Hi [[ session.user.profile.firstName ]]

Business Continuity Institute

  • Date
  • Rating
  • Views
  • BCI Salary Benchmarking Report
    BCI Salary Benchmarking Report Patrick Alcantara DBCI (The BCI) Recorded: Jun 13 2017 43 mins
    How much is my work worth? Am I getting paid enough? These are questions professionals often struggle with. The answers to the questions are nonetheless important as it determines job satisfaction and future career prospects. While there are salary reports available for many industries, there is a gap in data in the business continuity and resilience fields. The Business Continuity Institute has responded to this by conducting a comprehensive salary survey of business continuity and resilience roles, linking it with other factors such as educational attainment, work/supervisory experience and gender. Join Patrick Alcantara DBCI (BCI Research & Insight Lead) as he shares the results of the recently concluded BCI Salary Benchmarking Survey.
  • Cyber attacks – how to identify the real scale of the problem
    Cyber attacks – how to identify the real scale of the problem Jon Mitchell (ClearView Continuity) Recorded: May 19 2017 33 mins
    This session will focus on how this can be handled in a practical way by software, covering:

    a) Understanding the organizational impact and dependencies.
    b) Decision making based on the availability of accurate information.
    c) Assisting ‘recovery’ through effective incident management.
  • Privacy law, a catalyst for cyber resilience
    Privacy law, a catalyst for cyber resilience Padma Naidoo and Philippa Chappell (ContinuitySA) Recorded: May 19 2017 52 mins
    Privacy laws regulate the collection, storage and use of data by organisations in many countries globally. Following the proclamation of the Protection of Personal Information Act (POPI) Act into law in 2014, so too will these laws become applicable to South African organisations.
    In this digital age, technology plays a pivotal role in shaping the way in which business is done. The objective of this topic is to explore the Cyber Security and Resilience requirements placed on organisations by privacy regulations, and the impact of Cyber Security and Resilience on Business Continuity.
    This webinar will touch on the reliance placed on effective Information Security and Cyber Security solutions to ensure compliance, and explore how a breach or failure of Information Security Controls needs to be managed.
  • Managing stakeholder communication during a cyber crisis
    Managing stakeholder communication during a cyber crisis Caroline Sapriel (CS&A International) Recorded: May 19 2017 62 mins
    Cyber crime has been around for as long as we’ve been connected to the Internet, but in recent times, the criminals behind it are excelling in their creativity and ingenuity with consequences that are more damaging than ever before. Furthermore, the organisations that invest in cyber crime preparedness seem to forever be one step behind as they only get to guess what might be coming.

    The price tags of these data thefts, DDoS attacks, ransoms to unblock operating systems, etc. are going through the roof. Therefore, when faced with a cyber crisis, it is critical to demonstrate strong leadership and communicate effectively with all stakeholders to avoid spiralling down to a reputation meltdown.
  • Been hacked by cyber terrorists? What’s your Plan B?
    Been hacked by cyber terrorists? What’s your Plan B? Braam Pretorius (ContinuitySA) Recorded: May 18 2017 28 mins
    In today’s global village everyone is connected. The internet has brought billions of people together, allowing sharing of data, communication and commerce at a scale never imagined before. The value of the internet is clear for everyone to see. Unfortunately, the same internet also allows for cyber hackers and attackers to fight a new war, Cyber terrorism, theft of data and extortion. The attackers hide in plain sight. Working from homes or offices. Sometimes alone, often in syndicates. Even state sponsored cyber terrorism is on the increase.

    Large cyber security companies such as firewall providers and anti-virus vendors are spending millions of US dollars in a constant battle to stay ahead of the cyber threat. Unfortunately, these measures are not always successful in preventing cyber-attacks from occurring as can be seen from recent attack against Primera Blue Cross.

    The company, a health insurer based in Washington State, said up to 11 million customers could have been affected by a cyber attack last year. Hackers gained access to its computers on 5 May 2016 and the breach was not discovered until 29 Jan 2017. The breach probably exposed members' names, dates of birth, Social Security numbers, mailing and email addresses, phone numbers and bank account information. The company is currently working with the FBI and a cyber security firm to investigate.

    So, given that no matter what you do to protect yourself against the cyber threat, you will probably be attacked or have already been attacked. You therefore need a plan B to allow your business to continue with crucial day-to-day activities after the event.
  • Balancing resiliency, risk and regulations with consumer choice and convenience
    Balancing resiliency, risk and regulations with consumer choice and convenience Karin Beaty (IBM) Recorded: May 18 2017 46 mins
    Cyber threats. Compliance. Ease of use. These are among the growing challenges to resiliency for all organizations, but they often are at odds with another. Clients and their customers are driving a need for ease of use, customization and empowerment, which can result in a more complex, at-risk infrastructure. How can organizations manage risk and compliance - maintaining expected transparency, accountability and interconnectedness amongst all of this complexity?

    Join our discussion on the impacts of increased regulatory supervision and the effects of standards, using industry examples - and learn key strategies you can use today to manage resiliency across all levels of the enterprise to protect your business in the age of digitization and IT modernization.
  • Carry your cyber response plans in your pocket
    Carry your cyber response plans in your pocket Darren Notley (Everbridge) Recorded: May 18 2017 45 mins
    You’ve built your cyber response plan and are confident you can respond and recover from a cyber attack and have robust procedures in place. But once a business critical cyber attack has been identified, how quickly can you invoke those plans, get your team to start collaborating, communicating and coordinating the response?

    Moreover, cyber attacks don’t conveniently happen during office hours so you need to be able to mobilise your response teams across shift schedules, time zones, locations and communication devices.
    In this session we’ll look at how you can digitize your response plans, improve operational response, keep everyone informed through reliable crisis communications and simplify and standardise the organizational response.
  • Cyber resilience: How the culture of your organisation can improve resilience
    Cyber resilience: How the culture of your organisation can improve resilience Lyn Webb, Senior Manager, Regester Larkin by Deloitte Recorded: May 18 2017 33 mins
    The first defence against cyber attacks is often to impose technical barriers, but how can an organisation’s culture help mitigate the cyber risk? This session will look at the cultural aspects of security, measuring cyber security culture and suggest how behaviour can make us more resilient.
  • Interpreting the GDPR's Article 32 in the most appropriate way for YOUR business
    Interpreting the GDPR's Article 32 in the most appropriate way for YOUR business Nick Burrows (Daisy Group) Recorded: May 18 2017 53 mins
    With its 25th May 2018 deadline, the General Data Protection Regulations have become the stuff that marketing dreams are made of, but the delivery of appropriate levels of confidentiality, integrity and availability for affected data does not have to mean vast amounts of investment in cutting edge technology and expensive consultancy engagements. In this session we will have a closer look at what the end results of Article 32 (Security of Processing) actually need to look like and address some of the terminology used so that delegates properly understand what the regulation demands from them and their businesses. In the context of business continuity, we will further look into how current strategies match up to GDPR and what can be done to optimise them for May 2018 and beyond.
  • Prevent email blackouts and keep your data safe during cyber attacks
    Prevent email blackouts and keep your data safe during cyber attacks Mayur Pitamber (Mimecast) Recorded: May 18 2017 51 mins
    Organizations feel the pain of successful cyber attacks through the loss of personal customer information, release of commercially sensitive data or the disruption of business critical email systems. The effects are devastating, with wide-ranging damage to corporate reputation or loss of competitive advantage.

    91% of successful attacks start with email. Learn how cyber resilience best practices can help organizations tackle cyber risks effectively, improve productivity and ensure business continuity by providing cyber security assurances to ecosystem partners, stakeholders and customers.

Embed in website or blog