This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The First Line of Defense: Customer Service as a Crisis Prevention Tool By Michelle Sinning, APR In an age where reputations can rise and fall in a single tweet, customer service isnt just about resolving problemsits about preventing a crisis. Too often, companies treat customer service as the final step in the customer journey: a reactive department that kicks in only when something goes wrong.
ERWOODS LAWS Erwoods Laws of Business Continuity and IT Disaster Recovery Executive Summary: Erwoods Laws of Business Continuity and IT Disaster Recovery Erwoods Laws of Business Continuity and IT Disaster Recovery , authored by Keith Erwood and inspired by Murphys Laws of Combat, delivers a sharp, pragmatic perspective on the realities of managing business crises.
PagerDuty.orgs Latest Impact Cohort of Nine Organizations Improves Urgent Health Outcomes Globally For organizations providing vital mental health assistance, safety crisis services and delivering critical humanitarian support when disaster strikes, reliable digital infrastructure is essential. Whether connecting individuals to crisis counselors via text or coordinating face-to-face healthcare support, these digital services must operate seamlessly.
New report from PewTrusts: How States Can Build Disaster-Ready Budgets Strategies for reducing fiscal risks in the face of rising costs “Policymakers at every level of government are grappling with the rising costs of storms, floods, wildfires, and other natural disasters and how best to aid affected communities. As disasters have grown in frequency and severity, so too has the strain on public finances and the urgency to update budgeting practices, especially in the states, to help public
Strengthen your operations with the Supply Chain Resilience Checklist. This practical, easy-to-use tool helps your organization prepare for disruptions and ensure long-term continuity in an unpredictable world. Why Download: Identify and assess critical supply chain risks Ask the right questions to evaluate vendor preparedness Implement effective strategies to reduce vulnerabilities Improve communication, transparency, and coordination across your network What You’ll Learn: How to evaluate and m
6 Customer-proven Best Practices for Cyber-resilient Backup and Recovery by Pure Storage Blog Summary From the 3-2-1-1-0 framework to indelible data to faster threat detection, cyber resilience best practices can help organizations safeguard their operations and recover quickly and confidently when the worst happens. Cyber threats have evolved. What started as opportunistic ransomware has escalated into destructive wiperware and nation-state attacks.
Risk-Based Approach to Supply Chain Risk Management Last Updated: May 15, 2025 From unexpected tariff changes to geopolitical shifts, organizations face growing uncertainty. Those that take a proactive, risk-based approach to supply chain management are better prepared to navigate these challenges without major overhauls or reactive scrambling. By anticipating risks and planning accordingly, companies can maintain stability and reduce the impact of unforeseen events.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Risk-Based Approach to Supply Chain Risk Management Last Updated: May 15, 2025 From unexpected tariff changes to geopolitical shifts, organizations face growing uncertainty. Those that take a proactive, risk-based approach to supply chain management are better prepared to navigate these challenges without major overhauls or reactive scrambling. By anticipating risks and planning accordingly, companies can maintain stability and reduce the impact of unforeseen events.
New measures signed into law last week in Washington and Oregon ensure security manufacturers will not be required to disclose sensitive technical information regarding their products, protecting the integrity of security and life safety systems and the lives of those who depend on them. On May 22, 2025, Oregon Gov. Tina Kotek signed into law SB 959 , which added an exemption omitted in the states right to repair measure applicable to consumer and household electronics enacted in 2024, as part o
From Grist: Homeland Security News Wire: Coming This Summer: Record-Breaking Heat and Plenty of Hurricanes. Forecasters are predicting higher temperatures across the U.S. and up to 10 hurricanes. Cutting federal programs could leave people even more vulnerable.
T-SQL REST API Integration in SQL Server 2025: Streamlining T-SQL Snapshot Backups by Pure Storage Blog Summary This article takes you through the steps for using a T-SQL script to create application-consistent snapshots on FlashArray from within SQL Server, without needing any external tools or scripts. This article originally appeared on Anthony Nocentinos blog.
Observability platforms want to do it allfrom data collection to incident response. Their pitch is appealing: one platform to eliminate context switching and reduce overhead. But when critical systems failand they will fail, add-on incident management modules won’t save you. You need an end-to-end system built specifically for high-stakes incident management.
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
From Tariffs to Turmoil: Spot Supply Chain Risk Before It Spreads Last Updated: May 6, 2025 Everything is connected. A delay in one region can derail a production schedule on the other side of the world. A cyber incident at a vendor can escalate into a full-blown regulatory crisis. Supply chains are no longer just a logistics concern; they touch every part of the business.
In todays bulletin, Charlie discusses the webinars that were showcased by the BCI during BCAW and gives an insight into this years theme, Empowering Resilience with AI. This week, I was asked to write my bulletin on BCAW+R 2025 (Business Continuity & Resilience Awareness Week). With two days dedicated to cyber training and the other two spent preparing for and conducting a major exercise, I havent had much opportunity to watch many of the webinars.
From CNN: FEMA makes late push to bolster hurricane preparedness, but effort may be too little, too late, officials say “In a series of internal memos issued this week and obtained by CNN, Homeland Security Secretary Kristi Noem, whose department oversees the disaster relief agency, approved requests by FEMA to reopen several training facilities and lengthen contract extensions for thousands of staffers who deploy during natural disasters.
