This newsletter highlights all the feature articles published on Continuity Central during February 2017 as well as various resources.

NOTE: If you cannot read this newsletter properly visit www.continuitycentral.com/roundupmar2017.html

FEATURE ARTICLES

Daisy

Want to write for Continuity Central?

We are always on the look out for professionals who would like to express their opinions or who wish to share their knowledge with others. If you would like to contribute please contact editor@continuitycentral.com for more details.

Managed cloud with an emphasis on the ‘managed’
Using a managed cloud service can help reduce risks in this area; but it is an important strategic decision that organizations need to get right first time. Jake Madders provides a checklist to help those taking this step.
Read the article
• UK / World

Security policies matter for disaster recovery
Replicating the production security infrastructure at a disaster recovery site can be a problem: Professor Avishai Wool looks at how organizations should approach security policy management in their disaster recovery planning.
Read the article
• World

Are business continuity and information security converging?
The Business Continuity Institute's latest Horizon Scan Report shows that cyber attacks and data breaches are seen as the two greatest threats to organizations. Is the increasing focus on information security having an effect on the traditional demarcation lines between business continuity and information security management? This short survey explores this issue.
Take part in the survey
• World

LogicNow

Hunting cyber threats: telltale signs and protocols
The quest to seek out cyber threats can seem an impossible task; but, like any mission, ultimate success begins with methodical planning and taking an intelligence-driven approach. It requires both patience and a determination to search where others may not think to look. By Tim Bandos.
Read the article
• World

Why business resilience should be about people: not algorithms
To become more widely accepted the business continuity and resilience profession needs to change its focus from science and analysis; and it needs to understand that people should be at the heart of a resilient businesses. Paul Kudray explains…
Read the article
• UK / World

Encryption without operational compromise
Traditional encryption has compromised network performance and troubleshooting, however this doesn’t have to be the case. In this article, Paul German explains the role that 'stealth' encryption is playing in delivering data security without operational compromise.
Read the article
• UK / World

ClearView

Post truth, alternative facts, fake news: implications for businesses
Geary Sikich looks at the rise of post truth, alternative facts and fake news; considers the impact on organizations; and looks at how business continuity planners can rise to meet the challenge.
Read the article
• US / World

The what, how and why of the cyber security threat landscape
David Emm, principal security researcher at Kaspersky Lab, describes the cyber security threats that are emerging and why these trends are occurring.
Read the article
• World

Business continuity trends and challenges 2017
During the final quarter of 2016 Continuity Central conducted an online survey asking business continuity professionals about their expectations for 2017. This article provides the results of the survey. One surprise from the survey is a significant increase in the number of organizations that will be increasing their spending on business continuity in 2017.
Read the article
• World

Continuity2

Adaptive business continuity starts to emerge
In September 2015 business continuity experts David Lindstedt and Mark Armour launched the Continuity 2.0 Manifesto (now termed The Adaptive BC Manifesto); an attempt to take business continuity in a new direction. David Lindstedt provides an update on progress to date and future expectations.
Read the article
• World

Choosing business continuity software
If you’re faced with the task of choosing business continuity management software this can often seem overwhelming. In this article, RiskLogic provides a checklist of the important factors you should look for whilst making a decision.
Read the article
• Australia / World

Crisis Solutions

Giving millennials the keys to a kingdom without borders
The global workforce is increasingly populated by people from the millennial generation; creating new expectations for organizations to offer a flexible mobile work environment. However, this brings its own challenges, as Al Sargent explains…
Read the article
• World

Eight steps to determine if hyperconverged is the right solution for your organization
Hyperconverged technology is a new trend, but it is not suitable for every organization. It is important to assess any proposed implementation carefully to ensure that it doesn’t become a business risk in its own right.
Read the article
• US / World

RESEARCH, REPORTS & PUBLICATIONS

inoni

Updated version of ISO 31000 available for public review
The ISO/TC 262 Risk Management committee has announced that its review of the ISO 31000 risk management standard is available for public comment.
Read the article
• World

Business E-Mail Compromise fraud risk is on the rise, warns the FBI
The FBI is advising companies to be aware of the growing risk of Business E-Mail Compromise (BEC) fraud.
Read the article
• US / World

Nuix Black Report looks at information security from the hackers point of view
The Nuix Black Report presents the results of a confidential survey of 70 professional hackers and penetration testers at DEFCON, the world’s largest hacking and security conference.
Read the article
• US / World

Capital Continuity

The role of business continuity managers is expanding: survey
With increasing interest in the concept of ‘organizational resilience’, business continuity management professionals are taking advantage of this to expand their own remit and improve their career opportunities.
Read the article
• UK / World

Service failures will be perceived more negatively if they impact a group rather than individuals: research
A study by a team at Friedrich Schiller University, Jena, has found that customers perceive the same service problem very differently, depending on whether they are affected as individuals or in a group.
Read the article
• Europe / World

