This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The PetaGys Powered by Oracle Solaris integrates correctly-sized hardware and data protection software into a complete onsite backup, offsite cloud, and business continuance solution. The appliance enables a fast and hassle-free setup of a comprehensive disaster recovery environment. The all-in-one solution fits perfectly for midsize IT environments with a strong support of virtualization.
What do David Lindstedt, Mark Armour, Telly Savalas, Charles Bronson and Lee Marvin have in common? What are the most effective ways to do Business Continuity (or Cyber or Crisis) planning and training? David Lindstedt and Mark Armour are spearheading Adaptive Business Continuity , a framework that brings flexible, pragmatic and iterative approaches, much like traditional 'waterfall' software development has been supplanted by Agile scrums and sprints.
In November 2018, Advisory Panel Member Lina Kolesnikova took part, as an international expert, in the regional workshop on ‘The challenges posed by terrorist acts on critical infrastructure (CI) and soft targets in the Maghreb States’.
Comprehensive BCM (business continuity management) measures are essential for responding effectively to a disruption and providing a minimum acceptable service during a disaster. A crucial aspect of BCM is the development of an effective BCP (business continuity plan). What is a business continuity plan? A BCP consists of the processes and procedures an organisation needs in order to continue operating during a disaster and recover as quickly as possible.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
Zane Lackey (…) serves on multiple Advisory Boards including the National Technology Security Coalition, the Internet Bug Bounty Program, and the US State Department-backed Open Technology Fund. (…) In this interview (…) he discusses CISO challenges, cloud security strategies, next-gen security, and much more. CISO challenges, focus on bringing security capabilities Based on your experience,… Continue reading.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
This week, Charlie discusses the Marriott hotel hack and how you can prepare your organisation for a potential data breach. You couldn’t have missed the Marriott hotel’s cyber breach and the possible loss of up to 500 million customer records in the news last week. There are a number of lessons we can learn from their response and we can use this incident to check if our organisations would have the ability, in terms of customer communications, to manage a similar breach.
IT Disaster Recovery Planning – “No worries, we have a backup?!” Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 3 minutes When asked about their organization’s IT Disaster Recovery (ITDR) plans, some will smile and say, “Yes, we have a backup and it is fully outsourced.” This type of response will set off a few red flags with the Business Continuity Planners, but many organizations do not understand why it is so problematic.
“This isn’t working.” “I’ve changed.” “I don’t see a future with you.” Those ‘breakup’ lines may apply to your Business Continuity Management software or your latest paramour. Not all relationships succeed. When things go awry, goodbye may be the best solution. But that may seem impossible – even when you know it’s necessary. You’ve invested countless hours and piles of capital (both monetary and political) populating your current BCM software.
A meat-seller website was offering 33% discount on Lamb, curry cut. Been buying from them for almost two years now. Ordered a kg online. This site had a delivery tracking option and delivered in 120 minutes. An impressive track of delivery, I must say. Washed the meat in cold water & marinated with yogurt & spices before keeping it in the fridge for an hour, covered with a cling wrap.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
An increasing number of recalls that appear in the media these days have one common factor: the companies involved just weren’t ready. A product recall can be one of the most detrimental events for a company and can have overwhelming consequences for both the company, its customers and the brand. That is why having an experienced partner, a robust, up-to-date recall plan, and access to global communication channels, is so critically important in a crisis situation.
When building out a channel program, having the right strategy and go to market plan is critical. Having the right people to deliver that strategy is the most crucial part. Where several companies fail in the channel is having a balance of both ingredients. Having a dynamic channel executive that can lead and execute that plan is sometimes difficult to find.
If history teaches us one thing it is that there is no going back. It started with the First Industrial Revolution which used water and steam power to mechanise production. This was followed by the Second which used electricity and the Third which used electronics and information technology. With the Fourth Industrial Revolution we have seen a fusion of digital technologies, the use of the Cloud and extensive data management.
In this month’s blog on free preparedness training and education it’s Robert Fagan’s pleasure to highlight the course Staying Safe: How to Be Prepared in the Modern World from the United Kingdom’s Emergency Planning College (EPC).
