Counting the Cost of Poor Communication in a Crisis
In today’s interconnected world, communication, whether it is electronic, verbal or written, has the power to create opportunities for an organisation or to be a serious threat and cause unrecoverable harm.
This impact is heightened in a crisis and your organisation needs to proactively prepare for these events and have a well-oiled approach and plan. In this webinar we will look at local and international examples of communications (good and bad) and the affect it has on the organisations share price and then we will offer some tips on steps you can take to be fully prepared to get your message out successfully.
RecordedMar 18 201447 mins
Your place is confirmed, we'll send you email reminders
Most businesses have near zero tolerance for service outages and disruptions, regardless of the cause. How do Business Continuity professionals demonstrate a positive ROI for applications while meeting always-on expectations? In an operationally always-on world, business communications must be real-time with rapid response to outages to keep your business running. To achieve this level of Operational Resiliency, you must implement automated communications that eliminate breakdown during a crisis event or disruption. Join this webinar to learn about the latest technologies that you can use today to automate communications for real-time incident and crisis management, regardless of the channel. Are you ready to respond to your next disruption?
There are crises and then there are reputation train wrecks. In the former, your organisation is thrown into a period of chaos that may last days, weeks or months. Stakes and costs are high, but by quickly demonstrating ownership, integrity, genuine stakeholder concern and swift action, your chance of recovering and even enhancing your organisation’s reputation is strong. Think Johnson and Johnson’s Tylenol crisis.
In the latter on the other hand, slow response, lack of responsibility, blame and insensitivity to stakeholders’ perceptions will quickly propel your organisation into a reputation train wreck that may damage and possibly destroy it forever. Think BP, Volkswagen and FIFA.
Indeed bad management and communication can turn a crisis into a reputation train wreck and only principled-based organisations with effective crisis leadership and preparedness can weather the storm and even emerge from it stronger. In this webinar, you will:
- Gain some fundamental best practice insight on how prepare for crises and prevent a reputation train wreck
- Learn real-world response strategies to protect your credibility and retain stakeholder trust even in the most adverse circumstances
Due to the recent economic climate, never before have we witnessed the current level of pressure on businesses to protect customers, employees and the business, covering all sides of the organization to make it more resilient. In general, the motivational factor for preventing loss of business assets and ability to operate is financial, and requires that you improve your business not just protect it.
Many companies struggle and over spend because they decide to throw money and resources at the problem and treat each area of the business as a silo. By taking this approach, the opportunity for an incident is very high and usually does happen. The opportunity for organizations is to recognize a single integrated approach that will address all areas.
Your BCMS investment should not be a standalone document or simply a cost to your operations. Instead, a strong BCMS supports business operational value.
You can show an immediate ROI when resiliency and reliability are weaved throughout the design of a system or process instead of adding a business continuity plan as solely a disaster element. In this webinar, John DiMaria AMBCI will discuss multipurpose solutions that increase both reliability and functionality that not only protect your business but improve it.
The theme for Business Continuity Awareness Week 2016 is return on investment, a theme design to highlight the value of business continuity. During the week, Business Continuity Institute will be publishing a new paper highlighting what some of those returns are. These are returns that go beyond the obvious benefit of BC when disaster occurs, but rather they are returns that do not require the activation of the BC plan. Join Patrick Alcantara DBCI and Andrew Scott CBCI as they present some of the findings from this research.
Predictions show that there will be almost 21 billion connected devices by the end of 2020. The need to deliver 24/7 access to data and applications has never been more critical. Companies want to ensure business continuity and thus cope with the new demands of their customers and employees to remain competitive today. Organizations must innovate by quickly providing IT services for their teams, enhancing security and control, reducing operating costs and increasing flexibility. To meet these parameters, companies are implementing highly virtualized modern data centers by investing in modern technologies such as virtualization, storage and the Cloud.
Efficiencies and reduced investment costs associated with business continuity are typically measured, and measurable, during and after an incident. However significant efficiencies in time, money and resource can be gained at the outset by adopting an approach that focuses on what is really critical, optimises existing capabilities and facilitates collaboration across different risk management disciplines. During this webinar, we will aim to show how a strategic, risk-based approach to Business Continuity can create efficiencies for the organisation both in terms of time and financial investment.
There is a saying that "the cobbler's children are the last to get shoes". As BCM professionals we ensure that other business functions continue to have the tools to do their jobs whilst we go without. Yet failures in resilience cost organisations dearly – both in direct costs and as the result of reputational impact. But with increasingly complex and integrated systems, monitoring of risk mitigation and response can be costly. Incidents affecting business and IT operations are daily occurrences, often escalating into critical events, without proper management and communications. How can we improve efficiency and provision whilst staying within financial constraints? This webinar, explores these topics.
A resilient organization is adaptive, agile and robust – harnessing experience and embracing opportunity to pass the test of time. Does your business continuity strategy support you in achieving this? David Hitchen will look at the initial value from implementing business continuity - and explore the longer term benefits of a strategy that supports your organization in being truly resilient.
Risk and business continuity management are often regarded as 'grudge' compliance purchases or appointments – there are many truths in this negative feeling and perception for a lot of organisations. This presentation will look at how we should approach risk and business continuity management to ensure it adds to the overall business resilience of our organisations and will unpack the value of resiliency.
Business continuity professionals often face the challenge of demonstrating the value of business continuity in their organisation. Join our panel of BC professionals and subject matter experts as they discuss how a unified critical communications platform can derive additional value. This webinar will cover topics such as crisis event management, unplanned IT outages, business communications, information and physical security, data breaches and more. It will also demonstrate how these activities can raise the profile of the business continuity team.
In this webinar, Jon Mitchell of ClearView Continuity will look at some of the typical challenges with evidencing tangible return on investment for business continuity and look at the ClearView ROI tool, which has been used successfully with a number of clients to formulate a business case for BCM software.
Kathleen Lucey FBCI (Montague Risk Management) & Rob Burton (PreparedEx)
How do you design a tabletop exercise and what benefit do they provide your organization? In this webinar you will learn how to set proper objectives for what you are trying to achieve, develop a realistic storyline and then host an effective exercise to ensure that your business continuity programme is fit for purpose.
Business Continuity Management insourcing does seem to many organisations as more advantageous and many do believe insourcing will also provide them with a cost saving. There are, however, some significant pitfalls as well as many unquantified costs over the long term. This webinar will cover the pitfalls that many organisations do not take into consideration when insourcing BCM.
From a business continuity perspective, the value in ITSC is straightforward. But what about the 'hidden' or less obvious benefits to IT departments and the business, in undertaking comprehensive ITSC planning?
If you’re a BC Manager needing to engage with IT to ensure this specialist area of BC is covered, or if you’re an IT Manager needing to justify time and resources to enable ITSC for your business, this webinar has all the answers. It will provide IT Managers and BC Managers alike, with information and tips for engagement and the impetus to deliver the task at hand.
David Davies MBCI, a leading BCM and ITSC consultant, hosts an engaging session with support from Daisy technical recovery specialists and the operations team. With Daisy’s 25 years of recovery expertise to draw from, you will benefit from its unique insight into how you can leverage ROI from this element of your business continuity programme.
David J. Window, CIPS, Senior Consultant and Head of Supply Chain Resilience will discuss the case for understanding the investment businesses make in supply chain resilience and challenges them to understand better the value for money achieved within contractual arrangements where suppliers purport to offer such resilience. To understand, how could business quantify the balance between proactive risk management and responsive continuity management controls to mitigate loss and impacts.
The threat of cyber attacks and data breaches continues to grow, as do the associated costs. As your business moves to cloud-based technologies and enables business processes for mobile and the Internet of Things (IOT) you introduce new risks. Leveraging BCM in preparing and responding to a cyber event produces real value to the business.
Learn how BCM can be a key factor in responding effectively to cyber security attacks and reducing the cost and time to respond.
Understand the true costs a data breach might incur and the potential savings BCM can offer.
Get the evidence needed to create a strong business case for integrating business continuity and security in the fight against cyber crime.
A demonstrable ability to survive and recover from major disruptive events has become one of the most important success aspect of any business continuity management programme. Measuring the organisation's BCM maturity is essential as the results are highly useful, both as a measure for BCM capability, and as a decision-making facilitator regarding areas in need of greater attention in order to improve BCM maturity. It is therefore a model which addresses the need by management to assess the effectiveness of their programmes, as well as optimise their BCM spend.
Adam Blake (ThreatSpike Labs) & Sonny Sehgal (Transputec)
Two leading experts in the field of cyber security are joining the BCI to discuss the latest developments in the battle against cyber criminals. They will be looking at the newest range of threats and advising how you can go about protecting your corporate perimeter against them through the use of cutting edge network monitoring solutions.
So you have been requested to take on business continuity planning for your organization, but what does that really entail? This webinar has been compiled to give you an overview of what encompasses a business continuity programme, the foundation you should establish before you begin and some of the challenges you may face. The webinar can assist you:
- in deciding whether you wish to take on the role of business continuity manager,
- in preparing for your interview for the role; and
- in helping you to create your first 6-month action plan.
This webinar can also be shared with your Business Continuity Sponsor to help them to appreciate the scope of work involved in a business continuity programme and some of the essentials that need to be established before initiating any business continuity activities.
Patrick Alcantara DBCI (BCI) & Ian Farrer MBCI (Pearson)
What are the threats facing your organization? The Business Continuity Institute's annual Horizon Scan Report, in collaboration with BSI, outlines what the main threats are according to business continuity and resilience professionals worldwide, segmented by region, sector and size of organization. Read the report, and if you have questions or want a better understanding of what it means, then makes sure you tune into this webinar.
The Business Continuity Institute (BCI) was established in 1994 to enable individual members to obtain guidance and support from fellow business continuity practitioners. The BCI currently has over 7,000 members in more than 100 countries.
NoSQL databases like Cassandra and Couchbase are quickly becoming key components of the modern IT infrastructure. But this modernization creates new challenges – especially for storage. Storage in the broad sense. In-memory databases perform well when there is enough memory available. However, when data sets get too large and they need to access storage, application performance degrades dramatically. Moreover, even if enough memory is available, persistent client requests can bring the servers to their knees.
Join Storage Switzerland and Plexistor where you will learn:
1. What is Cassandra and Couchbase?
2. Why organizations are adopting them?
3. What are the storage challenges they create?
4. How organizations attempt to workaround these challenges.
5. How to design a solution to these challenges instead of a workaround.
Les cyberattaques complexes peuvent cibler des centaines voire des milliers d’entreprises dans le monde. Prévoir une cyberattaque demande des capacités analytiques sophistiquées telles que celles utilisées pour prévoir les dommages d’un ouragan ou d’un typhon !
Il est souvent même difficile de savoir par où commencer…
Vous avez besoin d’aide pour protéger vos infrastructures critiques et garantir la continuité d’activité de votre entreprise. Et cela pas seulement dans vos infrastructures sur site mais aussi dans le cloud et mobiles. Comment planifiez-vous de répondre à des attaques diffuses alors que vous utilisez différentes technologies de sécurité de différents éditeurs ?
Lors de ce dernier webcast, nous vous proposons d’étudier comment préparer votre entreprise aux menaces de demain. Car lorsque le temps et l’information sont cruciaux, vous avez besoin de vous appuyer sur une solution d’intelligence de sécurité pour être mieux armé lors de la prochaine attaque.
Au cours des trois prochains mois, nous vous proposons une série de quatre webcasts consacrés à vos enjeux de sécurité. Lors de chacun des webcasts, nous vous proposons d’échanger avec nos experts sur ces problématiques spécifiques et de découvrir comment les solutions Symantec peuvent vous aider à y répondre.
1) Adoption de la GDPR, une raison à 20M € (11:00 am Apr 21 2016 Paris) - https://www.brighttalk.com/webcast/5691/196523
2) Cloud: réduisez les risques & gardez le contrôle pour en apprécier les bénéfices (11:00 am May 12 2016 Paris) - https://www.brighttalk.com/webcast/5691/196525
3) Comment gérez-vous le manque de ressources en sécurité ? (11:00 am Jun 02 2016 Paris) - https://www.brighttalk.com/webcast/5691/196527
4) Cloud, catastrophes naturelles et cyber-attaques (11:00 am Jun 30 2016 Paris) - https://www.brighttalk.com/webcast/5691/196533
It’s time to upgrade your desktop experience. But how? In this session, explore the options and recommendations for deploying the latest Windows and Office desktop experience, and hear suggestions on how you can help minimize user issues. If you are wondering about reimaging, in-place upgrades, MSI, Click-to-Run, Current Branch, Current Branch for Business, and Long-Term Servicing Branches, this session is for you!
Winter is coming. Our three-eyed raven answers your top 5 IT security questions based on our most recent survey including email security, ransomware, protecting IoT and more. Additionally, here's your chance to ask our in-house cybersecurity expert, Michael Aguilar, your most challenging questions to help you defend the wall. It’s an open forum just for you!
With a personal record of 34 questions in 30 minutes, Michael will torch your questions like Drogon. Sign up today and get those questions ready.
Customer service organizations are now at the epicenter of their company’s ability to differentiate their brand and drive customer loyalty and advocacy. This means having an agile service environment designed to adjust and anticipate the needs of customers and your brand at the pace of innovation. Join us to experience our vision for service organizations in the digital age.
In this webcast, viewers will learn more about:
•Interacting with your customers anywhere, at any time, across multiple devices
•Delivering customer service in a seamless way across physical and digital environments
Every enterprise needs a survival guide for compliance. The risk associated with cyber security has a big spotlight on it today—and it’s become a Board-level topic for many enterprises. Compliance with cyber security requirements has transitioned from a "check the box" mentality to a stringent program whereby regulatory requirements and standards as well as enterprise policies and best practices are diligently met, continuously enforced and proven through regular audits. Yet, preparing for audits and maintaining audit readiness takes valuable time and resources– and has become quite a burden!
Join this session to learn about the 6 steps for surviving in today’s compliance jungle.
Signalhorn’s Chief IT Security Officer (CISO) Istvan Rabai presents an overview of present-day IT security.
The focus of this webinar will be on identifying specific vulnerabilities and measures to improve the security of a communication network.
Istvan will show - from his own first-hand experience, how an actual incident became the catalyst for the implementation of a state-of-the-art secure infrastructure that currently serves an impressive number of Government, NGO and security sensitive Corporate customers.
The webinar will cover several key aspects, but as there is no blueprint solution for all security issues, you will have the opportunity to address yours individually in the Q&A discussion at the end of the session.
This is what you will learn in this session:
- Main aspects of IT security
- Essential steps to guarantee IT security
- Typical preventive measures
- Typical redundant managed networks
- Case study: The Signalhorn IT security story