Have an account?

  •   Personalized content
  •   Your products and support

Need an account?

Create an account


How is a flash flood like a security breach?

What CIOs can learn from disaster response planning



Security breach situations require all hands on deck, much like responding to a disaster.  Whether a security breach or natural disaster coordinating a response can be extremely challenging: working effectively and efficiently is tough at the best of times, and even more so when time is off the essence.

Key to any response is being able to establish a clear view of the situation and prioritise overstretched resources to ensure that you’re delivering the greatest impact possible.

You need to be agile, responsive, and proactive in resolving issues as and when they arrive. Much of this can be aided by reducing manual configurations, and using data and intelligence to introduce efficiencies into your workflow.

When Cisco worked with a consortium of partners from across industry, academia, and government to deliver the CONSERVE project in Glasgow, the team leading the project was able to apply a similar approach to mitigating flood damage.

The idea behind CONSERVE is to create an integrated platform that predicts and helps co-ordinate first responders in disaster situations such as floods.

Of course, responding to a flood isn’t exactly like running an IT team – and the CONSERVE project presented a valuable opportunity to get people from different sectors to come together and collaborate in their own ways to tackle a shared challenge.

In this episode of MACRO, the Cisco innovation podcast, we heard from emergency service commanders, flooding victims, academics, and engineers to discover the impact that connected sensors and smart, collaborative tools can have on these sometimes life-saving flood response operations.

In an emergency situation, whether a security breach or a natural disaster, having an already tested plan which can get your resources and people to the right place, at the right time, is critical. Your primary objective is getting back up and running as quickly as possible - wasted time and effort counts for double here.

Visit our website to find out how Cisco can help you prepare for, manage, and recover from data breaches and network attacks.