Your Cyber Resilience Wish List for 2025and How to Achieve It by Pure Storage Blog Summary Mounting cybersecurity threats are putting IT teams under increased pressure. Taking a holistic approach to cyber resilience can help your organization be ready and keep running smoothly in the event of an attack. Cybersecurity challenges are bigger than ever, and IT professionals are under pressure to ensure their organizations can handle and recover from an increasing number of threats.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
When a crisis hits, the success of an organization often hinges on how effectively it communicates. Misinformation, delayed responses, and unclear messaging can amplify the impact of an already turbulent situation, damaging reputation, trust, and business continuity. This is why having a robust crisis communication plan is critical. It ensures that your organization can respond calmly, clearly, and effectively when faced with unexpected challenges.
Download: Separation of Duties (SoD) Checklist Why SoD Matters: Implementing Separation of Duties (SoD) is a critical practice for organizations seeking to strengthen their internal controls. It involves dividing responsibilities among multiple individuals to ensure that no single person has the ability to execute conflicting tasks. By doing so, organizations can significantly reduce risks related to fraud, errors, and non-compliance.
Strong plans arent enough. Clear roles arent enough. Even aligned domains business continuity, crisis, DR, comms, cyber arent enough on their own. You can have all the right capabilities and still watch your response fall apart when it matters most. Thats because resilience doesnt succeed with good content. It succeeds with good systems. … The post The Enabling Functions That Make Resilience Actually Work appeared first on Bryghtpath.
From HS Today: Multiple Attorney Generals Sue DHS to Protect Emergency Preparedness and Disaster Relief Funding “New York Attorney General Letitia James and 19 other attorneys general have filed a lawsuit challenging new U.S. Department of Homeland Security (DHS) conditions that link emergency management and disaster relief funding to state immigration enforcement policies, as stated in a press release on May 13.
April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.
SQL Server 2025: Enterprise AI without the Learning Curve by Pure Storage Blog Summary Microsoft SQL Server 2025 offers AI capabilities that are directly integrated into T-SQL, enabling organizations to leverage their existing investments in SQL Server infrastructure, skills, and processes. This blog initially appeared on Anthony Nocentinos blog. It has been republished with the writers credit and consent.
Software-as-a-Service (SaaS) is poised for a significant shift driven by market consolidation and heightened buyer vigilance. The post-pandemic surge in digital transformation, fueled in large part by venture capital, is giving way to an era of financial prudence and strategic realignment. This shift is driven by companies intensifying their focus on the efficiency and effectiveness of their tech stacks, a trend highlighted by notable contractions in the average SaaS portfolio.
What Is a Risk Register, and How to Create One Last Updated: May 6, 2025 Managing risk without a clear system in place can be challenging. Confusion, missed opportunities and costly surprises are just some of the consequences that may follow. However, a risk register can turn things around. With a well-designed risk register in place, you get more than just a documentation tool.
Brian Karas, director of marketing and Eastern region sales at Actuate, is a member of SIA’s AI Advisory Board. Surveillance video implements many cool technologies to enable us to prevent or solve crimes. If you think about the whole system end to end, we have cameras that take in photons, turn them into electrons, which are carried across a variety of networks and come out the other end as photons from a monitor.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
From the GAO: Disaster Assistance: Updated FEMA Guidance Could Better Help Communities Apply for Individual Assistance New report released on May 14th.
SQL Server 2025: Enterprise AI without the Learning Curve by Pure Storage Blog Summary Microsoft SQL Server 2025 offers AI capabilities that are directly integrated into T-SQL, enabling organizations to leverage their existing investments in SQL Server infrastructure, skills, and processes. This blog initially appeared on Anthony Nocentinos blog. It has been republished with the writers credit and consent.
Reflections on Qlik Connect 2025 May 14, 2025 Jay Cuthrell Chief Product Officer Live blogging I’ll be living blogging this week from Qlik Connect 2025 in Orlando, Florida. This article will be updated throughout the week of May 13-15, 2025. Qlik Connect brings together an enviable community of passionate practitioners to share their stories, business goals, and journey to command of data for the AI which fuels business outcomes.
If youre only talking to your IT provider when you renew your contract, youre doing it wrong. Technology isnt a set it and forget it part of your business. Its constantly evolving, and so are the threats that come with it. Thats why quarterly IT check-ins are nonnegotiable if you want your business to stay protected, productive and competitive. But heres the thing: Most business owners dont know what to ask.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
Daniel Reichman, Ph.D., is the CEO and chief scientist at Ai-RGUS and a member of the SIA AI Advisory Board. Artificial intelligencehas become the buzzword for innovationin the security industry, and it is now integratedinto many solutions. The reception to AI hasbeen mixed; some people excitedly embrace new applications,whileothers are more cautious.Before evaluating whether to implement this new technology,itsessential to emphasizeone point:AI is not here to replace human intelligence itshere
From the WashPost Editorial Page: America is Becoming Less ready for Natural Disasters. “The President is destroying programs that help communities prepare for climate effects.
Encrypted Replication from FlashArray to Pure Cloud Block Store by Pure Storage Blog Summary Released in Purity version 6.6.7, encrypted replication provides end-to-end encryption with TLS 1.3, enhances the security of replicated data, and is optimized for minimal impact. Encrypted replication has been available since Purity version 6.6.7, where we introduced over-the-wire encryption with asynchronous replication (async and ActiveDR ).
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content