This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
We all need water. It is a physiological need for all life on Earth. Lack of proper water sources in a community would easily constitute a public health crisis. Sphere. The post 7 years after Flint, another water public health crisis is born of neglect appeared first on DisasterDoc.
The following, from author Kristopher Scott, originally appeared in Platform Magazine’s March edition. Thanks to Kris and the crisis experts quoted, including Dorothy Crenshaw, Jason Mudd, and BCM founder Jonathan Bernstein for giving us permission to reprint! Reputation Management: The Next Seussville Classic. One fish, two fish. Black fish, white fish.
It is now possible to get an online degree as a Master of Infrastructure Planning and Management. This podcast is an interview with Wendy Freitag, Program Director for the University of Washington’s program linked above. In this podcast we talk generally about online degrees in general, to include those in emergency management. How they compare school to school and with resident courses of study.
Graeme McGowan from CRJ's Key Network Partner Optimal Risk explains the need for businesses to establish solid defences to counter the growing threat of cyber fraud
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
As lead solutions architect for the AWS Well-Architected Reliability pillar , I help customers build resilient workloads on AWS. This helps them prepare for disaster events, which is one of the biggest challenges they can face. Such events include natural disasters like earthquakes or floods, technical failures such as power or network loss, and human actions such as inadvertent or unauthorized modifications.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
As lead solutions architect for the AWS Well-Architected Reliability pillar , I help customers build resilient workloads on AWS. This helps them prepare for disaster events, which is one of the biggest challenges they can face. Such events include natural disasters like earthquakes or floods, technical failures such as power or network loss, and human actions such as inadvertent or unauthorized modifications.
Ransomware attacks increased 150% last year according to Group-IB, a leading cybersecurity solutions provider, a trend that shows no signs of slowing. Given the financial, operational and reputational risk that ransomware poses, boards of directors need to make sure that safeguarding data from an attack is a top priority for the organizations they oversee.
PEST analysis definition. PEST analysis is used to evaluate external and macro environmental factors that impact your organization, specifically political, economic, social, and technological ones. This four-point analysis method gives your business a framework to identify the most influential factors in your industry, with a focus on entering new business markets and growing within your industry.
Emergency management organizations have now been immersed in COVID-19 response for over a year. This podcast is an interview with Jody Ferguson, Director for Pierce County Department of Emergency Management. In it we explore how her department responded first to the call to help with Personal Protective Equipment (PPE) distribution and then more recently with mass vaccination efforts by the county.
Lina Kolesnikova describes the implications of deepfakes being used by criminals to trigger civil unrest, influence political decisions and for large-scale fraud
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
If COVID-19 has taught the business world anything, it's that business continuity tools are essential to ensuring the operation of everyday processes when the world is turned upside down. Stay-at-home orders paired with an overwhelming number of abroad or overseas employees have meant that the need for constant digital communication, sharing, and incident management ability has drastically increased.
It’s easy to assume the growth of hyperscale clouds like AWS, Azure, and GCP has impacted the colocation market, but colocation remains a strong choice for businesses today. In this post, we focus on the benefits of colocation by narrowing in on […]. The post The Benefits of Colocation in a Pennsylvania Data Center appeared first on TierPoint.
In a previous blog post , I introduced you to four strategies for disaster recovery (DR) on AWS. These strategies enable you to prepare for and recover from a disaster. By using the best practices provided in the AWS Well-Architected Reliability Pillar whitepaper to design your DR strategy, your workloads can remain available despite disaster events such as natural disasters, technical failures, or human actions.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
In the podcast we talk about the cybersecurity threats and different approaches being used to counter those threats. Cybersecurity training is one of those and it has become something employees must accomplish as part of organizational standards. There are many mistakes that companies and governments make in their approaches to this training. Heather Stratford, CEO for Drip7 is the Disaster Zone guest.
LAN Infotech Makes Prestigious List Of Top Managed IT Service Companies. Each year, Channele2e.com, a leading managed IT services news and information site run by Joe Panettieri (Content Czar) and Amy Katz (president and CEO), publishes an industry ranking top 100 managed IT services providers globally by industry focus. The managed IT service organizations who make this prestigious list of the leading global IT firms specialize in a single unique industry.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
And so it continues. Last month, Virginia passed its own privacy law, the Virginia Consumer Data Protection Act (VCDPA), adding fuel to the fire over a US federal privacy law, and introducing new complexities for businesses operating in or addressing the US market. It will take effect on January 1, 2023 (the same day as California’s CPRA which amends the current CCPA) and was passed in record-breaking time: less than two months, and by an overwhelming majority.
September 8, 2021 : Amazon Elasticsearch Service has been renamed to Amazon OpenSearch Service. See details. In the last blog, Maximizing System Throughput , we talked about design patterns you can adopt to address immediate scaling challenges to provide a better customer experience. In this blog, we talk about architecture patterns to improve system resiliency, why observability matters, and how to build a holistic observability solution.
Emergency management is primarily known as a profession that responds to disasters. Another very important aspect of the discipline of emergency management is disaster mitigation. This podcast focuses on a relatively new federal program called Building Resilient Infrastructure Communities (BIRC). Derrick Hiebert, Deloitte is the mitigation expert interviewed in this recording.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
Center for Engaged Foresight Director and Chief Futurist was one the panelists of the recent Lee Kuan Yew School of Public Policy Executive Education Futures Forward Webinar “Developing Futures Capabilities in Public Service. The second episode tackled ways by which public service institutions can develop futures capabilities that allow public service to move beyond traditional policy silos and realize multiple developments can intersect and collaborate in plural and unexpected ways.
Rising vaccination rates. Pandemic fatigue. Pent-up consumer demand. Whatever the impetus, the answer is the same: It’s time to ramp up plans to go back to the office. The question is, how? In this new ebook, discover how to prepare for the knowns and unknowns during these uncertain times. You’ll find tips and advice on every page about how to plan, communicate, mitigate risks and protect the health and safety of your employees, staff and other stakeholders.
In Part I of this two-part blog , we outlined best practices to consider when building resilient applications in hybrid on-premises/cloud environments. We also showed you how to adapt mindsets and organizational culture. In Part II, we’ll provide technical considerations related to architecture and patterns for resilience in AWS Cloud. Considerations on architecture and patterns.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
READ TIME: 5 MIN April 28, 2021 Is Your IT Help Desk Overwhelmed? The IT help desk can be an unforgiving job. In a 2019 survey by Ponemon Institute, 73% of 1,400 IT professionals believed their IT department was understaffed due to difficulty in attracting and retaining skilled engineers. Often, IT professionals work longer hours to manage the ever-increasing requests from frustrated users.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content