Contact Us

Continuity Insights Management Conference

Compliance

Web Applications Weakest Spot in Network Defenses per 2017 Cloud Security Report

Alert Logic has released the 2017 Cloud Security Report which analyzes real-world security data to identify cyber-attack trends in attacker behavior and security practices. The report findings are based on data from more than 3,800 cloud, on-premises, and hybrid cloud customers and more than two million security incidents was analyzed ... Read more

BCM Service Provider/Critical Supplier/Supply Chain Management Assessment

BC Management is conducting its annual BCM Service Provider/Critical Supplier/Supply Chain Management Assessment. The survey will be used to assess BCM service providers (alternate site, software, notification and mobile recovery) and critical/ third-party suppliers. Key findings will determine: What is being spent on BCM service providers and are they meeting ... Read more

10 Critical Indicators of a Sound Business Continuity Program

Is your business continuity program in good health? Does it include what many experts consider the most critical element of any business continuity program? These 10 indicators will help you make sure that your program is on track regardless of your industry or company size.

What Will Your New BC Program Look Like One Year Later?

How much can you expect to create, develop, and mature in your first year managing a new business continuity program? Sometimes the questions are more important than the answers. What is reasonable to promise? What do you prioritize? And how do you gain support? Follow one BC professional’s journey of ... Read more

Nearly a Quarter of All Email Still Deemed Unsafe

Email Risks

A new report from cloud-based email management company Mimecast indicates that email remains the primary attack mode for delivering security threats for ransomware, impersonation, and malicious files or URLs. According to the report, 24% of all delivered email is considered unsafe. Whether it’s delivered via a cloud-based, on-premises, or a ... Read more

Mail-Gard to Create New Advanced Recovery Center

Print-to-mail continuity and recovery services provider Mail-Gard has announced the creation of a dedicated recovery center which will be located at its Warminster, Pa campus. In combination with its existing dedicated recovery center in Hamburg, Pa, the expansion of Mail-Gard’s footprint is designed to improve service delivery while providing increased ... Read more

Your First 100 Days – Seven Steps to Maximizing Your BC Program

Business continuity professionals change jobs for a variety of reasons, often a new opportunity, significant challenge, or to find a different company culture. Regardless of the circumstance, a comprehensive, detailed roadmap will help you do things RIGHT!!… a second, third or even a fourth time! This Continuity Insights New York ... Read more

The Blind Spot in Workplace Violence Prevention Programs: Part Three

By Steve Crimando, Behavioral Science Applications Bringing It Home In this final installment in our three-part series addressing violence prevention for employees working from home, we will focus on strategies and techniques that employees can use to reduce the risk of violence and ensure a safe and healthy work environment. In ... Read more

Creating an Effective Resiliency Program

Where does crisis management end and business continuity begin? Where does BCP report? What are the critical components of an effective resiliency program? Join David Strumpf, Senior Principal of the Promontory Financial Group, as he presents “How to Create an Effective Resiliency Program” at the Continuity Insights 2017 New York ... Read more

Preparing Your Company for Operations – Before, During, and After a Cyber Attack

Conventional cyber-security doesn’t address the broad range of business issues affected by cyber-attack. A comprehensive strategy must incorporate both basic and emerging cyber defenses that address technology, policy, and behavior. It also needs coordinated, detailed plans to continue operations after an attack, defeat the attack, and restore the organization to ... Read more

Share to...