Author: Jim Mitchell
Cyber disruptions – and their impact on both reputations and profitability – have risen to the top of nearly every recent risk study. These increasing concerns weigh heavily on Executive Suites and Boards. In the IT realm, CIO’s and CISO’s now focus their efforts on mitigating those risks, and planning responses to potential data breaches, […]
“This isn’t working.” “I’ve changed.” “I don’t see a future with you.” Those ‘breakup’ lines may apply to your Business Continuity Management software or your latest paramour. Not all relationships succeed. When things go awry, goodbye may be the best solution. But that may seem impossible – even when you know it’s necessary. You’ve invested […]
The immediate reaction to a cyber-security incident is the FUD factor (Fear, Uncertainty and Doubt); more like ‘chickens running around with their head cut off’. An agile response requires tested and documented Incident Response Plans – including Crisis Management, Business Continuity and IT Disaster Recovery Plans. Automating the workflow facilitates seamless collaboration and the ability […]
Definition: Technology modeling is a point-in-time snapshot of an Enterprise’s IT Services – including its dependencies on infrastructure – and interfaces to other services and Business Processes which depend on them. This organizational Technology Model provides executives the critical decision support they need to understand the impacts of a service disruption.
Definition: A Business Impact Analysis (BIA) is the cornerstone of creating a BCM program. Basically, a BIA helps prioritize restoration efforts in the initial response activities following an operational disruption. A secondary objective of a BIA is identification of all operational dependencies to enable successful business restoration.
Within Business Continuity circles there is ongoing debate about the relevance and role of Risk Assessment in developing a BCM program. Having been in the industry for more than 20 years, I understand the issue from both the sides. Traditional, formalized Risk Assessment aims to identify the threats to which our organization is vulnerable. Once […]
As a Business Continuity Management (BCM) solution provider, the first question I ask potential clients is: What are your major program challenges? Here’s what I hear: We don’t have a seat at the executive table where major decisions are made. The program lacks executive buy-in. BCM is at the bottom of the priorities list for […]