As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.






Please reset your password to access the new DRJ.com
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In
   

Create new account
(it's completely free). Subscribe

North American Insurers Lead In Tech Spending

North American Insurers Lead In Tech Spending

North American insurers lead the way in IT spending globally and will invest $73 billion in tech areas such as data analytics, cloud, and insurtech in 2017. Digital Insurance reports that global IT spending by insurers is slated to reach $185 billion by the end of...
New Help for Dealing with Extreme Events

New Help for Dealing with Extreme Events

A New Company, X-Events Dynamics LLC, Guides Organizations through Identification and Management of X-Events The world is exploding with uncertainty, from the effects of the rapid rise of populist geopolitics to the confusion of extreme immigration to explosive...
Enterprise Attacks that Start in Mobile Apps

Enterprise Attacks that Start in Mobile Apps

Some IT security attacks start from the most innocent mobile apps and in ways that let cyber-criminals simply pick up confidential communications without having to hack into anything at all. While it may sound surprising, many mobile apps leak user data to anybody...
Business Continuity by Working Backwards

Business Continuity by Working Backwards

Ever since marketing figured out that companies could do better by asking customers what they wanted, rather than just trying to tell them, businesses have moved massively to the notion of working backwards from the customer. Indeed, Jeff Bezos, founder of Amazon.com,...
Penetration Testing: DIY or Hire a Pen Tester?

Penetration Testing: DIY or Hire a Pen Tester?

A penetration test, when carried out by outside experts, is the best way to establish how vulnerable your network is from a malicious hacker attack. But while thorough, third-party penetration testing can be expensive and is effectively out of date as soon as you make...
Survive And Thrive After Disaster

Survive And Thrive After Disaster

A successful entrepreneur spends all the time necessary to plan, down to the smallest detail, the workings of his or her business. Staffing, marketing, inventory, equipment, investors, and location and more are all a part of the dynamic. One aspect missing from many...
Cisco Connected Factory for Industrie 4.0

Cisco Connected Factory for Industrie 4.0

Moving Intelligence into Action with Smart Factories HANNOVER, GERMANY – The machines that make up a modern factory create more than just sweatshirts or submarines. They create lots and lots of data. This data can tell you everything from how efficient the...
Fitting the hurricane pieces together

Fitting the hurricane pieces together

Interstate Restoration, CSU and Earthvisionz optimize safety in path of huge storms FT. WORTH, Texas – A perfect alignment of storm-fighting forces has coalesced just in time for the beginning of the nation’s next hurricane season. Interstate Restoration,...
DevOps, Invest For Velocity And Quality!

DevOps, Invest For Velocity And Quality!

Delivering exceptional customer experiences and product for your business take speed and flexibility. More than ever before, speed and flexibility are required from every part of your organization, business and IT alike. DevOps provides your business leaders,...
Is the Cloud the Best Place for Analytics?

Is the Cloud the Best Place for Analytics?

Analytics is becoming a crucial element in the enterprise data ecosystem. It is one of the key drivers of the Internet of Things (IoT), and will undoubtedly provide key competitive advantages as the digital economy unfolds. But it doesn’t come cheap, and it is...
Need For Political Risk Coverage Accelerates

Need For Political Risk Coverage Accelerates

Amid ongoing political upheaval in Venezuela and a volatile geopolitical landscape elsewhere, the need for political risk insurance is rising to prominence for multinational companies. AP reports that General Motors just became the latest corporation to have...
BCI: An objective review …

BCI: An objective review …

The Business Continuity Institute It’s important to keep our business continuity plans up to date. That almost goes without saying. But what, exactly, do we mean by keeping our plans up to date? Most organisations with a business continuity plan will assign...

Young Professional Spotlight

Are you a young business continuity professional? Are you interested in getting more involved in networking and building lasting professional contacts? Well, we want to hear from you. We want your opinions and thoughts on all things business continuity, resiliency and...
Iron Mountain Hosts Investor Day

Iron Mountain Hosts Investor Day

Topics to Include Progress on Strategic Plan, Capital Allocation and Business Outlook Company Reiterates 2017 Full-Year Constant Dollar Guidance   BOSTON – Iron Mountain Incorporated (NYSE: IRM), the storage and information management services company, is...
4 Key Steps on the Roadmap to Resilience

4 Key Steps on the Roadmap to Resilience

Most people can sort out what tangibles they need for a solid BCM program, but the following critical steps can make or break an enterprise in times of crisis. Without functional crisis management and effective preparations, your organizational resilience will...
U.S. Thunderstorm Losses Add Up To Q1 Record

U.S. Thunderstorm Losses Add Up To Q1 Record

Topping $5.7 billion. That’s the record cost of insured losses from severe thunderstorms and convective weather in the United States in the first quarter of 2017. The latest figures come via Steve Bowen, director and meteorologist at Impact Forecasting, the...
IICRC Releases New Crime Scene Cleanup Standard

IICRC Releases New Crime Scene Cleanup Standard

LAS VEGAS – The Institute of Inspection, Cleaning and Restoration Certification (IICRC) has published a new standard of care for the cleaning and decontamination associated with trauma and crime scenes. The new ANSI/IICRC S540 Standard for Trauma and Crime Scene...
Move to the Cloud, but Mitigate Risk

Move to the Cloud, but Mitigate Risk

Security remains one of the biggest roadblocks for enterprises to move to the cloud, numerous studies and research firms have stated. We often talk about security as one thing, but in actuality, it is quite multifaceted. That’s why it’s important to...
It’s a Great Time to Be a Risk Manager

It’s a Great Time to Be a Risk Manager

2017 has so far been a wild ride of change. Companies are navigating through a new U.S. administration, Brexit and cyber risks that are more daunting each day. We are bombarded with uncertainty and unchartered waters. Nevertheless, it’s a great time to be a risk...
For Continuity Sake……

For Continuity Sake……

A consistent challenge that I have heard from Business Continuity Professionals over the past 20 years is mastering the art of getting buy in, and engagement, from their colleagues.  As business continuity practitioners, you have chosen a very rewarding...
Commercial Insurance Prices Moving On Up

Commercial Insurance Prices Moving On Up

Insurers are moving away from the rate cuts of 2016, according to online insurance exchange MarketScout’s take on the first quarter 2017 rate environment. For the first time in 20 months, the composite rate index for commercial accounts in the United...
Tips for Disinfecting Your Data Center

Tips for Disinfecting Your Data Center

Cyberattacks have pretty much become a part of every day life.  Security firm ForeScout’s State of Cyber Defense Maturity Report found that more than 96 percent of organizations experienced a major IT security breach in the past year. One in six...
IoT Device Security Doomsday on the Horizon?

IoT Device Security Doomsday on the Horizon?

Does it sound strange that many organisations believe they are exposed to major problems with Internet of Things device security, yet few of them have taken any measures to resolve those problems? IoT devices are increasingly part of business life, as businesses use...
What’s Next for Big Data Flash Storage?

What’s Next for Big Data Flash Storage?

Last month HPE announced its plans to acquire Nimble and double down on its move into “the fast-growing flash market” for the enterprise. Days later Dell EMC announced it would drop its DSSD flash offering for big data and HPC because the market is too...
Preventing Disaster, One Attendee at a Time

Preventing Disaster, One Attendee at a Time

By Ron LaPedis I attended Spring World DRJ at Disney’s Coronado Springs Resort during the last week of March. Their 56th conference had over 60 sessions with 75 speakers, split between general sessions, breakout sessions, workshops, and a Senior Advanced Track...
BCI: SMEs underfunding cyber security

BCI: SMEs underfunding cyber security

The Business Continuity Institute The vast majority of small to medium sized enterprises (86%) have less than a tenth of their total IT budget allocated to cyber security, while 75% have between zero and two IT security staff members, according to the...
Rethinking Risk to Achieve Efficient Growth

Rethinking Risk to Achieve Efficient Growth

It’s no secret that strategy and finance need to work together to encourage growth – in fact, last year, both corporate functions cited integrating their planning as a top priority. Yet new research suggests that they need a third partner, risk, to move...
Data Breach Response Planning: A Guide

Data Breach Response Planning: A Guide

Data breaches don’t seem to attract our attention much these days; commonplace activities often lead to complacency. Remember that your organization will, if it has not already, have some type of data breach. Depending on the type and scope of the data breach,...
The Networked Emergency Manager

The Networked Emergency Manager

Former Gen. Stanley McChrystal’s Team of Teams is an excellent book about leadership and the need to adapt to changing circumstances. In the book, he explains how the U.S. Special Operations Task Force in Iraq had to become a more nimble and networked...
Keeping Control of the Hybrid Enterprise

Keeping Control of the Hybrid Enterprise

Hybrid computing models are starting to infiltrate enterprise data environments as organizations seek to leverage both public and private cloud infrastructure. But while this may seem to diminish traditional in-house data centers, it’s actually the outsourcing...
The cybersecurity principle of minimalism

The cybersecurity principle of minimalism

Here’s a short post, ideal for illustrating the simple but not always easy principle of minimalism: Whatever you have, chances are you don’t need it all. You don’t need all the data you may be asking for, or for that matter, giving out. Medical forms...
How to Conquer the Compliance Audit

How to Conquer the Compliance Audit

Astute receivables leaders know how to identify issues and act on them before they become major problems – especially when it comes to compliance. The cost of noncompliance and damage to reputation can be debilitating, but preventive measures save resources by...
Anti-Ransomware Decryption Toolkit Grows

Anti-Ransomware Decryption Toolkit Grows

Since its inception last summer, the No More Ransom project, and anti-ransomware initiative formed by the Dutch National Police, Europol, Intel Security and Kaspersky Lab, has been growing by leaps and bounds. In addition to raising awareness and keeping tabs on the...
A More Strategic Approach to GRC

A More Strategic Approach to GRC

The Trump administration is already making good on its campaign promise to significantly roll back federal regulations. With change imminent, compliance and risk managers have found themselves in a fast-moving and unpredictable environment. Regulatory reform...
IT Asset Management of Grey Matter

IT Asset Management of Grey Matter

If you’ve already moved all your systems and applications to the cloud, you may feel there is little left for you to manage other than your organisation’s data and your IT department’s skillsets. But how about the behaviours and attitudes of the...
Experts to Residents: Be Weather Aware

Experts to Residents: Be Weather Aware

(TNS) – Oklahomans know tornadoes can be deadly, but we may not always know how to protect ourselves. In 2013, 24 people lost their lives when an EF-5 tornado hit Moore a day after another tornado destroyed multiple homes in east Norman. The risk of severe...
Vendor Risk Management – Where to Start

Vendor Risk Management – Where to Start

Vendor management gets a lot of attention these days, but have you considered the risk associated with your vendors? When was the last time you conducted a vendor-related risk assessment? Is vendor risk management (VRM) even a part of your Business Continuity Program?...
Finding the Sweet Spot for Your Data Center

Finding the Sweet Spot for Your Data Center

There’s certainly no shortage of options for expanding data center capacity these days. You can renovate an existing facility or add a modular unit onsite or offsite, build one from scratch, lease data center space, or move non-critical data and applications off...
10 Ways CDC Gets Ready For Emergencies

10 Ways CDC Gets Ready For Emergencies

Dr. Stephen Redd, Director, Office of Public Health Preparedness and Response One of the best parts of my job is the opportunity to learn from a wide range of experiences. We have an obligation to not only respond to emergencies today, but to prepare for tomorrow by...
Testing Your Business Continuity Plan

Testing Your Business Continuity Plan

If the employees in your organization are spending the time, energy, and resources to develop your business continuity plan, your organization must be ready for any disruption, right? Possibly, but making this assumption isn’t going to help anyone during an...
The Top Risks for 2017

The Top Risks for 2017

North Carolina State University’s ERM Initiative and Protiviti recently completed the latest survey of C-level executives and directors worldwide regarding the macroeconomic, strategic and operational risks their organizations face. The top risks for 2017...
Disaster Recovery and Human Error

Disaster Recovery and Human Error

The title of this blog post could almost have read “Never send a human to do a machine’s job.” While computerisation and automation may seem dehumanising at times, they can reliably and rapidly perform procedures without error, avoiding the mistakes...
Everbridge Launches Proposed Public Offering

Everbridge Launches Proposed Public Offering

BURLINGTON, Mass. – Everbridge, Inc. (NASDAQ:EVBG) today announced that it has launched an underwritten public offering of common stock. Everbridge and certain existing stockholders are offering an aggregate of 3,012,164 shares of common stock, of which 275,000...
Enterprises Earn a ‘C’ Grade in Backup

Enterprises Earn a ‘C’ Grade in Backup

This World Backup Day, businesses have some work to do on the data protection front. After evaluating the results of a survey of 710 internet users, CloudBerry Lab, a provider of file management and cloud backup services for small and midsized businesses, gave...
FEMA: Spring Flood Risk: Are You Ready?

FEMA: Spring Flood Risk: Are You Ready?

CHICAGO – Snowmelt may not be a significant concern this year, but severe storms and heavy spring rainfall could still cause flooding in the months ahead. Now is the time to prepare. Ensure you’re flood insured. A flood insurance policy could protect you...
Build a Better DR Environment

Build a Better DR Environment

No matter the condition of your DR environment, you can make it better. Today’s blog provides ideas on how to improve an environment we hope to never use. We emphasize one overriding principle, possibly the most important consideration in improving your DR...
ECM is Being Revamped, Not Going Extinct

ECM is Being Revamped, Not Going Extinct

Adam Storch, VP of Business Solutions at leading software solutions company, MicroStrategies, expands on the future of ECM and its evolution to ‘Content Services’ Reports show that the Enterprise Content Management (ECM) market is still strong at around...