As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.






Please reset your password to access the new DRJ.com
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In
   

Create new account
(it's completely free). Subscribe

BCI: Incident micromanagement – good or bad?

BCI: Incident micromanagement – good or bad?

The Business Continuity Institute Yesterday I attended the Scottish Continuity Resilient Scotland Conference at the RBS Headquarters in Edinburgh. The opening speaker was John Swinney MSP, Deputy First Minister and Cabinet Secretary for Education and Skills. He began...
BCI: BCAW 2017 posters

BCI: BCAW 2017 posters

Cyber security is everyone’s responsibility Play your part in building a resilient organization This is the message we want to get across during Business Continuity Awareness Week (15th – 19th May). We want people to see realise that cyber security is...
Is It Time to Rename Malware as Sneakyware?

Is It Time to Rename Malware as Sneakyware?

Malware (Sneakyware) is the software that gets into your system and causes havoc, unless you detect it and neutralize first. To detect malware, a common approach has been to place suspicious files in a “sandbox”, which is an isolated space in an IT system....
Vendor Risk Management Under SSAE 18

Vendor Risk Management Under SSAE 18

By now you are likely aware that the American Institute of Certified Public Accountants (AICPA) has announced an updated Statement on Standards for Attestation Engagements (SSAE 18), which will take effect on May 1, 2017. The key difference of SSAE 18, compared to the...
Zero One: States Woo Cybersecurity Pros

Zero One: States Woo Cybersecurity Pros

SAN FRANCISCO — On Valentine’s Day, Virginia Gov. Terry McAuliffe, speaking at RSA Conference 2017 in San Francisco, courted cybersecurity pros to live and work in the state known for lovers. His overtures, though, belie a serious problem....
Protecting Your Data

Protecting Your Data

Among DR/BC customers many plan to rely only on near real time replication and frequent snapshots as an appropriate (and only) solution for protecting data. And, while the near-real-time replication and frequent snapshots are essential to any disaster recovery and...
Team Building Basics

Team Building Basics

The old “once-in-a-lifetime” disaster seems almost common place nowadays. Recently that catastrophic image filled the news yet again. A very large forest fire broke out in the Smoky Mountain National Park and spilled over to the town of Gatlinburg, Tenn....
You Want Me to Do What?

You Want Me to Do What?

One of the challenges I have seen over my 30 years in the business continuity industry is for people charged with executing DR or BC plans to accept and execute the plans in the format they are written. Nowhere has this been more evident than in the area of IT...
Pricing Strategies For SaaS Providers

Pricing Strategies For SaaS Providers

Most leaders of SaaS providers understand the importance of minimizing Churn and maximizing account enrichment, but few fully appreciate how vital to those goals is a good pricing and licensing strategy. My newly published report Pricing Strategies For...
Why Compliance Officers Need Independence

Why Compliance Officers Need Independence

I recently read a great blog post by Tom Fox on why compliance officers need independence.  And former federal prosecutor Michael Volkov, who completely understands the CCO’s hard job, has reiterated the value of independence here, although this is mostly...
How to develop a cybersecurity program

How to develop a cybersecurity program

Your business is unique and your program should be too. Make the most of your unique business assets and the similarity of the controls in your chosen framework (see previous posts) to build a program that meets your business objectives and needs. Following is one...
Cyber Security Planning

Cyber Security Planning

In today’s digital business climate, it’s critical to stay up to date with cyber security. In 2012, FEMA released a presentation “designed to increase understanding of cyber threat alerts, warning, and information sharing across sectors, and to test...
Artificial Intelligence and Data Storage

Artificial Intelligence and Data Storage

“My God. It’s Full of Data” – Bowman (My apologies to 2001: A Space Odyssey) Just in case you weren’t sure, there is a huge revolution happening. The revolution is around using data. Rather than developers writing explicit code to perform...
Veeam Strengthens Cloud Availability Dominance

Veeam Strengthens Cloud Availability Dominance

With the industry’s most comprehensive Cloud vision, strategy and programs along with the largest global partner ecosystem, Veeam is solidifying its leadership position through innovative initiatives and talent acquisition to drive significant growth in 2017...
Panzura Introduces New Freedom Product Line

Panzura Introduces New Freedom Product Line

Free data from expensive NAS and move, manage and access it in any cloud CAMPBELL, Calif. – Panzura® today introduced its new Freedom product line, enabling organizations to combine the economics of cloud storage with the performance of flash to solve...
A Time For Renewal

A Time For Renewal

This time of the year is often a time of renewal for many. We’ve made it through the winter, recovered from the holidays, and we have our eyes firmly set on the rest of the year. At DRJ, 2017 has already been a truly outstanding year. We’ve been through a...
AWS Announces Amazon Chime

AWS Announces Amazon Chime

New unified communications service delivers frustration-free meetings with exceptional video and audio quality Brooks Brothers, Level 3, and Vonage among the early users and partners   SEATTLE – Amazon Web Services, Inc. (AWS), an Amazon.com company...
Can Risk Management Even Be Effective?

Can Risk Management Even Be Effective?

Lately, everyone – from the government agencies to regulators to corporate board members – seems to be talking about the need for better, more effective risk management. The challenging part is that, despite the guidance provided in ISO 31000:2009, the...
A Hogwarts For Cyber Protection?

A Hogwarts For Cyber Protection?

How the UK is minting a new generation of cybersecurity wizards. Never let it be said that the British don’t do things with style. In the years leading to World War II, they recognized the need to break enemy codes, and ran crossword puzzle contests to find...
How To Launch Customer Obsession

How To Launch Customer Obsession

Since 2010, you’ve heard Forrester beating our customer obsessed drum.  It is our idea that in The Age of the Customer, your relationship with your customers are your primary competitive differentiator.  We’ve written a lot about how to put...
Introducing Avalution’s Values

Introducing Avalution’s Values

When my business partner Brian and I started Avalution in a Starbucks 11 years ago, we didn’t spend much time agonizing over what we wanted this firm to be about. It was a quick conversation – and it didn’t really focus on business continuity! We...
Turn Supply chain analytics is your Moneyball

Turn Supply chain analytics is your Moneyball

I watched Moneyball over the weekend for the first time, and I really enjoyed it. As a nerd, I love all movies that demonstrate the power of mathematics and analytics (On top of that, Brad Pitt did a fine job). But while everyone loves the of using statistical insight...
BCI: Why do we not listen?

BCI: Why do we not listen?

The Business Continuity Institute I am not obsessed with President Trump by any means, but at the moment, he is highly visible and there are lots of lessons to be learned from the situations he is creating. Between winning the election and his inauguration, the news...
ITSM and DevOps – A Win-Lose Situation?

ITSM and DevOps – A Win-Lose Situation?

Do the formalism of IT service management and the agility of DevOps mean that one can only succeed if the other fails? The main goals of ITSM are to help achieve business objectives and increase IT efficiency. DevOps on the other hand puts the priority on speed and...
Tapping the Real Benefits of the Cloud

Tapping the Real Benefits of the Cloud

The enterprise shows no signs of slowing the migration of data and applications from legacy infrastructure to the cloud. But while much of this activity is aimed at reducing the cost of IT, particularly in the capital budget, it turns out there are many side benefits...
What Would a Reformed FEMA Look Like?

What Would a Reformed FEMA Look Like?

Disaster response used to be a state and local responsibility, with perhaps a sprinkling of federal assistance thrown in for good measure. These days, some will argue, the equation has been reversed, with national government in the form of FEMA increasingly stepping...
The Unicorn Explosion Continues

The Unicorn Explosion Continues

Last Spring, we predicted that we’d see carnage among tech unicorns, particularly in consumer markets. (How many food service companies and “Uber for X” companies do we really need?) We didn’t (nor would we), however, predict when the carnage...
Common Business Continuity Disasters

Common Business Continuity Disasters

We should always be performing risk analysis, even if it is ad hoc or a thought exercise. As the new year is now well underway, we have forgotten about our New Year’s resolutions, and are back into projects and issues. As you begin the review of risks and plan...
How to Stop Ransomware

How to Stop Ransomware

The internet is fraught with peril these days, but nothing strikes more fear into the hearts of users and IT security pros than the prospect of ransomware. Here, then, is a comprehensive look at ransomware, both how to prevent it and what to do if you become one of...