Enhancing Response Effectiveness Through Monitoring and Corrective Actions
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Amazon Music | RSS
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Amazon Music | RSS
The presence of dangerous substances in industrial facilities located close to population centers presents inescapable challenges for crisis planners and crisis teams. Any accident at such a facility, even when no dangerous toxins have been released, will be seen by the public and reported by the media as a near catastrophe — a bullet…
In episode 142 of the PreparedEx podcast, we delve into the critical world of cybersecurity tabletop exercises with expert Jake Paulson. As cyber threats continue to evolve, organizations must be prepared to respond to incidents that could disrupt operations, compromise sensitive data, and damage reputations. Jake Paulson shares his insights on how to design, execute,…
The Rising Threat of Deepfake Attacks In 2024, Arup, a global engineering consulting firm, fell victim to an elaborate deepfake scam. A finance employee participated in what appeared to be a legitimate video conference with the company’s CFO and other senior leaders. Unbeknownst to them, every participant—except the employee—was a deepfake, generated by cybercriminals using…
We live in a virtual world and every day we become more reliant on technology to keep us connected, sometimes it fails. A crisis team should be able to activate and manage an event from any location. It can be difficult to manage significant events without having good situational awareness. Situational awareness can be difficult…
In this milestone 150th episode of the PreparedEx podcast, we’re excited to unveil the 10th Annual International Crisis Management Conference. Discover what’s in store for this year’s event, including key themes, speakers, and networking opportunities that make this conference a must-attend for resilience and crisis management professionals. Tune in to hear how this decade-long tradition…
In the ever-evolving landscape of cybersecurity, incidents and disruptions are inevitable. Whether it’s a full-scale cyber attack or a simulated breach during a tabletop exercise, the critical response phase doesn’t end when the immediate threat is mitigated. What follows is just as crucial: the after-action reporting and remediation planning process. This phase involves a thorough…
Add your first comment to this post