This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
My story begins in the Midwestern United States during the mid-1960s with My Weekly Reader, a weekly educational magazine designed for children. Kids in schools throughout the United States (over. The post How a children’s book saved my life appeared first on DisasterDoc.
A critical crisis prevention best practice. That darn Send button. It’s much too easy to click the Send button on any communications device and just as easy for whatever you send to be (a) misunderstood; (b) shared with others along with the recipient’s personal opinions; and, (c) posted widely online in places you never expected. We all know that but, factually, if more people practiced restraint of pen, tongue and Send button, we’d have less business.
Food insecurity is a huge issue in the United States, and it got worst during the coronavirus pandemic. One organization at the center of coordinating and providing food to people who need it is Feeding America. This podcast is an interview with Vince Davis, Director of Disasters Services for Feeding America. In our conversation we discuss their role in providing support to day-to-day food bank operations throughout the United States.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
CRJ Advisory Panel member, Rob Fagan describes the virtues of a comprehensive online package put together for disaster preparedness and emergency management by the NCDP
Today’s supply chains are high-performing, globalized machines. With leaner supply chain management techniques and approaches like outsourcing, offshoring, just-in-time inventory and vendor managed inventory, disruption has worldwide consequences. Optimizing inventory based on internal systems and operations isn’t as effective as external disruptions continue to test supply chains. .
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Today’s supply chains are high-performing, globalized machines. With leaner supply chain management techniques and approaches like outsourcing, offshoring, just-in-time inventory and vendor managed inventory, disruption has worldwide consequences. Optimizing inventory based on internal systems and operations isn’t as effective as external disruptions continue to test supply chains. .
A tornado is one of the last things you ever want to encounter in your life. hey are dangerous and leave a visible impact on the communities which they affect. The post Tornado Preparedness appeared first on DisasterDoc.
University of South Carolina President Plagiarizes Speech. If you have any doubt about whether stupidity has any relationship to IQ or education, the answer is clearly “no” as exemplified by the University of South Carolina’s president, Retired Army Lt. Gen. Robert Caslen, who was outed for plagiarism by local media whose reporting went viral immediately.
Michele Wucker is an author, speaker and strategist on the topic of risk. Her most recent book is You Are What You Risk: The New Art and Science of Navigating an Uncertain World This podcast interviews her about her expertise and questions are centered on topics of interest to individuals and emergency managers when it comes to disasters. This would be an excellent text for courses in emergency management to educate people on the topic of risk, so we can manage it ourselves and address progr
How Backup and Disaster Recovery Protects South Florida Businesses. Many South Florida businesses operate with a sense of unrealistic optimism when it comes to data loss and disaster recovery. However, the reality can be quite different and can negatively affect your business if you’re not vigilant. As the rate of digitalization increases, so does the risk of data loss.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
In recent posts, we’ve been talking about how important it is for organizations to reassess their risks as the economy opens up. Today, we provide a tool to help in … The post Checking It Twice: The Corporate Risk Mitigation Checklist appeared first on MHA Consulting.
A tornado is a violently rotating column of air that reaches from a storm system down towards Earth’s surface. The most notable appearance of a tornado comes from its spinning. The post An Introduction to Tornadoes appeared first on DisasterDoc.
Recent burst of serious disruptions highlights need for crisis preparedness and planning. Ransomware hackers shut down a critical oil pipeline. A single ship blocks the entire Suez Canal. Animal rights protestors blockade four McDonald’s distribution centers in the UK, impacting 1,300 restaurants. Covid-19 disrupts every aspect of the global supply chain.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
In this podcast we learn about the National Health Security Preparedness Index This index gets an annual update and looks at the public health readiness of all 50 states and Washington, D.C. The show’s guest is Glen Mays, Professor and Chair, Department of Health Systems, Management & Policy, Colorado School of Public Health. We discuss what criteria is used to achieve ratings and how over 200 data points are used to achieve a state-by-state rating.
Michael Goldstein, Founder/Owner of LAN InfoTech, Awarded 2020 Achievement in Technology Award. Michael Goldstein had been recognized by the Greater Hollywood Chamber of Commerce. Goldstein received the 2020 Achievement in Technology Award as part of the Chamber’s annual Business Leaders Awards + Board Installation event. Known as southern Florida’s premier promotional body for representing local business interests, the Greater Hollywood Chamber of Commerce strives to promote econom
When designed and functioning properly, IT governance plays an integral role in aligning IT and business goals, helping to focus, fortify, and advance an enterprise’s overall business strategy. Yet all too often, IT leaders fall victim to popular misconceptions that not only derail effective IT governance, but directly conflict with key business objectives.
As federal and state officials scramble to send unemployment and stimulus funds to help people hit hard by COVID-19 business shutdowns, it has become a perfect storm for cyber fraud. The payments are an easy target for cybercriminals as hackers and cyber gangs around the world have started to file unemployment claims use stolen identities. Some criminals claim benefits in the names of dead or incarcerated people, while others set up shell companies, “hiring and firing” fictitious employees to co
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
Colonial Pipeline Hack: Failure in Risk Management. Colonial Pipeline Hack: Introduction. Colonial Pipeline, a major U.S. energy company, was hit with a ransomware cyberattack on May 7th, 2021, which forced it to halt all operations on its major pipeline that delivers roughly 45% of all fuel consumed on the east coast. Why was this a case of negligence?
If you are going to invest time, energy and money into becoming more disaster resilient, what type of effort are you putting into the social capital of your community or organization? Daniel Aldrich, Director of the Resilience and Security Studies Program at Northeastern University shares in this podcast the importance of investing in social capital and how it can pay huge dividends.
Lessons Your Business Can Learn from Colonial Pipeline Cyberattack. On May 7, 2021, a ransomware attack happened to one of the biggest businesses in the United States, the Colonial Pipeline. The cyberattack created a crisis for the country, with the affected company shutting down its operations over the weekend. This led to a shortage of gasoline across 16 states.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
The COVID-19 pandemic has demonstrated the importance of coordinated responses among emergency management and other stakeholders to implement an effective strategy for handling a long and complex disaster. Due to a number of factors , pandemics are more likely to occur in the future. Thus, identifying and planning for the risks of potential disasters, such as a pandemic, is the first step to ensuring that communities and regions are prepared for them.
Too many business continuity management programs are reactive rather than proactive. Good BCM programs exist in a permanent posture of executing on a roadmap, their custom-crafted plan for the future that is focused on reducing risk and increasing compliance with standards. Missing: A Coherent Set of BCM Program Goals From my perspective as […].
Last year’s sudden (and nearly synchronized) shift out of the office and onto the cloud was immediately followed by the start of an unending stream of high-profile data breaches. For companies across the board, the alarm has sounded on the escalating threat of these cybersecurity events. The public, too, has taken notice: consumer information, including sensitive data such as healthcare records.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
Making Ongoing Risk Management an Operational Standard. No business today is 100 percent secure from cyberthreats. Every day, more businesses are waking up to this reality, finally understanding the importance of a good cybersecurity system. It’s no wonder cybersecurity investment in 2020 was pegged to grow by 5.6 percent to reach nearly $43.1 billion in value.1 With cyberattacks surging, due to widespread remote work and increased online interactions during the pandemic, it seems likely that th
In this blog post, you will learn about two more active/passive strategies that enable your workload to recover from disaster events such as natural disasters, technical failures, or human actions. Previously, I introduced you to four strategies for disaster recovery (DR) on AWS. Then we explored the backup and restore strategy. Now let’s learn about the pilot light and warm standby strategies.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content