Es importante recordar que la gestión del riesgo contri....
Why your Information Security MUST mesh with your Business Continuity Program
Data breaches, cyber-attacks and hacking should be thought of as inevitable consequences of our interconnected world. We’re reliant on data and machines which makes us vulnerable when those assets are abused. Information and cyber security measures seek to prevent data breaches and losing control of systems and processes that, for example, use industrial control systems. Business continuity (BC) programs/plans stand as an organization’s last line of defense against any number of threats and hazards, not the least of which are data breaches and hacked control systems. There is added value from good business continuity planning. A rigorous BC program always has included IT disaster recovery, but the preparedness that stems from robust BC plans can deter cyber-attacks and protect an organization – including its reputation – when valuable information is threatened.
Main points covered:
- Why is the Information Security and Business Continuity plan incorporation important?
- Is hacking inevitable?
- How are Information Security and Business Continuity linked?
- How Business Continuity and Information Security stand as the last line of defense
- What is the ‘best’ plan that we should follow to be protected from threats?
Presenter:
Dr. Ed Goldberg, MBA, BSEE, CBCP, manages Eversource’s BC & DR programs in Berlin, CT and served 10 years as IT manager at Millstone Nuclear Power Station. Ed is a Certified Business Continuity Professional with 25+ years IT and management experience. He served 4 terms as president of the Connecticut ACP and is a popular conference speaker and published author. Also, Ed served 5 years as adjunct faculty and 8 years as core faculty at Capella University where he mentored PhD students, taught and and developed IT management and general PhD research coursework. He also taught MBA and IT coursework at Albertus Magnus College for 11 years.
Organizer: Ardian Berisha
Date: February 22nd, 2018
Link of the recorded webinar on YouTube:
Slides of the webinar: