The latest business continuity news from around the world

Business Continuity Awareness Week 2017

Business Continuity Awareness Week is an annual event aimed at raising awareness of the importance of business continuity. In 2017 it will be held between the 15th and 19th May. This page provides all the information you will need to make the most of the week.

The general theme for BCAW 2017 is  Cyber security is everyone’s responsibility: Play your part in building a resilient organization.

Click the tabs below for the latest information on various aspects of BCAW 2017:



  • BCAW 2017 Webinars

  • BCAW news

  • #BCAW2017

  • 2017 posters

  • BCAW 2017 resources

  • Research and statistics

Monday 15th May 2017

Embedding cyber security into continuity planning
12.00 BST
Mike Solomon (BSI)

Resiliency orchestration in the hybrid era
14.00 BST
Karpagam Venkataraman (IBM)

The GDPR’s impact on your business and preparing for compliance
15.30 BST
Alan Calder (IT Governance)

Scenario analysis: Impact of a catastrophic and prolonged CI failure on a large organization
19.00 BST
Arsen Shirokov (CIBC)

Tuesday 16th May 2017

Playing your part in building a cyber resilient organization
09.00 BST
Andrew Scott (The BCI)

Risk and resilience in 2017
10.30 BST
Chris Butler (Sungard Availability Services)

Cyber crisis management: Building organisational readiness to respond & recover
12.00 BST
Roberta Ramsden-Knowles and Charlotte Thompson (Regester Larkin by Deloitte)

Creating confident cyber crisis responses
14.00 BST
Claudia Van Den Heuvel and James Campbell (PwC)

Cyber security and the insider threat
15.30 BST
Sonny Sehgal (Transputec) and Adam Blake (ThreatSpike Labs)

Fort McMurray Wildfires: How Canadian Telecom Is Prepared for Disasters
19.00 BST
Vito Mangialardi (CTEPA)

Wednesday 17th May 2017

Supply chain cyber resilience – getting the balance right
09.00 BST
Matt Thomas and Lee Glendon (Ultima Risk Management)

Cyber Resilience - Can your organization deliver after a cyber event crisis?
10.30 BST
Al de Brito (ContinuitySA)

Cyber contingency planning: Going beyond traditional BC planning
12.00 BST
Charlotte Thompson and Charles Barlow (Regester Larkin by Deloitte)

Cyber resiliency in the hybrid era: best practices, benefits & tools for success
14.00 BST
Joe Starzyk (IBM)

Thursday 18th May 2017

Prevent email blackouts and keep your data safe during cyber attacks
09.00 BST
Mayur Pitamber (Mimecast)

Interpreting the GDPR's Article 32 in the most appropriate way for YOUR business
10.30 BST
Nick Burrows (Daisy Group)

Cyber resilience: How the culture of your organisation can improve resilience
12.00 BST
Lyn Webb (Regester Larkin by Deloitte)

Balancing resiliency, risk and regulations with consumer choice and convenience
15.30 BST
Karin Beaty (IBM)

Been hacked by cyber terrorists? What’s your Plan B?
17.00 BST
Braam Pretorius (ContinuitySA)

Cyber Resilience, It’s not just the computers
19.00 BST
Mark Baker

Friday 19th May 2017

Managing stakeholder communication during a cyber crisis and preventing a reputation meltdown
09.00 BST
Caroline Sapriel (CS&A International)

Privacy law, a catalyst for cyber resilience
12.00 BST
Padma Naidoo and Philippa Chappell (ContinuitySA)

Cyber attacks – how to identify the real scale of the problem
14.00 BST
Jon Mitchell (ClearView Continuity)

Send us your Business Continuity Awareness Week news

New report from the BCI

The BCI has launched BCAW week with the publication of a new report: 'Building resilience by improving cyber security'

The report identifies six ways that users can help improve their organization's cyber security, and also their own personal cyber security. The paper demonstrates that many of us are currently falling short of this and encourages each of us to do more.

2017 Business Continuity Awareness Week will focus on cyber resilience

The 2017 Business Continuity Awareness Week (BCAW) will take place between the 15th and 19th May and will be based around the theme of cyber resilience. The theme was chosen following a survey after BCAW 2016 by the Business Continuity Institute. Of all the suggestions made for a theme for BCAW 2017, one-third related to cyber resilience, making it the clear favourite. The survey also asked whether people preferred BCAW being held in May as it was in 2016, whether it was better when it was held in March as per previous years, or whether another month should be chosen. Four-fifths preferred the May date.

Cyber resilience has to be integrated into a broad business continuity plan

When developing cyber resilience strategies, organizations must not neglect the need for a complementary work area recovery strategy, says Innes le Roux, GM, Resilient Office Services at ContinuitySA.

The Business Continuity Institute has published a series of posters to help promote Business Continuity Awareness Week. This year’s theme is cyber security, and the series of six posters all display the message: ‘Cyber security is everyone's responsibility’.

Each poster highlights an activity that everyone can do in order to help improve cyber security, not just within your organization, but within our own personal cyber world as well. They all seem quite simple, and you might think we shouldn't need reminding of these things, but a report that the BCI will be publishing during BCAW suggests otherwise.

The posters are free to download either as a PDF in various shapes and sizes, or as an image file. They are also available with or without bleeds depending on whether you would like to print from your own computer, or you would like to get them professionally printed.

Obtain the posters from www.thebci.org/index.php/posters

External resources:

Business Continuity Institute resources

Disaster Recovery Information Exchange (DRIE) Toronto resources

Submit a resource

Recent Continuity Central resources:

(In date order)

Evolving your security operations strategy to fit the cloud
Your cloud infrastructure security will be managed by your cloud provider but the applications, workloads, and data are your responsibility. Oliver Pinson-Roxburgh looks at four areas that should be considered.
Read the article

Five security trends to watch in virtualization 
Vitaly Mzokov looks in detail at five emerging trends which are starting to effect virtualization security.
Read the article

Plugging the gaps in your incident response
Professor Avishai Woo explains how two gaps may be holding back your cyber incident response strategy: and how filling them ensures that the response takes the needs of the wider business into account.
Read the article

The dark side of business IoT
The Internet of Things will undoubtedly bring many benefits to businesses but also brings risks which need to be actively managed. Ian Parker explores the issues that IoT presents and what organizations need to do to mitigate the risks.
Read the article

A weak information security culture means your organization is vulnerable
Organizations normally understand that employees are key to improving information security, but often focus on awareness of policies and procedures. Chantelle van Wyk explains why this approach is ineffective and looks at what else organizations should be doing to strengthen the information security culture.
Read the article

Are business continuity and information security converging?
Is the increasing organizational focus on information security having an effect on the traditional demarcation lines between business continuity and information security management (ISM)? Continuity Central recently conducted an online survey to find out. 
Read the article

Information: not always secure and not always available? Some simple solutions 
Availability and security are crucial and interconnected when it comes to business continuity management. Charles Boffin looks at the questions that organizations should ask their suppliers about both these areas and provides some useful tips.
Read the article

Security policies matter for disaster recovery
Replicating the production security infrastructure at a disaster recovery site can be a problem: Professor Avishai Wool looks at how organizations should approach security policy management in their disaster recovery planning.
Read the article

Hunting cyber threats: telltale signs and protocols
The quest to seek out cyber threats can seem an impossible task; but, like any mission, ultimate success begins with methodical planning and taking an intelligence-driven approach. It requires both patience and a determination to search where others may not think to look. By Tim Bandos.
Read the article

Encryption without operational compromise
Traditional encryption has compromised network performance and troubleshooting, however this doesn’t have to be the case. In this article, Paul German explains the role that 'stealth' encryption is playing in delivering data security without operational compromise.
Read the article

The what, how and why of the cyber security threat landscape
David Emm, principal security researcher at Kaspersky Lab, describes the cyber security threats that are emerging and why these trends are occurring.
Read the article

Four factors shaping the 2017 cyber landscape
Dr Markus Jakobsson overviews four trends expected to impact cybersecurity in 2017: nation-state attacks; an increase in hybrid attacks; leveraging the cloud; and advances in cyberattack insurance.
Read the article

Data protection: why businesses should be motivated to make a security change
It’s fair to say that 2016 wasn’t a good year for data protection, with numerous high-profile breaches hitting the headlines. Unless businesses make a determined effort to improve, 2017 will be no different.
Read the article

The cybersecurity skills gap: the silent threat
The growing cybersecurity skills gap presents a very real long-term risk to organizations. In this article, Joanne Godfrey examines what organizations can do to address the issue.
Read the article

Ten cyber security trends expected in 2017
David Ferbrache, technical director in KPMG’s cyber security practice, highlights the cyber security trends that he expects to develop during 2017.
Read the article

Horizon scanning: the top cyber threats we’ll face in 2017
From record-breaking data breaches to widespread ransomware attacks, 2016 was the year that hacking went mainstream. But what does 2017 have in store for us? Continuity Central spoke to five security experts for their take on the biggest threats we’ll face in 2017...
Read the article

The above articles were published in 2017. For older articles on this subject browse our Technology section. For regular updates signup for our monthly ICT Continuity newsletter.

