Continuity Logic’s Frontline Live 5™ is the first leader in Gartner’s Magic Quadrant Business Continuity (BCMP) software category that has effectively converged continuity, risk and compliance in a one easy to use cloud-based solution.

Fall World 2015

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 28, Issue 3

Full Contents Now Available!

Cyber Security and the BC/DR Professional
Wed, August 12, 2015 2:00 PM - 3:00 PM EST

Space is limited.
Reserve your Webinar seat now at:


Cyber crime is changing the face of business as we know it, leaving virtually no company untouched. Attacks can be designed to deny access to your website, capture client identities, steal money, tamper with intellectual property and even track the day-to-day activities of your organization. This has made companies rethink the usual approach to ensuring business continuity and disaster recovery.

Cyber crime presents an entire new level of risk, one that is changing the role of business continuity professional to an entirely new role: that of resilience professional.

This webinar will show how the risk of compromised cybersecurity has changed business, and in the process, expanded the role of the business continuity professional. For the webinar, Ann Pickren, business continuity expert, MBCI and COO, will lead a panel discussion with Billy Norwood, CISSP and information security/risk/compliance specialist and Stacey Giles, director of enterprise solutions for MIR3.

Title: Cyber Security and the BC/DR Professional
Date: Wednesday, August 12, 2015
Time: 2:00 PM - 3:00 PM EST
After registering you will receive a confirmation email containing information about joining the Webinar.
View System Requirements Here
2015 Cost of Data Breach Study – Findings and Implications for BCM
Wed, July 29, 2015 1:00 PM - 2:00 PM EST

Space is limited.
Reserve your Webinar seat now at:


The 2015 Cost of Data Breach Study: Impact of Business Continuity Management is an annual special report that analyzes the positive impact a business continuity management (BCM) program can have on the financial and reputational consequences of a data breach.

Join this webcast to hear Larry Ponemon, Chairman and Founder of Ponemon Institute, talk more about the findings of this study. Learn key ways that BCM can reduce cost of a data breach and make your recovery more efficient, including:

  • 9% reduction in the per capita cost of data breach
  • 27% reduction in the mean time to identify a data breach
  • 41% reduction in the mean time to contain a data breach
  • 28% decrease in the likelihood of a data breach over the next 2 years

He will be joined by Pat Corcoran, Global Business Development Executive for Resiliency Services. Pat will discuss insights from case studies and “in the trenches” experience working with organizations to design and integrate BCM practices into their business.

Data breaches are costly. Learn how business continuity management reduces cost and impact.

Title: 2015 Cost of Data Breach Study – Findings and Implications for BCM
Date: Wednesday, July 29, 2015
Time: 1:00 PM - 2:00 PM EST
After registering you will receive a confirmation email containing information about joining the Webinar.
View System Requirements Here
Tuesday, 30 June 2015 00:00

Do SANs Need Defragmentation?

Written by
Wednesday, 01 July 2015 00:00

The Data Lake as an Exploration Platform

The data lake is an attractive use case for enterprises seeking to capitalize on Hadoop’s big data processing capabilities. This is because it offers a platform for solving a major problem affecting most organizations: how to collect, store, and assimilate a range of data that exists in multiple, varying, and often incompatible formats strung out across the organization in different sources and file systems.

In the data lake scenario, Hadoop serves as a repository for managing multiple kinds of data: structured, unstructured, and semistructured. But what do you do with all this data once you get it into Hadoop? After all, unless it is used to gain some sort of business value, the data lake will end up becoming just another “data swamp” (sorry, couldn’t resist the metaphor). For this reason, some organizations are using the data lake as the foundation for their enterprise data exploration platform.



TNS - Connecticut’s emergency dispatchers in the not-too-distant future will be fielding not only 911 calls and texts, but perhaps even viewing photos and videos of crimes or accidents.

The state’s changeover to the Next Generation 911 system has started at 10 pilot sites across the state, including locally at the Mashantucket Pequot Public Safety Department and Valley Shore Emergency Communications in Westbrook.

All of the state’s 104 public service answering points are scheduled for a changeover by next year.



Traffic video cameras were installed to keep the roads moving by letting transportation departments see trouble spots, dispatch assistance and arrange detours as quickly as possible. But this wealth of real-time video intelligence has proven to be an exceptional resource for emergency operations centers (EOCs) across the United States.

“Live traffic video substantially boosts our situational awareness,” said Michael Walter, public information officer with the Houston, Texas, Office of Emergency Management. “It makes a real difference to how we do our jobs.”



The web-based system used for federal background investigations for employees and contractors has been suspended after “a vulnerability” was detected, the Office of Personnel Management (OPM) announced Monday.

OPM has been the subject of intense congressional probing following the cyber attack on the personnel records of at least 4.2 million current and former federal employees. The decision to suspend the agency’s “E-Qip” system, however, is not directly related to that hack or another one of a security clearance data base that was previously announced.

“The actions OPM has taken are not the direct result of malicious activity on this network, and there is no evidence that the vulnerability in question has been exploited,” an OPM statement said. “Rather, OPM is taking this step proactively, as a result of its comprehensive security assessment, to ensure the ongoing security of its network.”