article thumbnail

What Does Good Look Like in the Era of Operational Resilience?

Fusion Risk Management

From risk assessments to contingency planning, Fusion equips organizations to navigate operational vulnerabilities effectively. It uncovers previously unknown vulnerabilities and prioritizes by real business impact (not just size) to strengthen resilience programs in the most efficient way.

article thumbnail

Book Review: Case Studies in Disaster Recovery

Recovery Diva

However, it is also constrained by the community’s resource availability, adaptability, and existing vulnerability among other things. and government (a critique of FEMA disaster assistance programs). Section III covers the topic of planning for recovery.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The United Kingdom's National Risk Register - 2023 Edition

Emergency Planning

This document was first published in 2008 and has been updated (somewhat irregularly) at roughly two-year intervals. b) In terms of its methodology, the NRR discusses vulnerability but does not accept the premise (Hewitt 1983) that it is the major component of risk.

article thumbnail

Covid-19: Elements of a Scenario

Emergency Planning

US Homeland Security Council 2005, UK Government 2008), while in others it did not. For example, civil aviation is particularly vulnerable. Thus, the vulnerability and fragility of people and society need to be seen in the light of socio-economic changes induced by the epidemic. UK Government 2008.

Pandemic 130
article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Table 2: A list of incidents in the water industry (Ten, Liu & Manimaran, 2008) What I think is interesting about the list above is the details of who conducted the attack. Access Vulnerabilities – Often, passwords are shared due to the installer changing it for additional users or manufacture default passwords are not changed.

article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Table 2: A list of incidents in the water industry (Ten, Liu & Manimaran, 2008). Access Vulnerabilities – Often, passwords are shared due to the installer changing it for additional users or manufacture default passwords are not changed. These links can be intercepted and are vulnerable to attack. Bibliography.

article thumbnail

A Proposed Strategy to Advocate for Improved Civil Protection in the United Kingdom

Emergency Planning

Hence there is potential for floods that equal or exceed those generated in 2008, storms that may be more disruptive than Arwen was in 2021, heatwaves greater than that of July 2022, and so on. An emphasis on understanding and reducing vulnerability rather than creating resilience, which is a less robust concept.