Prepared By: Charles F. Curran Al Khobar, Kingdom of Saudi Arabia

Size: px
Start display at page:

Download "Prepared By: Charles F. Curran Al Khobar, Kingdom of Saudi Arabia"

Transcription

1 Prepared By: Charles F. Curran Al Khobar, Kingdom of Saudi Arabia

2 Table of Contents 1.0 Introduction Phase I Create a Baseline for Analysis Inventory the applications Identify the data bases or feeds they access Identify the business objectives for which the applications access the data Phase II Establish Priorities for Recovery Time Objectives Appraise (or valuate ) each objective s process by performing a risk assessment on it Standard Risk Assessment Methodology Confidentiality, Integrity, and Availability (CIA) Analysis Prioritize the business objectives and their processes based on their value Brainstorm possible mitigation alternatives Phase III Identify Design Objectives and Boundaries Cost-Benefit Analysis of Mitigation Alternatives Relevant Engineering Design Variables Execution... 5 List of Tables Table 1: Qualitative Data Classifications... 3 ii

3 1.0 INTRODUCTION The purpose of this paper is to recount the steps involved in classifying or characterizing data for the purpose of disaster planning, specifically in support of determining system requirements for system back ups and back up data storage in particular. The paper shows how data classification naturally transitions to the identification of performance specifications to support engineering design. Corrective measures in the event a disaster impacts computer data important to business continuity include creating back up storage for the enterprise s data. The first step in determining data storage requirements for disaster recovery is to classify and prioritize the data. 1 This is a function of the business processes for which the data is used. The process to characterize data for design and business decisions concerning disaster recovery logically breaks down into a three phase process: creation of a baseline for analysis, data prioritization, and establishment of design parameters for implementation. The first phase describes what is. The second establishes the priorities for later engineering and business decisions, and the third prepares the organization to proceed into formal design of disaster preparedness engineering. 2.0 PHASE I CREATE A BASELINE FOR ANALYSIS This first phase describes what is. It defines the body of data targeted in data recovery efforts. It consists of three discrete steps: 2.1 INVENTORY THE APPLICATIONS. First, all the applications owned by the enterprise or organization within the enterprise must be inventoried. Applications have uses and use data. The relationship of the uses ( business purposes ) to the data will define the importance of the data and drive the decisions on how to back it up to support disaster recovery preparation. 2.2 IDENTIFY THE DATA BASES OR FEEDS THEY ACCESS Once the applications are identified, it is important to link the applications to the data they process to arrive at their output in support of business objectives. Given the business silos in which processes can operate, this step ensures that all are aware of the uses to which particular data bases are put. Real time data feeds drawn into processing should be associated the same as static data bases. This ensures that both data at rest and data in motion are associated with their respective applications, such as for enterprise service bus operations. While the focus for disaster recovery traditionally is on recovering data bases to support business processes, one finds that including data in motion this calculus supports Recovery Point Objectives in Phase II and identification of special recovery software that might need to be developed in Phase III. 1 Whitewater Cloud Storage Gateway Disaster Recovery Best Practices Guide. October Riverbed Marketing, Riverbed Technology, Inc., San Francisco. Accessed 19 April 2014 at YAxWRhSnd595RZFoY769z- 34iMW9JTyJaecQTcOcWVfzpAumv5IZokgdMtg!ac6ceodo1W0JDzc3NKvJ79L7M5!wvscXXb9bzYmmwTyTuR 5M=&answerid= &searchid=

4 2.3 IDENTIFY THE BUSINESS OBJECTIVES FOR WHICH THE APPLICATIONS ACCESS THE DATA Association of business objectives to applications need not wait for completion of the above steps, but it logically follows and is likely a more mature determination if it is performed after association of data automation processes to data bases and data feeds. In complex cases involving hundreds of discrete applications, it often proves beneficial to group applications that support the same or similar business processes. Indeed, it is not unusual for a single business process to require several applications working in concert to bring about the desired result. 3.0 PHASE II ESTABLISH PRIORITIES FOR RECOVERY TIME OBJECTIVES 3.1 APPRAISE (OR VALUATE ) EACH OBJECTIVE S PROCESS BY PERFORMING A RISK ASSESSMENT ON IT With the baseline inventory in place, priorities of processes can be addressed. Two mechanisms for prioritization are widely practiced: STANDARD RISK ASSESSMENT METHODOLOGY Risk is normally computed using the following equation or a variation of it: Risk Value = Consequences X Threat X Vulnerability. In order to avoid highly subjective results, this approach requires the construction of threat tables and vulnerability tables to evaluate threat and vulnerability based on agreed to criteria. The value of this approach is that it can provide a financial valuation of the data and process on which to base financial investment alternatives in cost-benefit analysis. For purposeful human threats (as opposed to natural disaster or safety related threats), threat and vulnerability can also be expressed as Likelihood of Attempt and Likelihood of Success by a given adversary. 2 This latter would be applied, for example, to address recovery from a disaster induced by a successful cyber attack. Once the valuation is complete, a rank order of business processes can be listed and Recovery Time Objectives (RTOs) can be established for each one. Again, it might be beneficial for the organization to group Recovery Time Objectives, but this risk-based analysis does support the identification of discrete RTOs for data particularly critical to business operations CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY (CIA) ANALYSIS A simpler format used by many is to assess each item based on the typical data evaluation criteria of confidentiality, integrity, and availability. Again, it helps if tables are constructed with evaluation criteria assigned for relative levels of importance of confidentiality, integrity, and availability. Availability will be the primary driver of disaster recovery solutions as it relates strongly to currency of the data and how quickly the enterprise needs it reconstituted. Availability values might be set based on specific Recovery Time Objectives. Integrity will play in that it influences how data is backed up and how readily that form of back up data can be reused in the event of a disaster. Integrity will be an item worth focusing on later in disaster preparedness exercises and drills after a disaster recovery plan becomes operational. Finally, 2 This approach to risk valuation for disaster recovery is based on the American Petroleum Institute Security Risk Assessment standard, adapted to disaster recovery analysis and recognizing that disasters can be natural as well as manmade. See Security Risk Assessment Methodology for the Petroleum and Petrochemical Industries (API 780) Ed. 1. May American Petroleum Institute, Washington, DC. 2

