CYBER 101

  • Alerts
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Documents
  • Domains
  • Entertainment
  • FAQ
  • Incidents
  • Quotes
  • Tools
  • Tutorials

Join our newsletter

FOLLOW US

Search

More...

Generic filters
Content from
Content to
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
Search

More...

Generic filters
Content from
Content to
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
CyberMaterial
No Result
View All Result

5 Podcast about Business Continuity

BCP/DR 

4 min read
in Blog, Entertainment, Podcasts

Business continuity planning (BCP) is the process involved in creating a system of prevention and recovery from potential threats to a company. The plan ensures that personnel and assets are protected and are able to function quickly in the event of a disaster.

Disaster recovery (DR) is an organization’s method of regaining access and functionality to its IT infrastructure after events like a natural disaster, cyberattack, or business disruptions. A variety of DR methods are often part of a Disaster Recovery Plan (DRP).

Discover our recommended podcast to listen about BCP/DR

 

1. Business Continuity Today

BCT is a podcast that focuses on keeping your business up and running when disaster strikes. After a disaster 1 of 4 businesses will never open their doors again. We are going to talk about how to make sure your doors stay open after a disaster strikes.

 

Visit Website

 

2. Business Continuity Podcast

Ever wondered how suet pudding could bring one of the UK’s busiest trading floors to a grinding halt? Or why there used to be a caterpillar in the London Risk Register?

Databarracks‘ Business Continuity Podcast is a straightforward, jargon-free discussion with people who deal with disasters for a living.

 

Visit Website

 

3. The Failover Plan Podcast

Episode Summary:

Gamification is the application of game-design elements and game principles in non-game contexts. Today on the podcast, we’re talking with James MacDonnell – Director, Crisis Management and Business Continuity at BDO USA. James is a risk management, business continuity, and crisis management professional with more than 18 years of experience helping Fortune 100 clients and federal agencies prepare for and respond to crises and emerging risks. But what he’s especially good at is developing ways to gamify business continuity activities. You’re going to want to hear how it works and the benefits it has brought to many programs. And you’ll even get to hear my experience of gamifying my BIA collection.

 

Visit Website

 

4. Ready for Anything

The next critical event is coming, whether you’re prepared for it or not. In each episode of Ready for Anything, we take a deep dive – with experts in business continuity, crisis communications, public safety and more – into the issues that matter most when the stakes are high and being prepared is everything. If you’re responsible for keeping the public safe, employees in the know or operations running, you don’t want to miss this.

 

Visit Website

 

5. Scale + Skyrocket Your Business!

We’re going to talk about preparedness in your business.

I’ve been reflecting a lot recently about what seems to be an increasing amount of global platform outages. It’s definitely on the increase. If you cast your minds back to 2021; Facebook, WhatsApp, Instagram, Google, Twitter all went down globally during that year.

And, revisiting 2021, many business owners were stung by the global platform outages and that led to some really great conversations around our lack of ownership of our social media audiences, and what we should be doing to protect our relationships with our audiences on socials.

 

Visit Website

Related

Tags: 5 Podcast about Business ContinuityBCP/DRBusiness continuityCybersecurity
1
VIEWS
ADVERTISEMENT

Related Posts

6 Books about Threat Hunting

6 Books about Threat Hunting

August 2, 2022
7 Podcast about Threat Hunting

7 Podcast about Threat Hunting

August 2, 2022
Application Security podcast. SAST, DAST, and IAST. Oh My! (S03E05)

Application Security podcast. Ochaun Marshall — IaC and SAST

July 29, 2022
Application Security podcast. SAST, DAST, and IAST. Oh My! (S03E05)

Application Security podcast. SAST, DAST, and IAST. Oh My! (S03E05)

July 29, 2022

More Articles

Cyber101

DAST

July 22, 2022
Incidents

Russian Cyberattack Hits Wales-Ukraine Football Broadcast

June 8, 2022
Incidents

Cloudflare mitigated 2 Tbps DDoS attack, the largest attack it has seen to date

November 16, 2021
Quotes

“Correctly deployed, honeypots offer…”

January 12, 2022
Incidents

‘Destructive’ cyberattack hits National Bank of Pakistan

November 2, 2021
Document

Gramm-Leach-Bliley Act Compliance

June 7, 2022
Alerts

[Control Systems] Mitsubishi Electric security advisory (AV22-026)

January 14, 2022
Alerts

Google Chrome security advisory (AV22-195)

April 11, 2022
Load More

World’s number one cybersecurity repository. Find everything you need about cybersecurity.

Cybersecurity Domains

  • Application Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • Governance
  • IAM
  • Physical Security
  • More...

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • AR/VR
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • IoT
  • Quantum Computing
  • More...

Frameworks

  • CIS Controls
  • CISA TSS
  • FISMA
  • GDPR
  • ISO 2701/02
  • MITRE ATT&CK
  • NIST
  • NYS-DFS
  • More...

Industries

  • Automation
  • E-Commerce
  • Education
  • Fake News
  • Financial
  • Government
  • Health Care
  • Military
  • More...

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering
  • Vulnerabilities
  • More...

© 2022 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Attackers
    • Incidents
    • Threats
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Quotes

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.