Sat.Jan 05, 2019 - Fri.Jan 11, 2019

article thumbnail

Do you have a data breach response plan?

IT Governance BC

This blog has been updated to reflect industry updates. Originally published 6 August 2018. The EU GDPR (General Data Protection Regulation) requires organisations to respond to serious data breaches within 72 hours of detection. This places a significant burden on organisations: taking the appropriate measures to comply with the law while simultaneously dealing with the collateral impact of a breach is not a picnic!

article thumbnail

Calculating the cost of inaction 

Crisis Response Journal

Too often when deciding whether to make changes or not, we only see the cost of action and ignore the cost of inaction.

100
100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Prove Cybersecurity’s Value to Build a Culture of Cybersecurity

Behavior Group

If you want senior executives to buy into cybersecurity, you need to prove the value cybersecurity brings to the core business. Read your organization’s annual reports, corporate governance documents, shareholder statements and the like. These documents will give you a better sense for what drives your organization and, in turn, what your executives are thinking… Continue reading.

article thumbnail

Aligning Cyber Incident Response Planning with Your BC/DR Program

eBRP

Cyber disruptions – and their impact on both reputations and profitability – have risen to the top of nearly every recent risk study. These increasing concerns weigh heavily on Executive Suites and Boards. In the IT realm, CIO’s and CISO’s now focus their efforts on mitigating those risks, and planning responses to potential data breaches, malware and other cyber threats.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Risk Assessment – Is it worth the time and effort?

Stratogrid Advisory

Risk Assessment – Is it worth the time and effort? Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 3 minutes Should your organization execute a Risk Assessment? Is it worth the time and effort? It is often a long and complicated process, which may discourage some organizations from fully committing to it. This article will address the importance of the Risk Assessment as a general business tool, as well as in the context of Business Continuity Planning.

More Trending

article thumbnail

Hacker leaks data on Angela Merkel and hundreds of German lawmakers

Behavior Group

A hacker has targeted and released private data on German chancellor Angela Merkel and other senior German lawmakers and officials. The data was leaked from a Twitter account, since suspended, and included email addresses, phone numbers, photo IDs and other personal data on hundreds of senior political figures. Hacker leaks data, According to a government… Continue reading.

article thumbnail

Veritas Predictive Insights: The next frontier for data protection

VOX Veritas

One of the most meaningful recent innovations in data protection is building protection systems with Hard Disk Drives (HDD) as the storage medium.

40
article thumbnail

Risk Assessment – Is it worth the time and effort?

Stratogrid Advisory

Risk Assessment – Is it worth the time and effort? Last Updated on May 31, 2020 by Alex Jankovic. Reading Time: 3 minutes. Should your organization execute a Risk Assessment? Is it worth the time and effort? It is often a long and complicated process, which may discourage some organizations from fully committing to it. This article will address the importance of the Risk Assessment as a general business tool, as well as in the context of Business Continuity Planning.

article thumbnail

Drones & Airports

Plan B Consulting

This week Charlie shares his thoughts on the recent drone incidents at Heathrow and Gatwick airport. Following the incident at Heathrow Airport on Tuesday, with one of the runways having to close, and with the recent shut down at Gatwick Airport I thought I would write this week’s bulletin on drones. When the shutdown of Gatwick occurred on the 19 – 21 December I posted three observations on the incident onto LinkedIn, and so, this week’s bulletin is going to be based around the replies an

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Leveraging Your BCM Program in Cyber Security Incident Response

Business Resilience Decoded

Episode 12: "Leveraging Your BCM Program in Cyber Security Incident Response" with Ramesh Warrier of eBRP Solutions. Contact Ramesh Warrier at: [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 12: "Leveraging Your BCM Program in Cyber Security Incident Response" with Ramesh Warrier of eBRP Solutions.

BCM 36
article thumbnail

Leveraging Your BCM Program in Cyber Security Incident Response

Business Resilience Decoded

Episode 12: "Leveraging Your BCM Program in Cyber Security Incident Response" with Ramesh Warrier of eBRP Solutions. Contact Ramesh Warrier at: [link] [link] [link]. Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 12: "Leveraging Your BCM Program in Cyber Security Incident Response" with Ramesh Warrier of eBRP Solutions.

BCM 36
article thumbnail

Ramesh Warrier 012

Business Resilience Decoded

"Leveraging Your BCM Program in Cyber Security Incident Response" with Ramesh Warrier of eBRP Solutions. Contact Ramesh Warrier at: [link] [link] [link]. Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded "Leveraging Your BCM Program in Cyber Security Incident Response" with Ramesh Warrier of eBRP Solutions. Contact Ramesh Warrier at: [link] [link] [link].

BCM 28