5 confidentiality influences where data is backed up and the security of the technical means utilized for doing so as well as the mechanisms used for reconstitution of operations. In conclusion, the most important element for this stage of the process is Availability, but this is a convenient point at which to also assess Confidentiality and Integrity as those determinations will guide later activities in the disaster preparedness process. Finally, peer review of the decisions is important as stakeholders will naturally fight for their data, but objective criteria for prioritization will need to be agreed upon. One approach for establishing objective criteria for prioritization is to use both the Risk Based approach and the CIA approach to determine availability requirements. This requires more labor, but it does establish an objective basis for deciding availability priorities. For example, there might be a data operation that cannot be reconstituted without a very short Recovery Point Objective (RPO) that is, the data needs to be very recent in order to avoid a business loss. However, that business loss might be miniscule in comparison to the cost of adding this data to the group of data elements with very short RPOs. Likewise, there might be a piece of data that can support post-disaster reconstitution of very valuable business process despite a relatively long RPO. Performing a Risk Based analysis of the data helps prioritize within Availability classes. If computing risk is too resource intensive, another way to dive more deeply into availability classes is to build qualitative tables for assessing the value of the data. A sample set of qualitative descriptions for classifying data follows: 3 Data Classification Description Critical Important Semi-Important Non-important Application data critical for business processes that provide minimum acceptable levels of service in the event of a disaster, or data which must be available for regulatory audits (Example: Customer orders and financial data). Application data for standard business processes, which is impossible or extremely expensive to recreate, or data that has significant operating value (Example: Classified data). Application data for normal operational procedures, but can be cost effective in recreating from original data sources at minimal to moderate costs (Example: Support documentation). General data which can easily be recreated from original source data (Example: Reports). Table 1: Qualitative Data Classifications PRIORITIZE THE BUSINESS OBJECTIVES AND THEIR PROCESSES BASED ON THEIR VALUE Whether a Risk Based or CIA approach is used, the previous step produces a rank ordering of data based on business importance. In the Risk Based approach this list reflects financial value of 3 Whitewater Cloud Storage Gateway Disaster Recovery Best Practices Guide. 3

6 reconstituting the data operation. In the CIA approach, data are identified with broad ranges of availability requirements and importance equates directly to availability requirements for data operations. The CIA approach can be further analyzed for relative value of availability if necessary. As noted, incorporating Risk Based analysis is one way to analyze classes of availability more deeply, but broad qualitative assessments can also do the job BRAINSTORM POSSIBLE MITIGATION ALTERNATIVES Exploring possible mitigation alternatives transitions the process from data classification to implementation of disaster recovery strategies and particular mitigation techniques. In the absence of alternative approaches, the Seven Tiers of Disaster Recovery described in Phase III below could be used as a guide to brainstorm implementation alternatives. 4.0 PHASE III IDENTIFY DESIGN OBJECTIVES AND BOUNDARIES Deciding how to recover from potential disasters involves a number of business and, by extension, engineering decisions. Paring down the universe of possible mitigation alternatives to an actionable set of alternatives supports execution of formal cost-benefit analyses. 4.1 COST-BENEFIT ANALYSIS OF MITIGATION ALTERNATIVES Perform a cost-benefit analysis of the mitigation alternatives. A useful framework and best practice for cost-benefit analysis is to apply the Seven Tiers of Disaster Recovery as formulated by SHARE and IBM in the 1990s. The Seven Tiers of Disaster Recovery are methods of keeping duplicate copies of business data as a means of providing for business continuity when disaster strikes. Assessment in the above phase enables all data items to gravitate to one of the tiers based on whether it is critical to the business, operationally important, or of an archival or historical nature. 4 The Seven Tiers of Disaster Recovery are: a. Tier 0 - Do Nothing The data item does not need to be backed up. b. Tier 1 - Offsite Vaulting Back up data is periodically moved to off site storage for safekeeping. c. Tier 2 - Offsite Vaulting with a Hotsite The off site location includes facilities with which to resume processing. d. Tier 3 - Electronic Vaulting Some data is automatically backed up into an electronic vault so that processing can resume without the need to wait for backups to be prepared. e. Tier 4 - Electronic Vaulting to Disaster Recovery Hotsite The facilities at the Hotsite are continually running to receive the Electronically Vaulted data. f. Tier 5 - Two-site Two-phase Commit - Data consistency is proactively maintained between production and Disaster Recovery sites. g. Tier 6 - Zero Data Loss Practices such as disk mirroring that produce high levels of data currency without dependence on applications or applications staff for confirmation. As noted in Phase II, critical data is that without which an important business function ceases it has the highest referential value and requires the highest level of access. Operationally important data is of moderate referential value and is used daily. It supports decision making, but loss of such data is viewed as only an inconvenience, not a showstopper. Archive data is likely 70% of a 4 A useful summary of cost-benefit analysis for disaster recovery alternatives is: Omar H. Alhazmi and Yashwant K. Malaiya, Assessing Disaster Recovery Alternatives: On-site, Colocation or Cloud. Colorado State University website, accessed 23 April 2014 at 4

7 business s storage. This is data that can be useful, but waiting for it to be recovered does not cause the business function to stop. 5 Critical, operational, and archive data types can bin most data elements, thus simplifying the process of selecting a disaster recovery strategy. 4.2 RELEVANT ENGINEERING DESIGN VARIABLES Additional aspects to consider when addressing the engineering design variables of data backup are: a. How often is the information accessed and modified? b. How quickly does the information need to be recovered? This is the determination of the Recovery Time Objective (RTO), a fundamental consideration in allocating disaster recovery resources. c. What are the capabilities of the inventory of existing backup tier(s)? d. Who is responsible for recovering the information? e. When s the right time to back up the information? This is the determination of the Recovery Point Objective (RPO) for each data item, a function of the Recovery Time Objective (RTO), above. f. Will the backup tier require an offsite component? 6 g. Will electronic vaults be required? h. Will hot backup be required? Once the financial cost-benefit is concluded, an enterprise might also consider an appropriate qualitative assessment in parallel with the financial rankings, such as Indirect Marketing Benefit or Training Value. When the candidate alternatives are arrived at, the enterprise is in a position to author a Design Basis Scoping Paper for the universe of acceptable mitigation alternatives. This step is the point at which the essential design parameters, boundaries, and budget limits are complete and the formal design process can proceed. 5.0 EXECUTION The above outlines the steps for ascertaining the importance of data so that resource allocation decisions can be made. Once complete and project execution is underway, the qualifiers to ensure a technically acceptable outcome exceed the usual past performance factors of a solicitation of interest. The ability of candidate suppliers to succeed comes down to the skills of individuals involved and their current ability to execute. One can make the case that trusted partnership would be a preferable alternative to competitive award. The technical differentiators and qualifiers are so detailed that they do not lend themselves to the high level qualification information normally elicited in solicitations of interest. Solicitations of interest simply do not delve into details like transaction logging, transaction backout and file reload with applied journaled transactions, and the intimate understanding of the relationships between applications 5 Scott Baker, Data Characterization Part 3 of 3. VM Maverick, the Lone Dissenter, 5 February Accessed 19 April 2014 at 6 Variables a-f come from: Scott Baker, Data Characterization Part 1 of 3. VM Maverick, the Lone Dissenter, 1 February Accessed 19 April 2014 at 5

8 and their data necessary to implement methods that support Recovery Point Objectives (RPO) reliably. Indeed, a necessary part of all business continuity management is the feedback loop of key performance indicators that comes out of regular drills or exercises of recovery procedures using data files retrieved from disaster recovery storage. The appropriate contract model for such activities is level of effort support from recognized subject matter experts to guide design, execution, and analysis of the results of the exercises and drills. 6

Have a Plan of ATTACK. Not a panic attack. 10 September 2003 IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement

Have a Plan of ATTACK. Not a panic attack. 10 September 2003 IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement IBM Software Group Have a Plan of ATTACK Not a panic attack 10 September 2003 IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement Abstract This session will show the difference between Business

More information

Advent. Disaster Recovery: Options for Investment Managers. A White Paper from Advent Software and CyGem Ltd. Advent Software, Inc.

Advent. Disaster Recovery: Options for Investment Managers. A White Paper from Advent Software and CyGem Ltd. Advent Software, Inc. Advent Disaster Recovery: Options for Investment Managers A White Paper from Advent Software and CyGem Ltd. Advent Software, Inc. This communication is provided by Advent Software, Inc. for informational

More information

DISASTER RECOVERY PLANNING GUIDE

DISASTER RECOVERY PLANNING GUIDE DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide

More information

Riverbed Whitewater/Amazon Glacier ROI for Backup and Archiving

Riverbed Whitewater/Amazon Glacier ROI for Backup and Archiving Riverbed Whitewater/Amazon Glacier ROI for Backup and Archiving November, 2013 Saqib Jang Abstract This white paper demonstrates how to increase profitability by reducing the operating costs of backup

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine

More information

Vital Records. Mary Hilliard, CRM

Vital Records. Mary Hilliard, CRM Vital Records Mary Hilliard, CRM Background Vital records of an organization must be identified so they can be protected Protection of vital records is a joint effort of records management and disaster

More information

FORMULATING YOUR BUSINESS CONTINUITY PLAN

FORMULATING YOUR BUSINESS CONTINUITY PLAN WHITE PAPER Page 0 Planning for the Worst Case Scenario: FORMULATING YOUR BUSINESS CONTINUITY PLAN 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of Contents Overview... 2 What is Disaster

More information

Computer-Aided Disaster Recovery Planning Tools (CADRP)

Computer-Aided Disaster Recovery Planning Tools (CADRP) Computer-Aided Disaster Recovery Planning Tools (CADRP) Omar H. Alhazmi Department of Computer Science Taibah University Medina, Saudi Arabia ohhazmi@taibahu.edu.sa Abstract Information Technology Disaster

More information

Business Continuity Plan

Business Continuity Plan Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions

More information

Does it state the management commitment and set out the organizational approach to managing information security?

