The latest business continuity news from around the world

The most read Continuity Central feature articles of 2022

What did Continuity Central readers find most interesting during 2022? Out of more than a thousand pieces of content published, here are the top twenty feature articles...

#1 Are you really cyber attack ready?
One of the trends seen in 2021 was the continued development of cyber security into cyber resilience. Cyber protection is no longer enough, instead incident response, crisis management, and disaster recovery plans need to also be in place. In this article, CISO Ryan Weeks challenges organizations to consider whether their cyber attack plans are fit for purpose.
Read this article

#2 Machine learning in cyber security: a structured approach
Machine learning (ML) and artificial intelligence (AI) have become frequent buzzwords in the cyber security space. Security teams have an urgent need for more automated methods for detecting threats and malicious user activity and ML offers a better future. Melissa Ruzzi offers some advice for how to introduce it to your organization.
Read this article

#3 Building organizational resilience
Drawing on the work of Collins and Porras, which was published in their book ‘Built to Last’, Alberto G. Alexander explains that organizational resilience does not start with establishing and implementing a specific management system; instead, it is the outcome of a clear set of organizational characteristics.
Read this article

#4 What’s the difference between business continuity and disaster recovery?
In an article aimed at people new to business continuity and disaster recovery, Mitch Mitchell explains what the difference between these two vital disciplines is and why it is a mistake to use the two terms interchangeably.
Read this article

#5 Getting started with the business impact analysis
This resource explores what the business impact analysis (BIA) is, how to get started, and provides access to an easy to use BIA and Risk Assessment Worksheet to carry out your first business impact analysis or to improve existing BIAs.
Read this article

#6 What does the future hold for blockchain within third-party risk management?
Is risk and compliance one of the organizational areas that will benefit from the emergence of blockchain? Kevin Spiers looks at blockchain opportunities within third-party risk management and asks whether the reality lives up to the hype?
Read this article

#7 Business continuity and operational resilience – how different are they really?
Helen Molyneux comments on the Operational Resilience Report 2022, which was published recently by the BCI and asks whether the report has added to confusion in the profession about business continuity and operational resilience.
Read this article

#8 There’s a new acronym on the block: getting to know CNAPP
Cyber security and acronyms seemingly go hand in hand and every year there are new ones to learn and remember. From APTs and ZTNA to CASB and SIEM, the world of cyber security is full of them. Markus Strauss looks at CNAPP, one of the newest additions to the acronym list.
Read this article

#9 Horizon scanning: cyber security and the metaverse
As organizations start to look to metaverse platforms the associated cyber security threats need consideration. Matias Madou looks at cyber security issues associated with the metaverse and offers some recommendations…
Read this article

#10 Designing your online infrastructure to survive major outages: where to start
Many businesses are reliant on a continuous online presence but may not have yet fully considered designing their platform to be able to respond to the effects of downtime - whether it is caused by an outage, cyber attack, or natural disaster. Terry Storrar provides some advice for those starting out on their disaster recovery journey.
Read this article

#11 Cyber risk management: an overview
This article by Alberto G. Alexander, Ph.D, focuses on the major components of an effective cyber risk management process. Different options for establishing a cyber risk framework are presented and best practices for cyber risk management are suggested.
Read this article

#12 A mental health minefield: the increasing pressure on cyber security teams
The weight of stress and anxiety on cyber security professionals is mounting, it is therefore no wonder that many security leaders have experienced negative emotions at work, including depression, anger, and anxiety. Steve Cottrell explores the issue.
Read this article

#13 Ten good practices for implementing third-party risk management
Jelle Groenendaal and Bram Ketting provide advice for implementing and improving third-party risk management, presenting a six step implementation approach and a checklist of ten good practices.
Read this article

#14 Risky business: managing the great energy transition
Future energy resources are one of many considerations on the agenda of enterprise risk managers as they seek to set and reach ESG goals. Sustainable energy will be key to this, but also comes with its own set of risks, as Dr. Lou Gritzo explains.
Read this article

#15 Resilience risks: cryptocurrency and blockchain
Resilience and risk professionals, particularly those from a non-IT background, need to develop their overall understanding of emerging technologies says Luke Bird, FBCI. How else are they going to be able to fully appreciate the magnitude of risks potentially facing their business? In this article Luke gives a backgrounder on cryptocurrency and blockchain in the context of risk.
Read this article

#16 Are your legacy systems an open door for cyber attacks?
Often the business systems you rely on most can be the most neglected. They have been running well for years without much attention. However, this situation must now be challenged – the changing cyber threat landscape means the risk of downtime to your legacy systems is increasing. Here Nick Denning proposes six steps to protect your organization and its legacy systems.
Read this article

#17 Embedding culture into business continuity planning
When culture is discussed within business continuity standards and guidance documents it usually refers to the internal corporate culture. However, in this paper Wallace W. Koenning, Jr. looks at external culture and influencers of this; and discusses ways to consider it within business continuity programs.
Read this article

#18 The role of human resources in workplace emergency management
Human resource (HR) leaders have a crucial role in workplace emergency management. They should support all stages of the emergency ‘incident lifecycle’ and need to take ownership of two critical steps says Todd Miller…
Read this article

#19 Taking the guesswork out of cyber security
Saket Modi, CEO at Safe Security, explains why he thinks the current way of doing cyber security in many organizations is broken as far too much of the risk analysis and associated decisions are based on estimates and guesswork, instead of using a knowledge-based approach.
Read this article

#20 Applying the Swiss cheese model to cyber resilience
The Swiss cheese model is a risk management technique that is transferrable to cyber resilience management. Thomas Muller-Martin explains what it is and describes the benefits of such an approach.
Read this article

A big thank you to everyone who has contributed to Continuity Central during 2022! If you have an idea for a future article please email editor@continuitycentral.com to discuss.



Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.