These and many more one-hour exercises are contained in Charlie Maclean-Bristol’s new book, Business Continuity Exercises: Quick Exercises to Validate Your Plan.
So You Want to Change your Boss? Fuhgeddaboudit!
by Jim Lukaszewski
As Americas Crisis Guru the most frequent question I get from other senior practitioners is "How do you overcome the resistance of a boss who needs to change but will not listen to you?"
I respond with my own question, "How long have you been…
Our friends at Continuity Insights have announced the launch a new educational program, Personal Security in Challenging Times, a short video series for personal and family safety against potential violent situations. The premier episode – Key Concepts: Recognizing and Responding to Racially and Ethnically Motivated Violence (REMV) – launched. [Watch]
Personal Security in Challenging Times is…
Charlie Maclean-Bristol discusses the issues associated with communications after a cyber-attack, and how to develop a plan that will make a huge difference in an organization’s ability to survive and keep their reputation after a data breach.
If your approach is, “management by bungling,” expect irreparable, permanent damage to your reputation, at least while you’re still in charge
What do European Football and Australia Post have in common?
by Tony Jaques PhD, Director of Issue Outcomes Pty Ltd, for people who work in issue and crisis management, author of Crisis Counsel: Navigating Legal and Communication Conflict.
Stakeholders are the essential foundation of any communication strategy especially issue and crisis management and two recent…
This free excerpt from the new book Building an Effective Cybersecurity Program, 2nd Edition, by Tari Schreider C|CISO, CRISC, ITIL® Foundation, MCRP, SSCP will help you to begin Building YOUR Cyber Threat, Vulnerability Detection, and Intelligence Capability.
This chapter will help you to:
Understand the relationship between threats and vulnerabilities.
Understand how to identify and…
One of the most common areas of disagreement between lawyers and communicators is about when and how to apologize.
There was a time where if you looked at a business continuity plan, it consisted of a series of risk scenarios. The trend now is to have plans which cover the loss of an asset.
“The irony of credential stuffing is that organisations that have not suffered a direct data breach often become indirect victims when their users’ accounts are compromised due to someone else’s data breach”
