Dr. Steven Goldman discusses his 2014 Top 10 Trends for the Business Continuity/Disaster Recovery Industry.
Topics include:
The increase in world–wide Natural Disasters
The rise in malicious cyber attacks
Embracing interruption as part of ‘day to day’ operations
Speed–of–light Information travel; new levels of expectations
The changing role of the BC/DR professional
Tweeting idiots – Twitiots
Preparing for the Matrix, the Robot Uprising, or Skynet!
and much more…
About Dr. Steven B. Goldman
Dr. Steven B. Goldman is an internationally recognized expert and consultant in Business Continuity, Crisis Management, Disaster Recovery, and Crisis Communications. He has over 30 years experience in the various aspects of these disciplines, including program management, plan development, training, exercises, and response strategies. His background is comprehensive yet unique in that he has been a professional engineer, corporate spokesperson, manager of media relations, business continuity planner, crisis responder, consultant, and a Fortune 500 Company's Global Business Continuity Program Manager. Dr. Goldman is a co-founder and Lecturer at MIT's "Crisis Management & Business Continuity" Professional Education summer course.
About xMatters, inc.
xMatters enables any business process or application to trigger two-way communications (text, voice, email, SMS, etc.) throughout the extended enterprise. The company’s cloud-based solution allows for enterprise-grade scaling and delivery during time-sensitive events. More than 1,000 leading global firms use xMatters to ensure business operations run smoothly and effectively during incidents such as IT failures, product recalls, natural disasters, dynamic staffing, service outages, medical emergencies and supply-chain disruption. Founded in 2000 as AlarmPoint Systems, xMatters is headquartered in San Ramon, CA with European operations based in London.
Dr Steve Goldman's Top Ten Business Continuity Predictions / Trends for 2014xMatters Inc
Dr. Steven B. Goldman is an internationally recognized expert and consultant in Business Continuity, Crisis Management, Disaster Recovery, and Crisis Communications. Read his predictions for 2014.
Despite a security landscape now embracing: People; Companies; Governments; Devices; Networks; Services; Vehicles; Properties; LAND; SEA; AIR; SPACE; CYBER and INFORMATION, people and organisations still tend to see all this as someone else problem. In reality, it concerns all of us. Governments can no longer protect their citizens and nor can any company IT/Security Dept!
“In an ideal world: responses to Cyber and Terror would be automated and immediate”
The Dark Side has grown rich and powerful by investing in R&D and the latest technology; adopting distributed team working and a global market for talent and resources; and they are winning this war with an estimated $1.5Tn income in 2019. We have to adopt the same strategies to survive let alone win. Global sharing and cooperation are key along with people, staff, management, board, NED and Chairman education/training/involvement. At this time it is rare to find a ‘Cyber Seat’ on the main board of any organization, but it is a new and critical essential!
Learn how HP Fortify On Demand is leveraging Fortify Runtime Protection to protect our own cloud services. See tips and techniques learned from deploying Runtime Protection in the real world, and learn how you can leverage the same technology in your environment without compromising performance or uptime. You’ll come away with tips on deploying, managing, and integrating Fortify Runtime Protection so you can block attacks while providing your developers with line-of-code detail regarding how to close the holes.
State of Endpoint Security: The Buyers MindsetCrowdStrike
Where is endpoint security headed? How do your priorities and capabilities compare to those of your peers?
As the battle against breaches rages on, many enterprises are focused on revamping their endpoint security strategy – from enhancing efficacy to reducing complexity and agent bloat. A new webcast, “State of the Endpoint: The Buyer Mindset,” discusses the current state of endpoint security and offers insights from an all-star panel of thought leaders, including Internationally recognized cybersecurity leader and CrowdStrike Co-founder Dmitri Alperovitch, VP of Product Marketing Dan Larson, and other experts as they discuss today’s most important security issues. Join them as they explore the findings from a new research report, “Trends in Endpoint Security: A State of Constant Change,” a study conducted by ESG and commissioned by CrowdStrike and other technology vendors. The panel will provide their impressions of the data in the survey and how the viewpoints revealed mesh with current technology trends, offering insights that can help inform your security strategy going forward.
Join this webcast to learn:
-The current state of Antivirus (AV) including how many organizations are choosing to change vendors and why
-Best of breed vs. comprehensive suites – which approach do your peers prefer and what are the advantages and challenges of each?
-How solutions are affecting endpoints and your IT Security peers, including the increase in agents installed and the impact of increased complexity
We are living through an extraordinary pandemic (CV-19) that has changed all the network norms including the way we work and communicate. An invisible consequence has been the transformation of internet and telecoms traffic promoted by people working from home, restrictions on all travel and a paralysis of almost all social norms. Living and working in isolation for 3 - 5 months has become the new mode for many, and even the most technophobic have had to turned to video conferencing and on-line purchases to ‘survive’
From a network point of view the transition has seen the concentrations of traffic in major cities and towns mutate to the dispersed and disparate working, social and entertainment activities that have found the last mile wanting. Insufficient bandwidth connectivity and resilience have quickly become a prime concern with the overloading of core networks a lesser concern.
Installing new optical links and making the core (undersea and overland long-lines) networks more robust is relatively easy as they are by far the most resilient and secure of our infrastructures. It is the local loop, our last mile, that poses the hard to fix problem. In this session we present tested model solutions based on direct ‘dark-fibre’ to home and office with no electronics, splitters or access points in the field. This is augmented by Mesh-Nets and 4/5G providing temporary bridges for random fibre breaks and cable damage.
On Thursday 10th November 2016, in The Hague, the Netherlands, Trilateral Research carried out an Ethics and Privacy Impact Assessment (EPIA) workshop as part of the iTRACK project. iTRACK will create an open-source real-time tracking and threat detection system providing intelligent decision support to civilian humanitarian missions for the purpose of better protection, and more efficient and effective operations.
Dr Steve Goldman's Top Ten Business Continuity Predictions / Trends for 2014xMatters Inc
Dr. Steven B. Goldman is an internationally recognized expert and consultant in Business Continuity, Crisis Management, Disaster Recovery, and Crisis Communications. Read his predictions for 2014.
Despite a security landscape now embracing: People; Companies; Governments; Devices; Networks; Services; Vehicles; Properties; LAND; SEA; AIR; SPACE; CYBER and INFORMATION, people and organisations still tend to see all this as someone else problem. In reality, it concerns all of us. Governments can no longer protect their citizens and nor can any company IT/Security Dept!
