B3: Return to Work: The Most Important Issue You’ve Completely Overlooked
Bo Mitchell, 911 Consulting
If you think that plexiglass, hand cream, and desk wipes are the most important issues in your Return to Work, then you will fail with your employees. The most important issue: Trust in You as the Boss.

Current research indicates nationwide that:

  • Only 15-33% of offices are occupied today.
  • 84% of bosses think they have done “great” job in managing the virus…
  • …but, 86% of employees don’t trust their CEO and senior managers to safely return employees to work.
  • 29% of workers would look for a new job rather than return to a site that has not implemented necessary safety measures.

Do your employees today trust you, your property manager, or the government that your workplace is safe for employees’ RTW? NO!  Lack of trust in you is not about plexiglass, hand cream, and desk wipes. Those things are universally expected. What about your workplace’s safety for emergencies other than COVID like civil unrest, workplace violence, a fire, bomb threat – there’s a long list. Your employees are stressed; are coworkers safe to be around? Drugs, alcohol, suicides, street crime, gun violence, gun sales, guns confiscated, OSHA complaints, OSHA citations – all of these uses and abuses are way up since the virus struck. Do your employees trust that you have planned for all this? Trained everyone? The learning objective of this session will cover:

  1. What is your legal exposure re RTW?
  2. What is the data for the new RTW threat: Employee stress, drug/alcohol use, suicide, workplace violence, et?
  3. What are the laws, regulations and standards that focus on RTW for employers?
  4. What leadership by you is necessary for a successful employee RTW strategy.

B4: Privacy Is a Business Continuity Issue Too
Steve Ross, Risk Masters, Inc.
Business Continuity Managers should be concerned about data privacy. Every Business Continuity Plan that contains contact information for key managers and staff is a potential privacy violation unless specific safeguards are observed. Moreover, the files that are used for backup and recovery are subject to the same privacy requirements (such as the right to be forgotten) as the primary databases. Also, responding to privacy breaches can be very disruptive. Organizations should prepare for minimizing the impact of system unavailability, investigations, audits, and access limitations on normal business operations. This presentation will address these and other issues and offer practical guidance on implementing measures to comply with recent legislation and to ensure that the Business Continuity Management function is not contributing to an organization’s privacy exposure. These include identification of repositories of personally identifiable information (PII), assessment of the uses to which they are put, obtaining consent from those whose contact information is needed for recovery, and monitoring the use of relevant files.

C3: Conducting Joint BC/DR Testing With Third-Party Service Providers and What to Do If They Don’t Offer Joint Testing
Carlo Kelejian, Continuity Innovations
Third-party service providers deliver critical services to organizations and joint BC/DR testing should be included in your enterprise-wide exercise and BC/DR testing program. Organizations need assurance that all third-party service providers they decide to partner with are resilient, reliable, and transparent. Also, they should have adequate plans put in place, sound risk management programs, solid infrastructure, and personnel to restore critical outsourced services consistent with business and contractual requirements. In this session, we will discuss how to work with your third-party service providers to conduct joint BC/DR tests to validate the effectiveness of their BC/DR plans. We will also cover what to do if your third-party service providers do not offer joint testing. Attend this session to explore the steps you can take to mitigate risks associated with outsourcing critical services.

C4: How Software Is Addressing the Continual Evolution of Business Continuity
Monica Goldstein, Agility Recovery
The Pandemic provided a spotlight on organizational resiliency at all levels and tested the activation of Business Continuity Plans throughout the world. The evolution of Business Continuity has seen the development of different approaches and frameworks based on changes in the business and regulatory landscape and having to address differing impacts and threats. Having a software platform that provides for “at your fingertips” action items, automates delegation of authority, stores updated contact information, and houses pre-established communication greatly improves the success of businesses with Plans in place. This session will focus on ways to maximize and fully leverage your BCM software. We will review best practices for utilizing Business Continuity Management software as part of an organization’s Planning and Resiliency strategy. If you don’t have software, you will gain an understanding on how software can better your program, address pain points and ways of getting started.

 

D2: Metrics That Motivate the Plan Lifecycle             
Kathy Davis, C.H. Robinson
Story of how metrics brought more collaboration and energy in the partnership between the business continuity team and the continuity plan owners and senior leadership. Process the business continuity team used so that attendees can consider how to adapt the process we used to their business context. Metrics can motivate! This session will show how the C. H. Robinson team developed metrics that brought new energy into their business continuity plan life cycle. Be prepared for interactivity! We’ll go through the key questions in the process so that you can adapt the process to your own business context.