Trending Articles

article thumbnail

New Resources re Fire Disasters from Univ. of CO

Recovery Diva

See this notice from the Natural Hazards Center at the University of Colorado: lists of publications, resources, and grant opportunities. This is a great central location for many useful items.

article thumbnail

The Latest Microsoft Ignite and I’m Not Mad About It

NexusTek

The Latest Microsoft Ignite and Im Not Mad About It January 10, 2025 JP Pilkin Vice President, Advanced Solutions Group This years event in Chicago was packed with insights on how Microsoft plans to leverage its massive user base, drive AI adoption, address security challenges, and continue leading innovation in the cloud. Here are my top observations: 1.

Strategic 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DRI International Releases 10th Annual Predictions Report, Highlighting Risk and Resilience Trends for 2025

DRI Drive

New York, NY Disaster Recovery Institute (DRI) International, the leading nonprofit in business continuity and resilience training, has published its 10th Annual Predictions Report resilience predictions for the profession, by the profession. The report provides an in-depth look ahead to major global issues that resilience professionals may deal with in the coming year. […] The post DRI International Releases 10th Annual Predictions Report, Highlighting Risk and Resilience Trends for 202

article thumbnail

Anti-Patterns vs. Patterns: What Is the Difference?

BMC

Jargon permeates the software development industry. Best practices. Artifacts. Scope creep. Many of these terms are so common as to be called overused, and it is easy to assume we understand them because they seem so obvious. Still, we sometimes find new depth when we examine them closely. In this post, let us muse on pattern, and its somewhat lesser known counterpart, the anti-pattern.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

What Are Air Gaps and Are They Effective Data Security Strategies?

Pure Storage

What Are Air Gaps and Are They Effective Data Security Strategies? by Pure Storage Blog This is part one in a series about air gaps and resiliency architectures. Read part two: Without A Tiered Backup Architecture, Are You Truly Resilient? Ransomware attackers are ruthless opportunistsbut that doesnt mean we should make their jobs any easier. Take the attack on Colonial Pipelines back offices.

More Trending

article thumbnail

Toxic Debris from CA Fires

Recovery Diva

TFrom the NY Times: Once the Fires Are Out, California Must Remove Tons of Dangerous Debris Clearing the toxic remnants of burned buildings around Los Angeles will require a complex and expensive mobilization. California has been there before.

100
100
article thumbnail

RFP Definition, Steps & Template for Requests for Proposals

BMC

No matter your industry, the time will come when you must submit a Request for Proposalknown simply as an RFP. At some point, your company must purchase a product or service from a third-party vendor. The RFP is a solicitationyou ask vendors whether and how they can solve your problem and support your project. Although RFPs are a prevalent standard in the business world, they still lead to a lot of confusion for many.

article thumbnail

A Crisis Athletes Interview

Disaster Zone Podcast

This is a different type of Disaster Zone Podcast. The host, Eric Holdeman becomes the interviewee and Kim Guevara, is the interviewer. Kim has been researching different aspects of what it means to be an emergency manager. In her words, a crisis athlete. This is not about push-ups, but rather what does it take to be successful in becoming prepared for disasters, responding to them and then the disaster recovery.

article thumbnail

Business Process Automation: What It Is and How to Use It

LogisManager

Business Process Automation: What It Is and How to Use It Last Updated: January 14, 2025 Business process automation (BPA) is critical in a constantly advancing landscape. With increasing regulatory pressures and a need for operational agility, your role as a risk manager becomes more complex and essential. There’s where BPA steps in as a game-changer, automating processes to save time, reduce costs and enhance efficiency across your organization.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Security Industry Association Welcomes New Leadership of SIA Perimeter Security Subcommittee

Security Industry Association

Christa Decker of Whitman, Requardt & Associates and Amy Dunton of Ameristar will oversee the subcommittees efforts to support the protection of crowded spaces, critical infrastructure and government facilities. SILVER SPRING, Md. The Security Industry Association (SIA) has named two industry leaders Christa Decker, vice president of the Protective Design Group at Whitman, Requardt & Associates (WRA), and Amy Dunton, business development specialist at Ameristar to serve as co-chairs o

article thumbnail

Watch Duty is Free App with Great Utility in CA and Potential for Others

Recovery Diva

From the WashPost: How Watch Duty became the go-to wildfire app to track L.A. wildfires. Plus advice to stay informed and prepared as natural disasters become more common.

100
100
article thumbnail

Acronis names Gerald Beuchelt as Chief Information Security Officer

Acronis

Acronis has named Gerald Beuchelt as its new CISO. He will play a pivotal role in expanding Acronis' influence in the cybersecurity community. Beuchelt will lead new research, reports and threat intelligence initiatives from the Acronis Threat Research Unit (TRU).

article thumbnail

Countdown to DORA: Are you ready for January 17, 2025?

Zerto

The Digital Operational Resilience Act (DORA) deadline is fast approaching. By January 17, 2025 , financial institutions and ICT service providers in the EU must meet stringent requirements to enhance IT resilience, manage risk, and recover quickly from disruptions. Non-compliance with DORA isnt just about fines; it risks eroding customer trust, damaging your reputation, and jeopardizing business continuity.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Risks Associated With Business Task Automation and How to Mitigate Them

LogisManager

Risks Associated With Business Task Automation and How to Mitigate Them Last Updated: January 14, 2025 If your business is investing in task automation, you’ll benefit from increased efficiency and reduced manual tasks. While business task automation (BTA) offers companies a new way to manage workflows, it also comes with new risks. Risk managers need to understand their IT processes so they can find and prevent security threats for everyone.

article thumbnail

Leveraging Business Continuity Plans in Turbulent Times

BryghtPath

Organizations must possess robust strategies to navigate turbulent times effectively in an era of unpredictable challenges, ranging from internal disruptions to external crises. Business Continuity Plans (BCPs) are vital tools that enable organizations to maintain critical operations, safeguard assets, and foster resilience. This article delves into how organizations can use and enhance their BCPs during … The post Leveraging Business Continuity Plans in Turbulent Times appeared first on B

article thumbnail

This Disaster Recovery Information Site is 14 Year Olds and Contains a Current Archive

Recovery Diva

Given the magnitude of the CA fire disasters, the Diva wants to be helpful to as many people as possible.On this site, she not only posts nearly daily news articles on recovery topics, but she also pays an expert to review and correct the URLs for all articles cited. Just use the Search function to research your topic of interest.

article thumbnail

Leveraging Large Language Models for STRIDE Threat Modeling—A Scalable and Modular Approach to Secure PoCs and Agile Projects

Pure Storage

Leveraging Large Language Models for STRIDE Threat ModelingA Scalable and Modular Approach to Secure PoCs and Agile Projects by Pure Storage Blog Summary The security of PoCs and MVPs is often an afterthought, leaving them vulnerable to threats. Threat Model Mentor automates the STRIDE methodology using GPT-based models and makes threat modeling accessible to development teams.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Data protection trends to follow in 2025

Zerto

In 2024, data protection strategies and solutions pivoted toward cyber security more than ever. With cyberattacks like ransomware directly impacting access to data and applications, the role of data protection in the security framework has become vital. Similarly, data protection became a focus of increased government regulations and changing industry standards.

article thumbnail

How to Safely Automate Employee Onboarding

LogisManager

How to Safely Automate Employee Onboarding Last Updated: January 14, 2025 Employees are a core part of any organization. After working hard to find and hire the best of the bunch, you might think you’re all set. But you still need to teach your new employees the ropes. For risk managers, onboarding is more than just welcoming new team members it’s about ensuring everyone understands compliance while preventing business risks.

Audit 52
article thumbnail

2025 GRC Resolutions for Your Business 

Reciprocity

While personal New Year’s resolutions often fade by February, your organization’s GRC resolutions can’t afford to falter. The stakes are too high in an environment of evolving regulations, emerging cyber threats, data breaches, and increasing stakeholder expectations. Companies that fail to adapt their GRC programs face not just compliance risks, but potential damage to their reputation, operations, and bottom line.

article thumbnail

Coming Soon: A New Book on Recent Large Scale Disasters

Recovery Diva

Soon to be released in hard copy and electronic versions: U.S. Emergency Management in the 21st Century From Disaster to Catastrophe Note that the Diva is one of the editors. She hopes copies will be available sooner than indicated.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Why Paying the Ransom Should Be Your Last Option

Pure Storage

Why Paying the Ransom Should Be Your Last Option by Pure Storage Blog Summary While paying the ransom might seem like the quickest path to recovery after a ransomware attack, its not. Restoring from secure backups, using decryption tools, and engaging cybersecurity experts can help you recover without funding cybercriminals. Imagine waking up to find your companys entire digital world locked away behind an ominous message demanding payment.

Backup 52
article thumbnail

The Future of Cybersecurity in 2025: Navigating Challenges for the Midsize Market

NexusTek

The Future of Cybersecurity in 2025: Navigating Challenges for the Midsize Market January 14, 2025 Paul Barrett VP, Sales Enablement The world of cybersecurity is shifting fast, and midsize businessesmaybe like yoursare feeling the pressure. Cyber threats are evolving, becoming sharper and more focused, and the defenses you relied on last year might not be enough to protect you tomorrow.

article thumbnail

The Benefits of Automating Contract Management

LogisManager

The Benefits of Automating Contract Management Last Updated: January 14, 2025 Contract management is the glue that holds organizations together. Businesses must draft and approve complex documents while keeping everyone happy and within legal bounds. Automation can help make this process faster, reduce inefficiencies, and mitigate risksbut its important to approach it with a focus on risk.

article thumbnail

Master Your Business’s Resilience with BCP Builder

BCP Builder

In todays fast-paced and unpredictable world, having a solid business continuity plan (BCP) is no longer optionalits a necessity. Whether you’re navigating natural disasters, cyberattacks, or unexpected disruptions, the ability to respond quickly and recover efficiently can determine the survival of your business. Enter BCP Builder, an intuitive online platform offering a comprehensive business continuity plan template to empower businesses of all sizes.

BCP 52
article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha