Integrating the Disciplines of Business Continuity, Crisis Management, Disaster Recovery, Emergency Management, Governance Risk and Compliance
Learn best practices, check out latest trends and dive deep into research reports authored by leading and “vetted” professionals.
Real-life case studies and innovative solutions to your tough business resilience challenges offered by our partners.
Lots and lots of events — local and national, virtual and on-site, networking and educational. Get insights and practical ideas from experts.
Interact with groups you know, find new groups. Interact by networking, asking questions and solving business issues.
Participate in forums related to your industry, job title or geographic location. Have a question – ask it! Have a solution – share it!
Participate in building a relevant and robust hub. Give us feedback, submit research findings, author an article and much more!
BLOGS top-notch IT availability & security expertise
BLOGS
top-notch IT availability & security expertise
CIOs Want to Know – When Are We Done with IT Disaster Recovery?
“When are we done with IT Disaster Recovery?” “How much is good enough?” Chief information officers, and the boards of directors that they report to, want to know when they can stop spending money to [...]
Designing an Exercise to Prepare for a Cyber Attack
Introduction It seems there isn’t day that goes by without another story of a cyber attack or breach. It has almost become a “breach a day!” Not only is there confidential company or customer information [...]
Seven Keys to Success When Working with Information Security Professionals
As they relate to IT, the functions of business continuity and information security have one common goal. That is to minimize the losses and maximize the uptime of the organization's information systems before, during, and [...]
Cyber Resilience in the Cognitive Age
From Security to Cyber Resilience Cyber resilience is a concept that over the past five years has been evolving as information security, business continuity and risk management disciplines continue to converge. Today, cyber resilience methods [...]
Role of Senior Management and Technology/IS Department In A Cyber Breach Exercise
There are two things you must have in place before you begin planning a cyber breach exercise to ensure that the exercise will go smoothly. Both are critically important. You need senior management commitment and [...]
Secure E-Mail: Critical Business Applications May Be Wide Open to Attack
All it takes is one weak link in your network or e-mail environment for corporate correspondence to become fair game to anyone with network access. Not only is e-mail an important business tool; it’s a [...]
You Can’t Afford To Overlook Security Incident Response
Incident response – the art and science of responding to computer and network security breaches – is an often overlooked component of business continuity. For whatever reasons, the procedures associated with handling network intrusions and [...]
IT Complexity and the Risk of IT Failure
IT Complexity and the Risk of IT Failure For the past few years, the unabashed enthusiasm around clouds, virtualization and software-defined everything has led to some unfortunate side effects. One is the suspension of disbelief [...]
What Answers Do BC Planners Need from Their Cyber Security Team?
Some experts say there is a thin line between disaster recovery and business continuity planning (BCP). The first is owned by the computer operations or IT department, while the second is usually owned by the [...]
Information Security and Public Cloud Computing
If you asked a group of ten or more IT practitioners or business people what cloud computing is, they would probably give ten different answers. Each would have an answer consistent with his own specific [...]