Does it state the management commitment and set out the organizational approach to managing information security? Risk Assessment Check List Information Security Policy 1. Information security policy document Does an Information security policy exist, which is approved by the management, published and communicated

More information

July 30, 2009. Internal Audit Report 2009-08 Information Technology Business Continuity Plan Information Technology Department

July 30, 2009. Internal Audit Report 2009-08 Information Technology Business Continuity Plan Information Technology Department Internal Audit Report 2009-08 Introduction. The Municipality depends heavily on technology and automated information systems, and their disruption for even a few days could have a severe impact on critical

More information

CISM Certified Information Security Manager

CISM Certified Information Security Manager CISM Certified Information Security Manager Firebrand Custom Designed Courseware Chapter 4 Information Security Incident Management Exam Relevance Ensure that the CISM candidate Establish an effective

More information

Planning a Backup Strategy

Planning a Backup Strategy Planning a Backup Strategy White Paper Backups, restores, and data recovery operations are some of the most important tasks that an IT organization performs. Businesses cannot risk losing access to data

More information

Disaster Recovery and Business Continuity What Every Executive Needs to Know

Disaster Recovery and Business Continuity What Every Executive Needs to Know Disaster Recovery and Business Continuity What Every Executive Needs to Know Bruce Campbell & Sandra Evans Contents Why you need DR and BC What constitutes a Disaster? The difference between disaster recovery

More information

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0 MAJOR PROJECTS CONSTRUCTION SAFETY SECURITY MANAGEMENT PROGRAM STANDARD HS-09 Document Owner(s) Tom Munro Project/Organization Role Supervisor, Major Projects Safety & Security (Canada) Version Control:

More information

CIS 523/423 Disaster Recovery Business Continuity

CIS 523/423 Disaster Recovery Business Continuity CIS 523/423 Disaster Recovery Business Continuity Course Description A study of disaster recovery and business continuity as related to the information technology function in organizations. Topics will

More information

A GUIDE TO Business Continuity Planning and Disaster Recovery Solutions

A GUIDE TO Business Continuity Planning and Disaster Recovery Solutions A GUIDE TO Business Continuity Planning and Disaster Recovery Solutions Hybrid Hosting Experts Content INTRODUCTION 3 TIPS FOR PROTECTING YOUR BUSINESS 5 HOW MANAGED SERVICES PROVIDERS CAN HELP 6 UNITEDLAYER

More information

Disaster Recovery and Business Continuity Plan

Disaster Recovery and Business Continuity Plan Disaster Recovery and Business Continuity Plan Table of Contents 1. Introduction... 3 2. Objectives... 3 3. Risks... 3 4. Steps of Disaster Recovery Plan formulation... 3 5. Audit Procedure.... 5 Appendix

More information

Why cloud backup? Top 10 reasons

Why cloud backup? Top 10 reasons Why cloud backup? Top 10 reasons HP Autonomy solutions Table of contents 3 Achieve disaster recovery with secure offsite cloud backup 4 Free yourself from manual and complex tape backup tasks 4 Get predictable

More information

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL 7.1 ESTABLISH RESPONSIBILITY FOR ASSETS 1 GOAL Do you protect your organization s assets? 2 GOAL Do you use controls to protect your assets? 3 GOAL Do you account for your organization s assets? 4 GOAL

More information

Disaster Recovery with the Public Cloud and Whitewater Cloud Storage Gateways

Disaster Recovery with the Public Cloud and Whitewater Cloud Storage Gateways WHITE PAPER Disaster Recovery with the Public Cloud and Whitewater Cloud Storage Gateways Simplifying and making DR affordable and achievable Executive Summary The explosion of 24x7 connectivity and prevalence

More information

How to write a DISASTER RECOVERY PLAN. To print to A4, print at 75%.

How to write a DISASTER RECOVERY PLAN. To print to A4, print at 75%. How to write a DISASTER RECOVERY PLAN To print to A4, print at 75%. TABLE OF CONTENTS SUMMARY SUMMARY WHAT IS A DRP AND HOW CAN IT HELP MY COMPANY? CHAPTER PREPARING TO WRITE YOUR DISASTER RECOVERY PLAN

More information

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT Communications Company One Company s Supply Chain Transformation Journey INTERVIEWS Senior Manager Supply Chain Operations Strategy Manager Procurement

More information

Disaster Recovery Planning

Disaster Recovery Planning Disaster Recovery Planning NOW or NEVER Disaster Recovery Team Aura Advanced Technologies Aura Advanced Technologies Inc 1301-1121 Sixth Avenue SW Calgary, Alberta T2P 5J4 Phone: 403-269-6123 Fax: 403-269-6169

More information

How small and medium-sized enterprises can formulate an information security management system

How small and medium-sized enterprises can formulate an information security management system How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and

More information

Managed Backup A Strategic Network Consulting white paper

Managed Backup A Strategic Network Consulting white paper Managed Backup A Strategic Network Consulting white paper 2 Managed Backup Executive Summary Businesses survive disasters only if their data survives. But many business owners are so busy running day-to-day

More information

5 Essential Benefits of Hybrid Cloud Backup

5 Essential Benefits of Hybrid Cloud Backup 5 Essential Benefits of Hybrid Cloud Backup QBR is a backup, disaster recovery (BDR), and business continuity solution targeted to the small to medium business (SMB) market. QBR solutions are designed

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

REMOTE BACKUP-WHY SO VITAL?

