Gaining the Knowledge and Insight to Face Today’s Emerging Issues

It seems as if almost every day, new issues emerge to test the plans and preparedness of business continuity professionals across the world. New, perpetually evolving technology, cyberattacks, natural disasters, pandemics, and a global economy all present new risks. And it’s up to BC pros to prepare for them. This

Behavioral Science Applications Approved as a Preferred Provider of CPE Credits

Behavioral Science Applications has announced that it has been as approved as a Preferred Provider of CPE Credits by ASIS International, the global community of security practitioners. The recognition from ASIS International comes in advance of Behavioral Science Applications’ 2022 Homeland Security Human Factors Winter Institute and Certificate Program which begins

The Case for Continuing Education – 2022 Continuity Insights Management Conference

The pre- and post-conference sessions scheduled for the 2022 Continuity Insights Management Conference, April 25-27, in Louisville, KY, will give experienced business continuity professionals, as well those climbing the ranks, the necessary instruction and education to advance their career goals, gain valuable certification, and further secure the resiliency of their

Seasoned Practitioners, Industry Thought Leaders Headline 2022 CI Management Conference

Learning new strategies, techniques, skills, and practices is essential for both business continuity professionals learning the ropes and advanced practitioners. It’s the most direct path to achieving new heights of resiliency within your organization. The 2022 Continuity Insights Management Conference has developed a first-rate curriculum packed with meaningful sessions addressing critical

Executing a Successful Ransomware Tabletop Exercise

Tabletop exercises simulate real-life emergency situations allowing team member to review and discuss the actions they would take in a particular event, testing their plan in an informal, low-stress environment. Conducting a tabletop exercise for ransomware attacks will help identify the technical activities and security protocols required to respond to the