DRJ's Fall 2018

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 31, Issue 2

Full Contents Now Available!

Industry Hot News

Industry Hot News (404)

Are you familiar with the term “chaos engineering?” If this is the first time, you’ve heard it, it probably won’t be the last time.

Chaos engineering (CE) is a new approach to resiliency testing that might end up having a big impact on how we business continuity professionals carry out our work of ensuring the recoverability of our organizations’ business processes and IT environments.

In today’s post, I’ll give you a quick introduction to the movement and methodology of chaos engineering.

Future posts will look at the potential impacts of CE on business continuity and IT/Disaster Recovery (IT/DR).



It is a strange irony that the changes organizations make to remain competitive frequently open them up to risk in their DR/BCM program and recovery capability.

But when it comes to business continuity, the IT change management (CM) process at most organizations is integrated in name only.

Many organizations are ambitious about making changes that will drive the business forward and are careful regarding the implementation of those changes. But the need to keep the recovery plans and environment in sync with the production environment is frequently an afterthought.

In the event of a disruption, this can have impacts on the business ranging from inconvenient to calamitous.

In today’s post, we’ll discuss some of the main issues with CM from a business continuity perspective. We’ll also share some tips on what business continuity professionals can do to make sure that routine system and process changes do not leave the organization vulnerable to major impacts.



Network management can sometimes be a neglected afterthought, yet the availability and reliability of the network is essential for a whole host of mission-critical activities. Kevin Drinkall challenges organizations to consider whether they are giving enough attention to their network.

Technology expectations of businesses and employees are growing and changing every day. But the underlying network which enables us to use this tech properly, can’t always keep up. Instead of being the power behind it, networks can often prove inflexible when it comes to getting the most out of technology in the working environment.

This is a huge problem for businesses of all shapes and sizes, who need to adopt new technology to support its staff and processes, and for those wanting to embrace IoT and future innovations to stay ahead of the curve and attract a ‘tech-savvy’ workforce.

‘The whole is only as good as the sum of its parts’ has never been more appropriate in this scenario. With much excitement around the role of technology in the workplace; the connectivity, speed, security and indeed management of the supporting network to make it work is often an afterthought.



The Business Case for a Strong Culture of Ethics

Culture and ethics are all the rage in management theory and compliance discussions, but we never see them discussed as absolutely dependent on one another. If the ethics of the organization aren’t right, the culture will never be right. We explore this new way of thinking about this critical component of business strategy.

“If culture eats strategy for breakfast, ethics are the fork and knife.” – Snyderman Law Group

If you’ve been paying attention to any of the management theories that have been introduced within the past 10 years, you’ve no doubt been hit over the head with the notion that company culture drives an organization forward. Culture affects employee engagement and retention and can therefore boost profits. We now know that culture is a company’s personality and that it shows not only your employees, but also the rest of the world what kind of organization you really are.

Cultivating a company culture is no longer an option; it’s a necessary part of doing business. We are seeing more and more that a company’s culture is more important than salary for many employees. This epiphany came thanks to the millennials’ entrance into the workforce. Going to work every day to a place you love is not a new idea, but as Simon Sinek told us, millennials are the first ones to have the guts to expect it. We are now in the age of “whenever, wherever, whatever.” People no longer want to work a 9-to-5 job in an office for the rest of their career. They want to work whenever they want, wherever it’s convenient for them and for whatever length of time they decide.



Managing the challenge of data management, retention and availability is an ongoing issue for most organizations. In this article, Gordon Cullum explains where data virtualization can help; and where it won’t.

Data virtualization has often been heralded as the answer to enterprises caught in a vicious circle in a world riddled with data, both online and offline. However, it is important to remember that no technical solution is a silver bullet and data virtualization should not be thought of as a one stop solution for all an enterprise’s needs.

Businesses want to act and improve their decision-making in real time whilst containing costs and supporting business-as-usual activities, which can leave CIOs struggling to navigate through an array of complex applications and systems.

To get the most out of data virtualization, and when deployed with the right capabilities and methodology to achieve the desired result, businesses can leverage existing investment to solve current and future analytic needs without compromising on quality, budget and time.



(TNS) — The summer of seemingly endless rainfall took its toll again on the Berks County, Pa., region Monday, dumping several inches of precipitation that led to widespread flooding on areas already inundated in recent weeks.

And if the rain doesn't let up, meteorologists are predicting this August could prove to be the wettest ever recorded.

AccuWeather meteorologist Danielle Knittle said that 9.06 inches of rain has been recorded this month at Reading Regional Airport in Bern Township, the official site for Berks County rainfall totals.



Talk about your one-in-a-million situations. On June 13th, an EF-2 tornado struck the township of Wilkes-Barre, Pa. in the dark of night. For a city of approximately 40,000, this was an unusually powerful tornado, given how briefly it stayed on the ground. Once it struck, the tornado took a death-defying trip through the Wilkes-Barre Township business district, then ravaged the local mall before heading down a major thoroughfare, Interstate 81.

Tammac Holdings Corporation, a local financial services company that specializes in programs for the manufactured housing industry, sat directly in the path of this unusual twister. What’s more, it prides itself on its responsiveness to customer needs, so being in an exposed location was particularly dangerous.In the northeast, nighttime tornadoes are practically unheard of. In fact, since 1950, only 2.2 percent of the more than 850 tornadoes recorded in the Keystone State have occurred between 10 p.m. and midnight. Nighttime tornadoes are especially dangerous because you can’t see them coming, and they strike at a time when people are less focused on the weather.

Tammac Holdings Corporation, a local financial services company that specializes in programs for the manufactured housing industry, sat directly in the path of this unusual twister. What’s more, it prides itself on its responsiveness to customer needs, so being in an exposed location was particularly dangerous.



In 2017 Continuity Central published the results of a survey looking at whether the increasing focus on information security is having an effect on the traditional demarcation lines between business continuity and information security management (ISM). In 2018 we repeated that survey to monitor how things have developed and the results of the survey are now available.

Is information security a business continuity issue?

62 percent (64.5 percent in the 2017 survey) of respondents believe that information security is definitely a business continuity issue, with a further 29 percent (32 percent*) saying that it was partially a business continuity issue. 9 percent (3.5 percent*) said that information security is not a business continuity issue at all.

It seems clear from both the 2018 and the 2017 versions of the survey that information security is viewed as a business continuity issue; but to what extend do business continuity teams actually get involved in preventing and managing information security incidents? The remainder of the survey examined these areas:



(TNS) — Before the flames appeared, Sandie Freeman thought the sky above her Redding home looked especially beautiful.

The evening was golden hued and still; pretty enough that she took a picture. Minutes later, a light wind picked up and leaves from her oak tree began falling like rain, she said.

It was the only warning she received that something was amiss.



This spring, Bluelock Solutions from InterVision conducted a survey titled “2018 Legal Data Protection & Recovery,” focusing on the legal industry. The results found an overconfidence and mismatched expectations toward IT disaster recovery (IT-DR) within law firms. Here are a few responses that stuck out to us:



Page 1 of 2