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
All organisations experience disruptions, whether that’s from a cyber attack, IT failure, weather event or something else, and they need to be prepared. The longer it takes to address an issue, the more the costs will spiral and the harder it will be to recover. A disaster recovery plan gives organisations a process for responding to a variety of incidents.
Your organization is only as strong as the weakest link — don’t let employees go untrained and systems unprotected. People Problem in Cybersecurity The IT department can lock down anything it wants, but all it takes is one careless human to cause a destructive breach. In a mobile society where everything is connected, human beings are… Continue reading.
This week, Charlie discusses the Marriott hotel hack and how you can prepare your organisation for a potential data breach. You couldn’t have missed the Marriott hotel’s cyber breach and the possible loss of up to 500 million customer records in the news last week. There are a number of lessons we can learn from their response and we can use this incident to check if our organisations would have the ability, in terms of customer communications, to manage a similar breach.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
IT Disaster Recovery Planning – “No worries, we have a backup?!”. Last Updated on May 31, 2020 by Alex Jankovic. Reading Time: 3 minutes. When asked about their organization’s IT Disaster Recovery (ITDR) plans, some will smile and say, “Yes, we have a backup and it is fully outsourced.” This type of response will set off a few red flags with the Business Continuity Planners, but many organizations do not understand why it is so problematic.
The immediate reaction to a cyber-security incident is the FUD factor (Fear, Uncertainty and Doubt); more like ‘chickens running around with their head cut off’. An agile response requires tested and documented Incident Response Plans – including Crisis Management, Business Continuity and IT Disaster Recovery Plans. Automating the workflow facilitates seamless collaboration and the ability to Monitor, Measure & Manage the activities that are critical to effective Cyber Security Incident Resp
15 August 2018. 07:48. It’s been ages since I have listened to a Mehfil e Sama at Hazrat Nizamuddin Auliya’s royal courtyard in Delhi. Yesterday was my long awaited meeting with my friend & author Meher Murshed , his nine years of research has resulted into ‘Song of the Dervish’, a bloomsbury gem. Almost three years back I had heard Fareed Ayaz Saab in the same courtyard at a short recital hosted by Peerzada Altamash Nizami .
In February 2018, the fast-food chicken chain KFC ran out of chicken. Because of a supply chain glitch, KFC was unable to get chicken to many of its United Kingdom restaurants. But it became more than a logistics problem when fans took to social media to voice their discontent, with some even reaching out to police via social media channels when the chain was forced to close many stores temporarily.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
At the 2018 annual Clean Pacific conference in Portland, OR, we attended a session on volunteer planning in oil spill response. The presentation focused on the different types of volunteers that can emerge during an oil spill (affiliated, spontaneous and micro), and how they can be integrated into response planning. The Clean Pacific conference is focused on oil spill response and prevention, but volunteers can be engaged in any type of emergency response—floods, wildfires, earthquakes and acts
In a recent report, the Philippine government’s Department of Information and Communications Technology (created in 2016) outlined a scale of cyber resilience based on an A to E grading system. With ‘A’ being the most robust in terms of cyber security maturity and ‘E’ being the weakest, it put the Philippines in class D. The reasoning behind this grade stems from the fact that they are reactive to attack using only the available tools and technologies.
Any organisation that imagines that a business continuity plan makes it ‘crisis prepared’ is due for a big and costly surprise, says Dr Tony Jaques Crisis management should be recognised as both a tactical and a strategic responsibility, which extends fa By Dr Tony Jaques
Whether you’re creating a disaster recovery or business continuity plan, you must conduct a risk assessment and a BIA (business impact analysis). These processes inform your decision making and are often grouped together because they tackle similar issues, but don’t think you can get away with doing only one. Think of them instead as two parts of a whole.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
With the barrage of information coming into a system, separating the noise from the genuine threats can be a difficult process. This is where AI can come in, to help you separate the real risks to your business from normal network noise. Capture Actionable Threat, security Companies’ Networks Are Overrun with Anomalies Any given company’s… Continue reading.
This week, Charlie looks at decision making during incidents and offers some tools and techniques that he has picked up through his research. For a while now, I have been thinking about and looking at ways of making decisions during incidents and have been looking at simple tools and techniques that I can teach to incident management teams. There is an art to good decision making and some people are either just good at it, or when a major decision needs to be made are just lucky they made the ri
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content