This is Business Continuity Awareness Week (May 15-19. 2017) – and what better way to start the week than to consult the most comprehensive book on Business Continuity, authored by global master practitioner, consultant, and trainer Andrew Hiles, FBCI, EIoSCM?
Discover new ideas and inspiration to build world-class Business Continuity Management from this masterwork that distills Hiles’ wisdom about what works and why from 30+ years’ experience in 60+ countries.
Preparing for the threat of digital disruption
As the world becomes more and more digital, so do the threats that it faces. Just as we need to protect our organizations from the disruptions that occur in the physical world, we also need to have plans in place to deal with disruptions in the virtual world. As the Business Continuity Institute's latest Cyber Resilience Report showed, two-thirds of organizations experienced at least one cyber security incident during the previous twelve months, and 15% experienced at least ten. No longer can we think: "it will never happen to me." Given the prevalence of the threat, it perhaps no surprise that the BCI's Horizon Scan Report noted that, of all the possible causes of disruption, cyber attacks and data breaches were the top two concerns for business continuity and resilience professionals.Are you a Business Continuity Manager or training for the job? Are you ready to keep the business up and running in the face of emergencies ranging from earthquakes to accidents to fires to computer crashes?
In this second edition of Principles and Practice of Business Continuity: Tools and Techniques, Jim Burtles explains six main scenarios. He promises: “If you and your organization are prepared to deal with these six generic risks, you will be able to recover from any business disaster!”Principles and Practice of Business Continuity: Tools and Techniques is organized with all the features you need to master business continuity.
Originally inspired by the horrific evacuation challenges of 9/11, this groundbreaking book is the result of 10 years of research into global best practices for getting everyone out safely — every time!
- First ever, all-in-one, practical resource for evacuating people of all ages and health conditions from all kinds of workplaces, including small offices, skyscrapers, business and college campuses, industrial plants, stores, hospitals, and schools.
These new tools for Colleges and Universities; Public and Private K-12 Schools; Manufacturing and Distribution; and, for Businesses of all types and sizes give you what you need to get your Business Continuity, Crisis Management and Resilience programs going!
Collect information and evaluate your business environment, identify and reduce risks, analyze business operations, analyze alternatives to respond to disruptions, develop a comprehensive Business Continuity Plan, and to prepare for and respond to hazards-specific events with The Template for Comprehensive Business Continuity Management to Enhance Your Organization’s Resilience.In today’s litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may not be a legal expert. Fortunately, in a few hours of reading, rather than months of classroom study, Tari Schreider’s The Manager’s Guide to Cybersecurity Law: Essentials for Today’s Business, lets you integrate legal issues into your security program.
Tari Schreider, a board-certified information security practitioner with a criminal justice administration background, has written a much-needed book that bridges the gap between cybersecurity programs and cybersecurity law. He says, “My nearly 40 years in the fields of cybersecurity, risk management, and disaster recovery have taught me some immutable truths. One of these truths is that failure to consider the law when developing a cybersecurity program results in a protective façade or false sense of security.”
A failure or accident brings your business to a sudden halt. How did it happen? What is at the root of the problem? What keeps it from happening again? Good…
So much to learn – so little time. You are committed to creating a strong organization, ready to survive under all conditions. You need expert advice for best practices…
Information Security Policies Made Easy is the “gold standard” information security policy template library, with over 1500 pre-written information security policies covering 200+ security topics. Based on the 25 year consulting experience of Charles Cresson Wood, CISSP, CISA, it is the most widely used policy library in the world, with 10,000+ customers in 60 countries. Take the work out of creating, writing, and implementing security policies.
Information Security Policies Made Easy has everything you need to build a robust security policy program, delivered by electronic download.
Collect information and evaluate your business environment, identify and reduce risks, analyze business operations, analyze alternatives to respond to disruptions, develop a comprehensive Business Continuity Plan, and to prepare for and respond to hazards-specific events with The Template for Comprehensive Business Continuity Management to Enhance Your Organization’s Resilience.
