article thumbnail

Book Review: Disaster Management and Information Technology

Recovery Diva

Book Review: Disaster Management and Information Technology: Professional Response and Recovery Management in the Age of Disasters. Published by Springer Publishers; ISBN-10 3031209389; Price is $100. Editors: Hans Jochen Scholl, Eric E. Holdeman, F. Kees Boersma.

article thumbnail

Article by the Diva in South Korean Newspaper

Recovery Diva

Translated article from the South Korean newspaper The Segye Times , written by reporter Yeongjun Park from; published in Dec. “FEMA also provides training courses to state agencies and many universities that offer emergency management training and degrees.” 26 (local time). .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 10 Resources to Help You Become a BCM Ninja 

MHA Consulting

Then as now, the government published resources to help organizations protect themselves. Contains links to toolkits for preparing for different hazards as well as pages on Emergency Response Plans, Crisis Communications Plans, Incident Management, IT/DR, and much more. Prepare My Business for an Emergency.

BCM 98
article thumbnail

The SEPA Cyber Attack a Case Study

Plan B Consulting

Over the last four weeks, I have been publishing a running commentary on their response here. The Yang While SEPA’s response was not exactly a John Smeaton “This is Glasgow. They say that data stolen from the Scottish government agency has been published online. They have also said that they lost 1.2

article thumbnail

The SEPA Cyber Attack a Case Study

Plan B Consulting

Over the last four weeks, I have been publishing a running commentary on their response here. While SEPA’s response was not exactly a John Smeaton “This is Glasgow. They say that data stolen from the Scottish government agency has been published online. They have also said that they lost 1.2 The article can be read here.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

These functions are further broken down into categories and subcategories that detail leading information security practices, incident response strategies, and effective ransomware recovery techniques. Toward that end, NIST has published a list of nine steps to achieve compliance. Categorize data and information you need to protect.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

These functions are further broken down into categories and subcategories that detail leading information security practices, incident response strategies, and effective ransomware recovery techniques. Toward that end, NIST has published a list of nine steps to achieve compliance. Categorize data and information you need to protect.