This conference features an expanded agenda with more than 84 sessions and workshops across four days of live programming making it the largest event dedicated to managing risk and resiliency…
What’s new in INFORMATION SECURITY POLICIES MADE EASY Version 14?
– Security Policy Library Update for the Common Policy Library (CPL)
– Updated Security Policy Mappings
– 39 Updated “Ready-to-Go” Sample Security Policy…
What's the Reputation Risk When Your Star Behaves Badly?
by Tony Jaques PhD, Director of Issue Outcomes Pty Ltd, for people who work in issue and crisis management, author of…
Charlie Maclean-Bristol looks at the risk of a cyber-attack and the importance of reviewing your vulnerability to water, wastewater and electricity loss.
These exercises and many more one-hour exercises are contained in Charlie Maclean-Bristol’s new book, Business Continuity Exercises: Quick Exercises to Validate Your Plan.
In this chapter about The Power of the Observation you will discover:
• An overview of the concept of an “observation.”
• The primary elements included in the observation as…
This free chapter is from the new book Cybersecurity Law, Standards and Regulations (2nd Edition) by Tari Schreider
In today’s litigious business world, cyber-relateted matters could land you in court.…
In a world where science and expertise are under attack, communicators know how hard it is to fully convey the impact of events which rely on catastrophic statistics.