Sat.Dec 30, 2023 - Fri.Jan 05, 2024

article thumbnail

Why 2024 Should Be the Year of Crisis Preparedness for Your Brand

Bernstein Crisis Management

Why 2024 Should Be the Year of Crisis Preparedness for Your Brand We’re going to pose a question here and, while it’s not a terribly complicated one, if you’re reading this post because you truly care about your own organization’s wellbeing then we’d suggest you stop, take a minute and really think about your answer. Ready?

article thumbnail

Best of 2023: Risk and Crisis Communications

Disaster Zone Podcast

Best of 2023 podcasts: One of emergency management’s major partners in all things concerning disasters, from the preparation phase to the response and recovery is our public information/affairs officers who support what we are trying to do in communicating with the public. It is critical that they have the knowledge and skill to perform their duties in a manner that helps, rather than hinders, our mission of protecting people, property and the environment.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Continuing to Drive Emergency Management and First Responders

Disaster Zone

Gird up your loins, you will be in a race to adopt new technology.

article thumbnail

FlashStack for AI Checks the Boxes for Rapid AI Deployment at Any Scale

Pure Storage

FlashStack for AI Checks the Boxes for Rapid AI Deployment at Any Scale by Pure Storage Blog FlashStack® for AI is a software-defined, intelligently managed, full-stack infrastructure featuring automated real-time scalability. With capacity on demand and integrated management across hybrid-cloud landscapes, FlashStack for AI reduces the complexity associated with setting up an AI environment and simplifies expansion of your AI infrastructure as your needs grow.

Capacity 126
article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Celebrating 30 Years of Bernstein Crisis Management

Bernstein Crisis Management

Celebrating 30 Years of Bernstein Crisis Management The big three-oh! This year, Bernstein Crisis Management celebrates thirty years in business, and thirty years of proving critics who weren’t shy about proclaiming, “You can’t manage a crisis!”, wrong. As we celebrate this milestone, I’d like to take a moment to reflect on our journey, the evolution of crisis management, and the ever-increasing relevance of our work in today’s world.

More Trending

article thumbnail

Ensuring Data Sovereignty and Security Compliance with Thales and Zerto

Zerto

The need to protect sensitive data has never been greater. Organizations continue to migrate to virtual data centers and cloud environments while dealing with the persistent threat of data breaches. Regulatory demands, such as PCI/DSS, HIPAA/HITECH, GDPR, GLBA, and SOX, will continue to proliferate. Thales, with its CipherTrust Data Security Platform and Luna Hardware Security Modules (HSMs), partners with HPE and Zerto, a Hewlett Packard Enterprise company, to provide enterprise data protection

article thumbnail

Thinking Forward: Managing Third Party Risk for 2024 & Beyond

LogisManager

Thinking Forward: Managing Third Party Risk for 2024 & Beyond Last Updated: January 2, 2024 In the world of third-party risk management, companies have long been accustomed to doing things the old way, navigating through fragmented processes and siloed approaches. However, as we step into 2024, the landscape demands a transformative shift. It’s time for companies to break free from the constraints of traditional methodologies and embrace a new integrated approach to third-party risk m

article thumbnail

Postwar Ukraine: Planning for a Successful and Secure Recovery

The Rand Blog

To rebuild successfully, Ukraine will need to come out of the war on a new trajectory. It already has an outline of what recovery will look like. The plan looks beyond the immediate damages and envisions more than $750 billion in economic support and projects that would raise a new Ukraine from the destruction.

Security 111
article thumbnail

Article by the Diva in South Korean Newspaper

Recovery Diva

Translated article from the South Korean newspaper The Segye Times , written by reporter Yeongjun Park from; published in Dec. 2023. “The nature and components of disasters vary widely, requiring training and ongoing education of key personnel.” Claire Rubin, a researcher who works as a disaster prevention consultant in the U.S., emphasized training and education as an iteration of responding to various disasters on Sept. 26 (local time).

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

A Former Hacker Explains How to Fight Ransomware

Pure Storage

A Former Hacker Explains How to Fight Ransomware by Pure Storage Blog Cybercriminals are becoming increasingly bold these days, evolving their tactics and attacks as fast as we can evolve our defenses. What if, in the ongoing war against cybercrime, you could get intel on what they’re up to straight from a former hacker? Now you can. I worked with former hacker turned internationally-renowned cybersecurity expert, Hector Xavier Monsegur to create a comprehensive ebook designed to help you create

article thumbnail

Best of 2023: Risk and Crisis Communications

Disaster Zone

This is an area many people and organizations screw up.

article thumbnail

Countering Truth Decay: Q&A with Ray Block, Jr.

The Rand Blog

Ray Block, Jr., leads RAND's efforts to combat Truth Decay—the diminishing role of facts and analysis in public life. It's the talking heads on TV, distrust and conspiracy theories, and basic disagreements over not just what's right, but what's real. He advises people to be active consumers of information.

article thumbnail

Security Industry Association Names Renee Thompson as Chair of Environmental, Social and Governance Advisory Board

Security Industry Association

Renee Thompson, director of global sustainability and environmental compliance at Wesco International, will lead the advisory board’s efforts to advance information sharing about established ESG practices and critical marketplace issues. SILVER SPRING, Md. – The Security Industry Association (SIA) has named Renee Thompson – director of global sustainability and environmental compliance at Wesco International – as the first-ever chair of SIA’s Environmental, Social and Governance (ESG) Advisory B

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

FlashStack for AI Checks the Boxes for Rapid AI Deployment at Any Scale

Pure Storage

FlashStack for AI Checks the Boxes for Rapid AI Deployment at Any Scale by Pure Storage Blog FlashStack® for AI is a software-defined, intelligently managed, full-stack infrastructure featuring automated real-time scalability. With capacity on demand and integrated management across hybrid-cloud landscapes, FlashStack for AI reduces the complexity associated with setting up an AI environment and simplifies expansion of your AI infrastructure as your needs grow.

article thumbnail

Best of 2023: The Threats from an Electromagnetic Pulse

Disaster Zone

This is one of two "Best of 2023" podcasts.

100
100
article thumbnail

California Just Banned 'Crime-Free' Housing. Here's Why Other States Should Too

The Rand Blog

Crime-free housing policies target low-income and minority renters for eviction and violate their civil rights. That's bad enough. But they also fail to reduce crime. At worst, they're a harmful form of discrimination that leads to more crime and homelessness.

106
106
article thumbnail

MSP operational risk mitigation strategies in 2024: Defeat technician burnout

Acronis

The majority of MSPs grapple with talent shortages and an IT skills gap. It’s an ongoing challenge to ensure the most highly skilled and specialized technicians are available to focus on the most critical issues. Here, we uncover the top reasons MSP technicians experience burnout, the role of modern endpoint management solutions in improving efficiency, and the Acronis solution for optimizing MSP business operations.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

A Former Hacker Explains How to Fight Ransomware

Pure Storage

A Former Hacker Explains How to Fight Ransomware by Pure Storage Blog Cybercriminals are becoming increasingly bold these days, evolving their tactics and attacks as fast as we can evolve our defenses. What if, in the ongoing war against cybercrime, you could get intel on what they’re up to straight from a former hacker? Now you can. I worked with former hacker turned internationally-renowned cybersecurity expert, Hector Xavier Monsegur to create a comprehensive ebook designed to help you create

article thumbnail

Hot, hotter, hottest: 2023 Expected to be the Hottest Year on Record

Disaster Zone

And, are the impacts of climate change accelerating?

100
100
article thumbnail

Introduction to Polars

Advancing Analytics

If you’ve ever used Python for analytics you’ll have no doubt heard of Pandas, the incredibly popular and easy-to-use data analysis module. With the rise of Rust ( and it’s 8-year long love story with Stack Overflow developers ) however, a newer and more modern DataFrame library is in development that utilises the Rust language to enable incredibly performant, multi-core analytics.

article thumbnail

Exploring AI Large Language Models: Boon or Bane for Security and Surveillance?

Security Industry Association

Will Knehr is senior manager of information security and data privacy at i-PRO Americas. Large language models (LLMs) like ChatGPT have taken the world by storm, with ChatGPT becoming the fastest-growing app of all time. Most of us can’t make it more than a few minutes without hearing about the wonders of artificial intelligence. These conversations can be intimidating for some and uninteresting to others, so in this article I will try to break down in very simple terms what exactly LLMs are, th

article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha

article thumbnail

A Former Hacker Explains How to Fight Ransomware

Pure Storage

A Former Hacker Explains How to Fight Ransomware by Pure Storage Blog Cybercriminals are becoming increasingly bold these days, evolving their tactics and attacks as fast as we can evolve our defenses. What if, in the ongoing war against cybercrime, you could get intel on what they’re up to straight from a former hacker? Now you can. I worked with former hacker turned internationally-renowned cybersecurity expert, Hector Xavier Monsegur to create a comprehensive ebook designed to help you create

article thumbnail

Rain Storms Now Producing Prodigious Amounts of Rain

Disaster Zone

On average 40 to 50 percent more rain.

100
100
article thumbnail

Unlocking the Value of your Runbook Automation Value Metrics with Snowflake, Jupyter Notebooks, and Python by Justyn Roberts

PagerDuty

This blog was co-authored by Justyn Roberts, Senior Solutions Consultant, PagerDuty Automation has become an integral piece in business practices of the modern organization. Oftentimes when folks hear “automation,” they think of it as a means to remove the manual aspect of the work and speed up the process; however, what lacks the spotlight is the value and return automation can offer to an organization, a team, or even just one specific process.

article thumbnail

Guest Post: Containerized Video Management Systems in Education

Security Industry Association

Edge360’s John Rezzonico Discusses How An Innovative Approach Presents More Options to Forward-Looking Institutions John Rezzonico is the CEO of Edge360. From elementary schools to universities, video management systems (VMS) serve as the bedrock of security; however, challenges in scalability, adaptability and cost efficiency are proving traditional VMS solutions to be increasingly inadequate.

article thumbnail

Kerberos vs. NTLM

Pure Storage

Kerberos vs. NTLM by Pure Storage Blog Kerberos and NTLM, two prominent encryption methods, differ fundamentally in their approach to authentication and security. While Kerberos employs a robust third-party authentication system with ticket-based access, NTLM relies on a challenge-response mechanism and hashing techniques. These essential differences impact their strengths, vulnerabilities, and suitability for various security scenarios.