Sat.Jan 04, 2025 - Fri.Jan 10, 2025

article thumbnail

Data protection trends to follow in 2025

Zerto

In 2024, data protection strategies and solutions pivoted toward cyber security more than ever. With cyberattacks like ransomware directly impacting access to data and applications, the role of data protection in the security framework has become vital. Similarly, data protection became a focus of increased government regulations and changing industry standards.

article thumbnail

DRI International Releases 10th Annual Predictions Report, Highlighting Risk and Resilience Trends for 2025

DRI Drive

New York, NY Disaster Recovery Institute (DRI) International, the leading nonprofit in business continuity and resilience training, has published its 10th Annual Predictions Report resilience predictions for the profession, by the profession. The report provides an in-depth look ahead to major global issues that resilience professionals may deal with in the coming year. […] The post DRI International Releases 10th Annual Predictions Report, Highlighting Risk and Resilience Trends for 202

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

This Disaster Recovery Information Site is 14 Year Olds and Contains a Current Archive

Recovery Diva

Given the magnitude of the CA fire disasters, the Diva wants to be helpful to as many people as possible.On this site, she not only posts nearly daily news articles on recovery topics, but she also pays an expert to review and correct the URLs for all articles cited. Just use the Search function to research your topic of interest.

article thumbnail

The Latest Microsoft Ignite and I’m Not Mad About It

NexusTek

The Latest Microsoft Ignite and Im Not Mad About It January 10, 2025 JP Pilkin Vice President, Advanced Solutions Group This years event in Chicago was packed with insights on how Microsoft plans to leverage its massive user base, drive AI adoption, address security challenges, and continue leading innovation in the cloud. Here are my top observations: 1.

Strategic 102
article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

What Are Air Gaps and Are They Effective Data Security Strategies?

Pure Storage

What Are Air Gaps and Are They Effective Data Security Strategies? by Pure Storage Blog This is part one in a series about air gaps and resiliency architectures. Read part two: Without A Tiered Backup Architecture, Are You Truly Resilient? Ransomware attackers are ruthless opportunistsbut that doesnt mean we should make their jobs any easier. Take the attack on Colonial Pipelines back offices.

More Trending

article thumbnail

Coming Soon: A New Book on Recent Large Scale Disasters

Recovery Diva

Soon to be released in hard copy and electronic versions: U.S. Emergency Management in the 21st Century From Disaster to Catastrophe Note that the Diva is one of the editors. She hopes copies will be available sooner than indicated.

article thumbnail

Acronis names Gerald Beuchelt as Chief Information Security Officer

Acronis

Acronis has named Gerald Beuchelt as its new CISO. He will play a pivotal role in expanding Acronis' influence in the cybersecurity community. Beuchelt will lead new research, reports and threat intelligence initiatives from the Acronis Threat Research Unit (TRU).

article thumbnail

Security Industry Association Welcomes New Leadership of SIA Perimeter Security Subcommittee

Security Industry Association

Christa Decker of Whitman, Requardt & Associates and Amy Dunton of Ameristar will oversee the subcommittees efforts to support the protection of crowded spaces, critical infrastructure and government facilities. SILVER SPRING, Md. The Security Industry Association (SIA) has named two industry leaders Christa Decker, vice president of the Protective Design Group at Whitman, Requardt & Associates (WRA), and Amy Dunton, business development specialist at Ameristar to serve as co-chairs o

article thumbnail

Leveraging Business Continuity Plans in Turbulent Times

BryghtPath

Organizations must possess robust strategies to navigate turbulent times effectively in an era of unpredictable challenges, ranging from internal disruptions to external crises. Business Continuity Plans (BCPs) are vital tools that enable organizations to maintain critical operations, safeguard assets, and foster resilience. This article delves into how organizations can use and enhance their BCPs during … The post Leveraging Business Continuity Plans in Turbulent Times appeared first on B

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

CA Fires – the home insurance crisis

Recovery Diva

From CBSNews: Californias insurance is in crisis. The solution will cost homeowners a ton.

Insurance 100
article thumbnail

Downtime Will Cost You: Why DRaaS Is No Longer Optional

Pure Storage

Downtime Will Cost You: Why DRaaS Is No Longer Optional by Pure Storage Blog Summary Unforeseen disruptions like natural disasters, cyberattacks, or hardware failures can pose a significant threat to companies and their financial and reputational health. Investing in disaster recovery as a service (DRaaS) can help businesses stay resilient. In todays digital economy, constant uptime is crucial to maintaining productivity, revenue, and customer trust.

article thumbnail

2025 GRC Resolutions for Your Business 

Reciprocity

While personal New Year’s resolutions often fade by February, your organization’s GRC resolutions can’t afford to falter. The stakes are too high in an environment of evolving regulations, emerging cyber threats, data breaches, and increasing stakeholder expectations. Companies that fail to adapt their GRC programs face not just compliance risks, but potential damage to their reputation, operations, and bottom line.

Audit 52
article thumbnail

Master Your Business’s Resilience with BCP Builder

BCP Builder

In todays fast-paced and unpredictable world, having a solid business continuity plan (BCP) is no longer optionalits a necessity. Whether you’re navigating natural disasters, cyberattacks, or unexpected disruptions, the ability to respond quickly and recover efficiently can determine the survival of your business. Enter BCP Builder, an intuitive online platform offering a comprehensive business continuity plan template to empower businesses of all sizes.

BCP 52
article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

How to scan for malware?

Acronis

Learn how to scan for malware step by step with this comprehensive guide to keep your devices protected. Get the best antimalware from Acronis True Image.

Malware 52
article thumbnail

Leveraging Large Language Models for STRIDE Threat Modeling—A Scalable and Modular Approach to Secure PoCs and Agile Projects

Pure Storage

Leveraging Large Language Models for STRIDE Threat ModelingA Scalable and Modular Approach to Secure PoCs and Agile Projects by Pure Storage Blog Summary The security of PoCs and MVPs is often an afterthought, leaving them vulnerable to threats. Threat Model Mentor automates the STRIDE methodology using GPT-based models and makes threat modeling accessible to development teams.

article thumbnail

What is operational resilience?

everbridge

Operational resilience is the ability of an organization to deliver critical business operations, even during disruptions. This concept, as defined by the European Banking Authority, emphasizes ensuring that essential services continue to function amid challenges such as cyber-attacks, natural disasters, regulatory changes, or supply chain disruptions.

article thumbnail

Impact Analysis for Enterprise Resiliency Program

eBRP

Ensuring enterprise resilience involves evaluating service criticality, analyzing asset dependencies, and assessing current capabilities while addressing risks and potential disruptions. This process identifies vulnerabilities, threats, and availability parameters to safeguard the organization’s mission, reputation, and service levels.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

What is the best laptop backup software available in the cybersecurity market today?

Acronis

Explore the top laptop backup solutions and find the perfect software for your needs and requirements with this expert guide from Acronis.

Backup 52
article thumbnail

On-premises vs. Cloud: Differences, Benefits, and Risks

Pure Storage

On-premises vs. Cloud: Differences, Benefits, and Risks by Pure Storage Blog Summary Choosing between cloud or on-premises data storage isnt so simple. Each has its pros and cons. Consider factors such as compliance, ease of use, security, and resilience in your decision-making process. While its tempting to compare the pros and cons of cloud versus on-premises IT, such comparisons oversimplify the issues.

Backup 52
article thumbnail

RFP Definition, Steps & Template for Requests for Proposals

BMC

No matter your industry, the time will come when you must submit a Request for Proposalknown simply as an RFP. At some point, your company must purchase a product or service from a third-party vendor. The RFP is a solicitationyou ask vendors whether and how they can solve your problem and support your project. Although RFPs are a prevalent standard in the business world, they still lead to a lot of confusion for many.

article thumbnail

Conducting a Threat Risk Assessment: A Step-by-Step Guide

KingsBridge BCP

The Essential Guide to Conducting a Threat Risk Assessment (TRA) The ability to identify and manage risks is the foundation of any resilient business. In todays fast-paced and unpredictable world, businesses face a wide range of threatsfrom natural disasters to cyberattacks. The question isnt if these threats will occur, but when. Thats why a Threat […] The post Conducting a Threat Risk Assessment: A Step-by-Step Guide appeared first on KingsBridgeBCP.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

How to Communicate During a Cyber Attack

Plan B Consulting

Crisis communications during a cyber attack Online – 11am – 4th February 2025 When responding to a cyber incident, your communications arethekeyfactorindeterminingsuccess or failure.Your stakeholders’ perception of how well you managed an incidentcan also be decisive. In this webinar, Charlie Maclean-Bristol, Director ofPlanB, will discuss the statutory and regulatory requirements for communications during a cyber incident,and how your organisation can prepare to deal withone.

article thumbnail

Pure Fusion Fleet Management with Pure Cloud Block Store

Pure Storage

Pure Fusion Fleet Management with Pure Cloud Block Store by Pure Storage Blog Summary With the new fleet management feature in Pure Fusion, you can manage a group of multiple Pure Cloud Block Store instances from a single place. If you have a large number of Pure Cloud Block Store cloud-based arrays in your environment, it may be difficult to manage them together.

article thumbnail

RFP Definition, Steps & Template for Requests for Proposals

BMC

No matter your industry, the time will come when you must submit a Request for Proposalknown simply as an RFP. At some point, your company must purchase a product or service from a third-party vendor. The RFP is a solicitationyou ask vendors whether and how they can solve your problem and support your project. Although RFPs are a prevalent standard in the business world, they still lead to a lot of confusion for many.

article thumbnail

Security Industry Association Welcomes New SIA New Products and Solutions Awards Leadership, Opens Call for 2025 Entries

Security Industry Association

Under the leadership of Visas Christine Bergeron and EMDs Elisa Mula, the SIA NPS Awards program is the premier industry event to recognize new and innovative security products and services. SILVER SPRING, Md. TheSecurity Industry Association(SIA) has named a new chair and vice chair to lead the steering committee for the SIA New Products and Solutions (NPS) Awards , the premier industry event to recognize new and innovative security products and services.

Security 111
article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha