This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The Jokes on Whom? Navigating Humor in Crisis Management By Ella Kate Baker Introduction by Jonathan Bernstein When Ella Baker from The University of AlabamasCollege of Communication and Information Sciences contacted me about being interviewed for this Platform Magazine article, my first response to her was Wow, what a great story angle! I have been interviewed scores of times in my career, and written very extensively, but humor in crisis management has never been a topic!
DRI2025, the most-attended conference in business continuity and resilience, concluded with a powerful final session that placed the spotlight on DRI Certified Professionals. Designed to be both innovative and interactive, the session tackled one of the most transformative forces shaping our industry today artificial intelligence (AI). Rather than a traditional panel, this session brought […] The post AI in Resilience: A Recap from the DRI2025 Closing Session appeared first on DRI Drive.
As this is being written the firestorm in California is continuing. It is not only government that responds to disasters and the needs of disaster survivors and victims. The Disaster Accountability Project was created to help coordinate nongovernmental organizational efforts. To date, the site has more than 900 organizations registered worldwide. Following a stringent review process, organizations are presented with information that displays proximity to a specific crisis, and the range of servi
Resilience is an illusion. In saying that I mean no disrespect to resilience officers, whose work is honourable, vital and necessary. However, whether resilience has as its goal to 'bounce back' or to 'bounce forward', it represents a tendency to seek homeostasis, in other words a quest for an eventual stable equilibrium. But in the disasters field we have no equilibrium.
April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.
FlashBlade//EXA Has Arrived The Data Storage Platform to Transform Large-scale AI and HPC by Pure Storage Blog Summary FlashBlade//EXA is the newest member of the FlashBlade family. Optimized for AI workloads, this ultra-scale data storage platform provides massive storage throughput and operates at extreme levels of performance and scale. Racers, start your engines!
From HSToday: Senior Leader Departures Raise Concerns About FEMAs Disaster Readiness “In a troubling development for Americas emergency preparedness, FEMA is experiencing an unprecedented exodus of leadership and staff just weeks away from the 2025 Danger Season1. Over a dozen senior leaders including those with the most disaster recovery experience have either resigned or been fired, according to recent reports.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
From HSToday: Senior Leader Departures Raise Concerns About FEMAs Disaster Readiness “In a troubling development for Americas emergency preparedness, FEMA is experiencing an unprecedented exodus of leadership and staff just weeks away from the 2025 Danger Season1. Over a dozen senior leaders including those with the most disaster recovery experience have either resigned or been fired, according to recent reports.
Chatbots like ChatGPT, Gemini, Microsoft Copilot and the recently released DeepSeek have revolutionized how we interact with technology, offering assistance with almost every task imaginable from drafting e-mails and generating content to writing your grocery list while keeping it within your budget. But as these AI-driven tools weave themselves into our daily routines, questions about data privacy and security are becoming harder to ignore.
Now in its fourth year, the SIA WISF Power 100 program showcases 100 women who are role models, leaders, innovators and influencers in the global security industry. SILVER SPRING, Md. The Security Industry Association (SIA) has announced the 2025 honorees for the SIA Women in Security Forum (WISF) Power 100. This initiative, presented by the SIA Women in Security Forum , honors 100 women in the security industry each year whose outstanding accomplishments and success stories are breaking barrie
We continue to see disasters increase in size, frequency and impact. What are we doing wrong when it comes to disaster resilience, especially as it impacts our ability to adapt to the climate impacts that are experiencing and take a longer view to disaster resilience. The podcast guest is Jeff Schlegelmilch an Associate Professor for Professional Practice in Climate.
As the leading nonprofit helping organizations around the world prepare for and recover from disasters, DRI relies ongroups that promote greater resiliency. We encourage our Certified Professionals to support these valuable partners. Business Continuity Planners Association BCPAs next event is an in-person meeting on Mar. 13 in Edina, MN, on the topic of Constructing Effective […] The post Collaborative Partner Spotlight: March 2025 appeared first on DRI Drive.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
FlashBlade//EXA: The Future of AI and HPC Storage Performance by Pure Storage Blog Summary Discover the power of FlashBlade//EXA, a purpose-built, advanced data storage platform designed to support the most demanding AI and HPC workloads. A visionary company can leverage a strong core technology for many purposes.Consider the graphics processing unit (GPU), invented over 25 years ago, or Internet Protocol, developed over decades, and expected to continue advancing for many more.
From HSToday: Congressional Hearing to Examine the Future of FEMA and Emergency Management Priorities Congressional Hearing to Examine the Future of FEMA and Emergency Management Priorities The Subcommittee on Emergency Management and Technology will hold a hearing titled Future of FEMA: Perspectives from the Emergency Management Community on Tuesday, March 4, 2025, at 10:00 AM ET in Room 310 of the Cannon House Office Building.
Think ransomware is your worst nightmare? Think again. Hackers have found a new way to hold your business hostage and it may be even more ruthless than encryption. Its called data extortion , and its changing the rules of the game. Heres how it works: They dont bother encrypting your files anymore. Instead, they just steal your sensitive data and threaten to leak it unless you pay up.
Ryan Schonfeld is the co-founder and CEO of HiveWatch, a security technology company reimagining how companies keep their people and assets safe. As physical security continues to evolve beyond the traditional “gates, guards and guns” approach, companies are venturing into the rising popularity, and increasingly mandate, of artificial intelligence (AI)-driven technology.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
As we look to the future of making for a more disaster resilient future, there are new building technologies that are ready for prime time. One of those is the use of 3D technology for the construction of all types of buildings and other structures. In this podcast we learn from one leader in 3D construction, Ziyou X u, Founder of RIC Technology. 3D printing using concrete uses less labor and is very flexible in how the materials can be used.
Solutions Review’s Executive Editor Tim King compiled this roundup of World Backup Day quotes from experts for 2025, part of our ongoing coverage of the enterprise storage and data protection market. In the age of AI, ransomware, and relentless cyber threats, data protection is no longer just an IT issue its a boardroom imperative. As part of Solutions Review’s ongoing coverage of the enterprise storage, data protection, and backup and disaster recovery markets, our editors bring yo
Modern Storage Meets Cyber Resilience: The Rubrik and Pure Storage Solution Architecture for Unstructured Data by Pure Storage Blog Summary Pure Storage and Rubrik have teamed up to offer a holistic and secure reference architecture solution that enables organizations to manage ever-growing unstructured data volumes, eliminate performance bottlenecks, and bolster their cyber resilience.
Governance 101: Why Separation of Duties is Non-Negotiable Last Updated: March 14, 2025 Fraud. Waste. Negligence. If your organization isnt enforcing Separation of Duties (SoD) , youre leaving the door wide open for all three. Separation of Duties isnt just another compliance checkboxits a cornerstone of good governance. It ensures that no single person can execute all parts of a transaction or process , preventing unchecked authority, reducing risk, and strengthening oversight.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
Mark your calendars: October 14, 2025 the day Windows 10 officially reaches its end of life. After this date, Microsoft will no longer provide security updates, bug fixes or technical support for Windows 10. But what does this mean for your business applications and productivity tools? If youre still using Windows 10 after the cutoff date, its not just your operating system that will be at risk your critical business applications could be affected too.
The SIA Education@ISC program will feature an additional day of learning, new tracks and a record-breaking number of speakers and sessions. NORWALK, Conn. ISC West ,the nations leading comprehensive and converged security trade event, hosted in collaboration with premier sponsor the Security Industry Association (SIA), will unveil its most expansive SIA Education@ISC program to date.
No Compliance, No Contracts: Why CMMC 2.0 Is a Top Security Priority March 28, 2025 Scott Ray Chief Operations Officer Cybersecurity is a must-have for every organization, perhaps nowhere more so than in the defense industry. Even unclassified information can be highly sensitive, with devastating potential in the wrong hands: espionage, theft of intellectual property, cyberattacks on critical infrastructure, supply-chain sabotage, or financial extortion, for example.
Infobesity: How Much Data is Too Much? Many financial services firms have such vast hoards of data much of it unclassified legacy data that owning it causes more data governance challenges than the information is worth. Olivier Nautet, Group CISO at BNP Paribas, says that firms suffering infobesity must approach the challenge cross-functionally, with a view to operational resilience and compliance.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
How to Set Up a Secure Isolated Recovery Environment (SIRE) by Pure Storage Blog If youve suffered a breach, outage, or attack, theres one thing you should have completed and ready to go: a secure isolated recovery environment (SIRE). This should be set up in advance, tested, and in a ready state to be transitioned into quickly after an event. With these steps completed, your infrastructure will be in place, giving you one less thing to worry about when youre being pressured to get the business
In today’s fast-paced and unpredictable business landscape, preparedness is paramount. Whether facing a natural disaster, a cyberattack , or even a simple power outage, organizations must ensure they can maintain essential functions. That’s where a robust business continuity template comes into play. Why a Template Matters? A well-structured business continuity template isn’t just a document; it’s a roadmap.
Operational resilience has become a defining priority for organizations in sectors like finance and insurance, especially in the UK and Europe. Although there are some differences between the FCA and PRA operational resilience frameworks and DORA (digital Operational Resilience) there are many overlaps and best practices which will slowly be adopted by other industries if it proves to be effective.
Before and during ISC West, the SIA Women in Security Forum community asks the security industry to give back in support of Dress for Success Southern Nevada. SILVER SPRING, Md. The Security Industry Association (SIA) Women in Security Forum (WISF) community has kicked off the fifth annual Essentials 4 Job Security Giveback , a program coinciding with ISC West that supports the efforts of Dress for Success Southern Nevada (DFSSN) to help women build careers and achieve financial independence.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
When it comes to running a business, most owners consider aspects like quality customer service, reliable products or services, and closely monitored P&Ls as reasons for company success or failure. Most never consider one other sneaky element that is often overlooked as a make-or-break factor because its a boring necessity. What is it? Your technology.
The Convergence of Business and Cyber - Risk Management Through a Bigger Lens Where cybersecurity and operations converge as they increasingly do -- financial services firms must view cyber risks as operational risks. That integration is a sign of cyber maturity, says Matt Harper, Aflacs Vice President and Global Practice Lead, Product Security, and Program Strategy, but it affects the practice of risk management.
In healthcare, third-party risk extends beyond operational concernsit’s a matter of patient trust and data security. Manual vendor management creates critical vulnerabilities through fragmented documentation and inconsistent security assessments. ZenGRC transforms this challenge, enabling healthcare organizations to protect sensitive patient data effectively.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content