Spring World 2017

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 29, Issue 3

Full Contents Now Available!

Jon Seals

The corporate compliance function is only as successful as its partnerships with key internal constituencies. Depending on the company and the personnel involved, compliance has to establish and maintain effective working partnerships with key functions, such as human resources, legal, finance, and security.

All of the relationships are mutually beneficial. Each component works better when it is able to partner and work seamlessly with another related function. In some sense, a company consists of interdependent functions – one cannot operate without the other.

Human resources is a natural partner for compliance. They share common goals and can leverage each other in terms of resources.

...

http://blog.volkovlaw.com/2016/09/match-made-heaven-compliance-human-resources/

More than six in ten businesses that use public cloud have migrated a second time, either to another public cloud, a private cloud or on-premise systems, according to a report released today by CompTIA, the nonprofit association for the technology industry.

According to “Trends in Cloud Computing,” 63 percent of companies polled said they had moved systems or applications from their initial public cloud provider.

...

http://mspmentor.net/msp-mentor/repeatedly-migrating-cloud-workloads-now-commonplace-businesses

Wednesday, 28 September 2016 00:00

Is Your Greatest BCM Risk Your BCM Team?

Over the years, we have talked about all kinds of risk in our programs. Compliance risk, residual risk, third party risk, and more all need to be considered. However, one BCM risk that we haven’t discussed is closest to us: our own BCM team.

You may ask: how can our own team be a significant risk? Well, don’t forget that you are only as strong as your weakest link. In many cases, you may find that you have more than one weak link. Often, the reason for a low state of organizational BCM compliance and high residual risk has as much as to do with the BCM team as it does as with the organization’s processes, methodology, budget, and management commitment.

The majority of BCM managers do not analyze the skill set of their team on a detailed level, nor do they align it with their strategic roadmap (if they have one). Each member of your team plays an important role, and it is essential that they have the skill set necessary to perform that role and to support one another.

...

http://www.mha-it.com/2016/09/bcm-risk/

Wednesday, 28 September 2016 00:00

Surge Seen for Software-Defined Datacenter Market

The booming big data market along with growing demand for automated datacenter operations are spurring adoption of management and other services offered by software-defined datacenters, according to a new report that also forecasts a 32-percent annual growth rate for virtualized computing, networking and storage.

In a report released this week, Allied Market Research pegs the software-defined datacenter market at $139 billion by 2022. While cost savings and flexibility continue to drive global adoption, the market researcher also noted that integration complexity and security threats still represent a drag on wider adoption.

Among the adoption drivers for virtualized datacenters is the steady embrace of hybrid cloud models as enterprises look to leverage cloud flexibility and savings while securing proprietary data and applications on-premises.

...

http://www.enterprisetech.com/2016/09/27/surge-seen-software-defined-datacenter-market/

No threat risk model (an assessment of software, network or other risks and threats) is complete without a methodology for rating threats. In an earlier article we addressed two common and simple threat risk models, both developed by Microsoft -- STRIDE and DREAD -- along with the more complex CVSS (Common Vulnerability Scoring System). Here we look at how three others rate threats: Trike, MIL-STD-882E and OCTAVE.

Trike

Trike is an open source threat modeling methodology with a distinct threat rating component. It delves beyond threat modeling and into "attack graph[ing]," requiring extensive parsing and detail.

For threat rating purposes, however, it is much simpler. In the world of Trike, every attack falls into one of two attack types: elevations of privilege or denials of service. (This solves the cross-correlation problems presented by the more simplistic -- and more redundant -- STRIDE, as discussed in the earlier article.)

...

http://www.esecurityplanet.com/network-security/selecting-a-threat-risk-model-for-your-organization-part-two.html

Wednesday, 28 September 2016 00:00

High capacity SSDs: How Big Can They Grow?

Think high capacity SSDs are far off on a distant horizon? Not so. New manufacturing techniques mean that petabyte, high capacity SSDs are probably a question of when, not if.

The world of SSDs  – and what we think of as a "high capacity SSD" – is going to change radically over the next few years. That's because a single SSD will soon be able to store in such vast quantities of data that the very term "high capacity SSD" may end up being wholly inadequate and in need of replacement.

That's good news for many businesses, because the high capacity SSD market has been quite dull for the last few years and technology advances moderate. The main change has been a move from single level cell (SLC) technology to multi-level cell (MLC) and enterprise multi-level cell (eMLC) technology. That's made it possible to offer cheap consumer grade SSDs to sit alongside the more expensive enterprise class ones, and also allowed a general fall in the price per GB stored on high capacity SSDs.

...

http://www.enterprisestorageforum.com/storage-hardware/high-capacity-ssds-how-big-can-they-grow.html

Wednesday, 28 September 2016 00:00

Big Data Will Save Our Planet

It is difficult to argue with numbers. Whether you are a CEO looking to optimise your supply chain or a consumer wondering whether to buy an electric car, it is increasingly clear that our choices will have an impact on the world that our children and their children will live in. The numbers are increasingly indisputable.

Predicting our climate has always been a tricky profession. There are so many factors that play a part, and ever since the infamous Michael Fish denied the 1987 hurricane that devastated huge swathes of the UK, weather forecasters have always been viewed with a certain amount of suspicion.

'They said it would be sunny today, so why is it raining?'

...

https://channels.theinnovationenterprise.com/articles/big-data-will-save-our-planet

Wednesday, 28 September 2016 00:00

Scalable IoT Deployments Gain Momentum, IDC Finds

As the internet of things (IoT) continues its journey toward becoming a mature technology, companies and their IT departments continue to mull a number of crucial issues including costs, finding the right talent, and security. However, IDC finds that businesses are taking the next steps in creating a true IoT ecosystem a reality.

In its Global IoT Decision Maker Survey, which is in its third year, IDC researchers found that 31.4% of companies surveyed have launched an IoT project or deployment, with an emphasis on cloud computing, analytics, and security. An additional 43% said they are looking to deploy their projects in the next 12 months.

Businesses also appear to see future value in IoT, with 55% of respondents say they believe the technology will make them more competitive.

...

http://www.informationweek.com/iot/scalable-iot-deployments-gain-momentum-idc-finds/d/d-id/1327020

Wednesday, 28 September 2016 00:00

Consider These 3 Factors When Monetizing Your Data

Big Data’s incredible economic and social influences are evidenced in the variety of industries it’s revolutionizing. For example, healthcare providers can better 'predict epidemics, cure disease, improve quality of life and avoid preventable deaths.' Brands can better serve their existing customers while attracting new ones, and retailers can predict what trends will resonate with their shoppers.

However, those new to the data monetization side of the Big Data industry may feel a little overwhelmed since there are thousands of companies ready and willing to utilize their data. Before you take the plunge and decide where and how you should sell your data, consider these important data factors: location, price, and privacy.

...

https://channels.theinnovationenterprise.com/articles/consider-these-3-factors-when-monetizing-your-data

Millennials Want Two-Way Communication

OpenMarket released interesting statistics it discovered when surveying 500 Millennials ages 18-34 years old. 72 percent of Millennials text 10 or more times a day and 83 percent of them open text messages within 90 seconds of receiving them. 60 percent of Millennials prefer two-way text engagement with companies because it’s convenient, fast, and easy to use.

Texting is the number one preferred channel for notifications from businesses, email is a close second, and voice is a distant third. In fact, Vonage reported a 22 percent drop in sent and received voicemails over the past four years. It seems fewer people are bothering to listen to voicemails, perhaps because it’s one-directional and takes too much time and effort. My, how times have changed.

...

https://www.alertmedia.com/does-your-emergency-plan-include-a-two-way-communication-system

Page 3 of 1126