Spring World 2015

Conference & Exhibit

Attend The #1 BC/DR Event!

Winter Journal

Volume 28, Issue 1

Full Contents Now Available!

Mike McClain, Senior Web Designer & Site Manager

Unified Critical Communication Suite

Everbridge fills the "critical" void in existing unified communications programs by providing organizations with a platform to communicate and collaborate during disruptive events. More than 2,500 clients around the world rely on Everbridge to be better prepared, make better decisions, and communicate and collaborate quickly and confidently during emergencies and all types of operational incidents and continuity events.

White Papers Free from Everbridge Free White Papers White Papers Free from Everbridge

ENS Buyer's Guide: The 12 Questions You Need to Be Asking Vendors

Download Now

IT Incident and Disaster Alerting: Using Communication to Improve Response

Download Now

Disaster Crisis Communication Preparedness for Healthcare

Download Now

Staffing Communication and Coordination for Hospitals: Best Practices from the Valley Hospital

Download Now

Pandemic Preparedness: 10 Key Pandemic Readiness Components

Download Now

Best Practices for Critical Customer Communications

Download Now

2015 Top 10 Predictions for the Business Continuity/Disaster Recovery Industry
 
Wed, Jan 28, 2015 1:00 PM - 2:00 PM CST
 
 

Space is limited.
Reserve your Webinar seat now at:
https://attendee.gotowebinar.com/register/8734836294551504641

 

Today’s business continuity professional is always searching for more efficient ways to communicate effectively during times of business disruptions. Staying on top of cutting-edge techniques can be the difference in saving lives during a disaster or preserving customer loyalty by immediately notifying people affected during a major interruption.

Join xMatters, the leader in Intelligent Communication Solutions, along with industry expert Dr. Steven B. Goldman for a Complimentary one-hour webinar and learn the important trends you need to be aware of for 2015, including:

  • The increase in security budgets, as well as fines and lawsuits
  • The continuing rise in data breaches and malicious cyber attacks
  • The impact of social media on crisis preparations and response
  • The ever-changing role of the BC/DR professional
  • Why natural disasters may be the least of your worries
  • And much more...

As an added bonus, all webinar attendees will receive a Complimentary copy of Dr. Goldman’s report: 2015 Top 10 Predictions for the Business Continuity/Disaster Recovery Industry

About Dr. Steven B. Goldman
Dr. Steven B. Goldman is an internationally recognized expert and consultant in Business Continuity, Crisis Management, Disaster Recovery, and Crisis Communications. He has over 30 years experience in the various aspects of these disciplines, including program management, plan development, training, exercises, and response strategies. His background is comprehensive yet unique in that he has been a professional engineer, corporate spokesperson, manager of media relations, business continuity planner, crisis responder, consultant, and a Fortune 500 Company's Global Business Continuity Program Manager. Dr. Goldman is a co-founder and Lecturer at MIT's "Crisis Management & Business Continuity" Professional Education summer course.

Title: 2015 Top 10 Predictions for the Business Continuity/Disaster Recovery Industry
Date: Wednesday, January 28, 2014
Time: 2:00 PM - 3:00 PM EST
After registering you will receive a confirmation email containing information about joining the Webinar.
View System Requirements Here
 
 
 

Operational Risk Management: A Guide To Harness Risk With Enterprise GRC

To download your White Paper click "Download." below:

Gartner Positions RSA in Leaders Quadrant for Business Continuity Management

To view this White Paper follow this link.

Practical Guidance for Evaluating and Simplifying your Business Continuity Program Requirements

To download your White Paper click "Download." below:

Monday, 03 November 2014 00:00

RSA - Intelligence-driven security Solutions

Practical Guidance for Evaluating and Simplifying your Business Continuity Program Requirements

This white paper offers practical guidance to help organizations navigate among a maze of regulations, guidelines and maturity models and simplify business continuity and disaster recovery planning.

First Name *
Please enter your first name.
Last Name *
Please enter your last name
Job Title *
Please enter your title
Department (Local) *
Please enter your Department
Company Name *
Please include your company.
Company Website *
Please enter company website
State/Province *
Please enter your State/Province
Country *
Please enter your country
Email *
Please enter your email
Phone *
Please enter your phone number.

Operational Risk Management: A Guide to Harness Risk with Enterprise GRC

This ebook discusses the key requirements for building an effective operational risk management program including several case studies to demonstrate how other organizations have leveraged GRC technology to harness business risk.

First Name *
Please enter your first name.
Last Name *
Please enter your last name
Job Title *
Please enter your title
Department (Local) *
Please enter your Department
Company Name *
Please include your company.
Company Website *
Please enter company website
State/Province *
Please enter your State/Province
Country *
Please enter your country
Email *
Please enter your email
Phone *
Please enter your phone number.

RSA Archer Audit Management
Control the audit lifecycle to enable improved governance of audit-related activities, data, and processes.

RSA Archer Business Resiliency
Reduce the risk of IT and business disruption, harmful operational events, and significant business crises.

RSA Archer IT Security Risk Management
Reduce the risk of today’s security threats, misaligned security practices, and operational security compliance failures.

RSA Archer Operational Risk Management
Manage the risk of direct or indirect losses resulting from inadequate or failed internal processes, people, technology, or external events.

RSA Archer Platform
Adapt enterprise governance, risk, and compliance (GRC) products to your requirements, build applications, and integrate with other systems.

RSA Archer Products
Build an efficient, collaborative governance, risk, and compliance (GRC) program across IT, finance, operations, and legal.

RSA Archer Regulatory and Corporate Compliance Management
Reduce the risk of poor, misaligned IT and business practices, exposure to regulatory violations, and operational compliance failures.

RSA Archer Third-Party Management
Reduce the risk of today’s security threats, poor, misaligned security practices, and operational security compliance failures.


Business Continuity Management – A key element in the fight against data breaches

Join us for a Webinar on December 10


Space is limited.
Reserve your Webinar seat now at:
https://attendee.gotowebinar.com/recording/8634444285273119489

The 2014 Cost of Data Breach Study, conducted by Ponemon Institute and sponsored by IBM, recently revealed that the costs associated with a data breach are rising. That, coupled with the increased prevalence and sophistication of attacks, might make you think there’s a cloudy forecast for data security.

There is a silver lining, however, for organizations that want to limit the cost of these incidents. The study also showed that involving business continuity specialists in your security planning and having a continuity plan for your business can:

• Lower the probability that you will experience a data breach
• Reduce the follow-on impact of a data breach, should one occur
• Help cut data breach costs by an average of $9 per compromised record, from $145 to $136

Join this webcast to hear Larry Ponemon, Chairman and Founder of Ponemon Institute, talk more about the potential costs and implications of a data breach in your organization and the savings and benefits you could achieve by including business continuity in your security planning. He will be joined by Paige Poore, Director, IBM Global Business Continuity Management, who will reveal why a resiliency plan’s maturity, reach, and role in security planning are key factors in reducing the cost of a data breach. Her insights will be based on case studies and “boots on the ground” experience working with organizations to integrate resiliency into their security planning.
Title: Business Continuity Management – A key element in the fight against data breaches
Date: Wednesday, December 10, 2014
Time: 1:00 PM - 2:00 PM EST
After registering you will receive a confirmation email containing information about joining the Webinar.
System Requirements
PC-based attendees
Required: Windows® 8, 7, Vista, XP or 2003 Server

Mac®-based attendees
Required: Mac OS® X 10.6 or newer

Mobile attendees
Required: iPhone®, iPad®, Android™ phone or Android tablet


ebrp webinar
 
Incident Readiness is the New BCM
 
Wednesday, October 1, 2014 2:00 PM - 3:00 PM EDT
 
 

Space is limited.
Reserve your Webinar seat now at:
https://www2.gotomeeting.com/register/377702546

 

With our experience implementing BCM programs for many global enterprises, State and Federal Agencies, eBRP is fortunate to have a bird’s eye-view into BCM Program’s trends.

As organizations mature in their BCM programs, the program objectives constantly evolve and change. Some of the program objective changes are driven by the regulators & auditors who are looking for assurance that your BCM program is viable, can withstand stress and is sustainable.

During this informational session, eBRP will showcase the trends & approaches in Planning, Exercising, Incident Response and Incident Management.

Title: Incident Readiness is the New BCM
Date: Wednesday, October 1, 2014
Time: 2:00 PM - 3:00 PM EDT
After registering you will receive a confirmation email containing information about joining the Webinar.
System Requirements
PC-based attendees
Required: Windows® 8, 7, Vista, XP or 2003 Server
 
Mac®-based attendees
Required: Mac OS® X 10.6 or newer
 
Mobile attendees
Required: iPhone®, iPad®, Android™ phone or Android tablet
 
 
Monday, 15 September 2014 18:26

VMware vCloud® Air™ Disaster Recovery

You must be logged in to download these documents.

-

Few companies can afford operational disruption, yet IT budgets remain flat and can’t encompass the growing need for additional resiliency measures to protect critical-business applications. The recovery-as-a-service offering from VMware, VMware vCloud® Air™ Disaster Recovery, helps you fulfill the need to implement or supplement your organization’s continuity plans while addressing budget, time, and resources constraints. It provides simplified replication and recovery based on the VMware vSphere® platform. For a successful setup of your disaster recovery service, keep in mind the following tips when getting started.





-

There is no question that every business wants to protect their operations from downtime and loss of data. But many companies don’t have the internal expertise or budget to implement the disaster recovery plan they need. Traditional disaster recovery solutions typically cost too much; they’re too complex; and they are not always reliable.

VMware vCloud® Air™ Disaster Recovery introduces native cloud-based disaster recovery capabilities for VMware vSphere® virtual environments. Built on VMware’s hypervisor-based replication engine, vSphere Replication, and integration support with vCloud Air, it provides simple and secure asynchronous replication and failover. Consider these top five reasons why you should look to the cloud for your disaster recovery needs.





-

Most organizations know they need to protect their business critical information to minimize downtime in the event of outages, failures, disasters and other disruptions. But not all companies have the budget, expertise, or time to develop a comprehensive disaster recovery plan.

Traditional disaster recovery plans are prohibitively complex and expensive for mid-sized businesses with limited budgets and resources to successfully configure and manage a solution in-house.

For organizations with disaster recovery services in place, the challenge often lies in supporting the ongoing maintenance and re-evaluating the initial investment versus newer offerings as their environment continues to expand, or leases expire.



Fusion Webinar
 
Simulation-based Tabletop Testing - A New and Proven Approach for Comprehensive Enterprise Testing
 
Wednesday, August 27, 2014 2:00 PM - 3:00 PM EDT
 
 

Space is limited.
Reserve your Webinar seat now at:
https://www2.gotomeeting.com/register/212540802

 
You've exercised your plans, but how confident are you that your people will use the plans effectively? And how confident are you that your teams will work together productively and successfully?

Traditional approaches to tabletop testing leave business continuity practitioners challenged to deliver a truly effective exercise across the multiple groups that must come together at time of crisis. Simulations are disruptive, time consuming and expensive. Plans get tested in isolation but don't reflect the pressures and complexities of actual events.

If your tabletop exercises are getting the checkmarks but leave you questioning the real capability, join Fusion Risk Management for this innovative 1 hour webinar.

Learn how to effectively deliver comprehensive tabletop exercises across business continuity, crisis management and IT disaster recovery for your enterprise.

Fusion executives, Vic Fricas and Bob Sibik, will share real-world experiences and proven approaches developed through thousands of tests and hundreds of actual recoveries across a wide range of enterprise organizations. In one hour you will learn how to turn unproductive tabletop exercises into more effective activities that better ensure successful recoveries.

Title: Simulation-based Tabletop Testing - a new and proven approach for comprehensive enterprise testing
Date: Wednesday, August 27, 2014
Time: 2:00 PM - 3:00 PM EDT
After registering you will receive a confirmation email containing information about joining the Webinar.
System Requirements
PC-based attendees
Required: Windows® 8, 7, Vista, XP or 2003 Server
 
Mac®-based attendees
Required: Mac OS® X 10.6 or newer
 
Mobile attendees
Required: iPhone®, iPad®, Android™ phone or Android tablet
 
 
Page 1 of 44