The Continuity Logic customized demo provides an opportunity for qualifying organizations to evaluate Frontline Live 5™, with their plans, desired controls, policies, and procedures. This first-of-its-kind system for both business continuity and many other areas of Governance, Operational Risk and Compliance (GRC) is powerful, but often best viewed with some of your familiar plans, data and templates.


Spring World 2016

Conference & Exhibit

Attend The #1 BC/DR Event!

Fall Journal

Volume 28, Issue 4

Full Contents Now Available!

Jon Seals

Dignitaries in military garb and suit-wearers alike can’t help but be drawn to the Rapiscan CounterBomber. A modernist bongo kit of a counterterrorism device, it’s spinning slowly on a platform at Parc Des Expositions, the biggest convention center in Paris. At six feet tall and more than three feet wide, the CounterBomber has three tomtom-sized radar panels connected to a sturdy tripod. The police point it at a crowd to detect the outlines of a suicide bomb strapped to any individual, at distances “outside of the blast danger zone”. An agent in a truck somewhere clicks on people onscreen and gets a readout.

Andy Lynch, program manager at Rapiscan, says the company hasn’t sold a unit to US law enforcement yet, but it’s not out of the question. There may be some issues with fourth amendment rights, though, such is the potential for invasive unwarranted searches carried out by an agent hiding in a booth. What Rapiscan will never say out loud is that the machines would have come in handy at the Stade de France, where three men blew themselves up on Friday. It’s just a 15 minute train ride from the convention center.



Often it is said that ‘partnering’ is part of the Cisco DNA and its true: Cisco’s Partner ecosystem for years has brought together an ecosystem of trusted partners which deliver solutions, software and services that provide needed business solutions and outcomes.

Cisco has a strong ‘bench’ of technology partners, too. These partners allow us to combine Cisco solutions with their technology platforms resulting in integrated architectures focused on specific industries or use cases. Frequently these are delivered in the form of a Cisco Validated Design (CVD) and are available freely on the Cisco Design Zone.

For Cisco Big Data and Analytics solutions, where our Cisco UCS Integrated Infrastructure for Big Data is the foundation, partners are key. We partner with industry leading Big Data firms to deliver flexible architectures and solutions which help to make your data the foundation of your digital business. Below, in alphabetical order, are new videos from some of our Big Data partners. Each is a Big Data leader in their own right and each has worked closely with Cisco to bring solution(s) to market. These are short and sweet videos – so carve out a few moments in your day and view a few:



Monday, 23 November 2015 00:00

Supply Chain Business Continuity Plans

Expect the unexpected: It’s a mantra that should be adopted by every supply chain manager. Since globalization has altered the cycle of manufacturing and the majority of time the raw materials/supplies, manufacturing facility and customer all reside thousands of miles away from each other, our supply chains are extremely vulnerable to manmade and natural incidents that can halt normal business operations. The continuity of your business is dependent on your ability to keep supply chains open, manufacturing running and clients supplied. The best way to do this is to include your supply chain in your business continuity plans.



The role of enterprise architecture and the enterprise architect has steadily grown in scope and in importance over the last two decades. Although many EA teams operate as part of the IT department, others are taking a more active position as they help to inform and guide strategy planning, investment and transformation at the enterprise-level. We have reached a stage where EA, as a discipline, is well-established within many enterprises as a core capability. 

But increasingly the boundary of “enterprise” architecture is extending beyond organizational boundaries. The domain of the enterprise architect is changing, as more and more “enterprise” architecture components are sourced externally. Social and environmental architectures are as important to an enterprise architecture as the components that remain within the enterprise boundary and under the direct control of the EA team. 

Emerging technologies and digital disruption will transform the enterprise, but they will also transform the ways in which we architect.



Monday, 23 November 2015 00:00

Cyber Vigilantes Provide Intel to Feds

(TNS) -- A small band of cyber jihadi hunters — including former members of the hacktivist group Anonymous — has been quietly feeding the feds online intel that’s foiled more than 10 terror plots and identified scores of ISIS recruiters and websites, on a mission that’s acquired new urgency in the wake of the Paris attacks.

“We felt enough wasn’t being done, so we wanted to put our skills to good use,” said the executive director of Ghost Security Group, who only goes by the online hacker name DigitaShadow after numerous ISIS death threats. “We’re completely independent. We survive off donations alone.”

Ghost Security Group has provided valuable information since June, according to Michael S. Smith II, co-founder of defense contractor Kronos Advisory and a former adviser to a Congressional terrorism task force.



Monday, 23 November 2015 00:00

Terrorism – A Tectonic Shift?

What do you do when the unthinkable happens? It’s not like we haven’t seen these determined and increasingly emboldened acts of terrorism before. The World Trade Center; Mumbai, India; Nairobi, Africa — just to name a few.

