article thumbnail

Foresight

Emergency Planning

The cascade is a result of the progression of a shock through different kinds of vulnerability. When disaster strikes, these networks are capable of transmitting impacts through a variety of domains and system states, each of which produces different consequences. References Fukuyama, F. The End of History and the Last Man.

article thumbnail

Counting Costs: The Impact of a Government Shutdown on the Security Industry

Security Industry Association

Department of Defense and four other major departments, the looming shutdown could affect all federal agencies dependent on appropriations, making it more similar to the October 2013 shutdown that lasted 16 days. What is a government shutdown?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Hostile Vehicle Incidents Can’t Be Ignored

Security Industry Association

If not, you can probably reach someone in Santa Monica, California, where 10 persons were killed and over 70 hospitalized in 2013 by an impaired driver at a farmer’s market. The group is planning a February 2022 update on the threat risk and vulnerability assessment efforts in the Washington, D.C.,

article thumbnail

Assessing You Power Needs For a Grid Down Problem

Business Continuity Today

However, a PSPS can leave communities and essential facilities without power, which brings its own risks and hardships, particularly for vulnerable communities and individuals.

article thumbnail

Assessing You Power Needs For a Grid Down Problem

Business Continuity Today

However, a PSPS can leave communities and essential facilities without power, which brings its own risks and hardships, particularly for vulnerable communities and individuals.

article thumbnail

The hidden costs of shadow IT: How unsanctioned tech impacts your budget

Online Computers

In 2013, thieves stole two laptops from Horizon Blue Cross Blue Shield of New Jersey (Horizon BCBSNJ), the state’s largest healthcare provider. The unencrypted laptops contained the electronic protected health information, or ePHI, of nearly 690,000 NJ residents.

article thumbnail

The 2019 Global Assessment Report (GAR)

Emergency Planning

An example of this for the 2013 GAR can be found in Di Mauro (2014). Global probabilistic assessment of risk from natural hazards for the Global Assessment Report 2013 (GAR13). At Risk: Natural Hazards, People's Vulnerability and Disasters (2nd edition). These may be published separately in an academic journal. GNCSODR 2015.