This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The latest edition of the Crisis Response Journal is now available for download from our Library! This issue looks at the cascading risks of climate change, wildfires, COVID-19 and more, and how the resilience community is responding. DRI has partnered with CRJ to provide DRI Certified Professionals access to a PDF version of the most […]. The post Read the September 2021 Crisis Response Journal – Special Subscription Offer for Certified Professionals appeared first on DRI Drive.
Expert advice for hard conversations with clients, the media, and anyone in between. Tough conversations with clients are a part of doing business in any vertical, and how you handle them can make the difference between someone leaving with a great impression of your brand, ready to pass on the good word, or making sure to savage your reputation online and off.
The Diva has never done this before, but this appeal is special because several academic professionals who are longtime friends are involved. They are helping the First Nation Tribes in LA provide assistance to members experiencing massive damage after Hurricane Ida. Here are the details, as provided by Prof. Laura Olson: Hurricane Ida brought catastrophic damage to the member Tribes of the First Peoples Conservation Council of Louisiana (FPCC).
Strengthen your operations with the Supply Chain Resilience Checklist. This practical, easy-to-use tool helps your organization prepare for disruptions and ensure long-term continuity in an unpredictable world. Why Download: Identify and assess critical supply chain risks Ask the right questions to evaluate vendor preparedness Implement effective strategies to reduce vulnerabilities Improve communication, transparency, and coordination across your network What You’ll Learn: How to evaluate and m
The growing importance of waste management is pushing society to consider it to be as vital as other CI sectors such as energy, and transportation, writes Lina Kolesnikova
Cyber threat activity is at an all-time high. With the pandemic and rapid digitization of financial services that has accompanied it, cybersecurity professionals have never been in more demand. Yet we are facing an acute talent shortage; the industry effectively has negative unemployment. One way we are helping to solve this problem at Bank of America is to focus a piece of our recruitment and retention efforts on neurodiversity.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Cyber threat activity is at an all-time high. With the pandemic and rapid digitization of financial services that has accompanied it, cybersecurity professionals have never been in more demand. Yet we are facing an acute talent shortage; the industry effectively has negative unemployment. One way we are helping to solve this problem at Bank of America is to focus a piece of our recruitment and retention efforts on neurodiversity.
The fifth most powerful hurricane to hit the U.S., the brunt of Ida has left Louisiana in dire straits, pummeled the rest of the east coast, and could spell supply chain trouble for businesses throughout the rest of the country. Days after Ida made landfall in Louisiana as a Category 4 hurricane, roughly a million […]. The post Hurricane Ida: The Aftermath of One of the Most Powerful Storms in U.S.
Norway, Sweden, and Finland have dramatically shifted their plans and actions in response to Russian threats in the European Arctic. This change could provide an opportunity for the United States to further strengthen cooperation, enhancing security and better countering Russia in the region.
From the WashPost: U.S. agencies spent years testing pandemic responses. But many didn’t learn lessons for coronavirus, GAO finds. Be sure to read the last three paragraphs of the article.
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
September 2021: Lina Kolesnikova analyses two shootings – one at a school and one at a university, looking at each attacker’s profile, their pre-attack behaviour and their plans
Monica Sanders is a Georgetown University professor. Previously, she was a Senior Committee Counsel for both the House of Representatives and Senate Committees on Homeland Security. In this podcast we do deep dive into the legislative process of the Congress of the United States. The role of committee chairpersons and their staff is explored, along with the way in which bills are introduced in Congress and move through the legislative process.
During the COVID-19 pandemic, priorities have certainly shifted for many companies. But in the effort to ensure business continuity is secure, has IT threat protection been left behind? HP Wolf’s security report is based on an online survey of 8,443 office workers worldwide who shifted to telework positions during the pandemic, as well as 1,100 […].
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
Beijing and Islamabad share a long history of cooperation and have much in common on Afghanistan. Both are poised to benefit strategically from the Taliban's success. But the Taliban's resurrection almost certainly will add some stress to an otherwise positive and productive bilateral partnership.
Central Penn Business Journal has selected Scott R. Davis as a Forty Under 40 recipient. Forty Under 40 recognizes professionals 40 years of age and younger who have been successful in the Central Pennsylvania area. Honorees, chosen by the Central Penn Business Journal editors, were selected based on professional accomplishments, community service and commitment to inspiring change.
Alert and warning is one of the primary functions for emergency management agencies and first responders. You first need to detect the hazard, but then you need different ways to issue a warning. This then is the topic of this podcast with Matthew Straeb with Alert FM In the podcast we discuss the pros and cons of different technology tools being used today to issue warnings.
April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.
In Asia and the Pacific, natural and biological hazards are converging, creating cascading risks on populations and infrastructures, according to a new report from the United Nations Economic and Social Commission for Asia and the Pacific (ESCAP). “Asia-Pacific Disaster Report 2021: Resilience in a Riskier World” looks at risks in the region under current, moderate, […].
Technical architecture is the sum and substance of what IT deploys to support the enterprise. As such, its management is a key IT practice. We talked about how to go about it in a previous article in this series. Which leads to the question, What constitutes good technical architecture? Or more foundationally, What constitutes technical architecture, whether good, bad, or indifferent?
Neglecting reputation can be costly. With polls showing that global executives attribute a whopping 63% of their company’s market value to its overall reputation, it seems most in the know would agree reputation is a tremendously valuable resource. Why, then, is it so common to encounter major brands with national reputations…and no reputation management planning to speak of?
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
Poor data security compliance policies can make it easier for ransomware attackers to succeed in their efforts to lock up your data. As Sophos recently reported , some attackers are shifting to extortion-style attacks. Instead of simply encrypting files, they threaten to publish data unless a ransom is paid, thereby putting the victimized organization in a position where it will get slammed with regulatory fines—not to mention damage to its brand.
The Disaster Zone podcast guest is John Scardena who hosts the Disaster Tough Podcast and also heads up Doberman EMG a consulting firm specializing in supporting government emergency management programs. In this podcast we have a wide-ranging discussion on a variety of emergency management topics from ranging from GIS to other technologies and how to address the integration of new technologies into an organization.
The topic of resilience, whether it is organizational, operational, societal or personal, has been making waves within business circles for the last decade, as organisations begin to realise that to survive in today’s complex environment requires the need to take a system of systems approach to building and maintaining resilience. While this ability to think […].
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
Among many new features and enhancements in Zerto 9 comes one that many customers have been waiting for: VM automatic protection using vSphere tags. This feature simplifies disaster recovery and data protection for workloads using a pre-defined virtual protection group (VPG) as a template, by either automatically building a new VPG or adding new VMs to existing VPGs—all by simply adding a vSphere tag to the VMs.
November 10, 2021 at 11am EST. Add to Calendar. This month's topic: HIPAA Done Right. Paul Redding, the VP of Partner Engagement and Cybersecurity at Compliancy Group will be presenting. The average HIPAA fine is $1.5 million. Are you willing to bet $1.5mil that your organization is HIPAA compliant? SIGN UP HERE.
Imagine a world with cloud-like, self-service simplicity, where all of the complex storage management operations necessary to make this possible are automated through software. And where it comes with almost limitless scale and the ability to adjust to meet your business’s data management needs over time. Today, we’re excited to announce our next big leap forward in storage management.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content