Hi [[ session.user.profile.firstName ]]

BCI Webinar: Resiliency… taking business continuity to the next level

Today a proactive approach is needed to ensure the ability to adapt to unexpected risks ever more quickly and cost-effectively, to bounce back…resilience.

Resilience is the capability of an organization to deal with incidents that cannot be predicted and to adapt to changes over which we have no control. This presentation will explore the relationship between business continuity management and resilience and some of the ways to build a more resilient organization.
Recorded Sep 4 2015 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Betty Kildow FBCI
Presentation preview: BCI Webinar: Resiliency… taking business continuity to the next level

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Privacy law, a catalyst for cyber resilience May 19 2017 11:00 am UTC 60 mins
    Padma Naidoo and Philippa Chappell (ContinuitySA)
    Privacy laws regulate the collection, storage and use of data by organisations in many countries globally. Following the proclamation of the Protection of Personal Information Act (POPI) Act into law in 2014, so too will these laws become applicable to South African organisations.
    In this digital age, technology plays a pivotal role in shaping the way in which business is done. The objective of this topic is to explore the Cyber Security and Resilience requirements placed on organisations by privacy regulations, and the impact of Cyber Security and Resilience on Business Continuity.
    This webinar will touch on the reliance placed on effective Information Security and Cyber Security solutions to ensure compliance, and explore how a breach or failure of Information Security Controls needs to be managed.
  • Managing stakeholder communication during a cyber crisis May 19 2017 8:00 am UTC 60 mins
    Caroline Sapriel (CS&A International)
    Cyber crime has been around for as long as we’ve been connected to the Internet, but in recent times, the criminals behind it are excelling in their creativity and ingenuity with consequences that are more damaging than ever before. Furthermore, the organisations that invest in cyber crime preparedness seem to forever be one step behind as they only get to guess what might be coming.

    The price tags of these data thefts, DDoS attacks, ransoms to unblock operating systems, etc. are going through the roof. Therefore, when faced with a cyber crisis, it is critical to demonstrate strong leadership and communicate effectively with all stakeholders to avoid spiralling down to a reputation meltdown.
  • Been hacked by cyber terrorists? What’s your Plan B? May 18 2017 4:00 pm UTC 60 mins
    Braam Pretorius (ContinuitySA)
    In today’s global village everyone is connected. The internet has brought billions of people together, allowing sharing of data, communication and commerce at a scale never imagined before. The value of the internet is clear for everyone to see. Unfortunately, the same internet also allows for cyber hackers and attackers to fight a new war, Cyber terrorism, theft of data and extortion. The attackers hide in plain sight. Working from homes or offices. Sometimes alone, often in syndicates. Even state sponsored cyber terrorism is on the increase.

    Large cyber security companies such as firewall providers and anti-virus vendors are spending millions of US dollars in a constant battle to stay ahead of the cyber threat. Unfortunately, these measures are not always successful in preventing cyber-attacks from occurring as can be seen from recent attack against Primera Blue Cross.

    The company, a health insurer based in Washington State, said up to 11 million customers could have been affected by a cyber attack last year. Hackers gained access to its computers on 5 May 2016 and the breach was not discovered until 29 Jan 2017. The breach probably exposed members' names, dates of birth, Social Security numbers, mailing and email addresses, phone numbers and bank account information. The company is currently working with the FBI and a cyber security firm to investigate.

    So, given that no matter what you do to protect yourself against the cyber threat, you will probably be attacked or have already been attacked. You therefore need a plan B to allow your business to continue with crucial day-to-day activities after the event.
  • Balancing resiliency, risk and regulations with consumer choice and convenience May 18 2017 2:30 pm UTC 60 mins
    Karin Beaty (IBM)
    Cyber threats. Compliance. Ease of use. These are among the growing challenges to resiliency for all organizations, but they often are at odds with another. Clients and their customers are driving a need for ease of use, customization and empowerment, which can result in a more complex, at-risk infrastructure. How can organizations manage risk and compliance - maintaining expected transparency, accountability and interconnectedness amongst all of this complexity?

