December, 2024

article thumbnail

Artificial [Un]intelligence and Disaster Management

Emergency Planning

There is currently intense interest in the possible use of artificial intelligence (AI) in the management of disasters. To what extent is this a real prospect or, alternatively, the fascination of the shiny new toy that soon will be discarded? To begin with, there are two major arguments against artificial intelligence in its current form. One should note in passing that it is not a new concept but one that has only recently begun to impinge seriously on popular consciousness.

article thumbnail

DRI International Releases 10th Annual Global Risk and Resilience Trends Report

DRI Drive

Disaster Recovery Institute (DRI) International, the leading nonprofit in business continuity and resilience education and certification has published its Tenth Annual Global Risk and Resilience Trends Report. The report provides an independent analysis of current and emerging risks as viewed by those directly involved in resilience management. Supported by the DRI Future Vision Committee (FVC), […] The post DRI International Releases 10th Annual Global Risk and Resilience Trends Report ap

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Crucial Role of Data Forensics in Post-cyberattack Recovery

Pure Storage

The Crucial Role of Data Forensics in Post-cyberattack Recovery by Pure Storage Blog Summary After a cyberattack, data forensics plays an important part in not only enabling you to dig deeper into what happened but also helping prevent being attacked again. Imagine coming home to find someone has broken into your house. Your first reaction is to make sure its safe to go inside.

Insurance 104
article thumbnail

Introducing the Zerto Cloud Vault

Zerto

As the cyber threat landscape grows more complex, organizations are realizing that data protection and confidence in cyber recovery solutions are critical for surviving an attack. Most data protection solutions were not designed with cyber recovery as their primary focus. A recent IDC white paper, sponsored by Zerto, a Hewlett Packard Enterprise company The State of Disaster Recovery and Cyber Recovery, 20242025: Factoring in AI reveals that organizations often pay ransoms not because backups ar

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

New CRS Report on National Flood Insurance Program

Recovery Diva

From the Congressional Research Service: Issues for Reauthorization and Reform of the National Flood Insurance Program (3 pp)

Insurance 100

More Trending

article thumbnail

2025 cybersecurity expert predictions: AI, IoT, ZTA and more

Acronis

Cybersecurity experts from Acronis share their cybersecurity predictions for the biggest threats and trends that MSPs and businesses should prepare for in 2025.

article thumbnail

Announcing the 2025 DRI Awards of Excellence Finalists!

DRI Drive

Each year, the DRI International Awards of Excellence program honors the leaders and innovators in the fields of continuity management, technology recovery, and crisis and risk management. Were pleased to announce this year’s finalists! Consultant of the Year Javed Abbasi, MBCP – GISBA Quinn Einck, CBCP – BDO Lisa Jones, MBCP – Control Risks Newcomer […] The post Announcing the 2025 DRI Awards of Excellence Finalists!

article thumbnail

Why You Need Cyber Resilience and Defence in Depth

IT Governance BC

And how to become resilient with ISO 27001 and ISO 22301 Unfortunately, even the most secure organisation can suffer an incident. The odds are simply stacked against you: While you need to protect all your assets from all types of threat, an attacker needs only one exploitable weakness to get into your systems. Plus, any security measure you implement is only designed to stop, at most, a handful of threats and thats assuming it was both correctly implemented and still doing its job.

article thumbnail

Zerto for AWS Now Available in AWS Marketplace: Rapid Recovery at Your Fingertips!

Zerto

Zerto, a Hewlett Packard Enterprise company, has officially launched Zerto Disaster Recovery for Amazon Web Services (AWS) in AWS Marketplace! This game-changing solution simplifies disaster recovery with a software-only approach, optimized for native AWS services. Why Choose Zerto for AWS? Zerto’s reputation as an industry leader speaks for itself, offering fast Recovery Point Objectives (RPOs) and Recovery Time Objectives (RTOs) at scale.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

Questions re FL 2025 Hurricane Planning

Recovery Diva

From the Florida Phoenix: Florida should use next six months to prepare for the 2025 hurricane season. Next years storms will likely be just as powerful as this years, but the Legislature says we cant talk about why.

100
100
article thumbnail

3 Keys to Success with RAG-enabled GenAI for KYC/AML

Pure Storage

3 Keys to Success with RAG-enabled GenAI for KYC/AML by Pure Storage Blog Summary In the fight against financial fraud, financial institutions need every advantage they can get. GenAI with RAG can give them a leg up in KYC/AML activities. By focusing on data, models, and efficiency, firms can maximize the potential of GenAI with RAG. In a recent blog post, “ Challenges with KYC/AML?

article thumbnail

Trust the Source: Why Authenticating Video Data Is Essential

Security Industry Association

Jason Crawforth is the CEO of SWEAR. Weve lived it. Weve experienced it firsthand. Artificial intelligence (AI) has had a big impact on the video surveillance and security sectors over the past year automating tasks such as threat detection, object recognition and predictive analytics with better accuracy than ever. These advancements have been essential tools to help empower security teams.

article thumbnail

Automate Fast & Win: 11 Event-Driven Automation Tasks for Enterprise DevOps Teams by Justyn Roberts

PagerDuty

Event-driven automation is a powerful approach to managing enterprise IT environments, allowing systems to automatically react to enterprise events (Observability / Monitoring / Security / Social / Machine) and reducing or removing the need for manual intervention. This post discusses 11 common automation tasks that are ideal for enterprise DevOps teams looking to enhance operational efficiency, reduce downtime, and ensure business continuity.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

