No items have been added to your cart yet
2020 may have been the largest test of business resilience since the advent of the internet. Read varying perspectives and refine your own viewpoint.
Though the events of 2020 are sometimes characterized as unimaginable, many organizations have been preparing for a global pandemic for years. However, many others have found themselves scrambling to maintain operations in the wake of mass shutdowns...
Data resilience has several vendor definitions, for example: maintenance of the availability of hosted production data, the ability of data infrastructure to avoid unexpected disruptions, and a combination of the governance, operational and technical considerations...
Business continuity is defined as having the right tools in place to make sure that an organization can continue to function during an interruption of one or more of its critical mission functions.
It is important to know if one’s organization is robust enough to survive in the event of a security event, let alone expand and improve. Many reputable cybersecurity organizations are publishing guidance on how to respond in the event of a theft or data breach.
In this digital age, when discussing business continuity, the first things that come to mind are technology and related processes. However, it is important to note that the critical elements of human resources (HR) and processes have equal weight. The challenge of ...
Peerless Tech Solutions is a managed service provider that specializes in support for government contractor clients. As a federal contractor in its own right, Peerless, in late 2019, began an internal project to prepare itself for compliance with Cybersecurity Maturity Model Certification...
When planning information security for a system, it is essential to remember to include contingency planning because it provides the resilience needed to respond to technical disruptions and ensure the system is available. The critical planning component is an information...
No matter how small, every enterprise beyond a lemonade stand has some form of a security program. Even someone with a one-person business probably has a personal computer with Internet connectivity, and that PC undoubtedly has a firewall, antivirus software...
We have all been through a lot. The pandemic has built a new working model, changing leadership perceptions on how and where work can be performed. The intricate plans that many enterprises tested on an annual basis in line with business continuity turned into...
Emerging technologies can be a tough subject for discussion. Experts, practitioners and just about anyone in the IT field can be very opinionated and passionate when it comes to a particular technology, especially if they are currently working on an implementation...
Innovation is not just about new products, new ways to compete and developing new features. Innovation is also examining what is in place today, seeing where the gaps are and building solutions to address those gaps. When it comes to resilience, innovation has a strong role to play.
Recently I heard the term “purple team.” What are the objectives and roles of this team?
Even when an organization implements good policies, procedures, security setups and standards accreditations, without an organizationwide, positive information security and business continuity (IS&BC) culture, low effectiveness can be expected.
In 2015, the commissioner of US Customs and Border Protection (CBP) engaged the Defense Acquisition University (DAU) (Fort Belvoir, Virginia, USA) to review CBP’s acquisition and procurement performance.
Many international reports and research centers repeatedly insist that the individual is the most important element concerning information security and one of the most relevant when determining an information protection practice for organizations.
Until a few months ago, no one would have believed that large swaths of the workforce would be doing nearly everything from within the four walls of their homes, including, for example, the most complex banking transactions and other financial activities that normally involve walking into a bank branch office.
There are many checks that an organization must implement to ensure proper compliance with legal regulations or alignment with market standards or business objectives. Often, the results are reported only at the top management of the internal process that carried...
George is an inexperienced hiker. He is lost in the woods and it is dark. He wants to go back to civilization. He has a global positioning system (GPS) navigator, but he does not know how to use it correctly.
Cyberattacks are emerging faster than ever across the world in the wake of the COVID-19 pandemic. With newer dimensions incorporated into emerging disruptive cyberattacks, organizations globally are more vigilant about protecting their critical information assets.
In this century, especially in the previous few years, several factors have placed enormous stress on the resilience of businesses—and by extension, of their suppliers, customers and employees—around the world. The first among these was the global financial crisis...