This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
I’m pleased to report that DRI2022: The Business Continuity Conference, our 10th event, was a huge success thanks to the energy and dedication of our community of resilience professionals! It’s been almost exactly two years since the last in-person industry event, DRI2020 in Savannah, Georgia. This work is essential and there is still no better […].
As the drums of war beat louder in Ukraine, members of Congress have expressed an openness to making concessions to Russia. Some argue that any U.S. response to Russia would detract from our ability to deter China. But it's a mistake to think of China and Russia as independent problems.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
This podcast is a bit of reminiscing with Diane Newman. She was at different times my Operations Program Manager and my Deputy Director at the King County Office of Emergency Manager. At one point, I actually worked for her! In this podcast we discuss various aspects of our personal journeys in emergency management and along the way share what worked and what didn’t work when it came to trying to forge a cohesive local emergency management program.
Nations and armies will want to try out new weapons.
214
214
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
2021 was a year of headline-grabbing cyberattacks. SolarWinds, Microsoft, Colonial Pipeline and Log4j were name-dropped by almost every major journal. Corporate networks saw a 50% increase in weekly attacks. However, many of these networks were a means to an end as attackers focused on the supply chain. As a result, big companies with comprehensive security were […].
The United States pledged in 2009 to end veteran homelessness. The numbers have fallen by nearly half since then, but there are still more than 37,000 veterans living in their cars, in temporary shelters, or in makeshift camps. Researchers followed 26 of them for one year to see how they live and what keeps them on the streets.
In the tale of the Ship of Theseus, a question is raised: If all of a ship’s planks are replaced one by one over time, is it still the original ship? Or, is it an entirely new ship? Philosophical question aside, the important thing is this: The ship was able to stay afloat throughout change and to evolve and be refreshed over time. Pure Storage Keeps Your Data Sailing.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
On February 23 Russia launched a war on Ukraine. Ukraine's president Volodymyr Zelensky and its parliament might accelerate steps to ensure the continuity of government, a need made more urgent because of the risk that Kyiv could soon fall.
You’ve probably heard from us, and elsewhere, that every organization should develop and continually revise a crisis management plan, which they should also exercise regularly. But why? Because listing procedures and blindly walking through them can only get you so far. To benefit, you need to get into your marrow your approach to crises and … The post How to Craft Your Crisis Management Framework appeared first on Bryghtpath.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
From the WashPost: A year after Texas cold spell, study shows renewable energy could help prevent blackouts. Electricity blackouts could be avoided across the nation by switching to solar, wind and water energy sources, the report argues.
February 24, 2022. NexusTek Ranked Again on CRN’s Elite 150 Category of MSP 500 List for 2022. Recognized for the sixth consecutive year as an exemplary technology provider. Denver, CO (February 24, 2022) — NexusTek, a top national cloud, managed IT services, and cyber security provider, announced today that CRN ® , a brand of The Channel Company , has named NexusTek to its Managed Service Provider (MSP) 500 list in the Elite 150 category for 2022.
The honorees will be recognized for their leadership in security industry collaboration at SIA’s Market Leaders Reception during ISC West. SILVER SPRING, Md. – The Security Industry Association (SIA) has named Kim Hooper, Bobby Louissaint, Dr. Ron Martin and Eddie Reynolds as the 2022 recipients of the Jay Hauhn Excellence in Partnerships Award , an annual distinction recognizing outstanding leadership in security industry collaboration.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
The Diva is going into her 13th year of providing this resource, which she does on her own. Occasionally she asks for contributions to help pay for the costs of the hosting service, domain maintenance, and technical support. That time is now. Please use the Donate Now button in the right hand column of the home page. Bear in mind that not only does this site provide timely information about disaster recovery, but it also is an archive of articles collected since its start.
South Florida’s LAN Infotech Named In 2021’s Top 250 Cloud IT Companies. The team of IT experts from LAN Infotech is proud to announce that they have been named in the top 250 Cloud MSPs by ChannelE2E , a CyberRisk Alliance information resource. LAN Infotech ranked as the 164th IT company on the list, moving up from #175 last year. This list recognizes leading cloud service and support providers across the country that demonstrate innovation, leadership, and a commitment to creating exceptional
No venture is without risk. Assessing and managing risk and its potential impact on business is a critical role of business leaders. With the world becoming increasingly digital, IT departments must manage and mitigate more and more risk using both new technology and improved processes and practices. The varied risks to critical IT systems and data continue to evolve along with our political, economic, and environmental landscapes.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
ISC West 2022 is coming up March 22-25 in Las Vegas, and the Security Industry Association (SIA) and ISC West recently revealed full conference details for the SIA Education@ISC West program, including keynote presentations from top luminaries and 60+ sessions on the most current business trends, technologies and industry developments. Among the robust lineup of conference sessions are several dynamic presentations featuring expert insights on cybersecurity.
READ TIME: 3 MIN. February 23, 2022. Creating Opportunities for Your IT Team. In today’s business context, where most—if not all—critical functions are mediated by technology, it’s not an exaggeration to say that your IT team literally keeps your business running. As we grapple with the ongoing trend of increased turnover across industries and job types, the unfortunate reality is that the chances of losing some of your top IT talent are high.
One challenge familiar to every business continuity management professional is dealing with the business units’ attitude that business continuity is the BCM office’s responsibility, not theirs. Getting the business units … The post How to Get Business Units to Take Ownership of Their BCM Programs appeared first on MHA Consulting.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
Security Industry Association (SIA) member LiveView Technologies (LVT) is a turnkey security provider who combines proprietary software and hardware for a completely mobile, cloud-based surveillance solution. The company is headquartered in Orem, Utah, and serves clients in big-box retail, construction, law enforcement and infrastructure. SIA spoke with LVT Chief Business Development Officer David Studdert about LVT and the company’s partnership with SIA.
This is part of Solutions Review’s Premium Content Series, a collection of contributed columns written by industry experts in maturing software categories. In this submission, DataCore Software Field CTO Brian Bashaw offers four data health best practices to know and key techniques for success. As IT departments gear up with data protection tools and tactics to secure data and adhere to compliance regulations, the role of data health in storage is often overlooked.
VR or virtual reality technology is growing in popularity. If you are thinking about buying, you might wonder about VR power consumption. The post Does VR Use a Lot of Energy? appeared first on. (This is a content summary only. Click on the blog title to continue reading this post.).
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content