DRJ Spring World 2018 is slated to be DRJ’s best, biggest, and most inspiring conference yet. We sure hope you’ve registered and chosen your sessions and workshops. This is the one conference you cannot afford to miss. We’ve got the best in business continuity, disaster recovery, facilities, IT, operations, infrastructure, planning, and enterprise management ready to share their knowledge and expertise with you.
Business Survival Blog
- 7 Tracks.
- 75 Sessions and Workshops.
- 60+ Industry Suppliers.
- More Than 100 Industry Thought Leaders and Subject Matter Experts.
UNLIMITED ACTIONABLE IDEAS!
Make Plans to Join Us for the 16th Annual Continuity Insights 2018 Management Conference
April 23-25, 2018 ● Hilton Miami Downtown ● Miami, Florida
Are you a Business Continuity Manager or training for the job? Are you ready to keep your business up and running in the face of disruption?
In this second edition of Principles and Practice of Business Continuity: Tools and Techniques, Jim Burtles explains six main scenarios. He promises: “If you and your organization are prepared to deal with these six generic risks, you will be able to recover from any business disaster!”
Principles and Practice of Business Continuity: Tools and Techniques is organized with all the features you need to master business continuity.
[Read more…] about How Do You Master Business Continuity?
What about the legal aspects of cybersecurity? ARE YOU AT RISK?
With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager’s Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.
Building Effective Cybersecurity Programs: A Security Manager’s Handbook is organized around the six main steps on the roadmap that will put your cybersecurity program in place:
- Design a Cybersecurity Program.
- Establish a Foundation of Governance.
- Build a Threat, Vulnerability Detection, and Intelligence Capability.
- Build a Cyber Risk Management Capability.
- Implement a Defense-in-Depth Strategy.
- Apply Service Management to Cybersecurity Programs.
|Make 2018 the year you focus on professional development. Attending DRJ Spring World 2018 gives you the best way to build-on your business continuity expertise and to network with leaders in the industry. Take advantage of the learning, career growth, and leadership opportunities at Spring World 2018.
As the largest and most popular business continuity conference in the industry, we don’t want you to miss out on your chance to attend DRJ Spring World 2018. Register before January 24, 2018 and save $200 on your registration fee.
Remember, the DRJ team organizes these conferences for you. Our goal is to give you the best in leadership, learning, networking, technology, and resources – make 2018 your year. We’ll see you in Orlando, Florida from March 25 – 28, 2018.
When the challenge is to get to the heart of a problem, you need a simple and efficient cause investigation methodology. And what would make a real difference would be an interactive map to lead you to the answer every time. Chester Rowe’s Simplifying Cause Analysis: A Structured Approach combines an instruction book with a downloadable Interactive Cause Analysis Tool – for the results you have been looking for.
The book is intended for professionals like you. You have some familiarity with cause analysis projects, but you’re looking for a simple and efficient cause investigation methodology – a more effective and insightful way of asking “why?”
As a security professional, have you found that you and others in your company do not always define “security” the same way? Perhaps security interests and business interests have become misaligned. Brian Allen and Rachelle Loyear offer a new approach: Enterprise Security Risk Management (ESRM). By viewing security through a risk management lens, ESRM can help make you and your security program successful.
In their long-awaited book, based on years of practical experience and research, Brian Allen and Rachelle Loyear show you step-by-step how Enterprise Security Risk Management (ESRM) applies fundamental risk principles to manage all security risks. Whether the risks are informational, cyber, physical security, asset management, or business continuity, all are included in the holistic, all-encompassing ESRM approach which will move you from task-based to risk-based security.
Just a decade ago, as security professionals, we could talk reasonably about physical security and logical security requiring different approaches. Five years ago, we might have found ourselves having conversations about the blurring lines between the two types of security discipline, and could have easily pointed to aspects of both physical and logical security that crossed over each other.
Today? In organizations that have embraced even the least cutting-edge aspects of operational and information technological advances (consumer IoT, industrial IoT, cloud hosted services, etc.), we can no longer rationally discuss a strictly “physical” or “logical” approach to managing security risks to the enterprise.
by Rachelle Loyear, CISM, MBCP, AFBCI, PMP
Rachelle Loyear is author of The Manager’s Guide to Simple, Strategic, Service-Oriented Business Continuity and co-author with Brian J. Allen of Enterprise Security Risk Management: Concepts and Applications and The Manager’s Guide to Enterprise Security Risk Management: Essentials of Risk-Based Security.
You know by now that your company could not survive without the Internet. Not in today’s market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager’s Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.
Over 30+ years, Tari Schreider has designed and implemented cybersecurity programs throughout the world, helping hundreds of companies like yours. Building on that experience, he has created a clear roadmap that will allow the process to go more smoothly for you.