Thu.Jul 20, 2023

article thumbnail

Frequently Asked Questions: Differences between BCLE AUD ISO 22301 and BCLE AUD NFPA 1600 audit courses

DRI Drive

DRI’s audit courses describe and explain the requirements in the identified international standard. Core competencies – including risk assessment, business impact analysis, continuity strategies, and crisis communications – are addressed in similar ways within both courses. Content specific to NFPA 1600 (such as emergency management, employee assistance and support, and crisis management) is not included, […] The post Frequently Asked Questions: Differences between BCLE AUD ISO 22301 and B

Audit 195
article thumbnail

Disk Is Done When It Comes to Backups

Pure Storage

Disk Is Done When It Comes to Backups by Pure Storage Blog Using all-flash storage for backups is a subject I first wrote about 10 years ago in a blog post published on Computerworld. Back in 2013, it was an unprecedented idea, but using my crystal ball, I predicted the following: The way I see it, a few years from now it will be common to use flash arrays as backup targets, and probably a few years after that we’ll all wonder how we ever used anything else.

Backup 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Audit Is NOT a Four-Letter Word

DRI Drive

By Donald L. Schmidt, CBCLA When you hear about an upcoming audit, do you get that dreaded feeling that someone’s going to be looking for problems, questioning your judgement, or wasting your time? Maybe all three. I’ve worked in corporate environments and have had to overcome that impression and some resistance. As a consultant, engaged […] The post Audit Is NOT a Four-Letter Word appeared first on DRI Drive.

Audit 195
article thumbnail

Zerto Now Available on HPE GreenLake Cloud Platform

Zerto

HPE GreenLake for Disaster Recovery Is Generally Available Experience Zerto wherever and however you want! Traditionally, Zerto has been available on-premises, in the public cloud, or with an MSP (managed service provider). Now customers can also experience Zerto as a simple, flexible SaaS-based disaster recovery (DR) solution on HPE GreenLake, the edge-to-cloud platform.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

Risk Governance: To Stay Safe,  Write Policies Addressing These Five Areas 

MHA Consulting

Whether the company you work for has five employees or 5,000, it should have a risk governance program. Specifically, it should have policies and procedures covering the five key areas of data retention, data access, device security, people security, and social media. Related on MHA Consulting: How GRC Can Help You Gain Real Control Risk Governance Is for Everyone Every organization, regardless of size or industry, should implement a risk governance program to reduce the chances of its being imp

More Trending

article thumbnail

The M365 bundling and pricing blueprint for MSP success: A must-see webinar

Acronis

For service providers, securing M365 environments isn’t just a great opportunity for new revenue streams: it’s a necessity to keep clients safe. MSPs have a unique opportunity to build scalable, layered offerings that their clients want — here's how to get started.

article thumbnail

ChatGPT Is Creating New Risks for National Security

The Rand Blog

Large language models like ChatGPT and Claude offer a wide range of beneficial applications. But there are significant risks associated with their use that demand a coordinated effort among partner nations to forge a solid, integrated defense against the threat of malign information operations.

article thumbnail

Data protection and security in the manufacturing industry

Acronis

Today, the high cost of downtime and a growing array of cyberthreats are pushing manufacturing leaders to focus on cyber defense and rapid restoral from a variety of sources. Understanding and implementing effective data protection and security safeguards can give them a significant advantage.

article thumbnail

Why We Love Working at Pure Storage

Pure Storage

Why We Love Working at Pure Storage by Pure Storage Blog This is a special time for us at Pure Storage. We were just named a Great Place to Work for Millennials ™ in 2023 and a Best Workplace in the Bay Area TM for 2023. What’s behind these accolades? Our people. When I first joined Pure, I immediately knew I’d found a “hidden gem.” And if you ask anyone at Pure, they’ll tell you the same.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Thinking Through Your Next Crisis Now

BryghtPath

Its Friday afternoon when the phone rings. Something truly bad has happened – something that could change the face of your company. What to do next? Breathe deep and think through these steps: Gather the essential information. Gather all of the essential information. Not everything will be available right away, but more information will come … The post Thinking Through Your Next Crisis Now appeared first on Bryghtpath.

article thumbnail

How to Build an Open Data Lakehouse with Spark, Delta, and Trino on S3

Pure Storage

How to Build an Open Data Lakehouse with Spark, Delta, and Trino on S3 by Pure Storage Blog This article on how to build an open data lakehouse was originally published on Medium. the blog has been republished with the author’s credit and consent. Data lakes represent the first step towards gaining insights from ever-growing data. In many cases, it is the first place collected data lands in the data system.

Travel 52
article thumbnail

Managing Extreme Heat Events

everbridge

A Q&A with Brian Toolan , Everbridge VP Global Public Safety Talk about the trend in heat events that are impacting state and local governments. Each year, we witness the challenges cities and towns face due to extreme heat. Some of the biggest areas of concern are the places that haven’t experienced such extreme heat in the past or for prolonged periods of time.

article thumbnail

How to Create Scalable and Reliable Kubernetes Logging

Pure Storage

How to Create Scalable and Reliable Kubernetes Logging by Pure Storage Blog This article on creating scalable and reliable Kubernetes logging originally appeared on Medium. This blog has been replublished with the author’s credit and consent. Building a basic logging solution for Kubernetes could be as easy as running a couple of commands. However, to support large-scale Kubernetes clusters, the logging solution itself needs to be scalable and reliable.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

SIA New Member Profile: KoreLock, Inc.

Security Industry Association

New Security Industry Association (SIA) member KoreLock, Inc. , provides turnkey smart lock technology, with its IoT Smart Lock platform including embedded firmware, ready-made or custom printed circuit boards, cloud infrastructure, mobile and web apps and access control software integration. The company is headquartered in Denver, Colorado, and serves lock manufacturers, lock brands, integrators, software companies and access control providers worldwide.

article thumbnail

Microsoft Fabric: An End to End Implementation

Advancing Analytics

This blog will walk you through the entire data lifecycle of ingesting data from SharePoint and Azure Blob Storage, through the lakehouse pattern, and finally to the reporting stage - all using Microsoft Fabric. As we’re well into summer now, festivals can be a great way of spending time with friends and family. But all too often, we each want to see various acts and activities.

article thumbnail

Gartner Market Guide: Embedding Automation Into the Enterprise by Joseph Mandros

PagerDuty

“Existing workload automation strategies are unable to cope with the expansion in complexity of workload types, volumes and locations driven by evolving business demand, as per Gartner. Digital business is slowed without collaboration and automation inside and outside of IT, leading to siloes of capabilities across business and IT teams.Cost optimization is an evolving challenge, driven by technical debt and requirements to demonstrate business value of investments.