Glossary.

A helpful A-Z glossary listing key Business and IT transformation terms and technical definitions..

  • Abstract Process

    An Abstract Process represents interactions between a private business process and another process or participant.
  • Abstraction

    Abstraction is a technique for producing a high-level summarization or generalization of more complex or detailed topics or content.
  • Activity

    An Activity is work performed by an organization using business processes. An activity can be atomic or non-atomic (compound). Types of activities used within Process Models include Process, Sub-Process, and Task.
  • Activity Cost Worksheet

    Activity Cost Worksheets are a matrix that are used to analyze various costs of a set of activities.
  • Actor

    An Actor is a normally used to define a physical or quasi-physical entity, such as a person, organization, or system.
  • Ad Hoc Workflow System

    An Ad Hoc Workflow System is a type of workflow system that waits on users to indicate what should happen next.

How To Survive A Cyberattack

Feb 25, 2021, 17:15 PM by Orbus Software
Are you prepared for the next big cyberattack? The US government recently suffered one of the worst cyberattacks in its history. However, they were not breached directly, but in a supply chain attack targeting the software provider SolarWinds. Even organizations that don’t think they need to worry about cybersecurity will have to change.

Are you prepared for the next big cyberattack?

The US government recently suffered one of the worst cyberattacks in its history. However, they were not breached directly, but in a supply chain attack targeting the software provider SolarWinds. As the battle between attack and defence intensifies, every stakeholder and part of a supply chain could become a target in the future. Even organizations that don’t think they need to worry about cybersecurity will have to change.

Fortunately, all is not lost. Properly implementing and maintaining oversight of the right security controls will still go a long way towards preventing damage, while there are many steps that can be taken to mitigate attacks that do occur. This eBook will lay out the frameworks organizations can turn to, and actions they can take in response to attacks.

Download now to find out:

  • How attackers gained access to US government data through their supply chain

  • The risks that are due to come from increasing sophistication and possible cyber-warfare

  • The major security and governance frameworks that organizations will need

  • The steps to take when an attack does get through