This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Reputation Management During Crisis Strong reputation management during crisis situations is critical today. While many of the resources out there will proclaim the need for immediate full transparency and constant communications through all channels, the truth is that this approach can sometimes create more trouble than it resolves. In order to make reputation management during crisis effective, you need to recognize the importance of balancing openness with strategic discretion.
With healthcare providers like Ascension hindered by cyberattacks, the Cybersecurity and Infrastructure Security Agency (CISA) offers guidance for these at-risk organizations. In early May, Ascension, a major U.S. healthcare network, was hit by a ransomware attack that impacted hospitals across 19 states. This forced the organization to revert to “downtime procedures” – meaning paper records […] The post Cybersecurity Guidance for High-Risk Nonprofits on the Heels of the Latest Healthcare
In a year where the company is already under fire from the U.S. Department of Justice and summer concert goers balking at high prices, news of a massive data breach is yet another black eye for Ticketmaster. Live Nation Entertainment, Ticketmaster’s parent company, disclosed a breach of its database to the Securities and Exchange Commission, […] The post Ticketmaster Breach May Have Exposed Millions of Users’ Data appeared first on DRI Drive.
Elevate Your Business with Proactive Crisis Preparedness In the business world, the unexpected lurks around every corner. Disruptions come without warning, carrying the power to shake your organization to its core. That’s why embracing crisis preparedness is not just wise — it’s also a critical component of savvy business operations. As we navigate an ever-more complex business environment, let’s examine why your organization should integrate robust crisis preparedness into its day-to-day operat
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
Elizabeth Van Nostrand is an associate professor in the Department of Health Services Administration and Policy at the Temple University College of Public Health. Van Nostrand is an expert in legal epidemiology—the study and application of law as an intervention to prevent disease and injury. She is the co-author of three public health emergency law bench books for health departments in the District of Columbia, Louisiana and Pennsylvania.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Elizabeth Van Nostrand is an associate professor in the Department of Health Services Administration and Policy at the Temple University College of Public Health. Van Nostrand is an expert in legal epidemiology—the study and application of law as an intervention to prevent disease and injury. She is the co-author of three public health emergency law bench books for health departments in the District of Columbia, Louisiana and Pennsylvania.
How Pure Protect //DRaaS Shields Your Business from Natural Disasters by Pure Storage Blog Summary Pure Protect //DRaaS shields your business from the rising threat of natural disasters. This cloud-based solution ensures data security, minimizes downtime, and enables rapid recovery, keeping your operations resilient against hurricanes, wildfires, and other unexpected events.
Disasters are unpredictable, but your response to them shouldn’t be. A well-thought-out disaster recovery (DR) plan is your best defense against unexpected disruptions. At the heart of any effective DR strategy is your compute solution. Today, I’ll walk you through the critical compute considerations for disaster recovery, focusing on performance, freedom of choice over technology, sizing, and support.
Veeam’s Rick Vanover offers insights on data resilience and the key to AI and cybersecurity. This article originally appeared on Solutions Review’s Insight Jam , an enterprise IT community enabling the human conversation on AI. The current conversations in the technology landscape are being driven by coverage of two topics: AI and cybersecurity.
There is currently intense interest in the possible use of artificial intelligence (AI) in the management of disasters. To what extent is this a real prospect or, alternatively, the fascination of the shiny new toy that soon will be discarded? To begin with, there are two major arguments against artificial intelligence in its current form. One should note in passing that it is not a new concept but one that has only recently begun to impinge seriously on popular consciousness.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
Daniel Reichman, Ph.D., is the CEO and chief scientist at Ai-RGUS and a member of the SIA AI Advisory Board. The physical security industry is being transformed by moving from being reactive to proactive , thanks to the integration of artificial intelligence (AI) and predictive analytics. The introduction of AI is making surveillance systems smarter, more efficient and prognostic.
Information security is a top concern for business organizations, as research finds that cyber-attacks are launched 2,244 times a day—that’s every 39 seconds. The average cost of a data breach is $3.9 million. The role of Chief Information Security Officer (CISO) is gaining popularity to protect against information security risks. Let’s take a look at the emerging CISO role.
From the WashPost, this opinion piece: As hurricane seasons worsen, taxpayers subsidize people to live in risky areas. Helene and Milton spotlight a federal flood insurance program drowning in debt. “The upshot is that FEMA flood hazard maps that determine coverage today rely on outdated information so inaccurate that more than 40 percent of NFIP claims made from 2017 to 2019 were for properties outside official flood hazard zones or in areas the agency had not mapped at all.
