2018

article thumbnail

Disaster Recovery & Business Continuity Up & Comer: Nuveric’s PetaGys Powered by Oracle’s Solaris

ChannelBloom

The PetaGys Powered by Oracle Solaris integrates correctly-sized hardware and data protection software into a complete onsite backup, offsite cloud, and business continuance solution. The appliance enables a fast and hassle-free setup of a comprehensive disaster recovery environment. The all-in-one solution fits perfectly for midsize IT environments with a strong support of virtualization.

article thumbnail

Best Practice Planning and Exercising from Ragtag Misfits

Alternative Resiliency Services Corp

What do David Lindstedt, Mark Armour, Telly Savalas, Charles Bronson and Lee Marvin have in common? What are the most effective ways to do Business Continuity (or Cyber or Crisis) planning and training? David Lindstedt and Mark Armour are spearheading Adaptive Business Continuity , a framework that brings flexible, pragmatic and iterative approaches, much like traditional 'waterfall' software development has been supplanted by Agile scrums and sprints.

BCP 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Critical infrastructure and soft targets in the Maghreb states 

Crisis Response Journal

In November 2018, Advisory Panel Member Lina Kolesnikova took part, as an international expert, in the regional workshop on ‘The challenges posed by terrorist acts on critical infrastructure (CI) and soft targets in the Maghreb States’.

100
100
article thumbnail

How to create a business continuity plan – with free template

IT Governance BC

Comprehensive BCM (business continuity management) measures are essential for responding effectively to a disruption and providing a minimum acceptable service during a disaster. A crucial aspect of BCM is the development of an effective BCP (business continuity plan). What is a business continuity plan? A BCP consists of the processes and procedures an organisation needs in order to continue operating during a disaster and recover as quickly as possible.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

CISO challenges and the path to cutting edge security

Behavior Group

Zane Lackey (…) serves on multiple Advisory Boards including the National Technology Security Coalition, the Internet Bug Bounty Program, and the US State Department-backed Open Technology Fund. (…) In this interview (…) he discusses CISO challenges, cloud security strategies, next-gen security, and much more. CISO challenges, focus on bringing security capabilities Based on your experience,… Continue reading.

More Trending

article thumbnail

IT Disaster Recovery Planning – No worries, we have a backup!

Stratogrid Advisory

IT Disaster Recovery Planning – “No worries, we have a backup?!” Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 3 minutes When asked about their organization’s IT Disaster Recovery (ITDR) plans, some will smile and say, “Yes, we have a backup and it is fully outsourced.” This type of response will set off a few red flags with the Business Continuity Planners, but many organizations do not understand why it is so problematic.

article thumbnail

What Can You Do when your BCM software Relationship Falls Apart

eBRP

“This isn’t working.” “I’ve changed.” “I don’t see a future with you.” Those ‘breakup’ lines may apply to your Business Continuity Management software or your latest paramour. Not all relationships succeed. When things go awry, goodbye may be the best solution. But that may seem impossible – even when you know it’s necessary. You’ve invested countless hours and piles of capital (both monetary and political) populating your current BCM software.

BCM 52
article thumbnail

Atesh baz (short story)

arunpraka shray

A meat-seller website was offering 33% discount on Lamb, curry cut. Been buying from them for almost two years now. Ordered a kg online. This site had a delivery tracking option and delivered in 120 minutes. An impressive track of delivery, I must say. Washed the meat in cold water & marinated with yogurt & spices before keeping it in the fridge for an hour, covered with a cling wrap.

article thumbnail

Marketpoint Recall & Recall Results. a powerful partnership for global coverage

Marketpoint Recall

An increasing number of recalls that appear in the media these days have one common factor: the companies involved just weren’t ready. A product recall can be one of the most detrimental events for a company and can have overwhelming consequences for both the company, its customers and the brand. That is why having an experienced partner, a robust, up-to-date recall plan, and access to global communication channels, is so critically important in a crisis situation.

Media 52
article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

CANADA’S CRITICAL INFRASTRUCTURE – READINESS & RESILIENCY

CCEM Strategies

As the floodwater in B.C.’s interior recede, critical infrastructure (CI) providers, like utilities and highways, are tackling the hard work of restoration and repair. Disruption to CI during an emergency can be catastrophic—lives can be lost, economies can tank, and public confidence can tumble. Suffice it to say, CI is critical to the functioning of our society.

article thumbnail

Building a Channel Presence.? Why You Need to Hire This Guy.

ChannelBloom

When building out a channel program, having the right strategy and go to market plan is critical. Having the right people to deliver that strategy is the most crucial part. Where several companies fail in the channel is having a balance of both ingredients. Having a dynamic channel executive that can lead and execute that plan is sometimes difficult to find.

article thumbnail

The Industrial Revolution v4.1: with increased opportunity comes increased vulnerability

SRM

If history teaches us one thing it is that there is no going back. It started with the First Industrial Revolution which used water and steam power to mechanise production. This was followed by the Second which used electricity and the Third which used electronics and information technology. With the Fourth Industrial Revolution we have seen a fusion of digital technologies, the use of the Cloud and extensive data management.

article thumbnail

Online learning: Being prepared in the modern world 

Crisis Response Journal

In this month’s blog on free preparedness training and education it’s Robert Fagan’s pleasure to highlight the course Staying Safe: How to Be Prepared in the Modern World from the United Kingdom’s Emergency Planning College (EPC).

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

How to write a disaster recovery plan

IT Governance BC

All organisations experience disruptions, whether that’s from a cyber attack, IT failure, weather event or something else, and they need to be prepared. The longer it takes to address an issue, the more the costs will spiral and the harder it will be to recover. A disaster recovery plan gives organisations a process for responding to a variety of incidents.

article thumbnail

3 Ways to Solve the People Problem in Cybersecurity

Behavior Group

Your organization is only as strong as the weakest link — don’t let employees go untrained and systems unprotected. People Problem in Cybersecurity The IT department can lock down anything it wants, but all it takes is one careless human to cause a destructive breach. In a mobile society where everything is connected, human beings are… Continue reading.

article thumbnail

What lessons can we learn from Marriott’s response to their Cyber Breach?

Plan B Consulting

This week, Charlie discusses the Marriott hotel hack and how you can prepare your organisation for a potential data breach. You couldn’t have missed the Marriott hotel’s cyber breach and the possible loss of up to 500 million customer records in the news last week. There are a number of lessons we can learn from their response and we can use this incident to check if our organisations would have the ability, in terms of customer communications, to manage a similar breach.

Travel 52
article thumbnail

IT Disaster Recovery Planning – No worries, we have a backup!

Stratogrid Advisory

IT Disaster Recovery Planning – “No worries, we have a backup?!”. Last Updated on May 31, 2020 by Alex Jankovic. Reading Time: 3 minutes. When asked about their organization’s IT Disaster Recovery (ITDR) plans, some will smile and say, “Yes, we have a backup and it is fully outsourced.” This type of response will set off a few red flags with the Business Continuity Planners, but many organizations do not understand why it is so problematic.

article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha

article thumbnail

Aligning BC/DR to CSIRP Challenges

eBRP

The immediate reaction to a cyber-security incident is the FUD factor (Fear, Uncertainty and Doubt); more like ‘chickens running around with their head cut off’. An agile response requires tested and documented Incident Response Plans – including Crisis Management, Business Continuity and IT Disaster Recovery Plans. Automating the workflow facilitates seamless collaboration and the ability to Monitor, Measure & Manage the activities that are critical to effective Cyber Security Incident Resp

article thumbnail

The Sudden spring of Delhi

arunpraka shray

15 August 2018. 07:48. It’s been ages since I have listened to a Mehfil e Sama at Hazrat Nizamuddin Auliya’s royal courtyard in Delhi. Yesterday was my long awaited meeting with my friend & author Meher Murshed , his nine years of research has resulted into ‘Song of the Dervish’, a bloomsbury gem. Almost three years back I had heard Fareed Ayaz Saab in the same courtyard at a short recital hosted by Peerzada Altamash Nizami .

article thumbnail

How brands are using AI to avoid a social media crisis

Marketpoint Recall

In February 2018, the fast-food chicken chain KFC ran out of chicken. Because of a supply chain glitch, KFC was unable to get chicken to many of its United Kingdom restaurants. But it became more than a logistics problem when fans took to social media to voice their discontent, with some even reaching out to police via social media channels when the chain was forced to close many stores temporarily.

Media 52
article thumbnail

PLANNING FOR AN EMERGENCY? DON'T FORGET YOUR VOLUNTEERS

CCEM Strategies

At the 2018 annual Clean Pacific conference in Portland, OR, we attended a session on volunteer planning in oil spill response. The presentation focused on the different types of volunteers that can emerge during an oil spill (affiliated, spontaneous and micro), and how they can be integrated into response planning. The Clean Pacific conference is focused on oil spill response and prevention, but volunteers can be engaged in any type of emergency response—floods, wildfires, earthquakes and acts

article thumbnail

S2, Episode 8 - Tuba Gursoy

The Business Continuity Podcast

Inspired by the stories we heard from Katherine Corbishley earlier in the season, we spoke to hospitality veteran Tuba Gursoy to find out what we can learn from someone working at the coal-face, in an industry where dealing with incidents and difficult situations is an everyday occurrence. Inspired by the stories we heard from Katherine Corbishley earlier in the season, we spoke to hospitality veteran Tuba Gursoy to find out what we can learn from someone working at the coal-face, in an industry

article thumbnail

The A to E of cyber maturity

SRM

In a recent report, the Philippine government’s Department of Information and Communications Technology (created in 2016) outlined a scale of cyber resilience based on an A to E grading system. With ‘A’ being the most robust in terms of cyber security maturity and ‘E’ being the weakest, it put the Philippines in class D. The reasoning behind this grade stems from the fact that they are reactive to attack using only the available tools and technologies.

article thumbnail

Business continuity is not the same as crisis management 

Crisis Response Journal

Any organisation that imagines that a business continuity plan makes it ‘crisis prepared’ is due for a big and costly surprise, says Dr Tony Jaques Crisis management should be recognised as both a tactical and a strategic responsibility, which extends fa By Dr Tony Jaques

article thumbnail

What’s the difference between a risk assessment and a business impact analysis?

IT Governance BC

Whether you’re creating a disaster recovery or business continuity plan, you must conduct a risk assessment and a BIA (business impact analysis). These processes inform your decision making and are often grouped together because they tackle similar issues, but don’t think you can get away with doing only one. Think of them instead as two parts of a whole.

article thumbnail

The Signal in the Noise: How Security Teams Can Capture Actionable Threat Insights

Behavior Group

With the barrage of information coming into a system, separating the noise from the genuine threats can be a difficult process. This is where AI can come in, to help you separate the real risks to your business from normal network noise. Capture Actionable Threat, security Companies’ Networks Are Overrun with Anomalies Any given company’s… Continue reading.

article thumbnail

Avoiding Groupthink: Decision Making During A Crisis

Plan B Consulting

This week, Charlie looks at decision making during incidents and offers some tools and techniques that he has picked up through his research. For a while now, I have been thinking about and looking at ways of making decisions during incidents and have been looking at simple tools and techniques that I can teach to incident management teams. There is an art to good decision making and some people are either just good at it, or when a major decision needs to be made are just lucky they made the ri

article thumbnail

Business Impact Analysis could be Challenging for some Organizations

Stratogrid Advisory

Why the Business Impact Analysis is Challenging for an Organization with Constant Changes Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 3 minutes In a Business Continuity Management (BCM) Program , there are specific professional practices that must be adhered to. The Disaster Recovery Institute (DRI) outlines the first steps as Business Continuity Management (BCM) Program Initiation and Risk Assessment, with the third being the Business Impact Analysis (BIA).

article thumbnail

Threats, Impacts, BCPs

eBRP

Within Business Continuity circles there is ongoing debate about the relevance and role of Risk Assessment in developing a BCM program. Having been in the industry for more than 20 years, I understand the issue from both the sides. Traditional, formalized Risk Assessment aims to identify the threats to which our organization is vulnerable. Once this threat-vulnerability pairing is identified, the next step is to assign a probability of such an occurrence – based on experience or other exte

BCM 52
article thumbnail

The Masseuse

arunpraka shray

She started her day six am everyday at her PG accommodation with a small meal of two leftover rotis rolled in an aluminium foil from the previous night’s dinner. And a hot mug of milky, sweet tea. She had to take a quick shower, & dress up before she could board the BMTC bus to her workplace, an upscale spa in North Bangalore. It was a two hours travel, one way.

Travel 52