article thumbnail

IT leaders rethink the people part of business continuity

CIO Business Intelligence

And my experience has been that well-run companies have a culture of doing this because it’s the right thing to do,” says Juan Orlandini, chief architect and distinguished engineer at Insight Enterprises, a tech services provider. Like others, Orlandini does not consider the topic as entirely new; it fits with business continuity planning.

article thumbnail

Business continuity planning: A proactive approach to threat management

CIO Business Intelligence

Events like this highlight the importance of developing contingency plans based on events in the world that can impact businesses. Business continuity is an essential part of the planning process for CIOs and CTOs. Black swan events can impact businesses in significant ways. Emphasize written over verbal communication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ControlMonkey aims to bring order to cloud disaster recovery chaos

Network World

ControlMonkey is in the business of helping to improve cloud automation. Part of SOC 2 and ISO 27001 talk about having disaster recovery and business continuity plans, Twizer noted. Thats a question that cloud infrastructure automation startup ControlMonkey is helping enterprises to help answer.

article thumbnail

Are Your Firewalls and VPNs the Weakest Link in Your Security Stack?

Network World

Cybersecurity has become a boardroom priority with far-reaching implications for business continuity and reputation. It requires a new mindset that acknowledges the decentralized nature of our digital world and emphasizes continuous verification and adaptation for security.

Firewall 396
article thumbnail

Transforming distribution: How Ingram Micro is becoming a platform business

CIO Business Intelligence

These data and models then feed into intelligent headless engines, which use microservices to drive business logic both synchronously and asynchronously. We do this because we want our engineers to understand how their work creates value. This is crucial in a value-driven development model.

CTO Hire 290
article thumbnail

How cybersecurity red teams can boost backup protections

Network World

Some common approaches include: Social engineering: Red teams often employ social engineering techniques to exploit human vulnerabilities. Securing backup systems: Backup systems are critical for disaster recovery and business continuity. Red teams demonstrate the ease with which these vulnerabilities can be exploited.

Backup 475
article thumbnail

Redefining enterprise transformation in the age of intelligent ecosystems

CIO Business Intelligence

What we consistently overlooked were the direct and indirect consequences of disruption to business continuity, the challenges of acquisitions and divestitures, the demands of integration and interoperability for large enterprises and, most of all, the unimpressive track record for most enterprise transformation efforts.