2025

article thumbnail

DRI International Releases 10th Annual Predictions Report, Highlighting Risk and Resilience Trends for 2025

DRI Drive

New York, NY Disaster Recovery Institute (DRI) International, the leading nonprofit in business continuity and resilience training, has published its 10th Annual Predictions Report resilience predictions for the profession, by the profession. The report provides an in-depth look ahead to major global issues that resilience professionals may deal with in the coming year. […] The post DRI International Releases 10th Annual Predictions Report, Highlighting Risk and Resilience Trends for 202

article thumbnail

OUR CHALLENGE

Emergency Planning

Resilience is an illusion. In saying that I mean no disrespect to resilience officers, whose work is honourable, vital and necessary. However, whether resilience has as its goal to 'bounce back' or to 'bounce forward', it represents a tendency to seek homeostasis, in other words a quest for an eventual stable equilibrium. But in the disasters field we have no equilibrium.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Joke’s on Whom? Navigating Humor in Crisis Management

Bernstein Crisis Management

The Jokes on Whom? Navigating Humor in Crisis Management By Ella Kate Baker Introduction by Jonathan Bernstein When Ella Baker from The University of AlabamasCollege of Communication and Information Sciences contacted me about being interviewed for this Platform Magazine article, my first response to her was Wow, what a great story angle! I have been interviewed scores of times in my career, and written very extensively, but humor in crisis management has never been a topic!

article thumbnail

Why Cybercriminals Are Targeting Your Backups and How to Be Prepared

Solutions Review

Most organizations believe they’re prepared for ransomware attacks with a simple strategy: maintain good backups and use them to restore systems if cybercriminals encrypt their data. However, there’s a dangerous flaw in this approach that many overlook attackers are increasingly targeting backup systems themselves, leaving organizations with no path to recovery.

Backup 106
article thumbnail

Emergency Preparedness: Active Shooter Tabletop Exercise

April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.

article thumbnail

Self-Imposed Barriers to Technology Adoption

Disaster Zone Podcast

Technology is a driving force in public safety today. There are multiple challenges that come with considering which technologies should be adopted and fielded within an organization. Before that can happen, we need to collectively overcome self-imposed barriers to technology adoption, which is the subject of this Disaster Zone Podcast. The podcast guest is Garry Briese who has had a distinguished career in the fire service.

More Trending

article thumbnail

Pure Storage Partners with CERN openlab to Evaluate the Benefits of Flash for Scientific Research 

Pure Storage

Pure Storage Partners with CERN openlab to Evaluate the Benefits of Flash for Scientific Research by Pure Storage Blog Summary Pure Storage and CERN openlab are working together to research how the European Laboratory for Particle Physics will use flash storage to support future research needs. Pure Storage has announced a partnership with CERN (the European Laboratory for Particle Physics), which aims, through the CERN openlab collaboration, to accelerate the development of cutting-edge ICT sol

article thumbnail

FEMA Expected to Lose 20% of Staff Before Hurricane Season

Recovery Diva

From CNN : FEMA losing roughly 20% of permanent staff, including longtime leaders, ahead of hurricane season “The agency tasked with delivering billions of dollars in assistance to communities devastated by natural disasters is about to lose a huge portion of its workforce, including some of its most experienced and knowledgeable leaders who manage disaster response.

article thumbnail

How Cybercriminals Are Leveraging AI to Build Better Attacks

NexusTek

How Cybercriminals Are Leveraging AI to Build Better Attacks January 23, 2025 Paul Barrett VP, Sales Enablement With decades of experience in the IT and cybersecurity space, Ive had the privilege of guiding midsize businesses through the complexities of an ever-changing technology landscape. In recent years, artificial intelligence (AI) has emerged as both a transformative force for innovation and a potent tool for cybercriminals.

Malware 111
article thumbnail

The Dark Side Of Chatbots: Who’s Really Listening To Your Conversations?

