B12: Tuesday, October 15, 4:00 p.m. – 5:00 p.m. This case study demonstrates how and why a firm developed its own internal work area recovery site, and what went right and what went wrong along the way. If your firm is considering an internal work area recovery site, this presentation will help you navigate all the major decision points involved in the process.
CINY 2013 — B14: Advanced Concepts In Workplace Violence Prevention: A Practical Exercise In Threat Assessment & Threat ManagementOctober 8, 2013 1:31 pm | Events | Comments
B14: Wednesday, October 16, 8:30 a.m. – 9:30 a.m. This interactive presentation applies a tabletop exercise format to a notional workplace violence scenario, allowing participants to view the inner workings of the threat assessment and threat management process. As the scenario progresses from initial threat reception through ultimate resolution, key concepts, standards, and models of violence prevention and intervention will be introduced in the context of the case at hand.
B15: Wednesday, October 16, 8:30 a.m. – 9:30 a.m. Risk Assessment is a foundational element of any business continuity program. This session will lay out a practical approach and plan for conducting a risk assessment. Attend this session to learn how to assimilate risk and business continuity to create an integrated program that can effectively and efficiently mitigate risky business.
B17: Wednesday, October 16, 9:45 a.m. – 10:45 a.m. In this case study, attendees will hear how Memorial Sloan Kettering began its emergency preparations and mitigation long before the impact of Superstorm Sandy was known. Attend this session to learn how Memorial Sloan Kettering managed activities such as the reception of evacuated patients during the storm, how it was able to continue care after the storm, and how social media was used before, during and after the event.
B20: Wednesday, October 16, 1:30 p.m. – 2:30 p.m. Many refer to high-impact events as "black swans,” and whether improbable or inevitable, the decisive issues are really how effective and successful were we in our response. This session will review a number of recent “black swan” events and suggest how our response could have been improved by dismissing the “red herrings,” those distractions that divert our attention from the real tasks at hand.
B21: Wednesday, October 16, 1:30 p.m. – 2:30 p.m. It’s no secret that we prefer to be engaged in our learning. Actively doing something with information helps us better understand and retain it. This is particularly important when it comes to something we do rarely, like business continuity planning. Attend this session to learn how to use collaborative activities for collecting data and facilitating a Business Impact Analysis (BIA).
Convenient. Affordable. Exceptional content. Unique perspectives. Essential contacts. Time is running out! Register today to join us in New York on October 15-16, 2013. Visit our conference website to view the full agenda and register today.
The first 72 hours of a crisis are critical for any company or organization because the media narrative is set in those first 72 hours, and as a result, so is public opinion. Many companies are just responding to the crisis when media interest is moving on and the public narrative has been set. That is why it is essential to have a crisis communications plan in place.
A record-breaking storm that dumped 4 feet of snow in parts of western South Dakota left ranchers dealing with heavy losses, in some cases perhaps up to half their herds, as they assess how many of their cattle died during the unseasonably early blizzard. Meanwhile, utility companies were working to restore power to tens of thousands of people still without electricity.
Authorities say an industrial estate in eastern Thailand is facing minor flooding although factories are operating normally, triggering concerns the country could see a repeat of the devastation caused by record floods in 2011. Local district chief Lersan Sasipong said Tuesday that floodwater has breached Amata Nakorn industrial estate in Chonburi province, 60 kilometers (40 miles) southeast of Bangkok.
CINY 2013 — B22: Superstorm Sandy: Preparedness & Response From The BOMA/NY Local, Building Management & Tenant PerspectivesOctober 8, 2013 7:53 am | Events | Comments
B22: Wednesday, October 16, 2:45 p.m. – 3:45 p.m. Attend this session to learn the following from BOMA: Understand the importance of developing effective pre-incident public-private relationships. Examine BOMA/NY’s local role during emergencies as a coordination and communications "fusion center" and how BOMA/NY interacted with local agencies, building management and building ownership. (Learn what worked and what didn't work.) Understand logistical challenges associated with a regional disaster and gain a realistic perspective on the limited availability of key resources during recovery.
B23: Wednesday, October 16, 2:45 p.m. – 3:45 p.m. The more familiar staff and mission-critical personnel are with emergency policies and procedures, the more likely they will respond efficiently when a business disruption occurs. Therefore, it is crucial to develop a comprehensive training and exercise plan that validates an organization’s business continuity plans. In this session, the presenter will share lessoned learned from rejuvenating the Red Cross’ training and exercise programs.
President Barack Obama is thanking workers at the Federal Emergency Management Agency for doing their jobs under "less than optimal circumstances" during the government shutdown. Obama made an unannounced visit to FEMA Monday as the shutdown neared the one-week mark.
David Perdew learned during his company's semiannual training workshop in February that its website had been hacked. A threatening message on the site read: "David Perdew, you owe me money and I will expose the database to the world if you don't pay."
Adobe Systems Inc. said a cyberattack on its systems has exposed credit-card information of 2.9 million customers. The maker of Photoshop and other software said Thursday that the attacker accessed Adobe customer IDs and passwords on its systems.