    Join our discussion on the impacts of increased regulatory supervision and the effects of standards, using industry examples - and learn key strategies you can use today to manage resiliency across all levels of the enterprise to protect your business in the age of digitization and IT modernization.
  • Cyber resilience: How the culture of your organisation can improve resilience May 18 2017 11:00 am UTC 60 mins
    Lyn Webb, Senior Manager, Regester Larkin by Deloitte
    The first defence against cyber attacks is often to impose technical barriers, but how can an organisation’s culture help mitigate the cyber risk? This session will look at the cultural aspects of security, measuring cyber security culture and suggest how behaviour can make us more resilient.
  • Interpreting the GDPR's Article 32 in the most appropriate way for YOUR business May 18 2017 9:30 am UTC 60 mins
    Nick Burrows (Daisy Group)
    With its 25th May 2018 deadline, the General Data Protection Regulations have become the stuff that marketing dreams are made of, but the delivery of appropriate levels of confidentiality, integrity and availability for affected data does not have to mean vast amounts of investment in cutting edge technology and expensive consultancy engagements. In this session we will have a closer look at what the end results of Article 32 (Security of Processing) actually need to look like and address some of the terminology used so that delegates properly understand what the regulation demands from them and their businesses. In the context of business continuity, we will further look into how current strategies match up to GDPR and what can be done to optimise them for May 2018 and beyond.
  • Cyber resiliency in the hybrid era: best practices, benefits & tools for success May 17 2017 1:00 pm UTC 60 mins
    Joe Starzyk (IBM)
    There is a growing demand for organizations to extend their operations out of a secure, controlled domain into an unpredictable ecosystem, for reasons such as cost reduction, increases in productivity, profitability requirements and regulatory pressures, to name a few. This expansion into hybrid environments exposes businesses into unforeseen risks, requiring a more formidable capability relative to the resiliency measures that need to be in place. A strong cyber resiliency framework that includes a combination of security, business continuity and a resilient control system can help to mitigate disruptions of critical business functions and enable confidence across the entire enterprise in the event of a cyber breach.

    In this webinar, you will learn tactical approaches for implementing cyber resilience, including evolving industry practices for enhanced cyber resiliency, benefits to be realized beyond mitigation of threats and risk reduction, and technological advancements that support successful cyber resiliency.
  • Cyber contingency planning: Going beyond traditional BC planning May 17 2017 11:00 am UTC 60 mins
    Charlotte Thompson, Senior Manager, and Charles Barlow, Manager, Regester Larkin by Deloitte
    Business continuity planning has long helped organisations prepare for, respond to and recover from all types of disruption. Sophisticated and enduring cyber incidents, however, can challenge the planning assumptions many organisations rely on, including recovery time and recovery point objectives. This session will look at how organisations can go beyond traditional business continuity planning to enhance cyber incident readiness.
  • Cyber Resilience - Can your organization deliver after a cyber event crisis? May 17 2017 9:30 am UTC 60 mins
    Al de Brito, ContinuitySA
    Take your mark. Get set… and go. What do you do if your organization is faced with a crisis, do you have the necessary steps and procedures to recover from a cyber attack?

    91% of APT (Advanced Persistent Threats) begin with spear phishing emails. Cyber criminals increasingly target employees within an organization who have administrative rights and access to critical systems. Successfully phishing these individuals could give them the ‘key’ to breaching security in further attacks.

    This webinar will cover five domains to assist the organization to maintain a framework with the ability to deliver the outcomes consistently at all times. These domains focus on preventative, detective and reactive controls within the organization, and form part of the process of having the ability to recover in the event of a crisis.

    These five domains will follow the process of identifying, protecting, detecting, responding and recovering, giving a holistic view of the full cycle of infrastructure resilience.
  • Supply chain cyber resilience – getting the balance right May 17 2017 8:00 am UTC 60 mins
    Matt Thomas and Lee Glendon (Ultima Risk Management)
    Today’s digitised value chains have a very high dependency on third parties. This exposure is not lost on potential attackers, who will invest resources in researching, identifying and selecting targets among value chain partners. It would be an uneven contest were firms not to take steps to understand these vulnerabilities and ‘value at risk’ themselves. This webinar will set out clear steps that can be taken to understand potential vulnerabilities among third parties and will introduce a lifecycle approach to support robust third party risk management from the start of the relationship through to exit.
  • Cyber security and the insider threat May 16 2017 2:30 pm UTC 60 mins
    Sonny Sehgal (Transputec) and Adam Blake (ThreatSpike Labs)
    The greatest threat to the corporate security perimeter now comes not from the outside, but the inside. Social engineering threats such as phishing, malware and ransomware target the weakest link, the human factor. This webinar will expose the techniques of the hackers and offer advice on how these can be combatted to make your business more resilient in the face of the cyber threat.
  • Cyber crisis management: Building organisational readiness to respond & recover May 16 2017 11:00 am UTC 60 mins
    Roberta Ramsden-Knowles, Director and Charlotte Thompson, Senior Manager, Regester Larkin by Deloitte
    This session will focus on how organisations can build senior executive level readiness to respond and recover from sophisticated cyber incidents. It will provide an overview of the threat landscape and consider the differences cyber crises present for senior executives. Participants will learn about some of the challenges faced when responding to a cyber incident and how to overcome them by building readiness in people, structures, processes and plans.
  • The GDPR’s impact on your business and preparing for compliance May 15 2017 2:30 pm UTC 60 mins
    Alan Calder (IT Governance
    The EU General Data Protection Regulation (GDPR) comes into effect on 25 May 2018, and will significantly reshape the data protection landscape for organisations that collect and process the data of European residents. Therefore businesses will need to take responsibility for the way they collect and process personal data and will have to take immediate action to align their business systems with the requirements of the GDPR.

    This webinar session will cover:

    •An overview of the General Data Protection Regulation (GDPR).
    •The impact GDPR creates on businesses and the transition timelines.
    •The first steps in preparing for GDPR compliance.
    •The technical and organisational measures your business will need to adopt to comply with the Regulation.
    •Key recommendations and best-practices to achieve and manage GDPR compliance.
  • Resiliency orchestration in the hybrid era May 15 2017 1:00 pm UTC 60 mins
    Karpagam Venkataraman (IBM)
    Are you confident in your IT recovery program? In today’s hybrid IT environment, interconnected, mission-critical applications run across diverse platforms and geographies. The manual disaster recovery process traditionally followed, requires huge time, resource and efforts to scale up DR management for all critical IT assets. This leads to critical IT resources being excluded from DR programs. As per a recent survey, IBM found that 78% of enterprises face unacceptable risk for core enterprise IT resources.

    With growing threat of cyber breaches, assured resiliency to support business objectives requires a new approach, including constant, intelligent monitoring and proactive action to achieve DR SLAs.

    In this webinar you will learn how resiliency orchestration is transforming resiliency, explore the complexity of hybrid environments and the roadblocks behind DR and business continuity, and understand the benefits of Resiliency Orchestration and how it can enhance confidence in your cyber resilience program
  • Improving business resilience through Software Asset Management Recorded: Apr 8 2017 60 mins
    Deepak Singh, President & CEO of Gorisco Solutions
    Software Asset Management and compliance is gaining more importance day by day due to the outburst of Information technology and increasing dependency of businesses on IT. Many software licenses are purchased by IT or businesses out of necessity and then forgotten due to its intangible form. Even freeware and open source software are downloaded and used by employees. As Software Asset Management (SAM) involves a lot of complexities, an objective based implementation and management of software assets is very critical. This session will give more insights into SAM and recommended best practices to ensure businesses do not end up getting into legal issues and losing revenues due to ignorance and poor management of software assets.
  • BCI Horizon Scan 2017 Recorded: Mar 27 2017 60 mins
    Patrick Alcantara (BCI) & John DiMaria (BSI)
    What are the threats facing your organization? The Business Continuity Institute's annual Horizon Scan Report, in collaboration with BSI, outlines what the main threats are according to business continuity and resilience professionals worldwide, segmented by region, sector and size of organization. Read the report, and if you have questions or want a better understanding of what it means, then makes sure you tune into this webinar.
  • Latest trends revealed: The 2016 BCI Emergency Communications Report Recorded: Jan 17 2017 59 mins
    Owen Miles (Everbridge) & Patrick Alcantara DBCI (BCI)
    The Business Continuity Institute (BCI) has just published its latest research project, The Emergency Communications Report. The annual report surveyed over 600 industry professionals, reviewing emergency communications and security incident response plans for organizations around the world. This year’s findings revealed that global businesses are increasingly aware that true business resiliency is a company-wide initiative that involves taking accountability for the safety of all staff—whether they are located in the office, at home or on the road. Respondents indicated that a diversity of departments, including business continuity, IT, security, facilities, HR and more had a stake in the management, planning and enforcement of their organization’s emergency communications plans, but that an opportunity exists to optimize these processes to account for a global, mobile workforce, as well as the increased complexity and frequency of critical events and physical security incidents.

    Join Owen Miles, Managing Consultant from Everbridge, and Patrick Alcantara DBCI, Senior Research Associate at the BCI and the author of the report, for an engaging webinar that will discuss the research findings and share additional best practices for critical communications.
  • Latest trends revealed: Business in blockchain Recorded: Jan 7 2017 60 mins
    Pradeep Prasad
    Despite many business and technology innovations, business frictions still exist. Key business frictions drive delays, costs and risks.
    In this presentation, we examine the dimensions of business friction and attributes of blockchains that can break the status quo. Blockchains can vaporize business frictions, redefining the structure of future business networks and creating new opportunities for business transformation
    As this transformation unfolds, three things will change: a new science of organizational management, the tightening of trust and a new nexus for value exchange will emerge

    And finally, as companies seize the opportunity available to them, businesses can take few steps to best extract value from blockchains. And as the risk of doing business reduces, as the risk of formal financial reporting reduces, Business Continuity and Resilience is assured. Disaster Recovery becomes key to ensuring Blockchain delivers on its promise.

    Join Veteran Commander Pradeep Prasad, Chairman of BCI Bengaluru Forum for an engaging webinar that will demystify Blockchain for the audience.
  • Supply Chain Risk never sleeps, do you? Recorded: Nov 16 2016 60 mins
    Nick Wildgoose and Tim Astley (Zurich Insurance Group)
    In this session, Nick Wildgoose Global Supply Chain Product Leader and Tim Astley Regional Practice Leader Strategic Risk & Business Resilience will summarise the key points from the latest BCI Supply Chain Resilience Survey and talk about a number of key actions that can be taken improve the risk picture. These will include:

    - How do you approach getting Executive support for a supply chain risk program
    - The importance of having a comprehensive approach to supply chain risk management
    - The increasing role of technology and big data in understanding supply chain risk
  • Making to the jump to risk management Recorded: Sep 28 2016 64 mins
    Jeff Blackmon FBCI
    There has always been change in our profession. We originally started by implementing disaster recovery programmes. Soon after that, the businesses realized that the people aspect of recovery was needed as well. The results were the beginning of business continuity programmes. DR and BC have worked together almost two decades now with great success. We are now at a major transformation point again. Business continuity is now sharing more information and interacting more with security and compliance groups.

    This session will go over what most of us already have in place, what we will need to add, and how all three groups interface together to provide a new resilience program for your environment. The goal of this session is to show the interactions between risk management, business continuity, security and compliance that form the components of a resilience programme.
Promoting a more resilient world
The Business Continuity Institute (BCI) is the world’s leading institute for business continuity. Established in 1994, the BCI has established itself as the leading membership and certifying organization for Business Continuity (BC) professionals worldwide. The BCI currently has over 8,000 members in more than 120 countries.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: BCI Webinar: Resiliency… taking business continuity to the next level
  • Live at: Sep 4 2015 2:00 pm
  • Presented by: Betty Kildow FBCI
  • From:
Your email has been sent.
or close