LAN Infotech

Chatbots like ChatGPT, Gemini, Microsoft Copilot and the recently released DeepSeek have revolutionized how we interact with technology, offering assistance with almost every task imaginable from drafting e-mails and generating content to writing your grocery list while keeping it within your budget. But as these AI-driven tools weave themselves into our daily routines, questions about data privacy and security are becoming harder to ignore.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

SIA New Member Profile: Zeptive

Security Industry Association

New Security Industry Association (SIA) member Zeptive is a provider of state-of-the-art vape detection and air quality monitoring technology for schools, businesses and public spaces. The company is headquartered in Andover, Massachusetts, and its patented smart safety sensors are designed and built in the United States and sold globally to schools and businesses through its network of distributors, resellers and integrators.

article thumbnail

DRI International Releases 10th Annual Predictions Report, Highlighting Risk and Resilience Trends for 2025

DRI Drive

New York, NY Disaster Recovery Institute (DRI) International, the leading nonprofit in business continuity and resilience training, has published its 10th Annual Predictions Report resilience predictions for the profession, by the profession. The report provides an in-depth look ahead to major global issues that resilience professionals may deal with in the coming year. […] The post DRI International Releases 10th Annual Predictions Report, Highlighting Risk and Resilience Trends for 202

article thumbnail

Top Architecture Blog Posts of 2024

AWS Disaster Recovery

Well, its been another historic year! Weve watched in awe as the use of real-world generative AI has changed the tech landscape, and while we at the Architecture Blog happily participated, we also made every effort to stay true to our channels original scope, and your readership this last year has proven that decision was the right one. AI/ML carries itself in the top posts this year, but were also happy to see that foundational topics like resiliency and cost optimization are still of great int

article thumbnail

Conducting a Threat Risk Assessment: A Step-by-Step Guide

KingsBridge BCP

The Essential Guide to Conducting a Threat Risk Assessment (TRA) The ability to identify and manage risks is the foundation of any resilient business. In todays fast-paced and unpredictable world, businesses face a wide range of threatsfrom natural disasters to cyberattacks. The question isnt if these threats will occur, but when. Thats why a Threat […] The post Conducting a Threat Risk Assessment: A Step-by-Step Guide appeared first on KingsBridgeBCP.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Modernize Your NOC: A 2025 Guide to Reducing IT Costs and Protecting Profits by Constant Fischer

PagerDuty

You can no longer afford to ignore the silent profit killers lurking in your operations. From bloated IT budgets to unplanned downtime and inefficient incident management, these hidden costs can drain your revenue, eroding customer trust, and exposing your company to financial penalties. The solution? A radical shift toward lean and modern Network Operations Centers (NOCs), digital resilience, and a relentless pursuit of inefficiencies.

Outage 71
article thumbnail

Disaster Accountability Project

Disaster Zone Podcast

As this is being written the firestorm in California is continuing. It is not only government that responds to disasters and the needs of disaster survivors and victims. The Disaster Accountability Project was created to help coordinate nongovernmental organizational efforts. To date, the site has more than 900 organizations registered worldwide. Following a stringent review process, organizations are presented with information that displays proximity to a specific crisis, and the range of servi

article thumbnail

Considerations for Disaster Recovery – Part 3: Networking

Zerto

In todays hyper-connected digital landscape, downtime is not merely an inconvenienceit is a threat to business survival. From lost revenue to reputational damage, the cost of operational interruptions can be staggering. To navigate these challenges, organizations must adopt a comprehensive disaster recovery (DR) strategy. At the heart of any successful DR plan lies a robust networking infrastructure.

article thumbnail

How to Set Up a Secure Isolated Recovery Environment (SIRE)

Pure Storage

How to Set Up a Secure Isolated Recovery Environment (SIRE) by Pure Storage Blog If youve suffered a breach, outage, or attack, theres one thing you should have completed and ready to go: a secure isolated recovery environment (SIRE). This should be set up in advance, tested, and in a ready state to be transitioned into quickly after an event. With these steps completed, your infrastructure will be in place, giving you one less thing to worry about when youre being pressured to get the business

Security 122
article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

Loss of FEMA Leaders Raises Concern about FEMA’s Readiness

Recovery Diva

From HSToday: Senior Leader Departures Raise Concerns About FEMAs Disaster Readiness “In a troubling development for Americas emergency preparedness, FEMA is experiencing an unprecedented exodus of leadership and staff just weeks away from the 2025 Danger Season1. Over a dozen senior leaders including those with the most disaster recovery experience have either resigned or been fired, according to recent reports.

article thumbnail

The Latest Microsoft Ignite and I’m Not Mad About It

NexusTek

The Latest Microsoft Ignite and Im Not Mad About It January 10, 2025 JP Pilkin Vice President, Advanced Solutions Group This years event in Chicago was packed with insights on how Microsoft plans to leverage its massive user base, drive AI adoption, address security challenges, and continue leading innovation in the cloud. Here are my top observations: 1.

