Data Security and Encryption in the Cloud

By Zeb Ahmed, CLOUD, XaaS & BCDR Leader - IBM: In Wikipedia’s words, Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. On a daily basis, I meet customers from various verticals. Whether it is healthcare, financial, government, technology or any

Here’s What I Mean By “Business Continuity” – 5 Steps to Success

By Bryan Weisbard, CPA, CFE: When family and friends ask me what I do for a living, I’m almost always greeted by the same blank, confused stare when I respond with “Business Continuity.” To me and others in our profession, the words seem to fit the job. However, even business-minded individuals

The Case for Integration – Converting the BCM Silo into an Enterprise Risk Foundation

New demands are being placed on the Business Continuity organization to provide more services to the enterprise, often with little or no resources to support them. Higher levels of productivity, meeting new regulatory mandates, and providing coverage for new corporate acquisitions, are just a few of these new demands. But

A Methodological Approach for Developing a BIA

From defining the boundaries, to assessing financial and operational impacts, to identifying critical processes, to determining RPOs for critical activities, there is a true methodological approach for developing a business impact analysis (BIA). The BIA allows organizations to identify the critical processes of business and its continuity requirements, which become

Cyber Breaches and Business Resilience . . . Industry Observations

One of the top concerns for every company is cyber security. In order to effectively address the issues, organizations must have the right plans, processes, and security policies in place to avoid business disruptions. Robbie Atabaigi, Lead Specialist with KPMG LLP’s Southeast Cyber Practice, and Jodie Wright, Manager with KPMG LLP’s

Disaster Recovery in the Cloud: Are You Prepared?

By Zeb Ahmed, CLOUD, XaaS & BCDR Leader – IBM: While the importance of choosing the right disaster recovery solution and cloud provider cannot be understated, having a disaster recovery runbook is equally important (if not more). I have been involved in multiple conversations where the customer’s primary focus was the

Will You Be Ready When Disaster Strikes?

Businesses are under siege from an increasing number of natural and man-made disruptive events. One crisis can destroy your business and impact the lives of all involved. The recently published book, The Ultimate Business Continuity Success Guide, demonstrates how cutting-edge preparation techniques and tools can make your business unbreakable while

The Global Business Continuity Management Program Benchmarking Study

The Continuity Insights and KPMG LLP Global Business Continuity Management Program Benchmarking Study, which surveyed 349 executives from more than 30 countries, is a comprehensive analysis of the current state of BCM programs and the drivers for further program development. It explores changes to the global risk landscape, regulatory requirements,

Web Applications Weakest Spot in Network Defenses per 2017 Cloud Security Report

Alert Logic has released the 2017 Cloud Security Report which analyzes real-world security data to identify cyber-attack trends in attacker behavior and security practices. The report findings are based on data from more than 3,800 cloud, on-premises, and hybrid cloud customers and more than two million security incidents was analyzed