This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Are you confident your BCM strategies can withstand a successful cyber attack? A Wakefield Research study based on responses from 1,600 security and IT leaders worldwide found that 92% are concerned they will be unable to maintain business continuity if […].
12:07min- How does a company’s BCM program get so bad? 31:37min- Approach to integrating continuous improvement into regular BCM work. 31:37min- Approach to integrating continuous improvement into regular BCM work. Key Points. 7:31min- Starting his career because of the FFIEC. The “Peril Predicament”. The “Peril Predicament”.
The business continuity management roadmap is a simple but powerful tool that can help organizations strengthen their BCM programs and enhance their resilience. In today’s post, we’ll lay out an eight-step process your company can use to create its own, customized BCM roadmap. This is what a BCM roadmap is and does.
Knowing what roles should be represented on the business continuity management (BCM) team and what kind of people should fill them is an overlooked key to success in making organizations resilient. In today’s post we’ll look at what the slots on a BCM team should be and the traits and skillsets needed in the team’s staff and leadership.
In today’s post we’ll look at the top 10 free or almost free resources business continuity management professionals can utilize to help them raise their BCM skills and effectiveness to ninja level. However, there is one aspect of doing BCM that is much better and easier than it was when I was getting started 25 years ago.
This post is part of BCM Basics, a series of occasional, entry-level blogs on some of the key concepts in business continuity management. . Organizations today have more options than ever … The post BCM Basics: Modern IT/DR Strategies appeared first on MHA Consulting.
This post is part of BCM Basics, a series of occasional, entry-level blogs on some of the key concepts in business continuity management. . Data is a critical asset for almost … The post BCM Basics: The BC Professional’s Role in Data Protection appeared first on MHA Consulting.
Most of these have had demonstrable impacts on the practice of business continuity management (BCM), rendering some traditional practices obsolete and ushering in new concerns and techniques. It’s interesting to look at BCM practices that have fallen into disuse or are no longer regarded as beneficial or sufficient.
This post is part of BCM Basics, a series of occasional, entry-level blogs on some of the key concepts in business continuity management. This leaves users free to focus on performing their organization’s core tasks instead of spending their time sorting out software maintenance and security issues.
It typically exists alongside plans for crisis management, security response, and other areas. Common Mistake No. 4: Not figuring out and documenting the integration between the recovery plan and the organization’s other plans. The recovery plan does not live in a vacuum.
They include process and procedural robustness and integrity; people, skills, and training; insurance and self-insurance; the supply chain, outsourcing, and inherent risk; infrastructure, systems, and telecommunications; and physical and information security.
The post Data Guardians: The BCM Pro’s Role in Helping Business Units Protect Their Data appeared first on BCMMETRICS. Business continuity professionals can help their organizations raise their data protection game by acting as educators, advocates, and brokers on this issue between the business departments and IT. A Data […].
Guest Bio: John is a proven resiliency expert with 20+ years of technical experience developing, leading and maturing enterprise Business Continuity, Disaster Recovery, Crisis Management, Incident Management, and Cyber Security Response for Fortune 500 companies.
Well-chosen BCM software can help a continuity program be more nimble and effective. It is also a pretty good depiction of how business continuity management (BCM) programs need to be these days if they are to successfully protect their organizations from the unprecedented number of threats in the environment. Lifecycle parameters.
I became deeply involved in BCM ( business continuity management ) as a CIO, supporting services 24x7x365, and before that, I was vice president for a boutique risk consulting firm, where I relied on Excel or MS Access to build out plans. Since then, I have always looked to leverage a BCM solution for my employer or customers.
The best way to do this is by making sure business continuity is integrated into a robust information security governance framework. When organizations grappling with outages turn to such common recovery measures as having employees use their personal computers and phones, this frequently creates security gaps. Cyber policy.
You’ve invested countless hours and piles of capital (both monetary and political) populating your current BCM software. Or you may fear that ditching your BCM app will leave your organization vulnerable – leaving only copies of plans. If all you care about are Plans, don’t invest in BCM software – use word processing.Be
Read on to learn about the BCM year in review. It’s the best way to get a handle on the organization, its culture, what their most important business processes are, the threats they face, and the current state of their BCM program. There’s a lot to be said for ruthless efficiency when it comes to BCM. A new focus on efficiency.
Security Professionals: For dealing with physical threats to the organization or its personnel. The BCM Blogging Team The post Crisis Management Team, Assemble! This might include: IT Specialists: For handling technological crises, such as cybersecurity breaches. Finance Experts: To manage and mitigate financial risks and implications.
Episode 12: "Leveraging Your BCM Program in Cyber Security Incident Response" with Ramesh Warrier of eBRP Solutions. Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 12: "Leveraging Your BCM Program in Cyber Security Incident Response" with Ramesh Warrier of eBRP Solutions.
Business continuity management (BCM) professionals hustled to adapt their recovery strategies and plans to the new workplace model. The topic for today is, now that the hybrid model appears to be a permanent fixture, do BCM offices need to revisit their recovery strategies and plans? The answer is yes.
Comprehensive BCM (business continuity management) measures are essential for responding effectively to a disruption and providing a minimum acceptable service during a disaster. A crucial aspect of BCM is the development of an effective BCP (business continuity plan). What is a business continuity plan?
Related on MHA Consulting: Top 10 Resources to Help You Become a BCM Ninja Why the BIA Is Important The business impact analysis or BIA is one of the topics Richard Long and I write about the most here on “Roadmap to Resiliency.” BIA On-Demand is a secure, cloud-based tool for conducting a complete Business Impact Analysis.
Description: “ Facing daily risks to long-term success from a wide range of threats—cyber-attacks, human error, technical failures, and natural disasters—businesses must create practical plans to sustain their vital operations, security posture, industry reputation, and brand. ” GO TO BOOK. ” GO TO BOOK. Ransome has a Ph.D.
Unfortunately, many resilience and security teams were just not prepared to respond to challenges created by the rapid adoption of these remote teams. According to the BCM Compensation Report, only 6% of respondents anticipate that they will be 100% back in office post-pandemic. The goal here is more than just risk identification.
In the “ An Introduction to Business Continuity Planning ” article, we outlined the main components of the Business Continuity Management (BCM) Program and introduced the basics of Business Continuity Planning (BCP). These plans must address BCM Program requirements, including Emergency Management Procedures (e.g.
In the “ An Introduction to Business Continuity Planning ” article, we outlined the main components of the Business Continuity Management (BCM) Program and introduced the basics of Business Continuity Planning (BCP). . A false sense of security. Many of the organizations of this size (e.g. Many of the organizations of this size (e.g.
The post Strengthening the Chain: Four Steps to a More Secure Corporate Supply Chain appeared first on BCMMETRICS. In today’s post, we’ll lay out the four steps every company should take to protect its supply chain and boost its resilience. Most […].
First, risk management is not about being Chicken Little worrying that the sky falling; it’s about being mature, practical, and proactive in actively managing down risk to make the organization and its stakeholders more secure. Sometimes the potential consequences of a given risk are too small to worry about.)
BCP is one of the components of the Business Continuity Management (BCM) Program which should be implemented in organizations of all sizes. The implementation of a BCM Program could be a rather complex and lengthy process, which largely depends on the organization’s size. Reading Time: 6 minutes. Regardless of the industry (e.g.
Who in the company possesses a security token?” C-Suite people who are asked to participate in these meetings often become frustrated when they are asked a lot of tactical-level questions they may not know the answers to (e.g., “Who or “What systems does finance use to execute process X?”).
Work from home can also bring issues with data confidentiality and workers’ personal security. But this equipment is often rendered useless by such problems as a lack of power, lack of user experience with a generic device lacking their personal customizations, or missing security patches. (A Office work location. Evacuation.
Related on BCMMETRICS: Don’t Give Up the Ship: Demonstrating the Benefits of Rigorous Crisis Management Training Benefits That Go Beyond BC The main purpose of a business continuity management (BCM) program is to help an organization get through disruptions with the least possible impact to its operations, reputation, stakeholders, and bottom line.
This is so whether the company is applying some combination of the four main risk mitigation strategies (risk acceptance, risk avoidance, risk reduction, and risk transfer) or implementing such specific measures as installing a backup power generator or requiring the use of secure VPNs. This is all to the good.
Last Updated on June 15, 2020 by Alex Jankovic Reading Time: 5 minutes In our previous articles , we outlined the reasons why the Business Continuity Management (BCM) Program is essential to your organization. A significant security breach happens almost daily somewhere in the world. It’s happening everywhere! IT is (always) busy!
In our previous articles , we outlined the reasons why the Business Continuity Management (BCM) Program is essential to your organization. The conclusion is that IT is too reluctant to engage in BCM activities, very slow to react and deliver, and typically a cause of delayed business continuity planning engagements.
To build an Adaptive, Resilient Enterprise , organizations must move beyond conventional Business Continuity Management (BCM) approaches. Traditional BCM is often limited to tactical response plans, perceived simply as insurance policies that rarely spark high-level executive engagement.
This is particularly relevant in those organisations where just one or two individuals currently carry the key responsibility for information security. Business Continuity Management (BCM). Using the information gained from the first two stages, an overarching BCM strategy is then produced. Business Continuity Plan Checklist .
One function that is frequently performed by third parties is physical security. There are some physical security outfits I wouldn’t trust to look after my dog, much less my company.) Economies of scale often make this a better choice than using an internal solution. Just make sure the company you hire is worthy of your confidence.
By making such small corrections as making sure everyone is using the right security controls and installing backup power sources in key buildings, you minimize the potential of ever having to activate your plans. How to Implement Vulnerability Management How does an organization “do” vulnerability management?
On the other hand, if we hadn’t run those risks, we wouldn’t be anywhere near as successful and secure as we are today. Reduce your technology risks by eliminating single points of failure, creating a secure environment, using best-in-class solutions, and working with best-in-class vendors.
At the funnel’s narrow end, representatives from departments such as business continuity, security, facilities, operations, manufacturing, and finance analyze and sift the information received. Geological Survey Earthquake Hazards Program, and Department of Homeland Security. Reliable news-gathering organizations. Human tipsters.
Related on MHA Consulting: The ABCs of ERM: The Rise of Enterprise Risk Management An Exciting New Partnership A couple of weeks ago, MHA Consulting issued the announcement of its new partnership with Kroll, the global leader in enterprise risk management, executive security, and cybersecurity services.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content