Sat.Aug 12, 2023 - Fri.Aug 18, 2023

article thumbnail

Maui wildfire one of deadliest in US history

National Fire Protection Association

According to NFPA research, this week’s Lahaina Fire death toll, now at 80 people, is among the top ten deadliest wildfires on record since 1871. “Through a deadly combination of human and natural causes, we now see unprecedented wildfires in every corner of the globe and in communities that were previously not viewed as high risk,” said NFPA President and CEO Jim Pauley.

Media 96
article thumbnail

A Selection of Articles re Maui Disaster – newest ones at at the bottom

Recovery Diva

From Grist: Wildfires just Destroyed a Maui town; Next Year Could Be Worse. From The Conversation: Maui wildfires: Extra logistical challenges hinder government’s initial response when disasters strike islands From the WashPost: Maui fires not just due to climate change but a ‘compound disaster’ The fires were a textbook case of many different agents acting together From the WashPost: Maui fires not just due to climate change but a ‘compound disaster’ The fires were a textbook case of many

Logistics 189
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GDPR from a Data Privacy Officer’s Perspective: 4 Keys to Know

Solutions Review

Solutions Review’s Contributed Content Series is a collection of contributed articles written by thought leaders in enterprise technology. In this feature, Egress Data Protection Officer Kevin Tunison offers commentary on GDPR from a data privacy officer’s perspective through four essential keys. The world and the technology industry are very different places since GDPR was implemented five years ago.

article thumbnail

12 Steps to Preparing for a Business Impact Analysis (BIA)

BryghtPath

In an ever-evolving business landscape, disruptions and unexpected events are inevitable, so it is crucial to prepare for a business impact analysis. From natural disasters to cybersecurity breaches, organizations face many challenges that can significantly impact their operations, finances, and reputation. To effectively navigate these challenges and ensure business continuity, a crucial tool in the … The post 12 Steps to Preparing for a Business Impact Analysis (BIA) appeared first on Br

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

A Model for Regulating AI

The Rand Blog

While AI will bring many benefits, it is also potentially dangerous. We would do well to establish a model of oversight that focuses on the three parts of the AI supply chain: hardware, the training of each model, and rigorous review before each model is released.

98

More Trending

article thumbnail

Get Promoted by Running Greener Data Storage

Pure Storage

Get Promoted by Running Greener Data Storage by Pure Storage Blog Promotions don’t happen overnight. They can take months or longer, even if you’re a high performer who consistently surpasses management expectations. Most career experts will tell you that moving up the corporate ladder today requires presenting a persuasive case for how you’re directly helping your company achieve its goals.

article thumbnail

Master Disaster Recovery Plan: A Guide for Businesses

BryghtPath

Craft a robust master disaster recovery plan. Learn to manage incidents, communicate effectively, and execute post-disaster strategies for business continuity. The post Master Disaster Recovery Plan: A Guide for Businesses appeared first on Bryghtpath.

article thumbnail

Winning the Tech Cold War

The Rand Blog

Emerging technologies increasingly make it possible for machines to innovate much faster and more efficiently than humans ever could. The Pentagon can draw some important lessons for technology competition with China by looking at the U.S.-Soviet race to develop nuclear weapons during the Cold War.

article thumbnail

Brookings Report on Changing the System for Disaster Declarations

Recovery Diva

New Report from Brookings: The U.S. Needs a New System for Declaring Natural Disasters and Distributing Federal Aid. (July 2023). Report is 20 pages. { Note this report was issued in July, well before the Maui disaster.} Comments are invited.

100
100
article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

What is identity theft protection, how it works, and why do you need it?

Acronis

Learn about identity theft protection, how it works, and why you need one to protect your personal and financial well-being and Keep your identity safe online.

article thumbnail

Handling Misinformation During a Crisis: A Guide

BryghtPath

Navigate misinformation during a crisis with our guide. Learn strategies for reputation management, internal communication and transparency. The post Handling Misinformation During a Crisis: A Guide appeared first on Bryghtpath.

article thumbnail

Escaping Afghanistan

The Rand Blog

As of April 2023, about 152,000 Special Immigrant Visa applicants remain trapped in Afghanistan. Despite many recommendations and bipartisan support for reforming the program, only minor tweaks have been made. Meanwhile, the dangerously slow process has become practically a death sentence.

article thumbnail

FEMA’s Disaster Fund is Running Low

Recovery Diva

From CNN: In a record year of catastrophes, From CNN: In a record year of catastrophes, FEMA’s disaster fund is slipping into the red before hurricane season even peaks.

100
100
article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

What is Two-Factor Authentication (2FA)? and Why you need one?

Acronis

Two-factor authentication (2FA) is a feature that requires a user to present two different types of identity evidence before being allowed to access an account.

article thumbnail

Climate Change and Disasters — Attribution

Disaster Zone

Today, tomorrow and into the future.

133
133
article thumbnail

Partnerships with Parents Are Key to Solving Heightened Political Polarization in Schools

The Rand Blog

Parental involvement has become a flashpoint in the public debate over what instructional content is appropriate for school settings. School system leaders should develop a two-pronged approach on how to respond when educators encounter conflicts with parents and families: a proactive strategy to build trust and engage parents and a reactive strategy to manage conflicts when they arise.

article thumbnail

Are Your IoT Devices Leaving the Door Open for Hackers?

NexusTek

READ TIME: 4 MIN August 15, 2023 Are Your IoT Devices Leaving the Door Open for Hackers? Quick Quiz: Could smart light bulbs in your office provide threat actors an entryway into your IT network? Could a fish tank thermometer be a portal hackers exploit to steal your customers’ financial information? Could your smart fridge be part of a botnet used to launch distributed denial-of-service (DDOS) attacks?

article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha

article thumbnail

The Only Guide to Crisis Management Training You’ll Ever Need

MHA Consulting

Many executives think practice is for grinds and star performers do things by the seat of their pants, but when it comes to crisis management, this approach is a good way to make a bad situation worse. In today’s post we’ll look at why crisis management training is essential for resiliency and explain how to obtain quality training that is relevant to your organization.

article thumbnail

The Modern GSOC: Security in an Evolving Landscape

Alert Media

To tackle diverse security threats at scale, you need a robust security operations center suited to your organization. Is a GSOC the answer?

article thumbnail

Rethinking Who's Winning the U.S.-China Tech Competition

The Rand Blog

The competition between the U.S. and China is a multi-dimensional contest involving technological, economic, military, and political elements. To accurately assess a nation's standing, the focus should shift from measures (raw numerical data) to metrics, which offer meaningful interpretations of these numbers.

article thumbnail

Book Review — Management and Information Technology in Disasters

Disaster Zone

A review of a new book on information management for disasters.

article thumbnail

Ambassadors Wanted! Announcing the SIA Women in Security Forum Ambassador Program

Security Industry Association

WISF ambassadors will actively support local engagement with SIA’s Women in Security Forum. The SIA Women in Security Forum (WISF) is recruiting 10 volunteers to kick off the WISF Ambassador Program. Ambassador recruitment starts now for the launch announcement during ISC East 2023 in New York City. Strategically located across the United States, WISF Ambassadors will be integral in extending the relational reach and engaging our WISF members.

article thumbnail

3 New Updates to the PagerDuty Scheduling Experience by Débora Cambé

PagerDuty

With the acceleration of cloud and digital transformation initiatives, enterprises are under pressure to adopt more agile, DevOps practices to be responsive to the business. But the increased complexity of digital systems and reliance on digital business only makes the cost of incidents more expensive. When incidents happen, protecting customer experience and minimizing downtime starts with bringing the right subject matter experts in to fix the problem.

article thumbnail

What Are Practical Steps to Embrace the Messiness of Public-Private Collaboration in the Fight Against Botnets?

The Rand Blog

Botnets are networks of computers infected with malware that an attacker controls and uses to fulfill malicious cyber activities. Decisionmakers could incorporate a complex adaptive systems perspective to assess if their organization and immediate network, as well as the overall ecosystem, are adaptable and resilient enough to respond to botnet activities.

Malware 86
article thumbnail

Disaster Zone Podcast: Retired from a Paycheck

Disaster Zone

Lessons from four decades of studying emergency management.

article thumbnail

Storage and Data Protection News for the Week of August 18; Updates from Cloudflare, RackTop Systems, Rubrik & More

Solutions Review

Solutions Review editors curated this list of the most noteworthy storage and data protection news items for the week of August 18, 2023. Keeping tabs on all the most relevant storage and data protection news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last week, in this space.

article thumbnail

Internet safety for teens 101 – Your comprehensive guide

Acronis

learn about internet safety for teens and how to stay protected online. Our guide will discuss internet safety tips for teens and rules to follow in order to prevent potential cyber threats.

article thumbnail

What's in a name? Naming your Fabric artifacts

Advancing Analytics

Who Cares? Does it really matter what you call your artifacts when you create them in a Fabric Workspace? The Power BI Developer side of me didn’t really tend to give this much thought – Datasets would tend to be named after the business process they covered (e.g. Sales, Logistics etc…) and associated reports would describe the report’s intent (e.g.

article thumbnail

Resources on Maui Disaster

Disaster Zone

Several links to stories about what went right and wrong.

100
100
article thumbnail

SIA New Member Profile: SoloSquid

Security Industry Association

New Security Industry Association (SIA) member SoloSquid is an intelligent security solutions agency with a broad range of software, hardware and professional services to audit, deploy, optimize and maintain new and existing systems. The company is headquartered in Ontario, Canada, and has worked with customers across Canada and the United States. SIA spoke with Jason Kloss, president at SoloSquid, about the company, the security industry and working with SIA.

Audit 52