continuity of operations
See the following -
Corporate Resilience During A Pandemic
As humanity grapples with the spread of COVID-19 globally, the emotional response is to do something, anything, everything. But how do we take that energy and successfully adapt? Most prudent organizations have had on their radar more visible threats like hurricanes, earthquakes, power outages, terrorism, and war. The quiet pervasiveness of a pandemic seems to have caught us by surprise. But is adapting to a pandemic really that different? The good news is that proven principles still apply. Read More »
- Login to post comments
Incident Command System Should Not Be Used For Continuity Of Operations
Let me reiterate, the INCIDENT Command System (ICS) should not be used as the organizational structure to continue operations. No way, no how. I promised a few articles ago I was going to tackle this issue – an issue which has evolved over the last 20 years or so. I will add my theories on why a preponderance of well-intentioned folks have advocated the ICS structure be used as the “logical” (to them) structure to continue the operations of an organization. I believe I speak authoritatively on this having had both feet squarely planted in emergency management and continuity communities over the past 33 years.
- Login to post comments
Infrastructure And Resilience --- The New Pride And Prejudice
I was going about my normal business the other day when an article from the Associated Press written by Matthew Daly And Hope Yen, and titled "Lawmakers: Ida damage shows need for infrastructure upgrades" landed in my inbox. I’m one of those weird people that sees “lawmakers” and “infrastructure” in a sentence, and am drawn to it with amused interest. Usually, I am interested academically…a lot of other times as a pure masochist…and still more often than not, like this time, with snarky anticipation. “Oh, what joyous, twisted misinformation do we have here?” The article summarizes quite aptly (kudos to Mr. Daly and Ms. Yen) the rationale applied for the monstrous, record-smashing infrastructure bills being batted about the House and Senate.
- Login to post comments
Mission Essential Solutions
Mission Essential Solutions, LLC (MES), founded in 2013, offers technical solutions aimed at providing robust mobile capabilities needed for disaster response and recovery operations. James Murphy, President and Owner of the company, is a former Marine helicopter pilot with extensive experience in disaster relief operations, flying humanitarian missions in Puerto Rico and Sierra Leone, and supporting relief operations on the ground following an earthquake and a super typhoon in the Philippines. Before retiring from the Marines in 2012, Mr. Murphy worked at the White House Military Office where he worked in disaster and emergency planning for the President of the United States and the Executive Branch Departments and Agencies.
- Login to post comments
Rock Around The Resilience Wheel - Continuity of Operations Through Disruptive Change
As 2020 comes to a close we are still faced with myriad issues pertaining to public health, elections, economic duress and recovery, unemployment, and living under persistent, pendular change. Resilience has become a popular buzzword to get through these times but is utilized to mean very different things to people looking through very different lenses. Diverse definitions are great but at some point, at some higher and comprehensive perspective, a bow must be put around a common resilience baseline. In layman’s terms, resilience is getting through disruptions and change with some foresight and planning. Resilience matters regardless of the lens you are viewing it through. Covenant Park has coined several catchphrases over our several decades of resilience, risk, continuity, emergency management, security, and national and international planning and execution. Some of those phrases include:
- Login to post comments
The Thin Line Group
ThinLine was founded to assist federal, state, and local government agencies, commercial and private sector organizations, with continuity planning, disaster prevention, and disaster response. ThinLine provides consulting services and material solutions that address evolving man-made threats such as cyber warfare and terrorist threats. In addition, the Thin Line also addresses the dynamic environmental conditions that follow catastrophic natural disasters such as failing infrastructure. The Thin Line Group supports individuals and organizations that need realistic and sustainable resilience solutions to protect life, property, information, and functions.
- Login to post comments
What Can We Learn from a Big Boat Stuck in a Canal?
...The answer to addressing the problem of thinned out supply chains is to recognize that hyper-efficient globalization inherently carries the downside of unpredictable shortages, geopolitical tension, and supply disruptions. And then redesign our global trading order to make it less efficient and more resilient. There are three basic changes we'll need. First, we need to restore anti-monopoly rules, such as antitrust, to prevent the consolidation of production and distribution in the first place. Second, we should re-impose friction, like tariffs, in global trading so that we relocalize production. Trade is generally a good thing, but every country or geographic bloc should be able to provide itself with the essentials, in case there are disruptions. Third, we should rapidly restructure the way that firms finance themselves, so that they have less debt. Debt is a cruel taskmaster, and it leads CEOs to cut deeply not just into fat but into muscle and bone.
- Login to post comments
Cyber Resilience: Protecting Data and Immunizing Software
Two of the most innovative and impactful cyber security technologies will be featured in a one hour webinar. Cyber Reliant uses a unique shredding technology to protect data at rest, in transit, and in use. RunSafe Security transforms (or "stirs") existing software binaries on devices and in embedded systems to cyber harden them against memory corruption, supply chain, and zero-day attacks. Both of these technologies function under the assumption of breach. Don't miss this opportunity to hear about these two game-changing cyber technologies and ask the presenters your questions.
- Login to post comments