A15 – Implementing Adaptive Business Continuity at Brink’s
Mark Armour, Director Global Business Continuity, Brink’s Inc.
This will be a comprehensive look at exactly what was done at Brink’s to align the company with Adaptive BC Principles. Whether you are already familiar with the adaptive framework or are just learning about it now, this should answer many of your questions about how Adaptive BC is implemented and managed in the real world. You’ll learn about some of the challenges, difficulties and problems that an experienced practitioner can have in abandoning legacy BC practices.
A16 – Lessons Learned from Hurricane Irma and Other disasters
Beverly Schulz, CBCP, Director, RJF Operational Risk Management, Raymond James Financial
A Category 4 storm is headed straight for your town. What do you do when a critical recovery team member refuses to evacuate without their pet pot-bellied pig and no hotel will allow it? Well, you rent them a furnished apartment, that’s what you do. The 2017 Hurricane Season was memorable, setting numerous records and leaving devastation behind for many parts of our country. During this session, the presenter will cover lessons learned from the response to these storms and numerous other crises. Tips for improving your Crisis Management and Incident Response Programs will also be shared.
C11 – Raising Awareness and Bridging the Gap Between Disaster Preparedness at Work and Home
Kathy Lee Patterson, Business Continuity Manager, and Hannah Zimmerman, Business Continuity Analyst, Independence Blue Cross
Disasters happen whether we know they are coming or not. Preparing your employees for when they do occur is sometimes a challenge, especially when you have a few thousand or more. Bringing their home preparedness into the picture can help make everything more relatable and improve overall awareness. This presentation will present ideas on how to raise awareness of your Business Continuity Program and how to bridge the gap between having employees prepared at work and at home. Recent experiences will be discussed.
C12 – Improve Emergency Outcomes with Process and Technology
Peter Steinfeld, Director of Sales, AlertMedia
Successful incident management includes understanding and executing against each phase of the incident: preparing, monitoring, communicating, and resolving. Preparing – Understand the potential risks your organization faces. Monitoring – Keep your eyes on the world around your people and organization. Communicating – While an incident unfolds, you will need to direct your organization through any related dangers, manage required actions, and interact with your people to ensure their confidence and safety. Resolving – Putting an emergency event to rest requires an event audit and analysis to help minimize future risks.
D6 – Let’s Measure Our Capability to Recover – Take Two!
Michael Harding, BCM Program Lead, Automotive Resources International (ARI)
Are you being challenged by senior management to answer the question, ‘Can we recover?’ Is your response, ‘Yes, we have documented business continuity plans.’ Unfortunately, having a documented continuity plan does not translate into being able to recover. This session will provide the audience with a real-world method that the presenter implemented to measure business unit recoverability in our organization. It has helped provide senior management with a solid understanding of our capabilities to recover business operations. After you collect the required resources for business operations (people, processes, technology etc.) and document their strategies, it is extremely helpful to understand whether adequate components will be readily available following a disruption to ensure the department can recover within the Recovery Time Objective (RTO). The takeaways of the session will include being able to implement a similar measurement within their own environment.
E5 – Cyber Risks and Emerging Technology/Threats
Frank Leonetti, FBCI/CBCP, CEO, NorthStar Advisory Services, LLC
Some of the highly publicized cyber-attacks have illustrated that adversaries are interested in more than incidents. How does preparedness planning for cyber incidents differ from traditional business continuity planning? What other precautions should be taken to prepare for cyber-attacks?