This newsletter highlights all the feature articles published on Continuity Central during August 2017 as well as various resources.

NOTE: If you cannot read this newsletter properly visit www.continuitycentral.com/roundupsept2017.html

FEATURE ARTICLES

ClearView

Five steps to a successful business continuity program
Sometimes complicated technical approaches get in the way of progress says Bryan Weisbard, CPA, CFE. In this article, he sets out five steps for creating a practical, strategic business continuity program.
Read the article
• US / World

Resilient business travel is NOT a tick box exercise
John Morgan explains why business travel can be a business continuity issue and provides a checklist of items which should be considered when developing a resilient business travel strategy.
Read the article
• UK / World

The security and compliance issues related to instant messaging use
Most organizations now allow employees to use IM in some capacity; or their employees use it anyway! And with IT teams under a lot of pressure, the risks of data leakage that come with IM are often forgotten about. Thomas Fischer thinks that IM threats are worth talking about…
Read the article
• World

Daisy

Crisis preparedness and its impact on shareholder value
Robert McAllister looks at the ways that crises can damage the three components of shareholder value and describes the crisis prevention and preparation steps that organizations can take to ensure resiliency.
Read the article
• UK / World

My business has had a data breach, what next?
Emma Roe provides some advice to UK organizations on incident communications following a data breach: who should you inform and what should you tell them?
Read the article
• UK

To BIA or not to BIA is not the question…
Continuity Central recently conducted a survey to seek the views of business continuity professionals on whether it is feasible to omit the business impact analysis (BIA) from the BC process. Mel Gosling, FBCI, explains why he believes this is the wrong question to ask…
Read the article
• UK / World

Continuity2

Four strategies to prevent data encryption from hijacking your network
While encryption can keep your network traffic safe from hackers, it can also prevent your security and monitoring tools from seeing inside the packets crossing your network. Lora O'Haver looks at the issue and explains what organizations can do about it.
Read the article
• World

Tips for evaluating a business continuity as a service provider
Business continuity as a service (BCaaS) is an emerging trend in the market. Steve Dance looks at what BCaaS is and what questions you should ask any potential business continuity as a service provider.
Read the article
• UK / World

Critical infrastructure cyber security is about senior level support, diligence and planning
Dr. Jim Kennedy looks at how to develop an operational resilience and cyber security framework for critical infrastructure protection.
Read the article
• US / World

Capital Continuity

Helping employees after an incident: traumatic stress reactions – looking under the surface
Business as usual does not commence once an incident is over and business processes are running normally: the impacts on employees may just be starting. Dr Liz Royle provides some guidance on this difficult area…
Read the article
• UK / World

No more BIA...
Timothe Graziani is a business continuity practitioner with ten years' experience. In this article, he explains why he is now convinced that the business impact analysis is an unnecessary part of the business continuity process.
Read the article
• World

RESEARCH, REPORTS & PUBLICATIONS

eBRP

GDPR compliance: survey shows nearly a quarter of companies haven’t hired a data protection officer
Imperva, Inc., has published the results of a survey of 310 IT security professionals taken at the Infosecurity Europe 2017 trade show. The results suggest that while the industry is preparing for the General Data Protection Regulation (GDPR), 22 percent haven’t yet hired a data protection officer (DPO).
Read the article
• UK/World

DRI International maps BCM Professional Practices to UN Sendai Framework
DRI International has released a new white paper which aims to help build bridges between the disaster risk reduction and business continuity management communities.
Read the article
• US/World

BCI Working Paper looks at the business continuity implications of smart cities
The Business Continuity Institute has published the latest in its Working Paper series of detailed business continuity articles. ‘Exploring business continuity implications of smart cities vulnerable to cyber attack’ by Gianluca Riglietti offers an overview of smart cities today, exploring the opportunities as well as the challenges they bring.
Read the article
• World

Terrorist attacks on the supply chain have increased 16 percent year on year
Attacks on global supply chains by terrorist groups have hit the highest rate ever as have associated costs, according to a report released by BSI. The type of attack can vary from targeting the oil infrastructure, hijacking and cargo theft through to contraband smuggling, extortion and kidnapping schemes.
Read the article
• World

Customer-facing web applications are the biggest security challenge: survey
Synopsys, Inc. has published the results of a survey of 270 IT security professionals, which found that almost half (48 percent) viewed customer-facing web applications as the area presenting the most security risk to businesses.
Read the article
• World

