Managing a Crisis: Prepare for Weathering the Next Storm to Come

While the Covid-19 crisis is still in full effect, many businesses have mastered the first phase of disruption. Now, the time starts to plan for the future, at many levels – financials, business models, product strategies, and more. One of these topics must be Business Continuity & Resilience Management (BCRM), for being better prepared for weathering the next storm to come. And that will come, be it the next peak of Covid-19, be it a major natural disaster hitting your business, be it – and that is the one with the highest probability – a severe cyberattack. And everything you do today for BCRM will also help in the current situation.

KuppingerCole Analyst Annie Bailey explains how to set up BCRM planning, what to include, and gives you guidance from practice on various aspects such as risk assessment, business/IT alignment, and improving your cyberattack resilience.

Learn more about Business Resilience Management with the free Analyst Advice from Senior Analyst Warwick Ashford: Business Resilience Management (Crisis Roadmap for Beginners).

Language: English • Duration: 37:45 • Resolution: 1280x720

Watch on YouTube         Download the video        Learn more about this webinar

Latest Related Videos

More Related Videos

Video Links


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Stay Connected

Next Webinar

Webinar

Reduce Dependency on Active Directory With Cloud Identity

When it comes to identity management many companies depend heavily on Microsoft Active Directory (AD). This high degree of dependency on one service can become a problem when this service faces an outage. Also, respective of the requirements companies have, all services have certain limitations which are sometimes necessary to overcome. Many cyberattacks are perpetrated via staff endpoint devices (computers, smartphones or even printers). This necessitates a fine-mesh risk management approach with a centralized solution, called Identity Fabric at KuppingerCole.

Other videos

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00