Headline
[25 Oct 2013 | Comments Off | 1,368 views]
Why is Crisis Mapping so Popular?

Article by Brandon Greenberg
Published October 25, 2013
I was recently asked this question by a colleague. I didn’t have a full answer at the ready, so I thought about it some more.
Crisis mapping is usually conducted with the aim of producing “maps” that have key geographic data relevant to a response. According to Wikipedia,
“Crisis mapping is the real-time gathering, display and analysis of data during a crisis, usually a natural disaster or social/political conflict (violence, elections, etc.).”
So why is crisis mapping so popular?To understand the popularity, we have to look at when “mapping” was first …

Read the full story »
Browse Categories

Uncategorized »

[25 Oct 2013 | Comments Off | 1,368 views]
Why is Crisis Mapping so Popular?

Article by Brandon Greenberg
Published October 25, 2013
I was recently asked this question by a colleague. I didn’t have a full answer at the ready, so I thought about it some more.
Crisis mapping is usually conducted with the aim of producing “maps” that have key geographic data relevant to a response. According to Wikipedia,
“Crisis mapping is the real-time gathering, display and analysis of data during a crisis, usually a natural disaster or social/political conflict (violence, elections, etc.).”
So why is crisis mapping so popular?To understand the popularity, we have to look at when “mapping” was first …

Uncategorized »

[25 Apr 2013 | Comments Off | 3,025 views]
White House Threatens to Veto House Cybersecurity Bill

Article by Homeland Security News Wire
Published April 17, 2013
 
The White House on Tuesday threatened to veto the cybersecurity bill drafted by the House of Representatives. The house is expected to vote on the bill later this week. The cybersecurity bill died in the Senate last August after the White House said it would veto the bill.

The White House on Tuesday threatened to veto the cybersecurity bill drafted by the House of Representatives. The house is expected to vote on the bill later this week. The cybersecurity bill died in the Senate last …

Uncategorized »

[25 Apr 2013 | Comments Off | 18,873 views]
DHS Formula Grants to States Drop Dramatically

Article by Homeland Security News Wire
Published April 17, 2013

 

DHS allocation of money to states for first response and disaster recovery has dropped significantly. DHS formula grant program was at an all-time high of $2 billion in 2003, but last year the program had only $294 million. As a result of the sequester, another 5 percent will be cut from the program.

In the last few years the money DHS has allocated to states  to purchase equipment and develop  first response and disaster recovery plans has dropped off significantly.
The Herald.net reports that federal grant spending on state and local homeland security …

Uncategorized »

[24 Apr 2013 | Comments Off | 3,393 views]
Guidelines for Securing Business Records in Hurricane Season

Article by Homeland Security News Wire
Published on June 12, 2012
 
A data protection specialist developed best practices guidelines to assist businesses along the Atlantic coastline to assess their business continuity in preparation for the hurricane season

Recall, a data protection specialist, the other day issued records information management (RIM) best practices guidelines. Recall says that as hurricane season begins, the company developed these guidelines to assist businesses along the Atlantic coastline to assess their business continuity in preparation for the hurricane season. Recall has experience in managing business records in more than …

Uncategorized »

[1 Mar 2013 | Comments Off | 3,647 views]
Conducting Business Impact Analysis for Business Continuity Planning

By: Ron French, CBCP
March 1, 2013
 
Business Impact Analysis (BIA) Objective

The objective of the BIA for any business continuity plan is to itemize and prioritize a company’s most critical business operations, internal resources, and internal and external support dependencies.  Part of this process is the identification of the recovery time objectives for each of the mission critical functions.
What should be avoided in the BIA is any itemized listing of detailed business processes, work procedures, and resources that are of no consequence to the critical overall enterprise functions.  A clear distinction should …