What is Code Refactoring? How Refactoring Resolves Technical Debt

BMC

Weve all been there before: its time to add one last function into your program for the next release, but you dont have the time to make it just right organized, well-structured, and aligned with the rest of the code. Instead, you have to add the functionality in a bit of a haphazard way, just to get it done, so you do. Luckily, the release goes well, the function is added smoothly, and its onto the next sprint of work.

article thumbnail

Why Every Small Business Needs a Business Continuity Plan Template

BCP Builder

The fast-paced business landscape provides a myriad of challenges to small businesses that can threaten their very existence. These challenges can come from any direction — natural disasters, cybersecurity breaches , supply chain disruptions, or even surprises in the economy both large and small that stop operations and hurt revenue. That is actually why it is crucial to possess a Business Continuity Plan (BCP).

article thumbnail

National Geographic on AI

Recovery Diva

The Diva was especially interested in the group of articles titled AI: Welcome to the New Age of Discovery, in the November issue of National Geographic. Most of the articles are of general interest, but there is one titled How AI will Help Predict Natural Disasters. Note: the video version linked above is different from the print version.

100
100
article thumbnail

Why Storage Is the Unsung Hero for AI

Pure Storage

Why Storage Is the Unsung Hero for AI by Pure Storage Blog Summary Storage is the backbone of AI, but as model complexity and data intensity increase, traditional storage systems cant keep pace. Agile, high-performance storage platforms are critical to support AIs unique and evolving demands. In the race toward artificial general intelligence (AGI), storage technology is setting the pace.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Following Recent Incidents, U.S. House of Representatives Examines Counterdrone Protections

Security Industry Association

Top security industry takeaways from House Homeland Security Committee Hearing Safeguarding the Homeland From Unmanned Aerial Systems On Dec. 10, 2024, the House Homeland Security Committee held a joint hearing by the Subcommittee on Counterterrorism, Law Enforcement, and Intelligence and Subcommittee on Transportation and Maritime Security entitled Safeguarding the Homeland from Unmanned Aerial Systems.

article thumbnail

Webinar: The RMM Roadmap to Clarity & Confidence

LogisManager

Webinar: The RMM Roadmap to Clarity & Confidence Duration: 50 Minutes What if you could eliminate uncertainty in your role and confidently connect your work to leadership priorities? In this engaging webinar, join Alyssa Pries, Customer Advocate at LogicManager, and Steven Minsky, Founder & CEO of LogicManager, as they guide you through the Risk Maturity Model (RMM) framework.

article thumbnail

What is COBIT? COBIT Explained

BMC

IT management abounds with best practice frameworks. These frameworks offer philosophies and tangible paths forward to improve cost and resource management, measure risk, speed up customer service, and innovate analysis through predictive methods. COBIT is one such best practice framework, but its scope is unique from most frameworks in that it focuses narrowly on security, risk management, and governance.

Audit 52
article thumbnail

A year in review: Acronis innovations and cybersecurity enhancements in 2024

Acronis

Over the last 12 months, the Acronis Cyber Protect Cloud platform has expanded significantly with new solutions, features and capabilities to empower MSPs. In this blog, we take a look at whats new with Acronis Cyber Protect Cloud in 2024.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Why Disaster Survivors Feel the Government Has Failed Them

Recovery Diva

From the Wash Post: Why disaster survivors feel the Government has failed them. “The political hurdles exemplify what disaster survivors across the country say is a broken system one that forces them to wait for months or years before significant government help arrives, leaving many to rely on fundraising appeals or community aid until state or federal money starts flowing.

article thumbnail

What Is Cyber Extortion? Tips for Securing Your Data

Pure Storage

What Is Cyber Extortion? Tips for Securing Your Data by Pure Storage Blog Summary Cyber extortion is a type of cybercrime thats surging. While these types of attacks can have dire and expensive consequences, taking preventative measures can help you reduce risk and safeguard your digital assets. Cyber extortion is a malicious practice where attackers threaten individuals or organizations with digital harmsuch as data breaches, denial of service attacks, or exposure of sensitive informationunless

article thumbnail

The Role of GRC Software in FedRAMP Compliance: Essential Features and Benefits 

Reciprocity

Achieving and maintaining FedRAMP compliance involves managing hundreds of security controls, extensive documentation, and continuous monitoring requirements. Governance, Risk, and Compliance (GRC) software has become an essential tool for organizations navigating this complex landscape. Let’s explore how the right GRC solution can streamline your FedRAMP compliance journey.

Audit 52
article thumbnail

What to Expect at the 6th Annual Insight Jam LIVE!: Strategies for AI Impact December 10-13

Solutions Review

What to expect at the 6th annual Insight Jam LIVE!: Strategies for AI Impact with Over 25 Sessions, December 10-13 on InsightJam.com. The 6th Annual Insight Jam LIVE! is the original celebration of enterprise tech and a 4-day virtual event dedicated to equipping builders, implementers, and experts with actionable strategies for maximizing AIs impact across the enterprise.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

The Next-Generation Unitrends Endpoint Backup

Unitrends

Unitrends Endpoint Backup delivers scalable, cloud-centric endpoint protection tailored to the modern IT environment needs. Read the blog to learn more. The post The Next-Generation Unitrends Endpoint Backup appeared first on Unitrends.

Backup 59
article thumbnail

What is an IT service desk support? An extensive guide for MSPs

Acronis

Understand the difference between service desk support and help desk support and what are the benefits of using each one. Lean about the factors to consider when selecting the right software for your MSP or IT department.

article thumbnail

Distrust of FEMA in NC

Recovery Diva

From the Wash Post: Some N.C. residents distrust FEMA so much theyre hesitant to apply for hurricane aid.

100
100