This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
There is currently intense interest in the possible use of artificial intelligence (AI) in the management of disasters. To what extent is this a real prospect or, alternatively, the fascination of the shiny new toy that soon will be discarded? To begin with, there are two major arguments against artificial intelligence in its current form. One should note in passing that it is not a new concept but one that has only recently begun to impinge seriously on popular consciousness.
Disaster Recovery Institute (DRI) International, the leading nonprofit in business continuity and resilience education and certification has published its Tenth Annual Global Risk and Resilience Trends Report. The report provides an independent analysis of current and emerging risks as viewed by those directly involved in resilience management. Supported by the DRI Future Vision Committee (FVC), […] The post DRI International Releases 10th Annual Global Risk and Resilience Trends Report ap
The Crucial Role of Data Forensics in Post-cyberattack Recovery by Pure Storage Blog Summary After a cyberattack, data forensics plays an important part in not only enabling you to dig deeper into what happened but also helping prevent being attacked again. Imagine coming home to find someone has broken into your house. Your first reaction is to make sure its safe to go inside.
As the cyber threat landscape grows more complex, organizations are realizing that data protection and confidence in cyber recovery solutions are critical for surviving an attack. Most data protection solutions were not designed with cyber recovery as their primary focus. A recent IDC white paper, sponsored by Zerto, a Hewlett Packard Enterprise company The State of Disaster Recovery and Cyber Recovery, 20242025: Factoring in AI reveals that organizations often pay ransoms not because backups ar
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
From the Miami Herald: FEMA to Florida cities hit by hurricanes: Rebuild higher or lose your flood insuran ce. “FEMA announced that starting next year, Fort Myers Beach residents will no longer get a 25% discount on their flood insurance — an average increase of about $300 per resident— because FEMA found that rebuilding efforts from previous storms weren’t good enough.
And how to become resilient with ISO 27001 and ISO 22301 Unfortunately, even the most secure organisation can suffer an incident. The odds are simply stacked against you: While you need to protect all your assets from all types of threat, an attacker needs only one exploitable weakness to get into your systems. Plus, any security measure you implement is only designed to stop, at most, a handful of threats and thats assuming it was both correctly implemented and still doing its job.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
And how to become resilient with ISO 27001 and ISO 22301 Unfortunately, even the most secure organisation can suffer an incident. The odds are simply stacked against you: While you need to protect all your assets from all types of threat, an attacker needs only one exploitable weakness to get into your systems. Plus, any security measure you implement is only designed to stop, at most, a handful of threats and thats assuming it was both correctly implemented and still doing its job.
Jason Crawforth is the CEO of SWEAR. Weve lived it. Weve experienced it firsthand. Artificial intelligence (AI) has had a big impact on the video surveillance and security sectors over the past year automating tasks such as threat detection, object recognition and predictive analytics with better accuracy than ever. These advancements have been essential tools to help empower security teams.
Each year, the DRI International Awards of Excellence program honors the leaders and innovators in the fields of continuity management, technology recovery, and crisis and risk management. Were pleased to announce this year’s finalists! Consultant of the Year Javed Abbasi, MBCP – GISBA Quinn Einck, CBCP – BDO Lisa Jones, MBCP – Control Risks Newcomer […] The post Announcing the 2025 DRI Awards of Excellence Finalists!
Why Storage Is the Unsung Hero for AI by Pure Storage Blog Summary Storage is the backbone of AI, but as model complexity and data intensity increase, traditional storage systems cant keep pace. Agile, high-performance storage platforms are critical to support AIs unique and evolving demands. In the race toward artificial general intelligence (AGI), storage technology is setting the pace.
Zerto, a Hewlett Packard Enterprise company, has officially launched Zerto Disaster Recovery for Amazon Web Services (AWS) in AWS Marketplace! This game-changing solution simplifies disaster recovery with a software-only approach, optimized for native AWS services. Why Choose Zerto for AWS? Zerto’s reputation as an industry leader speaks for itself, offering fast Recovery Point Objectives (RPOs) and Recovery Time Objectives (RTOs) at scale.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
Event-driven automation is a powerful approach to managing enterprise IT environments, allowing systems to automatically react to enterprise events (Observability / Monitoring / Security / Social / Machine) and reducing or removing the need for manual intervention. This post discusses 11 common automation tasks that are ideal for enterprise DevOps teams looking to enhance operational efficiency, reduce downtime, and ensure business continuity.
The fast-paced business landscape provides a myriad of challenges to small businesses that can threaten their very existence. These challenges can come from any direction — natural disasters, cybersecurity breaches , supply chain disruptions, or even surprises in the economy both large and small that stop operations and hurt revenue. That is actually why it is crucial to possess a Business Continuity Plan (BCP).
Top security industry takeaways from House Homeland Security Committee Hearing Safeguarding the Homeland From Unmanned Aerial Systems On Dec. 10, 2024, the House Homeland Security Committee held a joint hearing by the Subcommittee on Counterterrorism, Law Enforcement, and Intelligence and Subcommittee on Transportation and Maritime Security entitled Safeguarding the Homeland from Unmanned Aerial Systems.
