Gaining Efficiency and Saving Costs through ICT Continuity
Is your organisation over or under spending on ICT Service Continuity (traditionally IT disaster recovery) solutions? Does your IT function know what the actual business requirements for recovery are? The implementation of an ICT Service Continuity Management framework within the organisation can help you understand the business requirements for recovery better, and in turn ensure that your ICT Service Continuity strategy is tailored made to your organisation’s needs. Join us for this webinar to gain insights into the ISO27031 standard for ICT Service Continuity Management, how it aligns with BCM standards and good practice guidelines, and how your organisation can benefit financially from good corporate governance for a traditionally technical discipline.
RecordedMar 17 201448 mins
Your place is confirmed, we'll send you email reminders
Most businesses have near zero tolerance for service outages and disruptions, regardless of the cause. How do Business Continuity professionals demonstrate a positive ROI for applications while meeting always-on expectations? In an operationally always-on world, business communications must be real-time with rapid response to outages to keep your business running. To achieve this level of Operational Resiliency, you must implement automated communications that eliminate breakdown during a crisis event or disruption. Join this webinar to learn about the latest technologies that you can use today to automate communications for real-time incident and crisis management, regardless of the channel. Are you ready to respond to your next disruption?
There are crises and then there are reputation train wrecks. In the former, your organisation is thrown into a period of chaos that may last days, weeks or months. Stakes and costs are high, but by quickly demonstrating ownership, integrity, genuine stakeholder concern and swift action, your chance of recovering and even enhancing your organisation’s reputation is strong. Think Johnson and Johnson’s Tylenol crisis.
In the latter on the other hand, slow response, lack of responsibility, blame and insensitivity to stakeholders’ perceptions will quickly propel your organisation into a reputation train wreck that may damage and possibly destroy it forever. Think BP, Volkswagen and FIFA.
Indeed bad management and communication can turn a crisis into a reputation train wreck and only principled-based organisations with effective crisis leadership and preparedness can weather the storm and even emerge from it stronger. In this webinar, you will:
- Gain some fundamental best practice insight on how prepare for crises and prevent a reputation train wreck
- Learn real-world response strategies to protect your credibility and retain stakeholder trust even in the most adverse circumstances
Due to the recent economic climate, never before have we witnessed the current level of pressure on businesses to protect customers, employees and the business, covering all sides of the organization to make it more resilient. In general, the motivational factor for preventing loss of business assets and ability to operate is financial, and requires that you improve your business not just protect it.
Many companies struggle and over spend because they decide to throw money and resources at the problem and treat each area of the business as a silo. By taking this approach, the opportunity for an incident is very high and usually does happen. The opportunity for organizations is to recognize a single integrated approach that will address all areas.
Your BCMS investment should not be a standalone document or simply a cost to your operations. Instead, a strong BCMS supports business operational value.
You can show an immediate ROI when resiliency and reliability are weaved throughout the design of a system or process instead of adding a business continuity plan as solely a disaster element. In this webinar, John DiMaria AMBCI will discuss multipurpose solutions that increase both reliability and functionality that not only protect your business but improve it.
The theme for Business Continuity Awareness Week 2016 is return on investment, a theme design to highlight the value of business continuity. During the week, Business Continuity Institute will be publishing a new paper highlighting what some of those returns are. These are returns that go beyond the obvious benefit of BC when disaster occurs, but rather they are returns that do not require the activation of the BC plan. Join Patrick Alcantara DBCI and Andrew Scott CBCI as they present some of the findings from this research.
Predictions show that there will be almost 21 billion connected devices by the end of 2020. The need to deliver 24/7 access to data and applications has never been more critical. Companies want to ensure business continuity and thus cope with the new demands of their customers and employees to remain competitive today. Organizations must innovate by quickly providing IT services for their teams, enhancing security and control, reducing operating costs and increasing flexibility. To meet these parameters, companies are implementing highly virtualized modern data centers by investing in modern technologies such as virtualization, storage and the Cloud.
Efficiencies and reduced investment costs associated with business continuity are typically measured, and measurable, during and after an incident. However significant efficiencies in time, money and resource can be gained at the outset by adopting an approach that focuses on what is really critical, optimises existing capabilities and facilitates collaboration across different risk management disciplines. During this webinar, we will aim to show how a strategic, risk-based approach to Business Continuity can create efficiencies for the organisation both in terms of time and financial investment.
There is a saying that "the cobbler's children are the last to get shoes". As BCM professionals we ensure that other business functions continue to have the tools to do their jobs whilst we go without. Yet failures in resilience cost organisations dearly – both in direct costs and as the result of reputational impact. But with increasingly complex and integrated systems, monitoring of risk mitigation and response can be costly. Incidents affecting business and IT operations are daily occurrences, often escalating into critical events, without proper management and communications. How can we improve efficiency and provision whilst staying within financial constraints? This webinar, explores these topics.
A resilient organization is adaptive, agile and robust – harnessing experience and embracing opportunity to pass the test of time. Does your business continuity strategy support you in achieving this? David Hitchen will look at the initial value from implementing business continuity - and explore the longer term benefits of a strategy that supports your organization in being truly resilient.
Risk and business continuity management are often regarded as 'grudge' compliance purchases or appointments – there are many truths in this negative feeling and perception for a lot of organisations. This presentation will look at how we should approach risk and business continuity management to ensure it adds to the overall business resilience of our organisations and will unpack the value of resiliency.
Business continuity professionals often face the challenge of demonstrating the value of business continuity in their organisation. Join our panel of BC professionals and subject matter experts as they discuss how a unified critical communications platform can derive additional value. This webinar will cover topics such as crisis event management, unplanned IT outages, business communications, information and physical security, data breaches and more. It will also demonstrate how these activities can raise the profile of the business continuity team.
In this webinar, Jon Mitchell of ClearView Continuity will look at some of the typical challenges with evidencing tangible return on investment for business continuity and look at the ClearView ROI tool, which has been used successfully with a number of clients to formulate a business case for BCM software.
Kathleen Lucey FBCI (Montague Risk Management) & Rob Burton (PreparedEx)
How do you design a tabletop exercise and what benefit do they provide your organization? In this webinar you will learn how to set proper objectives for what you are trying to achieve, develop a realistic storyline and then host an effective exercise to ensure that your business continuity programme is fit for purpose.
Business Continuity Management insourcing does seem to many organisations as more advantageous and many do believe insourcing will also provide them with a cost saving. There are, however, some significant pitfalls as well as many unquantified costs over the long term. This webinar will cover the pitfalls that many organisations do not take into consideration when insourcing BCM.
From a business continuity perspective, the value in ITSC is straightforward. But what about the 'hidden' or less obvious benefits to IT departments and the business, in undertaking comprehensive ITSC planning?
If you’re a BC Manager needing to engage with IT to ensure this specialist area of BC is covered, or if you’re an IT Manager needing to justify time and resources to enable ITSC for your business, this webinar has all the answers. It will provide IT Managers and BC Managers alike, with information and tips for engagement and the impetus to deliver the task at hand.
David Davies MBCI, a leading BCM and ITSC consultant, hosts an engaging session with support from Daisy technical recovery specialists and the operations team. With Daisy’s 25 years of recovery expertise to draw from, you will benefit from its unique insight into how you can leverage ROI from this element of your business continuity programme.
David J. Window, CIPS, Senior Consultant and Head of Supply Chain Resilience will discuss the case for understanding the investment businesses make in supply chain resilience and challenges them to understand better the value for money achieved within contractual arrangements where suppliers purport to offer such resilience. To understand, how could business quantify the balance between proactive risk management and responsive continuity management controls to mitigate loss and impacts.
The threat of cyber attacks and data breaches continues to grow, as do the associated costs. As your business moves to cloud-based technologies and enables business processes for mobile and the Internet of Things (IOT) you introduce new risks. Leveraging BCM in preparing and responding to a cyber event produces real value to the business.
Learn how BCM can be a key factor in responding effectively to cyber security attacks and reducing the cost and time to respond.
Understand the true costs a data breach might incur and the potential savings BCM can offer.
Get the evidence needed to create a strong business case for integrating business continuity and security in the fight against cyber crime.
A demonstrable ability to survive and recover from major disruptive events has become one of the most important success aspect of any business continuity management programme. Measuring the organisation's BCM maturity is essential as the results are highly useful, both as a measure for BCM capability, and as a decision-making facilitator regarding areas in need of greater attention in order to improve BCM maturity. It is therefore a model which addresses the need by management to assess the effectiveness of their programmes, as well as optimise their BCM spend.
Adam Blake (ThreatSpike Labs) & Sonny Sehgal (Transputec)
Two leading experts in the field of cyber security are joining the BCI to discuss the latest developments in the battle against cyber criminals. They will be looking at the newest range of threats and advising how you can go about protecting your corporate perimeter against them through the use of cutting edge network monitoring solutions.
So you have been requested to take on business continuity planning for your organization, but what does that really entail? This webinar has been compiled to give you an overview of what encompasses a business continuity programme, the foundation you should establish before you begin and some of the challenges you may face. The webinar can assist you:
- in deciding whether you wish to take on the role of business continuity manager,
- in preparing for your interview for the role; and
- in helping you to create your first 6-month action plan.
This webinar can also be shared with your Business Continuity Sponsor to help them to appreciate the scope of work involved in a business continuity programme and some of the essentials that need to be established before initiating any business continuity activities.
Patrick Alcantara DBCI (BCI) & Ian Farrer MBCI (Pearson)
What are the threats facing your organization? The Business Continuity Institute's annual Horizon Scan Report, in collaboration with BSI, outlines what the main threats are according to business continuity and resilience professionals worldwide, segmented by region, sector and size of organization. Read the report, and if you have questions or want a better understanding of what it means, then makes sure you tune into this webinar.
The Business Continuity Institute (BCI) was established in 1994 to enable individual members to obtain guidance and support from fellow business continuity practitioners. The BCI currently has over 7,000 members in more than 100 countries.
Your data centre is a key part of successfully transforming and building your digital business. The challenge today is to create a highly reliable, flexible, scalable and cost-effective digital infrastructure. Your cabling system is an important element in the creation of that infrastructure.
Attend and learn how to:
- Piece together different elements of standards, technical specifications and physical properties in order to choose the right networking equipment
- Reduce the time and labour spent maintaining, repairing or installing cabling by adopting improved design and management practices.
Komplexe Cyber-Angriffe betreffen hunderte oder sogar tausende von Unternehmen. Um Cyber-Angriffe rechtzeitig zu entdecken, benötigt man sehr spezialisierte Analyse-Werkzeuge vergleichbar mit den Systemen mit denen Unwetter-Warnungen und Schäden identifiziert werden. Wo soll man anfangen? Man muss die kritische Infrastruktur schützen und Geschäftsprozesse am Laufen halten. Nicht nur in Bezug auf die physische RZ Infrastruktur, sondern auch im Bereich Cloud & Mobile. Wie stellt man sich auf Angriffe von multiplen Quellen ein, wenn man eine Ansammlung getrennter IT Sicherheits-Lösungen unterschiedlicher Hersteller hat? Wir können Ihnen helfen, die Gefahren abzuwehren. Im letzten Webcast unserer Serie zeigen wir, wie Sie Ihr Unternehmen auf zukünftige Gefahren vorbereiten. Mit unseren Security Daten Analysen sind Sie gut gewappnet, wenn die nächste Angriffswelle kommt.
Los datos estructurados de la empresa son un activo imprescindible para los servicios y procesos de negocio. Sin embargo, sus requisitos de disponibilidad hacen que las tecnologías tradicionales de protección consistente de este tipo de datos sean no solo ineficientes sino incapaces de responder a las necesidades de continuidad en entornos empresariales.
En este webinar veremos dos áreas de innovación de Commvault que permiten responder a las necesidades de protección de datos no estructurados:
-En la primera, expondremos las novedades en la tecnología Intellisnap, que permite la integración con nuevos fabricantes y la gestión de réplicas de volúmenes; asimismo hablaremos de la nueva tecnología de captura de bloques que extiende el concepto de protección continua y consistente a cualquier tipo de sistema de ficheros y base de datos, para disponer de un número ilimitado de puntos de recuperación de acceso nativo.
-En la segunda, revisaremos las nuevas posibilidades de integración de estas tecnologías con los sistemas de DB y aplicativos de mayor éxito en el entorno empresarial como Oracle, SAP o PostgreSQL.
Únase a nosotros para aprender cómo la Plataforma de Gestión de Datos de Commvault le permite cumplir sus SLA de disponibilidad de datos estructurados, independientemente de la tecnología que elige para almacenar y gestionar estos activos de su negocio.
Os dados estruturados da empresa são um ativo imprescindível para os serviços e processos de negócio. No entanto, os seus requisitos de disponibilidade fazem com que as tecnologias tradicionais de proteção consistente deste tipo de dados sejam não só ineficazes como ainda incapazes de responder às necessidades de continuidade em ambientes empresariais.
Neste webinar abordaremos duas áreas de inovação da Commvault que permitem responder às necessidades de proteção de dados não estruturados:
Na primeira, iremos expor as novidades introduzidas na tecnologia Intellisnap, que permitem a integração com novos fabricantes e a gestão de réplicas de volumes; falaremos também da nova tecnologia de captura de blocos que amplia o conceito de proteção contínua e consistente a qualquer tipo de sistema de ficheiros e bases de dados, para dispor de um número ilimitado de pontos de recuperação de acesso nativo.
Na segunda, vamos rever as novas possibilidades de integração destas tecnologias com os sistemas de DB e aplicações de maior sucesso no ambiente empresarial, como Oracle, SAP ou PostgreSQL.
Junte-se a nós para saber como a Plataforma de Gestão de Dados da Commvault lhe permite cumprir os seus SLA de disponibilidade de dados estruturados, independentemente da tecnologia que escolha para armazenar e gerir estes ativos do seu negócio.
Join Catherine Roy, Director of PMO at HOSTING, and Kellen Amobi, Project Manager at HOSTING, on June 23 at 3 pm EST for Cloud Migration: Tales from the Trenches – an interactive webinar, in which they will discuss:
-Developing scopes and deadlines for complex projects
-Developing realistic schedules
-How to approach and define problems for c-level and team members
Employees might feel intimidated or overwhelmed with the amount and diversity of business data available to them.
Accessing and harnessing all of that data could be a game changer for them, but they're not sure how to do it. Up until now integrating, analyzing, and understanding all those data sources hasn't been easy, timely, or affordable for your team - not to mention your business users. Your main role has been telling them what they can't do. What if you could offer a comprehensive solution that business groups could use on their own terms - to answer their own questions? Just imagine how your role would change from being a traffic cop to a strategic advisor.
In this webcast, viewers will learn more about:
•Data accessibility for business users and managers: the human element of data
•Managing the backend data infrastructure
•Internet of Things (IoT) and what that means for businesses
•The future of automation in intelligent data systems
Over the last few years, there are a known 620 million user accounts that have been compromised across hundreds of sites. Organized cybercrime have figured out that this is the fastest, most reliable method to infiltrate organizations, as well as achieve financial gain. Since users share passwords across multiple sites, it is easier to find logins that work on a target site than try to bypass firewalls, find software flaws, or even run spearphishing campaigns.
These types of attacks are collectively coming to be known as “Account Takeover” (ATO). Some are simple, while others are sophisticated. Some can be stopped relatively easily, and others require much more effort.
ATO attacks (via stolen credentials) were cited as the #1 method of confirmed data breaches in both 2014 and 2015, for web applications, which itself was the #1 vector for data breaches.
Come learn what these ATO threats are, their impact to your business, how to detect them, and what you can do about it.
The rapid growth of mobile devices, combined with ubiquitous access to cloud services, is changing the way that people use devices to get work done. In this session, learn how Microsoft is delivering enterprise mobility to enable users to work on their devices of choice, with consistent experiences, while providing a unified infrastructure for managing and delivering applications and protecting corporate data.
This course maps to the Cloud Roadshow session titled "Protect and Manage Identity and Devices with Microsoft Enterprise Mobility Suite."
Businesses of all sizes are being attacked with new forms of threats trying to exploit recently discovered vulnerabilities in systems. These are often refered to as Advanced Persistent Threats. Security researcher and advocate, Brook Chelmo will briefly talk about the history of hacking and how the black hat community has gone from pride to profit and from hacking large government agencies to the local dentist office. Brook will talk about ways to stop advanced persistent threats such as zero-day attacks and how you don’t have to be a security expert to stop them.
Learn how to stay safe from current and common attacks with advanced security technology
Learn how to practice good security hygiene
Understand how the threat landscape changes day to day with a million pieces of malware being authored daily.
This Webcast will focus on the data protection capabilities of the OpenStack Mitaka release, which includes multiple resiliency features. Join Dr. Sam Fineberg, Distinguished Technologist (HPE), and Ben Swartzlander, Project Team Lead OpenStack Manila (NetApp), as they discuss:
- Storage-related features of Mitaka
- Data protection capabilities – Snapshots and Backup
- Manila share replication
- Live migration
- Rolling upgrades
- HA replication
Our experts will be on hand to answer your questions.
This Webcast is co-sponsored by two groups within the Storage Networking Industry Association (SNIA): the Cloud Storage Initiative (CSI), and the Data Protection & Capacity Optimization Committee (DPCO).