Disaster Recovery Institute (DRI) International, the leading nonprofit in business continuity and resilience education and certification has published its Tenth Annual Global Risk and Resilience Trends Report. The report provides an independent analysis of current and emerging risks as viewed by those directly involved in resilience management. Supported by the DRI Future Vision Committee (FVC), […] The post DRI International Releases 10th Annual Global Risk and Resilience Trends Report ap
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
Jonathan Bernstein, Chairman and Founder From WTF to WTAF: Navigating the New Normal by Jonathan Bernstein In the past year, it seems our entire nation has crossed the line from WTF to WTAF. For the uninitiated, the “A” in WTAF stands for “Actual.” It’s a term that conveys a level of disbelief and astonishment beyond what you’d expect from just a plain old WTF.
The purchase of a home is likely the biggest investment that individuals and families will ever make during their lifetimes. In this podcast we discuss navigating the potential risks of a disaster impacting the property you might purchase and how to avoid making a home buying disaster. The podcast guest is Michael Crute who is an operational strategist turned Realtor® with a wealth of experience serving prestigious clientele within the NIH, Harvard, Department of Defense, and more.
Simplify Enterprise AI with Pure Storage, Certified Storage for NVIDIA DGX SuperPOD by Pure Storage Blog Summary Pure Storage FlashBlade is now a certified storage solution for NVIDIA DGX SuperPOD. Together, they provide powerful accelerated compute, a high-performance and efficient storage platform, and AI software and tools to address the most demanding AI and HPC workloads.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
We are excited to announce that Zerto, a Hewlett Packard Enterprise company, and the industry-leading platform for disaster recovery and cloud data migration, is now available for purchase and deployment into AWS GovCloud (US) Marketplace. “ This new availability enables U.S. government agencies to seamlessly protect, migrate, and recover their critical applications within the secure, compliant environment of AWS GovCloud. ” states Christina Rauscher, Global Leader of Alliances at Zerto. “ This
And how to become resilient with ISO 27001 and ISO 22301 Unfortunately, even the most secure organisation can suffer an incident. The odds are simply stacked against you: While you need to protect all your assets from all types of threat, an attacker needs only one exploitable weakness to get into your systems. Plus, any security measure you implement is only designed to stop, at most, a handful of threats and thats assuming it was both correctly implemented and still doing its job.
Security awareness training is effective when it's designed and implemented correctly. For MSPs, it represents not only an opportunity to boost client protection and drive revenue but also to stay out of trouble by reducing liability in case of a data breach and helping clients meet cyber insurance prerequisites. Learn why security awareness training can be a major asset in an MSPs list of services.
Steve Reinharz is president of Robotic Assistance Devices and a member of the SIA Board of Directors. The remote video monitoring industry has experienced significant growth in recent years, driven by the increasing demand for security solutions among businesses and homeowners; however, as the industry expands, it faces important challenges, particularly the reliance on human operators to manage alerts and monitor video feeds.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
The Need for Speed in Threat Mitigation There used to be weeks between the announcement of a zero-day vulnerability and the next exploit. Now we have days or hours to patch the vulnerability, says Carsten Fischer, Deputy Chief Security Officer at Deutsche Bank. Sometimes threat actors are in the machine even as the patch is being tested. With such a small window of reaction time, mitigation must be faster.
From the NYTimes: Bizarre Falsehoods About Hurricanes Helene and Milton Disrupt Recovery Efforts. Experts warn that weather-related disinformation can rapidly escalate into real-world risks and distract from aid. An excerpt: “Online climate-related conspiracy theories can quickly cause damage offline, disrupting emergency communications and recovery efforts.
Each year, the DRI International Awards of Excellence program honors the leaders and innovators in the fields of continuity management, technology recovery, and crisis and risk management. Were pleased to announce this year’s finalists! Consultant of the Year Javed Abbasi, MBCP – GISBA Quinn Einck, CBCP – BDO Lisa Jones, MBCP – Control Risks Newcomer […] The post Announcing the 2025 DRI Awards of Excellence Finalists!
Understanding Crisis Management for Businesses Believe it or not, many businesses still don’t understand the importance of crisis management While shows like Scandal and Succession have helped bring a basic understanding of crisis management to the general public, far fewer understand the business case for crisis management as a valuable tool for any organization rather than a high-level tool for political candidates or household names.
Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.
Increasing risks and increasing technology are the topics in this podcast. How to manage technology and risks that extend from the cyber perspective all the way to corporate leadership and climate change. This is one of the most engaging conversations that the Disaster Zone Podcast has had with a true subject matter expert. Leaders in business and government should listen to this podcast.
How a Data Platform Can Unlock Silos to Accelerate AI Pipelines by Pure Storage Blog Summary To unlock the full potential of AI, you’ll need to unify data silos and establish efficient data operations. A modern storage solution like FlashBlade eliminates the need for multiple fragmented systems, simplifies data management, and ensures seamless scalability.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content