Follow The BCI

Tags

business continuity 508 business continuity institute 144 bci 127 cyber security 89 BCAW2017 68 Horizon Scan 62 conference 60 BCI World 53 bci awards 49 business continuity planning 38 business continuity awareness week 31 resilience 28 exercise 27 supply chain 26 BCAW2016 26 cyber attack 24 bcaw2015 24 risk 23 return on investment 22 BSI 18 data breach 18 Brexit 18 Middle East 17 disaster recovery 16 ransomware 15 research 15 small business 15 cyber resilience 13 bcaw 2013 11 natural disaster 11 information security 11 working paper series 10 climate change 9 social media 9 organizational resilience 9 risk management 9 GDPR 9 PwC 8 Everbridge 8 IBM 8 Supply Chain Resilience 7 ISO22301 7 flooding 7 insurance 7 20/20 7 emergency communications 7 good practice guidelines 7 cyber threat 6 cpd 6 Standards 6 Ponemon Institute 6 conference 2013 6 reputation 6 horizon scanning 6 bcaw 6 bcaw 2014 6 cyber 6 training. 5 preparedness 5 Canada 5 Australasia 5 crisis management 5 Think Tank 5 adverse weather 5 India 5 weather 5 Sungard AS 4 DDoS 4 education month 4 bcm 4 terrorism 4 continuing professional development 4 regulations 4 CBCI 4 Zurich Insurance Group 4 executive forum 4 20 in their 20s 4 counting the cost 4 flashblog 4 earthquake 4 retail 4 Regus 4 data protection 4 security 4 politics 4 FM Global 4 disruption 4 Qatar 4 Christmas 4 bs 65000 4 hall of fame 4 steelhenge 3 ISACA 3 Africa 3 training 3 continuity shop 3 testing 3 inspiring the future 3 travel 3 awareness 3 SMBs 3 colleges 3 referendum 3 critical infrastructure 3 RBCA 3 legislation 3 c-suite toolkit 3 careers 3 schools 3 severe weather 3 scotland 3 Awards 3 KPMG 3 industrial action 3 Bucks New University 3 future 3 IT outage 3 BIA 3 guidelines 3 plan b consulting 3 organisational resilience 3 independence 3 Allianz 3 exercising 3 salary 3 north america 2 Greece 2 the bc eye 2 collaboration 2 continuous professional development 2 dbci 2 Turkey 2 passwords 2 information 2 board of directors 2 c-suite engagement 2 Deloitte 2 Business Impact Analysis 2 it disruption 2 SME 2 recruitment 2 europe 2 belgium 2 heatwave 2 ebola 2 cmi 2 business continuity plan 2 working paper 2 response 2 product recall 2 bcm world conference and exhibition 2013 2 Keeper Security 2 Zurich 2 cyber risk 2 workplace recovery 2 Towergate 2 World Economic Forum 2 ISO 2 Sungard 2 Clearview Continuity 2 app 2 crisis preparedness 2 netherlands 2 bcp 2 WCDM 2 good practice 2 incident response 2 aon benfield 2 Evolve IP 2 twitter 2 Singapore 2 catastrophe 2 middle east awards 2 public sector 2 black swan 2 aon 2 practice 2 black swans 2 partner alliance 2 Ponemon 2 xmatters 2 workshop 2 European Union 2 pandemic 2 skills shortage 2 hurricane 2 Databarracks 2 insider threat 2 crises control 2 General Election 2 cebr 2 Sungard Availability Services 2 nqa 2 award ceremonies 2 business continuity management 2 virus 2 australasian awards 2 glossary 1 collaborative working 1 2013 threats 1 Hurricane Matthew 1 Cranfield University 1 thought leadership in business continuity 1 paddington bear 1 imagery 1 awards ceremony 1 business resilience 1 tube strike 1 drj spring world 1 CFO 1 business disruption 1 G20 1 membership 1 rto 1 graduation 1 salary benchmarking survey 1 contingency plans 1 welfare 1 Reckon 1 corporate research forum 1 fire 1 contingency planning 1 phoenix 1 cio 1 unicef 1 Internet of Things 1 it risk 1 verisk maplecroft 1 solar eclipse 1 new year resolutions 1 confederation of british industry 1 neustar 1 trend 1 world conference 1 kroll ontrack 1 succession planning 1 telecom disruption 1 sony 1 nationwide direct 1 megatrends 1 telecoms outage 1 maths 1 continuity capability 1 ibm resiliency services 1 Americas 1 #BCAW2016 1 Northern Ireland 1 lrqa 1 business continuity awards 1 internet outage 1 policy and programme management 1 cbi 1 glasgow 2014 1 chennai 1 Intermedia 1 Daisy 1 planning 1 mentoring 1 careers centre 1 notification 1 zetta 1 Center for Strategic and International Studies 1 education 1 exam 1 award 1 barclaycard 1 disease 1 networking 1 incentives 1 modern slavery act 1 peru 1 elaine tomlin 1 active shooter 1 human resources 1 funding 1 uk government 1 risk assessments 1 crisis response 1 lorraine darke 1 scenario 1 20/20 vision 1 bcm lifecycle 1 london 1 compliance 1 regulation 1 business excellence awards 1 mca 1 third party 1 enterprise risk management 1 continuity2 1 carbonite 1 Datto 1 idc 1 psychology 1 Hamburg 1 conference 2014 1 world conference on disaster management 1 disaster 1 united kingdom 1 swiss re 1 mi5 1 fotune 1 emergency 1 damage management 1 non profit 1 gchq 1 blogging 1 crisis guardian 1 smart device 1 risk managment 1 global membership council 1 Kensington 1 prof steve peters 1 EY 1 embedding bc 1 workforce planning 1 fortune magazine 1 design and implementation 1 coventry university 1 business continuity training 1 transputec 1 afbci 1 8x8 solutions 1 management 1 mobile technology 1 cyber crime 1 pearson 1 identity theft 1 diplomatic row 1 malaysia 1 desktop exercise 1 CIPS 1 china conference 1 validation 1 Marsh 1 Proofpoint 1 sustainability 1 it risk management 1 SentinelOne 1 webinar 1 outsourcers 1 learning from experience 1 android 1 global awards 2012 1 mtpd 1 charity 1 Parliament 1 competition 1 future cities and community resilience 1 Alberta 1 bc strategy 1 european awards 1 prolexic 1 fifa world cup 1 supply chain management 1 network roi 1 apec 1 hp 1 Datapac 1 milton keynes 1 webroot 1 mkbrf 1 employees 1 strike 1 typhoon haiyan 1 cybercrime 1 New Zealand 1 mobile working 1 bs65000 1 houses of parliament 1 Pinsent-Masons 1 cv 1 business resilience forum 1 lessons 1 linus 1 career 1 digital 1 threat analysis 1 digital risk 1 Hollywood Presbyterian Medical Center 1 rules 1 Global Risks Report 1 Intel Security 1 recovery time objective 1 game show 1 Risk Barometer 1 #testingtimes 1 lyndon bird 1 telecommunications 1 irm 1 service failure 1 gpg 1 recovery 1 bcm software 1 kaspersky 1 wildfire 1 facilities 1 bcaw 2015 1 economy 1 bcm world conference 1 ​ntt com security 1 case studies 1 harvey nash 1 test 1 crisis communications 1 middle east bcm summit 1 power failure 1 commonwealth games 1 audit 1 Disaster Recovery Information Exchange 1 malware 1 iso 27001 1 corporate culture 1 arbor networks 1 Timico 1 outsourcing 1 british standards institute 1 imt 1 human error 1 data privacy 1 bci middle east awards 1 certification 1 2020 group 1 thought leadership 1 plan 1 regester larkin 1 information technology 1 iso27001 1 cyber attacks 1 jobs 1 cobalt 1 acp 1 consumer goods forum 1 DRIE 1 emergency services 1 hackers 1 pgi cyber 1 flexible working 1 disaster resource guide 1 local authority 1 operational risk 1 internship 1 49ers 1 Munich RE 1 sucession planning 1 blue swan 1 labour dispute 1 industral dispute 1 zika 1 acronyms 1 emergency planning college 1 nfl 1 iso 22301 1 recovery efforts 1 rpo 1 postal strike 1 in hindsight 1 c-suite 1 senior management 1 united states 1 corporate social responsibility 1 Experian 1 technical director 1 mimecast 1 Cyber Resilience Report 1 smartphone 1 keynote speech 1 cloud 1 smart cities 1 Asia 1 strikes 1 natural catastrophe 1 futurology 1 cmt 1 professional 1 business continuity programme 1 recovery service 1 Thales 1 fake news 1 manufacuring 1 reputational risk 1 organizational resiliece 1 UCL 1 physical security 1 hob 1 volunteer 1 federation of small businesses 1 qualifications 1 non-profit 1 veritas 1 incident management 1 bci hall of fame 1 red cross 1 national crime agency 1 slavery 1 Donald Trump 1 TalkTalk 1 institute of risk management 1 national sickie day 1 keynote 1 Show all tags

Tag / BCAW2017

The reputational damage of fake news

The reputational damage of fake news

News   •   May 31, 2017 17:08 BST

Fake news may not be a new concept, but it is becoming a big issue at the moment with people being warned to treat with caution what they read on the internet. Many outlets are deliberately pushing out fake stories in order discredit another individual or organization, or to gain attention and attract more advertising revenue.

Cyber security in the WannaCry age

Cyber security in the WannaCry age

Blog posts   •   May 19, 2017 15:48 BST

One way to effectively build and maintain organizational resilience on an enterprise level is creating a cyber security program that repels and recovers from cyber attacks, following the Four Rs of Resilience: Robustness, Redundancy, Resourcefulness, and Rapidity. For our purposes with regards to WannaCry, let’s focus on just two factors: Robustness and Redundancy.

Most people are ill-equipped to deal with ransomware

Most people are ill-equipped to deal with ransomware

News   •   May 19, 2017 12:05 BST

Last week's ransomware attack, which affected 200,000 computer systems in 150 countries and crippled hospitals across the United Kingdom, is a frightening reminder of how much damage can be done by this type of malicious cyber attack. However, a new survey reveals that most people are ill equipped to deal with such an attack.

Building resilience by improving cyber security

Building resilience by improving cyber security

News   •   May 17, 2017 17:00 BST

In a new paper published by the Business Continuity Institute – Building resilience by improving cyber security – it is revealed that several activities which many of us perform out of habit could be making our organizations more vulnerable to the cyber threat, and identifies six simple steps that each of us can take to help improve security.

Cyber resilience is critical in the digital age

Cyber resilience is critical in the digital age

Blog posts   •   May 17, 2017 11:22 BST

As business enters the digital age, cyber resilience must become a regular agenda item for boards and excos. Nobody can identify and prepare for all the risks that threaten ICT systems, so it is essential that security and risk mitigation measures are part of a wider programme to ensure that the organisation can detect a cyber attack, respond appropriately and recover operational functionality.

We’re not going to say I told you so… but we did tell you

We’re not going to say I told you so… but we did tell you

Blog posts   •   May 16, 2017 10:25 BST

“Maybe you are busy looking for a way to recover your files but do not waste your time. Nobody can recover your files without our decryption service”. This is what users infected by the WannaCry virus read on their screens having accidentally let the malware in.

Business continuity is what will pull your business through during a cyber attack

Business continuity is what will pull your business through during a cyber attack

Press Releases   •   May 15, 2017 22:22 BST

Despite the Wanna Decryptor ransomware attack affecting a reported 200,000 systems across over 150 countries, and despite the tales of disaster we are reading about in the media, the encouraging news from many organizations is that their business continuity process is preventing a disruption from turning into a crisis.

NHS Trusts in England hit by ransomware attacks

NHS Trusts in England hit by ransomware attacks

Blog posts   •   May 12, 2017 17:36 BST

​NHS services across England have been hit by an IT failure caused by a significant cyber attack, with Trusts and hospitals in London, Blackburn, Nottingham, Cumbria and Hertfordshire all affected. Some GP surgeries have shut down their phone and IT systems while Accident and Emergency Departments have told people not to attend unless it is a real emergency.

Small businesses compromising on cyber security

Small businesses compromising on cyber security

News   •   May 11, 2017 19:46 BST

More than two-thirds (70%) of IT managers at small and medium sized enterprises say budget considerations have forced them to compromise on security features when purchasing endpoint security, according to a survey by ​VIPRE.

Insider and third-party access rank as top cyber threats

Insider and third-party access rank as top cyber threats

News   •   May 10, 2017 11:05 BST

Despite rising awareness of the threats posed by users with privileged access permissions, most organizations still allow a myriad of internal and external parties to access their most valuable systems and data. Many are placing trust in both employees and third parties without a proven means of managing, controlling, and monitoring the access they have to critical systems and networks.

Social engineering is a top cause of cyber incidents

Social engineering is a top cause of cyber incidents

Blog posts   •   May 09, 2017 14:47 BST

Sonny Sehgal and Adam Blake, from Crises Control partners Transputec and ThreatSpike, will be talking about the social engineering threat in their webinar on ​cyber security and the insider threat during Business Continuity Awareness Week 2017 on Tuesday 16th May.

Organizations worldwide fear non-compliance with GDPR could put them out of business

Organizations worldwide fear non-compliance with GDPR could put them out of business

News   •   May 05, 2017 12:38 BST

The vast majority of organizations worldwide (86%) are concerned that a failure to adhere to the upcoming General Data Protection Regulation (GDPR) could have a major negative impact on their business, according to a study by Veritas Technol​ogies. Nearly 20% said they fear that non-compliance could put them out of business.

Lax cyber security as workers blindly open email attachments

Lax cyber security as workers blindly open email attachments

News   •   May 04, 2017 16:53 BST

​Lax approaches to popular threats such as email attachments, and inadequate threat-awareness, poor work-practices and out-of-date technology, are exposing organizations to hacking, ransomware and zero-day attacks, says a report published by ​Glasswall Solutions.

Organizations leaving sensitive files accessible to all employees

Organizations leaving sensitive files accessible to all employees

News   •   Apr 28, 2017 10:42 BST

​There is an alarming level of exposure for corporate and sensitive files across organizations, including an average of 20% of folders per organization open to every employee, according to a new study conducted by ​Varonis.

Cyber espionage and ransomware attacks are on the increase

Cyber espionage and ransomware attacks are on the increase

News   •   Apr 27, 2017 11:12 BST

Cyber espionage is now the most common type of attack seen in manufacturing, the public sector and education, warns Verizon's latest Data Breach Investigations Report. Much of this is due to the high proliferation of propriety research, prototypes and confidential personal data, which are hot-ticket items for cyber criminals.

Cyber security is a ‘people problem’

Cyber security is a ‘people problem’

News   •   Apr 26, 2017 10:28 BST

Over 80% of security professionals identify ‘people’ as the industry’s biggest challenge, as opposed to technology and processes, according to the results of the second annual survey from the Institute of Information Security Professionals (IISP).

Cyber security put on the back burner

Cyber security put on the back burner

News   •   Apr 25, 2017 12:49 BST

A worrying number of UK businesses have no formal plan to protect them from cyber attack and there has been no improvement from a year ago, according to a study conducted jointly by the Institute of Directors and Barclays.

Employees too willing to share sensitive information

Employees too willing to share sensitive information

News   •   Apr 21, 2017 09:48 BST

Not only are many employees likely to share confidential information, but they are doing so without proper data security protocols in place or in mind, according to a new study by ​Dell. Today's workforce is caught between two imperatives: be productive and efficient on the job, and maintain the security of the organization's data.

Almost half of UK firms hit by cyber breach or attack in the past year

Almost half of UK firms hit by cyber breach or attack in the past year

News   •   Apr 19, 2017 16:22 BST

Businesses large and small are being urged to protect themselves against cyber crime after new Government statistics found nearly half of all UK businesses suffered a cyber breach or attack during the previous year.

SMEs underfunding cyber security

SMEs underfunding cyber security

News   •   Apr 13, 2017 10:46 BST

The vast majority of small to medium sized enterprises (86%) have less than a tenth of their total IT budget allocated to cyber security, while 75% have between zero and two IT security staff members, according to the results of a survey by EiQ Networks.