REMOTE BACKUP-WHY SO VITAL? REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote

More information

New Clerk Academy. August 13, 2015

New Clerk Academy. August 13, 2015 New Clerk Academy August 13, 2015 Disaster Recovery OVERVIEW Presentation Agenda Introduction and Definitions DR Motivators and Drivers Recovery Challenges Scope of Disasters Components of Recovery Plans

More information

FINRMFS9 Facilitate Business Continuity Planning and disaster recovery for a financial services organisation

FINRMFS9 Facilitate Business Continuity Planning and disaster recovery for a financial services organisation Facilitate Business Continuity Planning and disaster recovery for a Overview This unit is suitable for those working in risk management roles who have responsibility for facilitating business continuity

More information

Best Practices in Disaster Recovery Planning and Testing

Best Practices in Disaster Recovery Planning and Testing Best Practices in Disaster Recovery Planning and Testing axcient.com 2015. Axcient, Inc. All Rights Reserved. 1 Best Practices in Disaster Recovery Planning and Testing Disaster Recovery plans are widely

More information

Backup and Recovery 1

Backup and Recovery 1 Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup

More information

Disaster Recovery 101. Sudarshan Ranganath & Matthew Phillips Ellucian

Disaster Recovery 101. Sudarshan Ranganath & Matthew Phillips Ellucian Disaster Recovery 101 Sudarshan Ranganath & Matthew Phillips Ellucian SESSION OBJECTIVES Business continuity is critical to every institution and its IT organization. How do you set up your ERP and other

More information

IF DISASTER STRIKES IS YOUR BUSINESS READY?

IF DISASTER STRIKES IS YOUR BUSINESS READY? 1 IF DISASTER STRIKES IS YOUR BUSINESS READY? DISASTER RECOVERY and BUSINESS CONTINUITY: WHAT YOU NEED TO KNOW Realize the Power of Technology Many business owners put off disaster planning, perhaps thinking

More information

Disaster Recovery Plan and Backup Strategy for a website

Disaster Recovery Plan and Backup Strategy for a website Disaster Recovery Plan and Backup Strategy for a website Sanjiv Agarwala CISSP,CISA,CISM,CGEIT,ITIL,MBCI,ISO27001,ISO9001 Director, Trainer and Principal Consultant Oxygen Consulting Services Pvt. Ltd.

More information

The Business Continuity Maturity Continuum

The Business Continuity Maturity Continuum The Business Continuity Maturity Continuum Nick Benvenuto & Brian Zawada Protiviti Inc. 2004 Protiviti Inc. EOE Agenda Terminology Risk Management Infrastructure Discussion A Proposed Continuity Maturity

More information

Business Continuity Glossary

Business Continuity Glossary Developed In Conjuction with Business Continuity Glossary ACTIVATION: The implementation of business continuity capabilities, procedures, activities, and plans in response to an emergency or disaster declaration;

More information

Business Continuity Planning and Disaster Recovery Planning

Business Continuity Planning and Disaster Recovery Planning 4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business

More information

Aligning Disaster Recovery and Business Continuity to Business Objectives. Session E7 John Jackson Fusion Risk Management, Inc.

Aligning Disaster Recovery and Business Continuity to Business Objectives. Session E7 John Jackson Fusion Risk Management, Inc. Aligning Disaster Recovery and Business Continuity to Business Objectives Session E7 John Jackson Fusion Risk Management, Inc. Topics Business Drivers Resilience Defined Your RPO is zero (or close to it!)

More information

The Big Bang: cloud resiliency and the data explosion

The Big Bang: cloud resiliency and the data explosion Deborah Orr, Forbes Insights Analyst Daniel Witteveen, Director, IBM Cloud Managed Backup and Data Virtualization 03/23/2015 The Big Bang: cloud resiliency and the data explosion 2015 IBM Corporation Agenda

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

Risk-Based Validation of Computer Systems Used In FDA-Regulated Activities

Risk-Based Validation of Computer Systems Used In FDA-Regulated Activities September 2, 2003 Risk-Based Validation of Computer Systems Used In FDA-Regulated Activities Purpose This document provides a summary of the requirements relating to use of computer-based systems in activities

More information

Which Backup Option is Best?

Which Backup Option is Best? Which Backup Option is Best? Which Backup Option is Best? Why Protect Your Data? Data loss disasters happen more frequently than you would think, for many different reasons: Human error and accidental

More information

Business Continuity Planning 101. +1 610 768-4120 (800) 634-2016 www.strohlsystems.com info@strohlsystems.com

Business Continuity Planning 101. +1 610 768-4120 (800) 634-2016 www.strohlsystems.com info@strohlsystems.com Business Continuity Planning 101 Presentation Overview What is business continuity planning Plan Development Plan Testing Plan Maintenance Future advancements in BCP Question & Answer What is a Disaster?

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Four

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Four Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Four Data Handling in University Business Impact Analysis ( BIA ) Agenda Overview Terminologies Performing

More information

ILM: Tiered Services & The Need For Classification

ILM: Tiered Services & The Need For Classification ILM: Tiered Services & The Need For Classification Edgar StPierre, EMC 2 SNW San Diego April 2007 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

How To Choose A Business Continuity Solution

How To Choose A Business Continuity Solution A Business Continuity Solution Selection Methodology Ellis Holman IBM Corp. Tuesday, March 13, 2012 Session Number 10387 Disclaimer Copyright IBM Corporation 2010. All rights reserved. U.S. Government

More information

SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY

SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY Among the priorities for efficient storage management is an appropriate protection architecture. This paper will examine how to architect storage

More information

Traditional Disaster Recovery versus Cloud based DR

Traditional Disaster Recovery versus Cloud based DR Traditional Disaster Recovery versus Cloud based DR May 2014 Executive Summary Many businesses want Disaster Recovery (DR) services to prevent either man-made or natural disasters from causing expensive

More information

Services Providers. Ivan Soto

Services Providers. Ivan Soto SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed

More information

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or

More information

Talk With Someone Live Now: (760) 650-2313. One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE

Talk With Someone Live Now: (760) 650-2313. One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE Prevent Data Loss with Remote Online Backup Service The U.S. National Archives & Records Administration states that

More information

SAFETY FIRST. Emerging Trends in IT Disaster Recovery. By Cindy LaChapelle, Principal Consultant. www.isg-one.com

SAFETY FIRST. Emerging Trends in IT Disaster Recovery. By Cindy LaChapelle, Principal Consultant. www.isg-one.com SAFETY FIRST Emerging Trends in IT Disaster Recovery By Cindy LaChapelle, Principal Consultant www.isg-one.com INTRODUCTION Against a backdrop of increasingly integrated and interdependent global service

More information

BC / DR Implementation Tying Disaster Recovery Investment to Measurable Business Value

BC / DR Implementation Tying Disaster Recovery Investment to Measurable Business Value BC / DR Implementation Tying Disaster Investment to Measurable Business Value Continuity Insights Conference May 16-18, 2005 Agenda Purpose Discuss best practice process and tools that might be leveraged

More information

White Paper. 1 800 FASTFILE / www.ironmountain.ca Page 1

White Paper. 1 800 FASTFILE / www.ironmountain.ca Page 1 White Paper LIVEVAULT Top 10 Reasons for Using Online Server Backup and Recovery Introduction Backup of vital company information is critical to a company s survival, no matter what size the company. Recent

More information

Disaster Recovery Design Through Collaboration and Creative Data Management

Disaster Recovery Design Through Collaboration and Creative Data Management Disaster Recovery Design Through Collaboration and Creative Data Management Bob Booth University of Illinois Urbana Champaign CITES Design Criteria - Constraints Budget constraints, not enough for: Equivalent

More information

The economics of IT risk and reputation

The economics of IT risk and reputation Global Technology Services Research Report Risk Management The economics of IT risk and reputation What business continuity and IT security really mean to your organization Findings from the IBM Global

More information

Title: Georgia Enterprise Technology Services Disaster Recovery Category: Disaster Recovery and Business Continuity Readiness Contact: Mr.

Title: Georgia Enterprise Technology Services Disaster Recovery Category: Disaster Recovery and Business Continuity Readiness Contact: Mr. NASCIO 2015 State IT Recognition Awards Title: Georgia Enterprise Technology Services Disaster Recovery Category: Disaster Recovery and Business Continuity Readiness Contact: Mr. Calvin Rhodes CIO, State

More information

Buyer s Guide Checklist - What to Look For in Online Backup and Recovery Services

Buyer s Guide Checklist - What to Look For in Online Backup and Recovery Services Introduction We are often asked, "How do I go about selecting an online data backup and recovery service?" Our Data Mountain White Paper answers that question and this accompanying Buyer s Guide Checklist

More information

Temple university. Auditing a business continuity management BCM. November, 2015

Temple university. Auditing a business continuity management BCM. November, 2015 Temple university Auditing a business continuity management BCM November, 2015 Auditing BCM Agenda 1. Introduction 2. Definitions 3. Standards 4. BCM key elements IT Governance class - IT audit program

More information

Disaster Recovery for Business-Critical Applications. Your business. Back in business. Real-time DR solutions you can rely upon when all else fails

Disaster Recovery for Business-Critical Applications. Your business. Back in business. Real-time DR solutions you can rely upon when all else fails Disaster Recovery for Business-Critical Applications Your business. Back in business. Real-time DR solutions you can rely upon when all else fails Disaster Recovery for Business-Critical Applications Your

More information

HA / DR Jargon Buster High Availability / Disaster Recovery

HA / DR Jargon Buster High Availability / Disaster Recovery HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster

More information

Top 10 Reasons for Using Disk-based Online Server Backup and Recovery

Top 10 Reasons for Using Disk-based Online Server Backup and Recovery ADVISORY Top 10 Reasons for Using Disk-based Online Server Backup and Recovery INTRODUCTION Backup of vital company information is critical to a company s survival, no matter what size the company. Recent

More information

Disaster Prevention and Recovery for School System Technology

Disaster Prevention and Recovery for School System Technology The Optimal Reference Guide: Disaster Prevention and Recovery for School System Technology Extraordinary insight into today s education topics Glynn D. Ligon, Ph.D., ESP Solutions Group Evangelina Mangino,

More information

An Overview of Business Continuity Planning

An Overview of Business Continuity Planning ExpEcting the UnExpEctEd: An Overview of Business Continuity Planning 9100 Olson Memorial Hwy Golden Valley, MN 55427 Office: (763) 201-8000 Email: info@integratedcom.net Executive Summary Disaster can

More information

Summary of CIP Version 5 Standards

Summary of CIP Version 5 Standards Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have

More information

Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery

Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery Disaster Recovery 1.1 Introduction Every day, there is the chance that some sort of business interruption, crisis, disaster, or emergency will occur. Anything that prevents access to key processes and

More information

Introducing: Infrascale VMware Backup

Introducing: Infrascale VMware Backup Introducing: Infrascale VMware Backup Agenda 1 2 Infrascale Overview: Our Platform, technology and solutions What Infrascale VMware Backup can do for you 3 How Infrascale stacks up: Competitive Pricing

More information

Taking a Proactive Approach to Crisis Management while Maintaining Business Continuity in a Tiered Environment

Taking a Proactive Approach to Crisis Management while Maintaining Business Continuity in a Tiered Environment Taking a Proactive Approach to Crisis Management while Maintaining Business Continuity in a Tiered Environment John Linse Director of Business Continuity Services, EMC 1 Setting the Stage Taking a Proactive

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

EMC E20-018. Exam Name: Virtualized Data Center and Cloud Infrastructure Design Specialist

EMC E20-018. Exam Name: Virtualized Data Center and Cloud Infrastructure Design Specialist EMC E20-018 Exam Name: Virtualized Data Center and Cloud Infrastructure Design Specialist http://www.exams.solutions/e20-018-exam-guide.html Product: Demo Question: 1 What is the first phase of the Virtual

More information

OIG. Improvements Are Needed for Information Technology Controls at the Las Vegas Finance Center. Audit Report OFFICE OF INSPECTOR GENERAL

OIG. Improvements Are Needed for Information Technology Controls at the Las Vegas Finance Center. Audit Report OFFICE OF INSPECTOR GENERAL OIG OFFICE OF INSPECTOR GENERAL Catalyst for Improving the Environment Audit Report Improvements Are Needed for Information Technology Controls at the Las Vegas Finance Center Report No. 2003-P-00011 May

More information

Here is the basic information needed in the contractors EP plan:

Here is the basic information needed in the contractors EP plan: Contract Monitor: The attached forms are used to answer the following questions regarding your contractor s emergency plan. If your contractor has already submitted their plan, there s no need for them

More information

With 57% of small to medium-sized businesses (SMBs) having no formal disaster

With 57% of small to medium-sized businesses (SMBs) having no formal disaster Disaster Recovery For Business Owners Practical Guidance for a Critical Operation With 57% of small to medium-sized businesses (SMBs) having no formal disaster recovery plan (Symantec, 2011), and 52% believing

More information

Interactive-Network Disaster Recovery

Interactive-Network Disaster Recovery Interactive-Network Disaster Recovery BACKGROUND IT systems are vulnerable to a variety of disruptions, ranging from mild (e.g., short-term power outage, disk drive failure) to severe (e.g., terrorism,

More information

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4 State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes

More information

What is Business Continuity Planning (BCP) / Disaster Recovery Plan(DRP)?

What is Business Continuity Planning (BCP) / Disaster Recovery Plan(DRP)? Workshop on System Audit of Banks BCP Workshop on System Audit of Banks What is Business Continuity Planning (BCP) / Disaster Recovery Plan(DRP)? - Preparedness of an organisation to ensure continuity,

More information

Business Continuity Business Impact Analysis arrangements

Business Continuity Business Impact Analysis arrangements Aberdeen City Council Internal Audit Report 2012/2013 for Aberdeen City Council May 2013 Business Continuity Business Impact Analysis arrangements Final Report Contents Section Page 1. Executive Summary

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

and the world is built on information

and the world is built on information Let s Build a Smarter Planet Starting with a more dynamic and the world is built on information Guy England Storage sales manager CEEMEA englag@ae.ibm.com Tel: +971 50 55 77 614 IBM Building a Smarter

More information

DISASTER RECOVERY: PLANNING AHEAD FOR BUSINESS CONTINUITY

DISASTER RECOVERY: PLANNING AHEAD FOR BUSINESS CONTINUITY DISASTER RECOVERY: PLANNING AHEAD FOR BUSINESS CONTINUITY OCTOBER 2012 Sponsored by Contingency planning for IT is a step businesses should take to ensure continuity and production in a state of emergency.

More information

William Rider Manager Disaster Recovery & Data Security The Johns Hopkins Health System & University

William Rider Manager Disaster Recovery & Data Security The Johns Hopkins Health System & University William Rider Manager Disaster Recovery & Data Security The Johns Hopkins Health System & University Competitive Leadership- Twelve Principles For Success Brian Billick Chapter 3 Be Be Prepared The time

More information

Preparing for the Worst: Disaster Recovery and Business Continuity Planning for Investment Firms An Eze Castle Integration ebook

Preparing for the Worst: Disaster Recovery and Business Continuity Planning for Investment Firms An Eze Castle Integration ebook Preparing for the Worst: Disaster Recovery and Business Continuity Planning for Investment Firms An Eze Castle Integration ebook Table of Contents 1. Introduction to Business Continuity Planning and Disaster

More information

Some companies never recover from a disaster related loss. A business that cannot operate will lose money, customers, credibility, and good will.

