This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Episode Summary: On today's show, Shane interviews John Hill, a seasoned consultant with over 20 years of experience in Disaster Recovery and Business Continuity. 12:07min- How does a company’s BCM program get so bad? 31:37min- Approach to integrating continuous improvement into regular BCM work. Key Points.
The business continuity management roadmap is a simple but powerful tool that can help organizations strengthen their BCM programs and enhance their resilience. In today’s post, we’ll lay out an eight-step process your company can use to create its own, customized BCM roadmap. This is what a BCM roadmap is and does.
In today’s post we’ll look at the top 10 free or almost free resources business continuity management professionals can utilize to help them raise their BCM skills and effectiveness to ninja level. However, there is one aspect of doing BCM that is much better and easier than it was when I was getting started 25 years ago.
Knowing what roles should be represented on the business continuity management (BCM) team and what kind of people should fill them is an overlooked key to success in making organizations resilient. In today’s post we’ll look at what the slots on a BCM team should be and the traits and skillsets needed in the team’s staff and leadership.
This post is part of BCM Basics, a series of occasional, entry-level blogs on some of the key concepts in business continuity management. . Organizations today have more options than ever … The post BCM Basics: Modern IT/DR Strategies appeared first on MHA Consulting.
This post is part of BCM Basics, a series of occasional, entry-level blogs on some of the key concepts in business continuity management. . Data is a critical asset for almost … The post BCM Basics: The BC Professional’s Role in Data Protection appeared first on MHA Consulting.
This post is part of BCM Basics, a series of occasional, entry-level blogs on some of the key concepts in business continuity management. This leaves users free to focus on performing their organization’s core tasks instead of spending their time sorting out software maintenance and security issues.
Related on MHA Consulting: All About BIAs: A Guide to MHA Consulting’s Best BIA Resources The past twenty-five years have seen a lot of changes in the world especially as pertains to business. It’s interesting to look at BCM practices that have fallen into disuse or are no longer regarded as beneficial or sufficient.
Related on MHA Consulting: The Write Stuff: How to Create and Maintain Business Continuity Documentation Five Ways BC Documentation Can Go Wrong An organization can reap myriad benefits by documenting its business continuity or IT disaster recovery (IT/DR) program in the form of written recovery plans. Common Mistake No.
On this week's show, Shane interviews John Hill, a seasoned consultant with over 20 years of experience in Disaster Recovery and Business Continuity. On this week's show, Shane interviews John Hill, a seasoned consultant with over 20 years of experience in Disaster Recovery and Business Continuity.
Related on MHA Consulting: What’s Ahead in the World of Enterprise Risk Management Defining Risk Management Our current environment of rising global uncertainty is leading many organizations to increase the resources they devote to risk management.
The best way to do this is by making sure business continuity is integrated into a robust information security governance framework. When organizations grappling with outages turn to such common recovery measures as having employees use their personal computers and phones, this frequently creates security gaps. Cyber policy.
Security Professionals: For dealing with physical threats to the organization or its personnel. The BCM Blogging Team The post Crisis Management Team, Assemble! This might include: IT Specialists: For handling technological crises, such as cybersecurity breaches. Finance Experts: To manage and mitigate financial risks and implications.
Well-chosen BCM software can help a continuity program be more nimble and effective. It is also a pretty good depiction of how business continuity management (BCM) programs need to be these days if they are to successfully protect their organizations from the unprecedented number of threats in the environment. Lifecycle parameters.
Related on MHA Consulting: Home Alone: When Disasters Affect Staff Who Are Working Remotely A Stopgap Measure That Became a Permanent Fixture When the hybrid workplace model first emerged at the beginning of the COVID-19 pandemic, it was seen as an emergency solution to a crisis situation. The answer is yes.
Related on MHA Consulting: Top 10 Resources to Help You Become a BCM Ninja Why the BIA Is Important The business impact analysis or BIA is one of the topics Richard Long and I write about the most here on “Roadmap to Resiliency.” BIA On-Demand is a secure, cloud-based tool for conducting a complete Business Impact Analysis.
Read on to learn about the BCM year in review. Working remotely as a business continuity management consulting firm worked while it had to, but there’s nothing like visiting organizations in person. There’s a lot to be said for ruthless efficiency when it comes to BCM. Supply-chain security is paramount.
I became deeply involved in BCM ( business continuity management ) as a CIO, supporting services 24x7x365, and before that, I was vice president for a boutique risk consulting firm, where I relied on Excel or MS Access to build out plans. Since then, I have always looked to leverage a BCM solution for my employer or customers.
As business continuity consultants, we at MHA often encounter a situation we call “inviting by title,” which is when our contact at the client company has us meet with high-level company executives rather than mid-level employees with detailed tactical knowledge. Who in the company possesses a security token?”
First, risk management is not about being Chicken Little worrying that the sky falling; it’s about being mature, practical, and proactive in actively managing down risk to make the organization and its stakeholders more secure. Sometimes the potential consequences of a given risk are too small to worry about.)
Description: “ Facing daily risks to long-term success from a wide range of threats—cyber-attacks, human error, technical failures, and natural disasters—businesses must create practical plans to sustain their vital operations, security posture, industry reputation, and brand. ” GO TO BOOK. ” GO TO BOOK. Ransome has a Ph.D.
Related on MHA Consulting: How to Get Strong: Unlocking the Power of Vulnerability Management The Practice of Vulnerability Management Last week, MHA CEO Michael Herrera wrote a blog about vulnerability management , the practice of identifying and mitigating the weaknesses in an organization’s people, processes, and technology. Evacuation.
Related on MHA Consulting: Global Turmoil Making You Ill? The typical result is that there are large holes in and between the measures they implement to reduce risk, and the organization’s security pours out through these holes like water through a sieve. Security being so tight it prevents people from doing their jobs.
Related on MHA Consulting: Single Points of Failure: Protecting Yourself from Hanging by a Thread Risk and the Entrepreneur In writing today’s blog, I’m going to switch between my consultant’s hat and my entrepreneur’s hat. Looking back, some of the risks we ran in those early days makes me break out in a cold sweat.
Related on MHA Consulting: Single Points of Failure: Protecting Yourself from Hanging by a Thread Every now and then MHA gets hired to conduct a vulnerability assessment, where we’ll survey the landscape of an organization’s people, processes, technology, and facilities looking for its greatest and potentially most impactful weaknesses.
In the “ An Introduction to Business Continuity Planning ” article, we outlined the main components of the Business Continuity Management (BCM) Program and introduced the basics of Business Continuity Planning (BCP). These plans must address BCM Program requirements, including Emergency Management Procedures (e.g.
In the “ An Introduction to Business Continuity Planning ” article, we outlined the main components of the Business Continuity Management (BCM) Program and introduced the basics of Business Continuity Planning (BCP). . A false sense of security. Many of the organizations of this size (e.g. Many of the organizations of this size (e.g.
Related on MHA Consulting: Global Turmoil Making You Ill? One function that is frequently performed by third parties is physical security. There are some physical security outfits I wouldn’t trust to look after my dog, much less my company.) It’s a powerful tool, but one that must be used with care to avoid unpleasant surprises.
Related on MHA Consulting: Driving Blind: The Problem with Skipping the Threat and Risk Assessment The Need for Threat Intelligence Traditional business continuity methodology leans heavily on the threat and risk assessment or TRA, in which the organization identifies potential threats and ranks them in terms of likelihood and potential impact.
BCP is one of the components of the Business Continuity Management (BCM) Program which should be implemented in organizations of all sizes. The implementation of a BCM Program could be a rather complex and lengthy process, which largely depends on the organization’s size. Reading Time: 6 minutes. Regardless of the industry (e.g.
Related on MHA Consulting: Who Does What: The Most Critical Job Roles in IT Disaster Recovery The Price of Neglecting IT/DR Being a business continuity consultant can be frustrating. These folks are responsible for implementing comprehensive information security procedures, policies, and systems to protect the organization.
Related on MHA Consulting: All About BIAs: A Guide to MHA Consulting’s Best BIA Resources The Importance of Testing and Exercises In case you missed it, MHA CEO Michael Herrera wrote an excellent blog last week called, “The Top 8 Risk Mitigation Controls, in Order.” Exercise Smarter: Include 3rd Party Experts In Your Cyber Exercises.”
Related on MHA Consulting: All About BIAs: A Guide to MHA Consulting’s Best BIA Resources The Importance of Testing and Exercises In case you missed it, MHA CEO Michael Herrera wrote an excellent blog last week called, “The Top 8 Risk Mitigation Controls, in Order.” Exercise Smarter: Include 3rd Party Experts In Your Cyber Exercises.”
Related on BCMMETRICS: Don’t Give Up the Ship: Demonstrating the Benefits of Rigorous Crisis Management Training Benefits That Go Beyond BC The main purpose of a business continuity management (BCM) program is to help an organization get through disruptions with the least possible impact to its operations, reputation, stakeholders, and bottom line.
The recently announced partnership between MHA Consulting and Kroll is a tremendous win for both firms and their clients. It’s also an exciting milestone for me personally as someone who, twenty-five years ago, started an independent business continuity consultancy with no guarantee of what the future held.
Specifically, it should have policies and procedures covering the five key areas of data retention, data access, device security, people security, and social media. Device Security Another area for which organizations should develop risk governance policies is device security. Let’s look at them one by one.
This is particularly relevant in those organisations where just one or two individuals currently carry the key responsibility for information security. Business Continuity Management (BCM). Using the information gained from the first two stages, an overarching BCM strategy is then produced. Business Continuity Plan Checklist .
Business Continuity : developing a Business Continuity Management (BCM) plan which is applied consistently across the entire enterprise with senior management’s support to make a significant difference in the ability of the organisation to achieve high level cyber resilience, protecting financial and reputational assets.
Related on MHA Consulting: Be Ransomware Resilient: Know How to Operate Manually A Healthcare System Under Attack Last month, the U.S. Preventing data breaches is primarily the responsibility of the information security and IT departments. health care system in American history.” Once the data is gone, it’s gone.
Look for knowledgeable, effective people from the corporate security, business continuity, human resources, and communications departments, among others. OSHA , FEMA , and the Department of Homeland Security all have excellent resources to help with writing an emergency response plan. Communicate, train on, and test the plan.
In today’s blog, we’ll look at those risks from the point of view of a business consultant who specializes in technology and IT disaster recovery. Related on MHA Consulting: Global Turmoil Making You Ill? Data security. These days everyone is talking about the risks of generative AI technology such as OpenAI’s ChatGPT tool.
The rise in the use of third-party computing services has given many companies a false sense of security regarding the recoverability of their IT systems. In today’s post we’ll look at why organizations still need to be adept at IT disaster recovery (IT/DR) and describe the four phases of restoring IT services after an outage.
S2E7 - Pathways to a Career in BCP Join Roswitha in her solo discussion of how ANY career/education path can lead you into the field of Business Continuity Planning (BCP) or Business Continuity Management (BCM). S1E4 - Software or Consultants for building your BCP. Bonus tip is about integrations. S1E20 - Building a Progressive BCP.
For example, you could have a call centre where people are not allowed to work from home due to security reasons. The BCM will ring SunGard on 0141 XXXXXXX and say “this organisation X would like to activate 100 seats under the contact number 123456”.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content