{"id":21,"date":"2019-03-23T21:32:54","date_gmt":"2019-03-23T21:32:54","guid":{"rendered":"https:\/\/reidconsultingllc.com\/?page_id=21"},"modified":"2025-04-15T12:49:50","modified_gmt":"2025-04-15T12:49:50","slug":"resources","status":"publish","type":"page","link":"https:\/\/reidconsultingllc.com\/?page_id=21","title":{"rendered":"Resources"},"content":{"rendered":"<p><span style=\"color: #000000;\">The information resources contained on this page are grouped by each of the six Organizational Resilience components.\u00a0 Feel free to browse the articles in each section.\u00a0 You&#8217;ll find the information quite useful and informative.<\/span><\/p>\n<hr \/>\n<h3><span style=\"color: #000000;\"><strong>Service Management<\/strong><\/span><\/h3>\n<hr \/>\n<h4 style=\"padding-left: 40px;\"><span style=\"color: #000000;\"><a href=\"http:\/\/www.informit.com\/articles\/article.aspx?p=29735\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #000000;\">The Importance of IT Service Management<\/span><\/a> (article)<\/span><\/h4>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">This article talks about the importance of service management within the organization.\u00a0 Even though service management disciplines, such as ITIL, are IT-focused, one should realize that making IT more resilient will benefit the organization as a whole.\u00a0 Additionally, many practices of service management can be propagated to the operations side of the business for further benefit to the organization.<\/span><\/p>\n<h3><\/h3>\n<hr \/>\n<h3><span style=\"color: #000000;\">Information Security<\/span><\/h3>\n<hr \/>\n<h4 style=\"padding-left: 40px;\"><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/www.us-cert.gov\/sites\/default\/files\/publications\/infosecuritybasics.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Introduction to Information Security<\/a>\u00a0(pdf)<\/span><\/h4>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">An introductory article about information security and the risks of not having proper security in place.<\/span><\/p>\n<h4 style=\"padding-left: 40px;\"><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/geekflare.com\/understanding-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">An Introduction to Cyber Security Basics for the Beginner<\/a> (article)<\/span><\/h4>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">A basic explanation of cybersecurity for the layperson<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4 style=\"padding-left: 40px;\"><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/www.eiopa.europa.eu\/digital-operational-resilience-act-dora_en\" target=\"_blank\" rel=\"noopener noreferrer\">Digital Operational Resilience Act (DORA)<\/a><\/span><\/h4>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">The official site for the EU&#8217;s digital resilience regulations.\u00a0\u00a0<\/span><\/p>\n<h4 style=\"padding-left: 40px;\"><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/www.leanix.net\/en\/wiki\/trm\/dora-compliance-checklist?utm_term=&amp;utm_source=google-ads&amp;utm_medium=ppc&amp;utm_campaign=NORTH-AMERICA-SOUTH_Enterprise-Architecture_AO_PMax_ENG&amp;hsa_ver=3&amp;hsa_cam=21053283090&amp;hsa_grp=&amp;hsa_acc=2468165327&amp;hsa_kw=&amp;hsa_mt=&amp;hsa_net=adwords&amp;hsa_src=x&amp;hsa_tgt=&amp;hsa_ad=&amp;gad_source=1&amp;gbraid=0AAAAACe0l9xvfasc7RFP1rJ-gXBgdMwdv&amp;gclid=Cj0KCQjwh_i_BhCzARIsANimeoEhPaUa-HvBTm-y-i1_IM_NEUNX_8hxvKt4p-Omwg13-ZaeOxqzWkAaAuOsEALw_wcB\" target=\"_blank\" rel=\"noopener noreferrer\">DORA Overview and Compliance Checklist<\/a><\/span><\/h4>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">A good overview of DORA.\u00a0 It includes compliance dates, penalties for noncompliance, links to the regulation itself (pay close attention to articles 5 &#8211; 33), and a good compliance checklist.<\/span><\/p>\n<p style=\"padding-left: 40px;\">\n<p style=\"padding-left: 40px;\"><a href=\"https:\/\/www.threatstack.com\/blog\/not-soc-2-compliant-4-reasons-your-customers-wont-work-with-you\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #000000;\"><strong>4 Things You Need to Know About SOC 2 Compliance (article)<\/strong><\/span><\/a><\/p>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">SOC 2 compliance is technology-focused and this article is a must-read for service providers, who are required to comply with SOC 2 if they&#8217;re storing customer data in the cloud.\u00a0 It&#8217;s an excellent read on the four most important points of compliance.\u00a0 The author&#8217;s company provides compliance services that they want you to retain but the article is very light on the sales pitch and heavy on insightful advice.\u00a0 A link to a SOC 2 overview document is at the bottom of the article.<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\"><strong><a href=\"https:\/\/linfordco.com\/blog\/what-is-soc-1-report\/\" target=\"_blank\" rel=\"noopener noreferrer\">What is a SOC 1 Report?<\/a><\/strong><\/span><\/p>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">SOC 1 is similar to SOC 2 in that it is looking at an organization&#8217;s internal controls, including information security.\u00a0 The difference is that SOC 1 is focused on financial reporting.\u00a0 The article is an informative read.<\/span><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<h3><span style=\"color: #000000;\">Risk Management<\/span><\/h3>\n<hr \/>\n<h4 style=\"padding-left: 40px;\"><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/www.ucop.edu\/enterprise-risk-management\/_files\/protiviti_faqguide.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Guide to Enterprise Risk Management &#8211; FAQ (pdf)<\/a><\/span><\/h4>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">A lengthy but detailed and informative guide to implementing Enterprise Risk Management.\u00a0 The first 10 FAQs will give a good foundation of what it is and why it&#8217;s important to implement.<\/span><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<h3><span style=\"color: #000000;\">Incident Management<\/span><\/h3>\n<hr \/>\n<h4 style=\"padding-left: 40px;\"><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/www.managementstudyguide.com\/crisis-management.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Crisis Management 101<\/a> (crash course)<\/span><\/h4>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">This is a short crash course in crisis management.\u00a0 It&#8217;s a fairly quick read and the reader will come away with a good basic understanding of the importance of properly responding to and managing crises.<\/span><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<h3><span style=\"color: #000000;\">Business Continuity<\/span><\/h3>\n<hr \/>\n<h4 style=\"padding-left: 40px;\"><a href=\"https:\/\/www.nhc.noaa.gov\/aboutsshws.php\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #000000;\"><strong>Saffir-Simpson Hurricane Scale<\/strong><\/span><\/a><\/h4>\n<h4 style=\"padding-left: 40px;\"><a href=\"https:\/\/www.dhs.gov\/cisa\/active-shooter-preparedness\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #000000;\">Active Shooter Preparedness<\/span><\/a> <span style=\"color: #000000;\">(FEMA)<\/span><\/h4>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">Good content for education from FEMA regarding active shooter preparedness.<\/span><\/p>\n<h4 style=\"padding-left: 40px;\"><a href=\"https:\/\/drii.org\/resources\/professionalpractices\/EN\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #000000;\">DRI Ten Professional Practices<\/span><\/a><\/h4>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">An overview of the ten professional practices, established by the Disaster Recovery Institute International.\u00a0 This body of knowledge that are the guiding steps for the development, implementation, and maintenance of business continuity programs.\u00a0 The detailed version of the professional practices is available in its entirety to DRI-certified professionals.<\/span><\/p>\n<h4 style=\"padding-left: 40px;\"><span style=\"color: #000000;\"><a href=\"https:\/\/www.drj.com\/articles\/online-exclusive\/business-continuitys-role-in-supply-chain-resilience.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #000000;\">Business Continuity&#8217;s Role in Supply Chain Resilience<\/span><\/a> (article)<\/span><\/h4>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">An organization is taking a step in the right direction by creating their own business continuity plan.\u00a0 However, there is still an exposure if the supply chain is not included in the BC plan.\u00a0 This article discusses the importance of supply chain resilience.\u00a0<\/span><\/p>\n<h4 style=\"padding-left: 40px;\"><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/www.travelers.com\/resources\/business-continuity\/why-is-business-continuity-important\" target=\"_blank\" rel=\"noopener noreferrer\">Importance of Having a Business Continuity Plan (article)<\/a><\/span><\/h4>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">A good justification from Travelers Insurance for having a business continuity plan.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<h3><span style=\"color: #000000;\">Disaster Recovery<\/span><\/h3>\n<hr \/>\n<h4 style=\"padding-left: 40px;\"><span style=\"color: #000000;\"><a href=\"https:\/\/searchstorage.techtarget.com\/blog\/Storage-Soup\/IT-resilience-vs-disaster-recovery-Whats-better-for-your-business\" target=\"_blank\" rel=\"noopener noreferrer\">Disaster Recovery vs. IT Resilience<\/a> (article)<\/span><\/h4>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\">Personally, I believe the term &#8220;disaster recovery&#8221; or &#8220;DR&#8221; is antiquated because it focuses on recovery instead of resilience.\u00a0 This article discusses that in detail and it&#8217;s a good read that can help justify a &#8220;DR&#8221; or &#8220;IT Resilience&#8221; program &#8211; whatever you want to call it.\u00a0 It&#8217;s an important aspect in a world where enterprise resilience is growing as a disciplined focus for organizations<\/span><\/p>\n<h4><\/h4>\n<h4><\/h4>\n","protected":false},"excerpt":{"rendered":"<p>The information resources contained on this page are grouped by each of the six Organizational Resilience components.\u00a0 Feel free to browse the articles in each section.\u00a0 You&#8217;ll find the information quite useful and informative. Service Management The Importance of IT <a href=\"https:\/\/reidconsultingllc.com\/?page_id=21\" class=\"read-more\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-21","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/reidconsultingllc.com\/index.php?rest_route=\/wp\/v2\/pages\/21","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reidconsultingllc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/reidconsultingllc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/reidconsultingllc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reidconsultingllc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=21"}],"version-history":[{"count":29,"href":"https:\/\/reidconsultingllc.com\/index.php?rest_route=\/wp\/v2\/pages\/21\/revisions"}],"predecessor-version":[{"id":158,"href":"https:\/\/reidconsultingllc.com\/index.php?rest_route=\/wp\/v2\/pages\/21\/revisions\/158"}],"wp:attachment":[{"href":"https:\/\/reidconsultingllc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}