Sat.Jan 21, 2023 - Fri.Jan 27, 2023

article thumbnail

Crisis Communications Firm’s Tips For Navigating Tough Conversations

Bernstein Crisis Management

Crisis Communications Firm’s Tips For Navigating Tough Conversations The occasional tough conversation is a part of doing business. Though these aren’t the task you’ll handle most frequently, it’s important to recognize that the way you handle those discussions can often determine whether you have an operational issue to address or face a full-blown crisis that threatens your reputation, your ability to operate, and your bottom line.

article thumbnail

Defund Emergency Management

Disaster Zone

Whose responsibility is it to fund state and local emergency management?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

This I Believe

DisasterDoc

(Preface from Keim M. Emergency Health APHA Press, Washington, DC 2023) THIS I BELIEVE I believe in public health. Because of people like John Snow, I believe that disease does. The post This I Believe appeared first on DisasterDoc.

147
147
article thumbnail

Improving PagerDuty’s Operational Resilience to Achieve our Long Term Vision and Goals by Jennifer Tejada

PagerDuty

CEO Jennifer Tejada sent the following email to PagerDuty employees earlier today. Hi Dutonians, Part of our mission at PagerDuty is to help businesses “anticipate the unexpected in an unpredictable world.” Over the last year, the macro environment shifted rapidly, with growth contracting in Q1 and Q2 yet expanding in Q3. Inflation and geopolitical concerns caused the US Federal Reserve to hike interest rates, while the jobs market overall remained strong and the unemployment rate remained low.

article thumbnail

Supply Chain Resilience Checklist

Strengthen your operations with the Supply Chain Resilience Checklist. This practical, easy-to-use tool helps your organization prepare for disruptions and ensure long-term continuity in an unpredictable world. Why Download: Identify and assess critical supply chain risks Ask the right questions to evaluate vendor preparedness Implement effective strategies to reduce vulnerabilities Improve communication, transparency, and coordination across your network What You’ll Learn: How to evaluate and m

article thumbnail

Leading in a Crisis

Disaster Zone Podcast

Not everyone can lead during a crisis. Some think they can, others fear that they will not be up to the task. Sometimes the crisis finds you, whether you are ready or not. In this podcast, Pete Gaynor, the immediate past Federal Emergency Management Agency (FEMA) Administrator shares his ideas on Leadership Essentials for Unthinkable Events. See www.femapete.com for more information.

More Trending

article thumbnail

How to Protect Your Database with Zerto

Zerto

For a business, databases have become more valuable than diamonds, as they often store millions of dollars in value. However, unlike diamonds, databases are dynamic and therefore require protection from a plethora of vulnerabilities and data loss. Database contents change depending on the applications they serve, and they need to be protected alongside other application components.

article thumbnail

Letter to Employees by PagerDuty

PagerDuty

UPDATE: Friday, January 27, 2023 7:00PM PT CEO Jennifer Tejada and PagerDuty leadership hosted global team meetings where they discussed the layoff announcement made earlier this week. She sent the below email to our employees as a follow up to those conversations. Team, This has been a difficult week for our company. For those of you who were not able to attend our town hall discussion today, I wanted to share what we discussed.

Marketing 124
article thumbnail

What Will Blockchain Mean for Data Storage?

Pure Storage

This is part two in a three-part series covering blockchain technologies. Read part one to learn how blockchain is modernizing enterprise apps. Emerging technologies almost always raise an important question for companies on the brink of breakthroughs: What will this innovation mean for our existing IT infrastructure? Do we have the foundation to support it?

article thumbnail

Understanding Different Types and Uses of Video Surveillance Data

Security Industry Association

Jan. 22-28 is Data Privacy Week , and the Security Industry Association (SIA) Data Privacy Advisory Board is marking the occasion with helpful tips and guidance on key data privacy topics. Here, learn about different types and uses of video surveillance data. As artificial intelligence (AI) applications have matured, it has become commonplace to see video cameras shipped with basic AI analytics embedded as a standard feature.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

33 Data Privacy Week Comments from Industry Experts in 2023

Solutions Review

For Data Privacy Week, the editors at Solutions Review have compiled a list of comments from some of the top leading industry experts. As part of Data Privacy Week (January 22-28) we called for the industry’s best and brightest to share their Identity Management , Endpoint Security , and Information Security comments. The experts featured represent some of the top Cybersecurity solution providers with experience in these marketplaces, and each projection has been vetted for relevance and abili

Backup 116
article thumbnail

Mass Shootings in California

Disaster Zone

Actually, mass shootings “everywhere!

22
article thumbnail

Avoiding a Long War in Ukraine, Gun Violence, Migrant Surges: RAND Weekly Recap

The Rand Blog

This weekly recap focuses on how the United States can help avoid a long war in Ukraine, responding to the gun violence crisis, limits on teachers’ instruction, and more.

106
106
article thumbnail

Better Science, Volume 2: Maps, Metadata, and the Pyramid

Pure Storage

In our first installment of Better Science , we talked about how Pure Storage® designed a better approach to flash storage systems and the benefits it brings to customers, as well as the environment. Today, we have a strategy for storing quadrillions of bits: petabytes of data, all stored efficiently on the densest flash available, and able to scale even larger in the future.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Acronis Cyber Foundation Program: Celebrating five years of achievement!

Acronis

The Acronis Cyber Foundation Program was founded in 2018 with the goal of making education available to all, and over the past five years, we have been able to achieve remarkable results by building 23 schools (with 18 completed by 2022 and five in progress during 2023) in 22 different countries around the world, benefitting more than 5,500 children.

Education 104
article thumbnail

Disaster Zone Podcast: ‘Leading in a Crisis’

Disaster Zone

Are you ready for the unthinkable?

22
article thumbnail

Aligning IT During a Merger or Acquisition

NexusTek

READ TIME: 4 MIN January 25, 2023 Aligning IT During a Merger or Acquisition Mergers and acquisitions (M&As) are as promising and exciting as they are intimidating. For many small and medium-sized businesses (SMBs), merging with another organization offers the opportunity to expand beyond their immediate geographic markets and possibly diversify the products and services they offer to command a larger market share.

article thumbnail

Top 10 Resources to Help You Become a BCM Ninja 

MHA Consulting

We are living in a golden age in terms of the easy availability of high-quality information on how organizations can make themselves more resilient. In today’s post we’ll look at the top 10 free or almost free resources business continuity management professionals can utilize to help them raise their BCM skills and effectiveness to ninja level. Related on MHA Consulting: Become a Master of Disaster: Educate Yourself With These Key BC Resources A Golden Age for Quality BC Information We talk a l

BCM 98
article thumbnail

Emergency Preparedness: Active Shooter Tabletop Exercise

April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.

article thumbnail

Register Today for Pure//Accelerate 2023 in Las Vegas

Pure Storage

Where can you see the latest data storage innovations, hear from visionary thought leaders, and discover the secret to digital transformation with data? Don’t gamble away your shot to learn more… Pure//Accelerate 2023 Hits the Strip Last year, we took Los Angeles by storm at Pure//Accelerate® techfest22. This year, June 14-16, Pure//Accelerate is lighting up the Vegas Strip at Resorts World Las Vegas.

98
article thumbnail

Are You a “geoSpatial Environment for Access, Retrieval & Content Hosting (gSEARCH)” Nerd?

Disaster Zone

Good ideas and concepts can come from anywhere.

100
100
article thumbnail

An Expert Disaster Recovery Plan Checklist Template for 2023

Solutions Review

Solutions Review’s Expert Insights Series is a collection of contributed articles written by industry experts in enterprise software categories. In this feature, Barracuda ‘s SVP of Data Protection offers a disaster recovery plan checklist as an essential resource to consider this year. The impact of data loss or corruption from hardware failure, human error, hacking or malware can devastate the day-to-day operations of businesses.

article thumbnail

Responding to the Firearm Violence Crisis: Are Some Newly Enacted Laws Making Things Worse?

The Rand Blog

Persuasive scientific evidence is accumulating for several commonly implemented laws. Where the science is strong, lawmakers would be wise to consider it when making decisions about how to protect public safety while preserving civil liberties, including the right to bear arms.

95
article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

Building your Ransomware Playbook

BryghtPath

Reading about the latest ransomware hack feels a lot like watching a bicyclist hurdle head-first over handlebars into a pile of gravel. “Oof, that had to hurt.” And, “boy, am I glad that wasn’t me.” But that’s where the similarity between the two stops. Because although you can take all the right steps to keep … The post Building your Ransomware Playbook appeared first on Bryghtpath.

article thumbnail

Jobs: State of Oregon Emergency Management and Resilience

Disaster Zone

Two senior positions in the state are open.

article thumbnail

Electrical Room Basics, Part 3

National Fire Protection Association

This is the last in a three-part series on electrical rooms. Read Part 1 here and Part 2 here. Working space about electrical equipment is covered in Article 110 of the NEC. Up to this point, we have discussed electrical rooms and how the National Electrical Code® (NEC®)—specifically, 110.26—helps ensure there is enough space, especially working space, in those rooms or areas.

article thumbnail

Software Supply Chain Risk Is Growing, but Mitigation Solutions Exist

The Rand Blog

Software supply chain security has emerged as a leading risk because of the massively fragmented and decentralized nature of modern software development. While we still have much to learn as a community about this risk, there are concrete steps we can take to better understand and mitigate it.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

It’s Data Privacy Week, How Are You Helping Your Clients Stay Secure?

Prism International

The 22-28 of January is Data Privacy week. In honor of this week, i-SIGMA has put together this article that you can share with clients to help them secure data in everyday life. The business world may be shifting its focus to the digital realm, but vigilant cybersecurity is only one aspect of data protection. In fact, Varonis reports that while hacking and malware attacks account for many data breaches, other breaches include much simpler methods including loss or theft of physical hard drives

article thumbnail

Mass Attacks in Public Spaces, 2016-2020

Disaster Zone

Compiled by the Department of Homeland Security

Security 100
article thumbnail

Overcoming observed challenges when adopting a zero trust architecture

Citrix

Zero trust has become a crucial component in the cybersecurity strategy of organizations everywhere. More and more enterprises are finding themselves turning toward zero trust architecture to keep their data, infrastructure, and other assets safe. As a result, this concept … The post Overcoming observed challenges when adopting a zero trust architecture first appeared on Citrix Blogs.