June, 2025

article thumbnail

What the LA Fires Taught Us About Disaster Recovery

Disaster Zone Podcast

The Los Angeles fires will likely be the costliest natural disaster in our history. While they started as wildfire, they changed into an urban conflagration. Thousands of homes were destroyed along with other building structures, including businesses. In this podcast we’ll look at these impacts fires their destruction from the perspective of a private business that specializes in disaster recovery efforts.

article thumbnail

New Book on Recent Large Scale Disasters Now Available

Recovery Diva

The second edition of U.S. Emergency Management in the 21st Century From Disaster to Catastrophe was released in May and is readily available. Note that the Diva is one of the editors. Our understanding of hazards and disasters is rapidly changing, and it is unclear as to whether our existing management systems are adequate to adapt to current and future disasters.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Scorecard Measures Gaps In Wildfire Preparedness

Continuity Insights

I n 2023, more than 1,000 wildfires in Alberta, Canada broke records with the size of the area they destroyed — including more than 100 homes — triggering mass evacuations and causing widespread concerns about air quality. Last year’s wildfire season was equally intense, with nearly 1,200 fires, including the Jasper Wildfire Complex, which displaced 25,000 people and destroyed a third of the town.

article thumbnail

Digital Platforms: A Brief Introduction

BMC

Throw a rock and you’ll hit an organization undergoing their “digital transformation” nine times out of 10 these days. This is true for good reason. The entire world has been undergoing its own digital transformation over the past few decades as technology has advanced in leaps and bounds. Embracing the digital world is all but mandatory for organizations of all shapes and sizes.

Media 95
article thumbnail

Supply Chain Resilience Checklist

Strengthen your operations with the Supply Chain Resilience Checklist. This practical, easy-to-use tool helps your organization prepare for disruptions and ensure long-term continuity in an unpredictable world. Why Download: Identify and assess critical supply chain risks Ask the right questions to evaluate vendor preparedness Implement effective strategies to reduce vulnerabilities Improve communication, transparency, and coordination across your network What You’ll Learn: How to evaluate and m

article thumbnail

The Power of Layered Security

Security Industry Association

Defenses should not be limited to the internal environment Rich McElwain is senior solutions consultant – strategic accounts at Flock Safety. Security is no longer just a single-layered effort. Whether managing a retail store, hospital or warehouse, securing a property requires a multifaceted approach that considers both physical and digital threats.

More Trending

article thumbnail

Beyond Static Playbooks: Designing Adaptive Response Plans

eBRP

From cyber incidents and conflict-related events to supply chain disruption and operational outages, organizations face complex scenarios that often demand coordinated, and more effective responses than traditional continuity plans can deliver. Yet many plans remain static — created for predefined scenarios, often disconnected from the real life conditions they’re meant to address.

article thumbnail

Susan Koski: How to Manage the Move to the Post-Password Cyber Landscape

FS-ISAC

How to Manage the Move to the Post-Password Cyber Landscape Fraud is one of the sector’s biggest concerns, but passwords aren’t much of an obstacle to today’s innovative cybercriminals. Biometrics are the next frontier, but how do you get customers to accept the pivot? Susan Koski, Chief Information Security Officer, PNC, has been examining the challenge and recommends managing by facts and known risks, understanding fraud prevention as a cross-sector problem, and remembering that the customer e

article thumbnail

Transforming Recovery Operations: Pure Storage and Commvault’s Partnership in Cyber Resilience

Pure Storage

Transforming Recovery Operations: Pure Storage and Commvault’s Partnership in Cyber Resilience by Pure Storage Blog Summary Commvault, a global leader in cyber resilience, is both a trusted partner and customer of Pure Storage. The company leverages FlashBlade//S to protect its most critical workloads. When disruption strikes, businesses need to recover fast.

article thumbnail

Pristine DR Environment™ the Future of Disaster Recovery

Erwood Group

Patent Pending Coming Soon Image of Pristine Logo Why Pristine DR Environment is the Future of Disaster Recovery In the high-stakes world of IT, disaster recovery (DR) is a make-or-break function. A single minute of downtime can cost businesses thousands—$14,000 per minute for enterprises and $427 for smaller firms, per industry estimates. Beyond the financial hit, there’s the ripple effect: lost customer trust, disrupted operations, and strained IT teams.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

From ISC West 2025 to RSAC25: Cybersecurity Takeaways From Two of the Top Security Events

Security Industry Association

As spring comes to an end, the Security Industry Association (SIA) Cybersecurity Advisory Board is looking back at two of the most significant security events in the world: ISC West (North America’s largest converged security event) and RSA Conference (RSAC) (the world’s largest cybersecurity event). In this article, Cybersecurity Advisory Board member John Gallagher, vice president at Viakoo, shares cybersecurity takeaways from both shows and examines key themes discussed at the events.

article thumbnail

Do you really need a security operations center?

everbridge

This article originally appeared in International Security Journal Ask any chief security officer how they protect their enterprise, and a security operations center (SOC) will often be one of the first things they mention. The SOC has long been viewed as a necessary fixture – the nerve center for threat monitoring and crisis response. But as our operating environments evolve, so should our strategies.

article thumbnail

Resilience By Design: Healthcare Systems Are Future-Proofing Infrastructure

Continuity Insights

A s billion-dollar climate disasters become a fixture of the national landscape, healthcare systems are redefining what it means to build for the future. Healthcare facilities must do more than recover after an event; they need to remain online during the crisis itself, according to DPR Construction. The company’s latest Healthcare Insights report underscores why resilient design — which ensures healthcare facilities can operate through disruption and adapt to long-term environmental chall

article thumbnail

Meg Anderson: Lessons in Cyber Leadership From a Trailblazing CISO

FS-ISAC

Lessons in Cyber Leadership From a Trailblazing CISO The goal of information security is to not react to the change. It's to learn about change in advance. That’s one of the many lessons Meg Anderson, Former CISO, Principal Financial Group, has learned after 40 years in cybersecurity. It’s a lesson she’s instilled in her teams, along with the power of saying no, the vital importance of developing a pipeline, and why cyber leaders need business leaders’ trust.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Decoding India's DPDP Act: Your guide to protecting personal data

Acronis

India’s Digital Personal Data Protection (DPDP) Act, 2023, is landmark legislation that aims to protect personal data and regulate its processing, including collection, storage, usage, sharing, disclosure, erasure, etc.

article thumbnail

5 Common Mistakes in Healthcare Resilience Planning and How to Avoid Them

Erwood Group

Avoiding Common Healthcare Resilience Mistakes 5 Common Mistakes in Healthcare Resilience Planning and How to Avoid Them Ensuring uninterrupted patient care is a top priority. That’s where healthcare resilience planning comes in. Healthcare resilience is a strategic process designed to prepare for and adapt to disruptions, from natural disasters to cyberattacks.

article thumbnail

Around the CAB May 2025: Cybersecurity Advisory Board Members Share Highlights From ISC West

Security Industry Association

As we head into summer, the Security Industry Association (SIA) Cybersecurity Advisory Board is looking back at ISC West , North America’s largest converged security event. A topic that was top of mind at ISC West in 2025 was artificial intelligence. AI is rapidly growing across industries, being used for operational improvements and security capabilities.

article thumbnail

Storage and Data Protection News for the Week of June 6; Updates from HPE, Lucidity, VDURA & More

Solutions Review

Solutions Review Executive Editor Tim King curated this list of notable storage and data protection news for the week of June 6, 2025. Keeping tabs on all the most relevant storage and data protection news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last week in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy s

article thumbnail

Emergency Preparedness: Active Shooter Tabletop Exercise

April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.

article thumbnail

Protecting Critical Facilities From Wildfire Smoke

Continuity Insights

(Photo: Adobe Stock / toa555) By Shawn Gilstorf W ildfires are no longer a seasonal or regional threat. Once thought to primarily affect the western United States, wildfire smoke is now impacting facilities across the country, often in places hundreds of miles from the nearest flames. In 2024 alone, the U.S. saw nearly 65,000 fires scorch close to 9 million acres —surpassing the 10-year average by 127%.

Audit 41
article thumbnail

Debbie Janeczek: How to Prepare for the Quantum Revolution

FS-ISAC

How to Prepare for the Quantum Revolution The quantum revolution is coming to the financial sector. Debbie Janeczek, Global Chief Information Security Officer, ING, is preparing for it and says the rest of the sector should, too. She suggests starting with building leadership’s awareness of quantum risks, inventorying algorithms, and developing the skill sets needed for post quantum cryptography.

article thumbnail

Ransomware prevention guide: Best practices and a trusted software

Acronis

Protect your data with essential ransomware prevention strategies. Discover best practices for security and safeguard your systems. Read the article now.

article thumbnail

How to Encrypt Emails in Google Gmail / Workspace

Online Computers

Introduction Google Workspace makes it easy to protect sensitive emails with built-in tools like Confidential Mode and S/MIME encryption for enterprise users. Whether you’re sharing internal HR files or private financial data, here’s how to keep your email communications secure. Encryption adds a protective layer, keeping your message from being read by unintended parties—even if it’s intercepted in transit or forwarded in error.

article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

Planning a Holistic Counterdrone Program

Security Industry Association

Preparedness and the right architecture can provide powerful defenses Andrew Corsaro is the vice president of consulting services for ZBeta. The proliferation of uncrewed aerial systems (UAS), better known as drones, presents unique challenges for physical security. From nuisance incidents to deliberate malicious actions, the potential for drones to threaten privacy, safety and security is prompting many organizations to consider revising their physical security programs.

article thumbnail

Storage and Data Protection News for the Week of June 12; Updates from Cohesity, DDN, MinIO & More

Solutions Review

Solutions Review Executive Editor Tim King curated this list of notable storage and data protection news for the week of June 12, 2025. Keeping tabs on all the most relevant storage and data protection news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last week in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy

article thumbnail

Digital maturity models explained

BMC

Digital transformation is a game changer. Digital transformation drives new business opportunities and operational efficiencies that were previously bottlenecked by traditional ways of conducting routine business tasks. Digital technologies have empowered organizations to redefine the way they operate, but that hinges on the level of your digital maturity.

article thumbnail

Jochen Friedemann: The Fun Side of Financial Services Cybersecurity

FS-ISAC

The Fun Side of Financial Services Cybersecurity Financial services cybersecurity has its challenges – but it’s also interesting, varied, and just plain fun, says Jochen Friedemann, Chief Information Security Officer at Talanx , the Hanover-based insurance/re-insurance firm. Cybersecurity is also more impactful than it’s ever been, thanks to cyber’s importance to senior management, with more educational and career opportunities than ever before.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Québec-based MSP grew client-to-technician ratio by 200% after making this switch

Acronis

This single decision enabled Fleetinfo to improve client-to-technician ratio by 200%, reduce time spent patching by 90% and increase the number of clients using patch management services by 50%.

article thumbnail

National Institute of Building Sciences Urges Resilience Investment

Continuity Insights

E xtreme weather events, including hurricanes, wildfires, and severe storms, have caused devastating financial and human losses across the U.S., with cumulative disaster costs reaching nearly $3 trillion since 1980, according to the National Institute of Building Sciences (NIBS). In 2024 alone, 27 major natural disasters resulted in damage exceeding $1 billion each, underscoring the urgent need for resilience measures to protect lives, property, and local economies.

article thumbnail

10 Stats on School Security You Should Know

Security Industry Association

CISA just did a study on K-12 school security. Here are 10 key takeaway stats. In today’s environment, K-12 schools face an evolving and dynamic set of security risks and threats, ranging from acts of targeted violence to bomb threats to natural disasters. Enhancing school safety and security requires a community-based, comprehensive and holistic approach, in which a wide range of school community members play a role.