2021

Alert Media

The post What Businesses Need to Know About Hurricane Season 2021 appeared first on AlertMedia.

article thumbnail

Lead with Courage

Business Continuity Today

We often think of courage in its most valorous incarnations — on the battlefield, in the grips of war, when the stakes are unspeakably high. Matters of life and death require boundless courage and we are forever joined in our awe and gratitude towards those that gave us their life to preserve our liberty. Their heroism inspires us to give valor and bravery a closer look.

article thumbnail

The Myth of Best Practices

Business Resilience Decoded

Episode 69: Dr. Cliff Thomas of Colorado State University and University of Denver Contact Cliff Thomas at: [link] Business Resilience Decoded: [link] [link] [link] [link] [link] Episode 69: Dr.

article thumbnail

Security Industry Association Announces Part 2 Program for the Virtual 2021 SIA GovSummit

Security Industry Association

The second event in SIA’s three-part public policy and government security technology conference will take place virtually June 9. SILVER SPRING, Md. – The Security Industry Association (SIA) has announced the agenda and speaker lineup for Part 2 of the 2021 SIA GovSummit , its annual public policy and government security technology conference. SIA GovSummit 2021 is being held as a three-part virtual conference, the first of which occurred April 28, with Parts 2 and 3 taking place June 9 and Sep

article thumbnail

Navigating a Safe and Stable Return to the Workplace [Webinar Recap]

Alert Media

The post Navigating a Safe and Stable Return to the Workplace [Webinar Recap] appeared first on AlertMedia.

article thumbnail

Lead with Courage

Business Continuity Today

We often think of courage in its most valorous incarnations — on the battlefield, in the grips of war, when the stakes are unspeakably high. Matters of life and death require boundless courage and we are forever joined in our awe and gratitude towards those that gave us their life to preserve our liberty. Their heroism inspires us to give valor and bravery a closer look.