This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Increasing risks and increasing technology are the topics in this podcast. How to manage technology and risks that extend from the cyber perspective all the way to corporate leadership and climate change. This is one of the most engaging conversations that the Disaster Zone Podcast has had with a true subject matter expert. Leaders in business and government should listen to this podcast.
How Pure Protect //DRaaS Shields Your Business from Natural Disasters by Pure Storage Blog Summary Pure Protect //DRaaS shields your business from the rising threat of natural disasters. This cloud-based solution ensures data security, minimizes downtime, and enables rapid recovery, keeping your operations resilient against hurricanes, wildfires, and other unexpected events.
Disasters are unpredictable, but your response to them shouldn’t be. A well-thought-out disaster recovery (DR) plan is your best defense against unexpected disruptions. At the heart of any effective DR strategy is your compute solution. Today, I’ll walk you through the critical compute considerations for disaster recovery, focusing on performance, freedom of choice over technology, sizing, and support.
Veeam’s Rick Vanover offers insights on data resilience and the key to AI and cybersecurity. This article originally appeared on Solutions Review’s Insight Jam , an enterprise IT community enabling the human conversation on AI. The current conversations in the technology landscape are being driven by coverage of two topics: AI and cybersecurity.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
Daniel Reichman, Ph.D., is the CEO and chief scientist at Ai-RGUS and a member of the SIA AI Advisory Board. The physical security industry is being transformed by moving from being reactive to proactive , thanks to the integration of artificial intelligence (AI) and predictive analytics. The introduction of AI is making surveillance systems smarter, more efficient and prognostic.
From the WashPost, this opinion piece: As hurricane seasons worsen, taxpayers subsidize people to live in risky areas. Helene and Milton spotlight a federal flood insurance program drowning in debt. “The upshot is that FEMA flood hazard maps that determine coverage today rely on outdated information so inaccurate that more than 40 percent of NFIP claims made from 2017 to 2019 were for properties outside official flood hazard zones or in areas the agency had not mapped at all.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
From the WashPost, this opinion piece: As hurricane seasons worsen, taxpayers subsidize people to live in risky areas. Helene and Milton spotlight a federal flood insurance program drowning in debt. “The upshot is that FEMA flood hazard maps that determine coverage today rely on outdated information so inaccurate that more than 40 percent of NFIP claims made from 2017 to 2019 were for properties outside official flood hazard zones or in areas the agency had not mapped at all.
The purchase of a home is likely the biggest investment that individuals and families will ever make during their lifetimes. In this podcast we discuss navigating the potential risks of a disaster impacting the property you might purchase and how to avoid making a home buying disaster. The podcast guest is Michael Crute who is an operational strategist turned Realtor® with a wealth of experience serving prestigious clientele within the NIH, Harvard, Department of Defense, and more.
Pure//Launch Blog October Edition by Pure Storage Blog Summary We’ve been hard at work making enhancements to the Pure Storage platform to augment data protection, help you get more out of your Kubernetes environment, triage issues faster, and more. We’re never finished innovating here at Pure Storage. That’s because we know that our customers’ needs are changing all the time.
One common question that comes up in all disaster recovery planning is, “What type of storage should be used for disaster recovery?” This is not a simple question to answer as there are many considerations, not the least of which is the cost of the storage. Here I am going to outline the primary factors I’d consider when choosing storage for disaster recovery. 3 Primary Factors for Choosing Disaster Recovery Storage Storage Size / Capacity It is important to consider how much storage will be nee
The Need for Speed in Threat Mitigation There used to be weeks between the announcement of a zero-day vulnerability and the next exploit. Now we have days or hours to patch the vulnerability, says Carsten Fischer, Deputy Chief Security Officer at Deutsche Bank. Sometimes threat actors are in the machine even as the patch is being tested. With such a small window of reaction time, mitigation must be faster.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
Steve Reinharz is president of Robotic Assistance Devices and a member of the SIA Board of Directors. The remote video monitoring industry has experienced significant growth in recent years, driven by the increasing demand for security solutions among businesses and homeowners; however, as the industry expands, it faces important challenges, particularly the reliance on human operators to manage alerts and monitor video feeds.
From the NYTimes: Bizarre Falsehoods About Hurricanes Helene and Milton Disrupt Recovery Efforts. Experts warn that weather-related disinformation can rapidly escalate into real-world risks and distract from aid. An excerpt: “Online climate-related conspiracy theories can quickly cause damage offline, disrupting emergency communications and recovery efforts.
In this podcast Pete Gaynor, the immediate past Federal Emergency Management Agency (FEMA) Administrator and Acting Secretary of Homeland Security shares what he knows about how the national disaster response system functions. The roles and responsibilities of local, state and the federal government. We also dive into some of the malicious lies being told about FEMA’s response to Hurricane Helene and Milton.
VMware Then and Now: How Virtualization Is Evolving by Pure Storage Blog Summary The virtualization world is undergoing some changes. To navigate an uncertain future successfully and make the most of their virtualized environments, organizations will need dynamic platforms that can address these challenges and pain points. Remember when “the cloud” was little more than an abstract concept involving “ remote job entry ” by a software company called General Magic ?
