CMC 3030: Harnessing the Power of Social Media in Crisis Management Live Elearning Course
November 11- Friday, November 22, 2013. There is extended time to complete the final paper after November 22, 2013.
Access course materials at times convenient to you and complete the following activities each week:
- Virtual Instruction: View and listen to C4CS Professionals teach for approximately 1 hour each week.
- "Live" Discussions with Students World-Wide: Participate in a virtual classroom discussion and answer 2-3 discussion questions each week.
- Learn from Experts: There will be reading material assigned each week to supplement the instruction. Learn from industry experts and the latest research.
- Provide Social Media Strategies to the Leadership of your Organization: As part of the course you will be required to write an essay that demonstrates your ability to write a social media policy or to evaluate the appropriate social media toolkit for your organization. The work completed in this course can be immediately applied to improve the crisis communications plan for your organization.
Harnessing the Power of Social Media in Crisis Management is an introductory course designed to help professionals better understand and learn to use social media effectively. While the importance of traditional mass media in crisis management and crisis communication is gradually declining, the impact of social media is rapidly increasing.
Credentialing and Accreditation
November 11-22, 2013
Alike, the most popular Citrix XenServer BDR solution, works seamlessly with Hyper-V environments
BURLINGTON, VT – October 23, 2013 – Quadric Software, a leader in multi-hypervisor backup and disaster recovery solutions,
today announced that its Alike BDR solution now supports Microsoft Hyper-V 2012 R2, in addition to the 2008 R2 and 2012 versions.
Alike, the most popular Citrix XenServer BDR solution, works seamlessly with Hyper-V environments.
“Adding support to Hyper-V 2012 R2 is the latest example of our commitment to provide the Hyper-V community with a single,
easy-to-use, and feature-rich backup and DR solution that can protect an entire virtualized and physical system environment,”
said Phil Baskette, co-founder and CEO of Quadric Software, Inc. “As part of our ongoing investment in business continuity
solutions, we will be adding BDR support for physical systems early next year.”
With the Alike solution, companies can backup, replicate, and restore to and from XenServer or Hyper-V. Quadric Software
offers simple, affordable licensing per host and gives companies self-service access to transfer their licensed hosts between
hypervisors any time they want within their own version of the software.
More than 7,000 customers worldwide are currently using the Alike solution and benefiting from industry-leading global,
block-level, source-side deduplication that delivers dramatic savings in storage, memory, and bandwidth costs while boosting
backup and replication speeds.
Quadric Software is currently managing a Beta program for expanding BDR support to physical systems with a target
general availability of the new capability in early 2014.
About Quadric Software (formerly Quorumsoft)
Quadric Software, Inc., formerly Quorum Software, Inc. was founded in 2008 to offer organizations of all size the
high-performance and cost-effective solutions they need to meet their backup and business continuity requirements.
The Alike solution is used by more than 7,000 businesses, government entities, educational institutions and non-profits worldwide.
You can get more information on Alike at:http://www.quadricsoftware.com/products/
You can get general information about Quadric Software at: http://quadricsoftware.com/index.php
Follow Quadric Software on Twitter at http://twitter.com/Quadricsoftware
State of Cloud Security Bulletin Reveals High Levels of Brute Force Attacks and
HOUSTON, TX – October 23, 2013 – Alert Logic, the leading provider of Security-as-a-Service solutions for the cloud, today released its State of Cloud Security Bulletin on Information Security in the Energy Sector. The bulletin, based on a six-month study period of customer data, examines the rise of cyber attacks targeting the energy sector—an industry thought to be particularly at risk due to the highly confidential and proprietary information they possess, as well as the prevalence of BYOD (Bring Your Own Device) and contractor access.
“The energy sector is a big part of the global economy and therefore has extremely high-stakes security risks compared to other industries,” said Stephen Coty, director, security research with Alert Logic. “Daily survival of the population and businesses alike depend on the availability of energy resources, making energy companies a prime target for hackers. This Security Bulletin calls out the specific threats to energy companies and provides recommendations for fine tuning existing information security defenses.”
The Security Bulletin found that, when compared to Alert Logic’s overall customer set, the energy sector is at an elevated risk of brute force and malware/botnet attacks:
67 percent of energy companies experienced brute force attacks, versus 34% of entire customer set. Attackers look for opportunistic points of vulnerability in networks housing confidential business information. Breaches of geophysical data, in particular, are intended to damage or destroy the data used in energy resource exploration. Brute force attacks are also used to steal a company’s intellectual property for the purpose of industrial espionage.
