2. Why a considered approach?
To communicate is to reassure, to bring good news. Hence the rule: "I'll communicate when I can reassure". The model to follow in the vast majority of cases is quite different! First and foremost, through communication whose information content will inevitably be weak at the outset, you need to take three major political actions.
A demonstration of seriousness: the people in charge are at the helm, and they haven't deserted. They have taken action, they are following procedures that are not simply improvisation.
Recognizing the problem: recognizing a crisis enables us to identify a situation and take charge of it.
Recognition of interlocutors: this is essential. We're not asking for a miracle from the decision-maker, but we do expect him to respect the people and groups involved....
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Management and innovation engineering
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Why a considered approach?
Reference standards
ISO 22301: international standard for business continuity management.
An ISO 28000 standard for supply chain security management systems has been in existence since 2007. This standard defines the requirements to be met by an organization in order to obtain certification for a supply chain security management system. It defines a model for establishing, implementing,...
Websites
The Agence nationale de la sécurité des systèmes d'information (French national agency for information systems security) offers a number of management guides, including one on "Cyber crisis management". This collection comprises three volumes: Organizing a cyber crisis management exercise...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference