This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In this podcast we will examine different forms of governance for cities, evaluating the pros and cons of each. Well also delve into how civic leaders think about the first responder community, emergency management in general and technology. We will be hearing from someone with vast experience in government having held a wide variety of positions. Harry Black the podcast guest is a seasoned executive with extensive leadership experience in both the public and private sectors.
From Tariffs to Turmoil: Spot Supply Chain Risk Before It Spreads Last Updated: May 6, 2025 Everything is connected. A delay in one region can derail a production schedule on the other side of the world. A cyber incident at a vendor can escalate into a full-blown regulatory crisis. Supply chains are no longer just a logistics concern; they touch every part of the business.
There are all sorts of projects, large and small. Ive advocated that all work is usually done in the form of a project. Really large projects require a huge investment in time and other resources to be successful. No one plans on failing, but there have been some very public failures in the past. In this podcast well examine some general themes for those failures and also solutions you can put to use for your own projects to hopefully ensure success.
From the AP: Loss of FEMA program spells disaster for hundreds of communities and their projects “The textile mills that once served as the backbone of Mount Pleasant, North Carolina, have long been shuttered, and officials believed federal money would be key to the towns overdue revitalization. They hoped an improved stormwater drainage system and secured electrical wires funded through a program to help communities protect against natural disasters and climate change would safeguard in
Strengthen your operations with the Supply Chain Resilience Checklist. This practical, easy-to-use tool helps your organization prepare for disruptions and ensure long-term continuity in an unpredictable world. Why Download: Identify and assess critical supply chain risks Ask the right questions to evaluate vendor preparedness Implement effective strategies to reduce vulnerabilities Improve communication, transparency, and coordination across your network What You’ll Learn: How to evaluate and m
Your resilience program isn’t working. You had the plans. You ran the trainings. You held the exercises. And when the real crisis hit it still fell apart. Sound familiar? Across dozens of resilience assessments, weve seen this story unfold in organizations of every size and industry. Its not a lack of effort. Its not a … The post Why Your Resilience Program Isnt Working And What to Do About It appeared first on Bryghtpath.
Technology is best described by the adage from Greek philosopher Heraclitus: The only constant thing is change. In this age of digital transformation, customers and competitors can find solutions and alternatives at the touch of a button. This speed means that service providers stay ahead only by embracing and executing change quickly, yet maintaining sufficient control to manage risk.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Technology is best described by the adage from Greek philosopher Heraclitus: The only constant thing is change. In this age of digital transformation, customers and competitors can find solutions and alternatives at the touch of a button. This speed means that service providers stay ahead only by embracing and executing change quickly, yet maintaining sufficient control to manage risk.
Celebrating Earth Week 2025 at Pure Storage: A Global Wrap-Up by Pure Storage Blog Summary At Pure Storage, our commitment to a sustainable future goes beyond our innovative technologyits embedded in our culture, our values, and our people. At Pure Storage, Earth Week isnt just about raising awarenessits about taking action. In collaboration with Pure Good Foundation , employees worldwide came together to celebrate, educate, and make tangible contributions toward a healthier planet.
From CNN : FEMA losing roughly 20% of permanent staff, including longtime leaders, ahead of hurricane season “The agency tasked with delivering billions of dollars in assistance to communities devastated by natural disasters is about to lose a huge portion of its workforce, including some of its most experienced and knowledgeable leaders who manage disaster response.
What Is a Risk Register, and How to Create One Last Updated: May 6, 2025 Managing risk without a clear system in place can be challenging. Confusion, missed opportunities and costly surprises are just some of the consequences that may follow. However, a risk register can turn things around. With a well-designed risk register in place, you get more than just a documentation tool.
Artificial intelligence-powered solutions take video analytics to new levels David Raske is the safety and security global lead in the Edge Computing Group of Intel. Although artificial intelligence (AI) has been the hottest technology trend over the past few years, it is anything but new. In the last quarter of the 20th century, computer vision technology, or visual AI, was launched with the aim of emulating human perception of the world.
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
Encrypted Replication from FlashArray to Pure Cloud Block Store by Pure Storage Blog Summary Released in Purity version 6.6.7, encrypted replication provides end-to-end encryption with TLS 1.3, enhances the security of replicated data, and is optimized for minimal impact. Encrypted replication has been available since Purity version 6.6.7, where we introduced over-the-wire encryption with asynchronous replication (async and ActiveDR ).
From Wired: FEMA Isnt Ready for Disaster Season, Workers Say. Instability, cuts, and a looming sense of dread have FEMA employees unsure the agency is ready for hurricanes, fires, and floods. We are being set up for a really, really bad situation,” says one. “Less than two months before the official start of hurricane season, the nations primary disaster-response agency faces an uncertain future.
Unlocking GenAIs PotentialCrawl, Spacewalk, Teleport April 30, 2025 Hamilton Yu Chief Executive Officer Buckle upwere moving at warp speed. Engineering is in my DNA. Ive been through the sprints, stage gates, and structured rollouts that bring innovation to life while mitigating risk. Theres a familiar rhythm to ittest, refine, scale. Thats how transformational technology usually gets implemented.
In todays bulletin, Charlie talks about transcribing in meetings and looks into the pros and cons of recording meetings. I was having a long discussion with my colleague, Jamie Lees, this morning all about a talk we are giving for Business Continuity Awareness Week. We have a working title of Man or Machine: Who Should Run Your Next Crisis? A Real-Life Comparison of AI and Humans Managing an Incident.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
Trust in the authenticity of video footage is now at stake Jason Crawforth is the founder and CEO of SWEAR. Information wields immense power. The data we rely on each day shapes opinions, influences decisions, and can affect events on a global scale. This makes safeguarding the integrity of digital content essential. The rise of advanced deepfakes and artificial intelligence (AI)-crafted forgeries presents a growing danger, one that can diminish the trust that serves as the very foundation of mo
Planning a vacation this year? Make sure your confirmation e-mail is legit BEFORE you click anything! Thats right, summer is right around the corner and cybercriminals are exploiting travel season by sending fake booking confirmations that look nearly identical to e-mails from airlines, hotels and travel agencies. These scams are designed to steal personal and financial information, hijack your online accounts and even infect your device with malware.
From HSToday: U.S. Emergency Agency Plan Requires Nearly All Staff to Be Deployed, Draft FEMA Memo Shows. “The U.S. agency that manages disasters plans to require nearly all employees, including full-time headquarters and regional staff, to be deployed to emergency zones, according to a draft memo to agency employees seen by Reuters. This spring, the Federal Emergency Management Agency will assign all full-time employees roles in leading, managing and supporting disaster response and recov
The financial services sector has known for some time that cybersecurity leaders communication skills have impact far beyond the IT department. Cyber leaders ability to explain risks and technology in business terms influences day-to-day operations, long-term business stability, and ultimately, our customers trust. But business is evolving, cybercriminals are increasingly sophisticated, and risks like fraud are on an upswing.
April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.
Compliance, Confidence, and Cyber Resilience: Unlocking the Power of Pure Storage and Superna by Pure Storage Blog Summary Superna and Pure Storage have teamed up to deliver a joint solution that enables enterprises to detect and respond to threats at the data layer, providing a new level of cyber resilience. In the global digital ecosystem, data is not only a vital business asset but also a prime target for cybercriminals.
New Security Industry Association (SIA) member Nanodems helps organizations streamline operations, mitigate risk and centralize control of their security assets and systems with its intelligent converged platform. The company is headquartered in Burlington, Massachusetts, with a growing network of partners and clients spanning across the world. SIA spoke with Asli Citak, marketing manager at Nanodems, about the company, the security industry and working with SIA.
If I asked you to name the biggest cybersecurity threats in your office, youd probably say phishing e-mails, malware or weak passwords. But what if I told you that your office printer yes, the one quietly humming in the corner could be one of the biggest vulnerabilities in your entire network? It sounds ridiculous, but hackers love printers. And most businesses dont realize just how much of a security risk they pose until its too late.
The cloud is the backbone of modern businesses, revolutionizing the trajectory of innovation, technology and business itself. While its promise of instant scalability and flexibility drives unprecedented growth, these same advantages can become a double-edged sword. The ease of spinning up new resources, automating deployments, and expanding services across regionsall of which make the cloud so powerfulcan quickly lead to sprawling infrastructure and runaway costs if not carefully managed.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
Organizations are breaking free from reactive compliance cycles by adopting future-proof GRC strategies that balance current requirements with adaptability to change. By implementing scalable control frameworks, integrated governance, centralized data, automation, and continuous monitoring, companies transform GRC from a burden into a strategic advantage that reduces risk while supporting growth.
The New Varonis-Pure Storage Integration for Cyber Resilience by Pure Storage Blog Summary In an increasingly hostile digital landscape, protecting critical data has become increasingly challenging. The new Varonis-Pure Storage integration empowers organizations to secure their data, mitigate risk, and ensure resilience today and into the future. In todays threat-driven environment, organizations are confronted with unprecedented challenges in protecting their data.
#SecurityGivesBack on June 6, 2025, with the second annual day focused on community service projects. SILVER SPRING, Md. The Security Industry Association (SIA) has announced details for the second annual Security Industry Community Service Day , an initiative created by the SIA Environmental, Social and Governance (ESG) Advisory Board to rally the entire security industry to give back and make the world a better place.
In an era of increasing disruptions, business continuity planning is more critical than ever. However, many organizations fall into common pitfalls that weaken their resilience in times of crisis. From neglecting the human element in disaster recovery to underestimating cyber threats, these oversights can have severe operational and financial consequences.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
As Director of Solutions Consulting at PagerDuty EMEA, I recently had the pleasure of sitting down with Andy White, Chief of Staff to the CTO at Checkout.com, to discuss how they’re navigating the challenges of DORA compliance using PagerDuty’s platform. Understanding DORA The Digital Operational Resiliency Act (DORA), which came into effect in January 2024, represents a significant shift in how financial institutions within the EU must handle their operational resilience.
A client recently asked me, What mistakes do you see business owners making the most when it comes to IT and cybersecurity? Oh, where to begin After years of working with businesses of all sizes, the biggest mistake I see time and again is treating IT and cybersecurity as an afterthought. It doesnt matter how many data breaches are in the news; I see business owner after business owner either underestimating the real risks of cyberthreats or assuming that setting up some basic protections is eno
From Evergreen to FlashArray//RC20: Innovation Flies Again by Pure Storage Blog Summary FlashArray//RC20 is a capacity-optimized entry-level enterprise storage array built using renewed and brand-new components. Made possible by Evergreen, FlashArray//RC20 showcases our engineering discipline, customer-first design, and strategic reuse model. Picture this: A rocket that lands itself, gets refueled, and launches againreliably, and more affordably than ever before.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content