This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The threat and risk assessment or TRA is one of the cornerstones of business continuity methodology. Today, we’ll talk about what it is, why it’s important, and how to do … The post Risk Assessment: The Best Way to Identify Your Biggest Threats appeared first on MHA Consulting.
A volcanic eruption could have powerful impacts on supply chains, climate and food security – but are resilience professionals taking such a threat seriously enough? Not according to the University of Cambridge’s Centre for the Study of Existential Risk (CSER). In an article published in Nature, its researchers pointed to a misconception that the risks […].
A recent report on enterprise risk management finds business leaders feeling risk complexities are increasing, and finding difficulty integrating ERM with strategic decision making, among other responses. The 5th edition of this report from North Carolina State University, the Association of International Certified Professional Accountants (AICPA), and the Chartered Institute of Management Accountants (CIMA), highlights […].
Strengthen your operations with the Supply Chain Resilience Checklist. This practical, easy-to-use tool helps your organization prepare for disruptions and ensure long-term continuity in an unpredictable world. Why Download: Identify and assess critical supply chain risks Ask the right questions to evaluate vendor preparedness Implement effective strategies to reduce vulnerabilities Improve communication, transparency, and coordination across your network What You’ll Learn: How to evaluate and m
September 16, 2022 – The Cyber Security Association of Pennsylvania and it's President Scott R. Davis has issued a recommendation for users of popular ride share service Uber to update their user credentials. Uber has announced that they are investigating a wide-reaching security breach that was started when an employee answered a text message from a person impersonating IT support with their user credentials.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
“There are two types of companies: those that have been hacked, and those who don’t yet know they have been hacked.” — Former Executive Chairman and CEO of Cisco John Chambers Every day, countless businesses fall victim to cybercrime. With cyberattacks constantly evolving and growing at an unprecedented rate, and industry regulations getting stricter, cybersecurity […].
Before Russia invaded Ukraine in February, its diplomatic missions began circulating some particularly fantastical lies. It's tempting to write off such claims as cartoonish propaganda. But Russia is making similarly outrageous claims to the United Nations and other international forums. Such maneuvers could dangerously undermine international arms control agreements.
The Pacific Northwest Economic Region (PNWER) is very unique in that it is multi-national, public-private and bi-partisan in how it is organized and operates on a day-to-day basis. One organizational element of PNWER is its Center for Regional Disaster Resilience (CRDR) [Note: the Disaster Zone Podcast Host, Eric Holdeman is the Director]. In this podcast Matt Morrison, the Executive Director of PNWER is interviewed about how PNWER is organized and then we transition to talking about public priv
After the past few years of disruptions, a huge majority of resilience professionals view supply chain risk as a top priority. But new research says the most popular fixes may not be able to match expectations. In a recent survey by the Neustar International Security Council, 78% of security professionals said their reliance on cloud-based […].
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
This is one of the best pieces of creative writing advice I’ve ever read. When I first heard that line, it was in a screenwriting course I took in my spare time. (Back when I had spare time!) The message was that too many great stories never get told because the author doesn’t think “it” is good enough to share and ”it” just needs a little more time.
From the Disaster Philanthropy organization, see this note: Dear Claire, I am sure you share my concern for the communities devastated by Hurricane Fiona. Although uncertainty over the storm’s full impact will last for days, if not weeks, officials anticipate the damage will be extensive. As you have grown to expect, the CDP team is tracking the devastation and loss across Puerto Rico, the Dominican Republic, and other areas of the Caribbean, while providing resources to foster effective m
The second Tuesday of every month is a day that should be marked on every cybersecurity professional’s calendar, as it marks Patch Tuesday. Patch Tuesday was started by Microsoft back in the Windows 98 era and brings monthly updates and a periodic glance at some of the biggest security exploits and vulnerabilities blighting our modern digital landscape.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
The City of Tacoma Office of Emergency Management is led by Tieka Adeogun. Tieka, having been an emergency management intern herself in several different positions, hired two staff, Arianna Topbjerg and Caleb Collins as interns using them to help accomplish the various missions of her office and the emergency management program. We learn from this director why and how she uses interns and the benefits of internships to the agency and to the interns themselves.
The September edition of the Crisis Response Journal is now available to download from our Library! This month’s topics include ethical emergency management, COVID-19 risk fatigue, information warfare, and much more. CRJ offers DRI Certified Professionals a digital subscription for only $15 and hard copy subscription for only $100, a significant discount from the list […].
Vladimir Putin appeared to double-down on his country's war effort in Ukraine September 21st, calling up hundreds of thousands of new troops, threatening Ukraine and the West, vowing to use “all the means at our disposal,” and pointing out that he is not bluffing. Here's what a few RAND experts had to say.
April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.
SIA’s apprenticeship initiative will meet the demand for a highly skilled technical workforce, grow career development opportunities and diversify the industry’s talent pipeline. SILVER SPRING, Md. – The Security Industry Association (SIA) has announced that it is developing a new apprenticeship program to help address the security industry’s workforce challenges, diversify the talent pipeline and foster career development opportunities within the industry.
A reliable business continuity and disaster recovery (BCDR) solution is critical to the survival of a modern organization. However, implementing and maintaining a robust data backup and disaster recovery strategy is no easy feat. IT is tasked with supporting exponentially growing data volumes and meeting ever-shrinking recovery time objectives (RTOs) since businesses of all shapes […].
Aviation technology is making huge strides toward a future with unmanned drones and electric aircraft that will move people and goods via air transportation. Besides being able to use the skies more efficiently and with sustainability in mind, these new technologies from drones and Advanced Air Mobility (AAM) will provide a wealth of new capabilities.
Public sector data holds tremendous potential value. In 2021, the UK government saved £142 million through its Digital, Data and Technology function, which aims to help departments make the right technology decisions and enhance digital services. There are three key areas where data can be used to reveal value in the public sector: anticipation and planning, delivery, and evaluation and monitoring.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
Twitter has a deep bench of engineers working for the company. They have access to trillions of data points on their over 300 million monthly active users. Why has a company this size struggled to clean up its platform?
ISC East 2022 is coming up Nov. 15-17 in New York City, and the Security Industry Association (SIA) and ISC East recently revealed full conference details for the SIA Education@ISC East program , including keynote presentations from top luminaries and over 30 sessions from top industry expert speakers on the most current business trends, technologies and industry developments.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
In 2021 almost one in three Americans experienced a weather related disaster. The aftermath of these disasters disproportionately devastate marginalized communities, and government aid programs like the Federal Emergency Management Agency (FEMA) reportedly favor white, rich people most. However, making public interest lawyers available to at-risk communities can help folks become prepared to respond to disasters before they occur and assist them in the aftermath.
This blog was originally published in 2014. Some figures may have changed. The commonly accepted measure of performance for storage systems has long been IOPS (input/output operations per second). The first storage system I ever installed at a customer site had controllers rated for 20K IOPS and we all thought it was awesome. Over the years, I’ve developed an extensive knowledge of storage IO benchmarking tools and have demonstrated hero IOPS numbers many times on a number of different storage s
As tensions with Russia rise to levels not seen since the Cold War, the North American Aerospace Defense Command (NORAD) may need to detect and counter increasing numbers of aerial intrusions. One way to strengthen NORAD's capabilities: Invite Greenland and Denmark to join the command.
107
107
Input your email to sign up, or if you already have an account, log in here!
Enter your email address to reset your password. A temporary password will be e‑mailed to you.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content