Poor security hygiene and risky application use are feeding cyber attacks
Fortinet has published the findings of its latest Global Threat Landscape Report. The research reveals that poor cybersecurity hygiene and risky application usage enables destructive worm-like attacks to take advantage of hot exploits at record speed.
Read the article
• World

Many British boards uninformed and unprepared for cyber incidents
Britain’s top firms urgently need to do more to protect themselves from online threats, according to new Government research and a ‘cyber health check’ published recently.
Read the article
• UK

Study identifies room for improvement in natural disaster risk reduction activities
A new International Institute for Applied Systems Analysis (IIASA) study across Austria, England, and Romania finds room for improvement in both public and private schemes that could help encourage risk reduction behaviours and reduce losses in future disasters.
Read the article
• UK / Europe

The 2017 Cloud Security Report: public cloud platforms more secure than on-premise
Alert Logic has published its 2017 Cloud Security Report. The report analyzes customer data from more than 3,800 Alert Logic cloud, on-premises and hybrid cloud customers over an 18-month period, from August 1, 2015 to January 31, 2017.
Read the article
• US / World

Disaster recovery is a key driver of trend to move virtual workloads to the cloud
Druva has published the results of its 2017 VMware Cloud Migration Survey, which looked at how enterprises working in a VMware environment are approaching cloud migration.
Read the article
• World

Cyber attacks attacks on manufacturing industry continue to rise
The frequency and sophistication of cyber attacks continues to rise globally according to research data from the Global Threat Intelligence Center (GTIC) 2017 Q2 Threat Intelligence Report released by NTT Security, an NTT Group company.
Read the article
• World

Academic biomedical research community should do more to build resilience to disasters: report
The academic biomedical research community should improve its ability to mitigate and recover from the impacts of disasters, says a new report from the National Academies of Sciences, Engineering, and Medicine
Read the article
• US

UK companies’ confidence in IT disaster recovery plans is decreasing
New research from Databarracks has found that organizations have become less confident in their ability to recover from an incident. Contributing factors include a lack of testing, budgetary constraints and the growing cyber threat landscape.
Read the article
• UK

Hackers are turning to steganography to cover their tracks
While analysing multiple cyber espionage and cyber criminal campaigns, Kaspersky Lab researchers have identified a new, worrying trend: malicious hackers are increasingly using steganography – a digital version of an ancient technique of hiding messages inside images - to conceal the tracks of their malicious activity on an attacked computer.
Read the article
• World

‘Blind spots’ are a major obstacle to data protection
Gigamon Inc. has published the results of a commissioned survey, ‘Hide and Seek: Cybersecurity and the Cloud,’ conducted by Vanson Bourne.
Read the article
• UK / World

Report looks at the state of cyber incident response
Demisto, Inc., has published the results of the State of Incident Response 2017, a study investigating challenges faced by incident response teams.
Read the article
• World

Securing data in the cloud is the top security priority: survey
Alert Logic has announced the results of a survey conducted for the ‘Cybersecurity Trends 2017 Spotlight Report,’ which explores the latest cybersecurity trends and organizational investment priorities among companies in the UK, Benelux and Nordics.
Read the article
• UK / Europe

Only 36 percent of global financial organizations feel well prepared for IT risks
Netwrix Corporation has published the results of its 2017 IT Risks in Finance survey. This aims to provide insight into the IT challenges and security practices of financial organizations today.
Read the article
• US / World

Q2 2017 global supply chain risk assessment
Western and Central Europe's contribution to global supply chain risk fell in Q2 2017 to 29.94 percent, compared with 30.14 percent in Q1, according to the CIPS Risk Index, powered by Dun & Bradstreet.
Read the article
• World

Long-lasting DDOS attacks make a return
The second quarter of 2017 confirmed that long-lasting DDoS attacks are back in business.
Read the article
• World

PwC surveys CEOs on crisis management
In its latest CEO Pulse, PwC elaborates on the results of a survey of the crisis management views of 164 CEOs from around the world.
Read the article
• World

CALL FOR PAPERS

Written a relevant article or white paper? We'd like to consider it for publication on Continuity Central. Simply e-mail editor@continuitycentral.com

You have subscribed to this newsletter. To unsubscribe visit:
http://www.continuitycentral.com/index.php/unsubscribe or e-mail webmaster@continuitycentral.com

This email was from:
Portal Publishing Ltd, PO Box 1393, Huddersfield, HD1 9TN, UK, Tel: +44 1484300750

Continuity Central is a registered trademark