SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

The Power of Resilience: How the Best Companies Manage the Unexpected

Yossi Sheffi

2 min read
in Book, Learning

How the best companies prepare for and manage modern vulnerabilities—from cybersecurity risks to climate change: new tools, processes and organizations for developing corporate resilience.

A catastrophic earthquake is followed by a tsunami that inundates the coastline, and around the globe manufacturing comes to a standstill. State-of-the-art passenger jets are grounded because of a malfunctioning part.

A strike halts shipments through a major port. A new digital device decimates the sales of other brands and sends established firms to the brink of bankruptcy. The interconnectedness of the global economy today means that unexpected events in one corner of the globe can ripple through the world’s supply chain and affect customers everywhere.

In this book, Yossi Sheffi shows why modern vulnerabilities call for innovative processes and tools for creating and embedding corporate resilience and risk management.

Sheffi offers fascinating case studies that illustrate how companies have prepared for, coped with, and come out stronger following disruption—from the actions of Intel after the 2011 Japanese tsunami to the disruption in the “money supply chain” caused by the 2008 financial crisis.

Sheffi, author of the widely read The Resilient Enterprise, focuses here on deep tier risks as well as corporate responsibility, cybersecurity, long-term disruptions, business continuity planning, emergency operations centers, detection, and systemic disruptions.

Supply chain risk management, Sheffi shows, is a balancing act between taking on the risks involved in new products, new markets, and new processes—all crucial for growth—and the resilience created by advanced risk management.

 

GET BOOK

*Disclaimer: As an Amazon Associate we earn from qualifying purchases.

Related

Tags: bcp/dr BooksBusiness Continuity BooksCybersecurityCyberstalkingDisaster Recovery BooksThe Power of ResilienceYossi Sheffi
8
VIEWS
ADVERTISEMENT

Related Posts

Certified Secure Software Lifecycle Professional (CSSLP)

Certified Secure Software Lifecycle Professional (CSSLP)

June 27, 2022
Software Security Practitioner – Quality Assurance

Software Security Practitioner – Quality Assurance

June 27, 2022
Certified Software Quality Manager (CSQM)

Certified Software Quality Manager (CSQM)

June 27, 2022
Certified Software Quality Analyst (CSQA)

Certified Software Quality Analyst (CSQA)

June 27, 2022

More Articles

Alerts

Microsoft warns about phishing attack

January 27, 2022
Document

The Computer Forensics Challenge and Anti-Forensics Techniques

April 18, 2022
Entertainment

CSI Cyber (2015-2016)

October 15, 2020
Book

Privacy, Regulations, and Cybersecurity

March 18, 2022

Cyber Analytics Database Exposed 5 Billion Records Online

June 17, 2021
Course

Certified Vulnerability Assessor (CVA)

February 11, 2022
Alerts

Cisco Releases Security Updates for Multiple Products

June 3, 2021
Alerts

Fake Trezor data breach emails used to steal cryptocurrency wallets

April 4, 2022
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
    • Threats
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....