Remove Fashion Remove Outage Remove Pandemic Remove Resilience
article thumbnail

BCM Basics: Business Continuity vs. Business Resilience 

MHA Consulting

The terms business continuity and business resilience are superficially similar and a world apart. The terms business continuity and business resilience are a distinction with a difference. This was the context in which the concept of business resilience was born.

BCM 95
article thumbnail

What Was New in ’22: The BCM Year in Review

MHA Consulting

The year 2022 saw the tapering off of the pandemic, the invasion of Ukraine by Russia, an ongoing wave of cyberattacks, continuing supply chain woes, and a renewed focus by organizations on identifying and protecting their most essential business processes. It originated in the UK as part of the new Operational Resilience standards.

BCM 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Business Continuity 2025 – What Will Future Incidents Look Like?

Plan B Consulting

I aim to cover what incidents might look like, how the business continuity process might change, how resilience might develop and how the role of the business continuity manager could change. Threats come in fashions and cyber is the big threat of the moment. Water is going to become more of an issue over the next six years.

article thumbnail

Business Continuity 2025 – What Will Future Incidents Look Like?

Plan B Consulting

I aim to cover what incidents might look like, how the business continuity process might change, how resilience might develop and how the role of the business continuity manager could change. Threats come in fashions and cyber is the big threat of the moment. Water is going to become more of an issue over the next six years.

article thumbnail

33 Data Protection Predictions from 19 Experts for 2024

Solutions Review

Forthcoming legislation such as the EU’s NIS2 Directive and the Cyber Resilience Act will impose more stringent standards for cyber protection and establish clear reporting timelines in the event of a breach. workloads within an infrastructure able to deliver true private cloud going forward will grasp that opportunity.