Sat.Aug 13, 2022 - Fri.Aug 19, 2022

article thumbnail

How Extreme Weather Events Could Take Down Entire Socioeconomic Systems

DRI Drive

Planning for individual disasters, rather than thinking of them as interconnected events, could have severe consequences for health, energy and agriculture, food production and other vital sectors, based on a recent research study. The study, developed by researchers at the University of Zurich, Switzerland, focused on understanding how extreme weather might affect linked socioeconomic systems. […].

369
369
article thumbnail

Webinar: The Importance of Multi-factor Authentication (MFA)

Disaster Zone

It is another step—keeping you more secure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Questioning U.S. Preparedness

Recovery Diva

From CNN: ‘We thought we were safe’: Kentucky disaster shows how US is ill-prepared and under-insured for devastating floods.

Insurance 113
article thumbnail

The Security Industry ROI Story from a Proptech Perspective

Security Industry Association

Evan Nardone asked a great question as part of a recent LinkedIn conversation. He asked: “How do you envision the [security industry ROI] story from a more PropTech perspective and less services? Short answer: It depends on who in proptech you are presenting the information to. Flexing your answer based on metrics driving their decision-making process is nuanced and essential.

Security 111
article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Pure’s Superpowers: Sustainable Technology and a Responsive Supply Chain

Pure Storage

I love when Pure Storage partners help customers go green. Over the past several years, there has been an increased focus put on the nonfinancial environmental, social, and governance (ESG) factors that businesses consider when identifying material risks and growth opportunities. It’s not just limited to when companies are upgrading or changing technology.

More Trending

article thumbnail

A Megaflood Coming to CA

Recovery Diva

From the WashPost: A disastrous megaflood is coming to California, experts say, and it could be the most expensive natural disaster in history.

100
100
article thumbnail

How Russia's Nuclear Double Cross of Ukraine Teaches Dangerous Lessons

The Rand Blog

Since Russia's invasion of Ukraine, the West's support for Kyiv has been tempered by an ace up Vladimir Putin's sleeve: the potential use of nuclear weapons. But other countries are taking notice, which could imperil world stability even further.

105
105
article thumbnail

Unitrends and IT Glue Integration

Unitrends

In today’s landscape of hybrid IT environments, it is important to ensure all IT information is readily and centrally available so that IT teams have access to the right information at the right time. IT documentation ensures policies and procedures, passwords, knowledge, project timelines, instructions and more are collected, organized and stored securely.

Security 105
article thumbnail

Business, Interrupted: Supply Chain Lessons Learned

Castellan

The supply chain. Until complications compounded during the coronavirus pandemic, it’s not something most consumers thought much about. But today, with shortages of everything from baby formula to automobiles, it’s constantly making headlines. But for Elaine Boltz , Chief Operating and Transformation Officer at Crocs, the supply chain is now always front of mind.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

CRS Report on Hazard-Resilient Buildings

Recovery Diva

From the CRS, this new (19 page) report: Hazard-Resilient Buildings: Sustaining Occupancy and Function After a Natural Disaster.

Hazard 100
article thumbnail

Security Industry Association Announces RISE Scholarship Opportunity

Security Industry Association

SIA invites its young professional members and student members to apply for this program offering $3,000 scholarships to further their education and career goals. SILVER SPRING, Md. – The Security Industry Association (SIA) is now accepting applications for the SIA RISE Scholarship , an initiative led by the SIA RISE community for young professionals.

article thumbnail

Understanding Russia's Motivations, and Using Them

The Rand Blog

The concept of ontological security could help explain Putin's war on Ukraine and his regime's reasoning. It's about maintaining a continuous sense of self, and in this case, of state identity. Putin may have deemed the invasion necessary to maintain a sense of continuity and order, where order is Russia's continued adversarial relationship with the West.

article thumbnail

Pure to Peer: Build, Scale, and Power Your Legal Ops Function from the Ground Up

Pure Storage

If you want to know how to build, scale, and power a modern legal ops team, this fireside chat in our new Pure to Peer series is for you. . For this chat, I’m joined by two amazing thought leaders in the legal ops space: Mary O’Carroll, Chief Community Officer at Ironclad, and Micki Nute , Director of Global Legal Operations and Enablement here at Pure Storage.

94
article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Mais segurança, redução de custos e produtividade para os serviços públicos

Citrix

O setor público na América Latina, particularmente no Brasil, vem passando por um momento de transformação e não apenas por conta do COVID-19. Obviamente a adoção em massa do home office e o consequente aumento da demanda por soluções … The post Mais segurança, redução de custos e produtividade para os serviços públicos first appeared on Citrix Blogs.

article thumbnail

August IAEM Disaster Zone Column

Disaster Zone

Be prepared to pivot from what you have done before.

113
113
article thumbnail

Russian Forces in Ukraine: Muddling Through

The Rand Blog

The Russian armed forces have suffered tens of thousands of casualties and lost more than 5,000 pieces of equipment. These deficits will make it hard for Russia to hold regions in Ukraine that it may soon try to annex. To succeed, Moscow will have to replenish personnel and equipment at scale—tasks that will prove extremely difficult.

94
article thumbnail

Why IT Holds the Keys to Digital Transformation Success

Pure Storage

It’s probably fair to call the 2020s the rise of the “internal” customer—but what do we mean by internal customers, and why are they so important? . External customers are who you sell to; internal customers help you to ultimately make those sales: employees, shareholders, stakeholders, partners, and vendors selling to third parties. They’re important because there’s a measurable connection between happy internal customers and happy external customers. .

article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha

article thumbnail

How to create a zero trust network

Citrix

Looking to achieve zero trust security for your business? You’re not alone. The White House recently released an edict declaring the implementation of a federal zero-trust architecture (ZTA) requiring all agencies to comply with specific cybersecurity standards and objectives by … The post How to create a zero trust network first appeared on Citrix Blogs.

article thumbnail

Omission Accomplished: When Front-Line Workers Are Excluded from BCM Training 

MHA Consulting

Many organizations seem to go out of their way to provide business continuity training to everyone—except the front-line workers who would most likely be the ones tasked with responding to … The post Omission Accomplished: When Front-Line Workers Are Excluded from BCM Training appeared first on MHA Consulting.

BCM 79
article thumbnail

Security Classifications Explained

Disaster Zone

What you need to know about the differences.

Security 113
article thumbnail

Telemedicine Abortion? It's Not as Easy as It Sounds

The Rand Blog

The Supreme Court decision to overturn Roe v. Wade has providers and health advocates strategizing about how to provide more abortions where it is still legal. Expanding virtual medical appointments is one popular idea. Policymakers and clinics could take steps to make telemedicine better understood, easier to use, and more equitable.

article thumbnail

Zero trust architecture benefits for your business

Citrix

In a perfect world, you could turn a blind eye to your company network and safely trust that anyone trying to access it had the purest intentions. But in reality, there’s no telling how or when a malicious actor might … The post Zero trust architecture benefits for your business first appeared on Citrix Blogs. Related Stories Seven principles of the zero trust security model Why should you evolve your multi-factor authentication to adaptive authentication?

article thumbnail

Advania Island Improves Remediation Times

everbridge

To be successful in a technologically advanced world, you must continually improve your digital services to meet changing customer expectations. However, sometimes rapid changes can cause problems – and you don’t want to be caught on your back foot when it happens. Automated incident response can help your organization combat the growing pains change brings by automating workflows for remediation while in the office or asleep in bed, delivering exceptional customer experiences around the clock w

article thumbnail

The Sky is Falling, the Sky is Falling!

Disaster Zone

Yes, and it is called rain in California—in the future.

100
100
article thumbnail

‘You Can’t Make a Twinkie With Only 95% of Ingredients’: Supply Shortages Hit the Snack Food Aisle

DRI Drive

The supply chain strikes again! Major food manufacturers are running into major production snags, as key ingredients for big snack items are tied up in scheduling and transportation headaches. “Unfortunately, you can’t make a Twinkie with only 95% of ingredients,” Hostess Brands CFO Travis Leonard said on a recent earnings call, summing up the problem many […].

article thumbnail

Citrix Features Explained: Improving end-user security with Citrix Secure Private Access

Citrix

The biggest threat to your organization is coming from inside. From careless mistakes to lost devices to malicious insiders, a striking 82 percent of data breaches come from what the 2022 Verizon DBIR calls “the human element.” This suggests the … The post Citrix Features Explained: Improving end-user security with Citrix Secure Private Access first appeared on Citrix Blogs.

article thumbnail

Everbridge’s Best in Resilience™ Study Results

everbridge

The Best in Resilience Certification is designed to help organizations protect their people, safeguard operations, and sustain performance with critical event management (CEM) best practices. Our Best in Resilience Certification utilizes a proprietary Critical Event Management (CEM) Standards Framework to provide organizations with the industry’s first end-to-end methodology for evaluating and benchmarking resilience. businesses from over 150 countries, our Best in Resilience Certification helps

article thumbnail

Podcast: The Little Wiggles of Hurricane Season - Interview with National Weather Service Director

Disaster Zone

The wiggles are what was new to me.

100
100
article thumbnail

Homelessness in L.A., Russia's Military Woes, Educator Morale: RAND Weekly Recap

The Rand Blog

This weekly recap focuses on breaking the cycle of incarceration and homelessness, Russia’s ongoing military struggles, NATO expansion, and more.

article thumbnail

Transforming how we deliver innovation in Work Collaboration Solutions

Citrix

Last week more than 150 engineers, product managers, product designers, and product marketing managers from our Work Collaboration Solutions business unit gathered in Raleigh, Prague, and Bangalore to collaborate for the first time in over two years. We called it … The post Transforming how we deliver innovation in Work Collaboration Solutions first appeared on Citrix Blogs.