Remove Impact Analysis Remove Pandemic Remove Response Plan Remove Webinar
article thumbnail

KingsBridgeBCP Podcasts

KingsBridge BCP

In this edition of the “Shield your Business from CHAOS” podcast, we discuss the No People, No Building, No Systems, No Suppliers response planning method. S1E6 to S1E9: Dealing with the 15 most common obstacles to your best BCP webinar S1E6 – Part 1 Starting out and having trouble getting buy-in?

BCP 52
article thumbnail

Check out our KISSBCP Podcast!

KingsBridge BCP

In this edition of the “Shield your Business from CHAOS” podcast, we discuss the No People, No Building, No Systems, No Suppliers response planning method. S1E6 to S1E9: Dealing with the 15 most common obstacles to your best BCP webinar S1E6 – Part 1 Starting out and having trouble getting buy-in?

BCP 72
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Integrating Risk Disciplines: Business Continuity and Cyber Response

Castellan

While this has well been the case for the last several years, it’s certainly ever-more true in our post-pandemic world. As we reflect on lessons learned from our pandemic and multi-event response protocols, we can find many opportunities to improve business continuity practices to further solidify resilience.

article thumbnail

Check out our KISSBCP Podcasts!

KingsBridge BCP

In this edition of the "Shield your Business from CHAOS" podcast, we discuss the No People, No Building, No Systems, No Suppliers response planning method. S1E6 to S1E9: Our 15 Most Common Obstacles to Your Best BCP webinar S1E6 - Part 1 Starting out and having trouble getting buy-in? Start with this episode.

BCP 40
article thumbnail

What is Cyber Resilience and Why It Matters

Castellan

That’s likely reflected in the number of successful attempts spurred by the sudden influx of teams around the world moving into remote work environments as a result of the coronavirus pandemic. Response plans : Making plans for when an attack is discovered, including how to stop an attack and prevent further damage to systems and operations.