article thumbnail

Covid-19: Elements of a Scenario

Emergency Planning

US Homeland Security Council 2005, UK Government 2008), while in others it did not. In the wake of the WHO report, Professor Ziad Abdeen of the Palestinian Health Authority said about pandemics: "My task is to tell you things you don't want to know, and ask you to spend money you haven't got on something you don't think will happen."

Pandemic 130
article thumbnail

Business Continuity as a Business Strategy

Disaster Recovery Journal

In November 2008, a major fire destroyed a historic building in the main section of Champaign, IL. The 2008 Business Continuity InstituteĆ¢??s Mintzberg, a doctoral professor of management at McGill University and author, considers business strategy as an organizational perspective of the business environment.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Silicon Valley Bank (SVB) Failures in Risk Management: Why ERM vs GRC

LogisManager

Silicon Valley Bank (SVB) Failures in Risk Management: Why ERM vs GRC By Steven Minsky | May 5, 2023 Silicon Valley Bank (SVB) was closed by regulators and reminded us of the recession associated with Lehman Brothers and Washington Mutual Bank in 2008. Some are quick to conclude rising interest rates and COVID-driven disruptions are to blame.

Banking 98
article thumbnail

Data Privacy Awareness Month 2024: Roundup of Expert Quotes

Solutions Review

This is likely to impact industries where transparency matters, such as healthcare, financial services, and insurance. Embrace Access Control: Implement strong authentication and authorization protocols to ensure only authorized applications and users can access data. Upholding good cyber hygiene.

article thumbnail

Data Privacy Day 2024: The Definitive Roundup of Expert Quotes

Solutions Review

This is likely to impact industries where transparency matters, such as healthcare, financial services, and insurance. Embrace Access Control: Implement strong authentication and authorization protocols to ensure only authorized applications and users can access data. Upholding good cyber hygiene.