Innocent lives are lost because of desperate acts committed by a growing number of groups globally. We mourn the lives lost in Paris and the victims of each these attacks; yet their numbers are growing. According to a new study reported by CNN, “deaths from terrorism increased by 80 percent in 2014, with 32,658 people killed.” The sharp rise is attributable to increased acts of terror from a relatively small base. Boko Haram and ISIS accounted for 51 percent of the claimed killings. But is this a “tectonic shift” or a spike in terror events due to an anomaly of success by two terror groups who are willing to attack non-combatants?

I have no special intelligence, nor do I possess the skills to quantitatively measure the likelihood or location of the next terrorist event. I don’t think you need either to consider how to respond to events in Paris. French authorities and, I suspect, other government security professionals are now sharing information and responding to evidence that may have been overlooked in previous surveillance. We must trust that every resource available is working overtime to deal with this new threat. Overreaction, while understandable, tends to lead to less well-informed actions that may not have been taken during times of more clarity. For perspective, consider that 34,017 people died in car accidents in the U.S. alone in 2010, according to NHTSA. That is less than 1.25 fatalities per 100 million miles. In order words, these are relatively rare events, notwithstanding the rising numbers.



The terror attack in Paris last week sparked a renewed debate over how to intercept terrorist networks communicating via protected social media platforms. 
In the aftermath of the coordinated attack that left at least 129 people dead, applications like Telegram are being criticized by some for providing an alleged venue for terrorist collaboration.
While others argue digital backdoors into these networks would not end — or even stall — the activities of terror groups, critics say the popular communication networks are an all too valuable tool for groups like the Islamic State (IS, ISIS, ISIL). 
In a September interview with TechCrunch, Pavel Durov, the creator of Telegram, acknowledged that the radicalized Islamic group was in fact using the service to communicate.
Monday, 23 November 2015 00:00

NI Health Trust Denies Data Loss Claims

A health trust in Northern Ireland has denied claims from a whistleblower that it suffered a data loss that put patients at risk.

It was stated by a source that at least two weeks of sensitive information had been lost following a system failure at the Western Health and Social Care Trust’s Altnagelvin Hospital data centre, Derry Now reports.

According to the whistleblower, the trust has no back-ups and, as a result, information including appointments and referrals were lost.

However, the organisation has refuted these claims, explaining that the information affected by the problem was not lost, as it had already been processed or re-entered from manual records.

“The Trust has carried out an extensive data verification process where all parties who had been making referrals have been requested to verify that their data has been processed, this includes any external organisations such as GP practices,” it stated.

However, the claims illustrate the problems that can be caused if organisations are not prepared for data loss, and emphasise the importance of having solutions on hand to recover such information.

From:: http://www.krollontrack.co.uk/company/press-room/data-recovery-news/ni-health-trust-denies-data-loss-claims101.aspx

If EMC has its way, the line between primary storage on premise and secondary and tertiary storage in the cloud is going to get a whole lot blurrier. This week, EMC unveiled a raft of updates to its storage portfolio that essentially turn EMC VMAX and VNX storage systems into hubs through which IT organizations can tier data across local systems and external cloud services.

Chris Ratcliffe, senior vice president of marketing for EMC Core Technologies, says that as storage management gets more sophisticated, IT organizations are asking vendors for ways to break down the walls that currently separate various storage systems, and the cloud services that they increasingly rely on to back up and archive data at much lower costs than storing it on premise.

With that goal in mind, EMC has enhanced its FAST.X tiering software and EMC VPLEX cloud-tiering software to add support for the EMC CloudArray software that’s used to connect to external clouds and third-party storage systems running inside or outside of the same data center.



Monday, 23 November 2015 00:00

Paris attacks: the immediate lessons

As organizations review their business continuity and crisis management plans following the Paris attacks, Peter Power highlights some useful advice for protecting employees caught up in future incidents.

As I write these words France has just concluded three days of national mourning for the 129 people killed (so far) in the recent Paris attacks. But for anyone now urgently reviewing their crisis and business continuity management plans (and in my case planning with others the next World Conference on Disaster Management (WCDM), we should be testing responses and looking for ways to improve. After all, it is a lot more beneficial in terms of people and communities to try and outmanoeuvre an attack, than it is to recover from one. 

Up until a few days ago many people had been saying that a fight against (so called) IS is not their fight, presumably to avoid yet another West v East battle in the Middle East and possible reprisals at home. But now it's different. If we didn't know before, it's clear that IS has now come to us. They have gone global with attacks that are not random or indiscriminate, but in pursuit of their three aims: to terrorise, mobilise and polarise. This in turn triggers widespread and, at times, irrational, fear in target populations, bearing in mind that compared to other forms of fatality, death by IS in the West is currently rare. But that really doesn't help us sleep at night.