article thumbnail

Resilience is an illusion

Emergency Planning

After much pondering of the question, I have come to the conclusion that resilience is an illusion. This is not to denigrate the work of resilience managers, as there is obviously much to be done to reduce the risk and impact of adverse events. However, the concept of resilience is, I think, suspect. What can we do instead?

article thumbnail

The 2019 Global Assessment Report (GAR)

Emergency Planning

An example of this for the 2013 GAR can be found in Di Mauro (2014). Global probabilistic assessment of risk from natural hazards for the Global Assessment Report 2013 (GAR13). Recommendations for a Post-2015 Disaster Risk Reduction Framework to Strengthen the Resilience of Communities to All Hazards. GNCSODR 2015. UNISDR 2005.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using Budget Principles to Prepare for Future Pandemics and Other Disasters

National Center for Disaster Prepardness

Expansion of pre-disaster mitigation funding such as through the Building Resilient Infrastructure and Communities program, and new funding for infrastructure resilience embedded in the bi-partisan Infrastructure Investment and Jobs Act are also steps in the right direction. 90 programs across 20 agencies is simply too many.

article thumbnail

Data Privacy Awareness Month 2024: Roundup of Expert Quotes

Solutions Review

Vulnerability Vigilance: Regularly scan your APIs for vulnerabilities and patch them promptly. These steps allow organizations to build a robust data privacy ecosystem where APIs become guardians, not vulnerabilities. A risk assessment shows organizations what their architecture looks like, their vulnerabilities, and more.

article thumbnail

Data Privacy Day 2024: The Definitive Roundup of Expert Quotes

Solutions Review

Vulnerability Vigilance: Regularly scan your APIs for vulnerabilities and patch them promptly. These steps allow organizations to build a robust data privacy ecosystem where APIs become guardians, not vulnerabilities. A risk assessment shows organizations what their architecture looks like, their vulnerabilities, and more.