Banks planning risk management framework changes, as non-financial risks increase
60 percent of European banks expect capital requirements against non-financial risks, such as IT failures, cybercrime or compliance issues, to increase in the near future; with just under ten percent predicting requirements to increase by more than 50 percent, according to new research from KPMG.
Read the article
• UK / Europe

eBRP

Over time, nuisance flooding can cost more than extreme, infrequent events: researchers
Global climate change is being felt in many coastal communities of the United States, not always in the form of big weather disasters but as a steady drip, drip, drip of nuisance flooding.
Read the article
• US

Technology related threats are business continuity managers’ key concerns
The Business Continuity Institute has published its annual Horizon Scan Report, which shows that the top three threats to organizations are all related to technology.
Read the article
• World

Microsoft Office 365 a weak area for UK public sector business continuity
While most UK councils and government departments have stringent backup procedures in place, the majority (96 percent) have no method or procedure to backup their Microsoft Office 365 Deployment, according to a recent Freedom of Information request from UK Backup.
Read the article
• UK

New guidance: A Risk Management Guide to Reservation of Rights
Understanding, anticipating and properly responding to reservation of rights letters is integral to risk professionals’ ability to protect their organizations and realize the full value of insurance policies, according to a new RIMS Professional Report, ‘A Risk Management Guide to Reservation of Rights’.
Read the article
• US / World

Study quantifies the impact of effective identity and access management on cyber risk
A new Forrester study, commissioned by Centrify, has looked at the state of enterprise security and the impact of identity and access management maturity on breach levels.
Read the article
• US / World

Cyber security skills gap leaves many organizations exposed
According to a new cyber security workforce study by ISACA’s Cybersecurity Nexus (CSX), only 59 percent of surveyed organizations say they receive at least five applications for each cyber security opening, and only 13 percent receive 20 or more.
Read the article
• US / World

Supply chain risk reached record high in 2016: CIPS Risk Index
Global supply chain risk grew to a record high at the end of 2016 as the CIPS Risk Index, powered by Dun & Bradstreet, rose to 82.64, from 79.14 at the end of 2015.
Read the article
• World

Impact of negative media reports mapped in new study
A study by the University of Plymouth Business School and Nottingham University Business School has looked at the financial impact of negative media reporting of operational losses suffered by banks and insurers.
Read the article
• UK / World

Cyber security preparedness examined in Cyber Readiness Report 2017
A study of 3,000 companies in the UK, US and Germany, conducted for specialist insurer Hiscox, reveals that more than half (53 percent) of businesses in the three countries are ill-prepared to deal with cyber attacks.
Read the article
• Various

CEO perspectives on crisis management experiences and expectations
For its latest CEO Pulse, pwc spoke to 164 global CEOs about their views, struggles and approaches to crises. 65 percent of the CEOs interviewed said that they had experienced at least one crisis in the past three years.
Read the article
• World

CERT releases updated version of insider threat guidebook
The CERT Division of the Software Engineering Institute at Carnegie Mellon University has published the fifth edition of its ‘Common Sense Guide to Mitigating Insider Threats’.
Read the article
• US / World

Risk management a top priority for chief procurement officers
Cost reduction and managing risk top the list of procurement leaders’ business priorities in 2017, according to Deloitte’s annual global Chief Procurement Officer (CPO) survey.
Read the article
• UK / World

ENISA publishes report on how to protect ICS-SCADA systems
ENISA has released a study on the ‘Communication network dependencies for ICS-SCADA Systems’. The report identifies good practices and recommendations to help the security of ICS-SCADA against cyber threats.
Read the article
• Europe / UK

UK organizations over-confident about fraud risk: survey
Despite over half (56 percent) of UK organizations being affected by fraud, confidence levels in fraud prevention techniques are remarkably high, reveals research.
Read the article
• UK

The 2017 Political Risk Map
Marsh has published its 2017 Political Risk Map, which highlights the top geopolitical threats facing today’s multinational companies.
Read the article
• World

BSI updates commercial buildings fire safety standard
BS 9999, the ‘Code of practice for fire safety in the design, management and use of buildings’ has been revised. BS 9999 gives recommendations and guidance on the design, management and use of commercial buildings to achieve reasonable standards of fire safety for all people in and around them.
Read the article
• UK

Preparedness for data protection risks is inadequate in many organizations: survey
A new survey report by DLA Piper has found that many organizational privacy programs have gaps in meeting increasingly demanding global privacy principles.
Read the article
• UK / World

State of Resilience Report identifies many issues with IT resilience
Vision Solutions has released its 2017 State of Resilience report, detailing the findings of global surveys of IT professionals regarding key aspects of their organizations’ IT infrastructure.
Read the article
• World

CALL FOR PAPERS

Written a relevant article or white paper? We'd like to consider it for publication on Continuity Central. Simply e-mail editor@continuitycentral.com

You have subscribed to this newsletter. To unsubscribe visit:
http://www.continuitycentral.com/index.php/unsubscribe or e-mail webmaster@continuitycentral.com

This email was from:
Portal Publishing Ltd, PO Box 1393, Huddersfield, HD1 9TN, UK, Tel: +44 1484300750

Continuity Central is a registered trademark