Trending Articles

article thumbnail

What the LA Fires Taught Us About Disaster Recovery

Disaster Zone Podcast

The Los Angeles fires will likely be the costliest natural disaster in our history. While they started as wildfire, they changed into an urban conflagration. Thousands of homes were destroyed along with other building structures, including businesses. In this podcast we’ll look at these impacts fires their destruction from the perspective of a private business that specializes in disaster recovery efforts.

article thumbnail

New Scorecard Measures Gaps In Wildfire Preparedness

Continuity Insights

I n 2023, more than 1,000 wildfires in Alberta, Canada broke records with the size of the area they destroyed — including more than 100 homes — triggering mass evacuations and causing widespread concerns about air quality. Last year’s wildfire season was equally intense, with nearly 1,200 fires, including the Jasper Wildfire Complex, which displaced 25,000 people and destroyed a third of the town.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Book on Recent Large Scale Disasters Now Available

Recovery Diva

The second edition of U.S. Emergency Management in the 21st Century From Disaster to Catastrophe was released in May and is readily available. Note that the Diva is one of the editors. Our understanding of hazards and disasters is rapidly changing, and it is unclear as to whether our existing management systems are adequate to adapt to current and future disasters.

article thumbnail

Securing Summer Festivals and Public Events: Insights From SIA’s Perimeter Security Subcommittee

Security Industry Association

As warm weather arrives, many people are looking forward to summer festivals and outdoor events coming up this season. Its important for festival and event organizers to keep security top of mind when planning for these events one of the issues that will be addressed at Perimeter PREVENT , the premier perimeter security event, taking place in Washington, D.C., June 18.

article thumbnail

Supply Chain Resilience Checklist

Strengthen your operations with the Supply Chain Resilience Checklist. This practical, easy-to-use tool helps your organization prepare for disruptions and ensure long-term continuity in an unpredictable world. Why Download: Identify and assess critical supply chain risks Ask the right questions to evaluate vendor preparedness Implement effective strategies to reduce vulnerabilities Improve communication, transparency, and coordination across your network What You’ll Learn: How to evaluate and m

article thumbnail

Why the Future of High-performance Computing Will Depend on Data Storage

Pure Storage

Why the Future of High-performance Computing Will Depend on Data Storage by Pure Storage Blog Summary Traditional storage has become a bottleneck, limiting the full potential of HPC environments. The future of HPC and scientific breakthroughs hinges on having a platform that is specifically engineered for these data-intensive workloads. High-performance computing (HPC) sits at the intersection of scientific discovery and technological innovationwhether it’s simulating climate models, analy

More Trending

article thumbnail

Loss of Another EM Info Source

Recovery Diva

From HSToday: U.S. Fire Administration to Close Emergency Management Information Sharing and Analysis Center Within Days The Diva does not have personal experience with this Center and welcomes comments from readers who do.

article thumbnail

Data and AI for Decision-Support and Policy

National Center for Disaster Prepardness

Image: Whitehall Street Station Flooding LEAP Wallerstein Panel Series: AI + Extreme Weather Preparedness Based on panel presentations and discussions by Dr. Terri Adams-Fuller, Dr. Equisha Glenn, and Dr. Miguel-ngel Fernndez-Torres. Machine learning (ML) and artificial intelligence (AI) offer new avenues to provide data and build decision support tools that can facilitate extreme weather preparedness and life-saving decision-making in the case of disasters.

article thumbnail

The Power of Layered Security

Security Industry Association

Defenses should not be limited to the internal environment Rich McElwain is senior solutions consultant – strategic accounts at Flock Safety. Security is no longer just a single-layered effort. Whether managing a retail store, hospital or warehouse, securing a property requires a multifaceted approach that considers both physical and digital threats.

article thumbnail

Susan Koski: How to Manage the Move to the Post-Password Cyber Landscape

FS-ISAC

How to Manage the Move to the Post-Password Cyber Landscape Fraud is one of the sector’s biggest concerns, but passwords aren’t much of an obstacle to today’s innovative cybercriminals. Biometrics are the next frontier, but how do you get customers to accept the pivot? Susan Koski, Chief Information Security Officer, PNC, has been examining the challenge and recommends managing by facts and known risks, understanding fraud prevention as a cross-sector problem, and remembering that the customer e

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Beyond Static Playbooks: Designing Adaptive Response Plans

eBRP

From cyber incidents and conflict-related events to supply chain disruption and operational outages, organizations face complex scenarios that often demand coordinated, and more effective responses than traditional continuity plans can deliver. Yet many plans remain static — created for predefined scenarios, often disconnected from the real life conditions they’re meant to address.

article thumbnail

Risk Assessment Best Practices: Transform Your Risk Management Strategy

Reciprocity

Traditional risk management approaches are leaving organizations exposed to mounting threats. The old playbook of annual reviews and spreadsheet tracking simply can’t keep pace. Modern businesses need integrated, real-time risk assessments that transform reactive damage control into proactive competitive advantage. Ready to modernize your strategy and protect your organization from costly incidents?

article thumbnail

SQL Server 2025: Enterprise AI without the Learning Curve

Pure Storage

SQL Server 2025: Enterprise AI without the Learning Curve by Pure Storage Blog Summary Microsoft SQL Server 2025 offers AI capabilities that are directly integrated into T-SQL, enabling organizations to leverage their existing investments in SQL Server infrastructure, skills, and processes. This blog initially appeared on Anthony Nocentinos blog. It has been republished with the writers credit and consent.

article thumbnail

From ISC West 2025 to RSAC25: Cybersecurity Takeaways From Two of the Top Security Events

Security Industry Association

As spring comes to an end, the Security Industry Association (SIA) Cybersecurity Advisory Board is looking back at two of the most significant security events in the world: ISC West (North America’s largest converged security event) and RSA Conference (RSAC) (the world’s largest cybersecurity event). In this article, Cybersecurity Advisory Board member John Gallagher, vice president at Viakoo, shares cybersecurity takeaways from both shows and examines key themes discussed at the events.

article thumbnail

Emergency Preparedness: Active Shooter Tabletop Exercise

April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.

article thumbnail

Meg Anderson: Lessons in Cyber Leadership From a Trailblazing CISO

FS-ISAC

Lessons in Cyber Leadership From a Trailblazing CISO The goal of information security is to not react to the change. It's to learn about change in advance. That’s one of the many lessons Meg Anderson, Former CISO, Principal Financial Group, has learned after 40 years in cybersecurity. It’s a lesson she’s instilled in her teams, along with the power of saying no, the vital importance of developing a pipeline, and why cyber leaders need business leaders’ trust.

article thumbnail

Erwood’s Laws of Business Continuity and IT Disaster Recovery

Erwood Group

ERWOODS LAWS Erwoods Laws of Business Continuity and IT Disaster Recovery Executive Summary: Erwoods Laws of Business Continuity and IT Disaster Recovery Erwoods Laws of Business Continuity and IT Disaster Recovery , authored by Keith Erwood and inspired by Murphys Laws of Combat, delivers a sharp, pragmatic perspective on the realities of managing business crises.

article thumbnail

From chaos to control: building a business continuity plan that works

SRM

Running a business is often about controlling the controllables. And while this can be particularly challenging when it comes to managing information security risk, its particularly important in this area. To recap: a Business Continuity Plan (BCP) is a strategy put in place to help a business recover from disruption, whether this takes the form of a cyberattack, natural disaster, or geopolitical conflict.

article thumbnail

SQL Server 2025: Enterprise AI without the Learning Curve

Pure Storage

SQL Server 2025: Enterprise AI without the Learning Curve by Pure Storage Blog Summary Microsoft SQL Server 2025 offers AI capabilities that are directly integrated into T-SQL, enabling organizations to leverage their existing investments in SQL Server infrastructure, skills, and processes. This blog initially appeared on Anthony Nocentinos blog. It has been republished with the writers credit and consent.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Around the CAB May 2025: Cybersecurity Advisory Board Members Share Highlights From ISC West

Security Industry Association

As we head into summer, the Security Industry Association (SIA) Cybersecurity Advisory Board is looking back at ISC West , North America’s largest converged security event. A topic that was top of mind at ISC West in 2025 was artificial intelligence. AI is rapidly growing across industries, being used for operational improvements and security capabilities.

article thumbnail

Debbie Janeczek: How to Prepare for the Quantum Revolution

FS-ISAC

How to Prepare for the Quantum Revolution The quantum revolution is coming to the financial sector. Debbie Janeczek, Global Chief Information Security Officer, ING, is preparing for it and says the rest of the sector should, too. She suggests starting with building leadership’s awareness of quantum risks, inventorying algorithms, and developing the skill sets needed for post quantum cryptography.

article thumbnail

BCAW+R 2025 – Some Thoughts

Plan B Consulting

In todays bulletin, Charlie discusses the webinars that were showcased by the BCI during BCAW and gives an insight into this years theme, Empowering Resilience with AI. This week, I was asked to write my bulletin on BCAW+R 2025 (Business Continuity & Resilience Awareness Week). With two days dedicated to cyber training and the other two spent preparing for and conducting a major exercise, I havent had much opportunity to watch many of the webinars.

article thumbnail

5 Common Mistakes in Healthcare Resilience Planning and How to Avoid Them

Erwood Group

Avoiding Common Healthcare Resilience Mistakes 5 Common Mistakes in Healthcare Resilience Planning and How to Avoid Them Ensuring uninterrupted patient care is a top priority. That’s where healthcare resilience planning comes in. Healthcare resilience is a strategic process designed to prepare for and adapt to disruptions, from natural disasters to cyberattacks.

article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

Transforming Recovery Operations: Pure Storage and Commvault’s Partnership in Cyber Resilience

Pure Storage

Transforming Recovery Operations: Pure Storage and Commvault’s Partnership in Cyber Resilience by Pure Storage Blog Summary Commvault, a global leader in cyber resilience, is both a trusted partner and customer of Pure Storage. The company leverages FlashBlade//S to protect its most critical workloads. When disruption strikes, businesses need to recover fast.

article thumbnail

Planning a Holistic Counterdrone Program

Security Industry Association

Preparedness and the right architecture can provide powerful defenses Andrew Corsaro is the vice president of consulting services for ZBeta. The proliferation of uncrewed aerial systems (UAS), better known as drones, presents unique challenges for physical security. From nuisance incidents to deliberate malicious actions, the potential for drones to threaten privacy, safety and security is prompting many organizations to consider revising their physical security programs.

article thumbnail

Jochen Friedemann: The Fun Side of Financial Services Cybersecurity

FS-ISAC

The Fun Side of Financial Services Cybersecurity Financial services cybersecurity has its challenges – but it’s also interesting, varied, and just plain fun, says Jochen Friedemann, Chief Information Security Officer at Talanx , the Hanover-based insurance/re-insurance firm. Cybersecurity is also more impactful than it’s ever been, thanks to cyber’s importance to senior management, with more educational and career opportunities than ever before.

article thumbnail

Do you really need a security operations center?

everbridge

This article originally appeared in International Security Journal Ask any chief security officer how they protect their enterprise, and a security operations center (SOC) will often be one of the first things they mention. The SOC has long been viewed as a necessary fixture – the nerve center for threat monitoring and crisis response. But as our operating environments evolve, so should our strategies.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Pristine DR Environment™ the Future of Disaster Recovery

Erwood Group

Patent Pending Coming Soon Image of Pristine Logo Why Pristine DR Environment is the Future of Disaster Recovery In the high-stakes world of IT, disaster recovery (DR) is a make-or-break function. A single minute of downtime can cost businesses thousands—$14,000 per minute for enterprises and $427 for smaller firms, per industry estimates. Beyond the financial hit, there’s the ripple effect: lost customer trust, disrupted operations, and strained IT teams.

article thumbnail

Decoding India's DPDP Act: Your guide to protecting personal data

Acronis

India’s Digital Personal Data Protection (DPDP) Act, 2023, is landmark legislation that aims to protect personal data and regulate its processing, including collection, storage, usage, sharing, disclosure, erasure, etc.

article thumbnail

Security Industry Advocacy Achieves Major Wins on State “Right to Repair” Policies

Security Industry Association

New measures signed into law last week in Washington and Oregon ensure security manufacturers will not be required to disclose sensitive technical information regarding their products, protecting the integrity of security and life safety systems and the lives of those who depend on them. On May 22, 2025, Oregon Gov. Tina Kotek signed into law SB 959 , which added an exemption omitted in the states right to repair measure applicable to consumer and household electronics enacted in 2024, as part o