Free Chapter: Can Enterprise Security Risk Management Help YOUR Security Program? - How Can Enterprise Security Risk Management (ESRM) Help Your Security Program? Find out now with your FREE Chapter! You will: Explore how security has traditionally been viewed both inside and outside of the security profession. Understand how ESRM can change the perception of security in your enterprise to help you better communicate the value of […]
Are you interested in getting published? - Are you interested in getting published? Rothstein Publishing publishes and distributes industry-leading, current content digitally and in print globally. We would like to hear about your ideas. For starters, we don’t even need a completed manuscript. We are willing to look at your book idea at any stage of development, whether it’s a few ideas sketched […]
Creating a Culture of Cybersecurity - Creating a Culture of Cybersecurity Even the best made cybersecurity governance programs cannot predict every situation that should be guided by a principle or policy. At some point, you will have to rely on the employees of your organization to do the right thing. How do you train every employee to do the right thing […]
Root Cause Incident Investigation Problems and Solutions - Common Root Cause Investigation Problems and Solutions The following are typical reasons why most root cause incident investigation programs fail to live up to the organization’s expectations, from the book Root Cause Analysis Handbook: A Guide to Efficient and Effective Incident Investigation. There Is No Business Driver to Change If the organization is performing acceptably […]
FREE CHAPTER: Governance in the Resilient Organization - Get your free chapter on Governance in the Resilient Organization from the book Principles and Practice of Business Continuity Tools and Techniques, by Jim Burtles. In the first 15 chapters of Jim Burtles’ book, you learn how and why you might approach the development and delivery of a successful and effective business continuity (BC) program. […]
Hack the Vote 2: Cyberrisks to Election Infrastructure - In October 2016, the Risk Management cover story “Hack the Vote: Cyberrisk at the Ballot Box” highlighted many of the vulnerabilities in America’s election infrastructure. Continuing investigation in the wake of that election has made the stakes clearer than ever. Two years later, many of the vulnerabilities still remain, and many of the threats are a lot more real.
Meet me at Continuity Insights in NYC next week - I’m looking forward to attending the Continuity Insights conference in New York City on Monday, October 22, 2018. If you’re attending, be sure to introduce yourself. If you haven’t already registered, REGISTER HERE NOW! – Philip Jan Rothstein, FBCI
Five Guiding Crisis Leadership Principles - What's going to trip you up when you are facing your next crisis? Follow Bruce Blythe's Five Guiding Principles of Crisis Leadership and don't screw up. With his landmark book as your guide, you won't get blindsided!
FREE CHAPTER: Getting Leadership Ready for Crisis - Crisis management may be defined as the exercise of common sense at lightning speed. Importantly, the effectiveness of crisis communication during the hours, days, and weeks it takes to resolve and recover from an event will prove essential to preserving the reputation, credibility, and morale of your organization. My years of experience and observation of […]
FREE CHAPTER: Business Continuity Project Startup and Management - How Do You Start Up and Manage YOUR Business Continuity Project? Find out NOW with your FREE Chapter! If your organization is starting out on Business Continuity Management, the enormity of the tasks that lie ahead of you can seem overwhelming. That is why it is crucially important to get the scope right, to set […]