Remove 2013 Remove Compliance Training Remove Cyber Security
article thumbnail

10 HR podcasts you should be listening to

cipHR

million in 2013 to 5.9 Unsurprisingly, the professional body has access to some of the biggest, best and brightest minds in HR and L&D; topics range from automation to workplace agility, unconscious bias, cyber security and performance management. Training Journal podcast. By: Training Journal magazine.

article thumbnail

How BAE Systems Uses High-Potential Development As a Catalyst for Professional Growth and Retention

i4cp

subsidiary of BAE Systems plc, is a top aerospace, defense and security contractor. The company delivers products and services that span electronic systems, maritime and land platforms, intelligence and support services, munitions, cyber-security, and other areas. BAE Systems Inc., From this imperative, Catalyst was born.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Data Transparency is Not Enough to Protect Your Business

Lusha

Since then, there have been more online communities dedicated to discussing data transparency and privacy; one Reddit forum has over 1.2 Since then, there have been more online communities dedicated to discussing data transparency and privacy; one Reddit forum has over 1.2 What happened? million members! million members!

article thumbnail

Workable gets ISO 27001 certification

Workable

Confident that our information security management is in line with international best practice we recently applied for independent recognition of this through the International Organisation for Standardisation (ISO). David Hartig, our COO explains,“This accreditation is a tick in the box for us as we were on a secure track beforehand.

article thumbnail

Expensive Enterprise Hacks That Serve As A Lesson In Cybersecurity

U-Next

As enterprises, it is very difficult to stay a step ahead of attackers and that’s exactly why learning becomes crucial here. We learn from what other enterprises have experienced and tweak the learnings to our needs and implement revisited strategies. Photo by FLY:D on Unsplash. The Yahoo Incident Of 2017 . Remember Yahoo?

article thumbnail

What Is Data Security in Cloud Computing?

U-Next

Thus, businesses of all sizes must reconsider their network security procedures to reduce unwanted data transfers, service interruptions, and reputational harm. Organizations using cloud services are subject to new security risks posed by public APIs and authentication. Introduction . A Data Leak From CAM4: . Yahoo Data Breach: .

Data 40
article thumbnail

“Test your Disaster Recovery Plan”, With Jason Remillard and Richard Greenberg

Thrive Global

This is a clear reflection of the importance that security has with these key decisionmakers. How can the C-Suite be informed enough of cyber risk without hearing directly from the CISO? Richard brings over 30 years of management experience and has been a strategic and thought leader in IT and Information Security.