Update on Cybersecurity Standards – 2023 Most Widely-used Standards & Frameworks

From our Sponsor

Attend MIT's Crisis Mgt and Business Resiliency Course

Join your peers, industry and government experts, and renowned MIT faculty on the MIT campus July 24 – 28, 2023 (or online October 16-20 and 23-26). This comprehensive yet intensive course provides up-to-date assessments and knowledge on issues that affect your organization, your program, your career, and you. This is the fourteenth year of our extremely successful program!

  • Earn 3.8 CEUs and an MIT Certificate of Completion (looks great on LinkedIn!)
  • Learn how other organizations setup their resilience programs
  • Actual event case studies, deep dives, world class networking
Get more details and register >>

Meet the Expert

Update on Cybersecurity Standards – 2023 Most Widely-used Standards & Frameworks

Among the top five boardroom technology issues is cybersecurity – how to prevent cyberattacks, how to detect them and how to mitigate them. Reports in the media regularly cite examples of how these attacks penetrate even the most formidable corporate network perimeters.

And while professionals and perpetrators maintain a continuous cat-and-mouse game, the attacks still occur. Paul Kirvan provides an update on the most important cybersecurity standards, regulations and frameworks.

Read the article >>

In the Know...

Technology in Resilience Report 2023, Webinar Launch April 25, 2 PM (EDT)

The Business Continuity Institute announces the launch of a brand-new report which examines technologies and their impact on the Resilience industry. The report will help in understanding the use of technologies such as AI, augmented reality, and predictive analytics, amongst others. It will also look at the drivers and barriers to implementing resilience-building technology within organizations.

Registere here >>

National Business: The release of the new National Cybersecurity Strategy highlights the importance of the private sector

The strategy looks to encourage businesses to build defenses against critical vulnerabilities.

Read More

Unequal Impact:  A report from the Office of Atmospheric Programs finds racial minorities are more likely to be affected by climate disasters

The disparities extend to disaster response, where FEMA has acknowledged historical inequities in recoveries.

Read More

Ticking Away: The bans of TikTok could result in new cybersecurity challenges

Too many options exist by which individuals could regain access, and create cybersecurity vulnerabilities.

Read More

Late notice: New changes to Twitter could limit the speed at which storm warnings are issued

The company has recently restricted access that allow for the National Weather Service to automate tweets.

Read More

Watch Your Words: Organizations need to be careful about what their employees are entering into ChatGPT

By feeding the tool with sensitive information, companies run the risk of having their own secrets exposed.

Read More

Leftovers: Although cybersecurity professionals often point to users as the biggest risk, the threat posed by old and forgotten systems is growing

These Internet-facing devices and software are often unpatched, unmonitored, and not integrated into an overall IT plan.

Read More

Sponsor

The Perfect Gift for a Loved One - the Deluxe Road Warrior Kit

It supplies basic necessities for any everyday personal emergency you may encounter while traveling. Being the deluxe version of this kit it is the most comprehensive and complete kit of its type that we carry. Don't be left out on the road without one.

Click HERE >>

Sponsor

DRJ Fall 2023, Focus on Resiliency

September 10-13, JW Marriott Phoenix Desert Ridge Resort. Come to Phoenix to elevate your resiliency program, build your career and connect with hundreds of industry experts fand peers. The tools you gain will help you reduce downtime, increase safety and secure your data.

Learn more >>

Let us know about your upcoming events

Click here to view our events

Industry Pulse

Calling All Experts:

The Risk and Resilience HUB is seeking articles, case studies and thought leadership for our six pillars:

  • Operational Resilience
  • Human Concerns
  • Cybersecurity & Data Protection
  • Communications & Network
  • Physical Infrastructure
  • Incident & Crisis Response

Interested? Send us an email with your topic, your bio and a brief abstract.

Click Here >>

Good-to-Know:

25 Disaster Recovery Statistics That Prove Every Business Needs a Plan

Business continuity technologies have come a long way over the past decade, making high-quality data protection accessible to small and mid-sized businesses as well as large enterprises. However, the latest disaster recovery statistics reveal that modern businesses still face costly interruptions due to a variety of threats, ranging from ransomware attacks to sudden hardware failures to hurricanes.

Discover the stats >>

Rothstein Publishing Offers: A Free Chapter to “Introduction to Cybersecurity Law”

In today’s litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may not be a legal expert. Fortunately, in a few hours of reading, rather than months of classroom study, Tari Schreider’s Cybersecurity Law, Standards and Regulations (2nd Edition), lets you integrate legal issues into your security program.

Click Here >>

THE MARKETPLACE

Is your company not listed? Would you like it to be?
Contact Us>> to learn how to be included!!

Looking for a product or service? You have come to the right place! Click on the products of interest and link directly to hundreds of suppliers featured in the Online GUIDE.

To see all categories, Click HERE >>