In 2012, Continuity Insights published its first report into the use of social media as a crisis communications tool. This year, we dug a little deeper in an effort to learn more about the industry’s social media strategies. Over 315 participating organizations responded to the survey.
Being proactive embodies the intent to go beyond recovery to identify what information we need on a continuous basis, in order to identify opportunities for competitive advantage in an adverse situation. The target is an improved competitive position that can in fact increase revenues and develop long-term competitive superiority.
We need to embed recognition of culture into our practices and use that knowledge to improve the appeal and relevance of BCM to our businesses. If you cannot understand why others do not share your passion to establish and maintain a viable continuity capability, you need to read this paper.
In the leadup to the11th Annual Continuity Insights Management Conference, April 22-24, 2013 at the Sheraton San Diego Hotel & Marina, Continuity Insights sat down with Ron Martel, Development Executive at IBM Business Continuity & Resiliency Services, to discuss the impact of data breaches and the importance of thinking on multiple dimensions.
In the leadup to the 11th Annual Continuity Insights Management Conference, Lynnda Nelson, President of ICOR, discusses “soft” business continuity issues, why risk management is not a panacea and the business continuity-themed supergroup: Strapperjack!
In the leadup to the 11th Annual Continuity Insights Management Conference, Scott Shaw, Senior Manager, Corporate Security, Transportation, and Disaster Preparedness at Aflac, discusses partnering with public officials for emergency response exercises and why former president Bill Clinton would have made a good business continuity professional.
In the leadup to the 11th Annual Continuity Insights Management Conference, Bill Wostenberg, IT Service Continuity Consultant at Pacific Life Insurance, discusses the mistake to avoid when planning BC exercises and President Herbert Hoover’s disaster relief efforts.
In the leadup to the 11th Annual Continuity Insights Management Conference, Chris Needham-Bennett, owner & Managing Director of London-based Needhams 1834 Ltd, discusses the real cost of ISO22301 certification, the tsunami that struck Britain in 1607 and Theodore Roosevelt’s resilience.
How do we gather, authenticate and integrate information from a variety of sources -- citizen, mass media, official, etc. -- to develop situational awareness? Verifying techniques fall into two categories: reliability of source and outside confirmation.
In the leadup to the 11th Annual Continuity Insights Management Conference, Tracy Stourac, Business Continuity Manager at TransUnion, discusses BC scorecards, the importance of personal preparation and why President Kennedy would have made a good business continuity professional.
Crowdsourcing can serve as a counter-balance to the interpersonal forces that might steer a closed group of experts off course. The public is a resource that can assist disaster responders by providing valuable information and perspectives. The secret is knowing how to gather the information so as to make the public a resource. This is done with a “Virtual Operations Support Team” (VOST).
Gaming is an excellent way to increase learning retention and enhance teaming. Exercises are serious business, but with some inspiration from three popular party games you can let participants have a little fun while raising awareness about your business continuity management (BCM) program.
While BC programs (BCPs) offer immense value to organizations they are not always leveraged to give the organization an edge over competitors. Andy Vanderhoff, President of Quantivate, discusses the ways you can publicize your BCP and use it to achieve cost savings, as well as the lean manufacturing conundrum: necessary redundancy versus lean principles.
During the early morning hours on January 18, 2012, a hacker gained access to the ASU computer systems and removed a list of passwords. The IT incident response team recommended the incident be classified as high-level and email systems be shut down. Within minutes of establishing the first bridge-line call, a member of ASU’s media team suggested the use of ICS to manage this incident.
Any electronic equipment left in the open is considered unshielded and vulnerable to the effects of a geomagnetic storm. Studies have shown that you can offer some protection by simply turning off and unplugging unshielded pieces of equipment. The most effective way to protect equipment is by shielding it with a Faraday cage.