October, 2024

article thumbnail

Executive Leadership on Security and Risk Management

Disaster Zone Podcast

Increasing risks and increasing technology are the topics in this podcast. How to manage technology and risks that extend from the cyber perspective all the way to corporate leadership and climate change. This is one of the most engaging conversations that the Disaster Zone Podcast has had with a true subject matter expert. Leaders in business and government should listen to this podcast.

article thumbnail

How Pure Protect //DRaaS Shields Your Business from Natural Disasters 

Pure Storage

How Pure Protect //DRaaS Shields Your Business from Natural Disasters by Pure Storage Blog Summary Pure Protect //DRaaS shields your business from the rising threat of natural disasters. This cloud-based solution ensures data security, minimizes downtime, and enables rapid recovery, keeping your operations resilient against hurricanes, wildfires, and other unexpected events.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Considerations for Disaster Recovery – Part 2: Compute

Zerto

Disasters are unpredictable, but your response to them shouldn’t be. A well-thought-out disaster recovery (DR) plan is your best defense against unexpected disruptions. At the heart of any effective DR strategy is your compute solution. Today, I’ll walk you through the critical compute considerations for disaster recovery, focusing on performance, freedom of choice over technology, sizing, and support.

article thumbnail

Data Resilience: The Key to AI and Cybersecurity

Solutions Review

Veeam’s Rick Vanover offers insights on data resilience and the key to AI and cybersecurity. This article originally appeared on Solutions Review’s Insight Jam , an enterprise IT community enabling the human conversation on AI. The current conversations in the technology landscape are being driven by coverage of two topics: AI and cybersecurity.

article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

Predictive Analytics: A Proactive Security Solution

Security Industry Association

Daniel Reichman, Ph.D., is the CEO and chief scientist at Ai-RGUS and a member of the SIA AI Advisory Board. The physical security industry is being transformed by moving from being reactive to proactive , thanks to the integration of artificial intelligence (AI) and predictive analytics. The introduction of AI is making surveillance systems smarter, more efficient and prognostic.

More Trending

article thumbnail

Avoiding a Home Buying Disaster

Disaster Zone Podcast

The purchase of a home is likely the biggest investment that individuals and families will ever make during their lifetimes. In this podcast we discuss navigating the potential risks of a disaster impacting the property you might purchase and how to avoid making a home buying disaster. The podcast guest is Michael Crute who is an operational strategist turned Realtor® with a wealth of experience serving prestigious clientele within the NIH, Harvard, Department of Defense, and more.

Marketing 130
article thumbnail

Pure//Launch Blog October Edition

Pure Storage

Pure//Launch Blog October Edition by Pure Storage Blog Summary We’ve been hard at work making enhancements to the Pure Storage platform to augment data protection, help you get more out of your Kubernetes environment, triage issues faster, and more. We’re never finished innovating here at Pure Storage. That’s because we know that our customers’ needs are changing all the time.

article thumbnail

Considerations for Disaster Recovery – Part 1: Storage

Zerto

One common question that comes up in all disaster recovery planning is, “What type of storage should be used for disaster recovery?” This is not a simple question to answer as there are many considerations, not the least of which is the cost of the storage. Here I am going to outline the primary factors I’d consider when choosing storage for disaster recovery. 3 Primary Factors for Choosing Disaster Recovery Storage Storage Size / Capacity It is important to consider how much storage will be nee

article thumbnail

Carsten Fischer: The Need for Speed in Threat Mitigation

FS-ISAC

The Need for Speed in Threat Mitigation There used to be weeks between the announcement of a zero-day vulnerability and the next exploit. Now we have days or hours to patch the vulnerability, says Carsten Fischer, Deputy Chief Security Officer at Deutsche Bank. Sometimes threat actors are in the machine even as the patch is being tested. With such a small window of reaction time, mitigation must be faster.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

The Future of Remote Video Monitoring: Automation Powered by Artificial Intelligence

Security Industry Association

Steve Reinharz is president of Robotic Assistance Devices and a member of the SIA Board of Directors. The remote video monitoring industry has experienced significant growth in recent years, driven by the increasing demand for security solutions among businesses and homeowners; however, as the industry expands, it faces important challenges, particularly the reliance on human operators to manage alerts and monitor video feeds.

Alert 96
article thumbnail

Falsehoods Can Disrupt Recovery Efforts

Recovery Diva

From the NYTimes: Bizarre Falsehoods About Hurricanes Helene and Milton Disrupt Recovery Efforts. Experts warn that weather-related disinformation can rapidly escalate into real-world risks and distract from aid. An excerpt: “Online climate-related conspiracy theories can quickly cause damage offline, disrupting emergency communications and recovery efforts.

article thumbnail

FEMA Responds to Hurricane Helene and Milton - Guest Pete Gaynor

Disaster Zone Podcast

In this podcast Pete Gaynor, the immediate past Federal Emergency Management Agency (FEMA) Administrator and Acting Secretary of Homeland Security shares what he knows about how the national disaster response system functions. The roles and responsibilities of local, state and the federal government. We also dive into some of the malicious lies being told about FEMA’s response to Hurricane Helene and Milton.

article thumbnail

VMware Then and Now: How Virtualization Is Evolving

Pure Storage

VMware Then and Now: How Virtualization Is Evolving by Pure Storage Blog Summary The virtualization world is undergoing some changes. To navigate an uncertain future successfully and make the most of their virtualized environments, organizations will need dynamic platforms that can address these challenges and pain points. Remember when “the cloud” was little more than an abstract concept involving “ remote job entry ” by a software company called General Magic ?

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Change Healthcare’s 2024 Data Breach: Key Risk Management Lessons

LogisManager

Change Healthcare’s 2024 Data Breach: Key Risk Management Lessons Last Updated: October 17, 2024 In 2024, Change Healthcare faced a significant data breach that rippled across the healthcare industry, highlighting how risks are interconnected and can spread beyond their point of origin. This incident illustrates a vital lesson in risk management: negligence, whether internal or stemming from third parties, can have wide-reaching consequences if not proactively managed.

article thumbnail

AI Integration: A Strategic Asset for Chief Risk Officers

Solutions Review

Diligent’s Brian Stafford offers insights on AI integration and why it is a strategic asset for chief risk officers. This article originally appeared on Solutions Review’s Insight Jam , an enterprise IT community enabling the human conversation on AI. Today’s businesses face an increasingly complex risk landscape due to fluctuating market conditions, regulatory and compliance requirements, geopolitical risks, high federal interest rates, the list goes on.

article thumbnail

SIA Leads Letter to Congress Urging Protection of Security Devices Under Spectrum Proposal

Security Industry Association

On Oct. 29, 2024, the Security Industry Association (SIA) sent a letter signed by 92 security businesses and organizations conveying a strong, industrywide message to Capitol Hill urging members of Congress to weigh in with the Federal Communications Commission (FCC) on a proposal that would restructure the Lower 900 MHz frequency. As explained in a recent SIA post on the issue, the proposed licensing and rulemaking would affect alarm, electronic access and security camera technologies, among ot

Security 106
article thumbnail

Former FEMA Administrator Calls for Reform

Recovery Diva

From The Hill: Why America Needs Disaster Reform Now. Author is Brock Long. Some excerpts: “As FEMA administrator beginning in 2017, I witnessed the agency stretched thin by one crisis after another — a pattern that has only intensified since I left office five years ago. Today, FEMA is managing more than 100 active disaster recovery efforts nationwide and that does not account for the other crises they have been called to support other federal agencies with, like the COVID-19 pandemic and

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

October Wrap-Up: Product Updates Across the PagerDuty Operations Cloud by Joseph Mandros

PagerDuty

At PagerDuty, we’re committed to delivering powerful updates that help you respond faster, work smarter, and deliver seamless customer experiences. As a fast follow to our recent launch , this quarter’s wrap-up blog highlights our latest product innovations and upcoming features—all designed to enhance your operational resilience and drive meaningful business outcomes by reducing risk and strengthening your ability to adapt and respond effectively.

article thumbnail

Let’s Read between the Lines with Vendor DRR Guarantees

Pure Storage

Let’s Read between the Lines with Vendor DRR Guarantees by Pure Storage Blog Summary While DRR guarantees may seem like a good deal, it’s important to look closer and test a vendor’s storage efficiency technologies against your actual applications, data, and workflows. Flash allowed storage efficiency technologies like compression, deduplication, and others to be used in enterprise application environments with minimal to no performance impact and significantly improved TB/watt efficiency.

article thumbnail

Case Study: Transforming LogicManager

LogisManager

Case Study: Transforming LogicManager How LogicManager Improved Our Risk Management Practices from the Inside Out Last Updated: October 16, 2024 Every organization faces the challenge of balancing efficiency and risk management. We adopted LogicManager (LM) to enhance our performance and risk management practices. This case study details how LM has become an essential tool, empowering us to prioritize resources, boost collaboration, and achieve our strategic goals.

article thumbnail

AI’s Double-Edged Sword: The Threat and Promise of Artificial Intelligence in Cybersecurity

Zerto

Artificial Intelligence (AI) has rapidly evolved from a futuristic concept to an integral part of our daily lives. From automating mundane tasks to making complex predictions, AI holds immense potential. However, like any powerful tool, AI is a double-edged sword. On one side, it offers remarkable capabilities to enhance cybersecurity and protect against cyberthreats.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

A Solution for the Retail Theft Crisis

Security Industry Association

Facial recognition enhances security, loss prevention Dan Merkle is board chairman and CEO at FaceFirst. Facial recognition technology is not emerging. It’s here. Millions of people already use artificial intelligence (AI)-driven facial recognition technology every day in the United States and around the world. Individuals from every demographic unlock their phones with their faces – instantly – multiple times per day.

Retail 59
article thumbnail

Serious Deficiencies with the National Flood Insurance Program

Recovery Diva

From the WashPost: Thousands of uninsured homes were in Helene’s path. The United States’ crumbling flood insurance system faces a new test after Hurricane Helene. “On average, just a tiny fraction of households in the inland counties hit hardest by Hurricane Helene and its remnants had flood insurance, according to a Washington Post analysis of recent data from the National Flood Insurance Program.

Insurance 189
article thumbnail

Navigating Uncertainty: A Deep Dive Into Crisis Management for Aerospace

BryghtPath

Explore the critical elements of crisis management within the aerospace industry. From understanding potential risks to building a comprehensive response plan, this article explores effective strategies to mitigate the impact of a crisis. Discover the importance of transparency, communication, and technology, along with real-world examples of successful crisis management in the aerospace sector.

article thumbnail

Avoid Tricks and Treat Yourself to Energy-efficient Storage

Pure Storage

Avoid Tricks and Treat Yourself to Energy-efficient Storage by Pure Storage Blog Summary While a storage system may appear to be an energy-efficient solution in a benchmark, the actual performance may differ when it’s scaled to meet the specific needs of a business. A more comprehensive approach that looks at right-sizing the solution for performance, energy efficiency, space optimization, and long-term reliability is needed.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Understanding DORA Secondary Providers

Fusion Risk Management

In today’s increasingly digital financial landscape, the resilience of operational systems is crucial. The Digital Operational Resilience Act (DORA) aims to enhance the operational integrity of financial institutions and protect against disruptions that could threaten financial stability. While DORA primarily regulates entities within the financial sector, it acknowledges the critical role played by secondary providers in supporting the objectives of DORA.

article thumbnail

MI5 Director General Ken McCallum Threat Update – What it Means to Us

Plan B Consulting

In this week’s bulletin, Charlie discusses the impact of the role of nation-states in cyber attacks and looks at some of the attacks we have seen in the UK recently. On the 8th of October 2024, MI5 Director General Ken McCallum gave a speech on the threats to the UK, covering the counter-terrorism threat and state threats from Russia, Iran, and China.

article thumbnail

Four School Safety and Security Sessions to Attend at ISC East

Security Industry Association

ISC East 2024 is coming up Nov. 19-21 in New York City, and the Security Industry Association (SIA) and ISC East recently revealed full conference details for the SIA Education at ISC East program , including keynote presentations from top luminaries and over 70 sessions from top industry expert speakers on the most current business trends, technologies and industry developments.