61 percent of energy companies experienced malware/botnet infiltration attacks, versus 13% of entire customer set. These attacks seek access to physical infrastructure systems that control pipelines and other key energy plant operations. Alert Logic found that technologies such as SCADA (Supervisory Control And Data Acquisition) systems are vulnerable to hacking, while the emerging business practices of BYOD (bring your own device) and BYOA (bring your own applications) in the workplace can be carriers of viruses and other malware.
“Unlike an attack on an e-Commerce site or SaaS application provider, a malware infiltration attack on an energy company could grow to catastrophic proportions if hackers were able to block or flood the oil and gas pipeline infrastructure,” Coty said. “This industry doesn’t see the typical web application attacks. It experiences a greater magnitude of security threats that could have global repercussions for years to come.
To help companies meet the specific security challenges of the energy sector, The Security Bulletin includes guidance for effectively defending against brute force attacks and malware/botnet threats. Recommendations include enhancing existing security strategy with multi-layer security practices, monitoring and defensive technologies to identify and stop cyber-attacks, as well as raising security awareness among employees.
A free download of the Alert Logic State of Cloud Security Bulletin: Information Security in the Energy Sector is available at www.alertlogic.com/csr.
Additional Resources Available:
Targeted Attacks and Opportunistic Hacks – Spring 2013 Infographic
@alertlogic on Twitter
About Alert Logic
Alert Logic, the leading provider of Security-as-a-Service solutions for the cloud, provides solutions to secure the application and infrastructure stack. By integrating advanced security tools with 24×7 Security Operations Center expertise, customers can defend against security threats and address compliance mandates. By leveraging an “as-a-Service” delivery model, Alert Logic solutions include day-to-day management of security infrastructure, security experts translating complex data into actionable insight, and flexible deployment options to address customer security needs in any computing environment. Built from the ground up to address the unique challenges of public and private cloud environments, Alert Logic partners with over half of the largest cloud and hosting service providers to provide Security-as-a-Service solutions for business application deployments for over 2,300 enterprises. Alert Logic is based in Houston, Texas, and was founded in 2002. For more information, please visit www.alertlogic.com.
New virtual LoadMasters provide unprecedented performance with capacity for more demanding workloads
New York, NY – October 23, 2013 – KEMP Technologies today announces the availability of three new virtual load balancers — the Virtual LoadMaster (VLM) 200, 2000, and 5000. These new Virtual Load Balancers dramatically increase application performance enabling customers to deploy virtual ADCs with greater agility for workloads where hardware appliances were traditionally the only option.
Releasing these powerful virtual ADCs cements KEMP’s position as the leading application-centric ADC vendor and opens the door for application administrators to self-serve for high availability and scalability. As the IT budget continues to move more toward the Line-of-Business (LOB), these virtual ADC enable administrators to be much more agile in deploying and managing key business critical applications.
The VLMs’ high performance is capable of scaling up to 5Gbps throughput and up to 10,000 SSL transactions per second (TPS) – fully leveraging the network optimization capabilities of VM hypervisors and high performing x86 server platforms. The VLMs deliver the same comprehensive core feature set available in the entire LoadMaster family of ADCs while offering the flexibility of virtualization technology.
· Core Features: The VLM provides full Layer 7 ADC functionality including content switching, SSL offloading, application health checking, session affinity, caching, compression, intrusion prevention, pre-authentication and single sign-on.
· High Performance: Scalability to 5Gbps throughput and 10,000 SSL TPS provides customers with a compelling virtual ADC alternative to mainstream hardware solutions.
· Global Server Load Balancing (GSLB): GSLB expands intelligent load balancing and application delivery beyond a single site to geographically dispersed locations via algorithms capable of selecting the best suited datacenter for client requests.
· Optimized Experience: Session affinity delivers user’s application connections to the most appropriate endpoint to ensure an optimal user experience.
Quote, Peter Melerud, EVP of Product Management at KEMP Technologies
“As a software-driven company, KEMP’s deep understanding of the application-centric market and ADC technology has led us to become a prevalent solution providing enterprise administrators with the flexibility and turnaround time needed to meet the needs of line of business applications. KEMP’s focus on virtual-based solutions and its ability to meet customer requirements regardless of platform has contributed to KEMP Technologies being the 3rd most shipped ADC in the world in Q2 2013.”
The VLM-200, VLM-2000 and VLM-5000 are available immediately for download. For more information, please visit
About KEMP Technologies
Since 2000, KEMP Technologies has been a leader in the application delivery controllerand load balancer market, used by thousands of enterprises that consider IT, e-commerce, web and business applications as mission-critical to their long-term success. KEMP helps enterprises rapidly grow their business by providing 24/7 infrastructure availability, better web performance and secure operations – while streamlining IT costs.
KEMP’s LoadMaster products include Layers 4-7 load balancing, content switching, session persistence, SSL Offload/Acceleration and web front-end capabilities (caching, compression, intrusion prevention system), plus one full year of product support – delivering industry leading value in the ADC market.
KEMP is headquartered in New York City.For more information, visit www.kemptechnologies.com
- Pacnet announces today its equity joint venture in China, Pacnet Business Solutions (China) (“PBS”), has been awarded an Internet Data Center (IDC) license by the Ministry of Industry and Information Technology (MIIT) to provide data center network services in Chongqing, China.
- This award expands Pacnet’s data center network footprint in China, which also includes data centers and network Points of Presence (PoPs) in Shenzhen, Beijing, Shanghai, Chengdu and Xi’an.
- “Chongqing is the most important megacity in Southwest China and a very important hub for Pacnet’s data center network not only throughout China, but also the rest of the Asia-Pacific region,” says Henry Lam, Chief Executive Officer of PBS.
HONG KONG, 23 October 2013 – Pacnet today announced its equity joint venture in China, Pacnet Business Solutions (China) (“PBS”), has been awarded an Internet Data Center (IDC) license by the Ministry of Industry and Information Technology (MIIT) to provide data center network services in Chongqing, China. This award expands Pacnet’s data center network footprint in China, which also includes data centers and network Points of Presence (PoPs) in Shenzhen, Beijing, Shanghai, Chengdu and Xi’an.
Pacnet is the first foreign invested company to have been issued a license to provide data center network services in Chongqing, China, following the MIIT’s announcement in December 2012 to resume the grant of new IDC licenses. The new license process is stringent, reiterating MIIT’s goals to strengthen and monitor the IDC market in order to foster a healthy development of the Internet industry in China. The process requires an evaluation of four major systems maintained by license applicants, namely, Internet Content Provider Record-keeping Management; Accessing Resource Management; Information Security Management; and Datacenter Operation Security Management.
“Chongqing is the most important megacity in Southwest China and a very important hub for Pacnet’s data center network not only throughout China, but also the rest of the Asia-Pacific region,” says Henry Lam, Chief Executive Officer of PBS. “This new IDC license provides us the ability to expand our data center footprint to complement our highly reliable Internet bandwidth and IPVPN services both in and out of the region.”
Pacnet’s Tier III data center in Chongqing was built on its unrivaled infrastructure in Asia-Pacific combining direct access to Points of Presence (PoPs) in China and its wholly-owned subsea cable network. It is a self-managed facility capable of holding 2,000 racks of carrier-neutral colocation to providers and businesses in the region. Services offered through Pacnet’s data centers provide flexible, customized solutions to meet the expanding business requirements of multinational organizations across the globe.
Pacnet is Asia-Pacific’s leading provider of managed data connectivity solutions to major telecommunications carriers, large multinational enterprises and government entities in the Asia-Pacific region. Ownership of the region’s most extensive high-capacity submarine cable systems with over 46,000 km of fiber and connectivity to interconnected data centers across 14 cities in the Asia-Pacific region gives Pacnet unparalleled reach to major business centers in key markets including China, India, Japan and the United States. Combined with a comprehensive set of managed network and value-added data center services, its assets and experience in the region have helped Pacnet service large businesses worldwide including Fortune 500 companies. Pacnet is headquartered in Hong Kong and Singapore, with offices in all key markets in the Asia-Pacific region and North America. For more information, please visit: www.pacnet.com.
- InMage 4000 Series Provides Enterprises with Ability to Restart Data Centers in a Secondary Location in Minutes with Near Zero Data Loss -
SAN JOSE, Calif. – October 23, 2013 – InMage Systems® today introduced the 4000 Series, a backup and disaster recovery appliance designed to satisfy the needs of a wide range of customers, from SMB, to Enterprises with petabyte sized deployments. Based on a self-contained architecture that includes compute, networking and storage, the 4000 Series is fast and easy to deploy and boasts minimal space and power requirements. The 4000 Series provides the capability to re-instantiate data centers in minutes with near zero data loss, significantly reducing operational time and costs. The 4000 Series can also address hybrid cloud based disaster recovery, replicating from appliance-to-appliance, to a secondary data center, or to a wide range of cloud providers. Built in, best-of-breed features such as compression, encryption, WAN acceleration and bandwidth management enable replication across geographic distances while minimizing bandwidth costs, maximizing capacity, and increasing security. InMage’s proprietary technology allows byte level change protection and in-line de-duplication which results in the most efficient and thorough backup and recovery solution.
“We chose the InMage 4000 because it is a cost effective backup and DR solution all rolled into one magic box.” Pat Smith, CIO at Our Kids, a non-profit provider of child welfare services to Florida's Miami-Dade and Monroe counties.
The InMage 4000 Series is based on unique data protection technology that captures data changes in real-time at the byte level, and allows for continuous backup with near zero impact on primary servers and storage. This approach completely eliminates backup windows and surpasses recovery point objectives (RPO) and recovery time objectives (RTO) offered by traditional methods. The 4000 Series also provides the ability to recover to any point in time, at the level of granularity required, such as mails or mailboxes, files and folders, volumes, full server or even the entire site.
Additional enterprise-class features of the InMage 4000 Series include:
“We are always looking to provide market-leading solutions to our corporate customers that will complement their existing IT infrastructure,” said at Max Migel, Managing Director at DataCorp. “When it comes to heterogeneous backup and recovery, partnering with InMage on their new 4000 Series was an easy decision because its technology is easy to use and affordable.”
The InMage 4000 Series starts at $8,000 MSRP and is currently shipping.To learn more about the InMage 4000 Series, please register for the October 29th web seminar at https://www2.gotomeeting.com/register/727666602. If you are unable to attend but would like more product information, please visit www.inmage.com
As the world becomes more global, businesses must learn how to cope effectively with the many cultural value systems and mannerisms encountered in other countries. One of the greatest mistakes leaders and planners can make is assuming their own culture-based values and attributes are always appropriate and will function effectively in other countries and cultures. Understanding the values and traits that are characteristic of other cultures is especially important in resiliency planning.
Most approaches to planning and conducting continuity and crisis operations are built around Western attributes, such as key personnel being willing to make autonomous decisions and to accept moderate risk. Yet many societies are inherently risk-averse, and greatly prefer a collectivist, rather than individualistic, approach to decision making. This is only one example of cultural differences that will be explored during this course
This 2-week elearning course will give you insights into how to understand cultural differences you may encounter in countries outside of your own. Understanding these differences is the first step in designing practical and effective business continuity, crisis management, and resilience programs that will work around the world. Download Brochure
- Course content and intent (not an academic exercise, but a pragmatic review of how cultural perspectives can affect organizational culture and associated resilience programs). Bottom line: operational effectiveness
- The distinctions between political culture (beliefs/values about governance, authority,legitimacy), organizational culture (the value system an organization assimilates to frame its operations), and core culture (individual value system)
- Key factors that affect cultural values and characteristics (religion, ethnicity, modernization and globalization)
- Peterson's Scales and intercultural competence
- The importance of objectivity and informed observation
- Practical application of Peterson's Scales
- Characteristics of Western, African, Middle Eastern, Asian, and Latin American cultures, using Peterson's Scales and other factors
- Defining cultural values and how they can affect organizational culture, with focus on resilience-related operations
OR 4000 is an elearning course that you can complete from "home" but that runs over a
two week time frame with other students globally. Using ICOR's online learning management system, students access the course materials and discussion forums online and participate in your own time zone at your leisure.
The grade for the course is determined by participation in the discussion forums and the
completion of a 1000 word essay. Students will have a week after the course concludes
to submit the essay. All participants who achieve 75% of the points for discussion participation and on the essay earn a certificate of course completion.
Cost: $805.50 ICOR members & partners, $895.00 non-members
A.J. Briding, M.S., M.A., CORE, CEM, PMP, CMQ/OE, CHS-V. is a consultant in organizational resilience, continuity of operations, and emergency management, and teaches a Masters-level course in Cultural Studies for the U.S. military. A.J. brings over 30 years of field experience in leading operations in VUCA (volatile, uncertain, complex, and ambiguous) environments around the globe.
He has lived in Libya, Japan, Egypt, Israel, and Germany, and flown missions as an Air Force transport pilot into 40 countries. He is the President of Vantage Solutions, LLC that provides consulting and education services, and serves as an advisor and trainer for ICOR. A.J. has 7 years of collegiate teaching as a professor of aerospace studies and associate professor of physics, and has been teaching online courses for over 8 years.
Questions? Contact Education@theicor.org
Program helps women and children transport water more safely
DELAWARE, Ohio and ATLANTA, Oct. 22, 2013 /PRNewswire/ -- Greif, Inc. (NYSE: GEF, GEF.B), the global industrial packaging products and services company, recently announced the company is working with Habitat for Humanity International to distribute 100,000 PackH2O™ collapsible water backpacks in eight developing countries for use in disaster relief and aid.
PackH2O™ was designed by Greif to provide a cleaner, safer alternative to the often contaminated jerry cans and buckets used by women in developing countries to transport water from source to home. UNICEF estimates that women and children in developing nations spend 200 million hours a day collecting and transporting water.
Greif began working with Habitat for Humanity in 2011 to test the PackH2O™ water backpack in nearly 20 countries. Based on the success of field tests conducted in these countries, Greif and Habitat for Humanity began the process of deploying 100,000 packs in El Salvador, Haiti, the Philippines, Honduras, Nicaragua, Nepal and Sri Lanka in September.
Habitat for Humanity International is a non-profit, Christian housing organization that creates affordable housing in partnership with low-income families. Habitat has nearly 2,000 affiliates in more than 70 countries and has helped to build or repair more than 600,000 houses, serving three million people worldwide.
Each year, more than 255 million people are affected by natural disasters, according to a report from the Centre for Research on the Epidemiology of Disasters. Without access to clean water, they face potentially life-threatening waterborne illnesses.
Greif President and CEO David Fischer identified the need for PackH2O™ on a trip to Haiti following the earthquake in 2010. Fischer observed women carrying water in containers on their heads, and children lugging home dirty jerry cans and buckets full of water weighing up to 48 pounds each.
"We knew that this was a problem we could help solve," Fischer said. "Not only does the sanitized liner help protect the water in the backpack from contamination, the backpack's design makes it easier to store and deploy in a disaster, and the ergonomic design makes it much easier for women and children to carry without injury."
About Greif, Inc.
Greif, Inc. is the world leader in industrial packaging products and services. In addition to the PackH2O, which was recently awarded the People's Design Award at the National Design Awards gala organized by the Smithsonian's Cooper-Hewitt, National Design Museum and Smithsonian magazine, the company produces steel, plastic, fibre, flexible, intermediate bulk, corrugated, reconditioned and multiwall containers and containerboard, and provides filling, packaging, industrial packaging reconditioning and land management consulting services for a wide range of industries. Greif also manages timber properties in North America. The company is strategically positioned in more than 50 countries to serve global as well as regional customers. Additional information is on the company's website at www.greif.com.
About PackH2OPackH2O is a socially conscious company that provides an innovative solution to water transportation in developing areas across the globe. www.packH2O.com
One in three British companies is putting business operations at risk by storing data back-ups on-site, according to new research by Onyx Group and Computing magazine.
The research, which took place among IT managers in UK SMEs, shows that less than half back-up data off-site in a secure data centre, despite the risk that loss of IT poses to business continuity.
The research also revealed that just 16 percent of businesses are confident that their disaster recovery procedures are as good as they could be. A further 14 percent did not know whether they could be improved.
Neil Stephenson, CEO at Onyx Group commented: “This research shows a real lack of confidence in existing disaster recovery procedures and an obvious need to review and improve the business continuity plans that many UK SMEs currently have in place.
Network World — This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
Cloud computing has transformed the way IT resources are utilized, but the externalization of infrastructures and applications has brought with it the perception of increased risk, which seem to swirl around visibility and control.
This perception of increased risk has prevented the adoption of cloud solutions in a number of industries, so the key question is how to make decisions about moving your organization's IT solutions to the cloud while considering the risks involved. A
Let's review the key advantages of cloud computing: