As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.






Please reset your password to access the new DRJ.com
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In
   

Create new account
(it's completely free). Subscribe

Reinventing Financial Compliance

Reinventing Financial Compliance

Reducing Cost and Complexity, Increasing Accuracy and Reliability   As we mark the 10-year anniversary of the 2008 banking crisis – considered by many to be the country’s worst financial crisis since the Great Depression — the issue of financial...
Writing the future on World Cities Day

Writing the future on World Cities Day

Urbanization is alive and growing: our cities are tipped to house an additional 2.4 billion people over the next 30 years). “Building Sustainable and Resilient Cities” is the theme of this year’s United Nations World Cities Day, and...
Advance Preparation For An OCR HIPAA Audit

Advance Preparation For An OCR HIPAA Audit

8 Tips to Implement Now Shane Whitlatch, EVP at FairWarning, outlines the key controls companies should have in place to quickly and confidently respond to an OCR audit should they be selected. The best time to prepare for an audit is before you’re in one....
DRJ Fall 2018 Q&A

DRJ Fall 2018 Q&A

  1. Can you provide real world examples of ransomware policies? What recommendations can you offer companies to develop an effective policy? [ZEESHAN KAZMI] Have a very solid backup policy and make it part of your BC requirements right after life safety and...
3 Ways To Leverage Predictive Analytics

3 Ways To Leverage Predictive Analytics

Using Analytics to Gain a Competitive Edge   Predictive analytics is quickly changing the way businesses effectively allocate their budgets and gain their edge over competitors. However, even companies with highly sophisticated predictive analytics programs still...
EOC: We’re in Recovery Mode

EOC: We’re in Recovery Mode

(TNS) – Now that the most damaging aspects of the storm has passed, local emergency management officials are in recovery mode.”Before things happened, we already had a process in place,” said acting Emergency Management Director and Incident...
Deciding on Blockchain

Deciding on Blockchain

You may remember my last blog article about blockchain, I talked about how business continuity and disaster recovery will benefit from the use of blockchain technology. Now we ask, “How should businesses identify if blockchain is a good tool for the...
The Holy Grail of Innovation Management

The Holy Grail of Innovation Management

Growth. It’s what CEOs are after. Sometimes it’s straightforward. Other times growth requires a company to move into new or unfamiliar areas. How can a company do this? Many have internal units or programs dedicated to driving breakthrough innovation. But,...
XRS Embraces New Data Protection Law

XRS Embraces New Data Protection Law

Earlier this summer the GDPR, or General Data Protection Regulation, superseded the European Data Protection Directive (EDPD) to become the new keystone of data protection in Europe. Its broader scope includes consumer information from personal identifiers such...
Is Your Company Prepared For The Worst?

Is Your Company Prepared For The Worst?

Why Business Continuity Must Be Part of Your Strategy Carrying insurance, having a plan, limiting liability… these are all important steps to minimize risk associated with a disruptive event. But without a dynamic business continuity management program, brand...
HURRICANE MICHAEL’S TRAIL OF DESTRUCTION

HURRICANE MICHAEL’S TRAIL OF DESTRUCTION

Our guest blogger, Lynne McChristian, is an I.I.I. representative based in Tallahassee, about 100 miles from where Hurricane Michael came to shore.  By Lynne McChristian After a major natural disaster, there are various levels of survivor conditions –...
HOW TO PREPARE YOUR BUSINESS FOR WINTER

HOW TO PREPARE YOUR BUSINESS FOR WINTER

4 Steps to Prepare Your Business for Winter Winter may conjure up imagery suitable for a Norman Rockwell painting: sitting by the fire with a hot drink in hand, enjoying the twinkling lights and decorations, and watching through the window as snowflakes drift lazily...
Cloud Storage Pros and Cons

Cloud Storage Pros and Cons

Download the authoritative guide: Enterprise Data Storage 2018: Optimizing Your Storage Infrastructure The pros and cons of cloud storage are, to be sure, debated with great enthusiasm. For every advocate of public cloud storage, there appears to be a...
New Data Privacy Survey from CompliancePoint Shows 90% of U.S. Businesses Report Leveraging Consumers Personal Information, 76% of Consumers Report Little to No Knowledge of How their Information is Being Used

New Data Privacy Survey from CompliancePoint Shows 90% of U.S. Businesses Report Leveraging Consumers Personal Information, 76% of Consumers Report Little to No Knowledge of How their Information is Being Used

DULUTH, Ga. – CompliancePoint, an information security and risk management consultancy, released today the results of its latest data privacy survey, revealing consumer preferences to data collection and how businesses leverage the use of their data. The results...
Dump The Toxic Culture

Dump The Toxic Culture

Making Your Workplace a Harassment-Free Zone Too many workplaces have allowed sexual harassment to continue unchecked for years. In some cases, company executives have been the worst perpetrators of these toxic cultures. Companies that fail to take notice and make...
HURRICANE MICHAEL: DOS AND DON’TS

HURRICANE MICHAEL: DOS AND DON’TS

If you live in the projected path of Hurricane Michael, you should be prepping your home and finalizing your emergency and evacuation plans. The storm has grown to Category 2 – and there are concerns that it’ll be a...
Beyond Anti-Harassment Training

Beyond Anti-Harassment Training

A Holistic Approach to Addressing Harassment   As cultural movements continue to raise awareness about misconduct, compliance and ethics programs are putting more power behind training their employees on how to identify and report harassment in the workplace....
Step One

Step One

Organizations often make a false assumption as they approach the start of a Business Impact Analysis (BIA) or recovery plan building: they assume that staff members can define the business processes that they are engaged in as part of normal operations.  The...
Prepping for Hurricane Michael’s wrath

Prepping for Hurricane Michael’s wrath

Interstate Restoration assembling resources in north Florida area FORT WORTH, Texas – in preparation for the onslaught of Hurricane Michael, Interstate Restoration has begun to add critical resources in the north Florida area. The storm is due to hit...
Baron Telematics for Public Safety

Baron Telematics for Public Safety

Easily Implemented Data enables organizations to better protect their people HUNTSVILLE, Ala. – Baron, the worldwide provider of critical weather intelligence, announces Telematics for Public Safety, a technology that uses accurate, patented technology to aid...
A Holistic Approach to Addressing Harassment

A Holistic Approach to Addressing Harassment

As cultural movements continue to raise awareness about misconduct, compliance and ethics programs are putting more power behind training their employees on how to identify and report harassment in the workplace. Despite this increased emphasis, less than half of...
Redefining the definition of operational risk

Redefining the definition of operational risk

Adesh Rampat explains why he believes that the definition of operational risk needs updating to take into account the development of cyber security related risks, and including aspects of internal controls and user awareness. The definition of operational risk varies...
Mitigating Data Risk In M&A Transactions

Mitigating Data Risk In M&A Transactions

What to Do When a Deal Falls Apart What happens after a planned deal falls apart? In the process of seeking approval, a wealth of sensitive company information is transferred between entities – from financials to intellectual property. This article explores how...
FEMA: Continuity Resource Toolkit

FEMA: Continuity Resource Toolkit

This Continuity Resource Toolkit is designed to provide additional tools, templates, and resources to assist in implementing the concepts found within the Continuity Guidance Circular. Each section of the Toolkit aligns to the chapters of the CGC. FEMA will...
PEOPLE GET HACKED. INSURANCE CAN HELP

PEOPLE GET HACKED. INSURANCE CAN HELP

It’s October – and that means it’s National Cybersecurity Awareness Month. The National Cyber Security Alliance has dedicated the first week to making homes safe from hacking. And for good reason. Families are increasingly living connected...
Why Process Management Is A Boardroom Issue

Why Process Management Is A Boardroom Issue

The Impact of BPM on Organizations Regulations and compliance are some of the most important topics of discussion in the marketplace today, yet dozens of companies are hit with fines simply because they are unable to prove they are in compliance. Business process...
Disaster Recovery as a Service Comes of Age

Disaster Recovery as a Service Comes of Age

Disaster Recovery as a Service (DRaaS) is no longer an unproven new idea with a lot of question marks attached. It is now all grown up and has a lot to offer almost all organizations that have data to protect, no matter how much use they are making of the cloud...
Aligning BC/DR to CSIRP Challenges

Aligning BC/DR to CSIRP Challenges

The immediate reaction to a cyber-security incident is the FUD factor (Fear, Uncertainty and Doubt); more like ‘chickens running around with their head cut off’. An agile response requires tested and documented Incident Response Plans – including...
The death of the micromanager

The death of the micromanager

Micromanagement muzzles motivation and poisons productivity, says Matthew Jenkin. There are better ways of engaging employees, and it starts with trust… Before Apple co-founder Steve Jobs led a tech revolution, he was a notorious micromanager. His inability to...
Is your data safe in a co‑working space?

Is your data safe in a co‑working space?

Data breaches and cyberattacks are an increasing threat to businesses, but flexible working offers some surprising advantages to keeping data safe on the move   Has your business been compromised by a data breach? If you answered no, you’re one of the lucky...
Cisco Completes Acquisition of Duo Security

Cisco Completes Acquisition of Duo Security

SAN JOSE, Calif. – Cisco (NASDAQ: CSCO) today announced it has completed the acquisition of Duo Security, a privately-held company headquartered in Ann Arbor, Michigan. Duo is the leading provider of unified access security and multi-factor authentication...