Business Continuity Implementation: An Overview of BCI Professional Practice 5

BCI_GPGs_SeriesThis perspective provides an overview of the Business Continuity Institute’s Professional Practice 5 (PP5) – Implementation, which is the professional practice that “executes the agreed strategies and tactics through the process of developing the Business Continuity Plan (BCP)”. As part of the business continuity planning lifecycle, Implementation activities continue following strategy selection in PP4, with the goal of documenting business continuity plans that aid the organization in recovery at the strategic, tactical, and operational levels. Continue reading

Continuity Insights Management Conference 2016

CIMC 2016

The 2016 Continuity Insights Management Conference is taking place April 18-20, 2016 at Gaylord Opryland Resort & Convention Center in Nashville, TN. We’re looking forward to another wonderful show!

We have a lot planned during CIMC 2016, and we hope you’ll join us:

Please take a look below for more details on each. We look forward to seeing you soon!

Continue reading

Business Continuity Plans: Resource Loss-based vs Scenario-based

Resource LossFor some reason, bad ideas often attempt to make a comeback – typically, after enough time has passed and the very reason they were discarded or abandoned in the first place is forgotten.

Bad ideas certainly are not exclusive to popular culture; in fact, articles and case studies litter the internet documenting both public and private organizations attempting to resurrect failed models and strategies in hopes that new capabilities or use cases will finally make a particular idea just as good in practice as it was in theory or on paper.

In the wake of several high-profile, unpredictable, catastrophic incidents (“Black Swan Events”) in 2012, Avalution received a number of requests to develop highly-specific, scenario-based plans from our clients. Planning for Every Scenario is “For the Birds” explains that Black Swan Events cannot be predicted, and advises that organizations that implement flexible strategies, applicable in almost any type of scenario to manage response and recovery, enjoy the highest levels of success when faced with a disruptive incident.

However, the demand for scenario-based plans seems to be back.

We understand why organizations may think scenario-based plans are a good idea; however, their appropriateness, utility, and long-term value is limited – much like line dances, vampire romance movies, and mullets.

Instead, in this perspective we’re going to use a case study to make the argument for a resource loss-based plan development approach. Continue reading

Disaster Recovery Journal Spring World 2016

DRJ Spring World 2016

Disaster Recovery Journal Spring World 2016 is taking place March 13-16, 2016 at Disney’s Coronado Spring Resort in Orlando, FL. We’re looking forward to another amazing show with numerous educational sessions and awesome people!

We have a lot planned during DRJ Spring World, and we hope you’ll join us:

Please take a look below for more details. We look forward to seeing you soon! Continue reading

Effective Business Continuity: Program vs Plan

TJMany organizations think that effective business continuity planning is synonymous with great plan documentation.

It’s not.

Yes, plan documentation is extremely important. BUT… many organizations fail to recognize that effective business continuity plans – and truly prepared and resilient organizations – are the result of a larger business continuity planning lifecycle that begins with requirements setting and ends with practice (and of course, the process recycles on a continuous basis).

Bottom line – plans are just one key ingredient in the development of an effective business continuity program.

This perspective provides an outline for what Avalution promotes as effective business continuity planning. Please explore the links provided within this document for more in-depth explanations of each step of the planning process. Continue reading

Risky Business (Part 3): A Supply Chain Continuity Case Study

Risky Business - Supply ChainMuda. It’s the Japanese word for waste and the enemy in modern supply chain management and manufacturing. Since the 1980s, lean thinking has revolutionized the way businesses operate by seeking to eliminate muda and free capital held in wasteful assets—that is, assets that do not add value to the overall process (e.g. excess inventory or underutilized equipment). Lean thinking is important and helps businesses to improve their processes and their bottom lines. It does however beg one key question that risk managers and business continuity professionals must ask: “how lean is too lean?” Wantonly cutting out all perceived muda to save money can actually have the opposite effect down the road. Organizations with global supply chains inherit significant risk due to the potential impact associated with a supply chain disruption.  In some cases, a disruption could threaten an organization’s ability to continue business or require large amounts of capital to recover. Organizations must fully examine their processes and supply chains to identify risk and make informed decisions on how lean is too lean.

This perspective—the third in the Risky Business Series—leverages a case study of the recent west coast dock worker strike to demonstrate the inherit risk of a supply chain that is too lean due to a virtual monopoly. This article also revisits evaluation and mitigation strategies from the first two Risky Business perspectives that organizations can use to reduce risk to an acceptable level. Continue reading

What is the MovieStarPlanet video game?

MovieStarPlanet is definitely comfortably becoming a chart topper upon every one of the cellular gaming packages. In the last few months, our group packages gotten countless requests taken from persons moviestarplanet hack upon our some other sites to build a young helpful MSP Hack for this scorching wash game. Our group failed to go wrong to provide either. Setting up the most health problem of an art online hack deployment diagnosis in the market, persons be capable of comfortably and then comfortably mod their finance through the game. You need not give all of us and at any private information to try and do it either. In fact, i give some of the most thrilling safety strategies on which bear you plus your standing up all together anonymous largely. Take benefit of one of the best suggestions to hack MovieStarPlanet online all together at this point. When you can follow much of, easy steps, i can get you began right away. Our involvement calls for you taken from our webpage in favour of game in just a few momemts. The challenge upon that you insert upgrades is incredibly soft, i even have insert strategies that are super easy to look at. There is absolutely no nice design suffer with critical so as to take steps our unit, we’ve shaped a really friendly user interface on which simplifies the challenge to try and its own optimal. If you follow every one of the strategies all together you should be able to total in just a few momemts length of time. MovieStarPlanet is definitely comfortably gaining among typically the most popular wash releases through the cellular gaming marketplace. Through the game, your purpose is definitely simple: act as typically the most popular superstar. And at YouTube interactions, and then a dynamic online community featuring that an in-game talk framework, it’s simple to observe how the particular game would take the marketplace all by the storyplot. The biggest offering step 4 our group presented ever since checks apart their hacks and then using MovieStarPlanet was the potential seemingly endless degree of customization the potential game made possible as the user’s avatar progresses through the game. The biggest calls for taken from our persons were that will aid them have reached these figures more speedily than the game made possible for. Virtually all obtained grown tired to accomplish repetitive tasks time and time again to attempt to set in. That it merely kills the potential fun through the game. And not everything that, then they desired an instrument including the an individual we’ve for our webpage. How it works

Our bits and pieces are currently organized online, as such there is absolutely no guessing game in what is definitely or has not been safe and sound to try and download. Our group expected that all virtually all online persons should be able to try and avoid using needing to download anything they can proceed lacking in on the cellular unit. Upon optimal, making an effort excess applications and then producers should be able to wipe out your battery, and at most severe, this program how i integrate an infection horses and then spyware that’s going to nonetheless your private information optimal apart your unit. There’s also sites that’s going to call on persons due to their in-game login touches, their google concern, and then iTunes touches, and then outside of. Upon Msphacked. Com, and not undergoing everything that, our hack unit continues to be anonymous, is definitely free to consider, and then calls for non private information at all. Persons merely hop upon, consider our unit, and then return to the potential game. Our encrypted servers bear most of your information safe and sound. I bear optimal of an collections safety upon our webpage, as such persons don’t need to be worried about it. Advances

Our wash MSP Hack exists and then largely told, having them simple to consider. In conjunction with its own outstanding uptime and then achievement price, i have also added quite a few wash capabilities alike. The minute setting up MSPHacked, i concern that it was important to generate our user’s personal privacy and of course safety helpful. Contrary to many other bits and pieces that you need to notice online, our producers packages included several different much of capabilities that all allow you to suffer with safe and sound when using our framework. We’ve added thrilling additions which include proxy producers. Pick between your tens of thousands of much of dedicated proxies that you need to consider to safeguard your space upon the net! our proxies are currently very own as such there is absolutely no way for the potential game to try and detect which the true space, or that you will be soft creating a proxy to begin with. Safety

In conjunction with soft proxy producers, the potential group packages decided to proceed to the next soft within this safety capabilities. For this i decided to insert our very own VPN in favour of hack unit. You can now select a specific server to get to our online generator that all calls for the full personal privacy technique to its own optimal degree of safety. There were non banns so far within this unit and then i hope to bear that it that all technique. Return to using the potential game the way you play and not needing to pay to play! we are here to assist you act as the leading participant that you will be and of course save that all next to impossible gotten money. Neglect to waste materials your potential and then get the leading with the hottest wash game of the entire year. MSPHacked should be able to finally allow you to enjoy the game so how it’s truly intended to act as.

Leading Response and Recovery Teams (Part 3)

LeadershipThis perspective is the third in a three-part series that addresses how to develop the skills necessary for being a successful leader in a crisis, including how a team leader can set the team’s purpose and bring order to the chaos that ensues following the onset of a disruptive event.  These two foundational team leader behaviors will help response and recovery team leaders elicit the best possible performance of the team (as well as themselves).

In Part 1 and Part 2 of this series, we addressed the role of the team leader, which is to create a team vision and purpose, as well as the team leader’s responsibility to manage the chaos associated with a disruptive event.  In this perspective, Part 3, we review the team leader’s role in ensuring the team remains adaptable in a changing environment and how the team leader can work to pull these key factors together. Continue reading

Business Continuity Strategy Design: An Overview of BCI Professional Practice 4

BCI_GPGs_SeriesThis article provides an overview of Professional Practice 4 (PP4) – Design, which is the professional practice that “identifies and selects appropriate strategies and tactics to determine how continuity and recovery from disruption will be achieved”. Strategy design activities are essential to translate outputs gathered during the analysis phase into actionable strategies that the organization can implement and refine over time to improve the ability to respond and recover from a disruption. Continue reading

Standard Operating Procedures: Program Documentation That Helps Drive Repeatable Results

SOPDesigning a governance structure and describing its intended performance in the form of program documentation is the first step to ensure your business continuity program produces repeatable results that align to stakeholder expectations.

According to the Business Continuity Institute’s Good Practice Guidelines’ first professional practice, governance provides the foundation for a repeatable and scalable business continuity program.

But what exactly is “governance”? Governance is typically the combination of documented policies and procedures, supported by senior/executive-level management, that define the scope, objectives, approaches, and outcomes associated with a business continuity program. Continue reading