Active Assailant Exercise Design Series – Part One

You have heard of “active shooter”; this series will focus on an “active assailant,” which is a person (or group of persons) actively engaged in killing or attempting to kill or cause serious bodily injury to a person or group of persons. The weapon could be a gun or it could be something else, such […]


Plans & Exercises to Build a Timely Communications Response

When asked what areas need to be improved after any disaster, inevitably companies will often list “communications” as one of the most important areas for improvement. “Communications” is, of course, a broad topic, however, there is one comment that is probably heard more than any others: “Communications need to be more timely.”   Is that […]


Guest Blog Series – Trends in Business Continuity: Recapping 2015 and Looking Ahead

In my upcoming webinar, “Trends in Business Continuity: Recapping 2015 and Looking Ahead,” on January 27th, I will take a moment to look back at 2015 on the types of challenges that the continuity field experienced, and then gaze forward, contemplating what might be next. Once we know what we might likely face, I’ll explore […]


Crisis Emergencies Vs. Routine Emergencies, Do You Know How to Handle These?

  Just a few years ago, a cyber-security event, information security incident, or data breach seemed like a “one off,” something many IT professionals wouldn’t have to experience first-hand. Fast-forward to today and it seems like these incidents have turned into “a breach-a-day.” In fact, 70 percent of organizations report having been compromised by a […]