8 Important People to Connect with During a Major IT Incident

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Next

Business Continuity Management

Business continuity management doesn’t have to be involved for every event, but more companies are turning large and prolonged incidents over to BCM for rapid deployment of resources and overall incident management while IT restores service and resolves issues. A 2014 Ponemon Institute study shows that a major retailer decreased the cost of a data breach by $13 per compromised record by involving BCM.

Major IT incidents and business disruptions occur at every company. When they do, specialized procedures kick in to restore service as quickly as possible. The IT service desk initiates IT’s response by alerting major incident managers, who assemble a major incident resolution team and get to work.

But restoration and resolution are only the tip of the major incident communication iceberg. Really effective major incident communication reaches out to a host of other people inside and outside the organization to share information, receive help, keep people up to date and prevent further interruptions.

In this slideshow, Abbas Haider Ali, CTO, xMatters, Inc., outlines eight important people to connect with outside the resolution process.

Abbas Haider Ali brings over 15 years of experience in networking, cloud-based services and multi-modal communications. As CTO of xMatters, he’s responsible for evangelizing the adoption of communications-enabled business processes, and has worked closely with more than 400 global IT organizations to create a vision for adopting intelligent communication strategies across business scenarios.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

infra97-290x195 7 Tips to Improve Data Backup and Ensure Business Continuity

With today's modern solutions, enterprises should be able to transform backup and recovery from a low-level legacy IT function to a modern function delivering continuity and value to the entire business. ...  More >>

NETSCOUTShadowIT0x 6 Tips for Combating Shadow IT Once and for All

To mitigate the risks of shadow IT, organizations must demonstrate the necessary agility and high quality of complex service assurance that users are looking for. ...  More >>

IT_Man85-290x195 Business in the Front, Balance All Around: Working with Gen Z

In order to attract Gen Z talent, employers will need to take into account that this group of the workforce may expect a different set of benefits. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.