article thumbnail

Are You Protecting Your Reputation With A Plan?

Bernstein Crisis Management

Allow me to expand a bit… While most organizations we speak with have some level of emergency planning – basic natural disaster response plans, for example – far fewer are prepared to engage in the communications and operational maneuvering that accompanies a serious threat to reputation.

article thumbnail

Writing Incident Scenarios: An Operational Resilience Trend Returns

Plan B Consulting

This style of planning was particularly prevalent in the USA, where they have a multitude of different natural hazards, which were addressed in business continuity plans. However, you ended up with a plan consisting of 10-15 scenarios, most of which contained a checklist of actions that were the same for every event.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Writing Incident Scenarios: An Operational Resilience Trend Returns

Plan B Consulting

This style of planning was particularly prevalent in the USA, where they have a multitude of different natural hazards, which were addressed in business continuity plans. However, you ended up with a plan consisting of 10-15 scenarios, most of which contained a checklist of actions that were the same for every event.

article thumbnail

Dynamic Risks: Working Definitions and Implications for Risk Management Teams

On Solve

A risk hitting from a secondary direction or event. In a given year , teams should expect a greater number of large events than in previous years. Strategically, plan for new types of risks. The first risk sets a chain of causal events. We describe implications, followed by a specific response framework.

article thumbnail

The Future of Business Continuity: Innovations and Emerging Technologies

Erwood Group

Automated Incident Response: How it Works: AI-driven incident response systems can automatically detect and respond to security incidents. Application: In the event of a cybersecurity breach, AI automates the identification, containment, and eradication of threats, reducing response time.