DRJ's Fall 2018

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 31, Issue 2

Full Contents Now Available!

Informational Update For October 16, 2012

Looking to transform BCM productivity?

Discover BCM automation without intimidation. Even if you are evaluating an automated BCM solution for the first time, you can still be in control of the process—as long as you are prepared to assess the options on your own terms!

All software providers will certainly present their solutions in the best light. So in addition to asking "What can this software do for me?", be sure to ask "What is involved?" in achieving that outcome, and "How much will it cost?". Here are several examples of issues that might be important to you:

  • Bottom-line Cost: What's included—a "total solution" or hidden "add-ons"?

  • Configuration: Does this solution include getting "up to speed", or is that "up to me"?

  • Compliance: Does this software address my industry standards/regulations?

  • Reporting: How much reporting flexibility do I have, and at what cost?

Click below to access 14 key points that can help you build a better checklist to guide your BCM software evaluation process. Whatever your ultimate decision, you'll be better informed and better prepared.

Start Here

DRJ Monthly Webinar Series - Free Every Month

How to Handle a Data Disaster Without Anyone Noticing

Wednesday, October 24, 2012 2:00 PM - 3:00 PM EDT (REGISTER NOW)

In today's data-intensive business environment, organizations can't afford to have their systems down for 24 hours or more. Sometimes, even four hours is too long. Recovery time objectives (RTOs) are shortening and service level agreements (SLAs) are keeping pace.

Can your organization accept angry customers, unproductive employees, and interrupted operations?

What are your RTOs? What solutions can you implement that will ensure you're back up and running fast if disaster strikes?

Find out how you can keep your operations going even when the unthinkable happens. You'll hear about real businesses that faced data disaster and kept running without a hitch.

Spring World 2013 in Orlando!

Have You Registered For Spring World 2013?

Sign up now to get the lowest price in the industry. Our conference attracts hundreds of planners from around the globe. Reserve your spot in the world's largest conference dedicated to business continuity.

Past attendees rave about our conference and return year after year. Attendees write:

"Exceptional! Will come back! The best organized conference I have ever been to!"

"Always the best source of information for our profession"

"Conference is an excellent opportunity to network!"

"This is my fourth DRJ conference and I continue to be delighted with the experience., conference content, facility, the flow and organization!"

"Speakers have been wonderful! They know their topics and their communication skills are phenomenal. This is my first DRJ conference. Will be back!"

Spring World 2013 features more than 40 sessions, an exhibition hall and numerous networking opportunities. Customize your schedule to choose the information that matters the most to you and your organization. Plus, attendees can earn CEU points!

Visit The Spring 2013 Site Today

Quick Links

DRJ.com Homepage
Spring World 2013
Latest Journal


Forrester/DRJ Survey
The purpose of this survey is to understand the role risk management and crisis communication play in business continuity and disaster recovery as well as how BC/DR professionals interact with these other functions in their organization.


Windstream's Position on Security Compliance

Sponsored by Windstream

Since Windstream's role is central to customer network security, we as an ISP and Managed Security Service Provider (MSSP) must be “ahead of the curve" to maintain our position within the confines of the popular compliance standards because the overwhelming buying triggers for our services surround these standards.

Is Your Network Safe Behind Just A Firewall?

Sponsored by Windstream

Malicious software or "malware" is the biggest network security threat facing organizations today. Cybercriminals target enterprises that hold a great deal of money or conduct a high volume of transactions on a daily basis.

DRJ Blogs

The GAP in DR/BCP/EM Technology

Posted by: Dr Tom Phelan

Recently I attended a concert at my grandchildren's school in a small, rural community in Upstate New York. A small child in the row behind me was using what appeared to me to be a tablet computer. Amazed by the use of technology, even by very young children, I had thoughts of how widespread the use of sophisticated technology had become, even in remote areas.

Copyright (c) 2012 Disaster Recovery Journal. All rights reserved. Reproduction in whole or in part in any form or medium without the express written permission of Disaster Recovery Journal is prohibited. Read DRJ.com's Privacy Statement