Trending Articles

article thumbnail

DRI International Releases 10th Annual Predictions Report, Highlighting Risk and Resilience Trends for 2025

DRI Drive

New York, NY Disaster Recovery Institute (DRI) International, the leading nonprofit in business continuity and resilience training, has published its 10th Annual Predictions Report resilience predictions for the profession, by the profession. The report provides an in-depth look ahead to major global issues that resilience professionals may deal with in the coming year. […] The post DRI International Releases 10th Annual Predictions Report, Highlighting Risk and Resilience Trends for 202

article thumbnail

CRS Report on Disasters and the Federal Budget

Recovery Diva

New report from the Congressional Research service on Disasters and the Federal Budget (3 pp)

100
100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Artificial [Un]intelligence and Disaster Management

Emergency Planning

There is currently intense interest in the possible use of artificial intelligence (AI) in the management of disasters. To what extent is this a real prospect or, alternatively, the fascination of the shiny new toy that soon will be discarded? To begin with, there are two major arguments against artificial intelligence in its current form. One should note in passing that it is not a new concept but one that has only recently begun to impinge seriously on popular consciousness.

article thumbnail

Lewin’s 3 Stage Model of Change Explained

BMC

Change behaviorhow humans accept, embrace, and perform changeis the core of modern change management. ITSM frameworks incorporate various approaches to change management, but one started it all: Kurt Lewins 3 Stage Model of Change. Lewins Model of Change Lewins model was developed by a pioneering psychologist in the field of social and organizational psychology in the face of change.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

Why You Need Cyber Resilience and Defence in Depth

IT Governance BC

And how to become resilient with ISO 27001 and ISO 22301 Unfortunately, even the most secure organisation can suffer an incident. The odds are simply stacked against you: While you need to protect all your assets from all types of threat, an attacker needs only one exploitable weakness to get into your systems. Plus, any security measure you implement is only designed to stop, at most, a handful of threats and thats assuming it was both correctly implemented and still doing its job.

More Trending

article thumbnail

Security Industry Association Welcomes New Leadership of SIA Perimeter Security Subcommittee

Security Industry Association

Christa Decker of Whitman, Requardt & Associates and Amy Dunton of Ameristar will oversee the subcommittees efforts to support the protection of crowded spaces, critical infrastructure and government facilities. SILVER SPRING, Md. The Security Industry Association (SIA) has named two industry leaders Christa Decker, vice president of the Protective Design Group at Whitman, Requardt & Associates (WRA), and Amy Dunton, business development specialist at Ameristar to serve as co-chairs o

59
article thumbnail

New CRS Report on National Flood Insurance Program

Recovery Diva

From the Congressional Research Service: Issues for Reauthorization and Reform of the National Flood Insurance Program (3 pp)

Insurance 100
article thumbnail

Automate Fast & Win: 11 Event-Driven Automation Tasks for Enterprise DevOps Teams by Justyn Roberts

PagerDuty

Event-driven automation is a powerful approach to managing enterprise IT environments, allowing systems to automatically react to enterprise events (Observability / Monitoring / Security / Social / Machine) and reducing or removing the need for manual intervention. This post discusses 11 common automation tasks that are ideal for enterprise DevOps teams looking to enhance operational efficiency, reduce downtime, and ensure business continuity.

article thumbnail

What Is Cyber Extortion? Tips for Securing Your Data

Pure Storage

What Is Cyber Extortion? Tips for Securing Your Data by Pure Storage Blog Summary Cyber extortion is a type of cybercrime thats surging. While these types of attacks can have dire and expensive consequences, taking preventative measures can help you reduce risk and safeguard your digital assets. Cyber extortion is a malicious practice where attackers threaten individuals or organizations with digital harmsuch as data breaches, denial of service attacks, or exposure of sensitive informationunless

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Webinar: The RMM Roadmap to Clarity & Confidence

LogisManager

Webinar: The RMM Roadmap to Clarity & Confidence Duration: 50 Minutes What if you could eliminate uncertainty in your role and confidently connect your work to leadership priorities? In this engaging webinar, join Alyssa Pries, Customer Advocate at LogicManager, and Steven Minsky, Founder & CEO of LogicManager, as they guide you through the Risk Maturity Model (RMM) framework.

article thumbnail

A year in review: Acronis innovations and cybersecurity enhancements in 2024

Acronis

Over the last 12 months, the Acronis Cyber Protect Cloud platform has expanded significantly with new solutions, features and capabilities to empower MSPs. In this blog, we take a look at whats new with Acronis Cyber Protect Cloud in 2024.

article thumbnail

Questions re FL 2025 Hurricane Planning

Recovery Diva

From the Florida Phoenix: Florida should use next six months to prepare for the 2025 hurricane season. Next years storms will likely be just as powerful as this years, but the Legislature says we cant talk about why.

100
100
article thumbnail

Impact Analysis for Enterprise Resiliency Program

eBRP

Ensuring enterprise resilience involves evaluating service criticality, analyzing asset dependencies, and assessing current capabilities while addressing risks and potential disruptions. This process identifies vulnerabilities, threats, and availability parameters to safeguard the organization’s mission, reputation, and service levels.

