Skip to content Skip to sidebar Skip to footer
Critical Infrastructure Risk Assessment: The Definitive Threat Identification and Threat Reduction Handbook free chapter by rothstein publishing

FREE CHAPTER: Critical Infrastructure Risk Assessment: The Power of the Observation

In this chapter you will discover: • An overview of the concept of an “observation.” • The primary elements included in the observation as well as its format. • Fundamental considerations when performing and documenting the observation including the power of one’s influence on the actions being observed, the need for critical thinking, and considerations…

Read More

our-newest-author-dr-jo-robertson-at-rothstein-publishing

Five Rules for Crisis Leadership, By Dr. Jo Robertson

Many thoroughly savvy executives fail to take the potential for crisis as seriously as they should. They might have great security plans, or they might be following so-called best practices in crisis management, but they are still woefully underprepared. Dr. Jo Robertson, author of Executing Crisis: A C-Suite Crisis Leadership Survival Guide, shares her top…

Read More

legal-communication-crisis-advice-rothstein-publishing

WEBINAR: How to Manage Legal and Communication Advice in a Crisis – And Do the Right Thing

WATCH THIS EXCLUSIVE WEBCAST WITH ONE OF THE WORLD'S FEW THOUGHT LEADERS ON CRISIS MANAGEMENT, DR TONY JAQUES Learning from the best: I have just had the privilege of hosting an exclusive webcast with one of the few genuine thought leaders on crisis management and issue management, Dr Tony Jaques, of Melbourne, Australia. The participants were an…

Read More

cybersecurity-law-standards-regulations-rothstein-publishing

Book Review: Cybersecurity Law, Standards, and Regulations, Second Edition

Check out this book review from Security Management Magazine, a publication of ASIS International on Cybersecurity Law, Standards, and Regulations, Second Edition, by Tari Schreider Reviewed by Ronald L. Mendell, 1 September 2020 Click here for the Print Issue: September 2020 Click here to read the full Cybersecurity Law Book Review. "Information security generalists who…

Read More

E-mail
Password
Confirm Password