Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Talk ColumnSecurity & Business Resilience

Celebrating Resiliency 10 Years after Hurricane Katrina

By Diane Ritchey
Kate Campion

Kate Campion

Ric Jones

Ric Jones

Kate Campion
Ric Jones
September 1, 2015

It’s not just the resiliency of the citizens of New Orleans that has earned the right to be celebrated this hurricane season. Businesses should also be celebrated for their resiliency. I recently spoke with executives from Cooperative Processing Resources (CPR) and LifeShare Blood Centers about the ways they avoided severe downtime during Hurricane Katrina, and bounced back as even more resilient organizations. Kate Campion, president of CPR, based in Dallas, Texas, had offices scattered throughout the New Orleans area. CPR had one office that was impacted directly by Hurricane Katrina; it was underwater and unable to reopen for a few months. Working with Sungard Availability Services, it was able to store, retrieve and recover all company data. Data accessibility was not impacted, and it experienced no downtime due to the storm.

Ric Jones, CIO of LifeShare Blood Centers, is based in Shreveport, Louisiana. During Hurricane Katrina, LifeShare Blood Centers was forced to shut down a number of regional centers in Louisiana. At the same time, blood demand increased substantially while donors were unable to give blood as facilities were closed. Jones says: “It is actually only after we experienced downtime during Hurricane Katrina that we decided it was time to find a solution for our critical IT infrastructure – we found that solution through a small Oklahoma City-based vendor. But years later, data backlogs began to occur, and we realized we needed a better and more reliable solution. We now work with Sungard AS to protect critical applications and to ensure data is constantly backed up and protected.”

 

What lessons did you learn after Hurricane Katrina?

Kate Campion: Katrina taught us how documenting a Disaster Recovery Plan is one thing, but that does not give you any indication that it will work. The fact that our Disaster Recovery Plan worked extremely well in the case of our New Orleans office, it brought the realization to our member agencies the real importance of having a plan. A Disaster Recovery Plan written on paper is one thing, seeing that it worked seamlessly is another story. When Katrina hit New Orleans and our member agency’s main office, no one knew the full extent of the damage for days. However, we knew immediately that there was no electricity at the main office. This is when the Disaster Recovery Plan kicked in right away, by routing the remote offices to Sungard AS directly instead of running them through the main office since it was not accessible. The re-routing happened in less than one hour, and the remote offices could access and continue to work, helping their customers without very much delay at all. The administration staff that worked out of the main office was switched over to access the database from their homes, and they were able to continue to do disbursements and make critical payments on behalf of their customers without disruption.

 

How you made your organization more resilient since Katrina?

Kate Campion: CPR’s member agencies that are currently being hosted by Sungard AS all breathed a sigh of relief knowing that the Disaster Recovery Plan they had in place was fully tested and passed with flying colors. You never want to have to use a Disaster Recovery Plan, but when it is required, and put it to the test the result was “business as usual” even though the main office and other areas leading to the office was still underwater for over a month.

 

What lessons did you learn from Hurricane Katrina?

Ric Jones: That we needed a partner to provide IT resiliency services for our critical infrastructure systems – especially our blood banking programs. These were especially vulnerable – in fact, even the occasional lightning strike would wreak havoc. One such case occurred when a blood bank in Lake Charles, Louisiana, went offline for four days after a lightning strike. We learned that a stable solution was more important than ever as our data systems continued to grow – our donor roster is more than 150,000 deep, and we collect and process about 500 donors a day.

 

What would you have done differently before Hurricane Katrina hit?

Ric Jones: We would have evaluated stable, reliable vendors who perform annual testing and provide backups. One recent instance that illustrated the value of backups was in 2010, when an unborn baby in England needed rare blood. We were able to find a matching blood donor in their system based on the testing information they had on file. The donor was in Arkansas on vacation but came to Shreveport, donated blood and within 48 hours the blood was on its way to England. This vital research information would be in jeopardy if we didn’t have a disaster recovery backup system.

KEYWORDS: Hurricane Katrina severe weather preparedness supply chain management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Crisis feature

    Leading with Resiliency During a Natural Disaster

    See More
  • Keeping your security business afloat

    Managing Business Continuity and Resiliency in 2015

    See More
  • SEC0820-Cover-Feat-slide1_900px

    Managing Risk, Business Continuity and Resiliency during a Pandemic

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing