Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Developing Awareness, Training Programs

April 10, 2004
During the past few months, Security magazine has run a series of articles about the business continuity planning process. We covered how to conduct pre-planning, including business impact analyses. We also demonstrated how to develop the best planning strategies, deal with emergency response and operations, and how to effectively implement business continuity plans. Now we come to the post-planning phase of business continuity. These post-planning activities are designed to ensure that organizations have the proper state of readiness to implement a business continuity plan when needed, and that systems are in place to coordinate with external public authorities and other organizations when necessary.

This column focuses on developing awareness and training programs internally to create and maintain corporate awareness and enhance the skills required to implement a business continuity management program.

The first step is to define the difference between awareness and training. Awareness is the state of simply knowing something through observation; training is the more intensive process of learning processes and methods to deal with a situation.

To ensure full awareness of the business continuity plan, all employees, from top executives to managers to front-line employees, must be informed of the following:

  • Key components of the business continuity plan

  • Why the business continuity plan is important

  • Who are the business continuity plan coordinators

  • Where the business continuity plan information can be found

  • When the business continuity plan is exercised

  • How the business continuity plan is activated


Videos, newsletters, e-mails, posters, personal memos from top executives, promotional items, informal meetings and other communication techniques can be used effectively to raise awareness. Existing communication vehicles should be used whenever possible to ensure that employees are receiving information.

Anecdotes about how other organizations were affected by disasters or problems that caused business continuity plans to be activated can be powerful communication tools. People typically respond more positively to real-life examples, and these stories will also stick with them, especially if they can readily see how the downfall of a company was prevented by the effective use of a business continuity plan. Stories of company failures caused by a lack of planning may be even more compelling.

Outside Help

The business continuity coordinator responsible for the overall plan should also attend ongoing education and learning programs outside the company to ensure that he or she has the latest and best information and techniques to apply to the organization’s operations.

Next we turn to training, which is what must be done to make a plan fully operational. The business continuity planning team must decide who in the organization will need special training, and of what type. Since it will pull them away from other functions that are also vital to the organization, supervisors of these individuals must support the effort and training must be organized in a way that will minimize training time.

Three types of training are typically employed, including computer-based training, classroom training and scenario testing exercises. The roles of teams within the organization, as well as individual roles, must be clearly defined and communicated to all employees involved. Those being trained should be taught what to look for in their areas of operations that might indicate problems and a potential need to activate the business continuity plan. Processes for communicating with others within the organization and making decisions must also be covered.

Following the training process, the business continuity team should evaluate and establish an ongoing plan for repeat training at appropriate intervals, accounting for variables such as new organizational operations, employee turnover in key positions, and new business continuity techniques.

The bottom line: What would be the cost to us if a disaster occurred and our team was not fully prepared to implement our business continuity plan?

The bottom line: What's the cost to not be fully prepared when a disaster finally strikes?

Sidebar

According to the American Red Cross, employees can easily create a personal workplace disaster supplies kit. For many workplaces, in case of a crisis or disaster, employees might be confined for several hours, or perhaps overnight, in a facility. They can play a role by stocking a personal stash of supplies beyond what the organization or security may provide. Here is what the Red Cross recommends:

Flashlight with extra batteries – An employee can use a flashlight to find his or her way if the power is out. It is important to instruct employees not to use candles or any other open flame for emergency lighting.

Battery-powered radio – News about an emergency may change rapidly as events unfold. Employees also will be concerned about family and friends in the area. Radio reports will give information about the areas most affected.

Food – Enough non-perishable food to sustain an employee for at least one day (three meals) is suggested. Foods selected should require no refrigeration, preparation or cooking, and little or no water. Items can include:

  • Ready-to-eat canned meals, meats, fruits and vegetables.

  • Canned juices.

  • High-energy foods (granola bars, energy bars).

    Water – Employees should consider keeping at least one gallon of water or more if a person is on medications that require water or that increase thirst. Water can be stored in plastic containers such as soft drink bottles. Avoid using containers that will decompose or break, such as milk cartons or glass bottles.

    Medications – Employees should include usual non-prescription medications, including pain relievers, stomach remedies, etc. If a person uses prescription medications, at least three-day’s supply of these medications should be stored at your workplace.

    First aid supplies – If an employer does not provide first aid supplies, employees should consider having the following essentials:

  • (20) adhesive bandages, various sizes.

  • (1) 5” x 9” sterile dressing.

  • (1) conforming roller gauze bandage.

  • (2) triangular bandages.

  • (2) 3 x 3 sterile gauze pads.

  • (2) 4 x 4 sterile gauze pads.

  • (1) roll 3” cohesive bandage.

  • (2) germicidal hand wipes or waterless alcohol-based hand sanitizer.

  • (6) antiseptic wipes.

  • (2) pair large medical grade non-latex gloves

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security Awareness Training And Certificate Programs

    See More
  • training-skills-freepik1170x658v536.jpg

    The cybersecurity skills gap highlights the need for cyber-awareness training

    See More
  • Cyber Incident Recovery

    Security Awareness Training – Keys to Delivering a Successful Program

    See More

Related Products

See More Products
  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

See More Products

Events

View AllSubmit An Event
  • March 15, 2012

    Sales & Support Programs

    This class is designed to acquaint new partners with the many benefits of the Axis Channel Partner Program. We will cover our partner levels and discount structure, NFR/demo unit, trade-in and loaner programs, support services, training classes and other relevant information to help provide a mutually successful relationship with Axis.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!