Sat.Mar 04, 2017 - Fri.Mar 10, 2017

article thumbnail

NIST CRIED: The Four Steps of Incident Mitigation

Behavior Group

cyber security education, cybersecurity response, incident mitigation, NIST cyber security framework, risk mitigation Mike Tyson notably said, “Everyone has a plan ‘till they get punched in the mouth.” So, how do you ensure the same doesn’t hold true for your company’s incident response plan when a real breach occurs? Enter the NIST Framework category titled… Continue reading.

article thumbnail

Only 32 million people were watching…

Plan B Consulting

This week I have has taken on a piece of work which will involve running a live exercise. I share my thoughts and questions on possible scenarios, and asks for advice from those of you that have run many of these type of live exercises. I have been in London this week, delivering the BCI Introduction to Business Continuity Management course to a great bunch of people, including Alain who is the very first person I have trained from the Congo!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Embrace Amazon Web Services to Store Your Unstructured Data

VOX Veritas

Veritas Access provides cost-optimized software-defined storage for unstructured data workloads, enabling customers to use Amazon Simple Storage Service (Amazon S3 and Glacier) as a low-cost storage tier to optimize data migration to AWS.

40
article thumbnail

Only 32 million people were watching…

Plan B Consulting

This week I have has taken on a piece of work which will involve running a live exercise. I share my thoughts and questions on possible scenarios, and asks for advice from those of you that have run many of these type of live exercises. I have been in London this week, delivering the BCI Introduction to Business Continuity Management course to a great bunch of people, including Alain who is the very first person I have trained from the Congo!

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

It’s Time to Change Your Perception of the Cybersecurity Professional

Behavior Group

Cybersecurity professional, cybersecurity careers, security education, security leadership, security talent gap, threat mitigation To borrow from the Nobel Prize winning songwriter, the (security) times, they are a-changin’. When the commercial Internet was young – say in 1995 – IT structure was relatively simple. It consisted of just three layers: server, network and client.