article thumbnail

How Much Damage Do You Want to Incur From a Major Business Interruption?

Bernstein Crisis Management

Whether it’s an incident affecting a single location, or a pandemic sweeping the globe, business continuity is increasingly vulnerable to a wide variety of natural and man-made interruptions for which organizations must plan as carefully as they plan for launching any product or service.

Pandemic 130
article thumbnail

Weathering the Storm: Tips for Coping with a Disrupted Climate

MHA Consulting

And formerly tranquil areas are increasingly vulnerable to extreme weather events. In this environment, prudent business continuity professionals will want to make sure their organizations are reassessing their weather-related risks and preparing accordingly.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Every BC Professional Should Become a Gap Hunter

MHA Consulting

Business continuity professionals who want to make their organizations more resilient should make a conscious effort to become gap hunters. I agree—and in today’s blog I’m going to build on Michael’s post by laying out some of the common vulnerabilities I often see in working with clients of ours.

article thumbnail

BCPcast Episode 3 - We're All Human, We're All Vulnerable

The Business Continuity Podcast

In episode 3 of the BCPcast, we take a look at a comparatively new source of risk that has landed in the lap of many already-overworked continuity professionals: cyber. In episode 3 of the BCPcast, we take a look at a comparatively new source of risk that has landed in the lap of many already-overworked continuity professionals: cyber.

article thumbnail

These 8 Risk Domains Are the Meat and Potatoes of Risk Management 

MHA Consulting

In today’s post, we’ll lay out what these domains are, reveal which ones tend to get overlooked, and explain how knowing about the domains can help business continuity professionals reduce their organizations’ risks and bolster their resilience.

article thumbnail

Cybersecurity Leadership: The Complete Guide to Building and Leading an Effective Security Team

Pure Storage

Read on to learn the key qualities of successful cybersecurity leaders, how to build and retain a strong security team, strategies for fostering continuous professional growth, and methods to create a culture of security within your organization. The breach was partly due to a failure to apply known patches for a vulnerability.

article thumbnail

Who’s the Boss? Successful Risk Mitigation Requires Centralized Leadership

MHA Consulting

Try a Dose of Risk Management As a business continuity professional, I tip my hat to any organization that makes a serious effort to reduce its risks. A haphazard approach to bolstering tech security can leave a host of vulnerabilities. Related on MHA Consulting: Global Turmoil Making You Ill? I wish it were true.