Cybersecurity Incidents in 2016

Cybersecurity Incidents in 2016

Being aware of the cybersecurity incidents that happened in 2016 is a vital part of the preparedness role of the risk management team in your organization. Although cybersecurity related events of 2016 will be remembered mostly for the numerous breaches of users’ personal data by big-name companies offering online services, ransomware attacks have actually been […]

Being aware of the cybersecurity incidents that happened in 2016 is a vital part of the preparedness role of the risk management team in your organization. Although cybersecurity related events of 2016 will be remembered mostly for the numerous breaches of users’...
Tabletop Exercise Validates Emergency Response Plans

Tabletop Exercise Validates Emergency Response Plans

Disaster preparedness and business continuity plans stand to benefit from the inclusion of tabletop exercise activities into those plans. Tabletop exercises enable organizations to analyze potential emergency situations in an informal environment, and are designed to foster constructive discussions among participants as they examine existing operational plans and determine where they can make improvements.   […]

Disaster preparedness and business continuity plans stand to benefit from the inclusion of tabletop exercise activities into those plans. Tabletop exercises enable organizations to analyze potential emergency situations in an informal environment, and are designed to...
Cloud Security Highlights Major Cyber-Security Threats for 2016

Cloud Security Highlights Major Cyber-Security Threats for 2016

Cloud security remains a top concern for many companies, especially when business units acquire cloud services independent of the IT department. To help illustrate the problems such practices can create, the Cloud Security Alliance (CSA) has compiled its list of “The Treacherous 12: Cloud Computing Top Threats in 2016.” The 2016 Top Threats release mirrors […]

Cloud security remains a top concern for many companies, especially when business units acquire cloud services independent of the IT department. To help illustrate the problems such practices can create, the Cloud Security Alliance (CSA) has compiled its list of “The...
Global Risk Report 2016

Global Risk Report 2016

by: Ben J. Carnevale, Managing Editor Given the continuity and compliance objectives of this website, it is not too often that we don’t have the topics of global risk, risk management and risk mitigation discussed in this blog.  And, this posting will be no exception to that pattern. This posting intends to provide an additional […]

by: Ben J. Carnevale, Managing Editor Given the continuity and compliance objectives of this website, it is not too often that we don’t have the topics of global risk, risk management and risk mitigation discussed in this blog.  And, this posting will be no exception...

Pin It on Pinterest