Some companies never recover from a disaster related loss. A business that cannot operate will lose money, customers, credibility, and good will. How Disaster Recovery Planning Can Be Leveraged For Electronic Discovery and Litigation Response Digital Discovery and e-evidence John Connell April 1. 2008 Hurricanes, floods, earthquakes, power outages,

More information

Backup Software? Article on things to consider when looking for a backup solution. 11/09/2015 Backup Appliance or

Backup Software? Article on things to consider when looking for a backup solution. 11/09/2015 Backup Appliance or 11/09/2015 Backup Appliance or Backup Software? Article on things to consider when looking for a backup solution. Ray Quattromini FORTUNA POWER SYSTEMS LTD T: 01256 782030 E: RAY@FORTUNADATA.COM W: WWW.FORTUNADATA.COM

More information

WHITE PAPER Achieving Continuous Data Protection with a Recycle Bin for File Servers. by Dan Sullivan. Think Faster. Visit us at Condusiv.

WHITE PAPER Achieving Continuous Data Protection with a Recycle Bin for File Servers. by Dan Sullivan. Think Faster. Visit us at Condusiv. WHITE PAPER Achieving Continuous Data Protection with a Recycle Bin for File Servers by Dan Sullivan 01_20131025 Think Faster. Visit us at Condusiv.com WITH A RECYCLE BIN FOR FILE SERVERS 2 Article 1:

More information

Cloud-integrated Storage What & Why

Cloud-integrated Storage What & Why Cloud-integrated Storage What & Why Table of Contents Overview...3 CiS architecture...3 Enterprise-class storage platform...4 Enterprise tier 2 SAN storage...4 Activity-based storage tiering and data ranking...5

More information

CISM ITEM DEVELOPMENT GUIDE

CISM ITEM DEVELOPMENT GUIDE CISM ITEM DEVELOPMENT GUIDE Updated January 2015 TABLE OF CONTENTS Content Page Purpose of the CISM Item Development Guide 3 CISM Exam Structure 3 Writing Quality Items 3 Multiple-Choice Items 4 Steps

More information

Vital Records Identification, Protection, and Disaster Recovery June 16, 2009. Wess Jolley, CRM, Records Manager 1

Vital Records Identification, Protection, and Disaster Recovery June 16, 2009. Wess Jolley, CRM, Records Manager 1 Pre-Session Handouts University of Kentucky: May 15, 2001 Business Card Slides Risk Assessment Site Survey Records Classifications Disaster Recovery Kit Contents Vital Records Schedule Form Salvage of

More information

GRM. Digital Document Management. eaccess

GRM. Digital Document Management. eaccess Digital Document Management eaccess Your Total Information Management Portal We call eaccess your virtual record center because it brings all your information, whether a scanned image, an inventory report

More information

Restoration Technologies. Mike Fishman / EMC Corp.

Restoration Technologies. Mike Fishman / EMC Corp. Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Mike Fishman / EMC Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless

More information

WHY CLOUD BACKUP: TOP 10 REASONS

WHY CLOUD BACKUP: TOP 10 REASONS WHITE PAPER DATA PROTECTION WHY CLOUD BACKUP: TOP 10 REASONS Contents REASON #1: Achieve disaster recovery with secure offsite cloud backup REASON #2: Freedom from manual and complex tape backup tasks

More information

a Disaster Recovery Plan

a Disaster Recovery Plan Construction of a Disaster Recovery Plan David Godwin, Sr. Sales Engineer March 18, 2014 Objectives Understand What Disaster Recovery is? Why is Disaster Recovery Needed? Effectively assist customers or

More information

WHITE PAPER. The 5 Critical Steps for an Effective Disaster Recovery Plan

WHITE PAPER. The 5 Critical Steps for an Effective Disaster Recovery Plan WHITE PAPER The 5 Critical Steps for an Effective Disaster Recovery Plan 2 WHITE PAPER The 5 Critical Planning Steps For An Effective Disaster Recovery Plan Introduction In today s climate, most enterprises

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

The Weill Cornell Medical College and Graduate School of Medical Sciences. Responsible Department: Information Technologies and Services (ITS)

The Weill Cornell Medical College and Graduate School of Medical Sciences. Responsible Department: Information Technologies and Services (ITS) Information Technology Disaster Recovery Policy Policy Statement This policy defines acceptable methods for disaster recovery planning, preparedness, management and mitigation of IT systems and services

More information

Whitepaper. Disaster Recovery as a Service (DRaaS): A DR solution for all

Whitepaper. Disaster Recovery as a Service (DRaaS): A DR solution for all Whitepaper Disaster Recovery as a Service (DRaaS): A DR solution for all Disaster Recovery as a service: A DR solution for all Disaster Recovery (DR) is more important today than ever before. Why? Because

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Digital Media Storage

Digital Media Storage Summary State and local governments use computers to create, capture, or maintain public records. To be accountable to the citizens of Minnesota, government agencies are required by law to keep records

More information