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
Change Healthcare’s 2024 Data Breach: Key Risk Management Lessons Last Updated: October 17, 2024 In 2024, Change Healthcare faced a significant data breach that rippled across the healthcare industry, highlighting how risks are interconnected and can spread beyond their point of origin. This incident illustrates a vital lesson in risk management: negligence, whether internal or stemming from third parties, can have wide-reaching consequences if not proactively managed.
Diligent’s Brian Stafford offers insights on AI integration and why it is a strategic asset for chief risk officers. This article originally appeared on Solutions Review’s Insight Jam , an enterprise IT community enabling the human conversation on AI. Today’s businesses face an increasingly complex risk landscape due to fluctuating market conditions, regulatory and compliance requirements, geopolitical risks, high federal interest rates, the list goes on.
On Oct. 29, 2024, the Security Industry Association (SIA) sent a letter signed by 92 security businesses and organizations conveying a strong, industrywide message to Capitol Hill urging members of Congress to weigh in with the Federal Communications Commission (FCC) on a proposal that would restructure the Lower 900 MHz frequency. As explained in a recent SIA post on the issue, the proposed licensing and rulemaking would affect alarm, electronic access and security camera technologies, among ot
From The Hill: Why America Needs Disaster Reform Now. Author is Brock Long. Some excerpts: “As FEMA administrator beginning in 2017, I witnessed the agency stretched thin by one crisis after another — a pattern that has only intensified since I left office five years ago. Today, FEMA is managing more than 100 active disaster recovery efforts nationwide and that does not account for the other crises they have been called to support other federal agencies with, like the COVID-19 pandemic and
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
At PagerDuty, we’re committed to delivering powerful updates that help you respond faster, work smarter, and deliver seamless customer experiences. As a fast follow to our recent launch , this quarter’s wrap-up blog highlights our latest product innovations and upcoming features—all designed to enhance your operational resilience and drive meaningful business outcomes by reducing risk and strengthening your ability to adapt and respond effectively.
Let’s Read between the Lines with Vendor DRR Guarantees by Pure Storage Blog Summary While DRR guarantees may seem like a good deal, it’s important to look closer and test a vendor’s storage efficiency technologies against your actual applications, data, and workflows. Flash allowed storage efficiency technologies like compression, deduplication, and others to be used in enterprise application environments with minimal to no performance impact and significantly improved TB/watt efficiency.
Case Study: Transforming LogicManager How LogicManager Improved Our Risk Management Practices from the Inside Out Last Updated: October 16, 2024 Every organization faces the challenge of balancing efficiency and risk management. We adopted LogicManager (LM) to enhance our performance and risk management practices. This case study details how LM has become an essential tool, empowering us to prioritize resources, boost collaboration, and achieve our strategic goals.
Artificial Intelligence (AI) has rapidly evolved from a futuristic concept to an integral part of our daily lives. From automating mundane tasks to making complex predictions, AI holds immense potential. However, like any powerful tool, AI is a double-edged sword. On one side, it offers remarkable capabilities to enhance cybersecurity and protect against cyberthreats.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
Facial recognition enhances security, loss prevention Dan Merkle is board chairman and CEO at FaceFirst. Facial recognition technology is not emerging. It’s here. Millions of people already use artificial intelligence (AI)-driven facial recognition technology every day in the United States and around the world. Individuals from every demographic unlock their phones with their faces – instantly – multiple times per day.
From the WashPost: Thousands of uninsured homes were in Helene’s path. The United States’ crumbling flood insurance system faces a new test after Hurricane Helene. “On average, just a tiny fraction of households in the inland counties hit hardest by Hurricane Helene and its remnants had flood insurance, according to a Washington Post analysis of recent data from the National Flood Insurance Program.
Explore the critical elements of crisis management within the aerospace industry. From understanding potential risks to building a comprehensive response plan, this article explores effective strategies to mitigate the impact of a crisis. Discover the importance of transparency, communication, and technology, along with real-world examples of successful crisis management in the aerospace sector.
Avoid Tricks and Treat Yourself to Energy-efficient Storage by Pure Storage Blog Summary While a storage system may appear to be an energy-efficient solution in a benchmark, the actual performance may differ when it’s scaled to meet the specific needs of a business. A more comprehensive approach that looks at right-sizing the solution for performance, energy efficiency, space optimization, and long-term reliability is needed.
Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.
In today’s increasingly digital financial landscape, the resilience of operational systems is crucial. The Digital Operational Resilience Act (DORA) aims to enhance the operational integrity of financial institutions and protect against disruptions that could threaten financial stability. While DORA primarily regulates entities within the financial sector, it acknowledges the critical role played by secondary providers in supporting the objectives of DORA.
In this week’s bulletin, Charlie discusses the impact of the role of nation-states in cyber attacks and looks at some of the attacks we have seen in the UK recently. On the 8th of October 2024, MI5 Director General Ken McCallum gave a speech on the threats to the UK, covering the counter-terrorism threat and state threats from Russia, Iran, and China.
ISC East 2024 is coming up Nov. 19-21 in New York City, and the Security Industry Association (SIA) and ISC East recently revealed full conference details for the SIA Education at ISC East program , including keynote presentations from top luminaries and over 70 sessions from top industry expert speakers on the most current business trends, technologies and industry developments.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content