52
article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Why Paying the Ransom Should Be Your Last Option

Pure Storage

Why Paying the Ransom Should Be Your Last Option by Pure Storage Blog Summary While paying the ransom might seem like the quickest path to recovery after a ransomware attack, its not. Restoring from secure backups, using decryption tools, and engaging cybersecurity experts can help you recover without funding cybercriminals. Imagine waking up to find your companys entire digital world locked away behind an ominous message demanding payment.

Backup 52
article thumbnail

The Role of GRC Software in FedRAMP Compliance: Essential Features and Benefits 

Reciprocity

Achieving and maintaining FedRAMP compliance involves managing hundreds of security controls, extensive documentation, and continuous monitoring requirements. Governance, Risk, and Compliance (GRC) software has become an essential tool for organizations navigating this complex landscape. Let’s explore how the right GRC solution can streamline your FedRAMP compliance journey.

Audit 52
article thumbnail

What Is GRC? Governance, Risk, and Compliance Explained

BMC

Any organization seeking to meet its business objectives continues to face a myriad of challenges owing to the ever-changing complexity of the business environment: Regulation (e.g. SOX , HIPAA , GDPR, PCI-DSS ,) People (diversity, millennials, skills gap , etc.) Technology ( IoT , AI ) Processes Many more aspects For this reason, there is an increasing need for enterprises to put in place mechanics to ensure that the business can successfully ride the wave of these complexities.

article thumbnail

National Geographic on AI

Recovery Diva

The Diva was especially interested in the group of articles titled AI: Welcome to the New Age of Discovery, in the November issue of National Geographic. Most of the articles are of general interest, but there is one titled How AI will Help Predict Natural Disasters. Note: the video version linked above is different from the print version.

100
100
article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Crisis Management for Logistics: Boosting Resilience

BryghtPath

Safeguarding your supply chain is crucial in today's volatile environment. Learn how to navigate potential disruptions with our comprehensive guide to crisis management for logistics. We'll cover strategies for building resilience, the role of effective communication, and actionable steps to minimize downtime, maintain operations, and emerge stronger from unexpected events.

article thumbnail

Assessing Ransomware Risk with the Pure Storage Security Assessment

Pure Storage

Assessing Ransomware Risk with the Pure Storage Security Assessment by Pure Storage Blog Summary The Pure Storage Security Assessment is a comprehensive evaluation tool that helps organizations identify and address vulnerabilities in their storage environment and offers actionable steps to help them reduce exposure to threats. Ransomware is rapidly becoming one of the most pervasive and costly cyber threats facing businesses today.

article thumbnail

Foundation for Advancing Security Talent Announces 2025 National Security Technician Day

Security Industry Association

National Security Technician Day, held annually on Jan. 23, is dedicated to recognizing the valuable work security technicians do to secure our nation. SILVER SPRING, Md. The Foundation for Advancing Security Talent (FAST) has announced the third annual National Security Technician Day , an annual commemorative day held on Jan. 23 to honor security technicians across the country.

article thumbnail

Data Security Best Practices to Safeguard Data Against Cyber Threats

Solutions Review

Druva’s Yogesh Badwe offers insights data security best practices to safeguard data against cyber threats. This article originally appeared on Solutions Review’s Insight Jam , an enterprise IT community enabling the human conversation on AI. Ransomware attack TTPs are evolving, and backup data has become a key target. According to Sophos, a staggering 94 percent of organizations have been hit by attacks that specifically target their backup systems.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Why Disaster Survivors Feel the Government Has Failed Them

Recovery Diva

From the Wash Post: Why disaster survivors feel the Government has failed them. “The political hurdles exemplify what disaster survivors across the country say is a broken system one that forces them to wait for months or years before significant government help arrives, leaving many to rely on fundraising appeals or community aid until state or federal money starts flowing.

article thumbnail

New Year, New Resilience: Refreshing Your Business Continuity Program for the New Year

BryghtPath

As businesses face an increasingly unpredictable global environment, the importance of robust and adaptive Business Continuity Plans (BCPs) has become more pronounced. The past few years have demonstrated that preparedness is critical to survival and success, from cyberattacks and natural disasters to global pandemics and supply chain disruptions. As the new year approaches, organizations must … The post New Year, New Resilience: Refreshing Your Business Continuity Program for the New Year

article thumbnail

Leveraging Large Language Models for STRIDE Threat Modeling—A Scalable and Modular Approach to Secure PoCs and Agile Projects

Pure Storage

Leveraging Large Language Models for STRIDE Threat ModelingA Scalable and Modular Approach to Secure PoCs and Agile Projects by Pure Storage Blog Summary The security of PoCs and MVPs is often an afterthought, leaving them vulnerable to threats. Threat Model Mentor automates the STRIDE methodology using GPT-based models and makes threat modeling accessible to development teams.

52
article thumbnail

Understanding Backups – The Beginning

Plan B Consulting

In todays bulletin, Charlie discusses backups and looks at some reasons why hackers may be able to access your backups. As many of the readers of this bulletin will know, PlanB Consulting, has recently been bought by Databarracks. The company has four main services: business resilience services (the PlanB bit), disaster recovery as a service, public cloud, and backup as a service.

Backup 52
article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha