These exercises and many more one-hour exercises are contained in Charlie Maclean-Bristol’s new book, Business Continuity Exercises: Quick Exercises to Validate Your Plan.
Read moreFREE CHAPTER: Critical Infrastructure Risk Assessment: The Power of the Observation
In this chapter about The Power of the Observation you will discover: • An overview of the concept of an “observation.” • The primary elements included in the observation as well as its format. • Fundamental considerations when performing and...
Read moreWhite Paper: Is Reputation Your Most Valuable Uninsured Asset?
Reputation may in fact be your most valuable uninsured asset. Nothing destroys reputation faster or deeper than a crisis mismanaged.
Read moreFree Chapter: Introduction to Cybersecurity Law
This free chapter is from the new book Cybersecurity Law, Standards and Regulations (2nd Edition) by Tari Schreider In today’s litigious business world, cyber-relateted matters could land you in court. As a computer security professional, you are...
Read moreFree Chapter: Why Should I Apologize? Lawyers vs. Communicators
One of the most common areas of disagreement between lawyers and communicators is about when and how to apologize.
Read moreInformation Security Policies Made Easy – Version 14 NOW AVAILABLE
What’s new in INFORMATION SECURITY POLICIES MADE EASY Version 14? – Security Policy Library Update for the Common Policy Library (CPL) – Updated Security Policy Mappings – 39 Updated “Ready-to-Go” Sample...
Read moreFREE CHAPTER: Critical Infrastructure Risk Assessment: The Power of the Observation
In this chapter you will discover: • An overview of the concept of an “observation.” • The primary elements included in the observation as well as its format. • Fundamental considerations when performing and documenting the observation including...
Read moreFree Business Continuity Exercises
These exercises and many more one-hour exercises are contained in Charlie Maclean-Bristol’s new book, Business Continuity Exercises: Quick Exercises to Validate Your Plan.
Read moreFREE CHAPTER: Critical Infrastructure Risk Assessment: The Power of the Observation
In this chapter you will discover: • An overview of the concept of an “observation.” • The primary elements included in the observation as well as its format. • Fundamental considerations when performing and documenting the observation including...
Read moreFree Chapter: Introduction to Cybersecurity Law
This free chapter is from the new book Cybersecurity Law, Standards and Regulations (2nd Edition) by Tari Schreider In today’s litigious business world, cyber-relateted matters could land you in court. As a computer security professional, you are...
Read moreMaster Cause Analysis With These 3 Powerful Books
Learn from the Masters of Root Cause Analysis! Master Cause Analysis with this comprehensive 3-book cause analysis library, and now save 25%!Chester Rowe, Fred Forck and ABS Consulting cover all of the Cause Analysis bases in this 3-book set...
Read moreRansomware Attacks in the Legal Profession
Here are the most essential actions to take to protect your organization from the effects of a ransomware attack.
Read more