This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Each year, the DRI International Awards of Excellence program honors the leaders and innovators in the fields of continuity management, technology recovery, and crisis and risk management. Were pleased to announce this year’s finalists!
New Security Industry Association (SIA) member Trinity Consulting & Design offers comprehensive consulting and design solutions for physical security and telecommunications services to both private- and public-sector clients. After my service, I landed in the designing and consulting field over 20 years ago.
Technologies are available now that can help with many facets of emergency management and business continuity programs. This is an interview with Matt Bradley, Vice President, with OnSolve a company that specializes in providing a variety technological solutions.
In this podcast we will be talking about technology in general and more specifically about data, the use of data and how we can mine it and apply it to a variety of purposes, using tools like GIS. Today Jim is a Principal Consultant at Themata Strategic LLC, a crisis management consultant agency.
New Security Industry Association (SIA) member Pinnacle Consulting & Advisors offers security and safety consulting, risk management and efficiency services. SIA spoke with Joel Kisner, CEO of Pinnacle Consulting & Advisors, about the company, the security industry and working with SIA. Tell us the story of your company.
Having just moved to consulting, her focus is now on helping organizations grow and transform by adopting improved business processes and finding new ways of working, enabled by technology investments.
CIOs as Catalysts for Change: Leading Through Technology February 21, 2025 The Chief Information Officer (CIO) role has evolved beyond IT managementits now a driving force for business transformation. Is your technology strategy evolving with business needs or reacting to them? But the demands are mounting.
Today, I’ll walk you through the critical compute considerations for disaster recovery, focusing on performance, freedom of choice over technology, sizing, and support. Key Takeaways: Interoperability is key : Choose compute solutions that support heterogeneous environments, allowing you to mix and match technologies.
New Security Industry Association (SIA) member Constant Technologies specializes in mission-critical audio/visual (A/V) integration and custom control center furniture for command center environments in the public and private sectors. HC : Constant Technologies, Inc. Tell us the story of your company.
READ TIME: 4 MIN October 11, 2023 How to Get Quick Productivity Gains Using Technology If you’ve read about digital transformation, you may have come away with the impression that it’s a comprehensive, time-intensive revisioning of business IT that should not be expected to yield productivity or performance outcomes immediately. Study 2021).
New Security Industry Association (SIA) member Secure Direction Consulting offers expert independent security consulting. I established Secure Direction Consulting in 2015 but did not dive in full time until 2017. Secure Direction Consulting started out in South Florida and relocated to Richmond, Virginia.
Qualified Technology Listing Process and Purpose TWIC readers and supporting systems are currently being evaluated and, if approved, are listed on a TWIC Self-Certification Qualified Technology List (TWIC SC QTL) that is made available to maritime facilities, vessel operators and the general public by the TSA.
An innovation borne out of this is organizations have begun using technology to conduct virtual exercises. My guest for this podcast is Kyle McPhee, Director of Preparedness for Hagerty Consulting. Topics discussed include what technology solutions work and what the benefits and challenges are for doing virtual exercises.
The Disaster Zone podcast guest is John Scardena who hosts the Disaster Tough Podcast and also heads up Doberman EMG a consulting firm specializing in supporting government emergency management programs. He talks about “failing fast” with tech. He talks about “failing fast” with tech.
In this podcast we explore how the programs he manages have adapted to being all distance learning and how going forward, education and training can be shaped by leveraging technology.
In this podcast Deanne Criswell, New York City’s Emergency Management Commissioner discusses how the city uses a variety of legacy warning systems along with new technologies to warn the public.
Our head of GRC (governance, risk and compliance) consultancy, Damian Garcia, explains. As a consultant, you have to recognise that theres little black and white youre dealing with lots of shades of grey. As a consultant, how would you address group bias? Thats also something to be on the lookout for, as a consultant.
In the light of climate change, technological risks and migration, we will soon need civil protection systems that are an order of magnitude more powerful than those that we have now. In this technological age, move from command-and-control to coordinate-and-collaborate. Society is grappling with powerful technological change.
Ninety-five percent of US small businesses use at least one technology platform , and their high-tech usage correlates with increased sales, employment, and profits. Some of the top technology issues for business owners include digital transformation, data security, cloud solutions, and compliance.
EMI is the Federal Emergency Management Agency’s (FEMA) center for the development and delivery of emergency management instructional curriculum that is delivered both in-person and remotely via technology.
This might include: IT Specialists: For handling technological crises, such as cybersecurity breaches. Monitoring: Keeping an eye out for potential crises before they escalate, using both technology and human intelligence. Finance Experts: To manage and mitigate financial risks and implications.
He is an internationally known consultant and educator focused on the human element in security, emergency management, and business continuity. He is an internationally known consultant and educator focused on the human element in security, emergency management, and business continuity.