“In an ideal world: responses to Cyber and Terror would be automated and immediate”
The Dark Side has grown rich and powerful by investing in R&D and the latest technology; adopting distributed team working and a global market for talent and resources; and they are winning this war with an estimated $1.5Tn income in 2019. We have to adopt the same strategies to survive let alone win. Global sharing and cooperation are key along with people, staff, management, board, NED and Chairman education/training/involvement. At this time it is rare to find a ‘Cyber Seat’ on the main board of any organization, but it is a new and critical essential!
Learn how HP Fortify On Demand is leveraging Fortify Runtime Protection to protect our own cloud services. See tips and techniques learned from deploying Runtime Protection in the real world, and learn how you can leverage the same technology in your environment without compromising performance or uptime. You’ll come away with tips on deploying, managing, and integrating Fortify Runtime Protection so you can block attacks while providing your developers with line-of-code detail regarding how to close the holes.
State of Endpoint Security: The Buyers MindsetCrowdStrike
Where is endpoint security headed? How do your priorities and capabilities compare to those of your peers?
As the battle against breaches rages on, many enterprises are focused on revamping their endpoint security strategy – from enhancing efficacy to reducing complexity and agent bloat. A new webcast, “State of the Endpoint: The Buyer Mindset,” discusses the current state of endpoint security and offers insights from an all-star panel of thought leaders, including Internationally recognized cybersecurity leader and CrowdStrike Co-founder Dmitri Alperovitch, VP of Product Marketing Dan Larson, and other experts as they discuss today’s most important security issues. Join them as they explore the findings from a new research report, “Trends in Endpoint Security: A State of Constant Change,” a study conducted by ESG and commissioned by CrowdStrike and other technology vendors. The panel will provide their impressions of the data in the survey and how the viewpoints revealed mesh with current technology trends, offering insights that can help inform your security strategy going forward.
Join this webcast to learn:
-The current state of Antivirus (AV) including how many organizations are choosing to change vendors and why
-Best of breed vs. comprehensive suites – which approach do your peers prefer and what are the advantages and challenges of each?
-How solutions are affecting endpoints and your IT Security peers, including the increase in agents installed and the impact of increased complexity
We are living through an extraordinary pandemic (CV-19) that has changed all the network norms including the way we work and communicate. An invisible consequence has been the transformation of internet and telecoms traffic promoted by people working from home, restrictions on all travel and a paralysis of almost all social norms. Living and working in isolation for 3 - 5 months has become the new mode for many, and even the most technophobic have had to turned to video conferencing and on-line purchases to ‘survive’
From a network point of view the transition has seen the concentrations of traffic in major cities and towns mutate to the dispersed and disparate working, social and entertainment activities that have found the last mile wanting. Insufficient bandwidth connectivity and resilience have quickly become a prime concern with the overloading of core networks a lesser concern.
Installing new optical links and making the core (undersea and overland long-lines) networks more robust is relatively easy as they are by far the most resilient and secure of our infrastructures. It is the local loop, our last mile, that poses the hard to fix problem. In this session we present tested model solutions based on direct ‘dark-fibre’ to home and office with no electronics, splitters or access points in the field. This is augmented by Mesh-Nets and 4/5G providing temporary bridges for random fibre breaks and cable damage.
On Thursday 10th November 2016, in The Hague, the Netherlands, Trilateral Research carried out an Ethics and Privacy Impact Assessment (EPIA) workshop as part of the iTRACK project. iTRACK will create an open-source real-time tracking and threat detection system providing intelligent decision support to civilian humanitarian missions for the purpose of better protection, and more efficient and effective operations.
(Beyond simplistic thinking and models)
This lecture is one of a series ‘Grand Challenge Subjects’ designed to make students think beyond, and challenge, the status quo; to question what they have been taught and the established industry wisdoms; to look beyond the tech media and journal papers; to think, be original, and be creative in the widest sense. This all culminates in a design and build/project program spread over several weeks.
The notion that the IoT will see everything connecting via the internet using a wireless domain dominated by 5G is not only simplistic, it is fundamentally impossible. A moments thought and a few simple calculations reveal that there is not enough energy on the planet to power 50 - 250Bn or more IoT devices operating in such a mode. So how are we really going to design and engineer the IoT to become a workable proposition? Here are some clues:
3/4G: Carries <5% of all internet traffic; WiFi ~55%; Wired LANs @ 45%
Mobile Network coverage is sadly lacking @ <90% by geography
Mobile Device batteries and charging are major limitations
The internet consumes ~12% of all our energy
Mobile Devices consume ~ 1% and rising
Mobile Nets consume ~ 10%
None of the above takes into account the cost of raw materials, production, distribution, delivery, support, disposal and the ecological impact of civil engineering, equipments, and people.
During this lecture the following surprising conclusions quickly emerge:
Most IoT devices will talk to each other and never connect to the internet
IoT devices will require a range of bandwidths and not just low bit rates
The majority of IoT devices will communicate over very short distance
Our current wireless architectures are outmoded by the IoT
We will most likely need something beyond UWB
The power per IoT device has to be <<1mW
Security will demand auto-immunity
This then is the starting point; from here we can design and engineer solutions for an, as yet, unspecified and dimensioned IoT fit for this century.
Learning topics/objectives:
What we know about the virus, spread and impacts
Implications for business, health and safety management
Basics of infectious agents and routes of transmission
Assessing biological and occupational health exposures and risks
How to determining targeted, job-specific risk controls
Work through an example using a specialized COVID-19 biological risk assessment tool
Throughout our education and life we are mostly given a ‘soda-straw’ view of Maths, Physics, Chemistry, Biology, HealthCare, Business and Commerce that conditions us to ‘one concept at a time’ thinking. This is rife in Government and Politics, Industry and Health, and it has been extremely powerful in a now past slow paced and disconnected world. In fact, the speciation of disciplines, topics and problems has largely been responsible for the acceleration and prominence of human progress.
However; in a connected/networked, highly mobile, and tech driven world this simple and narrow minded view is insufficient and dangerous. In common parlance we refer to ‘unintended consequences’ whilst in complex system theory would use the term ‘emergent behaviours’. In brief; education, health, crime, productivity, GDP creation, social cohesion and stability cannot be considered independent variables/properties. They are all related and interdependent. For example; when politicians decide to starve the education system of funds for very young children the impact shows up in health, crime and the economy some 10 - 30 years later!
By analogy; all of this is true of our technologies, industries, lives, and the prospect of sustainable societies. Robots, AI, AL, and Quantum Computing do not stand alone in isolation, they have complementary roles. In this Public Lecture we devote an hour to thinking more holistically what these technologies bring to the party in the context of industry, health, society, sustainable societies and global warming. We then devote a further hour to discussion and debate.
In the context of Global Warming we make the following overriding observations:
“Panic is a poor substitute for thinking”
“Tech is the only exponential capability we enjoy”
“Technology is never a threat, but humans always are”
“Uncertainty always prescribes the precautionary principle”
Integra: Attack of the Business Killing Monster (Infographic)Jessica Legg
Concepted infographic theme; developed copy; sourced and managed design resources for a business continuity and disaster recovery infographic.
Summary: North American businesses lose $26.5 billion annually to the downtime monster—that’s enough to kill off almost any business. How can you protect your business? Explore this disaster infographic to see how BC/DR planning can come to your rescue!
The Critical Role of Spatial Data in Today's Data EcosystemSafe Software
In today's data-driven landscape, integrating spatial data is becoming increasingly crucial for organizations aiming to harness the full potential of their data. Spatial data offers unique insights based on location, making it a fundamental component for addressing various challenges across different sectors, including urban planning, environmental sustainability, public health, and logistics.
Our webinar delves into the indispensable role of spatial data in data management and analysis. We'll showcase how omitting spatial data from your data strategy not only weakens your data infrastructure, but also limits the depth of your insights. Through real-world case studies, we'll highlight the transformative impact of spatial data, demonstrating its ability to uncover complex patterns, trends, and relationships.
Join us for this introductory-level webinar as we explore the critical importance of spatial data integration in driving strategic decision-making processes. By the end of the webinar, you'll gain a renewed perspective on how spatial data is essential for confronting and overcoming challenges across various domains.
Risk Management Lifecycle Process Powerpoint Presentation SlidesSlideTeam
“You can download this product from SlideTeam.net”
Introducing Risk Management Lifecycle Process PowerPoint Presentation Slides to showcase strategies to manage business threats. This content ready risk analysis and management PowerPoint complete deck contains easy-to-understand PPT slides such as risk management lifecycle, types of risks, risk categories, stakeholder’s management and engagement, risk appetite and tolerance, procedure, risk management plan, risk identification, risk register, risk assessment, risk analysis, risk response plan, risk response matrix, risk control matrix, risk items tracking, tools and practices, risk impact & profitability analysis, risk mitigations strategies, plans, qualitative and quantitative risk analysis, etc. Our team of experts have designed this risk assessment process PPT presentation after in-depth research. All the PowerPoint templates are easy to edit. Change color, font or style if you wish too. Furthermore, users can also demonstrate risk evaluation and analysis techniques with the help of risk response plan PPT visuals. So, download the approaches to risk management PowerPoint graphics to create an engaging business presentation. Our Risk Management Lifecycle Process Powerpoint Presentation Slides give your brand extensive coverage. Be happy with the gains that accrue. https://bit.ly/3BXmWWO
Risk Management Lifecycle Process PowerPoint Presentation SlidesSlideTeam
Presenting this set of slides with name - Risk Management Lifecycle Process Powerpoint Presentation Slides. This deck consists of total of fiftyeight slides. It has PPT slides highlighting important topics of Risk Management Lifecycle Process Powerpoint Presentation Slides. This deck comprises of amazing visuals with thoroughly researched content. Each template is well crafted and designed by our PowerPoint experts. Our designers have included all the necessary PowerPoint layouts in this deck. From icons to graphs, this PPT deck has it all. The best part is that these templates are easily customizable. Just click the DOWNLOAD button shown below. Edit the colour, text, font size, add or delete the content as per the requirement. Download this deck now and engage your audience with this ready made presentation.
With the automated Risk Assessment module from SunGard®, you’ll quickly collect accurate and timely information that will: (1) Reveal the technical, human, natural, or proximal (e.g., nearby highway) risks that threaten any location. (2) Ascertain the probability and severity level of each threat. (3) Identify the consequences for each identified risk. (4) Determine the efficacy of any mitigation strategies or controls currently in place.
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...VAST
There are many kinds of disaster that can shut down your information technology (IT) operations:
• natural disasters, like a hurricane
• power outages
• a hardware crash that corrupts data
• employees who accidentally or deliberately delete or modify data
• malware that tampers with, erases, or encrypts data so you can’t access it
• network outages due to problems at your telecom provider
Disasters happen, sometimes bringing down a single application, sometimes bringing down your entire data center. No matter how careful you are or how good your IT team is, eventually some event will shut down your applications when you really need them up and running. The Disaster Recovery Preparedness Council survey in 2014 found that 36 percent of businesses lost at least one critical application, virtual machine, or data file for a period of several hours, with 25 percent saying they’d lost a large part of their data center for a period of hours or days.
The costs of preparing for disaster can be high—at one extreme, companies maintain a secondary, standby data center with all the same equipment as at their primary site—but the consequences of not planning for disaster recovery (DR) can be even higher. The costs of downtime in 2016 ranged from a minimum of $926 per minute to a maximum of $17,244 per minute, with an average cost of close to $9,000 per minute of outage.
Those costs can completely cripple a business; Gartner found that only 6 percent of companies remain in business two years after losing data.
Creating an effective disaster recovery plan is a key step to ensuring business survival.
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19Citrin Cooperman
To help not-for-profit entities protect their information during these unprecedented times, this webinar will cover challenges organizations face in preventing, detecting, and responding to cybersecurity-related activities. We discussed recent cyber breaches within not-for-profit organizations and considerations and actions you can take.
Presenting this set of slides with name - Enterprise Risk Analysis Powerpoint Presentation Slides. This aptly crafted editable PPT deck contains twenty five slides. Our topic specific Enterprise Risk Analysis Powerpoint Presentation Slides deck helps devise the topic with a clear approach. We offer a wide range of custom made slides with all sorts of relevant charts and graphs, overviews, topics subtopics templates, and analysis templates. Speculate, discuss, design or demonstrate all the underlying aspects with zero difficulty. This deck also consists creative and professional looking slides of all sorts to achieve the target of a presentation effectively. You can present it individually or as a team working in any company organization.
Risk Management Procedure And Guidelines PowerPoint Presentation Slides SlideTeam
Presenting this set of slides with name - Risk Management Procedure And Guidelines PowerPoint Presentation Slides. This deck consists of total of forty eight slides. It has PPT slides highlighting important topics of Risk Management Procedure And Guidelines PowerPoint Presentation Slides. This deck comprises of amazing visuals with thoroughly researched content. Each template is well crafted and designed by our PowerPoint experts. Our designers have included all the necessary PowerPoint layouts in this deck. From icons to graphs, this PPT deck has it all. The best part is that these templates are easily customizable. Just click the DOWNLOAD button shown below. Edit the colour, text, font size, add or delete the content as per the requirement. Download this deck now and engage your audience with this ready made presentation.
(Beyond simplistic thinking and models)
This lecture is one of a series ‘Grand Challenge Subjects’ designed to make students think beyond, and challenge, the status quo; to question what they have been taught and the established industry wisdoms; to look beyond the tech media and journal papers; to think, be original, and be creative in the widest sense. This all culminates in a design and build/project program spread over several weeks.
The notion that the IoT will see everything connecting via the internet using a wireless domain dominated by 5G is not only simplistic, it is fundamentally impossible. A moments thought and a few simple calculations reveal that there is not enough energy on the planet to power 50 - 250Bn or more IoT devices operating in such a mode. So how are we really going to design and engineer the IoT to become a workable proposition? Here are some clues:
3/4G: Carries <5% of all internet traffic; WiFi ~55%; Wired LANs @ 45%
Mobile Network coverage is sadly lacking @ <90% by geography
Mobile Device batteries and charging are major limitations
The internet consumes ~12% of all our energy
Mobile Devices consume ~ 1% and rising
Mobile Nets consume ~ 10%
None of the above takes into account the cost of raw materials, production, distribution, delivery, support, disposal and the ecological impact of civil engineering, equipments, and people.
During this lecture the following surprising conclusions quickly emerge:
Most IoT devices will talk to each other and never connect to the internet
IoT devices will require a range of bandwidths and not just low bit rates
The majority of IoT devices will communicate over very short distance
Our current wireless architectures are outmoded by the IoT
We will most likely need something beyond UWB
The power per IoT device has to be <<1mW
Security will demand auto-immunity
This then is the starting point; from here we can design and engineer solutions for an, as yet, unspecified and dimensioned IoT fit for this century.
Learning topics/objectives:
What we know about the virus, spread and impacts
Implications for business, health and safety management
Basics of infectious agents and routes of transmission
Assessing biological and occupational health exposures and risks
How to determining targeted, job-specific risk controls
Work through an example using a specialized COVID-19 biological risk assessment tool
Throughout our education and life we are mostly given a ‘soda-straw’ view of Maths, Physics, Chemistry, Biology, HealthCare, Business and Commerce that conditions us to ‘one concept at a time’ thinking. This is rife in Government and Politics, Industry and Health, and it has been extremely powerful in a now past slow paced and disconnected world. In fact, the speciation of disciplines, topics and problems has largely been responsible for the acceleration and prominence of human progress.
However; in a connected/networked, highly mobile, and tech driven world this simple and narrow minded view is insufficient and dangerous. In common parlance we refer to ‘unintended consequences’ whilst in complex system theory would use the term ‘emergent behaviours’. In brief; education, health, crime, productivity, GDP creation, social cohesion and stability cannot be considered independent variables/properties. They are all related and interdependent. For example; when politicians decide to starve the education system of funds for very young children the impact shows up in health, crime and the economy some 10 - 30 years later!
By analogy; all of this is true of our technologies, industries, lives, and the prospect of sustainable societies. Robots, AI, AL, and Quantum Computing do not stand alone in isolation, they have complementary roles. In this Public Lecture we devote an hour to thinking more holistically what these technologies bring to the party in the context of industry, health, society, sustainable societies and global warming. We then devote a further hour to discussion and debate.
In the context of Global Warming we make the following overriding observations:
“Panic is a poor substitute for thinking”
“Tech is the only exponential capability we enjoy”
“Technology is never a threat, but humans always are”
“Uncertainty always prescribes the precautionary principle”
Integra: Attack of the Business Killing Monster (Infographic)Jessica Legg
Concepted infographic theme; developed copy; sourced and managed design resources for a business continuity and disaster recovery infographic.
Summary: North American businesses lose $26.5 billion annually to the downtime monster—that’s enough to kill off almost any business. How can you protect your business? Explore this disaster infographic to see how BC/DR planning can come to your rescue!
The Critical Role of Spatial Data in Today's Data EcosystemSafe Software
In today's data-driven landscape, integrating spatial data is becoming increasingly crucial for organizations aiming to harness the full potential of their data. Spatial data offers unique insights based on location, making it a fundamental component for addressing various challenges across different sectors, including urban planning, environmental sustainability, public health, and logistics.
Our webinar delves into the indispensable role of spatial data in data management and analysis. We'll showcase how omitting spatial data from your data strategy not only weakens your data infrastructure, but also limits the depth of your insights. Through real-world case studies, we'll highlight the transformative impact of spatial data, demonstrating its ability to uncover complex patterns, trends, and relationships.
Join us for this introductory-level webinar as we explore the critical importance of spatial data integration in driving strategic decision-making processes. By the end of the webinar, you'll gain a renewed perspective on how spatial data is essential for confronting and overcoming challenges across various domains.
Risk Management Lifecycle Process Powerpoint Presentation SlidesSlideTeam
“You can download this product from SlideTeam.net”
Introducing Risk Management Lifecycle Process PowerPoint Presentation Slides to showcase strategies to manage business threats. This content ready risk analysis and management PowerPoint complete deck contains easy-to-understand PPT slides such as risk management lifecycle, types of risks, risk categories, stakeholder’s management and engagement, risk appetite and tolerance, procedure, risk management plan, risk identification, risk register, risk assessment, risk analysis, risk response plan, risk response matrix, risk control matrix, risk items tracking, tools and practices, risk impact & profitability analysis, risk mitigations strategies, plans, qualitative and quantitative risk analysis, etc. Our team of experts have designed this risk assessment process PPT presentation after in-depth research. All the PowerPoint templates are easy to edit. Change color, font or style if you wish too. Furthermore, users can also demonstrate risk evaluation and analysis techniques with the help of risk response plan PPT visuals. So, download the approaches to risk management PowerPoint graphics to create an engaging business presentation. Our Risk Management Lifecycle Process Powerpoint Presentation Slides give your brand extensive coverage. Be happy with the gains that accrue. https://bit.ly/3BXmWWO
Risk Management Lifecycle Process PowerPoint Presentation SlidesSlideTeam
Presenting this set of slides with name - Risk Management Lifecycle Process Powerpoint Presentation Slides. This deck consists of total of fiftyeight slides. It has PPT slides highlighting important topics of Risk Management Lifecycle Process Powerpoint Presentation Slides. This deck comprises of amazing visuals with thoroughly researched content. Each template is well crafted and designed by our PowerPoint experts. Our designers have included all the necessary PowerPoint layouts in this deck. From icons to graphs, this PPT deck has it all. The best part is that these templates are easily customizable. Just click the DOWNLOAD button shown below. Edit the colour, text, font size, add or delete the content as per the requirement. Download this deck now and engage your audience with this ready made presentation.
With the automated Risk Assessment module from SunGard®, you’ll quickly collect accurate and timely information that will: (1) Reveal the technical, human, natural, or proximal (e.g., nearby highway) risks that threaten any location. (2) Ascertain the probability and severity level of each threat. (3) Identify the consequences for each identified risk. (4) Determine the efficacy of any mitigation strategies or controls currently in place.
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...VAST
There are many kinds of disaster that can shut down your information technology (IT) operations:
• natural disasters, like a hurricane
• power outages
• a hardware crash that corrupts data
• employees who accidentally or deliberately delete or modify data
• malware that tampers with, erases, or encrypts data so you can’t access it
• network outages due to problems at your telecom provider
Disasters happen, sometimes bringing down a single application, sometimes bringing down your entire data center. No matter how careful you are or how good your IT team is, eventually some event will shut down your applications when you really need them up and running. The Disaster Recovery Preparedness Council survey in 2014 found that 36 percent of businesses lost at least one critical application, virtual machine, or data file for a period of several hours, with 25 percent saying they’d lost a large part of their data center for a period of hours or days.
The costs of preparing for disaster can be high—at one extreme, companies maintain a secondary, standby data center with all the same equipment as at their primary site—but the consequences of not planning for disaster recovery (DR) can be even higher. The costs of downtime in 2016 ranged from a minimum of $926 per minute to a maximum of $17,244 per minute, with an average cost of close to $9,000 per minute of outage.
Those costs can completely cripple a business; Gartner found that only 6 percent of companies remain in business two years after losing data.
Creating an effective disaster recovery plan is a key step to ensuring business survival.
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19Citrin Cooperman
To help not-for-profit entities protect their information during these unprecedented times, this webinar will cover challenges organizations face in preventing, detecting, and responding to cybersecurity-related activities. We discussed recent cyber breaches within not-for-profit organizations and considerations and actions you can take.
Presenting this set of slides with name - Enterprise Risk Analysis Powerpoint Presentation Slides. This aptly crafted editable PPT deck contains twenty five slides. Our topic specific Enterprise Risk Analysis Powerpoint Presentation Slides deck helps devise the topic with a clear approach. We offer a wide range of custom made slides with all sorts of relevant charts and graphs, overviews, topics subtopics templates, and analysis templates. Speculate, discuss, design or demonstrate all the underlying aspects with zero difficulty. This deck also consists creative and professional looking slides of all sorts to achieve the target of a presentation effectively. You can present it individually or as a team working in any company organization.
Risk Management Procedure And Guidelines PowerPoint Presentation Slides SlideTeam
Presenting this set of slides with name - Risk Management Procedure And Guidelines PowerPoint Presentation Slides. This deck consists of total of forty eight slides. It has PPT slides highlighting important topics of Risk Management Procedure And Guidelines PowerPoint Presentation Slides. This deck comprises of amazing visuals with thoroughly researched content. Each template is well crafted and designed by our PowerPoint experts. Our designers have included all the necessary PowerPoint layouts in this deck. From icons to graphs, this PPT deck has it all. The best part is that these templates are easily customizable. Just click the DOWNLOAD button shown below. Edit the colour, text, font size, add or delete the content as per the requirement. Download this deck now and engage your audience with this ready made presentation.
Risk Identification Process Powerpoint Presentation SlidesSlideTeam
"You can download this product from SlideTeam.net"
Presenting this set of slides with name - Risk Identification Process Powerpoint Presentation Slides. This aptly crafted editable PPT deck contains forty-five slides. Our topic-specific Risk Identification Process Powerpoint Presentation Slides presentation deck helps devise the topic with a clear approach. We offer a wide range of custom made slides with all sorts of relevant charts and graphs, overviews, topics subtopics templates, and analysis templates. Download PowerPoint templates in both widescreen and standard screen. The presentation is fully supported by Google Slides. It can be easily converted into JPG or PDF format. https://bit.ly/3G7NDKm
Business Continuity Emerging Trends - DRIE Atlantic - SummaryMarie Lavoie Dufort
Summary document for DRIE Atlantic presentation held on May 19, 2021 on the topic of Business Continuity Emerging Trends – Absorbing & Adapting In A Changing Environment.
Speaker: Marie Lavoie Dufort
Host: Emad Aziz
Navigating the Cloud: Best Practices for Successful MigrationPrecisely
In today's digital landscape, migrating workloads and applications to the cloud has become imperative for businesses seeking scalability, flexibility, and efficiency. However, executing a seamless transition requires strategic planning and careful execution. Join us as we delve into the insightful insights around cloud migration, where we will explore three key topics:
i. Considerations to take when planning for cloud migration
ii. Best practices for successfully migrating to the cloud
iii. Real-world customer stories
Similar to 2014 Top 10 Predictions for BC/DR by Dr. Steven B Goldman (20)
Attending a job Interview for B1 and B2 Englsih learnersErika906060
It is a sample of an interview for a business english class for pre-intermediate and intermediate english students with emphasis on the speking ability.
Skye Residences | Extended Stay Residences Near Toronto Airportmarketingjdass
Experience unparalleled EXTENDED STAY and comfort at Skye Residences located just minutes from Toronto Airport. Discover sophisticated accommodations tailored for discerning travelers.
Website Link :
https://skyeresidences.com/
https://skyeresidences.com/about-us/
https://skyeresidences.com/gallery/
https://skyeresidences.com/rooms/
https://skyeresidences.com/near-by-attractions/
https://skyeresidences.com/commute/
https://skyeresidences.com/contact/
https://skyeresidences.com/queen-suite-with-sofa-bed/
https://skyeresidences.com/queen-suite-with-sofa-bed-and-balcony/
https://skyeresidences.com/queen-suite-with-sofa-bed-accessible/
https://skyeresidences.com/2-bedroom-deluxe-queen-suite-with-sofa-bed/
https://skyeresidences.com/2-bedroom-deluxe-king-queen-suite-with-sofa-bed/
https://skyeresidences.com/2-bedroom-deluxe-queen-suite-with-sofa-bed-accessible/
#Skye Residences Etobicoke, #Skye Residences Near Toronto Airport, #Skye Residences Toronto, #Skye Hotel Toronto, #Skye Hotel Near Toronto Airport, #Hotel Near Toronto Airport, #Near Toronto Airport Accommodation, #Suites Near Toronto Airport, #Etobicoke Suites Near Airport, #Hotel Near Toronto Pearson International Airport, #Toronto Airport Suite Rentals, #Pearson Airport Hotel Suites
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
What is the TDS Return Filing Due Date for FY 2024-25.pdfseoforlegalpillers
It is crucial for the taxpayers to understand about the TDS Return Filing Due Date, so that they can fulfill your TDS obligations efficiently. Taxpayers can avoid penalties by sticking to the deadlines and by accurate filing of TDS. Timely filing of TDS will make sure about the availability of tax credits. You can also seek the professional guidance of experts like Legal Pillers for timely filing of the TDS Return.
Digital Transformation and IT Strategy Toolkit and TemplatesAurelien Domont, MBA
This Digital Transformation and IT Strategy Toolkit was created by ex-McKinsey, Deloitte and BCG Management Consultants, after more than 5,000 hours of work. It is considered the world's best & most comprehensive Digital Transformation and IT Strategy Toolkit. It includes all the Frameworks, Best Practices & Templates required to successfully undertake the Digital Transformation of your organization and define a robust IT Strategy.
Editable Toolkit to help you reuse our content: 700 Powerpoint slides | 35 Excel sheets | 84 minutes of Video training
This PowerPoint presentation is only a small preview of our Toolkits. For more details, visit www.domontconsulting.com
Enterprise Excellence is Inclusive Excellence.pdfKaiNexus
Enterprise excellence and inclusive excellence are closely linked, and real-world challenges have shown that both are essential to the success of any organization. To achieve enterprise excellence, organizations must focus on improving their operations and processes while creating an inclusive environment that engages everyone. In this interactive session, the facilitator will highlight commonly established business practices and how they limit our ability to engage everyone every day. More importantly, though, participants will likely gain increased awareness of what we can do differently to maximize enterprise excellence through deliberate inclusion.
What is Enterprise Excellence?
Enterprise Excellence is a holistic approach that's aimed at achieving world-class performance across all aspects of the organization.
What might I learn?
A way to engage all in creating Inclusive Excellence. Lessons from the US military and their parallels to the story of Harry Potter. How belt systems and CI teams can destroy inclusive practices. How leadership language invites people to the party. There are three things leaders can do to engage everyone every day: maximizing psychological safety to create environments where folks learn, contribute, and challenge the status quo.
Who might benefit? Anyone and everyone leading folks from the shop floor to top floor.
Dr. William Harvey is a seasoned Operations Leader with extensive experience in chemical processing, manufacturing, and operations management. At Michelman, he currently oversees multiple sites, leading teams in strategic planning and coaching/practicing continuous improvement. William is set to start his eighth year of teaching at the University of Cincinnati where he teaches marketing, finance, and management. William holds various certifications in change management, quality, leadership, operational excellence, team building, and DiSC, among others.
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...BBPMedia1
Marvin neemt je in deze presentatie mee in de voordelen van non-endemic advertising op retail media netwerken. Hij brengt ook de uitdagingen in beeld die de markt op dit moment heeft op het gebied van retail media voor niet-leveranciers.
Retail media wordt gezien als het nieuwe advertising-medium en ook mediabureaus richten massaal retail media-afdelingen op. Merken die niet in de betreffende winkel liggen staan ook nog niet in de rij om op de retail media netwerken te adverteren. Marvin belicht de uitdagingen die er zijn om echt aansluiting te vinden op die markt van non-endemic advertising.
Business Valuation Principles for EntrepreneursBen Wann
This insightful presentation is designed to equip entrepreneurs with the essential knowledge and tools needed to accurately value their businesses. Understanding business valuation is crucial for making informed decisions, whether you're seeking investment, planning to sell, or simply want to gauge your company's worth.
2. MY TOP TEN BUSINESS CONTINUITY
PREDICTIONS/TRENDS FOR 2014
Dr. Steven B. Goldman
is an internationally
recognized expert and
consultant in Business
Continuity, Crisis
Management, Disaster
Recovery, and Crisis
Communications.
2
3. 3
AGENDA
• Welcome and Introduction
• My Top Ten BC/DR Predictions/Trends for
2014
• Wrap up
• Questions
• Conclusion
• Adjourn
5. 5
CAVEATS
• These are my observations
– Yours may differ
• Well, an observation or two may not be
completely mine
– References are provided
• “What does this mean to you?”
– Added after each trend/prediction
– You have to adapt this guidance to your particular situation
6. 6
The image part with relationship ID rId3 was not found in the file.
2014
7. 7
10
There has been an
overall worldwide
increase in the
number of natural
disasters
8. 8
INCREASE IN NATURAL DISASTERS
• Incidence of natural disasters worldwide has
steadily increased
• Climate-related disasters
– Floods, storm surge, and coastal flooding; storms, tropical cyclones,
local storms, heat/cold waves, drought, and wildfires
– (2000 to 2009) = 3 x (1980 to 1989)
• Geophysical disasters
– Earthquakes, volcanoes, dry rock falls, landslides, and avalanches
– Fairly stable since the 1970's
http://www.nejm.org/doi/full/10.1056/NEJMra1109877?query=featured_home
http://www.munichre.com/en/media_relations/press_releases/2014/2014_01_07_press_release.aspx
11. 11
WHAT DOES THIS MEAN TO YOU?
• Expect these events
• Do not surrender to Mother Nature!
• Be prepared for whatever Mother Nature can
dish out
• Planning, preparation, and execution
13. 13
MCAFEE ® LABS THREATS REPORT
THIRD QUARTER 2013
• Several familiar trends
• New trends
– Steady growth in mobile and overall malware
– A sharp upturn in worldwide spam
– The shutdown of the online market Silk Road, which sold drugs
and other illegal products
– The emergence of the “Deep Web,” an online supply for
cybercriminals
– An increase in the use of digital currencies by cybercriminals to
maintain anonymity for their illegal activities
http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q3-2013.pdf
16. 16
MCAFEE ® LABS THREATS REPORT
THIRD QUARTER 2013
• Mobile malware rose by 33 percent
• New malware of all types exceeded 20 million
this period
• All-time tally to more than 172 million binaries
• New rootkits, AutoRun threats
• Signed malware increased by almost 50
percent
19. 19
WHAT DOES THIS MEAN TO YOU?
• More and more corporate assets and operations
are online
• Your organization must have a cyber attack
prevention program as well as a response and
recovery strategy
• Think outside the box your cell phone came in.
Can you survive an attack on your mobile
communications assets?
21. 21
SOME DISRUPTIONS ARE BECOMING
MORE PREDICTABLE
• On the one hand
– Economies around the world have become increasingly
vulnerable to the ever-changing nature of the sun. Solar flares can
disrupt power grids, interfere with high-frequency airline and
military communications, disrupt Global Positioning System (GPS)
signals, interrupt civilian communications, and blanket the Earth’s
upper atmosphere with hazardous radiation
• On the other hand
– With more and more massive amounts of technology and data
available, we are more adept at better predicting weather
patterns, natural disasters, system breakdowns, even human
threats.
– Forecasters at NOAA’s Space Weather Prediction Center (SWPC)
are expecting G3 (strong) geomagnetic storm conditions to occur
on Earth Jan. 9 and 10
http://www.noaa.gov/features/01_economic/spaceweather_3.html
22. 22
WHAT DOES THIS MEAN TO YOU?
• Have strategies and plans that become more
preventative than reactive
– An ounce of prevention is worth a pound of response
• Listen and anticipate problems
– Weather, cyber attacks, pandemic, power outages
• Don’t wait for a hurricane to begin
implementing response plans
26. 26
WHAT DOES THIS MEAN TO YOU?
• Business interruptions - whether acts of nature or manmade or technical glitches - are no longer outlying
anomalies, but are becoming the norm.
• Consider the potential for business disruption like bad
weather – you don’t like it, but it’s part of business life; be
prepared to deal with it
• Embrace interruption as part of expected “day to day”
processes and plan accordingly
• Most days are relatively nice; but be prepared for the
occasional thunderstorm.
27. 27
6
Cloud-to-cloud
continuity will get
serious with Softwareas-a-Service (SaaS)
Rachel Dines, Forrester Research, for her contribution to http://blogs.forrester.com/james_staten/13-12-04cloud_computing_predictions_for_2014_cloud_joins_the_formal_it_portfolio
28. 28
CLOUD-TO-CLOUD CONTINUITY WILL
GET SERIOUS WITH SAAS
• Disaster recovery (DR) is a leading driver for
public cloud use
– Mostly by enterprises looking to improve the resiliency of mid- to
low-end apps
– For smaller companies putting their entire recovery strategy in the
cloud
• Cloud-based DR will go cloud-to-cloud
– Cloud-to-cloud backups for mainstream SaaS offerings
Rachel Dines, Forrester Research, for her contribution to http://blogs.forrester.com/james_staten/13-12-04cloud_computing_predictions_for_2014_cloud_joins_the_formal_it_portfolio
29. 29
WHAT DOES THIS MEAN TO YOU?
• A new market of backup solutions is rising to
meet this need
– These solutions automate the protection of critical data that is stored
with SaaS providers so organizations can recover this data if it is
accidentally, or maliciously, deleted
• Forrester wants to be clear that this is not
replacing DRaaS and cloud DR, but it's more of
an extension/different route that will be big in
2014. DRaaS is still continuing along at a very
steady pace.
Rachel Dines, Forrester Research, for her contribution to http://blogs.forrester.com/james_staten/13-12-04cloud_computing_predictions_for_2014_cloud_joins_the_formal_it_portfolio
30. 30
5
The role of the
Business Continuity /
Disaster Recovery
professional is
changing for the better
31. 31
Old Joke: What is the difference between
a highly paid/highly recognized BCP Manager and a Unicorn?
32. 32
Old Joke: What is the difference between
a highly paid/highly recognized BCP Manager and a Unicorn?
Answer: They are both mythical creatures!
33. 33
“One of our studies has shown
that since 2009, respondents have
indicated that IT/Disaster
Recovery and Business Continuity
strategies have increasingly
supported organizational needs.”
Cheyene Marling
President, BC Management, Inc.
Trending in Business Continuity - An Assessment of Data Collected
Between 2009 – 2011; Prepared by BC Management, Inc. - June 2012
www.BCManagement.com
34. 34
OTHER 2012 BCM INDUSTRY SURVEY
TRENDS
• Increased awareness at the chief officer level
• A shift in program sponsor from mid management/
management to the chief officer level/ board committee.
• The chief level program sponsors are stepping up their level of
engagement with the business continuity management program.
• Adding more full-time, permanent personnel dedicated to the
program and a decrease in downsizing of personnel in the next
year.
• A shift to an enterprise-wide resiliency focus with increased
executive support
• Acknowledgement of increased standards that will more than
likely continue to evolve the profession in the future.
35. 35
WHAT DOES THIS MEAN TO YOU?
• Life is Good!
• We are becoming recognized more and more
• We are being taken seriously
• We have a career path
– Vice President, Business Continuity
– Vice President, Disaster Recovery
– Chief Resiliency Officer
38. 38
THE PACE OF TECHNOLOGY MOVES FAST!
• To reach 70% of US households:
– Basic landline telephone:
– Cell phones:
52 Years
17 years
• Apple App Store
– 2008
– Today
~ 500 apps
> 1,000,000 apps
• Facebook
– 0 to > 1.1 Billion users
9 years
Apps image from : http://www.geek.com/apple/appleapp-store-subscriptions-1314201/
40. 40
WHAT DOES THIS MEAN TO YOU?
• You need to keep up with the technology
• This technology allows your employees, customers,
suppliers, etc., to communicate quickly and freely
• On the other hand, this technology raises the
expectation that your employees, customers,
suppliers, etc., will be contacted quickly when
necessary – like in an emergency
• Communication plans need to factor in these
expectations
42. 42
Boston Marathon bombings
More than 27 million Tweets were sent as the world discussed the
bombings, the manhunt, and the spirit of #bostonstrong.
After shutting down an entire city, Boston Police announced the capture
of Boston Marathon terror suspects. This single tweet eliminated the
tense atmosphere in the city.
http://www.forbes.com/sites/markfidelman/2013/12/14/twitter-these-are-the-most-popular-tweets-of-2013/
43. 43
WHAT DOES THIS ALSO MEAN TO YOU?
• Fast initial communications are more important
today than ever.
• You have to get in front of an event before it
swallows you up.
• Bad advice from a public relations manual:
– “Assess severity, length of issue and media life. If you believe this is a
very small ‘flash in the pan’ it may be best to not make public
statements for 24-48 hours and see how quickly the issue goes
away.”
45. 45
SOCIAL MEDIA WILL CONTINUE
TO DRIVE BC/DR RESPONSE
• Social media is here to stay
• A powerful tool to notify and communicate
before, during, and after an event
• Can also be a burden to crisis responders
– Incorrect information, rumors, everyone is a spokesperson
48. 48
SOCIAL MEDIA WILL CONTINUE
TO DRIVE BC/DR RESPONSE
• How Dan in West Virginia
learned about the WV spill
– Dan lives and works in West
Virginia
– Leak occurs just south of Dan’s
home
– Someone in WV posts the event
on Facebook
– Dan’s sister lives in upstate NY;
she reads about the event on
Facebook
– Dan’s sister calls Dan in WV and
informs him of the leak
– Dan has not heard about the
event!
– 15 minutes later, local news
announces the leak
49. 49
WHAT DOES THIS MEAN TO YOU?
• Organizations must know how to:
– Leverage social media
– Harness its power rather than let it control your response
• Companies/agencies need policies on what
information (non-emergency response) employees
can give out to the public, the media, and even their
family & friends.
• Employees need to know and understand your
communication policies and protocols, especially
during a disaster
50. 50
WHAT DOES THIS MEAN TO YOU?
• Make sure you have emergency
communications policies such as:
– “Statements to the public and news media concerning an
emergency at {Organization} are to be made only with the
knowledge and guidance of the Emergency Communications
Team.”
– “Information requests made to individual {Organization}
employees and contractors by the public, media, and government
officials must be referred to the Emergency Communications
Team.”
51. 51
WHAT DOES THIS MEAN TO YOU?
• What about the social media? You should
have a policy such as:
– “Employees shall not use social media to discuss, describe, or
inform anyone about any aspect of an emergency at
{Organization}”
52. 52
WHAT DOES THIS MEAN TO YOU?
• What about the social media? You should
have a policy such as:
– “Employees shall not use social media to discuss, describe, or
inform anyone about any aspect of an emergency at
{Organization}”
• But wait!!!
•
53. 53
WHAT DOES THIS MEAN TO YOU?
• What about the social media? You should
have a policy such as:
– “Employees shall not use social media to discuss, describe, or
inform anyone about any aspect of an emergency at
{Organization}”
• But wait!!!
• Is that policy legal???
Picture from: http://www.veteransnewsnow.com/2011/10/24/
54. 54
A LAWYER’S PERSPECTIVE:
JULIE MEADOWS-KEEFE
OF THE LAW FIRM GROSSMAN, FURLOW & BAYÓ
• It’s a thorny issue. That policy could raise
some First Amendment and other issues
• If employee is in a life or death situation. . .
– Probably no company discipline
• If employee tweeting on a personal account. .
– Violating company policy but within First Amendment protections
55. 55
A LAWYER’S PERSPECTIVE:
JULIE MEADOWS-KEEFE
OF THE LAW FIRM GROSSMAN, FURLOW & BAYÓ
• Policy should be a “Strong Recommendation” not
to discuss events on social media
• If you do, make sure it is clear that the message
is identified as a personal opinion
• Realistically: hard to implement or enforce
• Organizations should:
– Train all employees on your policies and
– Assume employee common sense
57. 57
TWITIOTS WILL CONTINUE
• Several people will become famous – or
infamous – by tweeting/blogging something
stupid!
58. 58
Justine Sacco - the
now-former
Communications
Director for IAC - lost
her job
approximately 12
hours after boarding
her flight.
http://www.dailymail.co.uk/news/article-2527330/Blonde-female-PR-executive-tweets-Going-Africa-Hope-I-dont-AIDS-Just-kidding-Im-white-causes-international-outrage-likelyfired.html
61. 61
WHAT DOES THIS MEAN TO YOU?
• Everyone with an internet connection/e-mail/twitter
account – essentially all your employees - must
understand that by pressing the “Send” button, you
are sending your “personal” message to potentially
over 2.4 Billion people
• That’s over one third of the world’s population
• There are no take-backs
• Again, what is your social media policy during an
emergency?
65. 65
KEEP THE MACHINES FROM
TAKING YOU OVER!
• Store data in offline forms and/or on local
devices
• Keep continuity plans on paper and/or on
local devices
• Have emergency shutdown protocols for
your data center
66. 66
WHAT DOES THIS MEAN TO YOU?
• These three strategies can and should be
applied to more mundane – and more likely –
disasters
– Loss of power to your data center
– Evacuation of the data center
– Loss of access to the building containing the data center
• If you have a data center building
evacuation:
– Can you quickly and orderly shutdown (and transfer) your data
center?
– How do you access plans and data that are stored online or on
your network?
70. 70
YOUR COMPANY/AGENCY/ORGANIZATION
WILL BE IMPACTED BY A DISASTER IN 2014
• Directly
–
–
–
–
Hurricane
Credit card hacking
Chemical spill/release
Etc, etc, etc.
• Indirectly
–
–
–
–
Post-Target system checks
Crisis affecting your neighbor
Crisis affecting your industry
Etc, etc, etc.
71. 71
WHAT DOES THIS MEAN TO YOU?
• Are you prepared????
• The usual “stuff”
– Management support, BIA, plans, procedures, staffing, equipment,
facilities, training, drills, exercises, lessons learned, etc
• Collateral damage from someone else’s crisis
• Management awareness?
73. 73
PREDICTING TRENDS IS ALWAYS A RISK
http://www.nationalreview.com/tags/boston-marathon-bombing#!
http://darkroom.baltimoresun.com/2013/10/boston-celebrates-redsox-world-series-victory/#6
76. 76
Dr. Steve Goldman
Web site: www. SteveGoldmanAssociates.com
E-mail: Steve@SteveGoldmanAssociates.com
The MIT BCP Course: http://shortprograms.mit.edu/cm