article thumbnail

The Role of Emergency Management in Cybersecurity

Disaster Zone Podcast

Emergency management has traditionally been dealing with natural disasters and sometimes human caused disasters like hazardous materials. In recent years the issue of cybersecurity has become much more prominent as an issue. In recent years the issue of cybersecurity has become much more prominent as an issue.

article thumbnail

FEMA’s Latest National Preparedness Report

Recovery Diva

From HSToday: FEMAs National Preparedness Report Focuses on Mass Care, Cybersecurity, and Infrastructure Resilience The 2024 NPR addresses the work that needs to be done at all levels federal, state, local, tribal and territorial to strengthen national preparedness.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA What is it. What does it Do?

Disaster Zone Podcast

We also achieve a better understanding of the challenges that came with starting from scratch, hiring staff and supporting states and local jurisdictions on the subject areas of cybersecurity and critical infrastructure security. Pat Massey is the guest. Region 10 encompasses the states of Alaska, Idaho, Oregon and Washington.

article thumbnail

New FEMA Guidance on Cyber Incidents

Recovery Diva

Knowing whom to engage when a cyber incident occurs and having plans in place to effectively address an incident’s impacts is central to the role of emergency managers, regardless of hazard type.

Hazard 169
article thumbnail

Election Security

Disaster Zone Podcast

You will find that he is knowledgeable of the topic area and articulate in explaining all the tools used to protect the integrity of the elections system, both from a physical security and from a cybersecurity perspective.

Security 130
article thumbnail

Double trouble: When climate change and cyber crime collide

everbridge

At the same time, organizations in disaster zones may be forced to prioritize physical recovery over cybersecurity, leaving doors open for attackers to penetrate networks or systems. This is hazardous thinking. But government action alone is not enough. Think beyond single scenario planning.

Malware 52
article thumbnail

Risk Assessment vs Risk Analysis

Reciprocity

Security risk assessments are essential not just for cybersecurity but also for regulatory compliance. Various types of hazards must be considered. Information security and cybersecurity risks often bubble to the top in a world connected with technology, uut you would be remiss if you only focused on technology-related risks.