{"id":255,"date":"2010-11-02T00:00:00","date_gmt":"2010-11-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/11\/02\/a-new-series-of-blog-posts-on-crisis-response\/"},"modified":"2021-12-30T11:36:51","modified_gmt":"2021-12-30T11:36:51","slug":"a-new-series-of-blog-posts-on-crisis-response","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/11\/02\/a-new-series-of-blog-posts-on-crisis-response\/","title":{"rendered":"A new series of blog posts on Crisis Response"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"{filedir_1}6012859_small.jpg\" alt=\"I love a good crisis!\" width=\"117\" height=\"175\" border=\"0\" alt=\"image\" name=\"image\" \/><br \/>\nNow your are going to think that this is a strange thing to say but I like a good crisis.  You&#8217;re immediate reaction could be \u201cWhat!\u201d<br \/>\nBut when I refer to a good crisis, I am thinking of those that quickly protect, recover, and that the lessons learnt are really valuable for the future.<br \/>\nSo I am going publish a couple of blog posts a week on my perspective on how to run an effective incident response team.<br \/>\n[PS: My bad, user registration is working now.. thank you to you know who you are, for letting me know.]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I have been through a quite few crisis with large and small organizations and I hope that these posts will help IT teams protect their people, the world and the businesses.<\/p>\n<p>Why would I write a set of blog entries about crisis response? Well to be honest, I am hoping that I can generate business opportunities, and also create a online resource of information about this very important capability.  I have searched across the web and found very few sites dedicated to this subject. Yes, you can find information on disaster response but I think organizations are facing few disasters (hopefully), but probably everyone has a couple of crises a year.  <\/p>\n<p>So let\u2019s start.  For me, crisis response is an operational capability that needs to exercised frequently,  as opposed to once a year. It goes beyond the traditional world of viruses and hack attacks.  It&#8217;s something that can be leveraged to help an IT organization with it&#8217;s daily activities, not just when things are going wrong. <\/p>\n<p>Hopefully, you will find this information useful.  <\/p>\n<p>And if you want to provide feedback, I have a  <a href='http:\/\/www.cybersecurityinstitute.com\/index.php\/forums\/viewforum\/2\/'>forums section<\/a> just for crisis response.  No person is an island and it is only through sharing of knowledge and experience, that we evolve.<\/p>\n<p>Now, I have become a bit of a pain when it comes to posting. <a href=''><\/a>I need you register and I promise not to share your email with anyone else. I will also sometimes check to see whether the person registering is really a professional.  And I won\u2019t use the email for any marketing or profiteering. If you want to talk business with me, contact me.<\/p>\n<p>Thanks Paul<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,7],"tags":[],"class_list":["post-255","post","type-post","status-publish","format-standard","hentry","category-blogging","category-dr-crisis-response-crisis-management"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=255"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/255\/revisions"}],"predecessor-version":[{"id":2742,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/255\/revisions\/2742"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}