2017 Cyber security research and statistics

Cyber security is starting to mature in Australian organizations
IDC recently published the ‘IDC IT Security MaturityScape report for Australia’ - a study on the current state of enterprise security based upon quantitative research of over 862 organizations across the region, and 106 organizations in Australia.
Read the article

‘Rudimentary attacks’ pose greatest risk to midsized organizations
Rudimentary attacks, such as intrusion attempts, information gathering, and policy violations pose the greatest risk to midsized organizations, according to a recent cyber threat report by eSentire, Inc.
Read the article

Almost four times more budget is being spent on property related risks compared to cyber risks
The 2017 Cyber Risk Transfer Comparison Global Report, released by the Ponemon Institute and sponsored by Aon plc, found that organizations now believe that their cyber assets are more valuable than plant, property and equipment assets even though they are spending four times more budget on insurance protecting the latter risks.
Read the article

DRI survey lists cyber security as top concern of business continuity professionals
The Disaster Recovery Institute International (DRI) has published the results of a recent survey of its certified business continuity and disaster recovery professionals. DRI surveyed nearly 250 certified professionals about potential threats in the next five years.
Read the article

UK government publishes annual cyber attack statistics
New government statistics show that nearly half of all UK businesses suffered a cyber breach or attack in the past 12 months. The Cyber Security Breaches Survey 2017 reveals that nearly seven in ten large businesses identified a breach or attack with the average cost to large businesses of all breaches over the period being £20,000 and in some cases reaching millions.
Read the article

Banks confident in cybersecurity capabilities but failing when it comes to testing
Many senior bank executives are confident about their cybersecurity strategy, yet a lack of comprehensive, practical testing is an issue, according to a new report from Accenture.
Read the article

Organizations concerned about Internet of Things security and control: survey
The majority (80.1 percent) of IT professionals worry about the potential for attacks originating through their Internet of Things (IoT) devices, according to a recent survey by Lieberman Software Corporation.
Read the article

42 percent of the UK’s larger businesses hit by a cyber attack in the past year: survey
The British Chambers of Commerce (BCC) has published the results of a survey that looks at the cyber security experiences of 1200 UK businesses during the past 12 months.
Read the article

Survey identifies downtime as the main cost of business ransomware attacks
Imperva, Inc., has published the results of a survey of 170 security professionals which looks at the business impacts of ransomware attacks.
Read the article

Large increase in cyber attacks on industrial computers identified
On average two-in-five computers, related to the technological infrastructure of industrial enterprises, faced cyberattacks in the second half of 2016.
Read the article

World at a tipping point for cybersecurity says Fortinet Threat Landscape Report
Fortinet has published its latest Global Threat Landscape Report. A key finding is that cyber criminals are building ‘an army of things’ that has the potential to impact the future of the digital economy.
Read the article

UK businesses are not adapting to the new cyber security landscape: Institute of Directors
A worrying number of UK businesses have no formal plan to protect their business from a cyber-attack and the number of companies preparing themselves has not improved from a year ago. This is according to a new survey report from the Institute of Directors (IoD) and Barclays.
Read the article

Tomorrow’s hyper-connected world will require a ‘seismic shift’ in the way business continuity is planned and managed
The Information Security Forum (ISF) has published its ‘Threat Horizon 2019’ report, the latest in a series of annual Threat Horizon reports.
Read the article

DDoS attacks are an increasing threat: study
DDoS attacks are a greater security threat to businesses in 2017 than ever before, and Internet Service Providers (ISPs) need to do something about it according to a new survey of IT security professionals and network operators by Corero Network Security.
Read the article

CEO survey finds that many private companies are underprepared for cyber attacks
PwC has published the results of its 20th Global Survey of CEOs, which focuses specifically on the threats and opportunities facing the 781 private company CEOs who participated.
Read the article

Enterprises are making detection and response the top information security priority
Enterprises are transforming their security spending strategy in 2017, moving away from prevention-only approaches to focus more on detection and response, according to Gartner.
Read the article

Researchers find that sound waves could be the next cyber attack vector
Sound waves could be used to hack into critical sensors in a broad array of technologies including smartphones, automobiles, medical devices and the Internet of Things, University of Michigan research shows.
Read the article

Australian companies are a long way from cyber resilience: report
Cyber security can no longer legitimately be considered the domain of IT alone, according to the new MinterEllison 'Perspectives on Cyber Risk Report 2017'. The report's findings also show that Australian companies are being too slow to take the necessary action to mitigate and manage cyber risk.
Read the article

Study looks at zero-day vulnerabilities and what entities do when they discover them
Zero-day software vulnerabilities can lurk undetected for years, leaving software users particularly susceptible to hackers. A new study from the RAND Corporation, based on rare access to a dataset of more than 200 such vulnerabilities, provides insights about what entities should do when they discover them.
Read the article

Organizations need to do more to integrate cyber into risk management
Swiss Re's latest sigma report ‘Cyber: getting to grips with a complex risk’, says businesses need to do much more to integrate cyber security into their risk management initiatives.
Read the article

More than half of UK businesses were impacted by some form of cybercrime in 2016
New research published by Beaming, the business ISP, indicates that 52 percent of British businesses fell victim to some form of cybercrime in 2016. The study, which was conducted by researchers at Opinium, puts the cost of these attacks at £29.1 billion.
Read the article

Business E-Mail Compromise fraud risk is on the rise, warns the FBI
The FBI is advising companies to be aware of the growing risk of Business E-Mail Compromise (BEC) fraud.
Read the article

Technology related threats are business continuity managers’ key concerns
The Business Continuity Institute has published its annual Horizon Scan Report, which shows that the top three threats to organizations are all related to technology.
Read the article

Study quantifies the impact of effective identity and access management on cyber risk
A new Forrester study, commissioned by Centrify, has looked at the state of enterprise security and the impact of identity and access management maturity on breach levels.
Read the article

Cyber security skills gap leaves many organizations exposed
According to a new cyber security workforce study by ISACA’s Cybersecurity Nexus (CSX), only 59 percent of surveyed organizations say they receive at least five applications for each cyber security opening, and only 13 percent receive 20 or more.
Read the article

Cyber security preparedness examined in Cyber Readiness Report 2017
A study of 3,000 companies in the UK, US and Germany, conducted for specialist insurer Hiscox, reveals that more than half (53 percent) of businesses in the three countries are ill-prepared to deal with cyber attacks.
Read the article

The top operational risks that have harmed companies in the past five years
Equipment failure, cyber attacks and natural disasters are the top three operational risks to have negatively affected business operations, according to a FM Global-commissioned study.
Read the article

‘Expense in depth’ hinders data security: report
Despite heavy investments in a variety of data security tools as part of their data protection strategy, 93 percent of respondents to a new study report persistent technical challenges in protecting data.
Read the article

Ransomware attacks double in Europe: Global Application and Network Security Report
Radware's Global Application and Network Security Report 2016-2017 has found that hackers and companies agree on one thing: data is lucrative. According to the report, 49 percent of European businesses confirmed that ransom was the top attack motivation in 2016, an increase of nearly 100 percent from the 25 percent recorded in 2015.
Read the article

The future of cybercrime
Even more serious than the ever increasing financial and reputational risks affecting the corporate and commercial sectors are the very real possibilities of cybercrime being used to execute large scale terrorist attacks, assassinations and even murders.
Read the article

Cyber risks to intensify in 2017: and cyber risk management to change
In a new cyber predictions report, Stroz Friedberg, an Aon company, predicts that 2017 will usher in intensified cyber attacks, new regulations and a shift in how businesses approach cyber risk management.
Read the article

Many businesses unclear how to protect themselves from DDoS attacks
Research from Kaspersky Lab has found that businesses are not ready to protect themselves against DDoS, with four in ten (39 percent) businesses unclear about the most effective protection strategy to combat this type of attack.
Read the article



Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

   

Additional Resources

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.