This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Episode Summary: On today's show, Shane interviews John Hill, a seasoned consultant with over 20 years of experience in DisasterRecovery and Business Continuity. 12:07min- How does a company’s BCM program get so bad? 31:37min- Approach to integrating continuous improvement into regular BCM work. Key Points.
Our editors have compiled this directory of the best books for disasterrecovery managers based on Amazon user reviews, rating, and ability to add business value. Disasterrecovery solutions are vital for organizations that want to maximize uptime and protect themselves from threats, including cyber-criminals and natural disasters.
In today’s post we’ll look at the top 10 free or almost free resources business continuity management professionals can utilize to help them raise their BCM skills and effectiveness to ninja level. However, there is one aspect of doing BCM that is much better and easier than it was when I was getting started 25 years ago.
Knowing what roles should be represented on the business continuity management (BCM) team and what kind of people should fill them is an overlooked key to success in making organizations resilient. In today’s post we’ll look at what the slots on a BCM team should be and the traits and skillsets needed in the team’s staff and leadership.
This post is part of BCM Basics, a series of occasional, entry-level blogs on some of the key concepts in business continuity management. This leaves users free to focus on performing their organization’s core tasks instead of spending their time sorting out software maintenance and security issues.
The cost of not having an IT disasterrecovery team can range from being unable to recover from a disruption, to overspending. Related on MHA Consulting: Who Does What: The Most Critical Job Roles in IT DisasterRecovery The Price of Neglecting IT/DR Being a business continuity consultant can be frustrating.
Most of these have had demonstrable impacts on the practice of business continuity management (BCM), rendering some traditional practices obsolete and ushering in new concerns and techniques. It’s interesting to look at BCM practices that have fallen into disuse or are no longer regarded as beneficial or sufficient.
On this week's show, Shane interviews John Hill, a seasoned consultant with over 20 years of experience in DisasterRecovery and Business Continuity. John is known for implementing redundant technical infrastructure/systems/staff to ensure resilient systems against business interruptions and actual disasters.
This post is part of BCM Basics, a series of occasional, entry-level blogs on some of the key concepts in business continuity management. . Organizations today have more options than ever … The post BCM Basics: Modern IT/DR Strategies appeared first on MHA Consulting.
Related on MHA Consulting: The Write Stuff: How to Create and Maintain Business Continuity Documentation Five Ways BC Documentation Can Go Wrong An organization can reap myriad benefits by documenting its business continuity or IT disasterrecovery (IT/DR) program in the form of written recovery plans. Common Mistake No.
IT DisasterRecovery Planning – “No worries, we have a backup?!” Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 3 minutes When asked about their organization’s IT DisasterRecovery (ITDR) plans, some will smile and say, “Yes, we have a backup and it is fully outsourced.”
IT DisasterRecovery Planning – “No worries, we have a backup?!”. When asked about their organization’s IT DisasterRecovery (ITDR) plans, some will smile and say, “Yes, we have a backup and it is fully outsourced.” This step is where the idea of having a backup often gives organizations a false sense of security.
Instead, they should be developed in coordination with the cybersecurity department to ensure that recovery measures do not inadvertently create vulnerabilities that can be exploited by hackers. The best way to do this is by making sure business continuity is integrated into a robust information security governance framework.
The rise in the use of third-party computing services has given many companies a false sense of security regarding the recoverability of their IT systems. In today’s post we’ll look at why organizations still need to be adept at IT disasterrecovery (IT/DR) and describe the four phases of restoring IT services after an outage.
I became deeply involved in BCM ( business continuity management ) as a CIO, supporting services 24x7x365, and before that, I was vice president for a boutique risk consulting firm, where I relied on Excel or MS Access to build out plans. Since then, I have always looked to leverage a BCM solution for my employer or customers.
In that event, businesses require a disasterrecovery plan with best practices to restore hardware, applications, and data in time to meet the business recovery needs. What is a DisasterRecovery Plan? Notable Best Practices for DisasterRecovery. Why Do I Need One?
Well-chosen BCM software can help a continuity program be more nimble and effective. It is also a pretty good depiction of how business continuity management (BCM) programs need to be these days if they are to successfully protect their organizations from the unprecedented number of threats in the environment. Lifecycle parameters.
Read on to learn about the BCM year in review. It’s the best way to get a handle on the organization, its culture, what their most important business processes are, the threats they face, and the current state of their BCM program. There’s a lot to be said for ruthless efficiency when it comes to BCM. A new focus on efficiency.
Related on MHA Consulting: Home Alone: When Disasters Affect Staff Who Are Working Remotely A Stopgap Measure That Became a Permanent Fixture When the hybrid workplace model first emerged at the beginning of the COVID-19 pandemic, it was seen as an emergency solution to a crisis situation. The answer is yes.
You’ve invested countless hours and piles of capital (both monetary and political) populating your current BCM software. Or you may fear that ditching your BCM app will leave your organization vulnerable – leaving only copies of plans. If all you care about are Plans, don’t invest in BCM software – use word processing.Be
They can benefit organizations by helping keep the recovery team personnel sharp and making business continuity part of the organization’s culture. Many companies limit their disasterrecovery drills to tabletop exercises, which are the least realistic and least demanding type of BC drills.
Related on MHA Consulting: Top 10 Resources to Help You Become a BCM Ninja Why the BIA Is Important The business impact analysis or BIA is one of the topics Richard Long and I write about the most here on “Roadmap to Resiliency.” BIA On-Demand is a secure, cloud-based tool for conducting a complete Business Impact Analysis.
They can benefit organizations by helping keep the recovery team personnel sharp and making business continuity part of the organization’s culture. Many companies limit their disasterrecovery drills to tabletop exercises, which are the least realistic and least demanding type of BC drills.
In the “ An Introduction to Business Continuity Planning ” article, we outlined the main components of the Business Continuity Management (BCM) Program and introduced the basics of Business Continuity Planning (BCP). These plans must address BCM Program requirements, including Emergency Management Procedures (e.g.
In the “ An Introduction to Business Continuity Planning ” article, we outlined the main components of the Business Continuity Management (BCM) Program and introduced the basics of Business Continuity Planning (BCP). . A false sense of security. Many of the organizations of this size (e.g. Many of the organizations of this size (e.g.
For the more common, tactical type of engagement—for example, ones focused on the BIA, recovery planning, IT disasterrecovery, or current state assessments—we need details that can most easily be provided by tactical experts. Who in the company possesses a security token?”
BCP is one of the components of the Business Continuity Management (BCM) Program which should be implemented in organizations of all sizes. The implementation of a BCM Program could be a rather complex and lengthy process, which largely depends on the organization’s size. Reading Time: 6 minutes. Regardless of the industry (e.g.
To build an Adaptive, Resilient Enterprise , organizations must move beyond conventional Business Continuity Management (BCM) approaches. Traditional BCM is often limited to tactical response plans, perceived simply as insurance policies that rarely spark high-level executive engagement.
First, risk management is not about being Chicken Little worrying that the sky falling; it’s about being mature, practical, and proactive in actively managing down risk to make the organization and its stakeholders more secure. Sometimes the potential consequences of a given risk are too small to worry about.)
Last Updated on June 15, 2020 by Alex Jankovic Reading Time: 5 minutes In our previous articles , we outlined the reasons why the Business Continuity Management (BCM) Program is essential to your organization. A significant security breach happens almost daily somewhere in the world. It’s happening everywhere! IT is (always) busy!
In our previous articles , we outlined the reasons why the Business Continuity Management (BCM) Program is essential to your organization. The conclusion is that IT is too reluctant to engage in BCM activities, very slow to react and deliver, and typically a cause of delayed business continuity planning engagements.
This is so whether the company is applying some combination of the four main risk mitigation strategies (risk acceptance, risk avoidance, risk reduction, and risk transfer) or implementing such specific measures as installing a backup power generator or requiring the use of secure VPNs. This is all to the good.
Work from home can also bring issues with data confidentiality and workers’ personal security. But this equipment is often rendered useless by such problems as a lack of power, lack of user experience with a generic device lacking their personal customizations, or missing security patches. (A Office work location. Evacuation.
Related on BCMMETRICS: Don’t Give Up the Ship: Demonstrating the Benefits of Rigorous Crisis Management Training Benefits That Go Beyond BC The main purpose of a business continuity management (BCM) program is to help an organization get through disruptions with the least possible impact to its operations, reputation, stakeholders, and bottom line.
By making such small corrections as making sure everyone is using the right security controls and installing backup power sources in key buildings, you minimize the potential of ever having to activate your plans. How to Implement Vulnerability Management How does an organization “do” vulnerability management?
One function that is frequently performed by third parties is physical security. There are some physical security outfits I wouldn’t trust to look after my dog, much less my company.) Economies of scale often make this a better choice than using an internal solution. Just make sure the company you hire is worthy of your confidence.
On the other hand, if we hadn’t run those risks, we wouldn’t be anywhere near as successful and secure as we are today. Reduce your technology risks by eliminating single points of failure, creating a secure environment, using best-in-class solutions, and working with best-in-class vendors.
At the funnel’s narrow end, representatives from departments such as business continuity, security, facilities, operations, manufacturing, and finance analyze and sift the information received. Geological Survey Earthquake Hazards Program, and Department of Homeland Security. Reliable news-gathering organizations. Human tipsters.
This is particularly relevant in those organisations where just one or two individuals currently carry the key responsibility for information security. Business Continuity Management (BCM). Using the information gained from the first two stages, an overarching BCM strategy is then produced. DisasterRecovery (DR).
DisasterRecovery : taking a strategic approach to managing staff in the event of a successful attack, minimising damage to brand reputation and safeguarding the interests of key stakeholders; 3. To receive regular blogs on topics relating to information security, follow us on Linkedin. To find out more visit our website.
Specifically, it should have policies and procedures covering the five key areas of data retention, data access, device security, people security, and social media. Device Security Another area for which organizations should develop risk governance policies is device security. Let’s look at them one by one.
Some parts of the business or handling of security-sensitive information just can't be done safely at our homes. Security Considerations – data and access security were always a challenge. The BCP planning efforts will require additional points of collaboration with the IT Security initiatives. BCM as a Service.
Look for knowledgeable, effective people from the corporate security, business continuity, human resources, and communications departments, among others. OSHA , FEMA , and the Department of Homeland Security all have excellent resources to help with writing an emergency response plan. Communicate, train on, and test the plan.
In today’s blog, we’ll look at those risks from the point of view of a business consultant who specializes in technology and IT disasterrecovery. Data security. Data security poses a major challenge as AI tools make it harder to maintain confidentiality, exposing organizations to reputational and legal consequences.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content