article thumbnail

The Ultimate Guide to Residual Risk  

MHA Consulting

Residual Risk There are two main kinds of risk when it comes to organizational activities and business continuity: inherent risk and residual risk. Inherent risk is the danger intrinsic to any business activity or operation. Examples include business impact analyses, recovery plans, and recovery exercises.

article thumbnail

BCM Basics: the Difference Between Business Continuity and Disaster Recovery

MHA Consulting

They soon find the field contains an abundance of specialist terms such as inherent risk , mitigation controls , and recovery time objective. However the most important terms to learn at the outset are surely business continuity and IT disaster recovery since they speak to the principal division of the entire field.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Human Factor: BCM Team Roles and Skill Requirements 

MHA Consulting

As the program matures, various other roles will be needed, possibly including the following: Building Maintenance or Facilities Manager: This individual can provide information on what mitigation steps are already in place for the facility, such as fire suppression and electrical service. Business continuity planning is a social activity.

BCM 91
article thumbnail

BCM Basics: The Strategic Side of Crisis Management  

MHA Consulting

Related on MHA Consulting: Critical Assistance: How a Consultant Can Strengthen Your Crisis Management Program According to Strong Language: The MHA Glossary of Essential Business Continuity Terminology , crisis management is “the process of trying to resolve a serious adverse event with minimal impact on an organization and its stakeholders.”

article thumbnail

What is a Business Impact Analysis (BIA)?

Stratogrid Advisory

The Business Impact Analysis (BIA) is a cornerstone of the Business Continuity Management (BCM) Program. It is an activity that will identify mission-critical business functions, processes or services in your organization, and the resources required to timely recover those activities.

article thumbnail

Tips for Managing Third-Party Risk in Health Care

Reciprocity

Adopting a zero-trust approach to network and data access by third parties is the best way to mitigate such risks. The program includes numerous activities that work together to strengthen their security posture. In addition to weak control policies, this increases the risk of cyberattacks. Vendor Due Diligence.

article thumbnail

Business Continuity Guide for Smaller Organizations

Stratogrid Advisory

The BCM program contains three distinct implementation phases; its activities are outlined in the table below. The BCM program contains three distinct implementation phases; its activities are outlined in the table below. This is why Business Continuity Management (BCM) is a program and not a project.