Sat.Jun 19, 2021 - Fri.Jun 25, 2021

article thumbnail

How to defuse a bomb on a spaceship 

Crisis Response Journal

The world is a spaceship travelling around the sun, but inside the air is getting stuffy and the crew are growing in number.

Travel 180
article thumbnail

Adapting to Climate Change

Disaster Zone Podcast

While climate change and disasters are mentioned frequently in the popular media, most of the information being shared is about climate mitigation that has to do with reducing the amount of carbon being emitted into the atmosphere. There is little discussion of climate adaptation. This podcast looks specifically at adaption as a strategy that can be implemented now and can provide immediate results to reduce climate related damages.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Increase your Business Continuity Profile

KingsBridge BCP

Business Continuity Profile. It’s one thing to have a business continuity plan, but it’s another to make sure your staff know about it. Those involved in writing the plan and the core members of recovery teams are likely aware of the plan. This is great, but what about everyone else in the organization? When bad things happen, will the staff know the company has a plan in place?

article thumbnail

Organizational Resilience is About How You Respond, Not React

Donyati

As organizations around the globe begin to negotiate a new array of post-Covid situations – such as when, or if, to return employees to the office – some celebration is certainly in order. But although 2020’s pandemic is finally ending, a new era for Business Continuity Planning (BCP) has just begun, according to Donyati BCP experts Joseph Brewer and Patrick Dunn.

BCP 81
article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

Bystanders, gawkers and gaffers 

Crisis Response Journal

Lina Kolesnikova investigates the phenomenon of bystanders filming and taking photos of accident victims rather than calling the emergency services for help, or clearing the way for first responders

173
173

More Trending

article thumbnail

Disaster Recovery (DR) Architecture on AWS, Part IV: Multi-site Active/Active

AWS Disaster Recovery

In my first blog post of this series , I introduced you to four strategies for disaster recovery (DR). My subsequent posts shared details on the backup and restore , pilot light, and warm standby active/passive strategies. In this post, you’ll learn how to implement an active/active strategy to run your workload and serve requests in two or more distinct sites.

article thumbnail

Looking Around the Corner: Why ESG Has Never Been More Important

LogisManager

Looking Around the Corner: Why Is ESG Important In The Present And Future. By Steven Minsky. Introduction: Why is ESG important? The topic of environmental, social and governance (ESG) criteria is especially prominent right now. But why is ESG important? It’s all about the See-Through Economy. By taking a look at trends and patterns over the course of recent history, it’s clear that ESG is a growing concern for consumers, investors and regulators everywhere.

article thumbnail

Taking care of animals in disasters 

Crisis Response Journal

Lyzi G Cota introduces the first in a series of blogs that explore the importance of accounting for livestock and poultry during a crisis

100
100
article thumbnail

Post-Pandemic Business Continuity Recovery Strategies

FEI

I often lead crisis management drills for one of our customers in the hospitality industry. One of their biggest concerns is how to effectively recover from their loss of staff during COVID-19. It wasn’t just small business that took a major hit during the pandemic. Some big-name franchises did as well. All this leads to the question: How do you continue to respond to crises with a skeleton staff?

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

10 Incredibly Useful Time Series Forecasting Algorithms

Advancing Analytics

To Make An Impact In Your Business By Gavita Regunath and Dan Lantos “The goal of forecasting is not to predict the future but to tell you what you need to know to take meaningful action in the present.” — Paul Saffo This article aims to provide a general overview into time series forecasting, the top time series algorithms that have been widely used to solve problems, followed by how to go about choosing the right forecasting algorithm to solve a specific problem.

article thumbnail

Crisis Hits Home: When Family is Sick in a Foreign Country

BCM METRICS

It’s one thing to talk about crisis management as it affects other people’s organizations. It’s something else when it involves your college-age son and he’s seriously ill in a country 6,000 miles away. Read for more on how this family crisis reenforced my crisis management training and experience. When Crisis Hits Home I provide crisis management advice to organizations for a living. […].

article thumbnail

Four Can’t-Miss Cybersecurity & IT Sessions Coming to ISC West

Security Industry Association

ISC West 2021 is coming up July 19-21 in Las Vegas, and the Security Industry Association (SIA) and ISC West recently revealed full conference details for the SIA Education@ISC West program, including keynote presentations from top luminaries and 65+ sessions on the most current business trends, technologies and industry developments. Among the robust lineup of conference sessions are several dynamic presentations on the top issues in cybersecurity and IT.

article thumbnail

Hypercomplexity: Which Incidents Should We Be Preparing For?

Plan B Consulting

In this week’s bulletin, I discuss the idea of a hypercomplex world and preparing for different scenarios in it. A few weeks ago, I wrote a bulletin on scenario planning and how under the new requirement of Operational Resilience for FCA and PRA, regulated organisations now have a requirement to determine ‘extreme but plausible scenarios’ to see if they would continue delivering their services if the said scenario occurred.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Why Your Business Needs Multi-Factor Authentication

Assurance IT

What is a Multi-Factor Authentication? Multi-factor authentication (MFA) is a method of protecting your online identity. It’s used to verify that the user is who they say they are. By doing so, the MFA asks the user to provide two forms of identification or confirmation that they are who they say they are. These pieces of identification fall into three categories: something they are, something they know, and something they have.

article thumbnail

4 Steps To Performing a Business Impact Analysis

Alert Media

The post 4 Steps To Performing a Business Impact Analysis appeared first on AlertMedia.

article thumbnail

Security Industry Association Announces Agenda & Speaker Lineup for 2021 AcceleRISE: The Challenge Virtual Conference

Security Industry Association

AcceleRISE – hosted by SIA’s RISE community – is an essential experience for tomorrow’s security leaders taking place virtually Aug. 23-25. SILVER SPRING, Md. – The Security Industry Association (SIA) has announced the 2021 agenda and speaker lineup for AcceleRISE: The Challenge , an essential experience hosted by SIA’s RISE community for young professionals in the security industry.

article thumbnail

Hypercomplexity: Which Incidents Should We Be Preparing For?

Plan B Consulting

In this week’s bulletin, I discuss the idea of a hypercomplex world and preparing for different scenarios in it. A few weeks ago, I wrote a bulletin on scenario planning and how under the new requirement of Operational Resilience for FCA and PRA, regulated organisations now have a requirement to determine ‘extreme but plausible scenarios’ to see if they would continue delivering their services if the said scenario occurred.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

The Top Vulnerabilities in Software Security

Assurance IT

Did you know that in 2020, over 18,000 vulnerabilities were created? When your computer is linked to an insecure network your software security can be compromised. This happens without proper protocols in place. Updates that are forgotten, product flaws, and unresolved developer issues expose your clients to computer security risks. All of this is vulnerabilities in your enterprises’ software security.

article thumbnail

How AlertMedia Customers Utilize Real-Time Intelligence to Protect Their People and Business

Alert Media

The post How AlertMedia Customers Utilize Real-Time Intelligence to Protect Their People and Business appeared first on AlertMedia.

article thumbnail

Security Industry Association Releases Privacy Code of Conduct

Security Industry Association

The publication is designed to help security technology companies enhance their management of personal information. . SILVER SPRING, Md. – The Security Industry Association (SIA) has released its new Privacy Code of Conduct , a resource designed to guide security technology companies in implementing privacy programs and protecting personal data. The document was created by SIA’s Data Privacy Advisory Board, a group of SIA members that produces resources and events aimed at promoting a better

article thumbnail

Why cybersecurity products always defy traditional user reviews

Behavior Group

I read with interest the latest batch of evaluation data from MITRE on various endpoint solutions, this time focusing on the detect, response and containment of these various solutions against malware created by FIN7 and CARBANAK threat groups. While academically interesting, it illustrates the difficulty in giving reviews to cybersecurity products in the endpoint protection… Continue reading.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

CISA certification guide: Certified Information Systems Auditor explained

CIO Governance

The Certified Information Systems Auditor (CISA) certification validates your knowledge for information systems auditing, assurance, control, security, cybersecurity, and governance. Offered by the Information Systems Audit and Control Association (ISACA), the credential is designed for IT and IS auditors tasked with evaluating an organization’s information systems to identify issues and potential security threats.

Audit 52
article thumbnail

Managing Business Technology in Distributed Cloud Environments with Veritas InfoScale

VOX Veritas

With InfoScale, you can seamlessly integrate on-premises resources and public cloud services as part of a distributed cloud strategy that enables you to run your IT services on any platform.

article thumbnail

SIA Women in Security Forum Scholarship Deadline Extended to June 30

Security Industry Association

Become a donor – Join leading companies who have demonstrated outstanding commitment to progress in the security industry. SILVER SPRING, Md. – The Security Industry Association (SIA) has announced that the deadline to apply for the 2021 SIA Women in Security Forum Scholarship has been extended to Wednesday, June 30. Open to both men and women who work for SIA member companies, the SIA Women in Security Forum Scholarship is designed to further educational opportunities and promote advancement fo

article thumbnail

Is the Country Open again or Is It a False Start?

Business Continuity Today

Like many people, I've sorely missed going to sporting events last year there were games, however, cardboard cutouts (that were kind of strange) and piped-in crowd noises were the norms in light of the world's COVID-19 pandemic. And also like many —while I understand the need for and support precautions to protect ourselves and others from the virus and mitigate its spread, I've been longing to enjoy the electric feel of a live sporting event.

Sports 40
article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha