After years of working with the traditional practices of business continuity (BC) – in project management, higher education, contingency planning, and disaster recovery – David Lindstedt and Mark Armour identified unworkable areas in many core practices of traditional BC. To address these issues, they created nine Adaptive BC principles, the foundation of this book:
Adaptive Business Continuity: A New Approach uses the analogy of rebuilding a house. After the initial design, the first step is to identify and remove all the things not needed in the new house. Thus, the first chapter is “Demolition” – not to get rid of the entire BC enterprise, but to remove certain BC activities and products to provide the space to install something new. The stages continue through foundation, framework, and finishing. Finally, the last chapter is “Dwelling,” permitting you a glimpse of what it might be like to live in this new home that has been created.
Through a wealth of examples, diagrams, and real-world case studies, Lindstedt and Armour show you how you can execute the Adaptive BC framework in your own organization. You will:
David Lindstedt has more than 15 years of experience in project management, higher education, and business continuity. He has taught courses for Norwich University, The Ohio State University, and Tulane University. He is the founder of Readiness Analytics, a company that offers The Readiness TestTM, Household Continuity assessment, and an Adaptive Business Continuity tool. Dr. Lindstedt also serves as the Director of Program Management with the Office of Distance Education and eLearning at The Ohio State University, inspiring innovative instruction through emerging technologies. From 2005 to 2012, he directed Ohio State’s Enterprise Continuity Management Program, partnering with over 200 units to protect services such as centralized purchasing, childcare centers, information technology, steam generation, and even a hotel. David earned his Bachelor of Arts degree in philosophy, with minors in psychology and political science, from Valparaiso University and received his MA and PhD degrees in philosophy from Tulane University in New Orleans. He is a Certified Business Continuity Professional (CBCP) with DRI International and a Certified Project Management Professional (PMP) with Project Management International. David serves on the Editorial Board and is a frequent contributor to the Journal of Business Continuity & Emergency Planning. Dr. Lindstedt has published in international journals and presented at numerous international conferences.
Mark Armour is currently the Director of Global Business Continuity for Brink’s Inc., a worldwide secure logistics provider, where he leads the company’s Business Continuity, Disaster Recovery and Crisis Management programs. He has nearly 15 years of experience in the business continuity profession, much of that time spent leading programs and efforts for Fortune 500 companies. He has also managed the corporate response effort to dozens of events, including Hurricanes Katrina and Ike, Superstorm Sandy, wildfires in California and Canada, as well as numerous floods throughout the continental US. Mark is a Certified Business Continuity Professional (CBCP) through DRI International. He is also President of the North Texas Chapter of the Association of Contingency Planners and a member of BC Management’s International Benchmarking Advisory Board. Mark has been published in the Journal of Business Continuity & Emergency Planning and presented at numerous international conferences.
Kristen Noakes-Fry, ABCI, is Executive Editor at Rothstein Publishing. Previously, she was a Research Director, Information Security and Risk Group, for Gartner, Inc.; Associate Editor at Datapro (McGraw- Hill); and Associate Professor of English at Atlantic Cape College in New Jersey. She holds an M.A. from New York University and a B.A. from Russell Sage College.
In their careers, the authors, Brian Allen and Rachelle Loyear, have been instrumental in successfully reorganizing the way security is handled in major corporations. In this ground-breaking book, the authors begin by defining Enterprise Security Risk Management (ESRM):
“Enterprise security risk management is the application of fundamental risk principles to manage all security risks − whether information, cyber, physical security, asset management, or business continuity − in a comprehensive, holistic, all-encompassing approach.”
In the face of a continually evolving and increasingly risky global security landscape, this book takes you through the steps of putting ESRM into practice enterprise-wide, and helps you to:Differentiate between traditional, task-based management and strategic, risk-based management. See how adopting ESRM can lead to a more successful security program overall and enhance your own career. . Prepare your security organization to adopt an ESRM methodology. . Analyze and communicate risks and their root causes to all appropriate parties. . Identify what elements are necessary for long-term success of your ESRM program. . Ensure the proper governance of the security function in your enterprise. . Explain the value of security and ESRM to executives using useful metrics and reports. .
Throughout the book, the authors provide a wealth of real-world case studies from a wide range of businesses and industries to help you overcome any blocks to acceptance as you design and roll out a new ESRM-based security program for your own workplace.
Your challenge is to maintain a good and effective plan in the face of changing circumstances and limited budgets. If your situation is like that in most companies, you really cannot depend on the results of last year’s test or exercise of the plan. People tend to forget, lose confidence, lose interest, or even be replaced by other people who were not involved in your original planning. Jim Burtles explains:
“You cannot have any real confidence in your plans and procedures until they have been fully tested...Exercises are the only way we can be sure that the people will be able to interpret the plans and procedures correctly within the requisite timeframe under difficult circumstances.”
As you do your job in this constantly shifting context, Jim Burtles helps you to: • Differentiate between an “exercise” and a “test” – and see the value of each in your BC program. • Understand the different types of plans and identify the people who need to be involved in exercises and tests for each. • Use the “Five-Stage Growth Path” – from desktop to walkthrough to full-scale exercise -- to conduct gradual testing, educate personnel, foster capability, and build confidence. • Create a variety of unusual scenario plot-lines that will keep up everyone’s interest. • Identify the eight main elements in developing and delivering a successful BC exercise. • Select and prepare a “delivery team” and a “response team” for your exercise. • Make sure everyone understands the “rules of engagement.” • Use the lessons learned from exercises and tests to audit, update, and maintain the plan.
You are well aware that a host of problems may crop up in any kind of company-wide project. These problems can range from basic logistics like time and place, to non-support from executives and managers, to absenteeism, to the weather, to participants forgetting their lines. Throughout the book, Burtles uses his decades of experience working with companies like yours to give you useful examples, case studies, and down-to-earth advice to help you handle the unexpected and work toward the results you are looking for.
Over 30+ years, Tari Schreider has designed and implemented cybersecurity programs throughout the world, helping hundreds of companies like yours. Building on that experience, he has created a clear roadmap that will allow the process to go more smoothly for you. Building Effective Cybersecurity Programs: A Security Manager’s Handbook is organized around the six main steps on the roadmap that will put your cybersecurity program in place:Design a Cybersecurity ProgramEstablish a Foundation of GovernanceBuild a Threat, Vulnerability Detection, and Intelligence CapabilityBuild a Cyber Risk Management CapabilityImplement a Defense-in-Depth StrategyApply Service Management to Cybersecurity Programs
Because Schreider has researched and analyzed over 150 cybersecurity architectures, frameworks, and models, he has saved you hundreds of hours of research. He sets you up for success by talking to you directly as a friend and colleague, using practical examples. His book helps you to:Identify the proper cybersecurity program roles and responsibilities. Classify assets and identify vulnerabilities. Define an effective cybersecurity governance foundation. Evaluate the top governance frameworks and models. Automate your governance program to make it more effective. Integrate security into your application development process. Apply defense-in-depth as a multi-dimensional strategy. Implement a service management approach to implementing countermeasures.
With this handbook, you can move forward confidently, trusting that Schreider is recommending the best components of a cybersecurity program for you. In addition, the book provides hundreds of citations and references allow you to dig deeper as you explore specific topics relevant to your organization or your studies.
Are you intimidated by insurance? Have no fear — this easy-to-understand guide explains everything you need to know, from getting the most coverage at the best price to dealing with adjusters, filing claims, and more. Whether you're looking for personal or business insurance, you'll see how to avoid common pitfalls, lower your costs, and get what you deserve at claim time.Get to know the basics — understand how to make good insurance decisions and reduce the chances of a financial loss in your life
Take your insurance on the road — manage your personal automobile risks, handle special situations, insure recreational vehicles, and deal with insurance adjusters
Understand homeowner's and renter's insurance — know what is and isn't covered by typical policies, common exclusions and pitfalls, and how to cover yourself against personal lawsuits
Buy the right umbrella policy — discover the advantages, and coordinate your policies to cover the gaps
Manage life, health, and disability risks — explore individual and group policies, understand Medicare basics, and evaluate long-term disability and long-term-care insurance
Open the book and find:The best life, health, home, and auto policies
Strategies for handling the claims process to get what you deserve
Tips on adjusting your deductible to suit your lifestyle
How to navigate healthcare policies
Ways to reduce your risk and your premiums
Common traps and loopholes
Considerations for grads, freelancers, and remote workers
Atlantic Publishing is a small, independent publishing company based in Ocala, Florida. Founded over twenty years ago in the company president's garage, Atlantic Publishing has grown to become a renowned resource for non-fiction books. Today, over 450 titles are in print covering subjects such as small business, healthy living, management, finance, careers, and real estate. Atlantic Publishing prides itself on producing award winning, high-quality manuals that give readers up-to-date, pertinent information, real-world examples, and case studies with expert advice. Every book has resources, contact information, and web sites of the products or companies discussed.