article thumbnail

How Transportation is Vital in Emergency Management and Business Continuity

CCEM Strategies

Transportation plays a key and invaluable role for company operations and is a vital element of emergency management. The consequences suffered when transportation services and infrastructure are impacted by a disaster are far reaching. It provides the service that links companies to their suppliers, customers and employees.

article thumbnail

Transporting Hazardous Materials--Which is Safer, Trains or Trucks?

Disaster Zone

If you are transporting petroleum products—pipelines is safer.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RAND's New President, the U.S. Foreign Service, Transportation Equity: RAND Weekly Recap

The Rand Blog

This weekly recap focuses on RAND's next president and CEO, Jason Matheny, insights into Americans' views on diplomacy and diplomats, solutions for transportation equity, and more.

article thumbnail

Transportation Worker Identity Credential: Reviving the Qualified Technology List With Simple Self-Certification Approval Process

Security Industry Association

The Transportation Worker Identification Credential (TWIC) is a biometric-enabled smart card identity credential that is issued to maritime workers to enable unescorted access into secure areas of maritime facilities and vessels regulated by the U.S. Department of Homeland Security (DHS). Coast Guard.

article thumbnail

USCG: Marine Transportation System Recovery Unit (MTSRU)

Disaster Zone

Understanding maritime disaster recovery process.

article thumbnail

Which to Restore First? Communications or Transportation?

Disaster Zone

For earthquakes it can be different.

article thumbnail

Are Your Supply Chain Anxieties Inviting Cybersecurity Threats?

DRI Drive

Transportation companies – and the logistics and risk issues accompanying them – are in constant discussion in the business world. That’s why they’ve also become overwhelmingly common parts of phishing scams.