article thumbnail

Foresight

Emergency Planning

The cascade is a result of the progression of a shock through different kinds of vulnerability. It can signify a means of diversifying assets so as to optimise the way they can be used to exploit people, for example, by shifting manufacturing production to places where wages can most easily be suppressed.

article thumbnail

Threat Intelligence: A Key Capability for Our Turbulent Times

MHA Consulting

In recent years, we have entered a uniquely tumultuous period, one characterized by weird weather, global conflict, and heightened supply chain vulnerability, among other challenges. Threats related to environmental hazards that might occur in the vicinity of the organization’s facilities: train derailments, plant explosions, chemical spills.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

PagerDuty Responds to the Climate Imperative By Addressing Injustice With New Philanthropic Partners by Olivia Khalili

PagerDuty

Notably, the health inequities we’ve witnessed in the pandemic response are mirrored in the way that persistent racial, class and gender inequalities leave many groups more vulnerable to the impacts of environmental hazards and climate change. In researching the field of climate philanthropy, we learned of another inequity: only 1.3%

article thumbnail

5 Steps to Implement Enterprise Risk Management (ERM)

Reciprocity

Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE), developed by Carnegie Mellon University, provides a self-directed methodology customizable to your organization’s size. A critical step in any ERM program is an assessment of your enterprise’s vulnerabilities. Step 2: Assess the Risks.

article thumbnail

5 Steps to Implement Enterprise Risk Management (ERM)

Reciprocity

Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE), developed by the Carnegie Mellon University, provides a self-directed methodology customizable to your organization’s size. A critical step in any ERM program is an assessment of your enterprise’s vulnerabilities. Step 2: Assess the Risks.

article thumbnail

Common Misconceptions about Disaster

Emergency Planning

Myth 17: Unburied dead bodies constitute a health hazard. Reality: Not even advanced decomposition causes a significant health hazard. In addition, technology is a potential source of vulnerability as well as a means of reducing it. Myth 65: Children and young people are too vulnerable to be exposed to the effects of disaster.

article thumbnail

5 Steps To Developing A Corporate Compliance Program

Reciprocity

You must assess the efficacy of your company’s compliance program and identify potential hazards. When vulnerabilities or violations are discovered through monitoring and audits, make a prompt and consistent effort to address the problem. Maintain steady discipline. Take appropriate action.

Audit 52