Strategic 105
article thumbnail

Hackers Might Not Ransom You Anymore – They’ll Just Extort You Instead!

LAN Infotech

Think ransomware is your worst nightmare? Think again. Hackers have found a new way to hold your business hostage and it may be even more ruthless than encryption. Its called data extortion , and its changing the rules of the game. Heres how it works: They dont bother encrypting your files anymore. Instead, they just steal your sensitive data and threaten to leak it unless you pay up.

Backup 96
article thumbnail

Security Industry Association Announces 2025 SIA Women in Security Forum Power 100 Honorees

Security Industry Association

Now in its fourth year, the SIA WISF Power 100 program showcases 100 women who are role models, leaders, innovators and influencers in the global security industry. SILVER SPRING, Md. The Security Industry Association (SIA) has announced the 2025 honorees for the SIA Women in Security Forum (WISF) Power 100. This initiative, presented by the SIA Women in Security Forum , honors 100 women in the security industry each year whose outstanding accomplishments and success stories are breaking barrie

Security 105
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

DRI International Awards ‘Resilient Enterprise’ Designation to ADCMC

DRI Drive

The first accredited emergency center worldwide to receive this DRI accreditation New York, NY February 5, 2025 Disaster Recovery Institute (DRI) International, the leading nonprofit in business continuity and resilience education and certification, is pleased to announce that The Abu Dhabi Crisis Management Center (ADCMC) has received the DRI accreditation of Resilient Enterprise […] The post DRI International Awards ‘Resilient Enterprise’ Designation to ADCMC appeared first

article thumbnail

Business Process Automation: What It Is and How to Use It

LogisManager

Business Process Automation: What It Is and How to Use It Last Updated: January 14, 2025 Business process automation (BPA) is critical in a constantly advancing landscape. With increasing regulatory pressures and a need for operational agility, your role as a risk manager becomes more complex and essential. There’s where BPA steps in as a game-changer, automating processes to save time, reduce costs and enhance efficiency across your organization.

article thumbnail

World Backup Day Quotes from Experts for 2025

Solutions Review

Solutions Review’s Executive Editor Tim King compiled this roundup of World Backup Day quotes from experts for 2025, part of our ongoing coverage of the enterprise storage and data protection market. In the age of AI, ransomware, and relentless cyber threats, data protection is no longer just an IT issue its a boardroom imperative. As part of Solutions Review’s ongoing coverage of the enterprise storage, data protection, and backup and disaster recovery markets, our editors bring yo

Backup 59
article thumbnail

Raising the Bar: More Power, More Value in PagerDuty’s Packaging by PagerDuty

PagerDuty

Incident management is evolving, and so are we. Over the last year, we have significantly updated our Enterprise plan for Incident Management offering, reinforcing our commitment to providing comprehensive solutions that go beyond incident response to support operations broadly. Our mission remains clear: every team deserves access to the best incident management availablewithout compromise.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

Long-term Disaster Resilience

Disaster Zone Podcast

We continue to see disasters increase in size, frequency and impact. What are we doing wrong when it comes to disaster resilience, especially as it impacts our ability to adapt to the climate impacts that are experiencing and take a longer view to disaster resilience. The podcast guest is Jeff Schlegelmilch an Associate Professor for Professional Practice in Climate.

article thumbnail

Why Cyber Vaults are Essential to a Bulletproof Cyber Resilience Strategy

Zerto

With the help of UserEvidence, we recently surveyed more than 100 Zerto users to learn why they purchased their Zerto solution, whats their approach to cyber resilience, and what they are looking for in a cyber vault. Here are some of our key findings. Why our customers purchased Zerto Zerto combines ransomware resilience , disaster recovery , and multi-cloud mobility into one solution.

article thumbnail

Downtime Will Cost You: Why DRaaS Is No Longer Optional

Pure Storage

Downtime Will Cost You: Why DRaaS Is No Longer Optional by Pure Storage Blog Summary Unforeseen disruptions like natural disasters, cyberattacks, or hardware failures can pose a significant threat to companies and their financial and reputational health. Investing in disaster recovery as a service (DRaaS) can help businesses stay resilient. In todays digital economy, constant uptime is crucial to maintaining productivity, revenue, and customer trust.