The Continuity Logic customized demo provides an opportunity for qualifying organizations to evaluate Frontline Live 5™, with their plans, desired controls, policies, and procedures. This first-of-its-kind system for both business continuity and many other areas of Governance, Operational Risk and Compliance (GRC) is powerful, but often best viewed with some of your familiar plans, data and templates.


Spring World 2016

Conference & Exhibit

Attend The #1 BC/DR Event!

Fall Journal

Volume 28, Issue 4

Full Contents Now Available!

DRJ Blogs

This is some blog description about this site

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login
    Login Login form
Recent blog posts

Posted by on in DRJ Blogs

When considering any backup solution it is important to assess two key metrics, RPO & RTO.  I put more value on RPO then RTO and here is why.

RPO (Recovery Point Objective) represents how frequently backups are taken, or put another way, how much data you are willing to lose.

RTO (Recovery Time Objective) The duration of time and a service level within which a business must be restored after a disaster or disruption.


Posted by on in DRJ Blogs

 I’m speaking on Thursday at the 2015 SecureWorld Seattle conference, expanding and refining a presentation I made this past summer, and on an article I wrote on the same topic a couple of years ago.   I’ll be talking about the life of the CEO, including the magnitude and frequency of decisions that CEOs make every day.  I’ll examine how is it possible to make a perfect pitch to the C-suite for a large scale project, and the attendant expense, that is both intelligible and persuasive, when is data security and cyber security.  Part of that examination involves looking at how executives send and receive information and make decisions, using four executive archetypes – “online junkies, schmoozers, cheerleaders and firefighters” –   that can be found in a 2013  McKinsey Quarterly article to explain how large scale projects derail when the way that executives spend time is not aligned to the organization’s strategic priorities. 

The content aligns with my ongoing research on executives and risk, and how much executives actually know about risk present in their organizations.  Executives become more used to making decisions that could involve people, process, systems or external events as they rise higher in an organization. In almost parallel fashion, information appears to become simplified as it moves higher in the organization, past managers to senior management and then refined once again for the C-Suite, and perhaps a final time in the form of a report for the firm’s board of directors.  So we move from what can be a well-thought-out expensive proposal, to management signoffs as the proposal moves up to the C-suite for approval, the executive signoff, and then a summary in the form of a report – or ongoing status reports -- to the board of directors.

 My focus will be on how to think about and then create a proposal that is the “perfect pitch” – including an easily understandable executive summary that covers both tangible (the cost, the data available on the need for the project, and the competitive landscape) and the more intangible (corporate reputation, corporate liability, alignment with the corporate mission and other strategic initiatives) costs.


Basking in the glow of this year’s Disaster Recovery Journal Fall World conference (held in sunny San Diego) I have had an opportunity to start reflecting on some of the conversations that I had with fellow business continuity and disaster recovery colleagues.

One theme that continually emerged was that BCM professionals have unique access to all aspects of the businesses and organizations that we help support.  We constantly update business impact analysis data, interview colleagues, and adjust our BC and DR plans to ensure that our company’s board of directors can sleep soundly(ish) at night.

But, how can we leverage this holistic access to our competitive advantage? I suggest considering the following three points as you approach your next BC/DR project:


As risk professionals, it’s important that we’re always up to date with the latest legislation. Recently, the FFIEC, otherwise known as The Federal Financial Institution Examination Council, set out a new piece of legislation that it’s vital we understand.

THE FFIEC’s BCP Appendix J (Appendix J) aims to ensure that financial institutions are taking seriously, their responsibility for the third-party service providers they utilize. Among other things, this means that their third party service providers must have sufficient recovery capabilities should anything go wrong.  This drives to the importance of businesses enforcing due diligence, ensuring that business resilience is in place in order to allow critical activities to continue to run in the case of a security breach or otherwise, and to consider the multitude of risks associated with using new technology.

Appendix J also includes requirements for management of Cyber threats. It was just last year that, America’s largest bank, was subject to a cyber attack that affected 76 million households. With cyber attacks on the rise, this new piece of ruling from the FFIEC certainly comes at a pertinent time.

Originally posted on Rentsys Recovery Services' blog.
These days the cloud is no longer a no-go for critical infrastructure. In a survey conducted by Infosys last year,81 percent of respondents said they were already or were planning to use mission-critical apps in the cloud within the next two years.
With many cloud environments featuring capabilities for high availability, which by definition provide 99.999 percent uptime, how does that affect disaster recovery (DR) planning? If you manage all your applications in a third-party cloud environment with high availability built into the apps’ architecture, does that mean you can nix internal DR plans, procedures and tests?
The answer is no, and here are three reasons why.

You Need a Plan for Handling Data Corruption

DR planning is still a key component of the organization’s overall business continuity strategy. It’s important to have a high availability strategy for your critical systems and information, but if your high availability solution replicates errors, your data — while it might be available — would be useless. In that case, you’d need to fall back on your DR plan to recover that system.

Your Employees and Vendors Need a Plan to Follow

Even if you’ve outsourced management of critical applications, your employees still need to know what will transpire in the event of a power outage, facility loss or other incident. For instance, where will they work? How will they access the data and applications that are necessary to their job duties?

Your Cloud Provider Needs to Understand Your Environment

If you’re using a third party to manage your environment, it’s important to test so the vendor understands your environment. With documented and rehearsed DR plans, the vendor will be familiar with how to react during a business interruption and can do more on your behalf.
Although high availability is a key part of protecting your top-priority applications, it shouldn’t replace DR planning. To see what other components you should include in your DR plan,download our checklist.  
Hits: 210

Originally posted on Rentsys Recovery Services' blog.

It’s a business continuity and disaster recovery planner’s worst nightmare: You wake up to the news that your cloud provider — the one that houses your critical data — has gone under. How do you get your data back?

The scenario isn’t entirely unheard of. In 2013, cloud provider Nirvanix announced it was closing its doors and told customers they had two weeks to migrate their data to another location. This announcement, however, should not have come as a surprise to customers. According to InfoWorld, Nirvanix had been informing its customers that it was having financial difficulties and at one point informed customers and partners that they could no longer upload data to the Nirvanix cloud.
Your provider going bankrupt should not come as a surprise to you, either. Before working with a cloud provider (or any other vendor who manages your critical data), you should assess the vendor’s financial situation as part of the due diligence process. If there are any red flags, proceed with caution.
No matter the financial situation of the provider, the contract you sign should have provisions around what happens with your data in the event of bankruptcy, default, etc. These provisions could include arrangements for transferring the data to another cloud environment or copying your data to external media and returning it to you.
If a provider won’t add a contract provision that protects you in the event of a bankruptcy, consider looking at alternate vendors.
For more guidance on choosing the right cloud provider, check out our post "11 Questions to Include in Your IT Vendor Due Diligence."
Hits: 165

With the explosion of truly ‘always on’ computing, the ability to demonstrate real time recovery is drastically changing how programs are executed from a testing standpoint.  Traditional methods associated with recovering the systems, data, and associated infrastructures and enabling network connectivity still serve as the baseline for recovery; however, enhanced methods for validating the capability in a more ‘live’ manner are receiving critical attention.  

Developing a proven resiliency strategy involves numerous activities to define a business protection plan that will be in place to defend against a catastrophic outage.  The key to being successful is how confident your organization is at time of need to execute the plan without it being a guessing game.  The ability to rely on a proven, structured process that has been repeatedly tested over time removes any doubt when resuming business in an alternate location at time of disruption   

The level of preparedness required for ultimate success is highly dependent upon the intensity and consistent focus put forth when validating the program against specific business criteria for results.  Testing live scenarios enable greater predictability when executing the plan, allowing for instinctive decision making to quickly invoke recovery at time of event.     


 Threats are constantly changing and new risks affecting your workforce are increasing in both impact and frequency. Civil unrest, terrorism, and natural and man- made disasters can be life threatening or hinder an organization’s workforce from its ability to continue business in multiple ways. Getting into the office may be impossible, and depending on the crisis scenario, working from home may not be available as a solution.

 Whether you’re a full time “work at home” employee, or asked to provide your own workspace during an emergency, here are some simple steps you can take now to make sure you are ready to stay productive after the emergency has passed.

 Here are 7 tips to stay personally productive after an emergency. Complete this checklist to see if you’re personally prepared to stay productive working from a location you provide!


Posted by on in DRJ Blogs

Across companies both large and small, leadership teams have started to allocate budgets for 2016. A vast portion of the budget will be spent on keeping operations running, some will be allocated to future value-add projects and some will be set aside to protect the business mission against ever-increasing threats.


2015 has been a year filled with high-profile cases of security breaches, with dating website Ashley Madison being one of the latest big-name companies to come under cyberattack. Personal customer details were stolen from the website and released into the public domain, causing both reputational and financial damage to the Ashley Madison brand and even more so to its customers.


Originally posted on Rentsys Recovery Services' blog.

The question "How far away should my primary data center be from my disaster recovery (DR) site?" has plagued DR planners for years. Companies first began seriously examining the role distance plays in DR after 9/11, when the attacks on the Twin Towers caused a large portion of Manhattan to shut down and all the recovery vendor sites filled to capacity.

Unfortunately, there’s no clear-cut answer to this question. Some suggest locating the backup site at least two FEMA-defined regions away, but most people shy away from setting firm guidelines measured in miles.

Instead, the geography should be dictated by the risks related to your organization’s business processes, data and physical location (a business impact analysis should reveal what these risks are). Once you’re aware of the risks you face, you can weigh the benefits and drawbacks of nearby and distant DR sites.

Nearby Disaster Recovery Site

A nearby DR site is beneficial for a variety of reasons. It’s within driving distance, making it easily accessible. If your DR site is nearby and is unaffected by an incident affecting your primary location, you can continue business operations more quickly than if your DR site were hundreds of miles away. In addition, the bandwidth costs are less, and you’re not as likely to experience significant system recovery delays due to latency issues.

However, the benefit of having a DR site within driving distance depends on the locale's risks. If your region is prone to hurricanes, earthquakes or floods, having a DR site in the same region can be risky. For instance, Hurricane Sandy was 1,100 miles in diameter — that’s more than a third of the continental United States. In regional disasters like this, your DR site could be affected by the same event as your primary facility, rendering it useless.

On the other hand, Spokane, WA is a geologically stable area whose biggest threats are wildfire and train derailment. Many businesses in these areas are comfortable with a nearby DR site as long as the site is on a different power grid.


By Mijee Dirks, Global Strategy Leader, IBM Resiliency Services

It’s that time of year when we dig out our family hurricane emergency kits for their annual refresh.  If your family is anything like mine, you are discarding expired food that sat in the garage for the last year, refreshing water supplies, and making sure you haven’t borrowed all of the batteries out of the kit for kid’s toys last Christmas.  We do this annual hurricane kit refresh easily, barely thinking about it, because we have done it so many times before. 

Now ask yourself – when is the last time you refreshed your business’s “Disaster Preparedness Kit”?   Key “supplies” in our business Disaster Preparedness Kits should be also refreshed regularly.  For most companies, this is at least annually or at any time there is a business or IT trigger.  Some examples of triggers are when a new critical application is implemented, or when another critical business process is added to the company.

Photo shared by on in DRJ Blogs

One of two cornerstones of the National Academy of Arts and Science.

The weekend of August 28th marked the tenth anniversary of Hurricane Katrina, an event so significant that the practice of emergency management by the federal government was changed forever.  August 28th  marked the 54th anniversary of the March on Washington where Martin Luther King, Jr. gave his famous "I have a dream" speech.  It marked also the 60th anniversary of the vicious murder of a Chicago boy, Emmett Till, when he visited relatives in the South and whistled at a white woman.  On August 26th, a TV reporter and cameraman were shot dead in the head on a morning news program by a killer who then posted video of the murders to social media.  In a 23 page suicide note, the only thing that the murderer left out of his message was the similarity to ISIS acts of terror that also take place in living color and then get posted to social media sites.

While the federal government has completely reshaped its responses to disasters, we can't really pat ourselves on the back where equality and justice that Reverend King was looking for is concerned.  The situation has never been worse in this country where distrust and anger are concerned, and the gap continues to increase between those who have and those who do not.

The situation appears intolerable also where gun control and mental health proposals go unfunded and unapproved.  The National Rifle Association (NRA) continues to have a lock hold on our elected officials where even the simplest forms of information sharing are concerned -- registering guns and sales of guns in such a way that federal and state police databases are interlocked to detect those with criminal or mental health histories.  Why is this passing bare bones legislation that could trap for lowest hanging fruit so difficult?  What do we need to do to be heard?

The interior cornerstone at the National Academy of Arts and Science.

The worst of it in all this is that each episode seems to set off more disturbed people in what are called copycat events.  Just as those who ride trains every day are probably now more aware of their environments after the events of last weekend on the Amsterdam-Paris train, I suspect that every news person will feel their own heightened anxiety for at least the next several months.

Given the flammable nature of public discourse on so many issues these days, especially with presidential politics starting make things worse, I would suggest that we need to find new ways to move the discussion on gun violence forward, to see if it is possible to affect real change on this issue and on the issues involving equality and justice as well.

Hits: 142


If you’ve read other blogs I have written, either for LinkedIn or on my website www.peacebusinesscontinuity.com  you’re aware that I have a high regard for the field of business continuity and disaster recovery planning and for those who labor therein.  For me it has been a rewarding career of learning and doing and, most of the time, been great fun.  I have been very fortunate that many new opportunities have come along and I’ve been able to take advantage of them, move up the ladder, and take on the roles of subject matter expert as a consultant to interesting clients and as a mentor to many new to the field.  In this blog I’d like to pass on some ideas about expanding one’s career within the field and also using it as a springboard into other endeavors.  For those who wish to remain in the field, I recommend the following:


Originally posted on Rentsys Recovery Services' blog.
Your cloud solution could be missing something. We’re not talking about bandwidth, security or service level agreements (though these things are all important). We’re talking about customer service. 

Often businesses evaluating potential cloud vendors are focused so much on tech specs that they don’t think about the matter of interacting with the vendor after the contract is signed. Sometimes this isn’t an issue if you’ve chosen a good provider. Other times, however, you might find that getting the support you need is like pulling teeth.
The following three categories can help you identify if a potential service provider will be a help or hindrance to meeting your data and application management goals.
Listening Skills
Are the cloud provider’s representatives trying to sell you services you don’t need, or are they dedicated to helping you build a backup solution that’s right for you? To get the most value out of your cloud solution, you need to make sure you’re not paying for products and services that you won’t use or that don’t do what you need them to.
Technical Assistance
What type of technical assistance does the provider offer? Support options could include self-service, phone support, on-site, in-house, outsourced or a combination.
It’s also important to know when assistance is available. Is the support provider — whether it be your vendor or a third party — only available during business hours? Is the company in the same time zone as you? Be sure to find out what level of support to expect and make sure you’re comfortable with it.
Technician Certifications
Knowing who will be offering your support can be almost as important as knowing the type of support you’ll receive. If you’re using a managed cloud service, are the people who will be handling your data certified engineers? Even if you manage your own data, will you have access to qualified help desk agents to resolve any issues?

Working with the right vendor can make a world of difference in how effective your cloud solution is for your business. To read more about best practices for implementing a cloud solution, read this post.
Hits: 172

Originally posted on Rentsys Recovery Services' blog.

At the beginning of this month, a train carrying the flammable, toxic chemical acrylonitrile partly derailed and caught fire near Knoxville, TN, forcing 5,000 people to vacate the area.

A few days later, July 6, marked the two-year anniversary of the oil train derailment and subsequent explosions in Lac-Mégantic, QC, which killed 47 and forced 2,000 people to evacuate their homes.


Originally posted on Rentsys Recovery Services' blog.

Outsourced IT is nothing new, but as Verizon Wireless’s recent report "Better Outcomes for IT Outsourcing" points out, digital transformation is changing the face of outsourcing. Customers want flexible service delivery models, ways to improve inefficient processes and spending models based on opex versus capex.

But with the rise of cybersecurity issues, tightly wound supply chains and customer expectations for always-on service, you need to make sure that any vendor with access to your data and systems is fully vetted. Before you involve any third party in your IT processes, make sure you know the answers to these questions:


Walk into almost any office, ask if they’ve got a response and recovery plan, and they’ll often point to a dusty shelf and tell you that yes they do. Next, ask them when their response and recovery plan was last updated. Chances are they won’t be able to reply with the same amount of certainty.

Despite businesses being aware that there are an increasing number of threats to their valuable data, often their response and recovery plans are outdated and don’t reflect technological change.

In this year’s Business Continuity Institute Horizon Scan survey , it was noted that cyber-attacks are now the top threat facing businesses, with 82 per cent of survey participants expressing their concern about them. With the repercussions of a cyber-attack being as significant as they are, it’s more important than ever that your disaster response and recovery plan is kept reassessed and updated on a regular basis.


In creating business continuity plans, every organization completes a series of risk assessment exercises. Without this general risk assessment, it would be impossible to prioritize what BCM plans are needed. Which disruptive events are most likely to impact your business? Your employees? Your clients? Your suppliers? Research suggests the top 10 risks tackled by business continuity teams include:

  1. Severe Weather
  2. IT Issues (outages, breach, virus…)
  3. Power Outages
  4. Natural disaster (flood, earthquake)
  5. Physical Violence
  6. Fire
  7. Epidemic
  8. Product delivery/quality
  9. Scandal/reputation
  10. Theft

Clearly some sub-set of these event types should be addressed in any business continuity planning effort. Today’s goal, however, is not to discuss this high level risk assessment process, but rather, to review best practices for evaluating a specific threat as it arises to determine if it merits activation of BCM teams and plans.

Monitoring Early Warning Signs

Effective event-specific risk assessment is to have some early warning detection in place. To best manage unplanned incidents, it helps to have visibility into the potential disruptions before they occur. Obviously, certain types of disruptive events are more easily monitored than others. Weather, for example, can be monitored closely via the National Weather Service, Accuweather and other sources. Most major storms are predicted in advance, enabling close monitoring by BCM teams. Similarly, floods and fire warnings are often weather-related and threat levels can be monitored closely.


Posted by on in DRJ Blogs

I like to tell the story about a client who could not understand why I would honor a commitment to teach rather than give the firm more hours in order to make more money. "Why would you want to do that?" he asked. I answered that I could reach more people interested in what I had to say and at the same time influence the next generation of risk leaders.


I continue to write books and articles and accept public speaking engagements for similar reasons. Translating concepts and ideas into action is as relevant in the corporate world as it is in the classroom, where theories and frameworks from textbooks are blended with examples of risk from the real world. The examples of financial loss from poor risk management are plentiful. And since the field of risk management is so new, frameworks and standards continue to evolve. Staying right on the cutting edge of thought and practice is a priority.


Posted by on in DRJ Blogs

Speedy! What do you consider when you hear the word 'disaster'? A great many people think about a tremor, a storm, or even some national cataclysm. As these sorts of disasters are to some degree phenomenal, they do happen. In any case, with the end goal of this article, "disaster" has a much more extensive significance and subsequently is significantly more normal of an event. For the rest of this post, a disaster is any occasion that causes both of the accompanying: 

  • The demolition of all online operational copies of an association's information and/or applications. "Online operational copies" incorporate both the creation copies and any prepared to-run reinforcement copies that can be put in the generation part promptly and, ideally, consistently 
  • The loss of access to all online operational copies of the association's information and/or applications for a sufficiently long stretch, such that a recovery operation will be quicker and more practical than sitting tight for the online operational copies to return on the web. 
  • In the case of a characteristic disaster or national cataclysm, the association's first target is to guarantee the insurance and well being of the individuals in hurt's way; once this goal is accomplished, or if the individuals have not been set at further hazard by the circumstance, the most astounding need undertaking of the IT office is to get the business-discriminating frameworks running again as fast as could be expected under the circumstances. Any disappointments to resume operations can and will aggravate the impacts of the disaster and debilitate the survival of the said association. Basically expressed: disaster recovery is particularly essential! 

I recall route back when if a customer required a specific recording from our outsider check office we didn't have the one they were searching for! We had each other one they required for that day, however there was that one a couple of times that we essentially couldn't discover for reasons unknown. Murphy's Law strikes constantly be prepared for it-arrange ahead and take after these snappy recovery tips: 

  • Maintain off-site information reinforcements keeping in mind the end goal to minimize recovery times in circumstances where the physical resources of the essential focus are still operational, reinforcement information documents must be accessible on mainly put away tapes; a far reaching tape chronicle is vital. Keeping up a forward library of information on tapes is justified regardless of any expense to your organization. 
  • Inventory all IT resources keeping in mind the end goal to rapidly and effectively recuperate anything, you should first comprehend what needs to be recouped. On the off chance that you at present don't have a stock of both substantial and elusive resources, make one now-well, don't quit perusing this, however you get the thought. You require a point by point stock of equipment, programming, information, and so on that needs to be recuperated and show them regarding need so your group is not left pondering where to start the methodology. 
  • Never leave remain solitary information from the management business-discriminating information and docs are progressively being put away onto tablets and desktop PC drives; your information recovery management ought to fuse subtle elements on how this particular information will be moved down and recouped first. Remember that a tablet or desktop PC can likewise be lost in the same disaster; make a point to keep their information put away offsite also. 
  • Formally report the management. A disaster recovery arrange for that exists just in somebody's mind is no management by any means. While we'd rather not consider the possibility of genuine harm or passing, its conceivable that some key representatives won't be accessible after the disaster. They may be out of town and generally inaccessible amid a recovery operation. In the event that the recovery management exists just in those individuals' heads, the remaining staff won't have the capacity to execute it. Despite the fact that it might be conceivable to mechanize the start of some recovery methods and utilize the framework to authorize the fulfillment of agendas, its vital to keep printed version printed copies of the recovery arrange in different secure areas, including at the recovery site. An management for restarting the association's frameworks that is bolted inside an application that is occupied will be pointless when the time comes to launch the recovery operations. 
  • Test your management I used to be an IT enrollment specialist and large portions of the hopefuls I met with had incredible 'book smarts' regardless needed in certifiable circumstances. Indeed, the same remains constant with your surroundings discussing what may happen and what really happens are two unique creatures. In any complex framework or procedure, what meets expectations in principle regularly fizzles by and by. Opportune testing not just guarantees that the recovery management is suitable, additionally goes about as a vital preparing toll for your staff-both IT and non-IT. Careful discipline brings about promising results has never been more genuine of an announcement. 
  • Do not disregard security-commonly, keeping in mind the end goal to get up and running rapidly, numerous IT offices will spurn their ordinary security conventions: as a rule, this is a terrible thought. Sooner or later and time, your association created security managements and strategies and bypassing them now, may build the starting dangers. Likewise, please store all passwords and other touchy data offsite; they will render themselves futile on the off chance that they are at a site that is unavailable. 
  • Ask for help-when making a DR management, guarantee that you counsel with other people who have encountered the same (or near to) the same circumstance and that you take point by point notes when talking with them. The individuals who have been through this catastrophe can offer all the more continuous experience and conceivable managements that both worked and fizzled for them-their experience can turn into your 'experience'. 
  • Last considerations as experienced and fight tried as your IT group may be, you ought to dependably search out an outside hotspot for shooting gaps into your management; this may be a stun to your inner self, however would you rather have a pariah show your imperfections before the disaster brings you down or have them demonstrate to you industry standards to flawless your answer? Your call, boss!

For more information about business continuity management and plannings visit: www.bcmconsultingservices.com

Hits: 600