This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The threat and risk assessment or TRA is one of the cornerstones of business continuity methodology. Today, we’ll talk about what it is, why it’s important, and how to do … The post Risk Assessment: The Best Way to Identify Your Biggest Threats appeared first on MHA Consulting.
A volcanic eruption could have powerful impacts on supply chains, climate and food security – but are resilience professionals taking such a threat seriously enough? Not according to the University of Cambridge’s Centre for the Study of Existential Risk (CSER). In an article published in Nature, its researchers pointed to a misconception that the risks […].
A recent report on enterprise risk management finds business leaders feeling risk complexities are increasing, and finding difficulty integrating ERM with strategic decision making, among other responses. The 5th edition of this report from North Carolina State University, the Association of International Certified Professional Accountants (AICPA), and the Chartered Institute of Management Accountants (CIMA), highlights […].
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
September 16, 2022 – The Cyber Security Association of Pennsylvania and it's President Scott R. Davis has issued a recommendation for users of popular ride share service Uber to update their user credentials. Uber has announced that they are investigating a wide-reaching security breach that was started when an employee answered a text message from a person impersonating IT support with their user credentials.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
“There are two types of companies: those that have been hacked, and those who don’t yet know they have been hacked.” — Former Executive Chairman and CEO of Cisco John Chambers Every day, countless businesses fall victim to cybercrime. With cyberattacks constantly evolving and growing at an unprecedented rate, and industry regulations getting stricter, cybersecurity […].
Before Russia invaded Ukraine in February, its diplomatic missions began circulating some particularly fantastical lies. It's tempting to write off such claims as cartoonish propaganda. But Russia is making similarly outrageous claims to the United Nations and other international forums. Such maneuvers could dangerously undermine international arms control agreements.
The Pacific Northwest Economic Region (PNWER) is very unique in that it is multi-national, public-private and bi-partisan in how it is organized and operates on a day-to-day basis. One organizational element of PNWER is its Center for Regional Disaster Resilience (CRDR) [Note: the Disaster Zone Podcast Host, Eric Holdeman is the Director]. In this podcast Matt Morrison, the Executive Director of PNWER is interviewed about how PNWER is organized and then we transition to talking about public priv
After the past few years of disruptions, a huge majority of resilience professionals view supply chain risk as a top priority. But new research says the most popular fixes may not be able to match expectations. In a recent survey by the Neustar International Security Council, 78% of security professionals said their reliance on cloud-based […].
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
This is one of the best pieces of creative writing advice I’ve ever read. When I first heard that line, it was in a screenwriting course I took in my spare time. (Back when I had spare time!) The message was that too many great stories never get told because the author doesn’t think “it” is good enough to share and ”it” just needs a little more time.
From the Disaster Philanthropy organization, see this note: Dear Claire, I am sure you share my concern for the communities devastated by Hurricane Fiona. Although uncertainty over the storm’s full impact will last for days, if not weeks, officials anticipate the damage will be extensive. As you have grown to expect, the CDP team is tracking the devastation and loss across Puerto Rico, the Dominican Republic, and other areas of the Caribbean, while providing resources to foster effective m
The second Tuesday of every month is a day that should be marked on every cybersecurity professional’s calendar, as it marks Patch Tuesday. Patch Tuesday was started by Microsoft back in the Windows 98 era and brings monthly updates and a periodic glance at some of the biggest security exploits and vulnerabilities blighting our modern digital landscape.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
The City of Tacoma Office of Emergency Management is led by Tieka Adeogun. Tieka, having been an emergency management intern herself in several different positions, hired two staff, Arianna Topbjerg and Caleb Collins as interns using them to help accomplish the various missions of her office and the emergency management program. We learn from this director why and how she uses interns and the benefits of internships to the agency and to the interns themselves.
The September edition of the Crisis Response Journal is now available to download from our Library! This month’s topics include ethical emergency management, COVID-19 risk fatigue, information warfare, and much more. CRJ offers DRI Certified Professionals a digital subscription for only $15 and hard copy subscription for only $100, a significant discount from the list […].
Vladimir Putin appeared to double-down on his country's war effort in Ukraine September 21st, calling up hundreds of thousands of new troops, threatening Ukraine and the West, vowing to use “all the means at our disposal,” and pointing out that he is not bluffing. Here's what a few RAND experts had to say.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
SIA’s apprenticeship initiative will meet the demand for a highly skilled technical workforce, grow career development opportunities and diversify the industry’s talent pipeline. SILVER SPRING, Md. – The Security Industry Association (SIA) has announced that it is developing a new apprenticeship program to help address the security industry’s workforce challenges, diversify the talent pipeline and foster career development opportunities within the industry.
A reliable business continuity and disaster recovery (BCDR) solution is critical to the survival of a modern organization. However, implementing and maintaining a robust data backup and disaster recovery strategy is no easy feat. IT is tasked with supporting exponentially growing data volumes and meeting ever-shrinking recovery time objectives (RTOs) since businesses of all shapes […].
In 2021 almost one in three Americans experienced a weather related disaster. The aftermath of these disasters disproportionately devastate marginalized communities, and government aid programs like the Federal Emergency Management Agency (FEMA) reportedly favor white, rich people most. However, making public interest lawyers available to at-risk communities can help folks become prepared to respond to disasters before they occur and assist them in the aftermath.
Public sector data holds tremendous potential value. In 2021, the UK government saved £142 million through its Digital, Data and Technology function, which aims to help departments make the right technology decisions and enhance digital services. There are three key areas where data can be used to reveal value in the public sector: anticipation and planning, delivery, and evaluation and monitoring.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
Twitter has a deep bench of engineers working for the company. They have access to trillions of data points on their over 300 million monthly active users. Why has a company this size struggled to clean up its platform?
ISC East 2022 is coming up Nov. 15-17 in New York City, and the Security Industry Association (SIA) and ISC East recently revealed full conference details for the SIA Education@ISC East program , including keynote presentations from top luminaries and over 30 sessions from top industry expert speakers on the most current business trends, technologies and industry developments.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
The largest-ever gathering of cyber protection professionals is less than a month away! From November 7–9 at Miami Beach’s historic Fountainebleau Hotel, the Acronis #CyberFit Summit Miami 2022 will bring together thousands of service providers, cloud distributors, resellers, enterprise IT pros, tech marketers and sales teams to network, learn and grow.
This blog was originally published in 2014. Some figures may have changed. The commonly accepted measure of performance for storage systems has long been IOPS (input/output operations per second). The first storage system I ever installed at a customer site had controllers rated for 20K IOPS and we all thought it was awesome. Over the years, I’ve developed an extensive knowledge of storage IO benchmarking tools and have demonstrated hero IOPS numbers many times on a number of different storage s
As tensions with Russia rise to levels not seen since the Cold War, the North American Aerospace Defense Command (NORAD) may need to detect and counter increasing numbers of aerial intrusions. One way to strengthen NORAD's capabilities: Invite Greenland and Denmark to join the command.
107
107
Input your email to sign up, or if you already have an account, log in here!
Enter your email address to reset your password. A temporary password will be e‑mailed to you.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content