October, 2024

article thumbnail

Executive Leadership on Security and Risk Management

Disaster Zone Podcast

Increasing risks and increasing technology are the topics in this podcast. How to manage technology and risks that extend from the cyber perspective all the way to corporate leadership and climate change. This is one of the most engaging conversations that the Disaster Zone Podcast has had with a true subject matter expert. Leaders in business and government should listen to this podcast.

article thumbnail

Serious Deficiencies with the National Flood Insurance Program

Recovery Diva

From the WashPost: Thousands of uninsured homes were in Helene’s path. The United States’ crumbling flood insurance system faces a new test after Hurricane Helene. “On average, just a tiny fraction of households in the inland counties hit hardest by Hurricane Helene and its remnants had flood insurance, according to a Washington Post analysis of recent data from the National Flood Insurance Program.

Insurance 189
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Considerations for Disaster Recovery – Part 2: Compute

Zerto

Disasters are unpredictable, but your response to them shouldn’t be. A well-thought-out disaster recovery (DR) plan is your best defense against unexpected disruptions. At the heart of any effective DR strategy is your compute solution. Today, I’ll walk you through the critical compute considerations for disaster recovery, focusing on performance, freedom of choice over technology, sizing, and support.

article thumbnail

Data Resilience: The Key to AI and Cybersecurity

Solutions Review

Veeam’s Rick Vanover offers insights on data resilience and the key to AI and cybersecurity. This article originally appeared on Solutions Review’s Insight Jam , an enterprise IT community enabling the human conversation on AI. The current conversations in the technology landscape are being driven by coverage of two topics: AI and cybersecurity.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

How Pure Protect //DRaaS Shields Your Business from Natural Disasters 

Pure Storage

How Pure Protect //DRaaS Shields Your Business from Natural Disasters by Pure Storage Blog Summary Pure Protect //DRaaS shields your business from the rising threat of natural disasters. This cloud-based solution ensures data security, minimizes downtime, and enables rapid recovery, keeping your operations resilient against hurricanes, wildfires, and other unexpected events.

More Trending

article thumbnail

FEMA Responds to Hurricane Helene and Milton - Guest Pete Gaynor

Disaster Zone Podcast

In this podcast Pete Gaynor, the immediate past Federal Emergency Management Agency (FEMA) Administrator and Acting Secretary of Homeland Security shares what he knows about how the national disaster response system functions. The roles and responsibilities of local, state and the federal government. We also dive into some of the malicious lies being told about FEMA’s response to Hurricane Helene and Milton.

article thumbnail

FEMA Struggles with H. Helene Response and Recovery

Recovery Diva

From the WashPost: FEMA deploys to rough terrain after Helene as it faces criticism, fights misinformation “The Federal Emergency Management Agency is facing logistical challenges and fighting false rumors as it responds to Helene, which made landfall as a major hurricane about a week ago.

Logistics 189
article thumbnail

Considerations for Disaster Recovery – Part 1: Storage

Zerto

One common question that comes up in all disaster recovery planning is, “What type of storage should be used for disaster recovery?” This is not a simple question to answer as there are many considerations, not the least of which is the cost of the storage. Here I am going to outline the primary factors I’d consider when choosing storage for disaster recovery. 3 Primary Factors for Choosing Disaster Recovery Storage Storage Size / Capacity It is important to consider how much storage will be nee

article thumbnail

The 76 Dangerous Days Between the Election and the Inauguration

The Rand Blog

The most dangerous period America faces in terms of election violence isn't before Election Day, but the 76 days after. Rising threats and domestic violence may intensify post-election, fueled by disinformation, claims of fraud, and potential foreign interference.

105
105
article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Cybersecurity Awareness Month 2024: Doing Our Part to #SecureOurWorld

Pure Storage

Cybersecurity Awareness Month 2024: Doing Our Part to #SecureOurWorld by Pure Storage Blog The 20th Cybersecurity Awareness Month is upon us, and we’re taking the month to spotlight resources and insights to help you improve cyber resilience and build a culture of security. This year’s theme is “ Secure Our World ,” highlighting this global need to do our part, and we all play a part in protecting data and critical assets.

article thumbnail

Security Industry Association Announces Winners for the 2024 James Rothstein Business Scholarship

Security Industry Association

Phillippe Forman of Altronix and Aubrey Moye of dormakaba USA will receive scholarships to support their education and career development at the Securing New Ground conference. SILVER SPRING, Md. – The Security Industry Association (SIA) has named two recipients for the 2024 James Rothstein Business Scholarship , a new program supporting emerging professionals in the security industry and students entering the industry by providing financial assistance to attend the Securing New Ground (SNG) co

Security 105
article thumbnail

Avoiding a Home Buying Disaster

Disaster Zone Podcast

The purchase of a home is likely the biggest investment that individuals and families will ever make during their lifetimes. In this podcast we discuss navigating the potential risks of a disaster impacting the property you might purchase and how to avoid making a home buying disaster. The podcast guest is Michael Crute who is an operational strategist turned Realtor® with a wealth of experience serving prestigious clientele within the NIH, Harvard, Department of Defense, and more.

Marketing 130
article thumbnail

Serious Trouble With the National Flood Ins. Program

Recovery Diva

From the WashPost, this opinion piece: As hurricane seasons worsen, taxpayers subsidize people to live in risky areas. Helene and Milton spotlight a federal flood insurance program drowning in debt. “The upshot is that FEMA flood hazard maps that determine coverage today rely on outdated information so inaccurate that more than 40 percent of NFIP claims made from 2017 to 2019 were for properties outside official flood hazard zones or in areas the agency had not mapped at all.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Achieving Data Immutability with Zerto

Zerto

In today’s digital landscape, data is one of the most valuable assets for any organization. Ensuring its security is paramount, especially in the face of increasing cyber threats and stringent regulatory requirements. Implementing technologies such as data immutability can help address those needs. Why is Data Immutability Important? Data immutability is a critical component for organizations to store data in a way that it cannot be altered or deleted once written.

article thumbnail

A Russia–North Korea Alliance in the Works? Don't Be So Sure

The Rand Blog

The new strategic partnership between Russia and North Korea is likely a fragile, convenience-driven relationship. U.S. information campaigns could exploit tensions with China and within the partnership and help speed its demise.

Strategic 107
article thumbnail

Non Disruptive Upgrades: The Pure Storage Ship of Theseus

Pure Storage

Non Disruptive Upgrades: The Pure Storage Ship of Theseus by Pure Storage Blog Summary With FlashArray, upgrades can be done non-disruptively in just one to two hours, providing both technical and financial benefits to organizations. The Ship of Theseus Paradox asks the question: If every part of a ship is replaced over time, is it still the same ship?

article thumbnail

Chatting About Cybersecurity: A Conversation With ChatGPT on the Role of Artificial Intelligence

Security Industry Association

October is Cybersecurity Awareness Month , and the Security Industry Association (SIA) Cybersecurity Advisory Board is marking the occasion with a series of helpful content, tips and guidance on key cybersecurity topics. In this blog from SIA Cybersecurity Advisory Board Vice Chair Rachelle Loyear – vice president of integrated security at Allied Universal – learn about the role of artificial intelligence (AI) in cybersecurity.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

How Secure is our Election System?

Disaster Zone Podcast

The election system of `the United States was designated a critical infrastructure in 2017. The integrity of our election system is essential for citizens to trust the outcome of local, state and national elections. In this podcast we look at one individual county and the security measures used from a physical and cybersecurity perspective, but then also preventing voter fraud from occurring.

Security 130
article thumbnail

Falsehoods Can Disrupt Recovery Efforts

Recovery Diva

From the NYTimes: Bizarre Falsehoods About Hurricanes Helene and Milton Disrupt Recovery Efforts. Experts warn that weather-related disinformation can rapidly escalate into real-world risks and distract from aid. An excerpt: “Online climate-related conspiracy theories can quickly cause damage offline, disrupting emergency communications and recovery efforts.

article thumbnail

Ghost in the machine: When cyberattacks go undetected

Acronis

The prospect of any data breach is scary, but the thought that an attacker could fundamentally take over an organization’s data for weeks or months is downright terrifying. Read on to learn how you can protect yourself from these cyberattacks.

article thumbnail

Iran's Terrible, Horrible, Very Bad Year

The Rand Blog

Iran was in a stronger strategic position before its proxies plunged the region into war. But it has only itself to blame. If Tehran is intent on escalating, the United States and its allies may have no other choice but to shift from punitive measures to dismantling Iran's military capabilities.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Reducing Cybersecurity Risks with NIST CSF 2.0

Pure Storage

Reducing Cybersecurity Risks with NIST CSF 2.0 by Pure Storage Blog Summary Created by the National Institute of Standards and Technology (NIST), the Cybersecurity Framework (CSF) is a set of guidelines designed to help organizations reduce cybersecurity risks and bolster their defenses. The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is a set of cybersecurity standards, guidelines, and best practices created to help organizations understand security risks

article thumbnail

HCI: The Pivotal Element of Tomorrow’s IT Strategies

Solutions Review

StorMagic’s Bruce Kornfeld offers insights on HCI and how it is set to be a pivotal element of tomorrow’s IT strategies. This article originally appeared on Solutions Review’s Insight Jam , an enterprise IT community enabling the human conversation on AI. In sometimes not-so-quiet leadership meetings, amid discussions of future forecasts and budgets, today’s IT leadership faces a puzzling issue.

article thumbnail

Integrating Cybersecurity into Business Continuity Planning: A Comprehensive Guide

BryghtPath

Cybersecurity and business continuity planning (BCP) are inseparable in today’s interconnected world. As businesses become increasingly reliant on digital infrastructure, the risk of cyberattacks grows exponentially. Cyber threats can disrupt operations, compromise sensitive data, and damage an organization’s reputation. Consequently, when creating a business continuity plan, organizations must consider cybersecurity to ensure operational resilience and … The post Integrating Cyberse

article thumbnail

Hurricanes Helen and Milton Damage U.S. Agricultural System

Recovery Diva

From HSNW: Helene and Milton Upended a Key Part of the Nation’s Agriculture System “America depends on Southeastern agriculture. After two hurricanes and billions of dollars in damages, the US food supply chain faces an uncertain future.

100
100
article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha