These exercises and many more one-hour exercises are contained in Charlie Maclean-Bristol’s new book, Business Continuity Exercises: Quick Exercises to Validate Your Plan.
Read moreFREE CHAPTER: Critical Infrastructure Risk Assessment: The Power of the Observation
In this chapter about The Power of the Observation you will discover: • An overview of the concept of an “observation.” • The primary elements included in the observation as well as its format. • Fundamental considerations when performing and...
Read moreWhite Paper: Is Reputation Your Most Valuable Uninsured Asset?
Reputation may in fact be your most valuable uninsured asset. Nothing destroys reputation faster or deeper than a crisis mismanaged.
Read moreFree Chapter: Introduction to Cybersecurity Law
This free chapter is from the new book Cybersecurity Law, Standards and Regulations (2nd Edition) by Tari Schreider In today’s litigious business world, cyber-relateted matters could land you in court. As a computer security professional, you are...
Read morePandemic Deaths Have Numbed Our Humanity and Perception of Risk
In a world where science and expertise are under attack, communicators know how hard it is to fully convey the impact of events which rely on catastrophic statistics.
Read moreFree Excerpt: Building a Cyber Threat, Vulnerability Detection, and Intelligence Capability
This free excerpt from the new book Building an Effective Cybersecurity Program, 2nd Edition, by Tari Schreider C|CISO, CRISC, ITIL® Foundation, MCRP, SSCP will help you to begin Building YOUR Cyber Threat, Vulnerability Detection, and...
Read moreJim Burtles, 1935-2020
The world lost an amazing man on New Year’s Eve, Jim Burtles. I first met Jim at a conference over two decades ago. His warmth, eagerness to share his knowledge and experience, and enthusiasm left an immediate and lasting impression. Among...
Read moreRisk Assessments Dig Deeper than the Obvious
Risk Assessments Dig Deeper than the Obvious By Ernie Hayden CISSP GICSP(Gold) PSP In September 2020, my book, Critical Infrastructure Risk Assessment, was published. In the book I discuss ways and means to analyze the threats and vulnerabilities...
Read moreFree Chapter: Why Should I Apologize? Lawyers vs. Communicators
One of the most common areas of disagreement between lawyers and communicators is about when and how to apologize.
Read moreHow to respond when your brand comes under political attack
How to Respond When Your Brand Comes Under Political Attack by Tony Jaques PhD, Director of Issue Outcomes Pty Ltd, for people who work in issue and crisis management, author of Crisis Counsel: Navigating Legal and Communication Conflict. While...
Read moreFree Chapter: Why Should I Apologize? Lawyers vs. Communicators
One of the most common areas of disagreement between lawyers and communicators is about when and how to apologize.
Read moreInformation Security Policies Made Easy – Version 14 NOW AVAILABLE
What’s new in INFORMATION SECURITY POLICIES MADE EASY Version 14? – Security Policy Library Update for the Common Policy Library (CPL) – Updated Security Policy Mappings – 39 Updated “Ready-to-Go” Sample...
Read more