Skip to content Skip to sidebar Skip to footer
drj-fall-2021-rothstein-publishing

Getting Back to In-Person Events at DRJ Fall 2021

Getting Back to In-Person Events at DRJ Fall 2021 By Bob Arnold, president of Disaster Recovery Journal In-person events drive the kinds of encounters conducive to creating collaborations building communities and establishing friendships. Aspects that many attendees appear to have missed most during the pandemic include the conference atmosphere, extensive feedback opportunities, and in-depth conversations…

Read More

crime-scene-rothstein-publishing

Continuity Insights Launches New Video Series: Personal Security in Challenging Times

Our friends at Continuity Insights have announced the launch a new educational program, Personal Security in Challenging Times, a short video series for personal and family safety against potential violent situations. The premier episode – Key Concepts: Recognizing and Responding to Racially and Ethnically Motivated Violence (REMV) – launched. [Watch] Personal Security in Challenging Times is…

Read More

tony-jaques-rothstein-publishing

Reputation Risk: What do European Football and Australia Post have in common?

What do European Football and Australia Post have in common? by Tony Jaques PhD, Director of Issue Outcomes Pty Ltd, for people who work in issue and crisis management, author of Crisis Counsel: Navigating Legal and Communication Conflict. Stakeholders are the essential foundation of any communication strategy especially issue and crisis management and two recent…

Read More

building-effective-cybersecurity-program-rothstein-publishing

Free Excerpt: Building a Cyber Threat, Vulnerability Detection, and Intelligence Capability

This free excerpt from the new book Building an Effective Cybersecurity Program, 2nd Edition, by Tari Schreider C|CISO, CRISC, ITIL® Foundation, MCRP, SSCP will help you to begin Building YOUR Cyber Threat, Vulnerability Detection, and Intelligence Capability. This chapter will help you to: Understand the relationship between threats and vulnerabilities. Understand how to identify and…

Read More