Thank you for visiting! This site is dedicated to my clients, peers, friends, and others interested in keeping up on some of the articles, news, and trends in continuity management and related professions that have caught my interest.
In preparing for battle I have always found that plans are useless,
but planning is indispensable. – Dwight D. Eisenhower
By Chris Aitken |Technology strategy, issues and trends
Capability modelling has become something of a de facto standard within contemporary Enterprise Architecture practice. Capability-based planning is also a proven tool when it comes to change portfolio management and the development of strategic roadmaps. However, I wonder if we architects aren’t guilty at times of being overzealous in our readiness to label anything that a business does or needs as a ‘business capability’, resulting in capability models that are in reality a mixture of capabilities, services, business functions and processes? Although the concept ‘business function’ might be considered ‘old school’ and only ‘reinforcing siloed architectures’, it becomes crucially important when we want to describe how an enterprise needs to organise itself in order to operate a given business model. Moreover, the term ‘function’ is highly overloaded, meaning different things to different people in different contexts adding to confusion with similar ideas and a lack of precision in its use.
Full Article: Business Function: Does it still belong in Business Architecture?
The recent disclosure of a multi-billion dollar trading loss at JPMorgan Chase reminds us again of the challenge and complexity of risk management, the subject of our June 2012 HBR article, “Managing Risks: A New Framework.” Many people, including quite a few U.S. legislators and regulators, believe that risks can be managed by establishing and following rules, standards and guidelines. But for certain categories of risk, this is a false and dangerous assumption.
Our article classifies risks based on their degree of controllability and their connection to the strategy. We identify and describe three categories of risk: preventable risks, strategy risks, and external (non-preventable) risks. Each requires customized risk management processes.
A rules and compliance-based approach may work well for managing preventable risks, but is inadequate for strategy and external risks as companies that failed during the financial crisis illustrated all too well. The compliance-oriented risk manager of a failed U.K. bank observed that his organization had “a cultural indisposition to challenge” and that the task of “being a risk and compliance manager…felt a bit like being a man in a rowing boat trying to slow down an oil tanker.”
Source: Managing Risks: A New Framework
By Lucian Constantin
Romania Correspondent, IDG News Service | MAR 28, 2017 10:07 AM PT
Developers of the popular LastPass password manager are working to fix a serious vulnerability that could allow malicious websites to steal user passwords or to infect computers with malware.
Source: LastPass is scrambling to fix another serious vulnerability | PCWorld
by Stephen Langley
Centre for Security Failures Studies, UK
‘Crisis Management, Disaster Response, Emergency Management, Business Continuity Management: these are all names for the same process.’ Discuss the validity of this statement, referring to the theoretical models and the literature. Throughout the assignment you should discuss the practical implementation of strategies, plans and procedures.
This question requires the terms ‘crisis management, disaster response, emergency management, and business continuity management’ to be defined and also discuss how they interact and if at all they do. The author believes that Crisis Management, Disaster Response, Emergency Management are all overarched by Business Continuity Management (BCM). This can be demonstrated by the hypothesis that crisis is divided into three events: emergencies, crisis and disaster. These three events are sub-disciplines with the overarching response being dictated by the BCM. This statement is therefore stating that neither of them have any independence but are all internally involved within the newly evolving discipline BCM to which they follow.
MAY 26, 2016 / by SARAH CHILDRESS Senior Digital Reporter, FRONTLINE Enterprise Journalism Group • KATIE WORTH Tow Journalism Fellow, FRONTLINE/Columbia Journalism School Fellowships
Overwhelming scientific evidence shows climate change is leading to rising sea levels and more extreme storms. But you might not know it by looking at the federal government’s flood hazard maps.
The Federal Emergency Management Agency maps flood plains across the country. The maps are intended to show which areas are likely to flood so that local governments can better plan for disasters. They also determine who must buy flood insurance, and at what rates.The problem is, many of them aren’t up to date. And even the latest maps don’t take into account the anticipated effects of climate change, which will dramatically impact the potential for flooding.
In partnership with: NPR
MAY 24, 2016
In the aftermath of a flood, people may be unpleasantly surprised to find that their home insurance doesn’t cover the damage caused by rising storm waters. It hasn’t since insurance companies decided that floods were too risky to cover.
A combination of common sense, backup, proactive protection, and automated removal tools is a solid defense against the growing scourge of ransomware.
By Mark Hachman
Senior Editor, PCWorld | MAR 13, 2017 3:30 AM PT
Ransomware doesn’t sneak into your PC like ordinary malware. It bursts in, points a gun at your data, and screams for cash—or else. And if you don’t learn to defend yourself, it could happen again and again.
Armed gangs of digital thieves roaming the information superhighway sounds like an overwrought action movie, but the numbers say it’s true: Ransomware attacks rose from 3.8 million in 2015 to 638 million in 2016, an increase of 167 times year over year, according to Sonicwall—even as the number of malware attacks declined. Why steal data when you can simply demand cash?
MIT Technology Review
Mike Orcutt March 3, 2017
A new report starts to quantify the effect that popular encryption products have on law enforcement.
Tue Feb 28, 2017 | 7:23 PM EST
(Reuters) – Web users experienced widespread glitches on Tuesday, from news sites to government services, after Amazon.com Inc’s popular cloud service that hosts their data suffered a technical disruption.