Webinar: The RMM Roadmap to Clarity & Confidence Duration: 50 Minutes What if you could eliminate uncertainty in your role and confidently connect your work to leadership priorities? In this engaging webinar, join Alyssa Pries, Customer Advocate at LogicManager, and Steven Minsky, Founder & CEO of LogicManager, as they guide you through the Risk Maturity Model (RMM) framework.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
What Is Cyber Extortion? Tips for Securing Your Data by Pure Storage Blog Summary Cyber extortion is a type of cybercrime thats surging. While these types of attacks can have dire and expensive consequences, taking preventative measures can help you reduce risk and safeguard your digital assets. Cyber extortion is a malicious practice where attackers threaten individuals or organizations with digital harmsuch as data breaches, denial of service attacks, or exposure of sensitive informationunless
IT management abounds with best practice frameworks. These frameworks offer philosophies and tangible paths forward to improve cost and resource management, measure risk, speed up customer service, and innovate analysis through predictive methods. COBIT is one such best practice framework, but its scope is unique from most frameworks in that it focuses narrowly on security, risk management, and governance.
Achieving and maintaining FedRAMP compliance involves managing hundreds of security controls, extensive documentation, and continuous monitoring requirements. Governance, Risk, and Compliance (GRC) software has become an essential tool for organizations navigating this complex landscape. Let’s explore how the right GRC solution can streamline your FedRAMP compliance journey.
In today’s volatile world, businesses face an ever-evolving landscape of risks, from cyberattacks and supply chain disruptions to natural disasters. A recent PWC survey highlights a stark reality: many organizations have recently experienced disruptions, emphasizing the need for a robust business continuity plan. Think of annual business continuity resolutions as a strategic health check for … The post Elevating Your Business Continuity Posture: 2025 Business Continuity Resolutions a
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
Druva’s Yogesh Badwe offers insights data security best practices to safeguard data against cyber threats. This article originally appeared on Solutions Review’s Insight Jam , an enterprise IT community enabling the human conversation on AI. Ransomware attack TTPs are evolving, and backup data has become a key target. According to Sophos, a staggering 94 percent of organizations have been hit by attacks that specifically target their backup systems.
In todays bulletin, Charlie discusses backups and looks at some reasons why hackers may be able to access your backups. As many of the readers of this bulletin will know, PlanB Consulting, has recently been bought by Databarracks. The company has four main services: business resilience services (the PlanB bit), disaster recovery as a service, public cloud, and backup as a service.
Assessing Ransomware Risk with the Pure Storage Security Assessment by Pure Storage Blog Summary The Pure Storage Security Assessment is a comprehensive evaluation tool that helps organizations identify and address vulnerabilities in their storage environment and offers actionable steps to help them reduce exposure to threats. Ransomware is rapidly becoming one of the most pervasive and costly cyber threats facing businesses today.
In December 2024 a prominent CEO was shot and killed outside of a Manhattan hotel where they were attending an investor meeting. The incident has drawn significant public attention, with speculation surrounding both the suspect’s motives and the broader implications for corporate security, given ongoing controversies and protests against the company at the time of the attack.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
Seven years ago, I sat before a panel in downtown Seattle, Washington, interviewing for an assistant project manager role. After almost eight years in the guard force arena, I was eager for a new opportunity, but I paused when asked my now-favorite interview question: How do you express confidence before you have competence? Joe Searle serves as projects team manager, managed services at ZBeta.
As businesses face an increasingly unpredictable global environment, the importance of robust and adaptive Business Continuity Plans (BCPs) has become more pronounced. The past few years have demonstrated that preparedness is critical to survival and success, from cyberattacks and natural disasters to global pandemics and supply chain disruptions. As the new year approaches, organizations must … The post New Year, New Resilience: Refreshing Your Business Continuity Program for the New Year
If you think hackers are only targeting Fortune 500 companies, think again. Thanks to artificial intelligence, cybercriminals now have the power to scale their attacks like never before – and small business owners are at the top of their hit list. Why? Because cybercriminals know you dont have the resources of a big corporation but still have valuable data they can exploit.
Continuity Plans should ensure that critical services remain available to customers under adverse conditions. While the threats that cause disruptions may vary—natural disasters, cyber breaches, supply chain failures—the goal of a Continuity Plan is not to control every threat, but rather to maintain or quickly restore critical services that can impact the organization’s reputation.
Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.
Why Paying the Ransom Should Be Your Last Option by Pure Storage Blog Summary While paying the ransom might seem like the quickest path to recovery after a ransomware attack, its not. Restoring from secure backups, using decryption tools, and engaging cybersecurity experts can help you recover without funding cybercriminals. Imagine waking up to find your companys entire digital world locked away behind an ominous message demanding payment.
Achieving FedRAMP authorization requires careful planning, comprehensive security implementation, and ongoing commitment to compliance. Whether you’re new to FedRAMP or an experienced professional looking to optimize your approach, this guide walks through the key steps and requirements for successfully navigating the FedRAMP authorization process.
By Debbie OBrien, Chief Communications Officer and Vice President of Global Social Impact at PagerDuty In today’s digitally-connected world, IT outages can be inconvenient at best and extremely challenging at worst. Whether its tomorrow or one year from now, IT outages are no longer a matter of “if” but “when.” Technology infrastructure continues to grow increasingly complex as new applications and services are built on top of old ones, resulting in numerous interde
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content