Remove BCM Remove Disaster Recovery Remove Outage Remove Vulnerability
article thumbnail

Top 10 Resources to Help You Become a BCM Ninja 

MHA Consulting

In today’s post we’ll look at the top 10 free or almost free resources business continuity management professionals can utilize to help them raise their BCM skills and effectiveness to ninja level. However, there is one aspect of doing BCM that is much better and easier than it was when I was getting started 25 years ago.

BCM 92
article thumbnail

The Ocado fire – when disaster recovery becomes real

IT Governance BC

Although share prices showed signs of recovery within a couple of days, more than £1 billion was wiped off the stock market value of the firm, as investors worried that retailers may be less keen to buy into the automated warehouse technology having seen that there is a potential vulnerability.*. Business continuity management.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Was New in ’22: The BCM Year in Review

MHA Consulting

Read on to learn about the BCM year in review. It’s the best way to get a handle on the organization, its culture, what their most important business processes are, the threats they face, and the current state of their BCM program. There’s a lot to be said for ruthless efficiency when it comes to BCM. A new focus on efficiency.

BCM 52
article thumbnail

Get Cyber Smart: How to Make Sure Recovery Plans Align with Information Security Needs  

MHA Consulting

Instead, they should be developed in coordination with the cybersecurity department to ensure that recovery measures do not inadvertently create vulnerabilities that can be exploited by hackers. Such testing typically occurs when the system is in a normal state, but it can be done when the organization is in recovery mode.

article thumbnail

Why Every BC Professional Should Become a Gap Hunter

MHA Consulting

Related on MHA Consulting: How to Get Strong: Unlocking the Power of Vulnerability Management The Practice of Vulnerability Management Last week, MHA CEO Michael Herrera wrote a blog about vulnerability management , the practice of identifying and mitigating the weaknesses in an organization’s people, processes, and technology.

article thumbnail

The Retro Revolution:  Why Manual Workarounds  Are a BC Must 

MHA Consulting

Because technology is vulnerable to disruption—and disruptions are on the rise—every organization should devise manual workarounds for its critical business processes. The scenario was, “A regional internet outage has occurred; you have no internet access to the outside world. Continue operating your critical business operations.”

Outage 52
article thumbnail

The Ultimate Guide to Residual Risk  

MHA Consulting

An organization that can undergo an outage of five days at no great cost is justified in having a high risk tolerance. An organization that would suffer a large impact as the result of an outage of two hours should be willing to tolerate very little risk. Where risk tolerance is high, controls can be relaxed. Risk avoidance.