Top content provider of cybersecurity, crisis management & business continuity books & products
Stay In Touch with Our Updates
In this chapter you will discover: • An overview of the concept of an “observation.” • The primary elements included in the observation as well as its format. • Fundamental considerations when performing and documenting the observation including the power of one’s influence on the actions being observed, the need for critical thinking, and considerations on how the observation supports the risk assessment.
What’s new in INFORMATION SECURITY POLICIES MADE EASY Version 14? – Security Policy Library Update for the Common Policy Library (CPL) – Updated Security Policy Mappings – 39 Updated “Ready-to-Go” Sample Security Policy Templates – Additional New Compliance Documents – 60+ New Information Security Policies
WATCH THIS EXCLUSIVE WEBCAST WITH ONE OF THE WORLD’S FEW THOUGHT LEADERS ON CRISIS MANAGEMENT, DR TONY JAQUES Learning from the best: I have just had the privilege of hosting an exclusive webcast with one of the few genuine thought leaders on crisis management and issue management, Dr Tony Jaques, of Melbourne, Australia. The participants
The COVID-19 pandemic was not a “black swan” (catastrophic event that came out of the blue and no one saw coming), it was a “gray rhino” which had long been predicted but leadership everywhere overlooked. As we move forward from the pandemic to new challenges, how do we better ensure we have our eyes open so the next crisis doesn’t hit us unaware?
Continuity Insights has announced that its 2020 New York Conference, originally scheduled for October 19, will transition to a virtual event after careful consideration of the circumstances caused by the COVID-19 pandemic. The 9th Annual Conference will now take place across three days – October 20-22 – with the full support of its speakers, exhibitors,
Critical Infrastructure Risk Assessment: The Definitive Threat Identification and Threat Reduction Handbook
WHAT DEVASTATING THREATS DOES YOUR CRITICAL FACILITY FACE? WHAT CAN YOU DO TO ADDRESS THOSE RISKS? Critical Infrastructure Risk Assessment is your hands-on, step-by-step guide to understanding, prioritizing, and mitigating, risk. Ernie Hayden guides you with tools, examples, processes plus a real-world example risk assessment report. You will learn what constitutes critical infrastructure and risk,
Why Communicators and Lawyers Must Work Better Together, by Tony Jaques Recent research shows some communicators and lawyers still don’t trust each other, especially in the pressure-cooker environment of a crisis. The result can be conflicting advice to management, leading to poor decisions and reputational damage. The conflict between what’s legally permissible and what society
This free chapter is from the new book Cybersecurity Law, Standards and Regulations (2nd Edition) by Tari Schreider In today’s litigious business world, cyber-relateted matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may
Learn from the Masters of Root Cause Analysis! Master Cause Analysis with this comprehensive 3-book cause analysis library, and now save 25%!Chester Rowe, Fred Forck and ABS Consulting cover all of the Cause Analysis bases in this 3-book set, regularly $382.97, get all three for $287.99. Here are three industry-defining books for YOUR Cause Analysis Library!