Remove BCM Remove Mitigation Remove Outage Remove Vulnerability
article thumbnail

Top 10 Resources to Help You Become a BCM Ninja 

MHA Consulting

In today’s post we’ll look at the top 10 free or almost free resources business continuity management professionals can utilize to help them raise their BCM skills and effectiveness to ninja level. However, there is one aspect of doing BCM that is much better and easier than it was when I was getting started 25 years ago.

BCM 92
article thumbnail

Who’s the Boss? Successful Risk Mitigation Requires Centralized Leadership

MHA Consulting

Many companies spend millions of dollars implementing risk mitigation controls but are kept from getting their money’s worth by a disconnected, piecemeal approach. Successful risk mitigation requires that a central authority supervise controls following a coherent strategy. Related on MHA Consulting: Global Turmoil Making You Ill?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Get Cyber Smart: How to Make Sure Recovery Plans Align with Information Security Needs  

MHA Consulting

Instead, they should be developed in coordination with the cybersecurity department to ensure that recovery measures do not inadvertently create vulnerabilities that can be exploited by hackers. This can reveal vital information about the heightened vulnerabilities that often arise during recovery. Risk assessment.

article thumbnail

The Ultimate Guide to Residual Risk  

MHA Consulting

Residual risk is the amount of risk that remains in an activity after mitigation controls are applied. Putting it in mathematical terms: (Inherent risk) – (the risk eliminated by your mitigation controls) = residual risk. A related but higher level concept is that of risk mitigation strategies. Risk avoidance. Risk limitation.

article thumbnail

Why Every BC Professional Should Become a Gap Hunter

MHA Consulting

Related on MHA Consulting: How to Get Strong: Unlocking the Power of Vulnerability Management The Practice of Vulnerability Management Last week, MHA CEO Michael Herrera wrote a blog about vulnerability management , the practice of identifying and mitigating the weaknesses in an organization’s people, processes, and technology.

article thumbnail

Herrera Unplugged: How to Hamstring Your BC Consultant

MHA Consulting

Our commitment also explains why I find the tendency I want to discuss today so unfortunate, and why I’d like to make a suggestion aimed at mitigating it. Point out that when unprepared organizations are struck by an event or outage, the impact on their revenue and reputations can be severe. Those are the basics.

article thumbnail

How a Risk Maturity Model Can Increase Your Company’s Resilience

MHA Consulting

In today’s post, we’ll look at how such a model can help an organization understand its risks, mitigate the risks that threaten its core services, and integrate business continuity with enterprise risk management, thus boosting resilience overall. Related on MHA Consulting: Who’s the Boss? Second, using the risk maturity model pays.