This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
My story begins in the Midwestern United States during the mid-1960s with My Weekly Reader, a weekly educational magazine designed for children. Kids in schools throughout the United States (over. The post How a children’s book saved my life appeared first on DisasterDoc.
A critical crisis prevention best practice. That darn Send button. It’s much too easy to click the Send button on any communications device and just as easy for whatever you send to be (a) misunderstood; (b) shared with others along with the recipient’s personal opinions; and, (c) posted widely online in places you never expected. We all know that but, factually, if more people practiced restraint of pen, tongue and Send button, we’d have less business.
Food insecurity is a huge issue in the United States, and it got worst during the coronavirus pandemic. One organization at the center of coordinating and providing food to people who need it is Feeding America. This podcast is an interview with Vince Davis, Director of Disasters Services for Feeding America. In our conversation we discuss their role in providing support to day-to-day food bank operations throughout the United States.
Strengthen your operations with the Supply Chain Resilience Checklist. This practical, easy-to-use tool helps your organization prepare for disruptions and ensure long-term continuity in an unpredictable world. Why Download: Identify and assess critical supply chain risks Ask the right questions to evaluate vendor preparedness Implement effective strategies to reduce vulnerabilities Improve communication, transparency, and coordination across your network What You’ll Learn: How to evaluate and m
CRJ Advisory Panel member, Rob Fagan describes the virtues of a comprehensive online package put together for disaster preparedness and emergency management by the NCDP
Today’s supply chains are high-performing, globalized machines. With leaner supply chain management techniques and approaches like outsourcing, offshoring, just-in-time inventory and vendor managed inventory, disruption has worldwide consequences. Optimizing inventory based on internal systems and operations isn’t as effective as external disruptions continue to test supply chains. .
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Today’s supply chains are high-performing, globalized machines. With leaner supply chain management techniques and approaches like outsourcing, offshoring, just-in-time inventory and vendor managed inventory, disruption has worldwide consequences. Optimizing inventory based on internal systems and operations isn’t as effective as external disruptions continue to test supply chains. .
The US experiences more tornadoes than any other country on earth, with an average of over 1,000 tornadoes recorded each year. (Canada is a distant second, with around 100. The post Tornado Risk Reduction – An American Success Story appeared first on DisasterDoc.
University of South Carolina President Plagiarizes Speech. If you have any doubt about whether stupidity has any relationship to IQ or education, the answer is clearly “no” as exemplified by the University of South Carolina’s president, Retired Army Lt. Gen. Robert Caslen, who was outed for plagiarism by local media whose reporting went viral immediately.
Michele Wucker is an author, speaker and strategist on the topic of risk. Her most recent book is You Are What You Risk: The New Art and Science of Navigating an Uncertain World This podcast interviews her about her expertise and questions are centered on topics of interest to individuals and emergency managers when it comes to disasters. This would be an excellent text for courses in emergency management to educate people on the topic of risk, so we can manage it ourselves and address progr
How Backup and Disaster Recovery Protects South Florida Businesses. Many South Florida businesses operate with a sense of unrealistic optimism when it comes to data loss and disaster recovery. However, the reality can be quite different and can negatively affect your business if you’re not vigilant. As the rate of digitalization increases, so does the risk of data loss.
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
In recent posts, we’ve been talking about how important it is for organizations to reassess their risks as the economy opens up. Today, we provide a tool to help in … The post Checking It Twice: The Corporate Risk Mitigation Checklist appeared first on MHA Consulting.
A tornado is one of the last things you ever want to encounter in your life. hey are dangerous and leave a visible impact on the communities which they affect. The post Tornado Preparedness appeared first on DisasterDoc.
Recent burst of serious disruptions highlights need for crisis preparedness and planning. Ransomware hackers shut down a critical oil pipeline. A single ship blocks the entire Suez Canal. Animal rights protestors blockade four McDonald’s distribution centers in the UK, impacting 1,300 restaurants. Covid-19 disrupts every aspect of the global supply chain.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
In this podcast we learn about the National Health Security Preparedness Index This index gets an annual update and looks at the public health readiness of all 50 states and Washington, D.C. The show’s guest is Glen Mays, Professor and Chair, Department of Health Systems, Management & Policy, Colorado School of Public Health. We discuss what criteria is used to achieve ratings and how over 200 data points are used to achieve a state-by-state rating.
Michael Goldstein, Founder/Owner of LAN InfoTech, Awarded 2020 Achievement in Technology Award. Michael Goldstein had been recognized by the Greater Hollywood Chamber of Commerce. Goldstein received the 2020 Achievement in Technology Award as part of the Chamber’s annual Business Leaders Awards + Board Installation event. Known as southern Florida’s premier promotional body for representing local business interests, the Greater Hollywood Chamber of Commerce strives to promote econom
When designed and functioning properly, IT governance plays an integral role in aligning IT and business goals, helping to focus, fortify, and advance an enterprise’s overall business strategy. Yet all too often, IT leaders fall victim to popular misconceptions that not only derail effective IT governance, but directly conflict with key business objectives.
April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.
A tornado is a violently rotating column of air that reaches from a storm system down towards Earth’s surface. The most notable appearance of a tornado comes from its spinning. The post An Introduction to Tornadoes appeared first on DisasterDoc.
Colonial Pipeline Hack: Failure in Risk Management. Colonial Pipeline Hack: Introduction. Colonial Pipeline, a major U.S. energy company, was hit with a ransomware cyberattack on May 7th, 2021, which forced it to halt all operations on its major pipeline that delivers roughly 45% of all fuel consumed on the east coast. Why was this a case of negligence?
If you are going to invest time, energy and money into becoming more disaster resilient, what type of effort are you putting into the social capital of your community or organization? Daniel Aldrich, Director of the Resilience and Security Studies Program at Northeastern University shares in this podcast the importance of investing in social capital and how it can pay huge dividends.
Lessons Your Business Can Learn from Colonial Pipeline Cyberattack. On May 7, 2021, a ransomware attack happened to one of the biggest businesses in the United States, the Colonial Pipeline. The cyberattack created a crisis for the country, with the affected company shutting down its operations over the weekend. This led to a shortage of gasoline across 16 states.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
Too many business continuity management programs are reactive rather than proactive. Good BCM programs exist in a permanent posture of executing on a roadmap, their custom-crafted plan for the future that is focused on reducing risk and increasing compliance with standards. Missing: A Coherent Set of BCM Program Goals From my perspective as […].
Last year’s sudden (and nearly synchronized) shift out of the office and onto the cloud was immediately followed by the start of an unending stream of high-profile data breaches. For companies across the board, the alarm has sounded on the escalating threat of these cybersecurity events. The public, too, has taken notice: consumer information, including sensitive data such as healthcare records.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
In this blog post, you will learn about two more active/passive strategies that enable your workload to recover from disaster events such as natural disasters, technical failures, or human actions. Previously, I introduced you to four strategies for disaster recovery (DR) on AWS. Then we explored the backup and restore strategy. Now let’s learn about the pilot light and warm standby strategies.
Making Ongoing Risk Management an Operational Standard. No business today is 100 percent secure from cyberthreats. Every day, more businesses are waking up to this reality, finally understanding the importance of a good cybersecurity system. It’s no wonder cybersecurity investment in 2020 was pegged to grow by 5.6 percent to reach nearly $43.1 billion in value.1 With cyberattacks surging, due to widespread remote work and increased online interactions during the pandemic, it seems likely that th
During this past year of the pandemic, IT teams have had to reimagine the corporate network. Remote workforces could no longer use their office networks to connect with enterprise applications. Overnight, cloud computing became essential for getting employees back online. Many IT […]. The post Predicting Cloud Computing Trends: 2021 Edition appeared first on TierPoint.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content