What’s new in INFORMATION SECURITY POLICIES MADE EASY Version 14? – Security Policy Library Update for the Common Policy Library (CPL) – Updated Security Policy Mappings – 39 Updated “Ready-to-Go” Sample...
Read moreTikTok and Reputation Management: Has time run out for big newspaper ads in a crisis?
Facing a reputational crisis TikTok placed ads in Australian newspapers, pleading not to become a “political football.” But outside the media bubble, did anybody pay attention? Or was it just an outdated response with no real value in terms of...
Read moreFree Chapter: Introduction to Cybersecurity Law
This free chapter is from the new book Cybersecurity Law, Standards and Regulations (2nd Edition) by Tari Schreider In today’s litigious business world, cyber-relateted matters could land you in court. As a computer security professional, you are...
Read moreInformation Security Policies Made Easy – Version 14 NOW AVAILABLE
What’s new in INFORMATION SECURITY POLICIES MADE EASY Version 14? – Security Policy Library Update for the Common Policy Library (CPL) – Updated Security Policy Mappings – 39 Updated “Ready-to-Go” Sample...
Read moreInformation Security Policies Made Easy – NEW Version 14 NOW AVAILABLE
NEW – INFORMATION SECURITY POLICIES MADE EASY VERSION 14 NOW AVAILABLE! If you have a previous version of Information Security Policies Made Easy, see below for a special upgrade offer! The new Version 14 of Information Security Policies Made...
Read moreMaster Cause Analysis With These 3 Powerful Books
Learn from the Masters of Root Cause Analysis! Master Cause Analysis with this comprehensive 3-book cause analysis library, and now save 25%!Chester Rowe, Fred Forck and ABS Consulting cover all of the Cause Analysis bases in this 3-book set...
Read moreDisaster Recovery Journal launches virtual option for DRJ Fall 2020 ‘Focus on the Future of Resiliency’
Disaster Recovery Journal (DRJ), the world’s premier resource for business resilience, has officially announced the DRJ Fall 2020 conference will provide a virtual option in addition to the in-person conference Sept. 28-Oct. 1 in Phoenix...
Read moreUpcoming Continuity Insights Webinars
Upcoming Continuity Insights Webinars Business Executives and Other Leaders Share Their COVID-19 Experience Tuesday, June 9, 2020 | 2:00 p.m. ET Tejas Katawala, CEO of Continuity Logic, shares findings from 1:1 conversations with 40+ C-Suite...
Read moreRansomware Attacks in the Legal Profession
Here are the most essential actions to take to protect your organization from the effects of a ransomware attack.
Read moreFree Chapter: How Can Enterprise Security Risk Management Help YOUR Security Program?
How Can Enterprise Security Risk Management (ESRM) Help Your Security Program? Find out now with your FREE Chapter! You will further: Explore how security has traditionally been viewed both inside and outside of the security profession...
Read moreWhen is it okay to shut down debate on controversial issues?
The coronavirus just may have had one positive effect. The world-wide race to develop an effective vaccine to slow the global pandemic seems to have temporarily overshadowed the influence of anti-vaccine activists, according to Tony Jaques...
Read moreFree Chapter: Introduction to Cybersecurity Law
This free chapter is from the new book Cybersecurity Law, Standards and Regulations (2nd Edition) by Tari Schreider In today’s litigious business world, cyber-relateted matters could land you in court. As a computer security professional, you are...
Read more