Key Drivers Radically Transforming Business Continuity Management

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Key Drivers Radically Transforming Business Continuity Management-6 Next

Integrate BCM with business resilience risk management, security, incident management, and crisis management in order to gain greater context around risk.

In the context of BCM, business resilience risk management, security, incident management, and crisis management all share a similar objective: to maintain the continuity of the business and business critical processes.

Advanced warning signals and systems can help organizations predict a disaster and its likely impact, rather than just react to it once it occurs. By trending various internal and external sources of data, organizations can get clues that help identify early warning signs, and accelerate planning efforts. Risk matrices and risk heat maps can create a clear picture of the data in order to develop meaningful insights and observations and identify the best response strategies. Integrating these end-to-end processes through a federated governance, risk and compliance (GRC) platform can help the organization achieve a near-real time picture. Integrating various efforts within a common GRC platform can also help support the creation of a common and shared risk and control framework, and uniform nomenclature and taxonomy for communicating risks, their likelihood, and impact.

Ingenious. Innovative. Intuitive. Complex. These are a few of the words one might use to describe today's technology landscape. No doubt the last decade – and the last year - has ushered in some of the most advanced and awe-inducing technological feats – from apps, to robots, to delivery drones. Visionary men and women around the globe are leading us bravely into an entirely new technologically advanced world. But as the multitude of devices, advanced systems, and enterprise networks grow in size, scope, and complexity, the potential impact of natural and man-made disasters on individuals and organizations also grows exponentially. Effective disaster recovery planning is increasingly leveraging advanced technologies in a way that supports, strengthens, and streamlines the various processes, policies, and procedures needed to maintain business critical functions following a disruptive event.

In early November 2013, Typhoon Haiyan made landfall, ripping through the Philippines, killing thousands of people, displacing hundreds of thousands of others, and causing billions of dollars in damage. Over the last decade, natural disasters – from Hurricane Katrina, the Japan tsunami and earthquake, the Haiti earthquake – have all occurred with alarming frequency and increasing impact. Typhoon Haiyan is no longer considered the exception. It is not an anomaly, and we can expect to see more disasters of this size, scale, and magnitude in the future.

Overcoming the challenges of today while preparing for tomorrow requires that organizations focus their efforts and resources on three critical areas that will transform business continuity management (BCM) in 2014; gaining a 360-degree view of the interconnected and hyper-extended enterprise and supply chain, reducing time and tolerances for outages, and establishing an integrated BCM, business resilience risk management, security, incident management, and crisis management program.

In this slideshow, Yo Delmar, vice president, GRC Solutions, MetricStream, takes a closer look at the factors that are transforming business continuity management.


Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

More Slideshows

gig economy How the Gig Economy Is Changing the Tech Industry

The gig economy is clearly disrupting the tech industry, both in positive and negative ways. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.