About NexusTek Trusted by thousands of businesses, NexusTek specializes in providing IT services that include hybrid cloud, cybersecurity, data and AI, managed IT services, and IT consulting. Our comprehensive offerings provide tailored solutions that drive performance, enhance security, and foster growth.
Simon (Utilities Advisory Board Liaison), Beehive Technology Solutions Teresa Wu, IDEMIA As we close our Cybersecurity Awareness Month, our CAB team wanted to share some tips and resources for SIA members. We all take technology for granted and become complacent with utilizing the tech without blinking an eye.
Instead of having to research and find the best solution for security and data recovery, Florida businesses can instead consult with LAN Infotech. LAN Infotech advises clients on harnessing new developments in cybersecurity technology, such as next-generation firewalls and antivirus software. www.thechannelco.com. www.thechannelco.com.
For me, the benefit of having notes transcribed automatically is a game changer for incident team meetings, and I now come down on the side that we should use the technology. If Loggists arent available, then the technology can be used. There are some limitations with the technology as it is not always accurate.
Trigger: Incident/Event Plugin/Technology: Kubernetes plugin Benefit: Prevents application crashes and performance degradation by automating disk space management, improving system stability, and reducing manual intervention costs. This automation task restarts pods to ensure they connect to the most updated environment.
Here are a few examples: Cloud Service Providers : These organizations offer cloud computing technologies that enable financial institutions to store, manage, and access data remotely. As technology advances and financial operations grow more complex, regulated entities rely on these providers for compliance and operational integrity.
This episode is sponsored by two key Disaster Zone partners: The Blue Cell is a by-design crisis and consequence management consulting firm with a primary focus on education and training for government at all levels, non governmental agencies and private sector entities engaged in incident and emergency management activities.
14-16 in New York City, and the Security Industry Association (SIA) and ISC East recently revealed full conference details for the SIA Education@ISC East program , including keynote presentations from top luminaries and over 40 sessions from top industry expert speakers on the most current business trends, technologies and industry developments.
billion, and the honorees are among the top influencers impacting today’s IT industry and the global technology supply chain. About The Channel Company The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms.
This episode is sponsored by two key Disaster Zone partners: The Blue Cell is a by-design crisis and consequence management consulting firm with a primary focus on education and training for government at all levels, non governmental agencies and private sector entities engaged in incident and emergency management activities.
As Director of Solutions Consulting at PagerDuty EMEA, I recently had the pleasure of sitting down with Andy White, Chief of Staff to the CTO at Checkout.com, to discuss how they’re navigating the challenges of DORA compliance using PagerDuty’s platform.
Comprehensive IT Solutions NexusTek offers comprehensive IT solutions to support you wherever you are in your IT journey, ensuring your business is equipped with the right technology and expertise at every stage. Learn more about NexusTek’s IT Consulting Services. Learn more about NexusTek’s Managed IT Services.
Related on MHA Consulting: Single Points of Failure: Protecting Yourself from Hanging by a Thread Risk and the Entrepreneur In writing today’s blog, I’m going to switch between my consultant’s hat and my entrepreneur’s hat. By assessing your company’s risks across three areas: people, processes, and technology. Technology.
Niru Satgunananthan, a member of the SIA AI Advisory Board, is ESS business development manager and consultant at Johnson Controls. Theres no crystal ball, only calculated bets on technology, talent and where future value will emerge. Its also important to recognize that AI strategy is fundamentally about risk management.
Vulnerability management is the practice of identifying and mitigating the weaknesses in an organization’s people, processes, and technology. For us, it’s about managing weak spots across the entirety of the organization’s operations, staff, technology, and facilities. So do other consultancies.
Guest Bio: Cyril Moulin Fournier is a facilitator, consultant in management of change, keynote speaker and author. He has been working in operations and project management role for many industries (food, information and technologies) across EMEA.
New Security Industry Association (SIA) member MxV Security Solutions offers physical security consulting, solution design and online security training services. We provide solution design, based around technology, for a specific project or need. Tell us the story of your company. and abroad.
Related on MHA Consulting: Mark My Words: Commonly Confused Business Continuity Terms The Meaning of “Continuity” If you’ve been to MHA’s home page , you know what our firm is all about. As the headline on the page explains, we provide “Business continuity consulting for today’s leading companies.”
READ TIME: 4 MIN June 6, 2023 6 Signs Your Business Needs a vCIO In today’s business world, where technology and business strategy are inextricably linked, a Chief Information Officer (CIO) is an indispensable member of most large companies’ leadership teams. You think you might be paying too much for technology across multiple vendors.
Ltd are SoftwareONE Australia Pty Limited , Rezilient Technologies, and Climb Inc. In total, 39 partners worldwide achieved Silver status, and we send our congratulations to each of these successful and committed teams: F3 Technology Partners. vCORE Technology. Enterprise Vision Technologies (EVT). Rezilient Technologies.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content