Beyond Disaster Recovery: The Business Resilience Transformation Methodology

Size: px
Start display at page:

Download "Beyond Disaster Recovery: The Business Resilience Transformation Methodology"

Transcription

1 Beyond Disaster Recovery: The Business Transformation Methodology Richard Cocchiara Chief Technology Officer for Business IBM Global Services (845)

2 Agenda A definition of resiliency Trends in the marketplace results in a new approach Regulations and impacts on continuity What should we do from here? 2

3 The evolution of our industry has been led by advancements in technology, and businesses dependency on that technology. As the embedded use, and pervasive adoption of information technology has intensified, IT has become inseparable from the operational performance of the business. Management awareness of this is on the rise. As such, information based risk is being added as a focus item in corporate risk management programs. Business Resiliency Business Continuity Business Recovery Traditional Disaster Recovery Future 3

4 What is business resilience? Business resilience is the ability to rapidly adapt and respond to risks, as well as opportunities, in order to maintain continuous business operations, be a more trusted partner, and enable growth. 4

5 is a shift from short-term reactions to a long-term commitment to the business from reactive recovery to proactive adaptability. How prepared is your business to scale up or down when something unexpected happens? How do you train your staff to handle this? When was the last time you tested this ability? How would your business results be impacted if your company could reconfigure their business processes and infrastructure on demand to respond to changing market dynamics? To what degree are your business and technology infrastructures capable of supporting and protecting current and future business strategies and initiatives? How confident are you that your business processes and technology infrastructure are aligned with your company s strategy and organization? 5

6 IBM Global Services Based on our experience, we have identified six key layers of enterprises that must be addressed to achieve business resilience Organization Processes Applications and Data Technology Business Strategy and Vision Facilities 6

7 Various stressors can test the resiliency of your business Environmental Natural Disasters Workplace Issues Contaminations / Fuel Spills Technological IT Infrastructure Technology Adoption Innovation and Trends 24x7 Expectations Economic Global Marketplace Partners/Suppliers Demand Elasticity Social Terrorism Cyber Attacks Biological Threats Employee Sabotage Industrial Espionage Political Regulation Deregulation Incentives Legal 7

8 Regardless of the catalyst, the impacts can be extreme and can affect your entire extended enterprise. Revenue Market share Customer loyalty Reputation and brand equity Competitiveness Productivity Security Credit Goodwill and trust 8

9 We re seeing new events that are challenging our traditional perspective of unplanned outages. Tsunami hits Asia Event Chinese government takes action to stop SARs epidemic Malicious computer worm hits 13,000 ATMs at Bank of America Disintegration of Enron Toronto Dominion loses ABM network due to system malfunction Terrorist attacks of September 11th Victoria s Secret internet website problems during the Super Bowl Date Impact Over 200 thousand people die and tests the governments ability to respond Scores of businesses affected when government quarantines buildings Bank unable to process customer transactions; impacted Internet traffic worldwide Affects energy markets worldwide, leads to new regulations on corporate financial reporting Major disruption to retail sales during start of holiday season Impacts the local economy of Lower Manhattan, travel and hospitality industry, financial markets worldwide for over 6 months; leads to war on terrorism and to war in Iraq Systems crash when capacity unavailable to keep up with user demands resulting in very public outage 9

10 Those events have driven trends which are affecting customer needs for business resilience solutions. Awareness of interdependencies, both infrastructure and business based Developing strategies for dealing with the data explosion Anticipating a primary facility loss Designing an architecture that is flexible with ample capacity for growth Planning contingencies for the potential loss or unavailability of personnel Integrating dedicated solutions into the strategy Impacts of an Internet outage Complying with industry regulations Satisfying customer expectations for 24x7 availability Integration of recovery, continuity, high availability and security 10

11 The importance of these trends has evolved with experience. Factors Interdependencies Data Availability Primary Facility Loss Staff Available The Internet and Cyber Attacks (24x7 availability) Regulations Dedicated Solutions Discipline Integration Anticipated Importance Not an Issue Before High Low Medium Low Low Low Low Realized Importance Crucial High Medium High High High Medium Medium 11

12 To address these trends, businesses are now integrating 4 disciplines: recovery, continuity, availability and security - to achieve business resilience in an on demand world. Customer Data Center IBM Recovery Center Networks Business Today and Tomorrow Customer Business Center Internal Recovery Center 5 Years Ago Customer Data Center IBM Recovery Center Business Continuity 15 Years Ago Customer Data Center IBM Recovery Center IT Recovery 12

13 IBM has distilled these trends down to a core set of requirements necessary to achieve resilience. Continuity of business operations Regulatory compliance Security, privacy and data protection Integrated risk management Knowledge, expertise and skills Market readiness Improves your ability to maintain continuous business operations by building processes and infrastructures that are responsive, highly available and scalable. Helps you comply with government and industry regulations and standards. Helps you protect and manage the existence, integrity, accessibility, privacy and confidentiality of data, critical information, systems and physical resources. Increases the effectiveness of your overall risk management programs by taking a unified and governed approach. Improves the resilience of your business through the transfer of IBM knowledge and skills, or by utilizing IBM resources. Enhances your ability to sense and respond to changes in customer demands or market opportunities to stay competitive and grow. 13

14 In each industry, business resilience helps address specific issues. Banking Retail Insurance Industry Transportation Electronics Pharma- Life Sciences Consumer Products Media & Entertainment Healthcare Providers Financial Markets Industry Specific Messages For Transportation, Business is the ability to maintain continuous passenger and cargo operations that deliver to the right destination, safely, profitably, and on-time. For Electronics Manufacturers, Business is the ability to maintain continuous manufacturing and service operations, protect their designs/ software, incorporate new technologies, and avoid commoditization. For Banking, Business is the ability to maintain customer trust, compliance, and continuous Banking operations. For Retail, Business is the ability to maintain continuous supply chain and store operations. For Pharma/ Life Sciences, Business is the ability to maintain continuous and compliant drug discovery, and high quality manufacturing. For Consumer Products, Business is the ability to maintain an operational supply chain, brand value, and product quality. For Media and Entertainment, Business is the ability to maintain continuous production operations for editorial, broadcasting, and publishing. For Healthcare Providers, Business is the ability to reduce medical errors, comply with regulations, maintain continuous Hospital operations, control costs, and attract patients. For Insurance, Business is the ability to maintain continuous business operations at central, regional, and thousands of agent offices. For the Securities Brokerages, Business is the ability to maintain continuous trading, settlement, and customer service operations. Sources: IDC 28649, December 2002; IDC 2003 Spending in Vertical, Jan 9, 2003; IDC 29066, March

15 But no matter what industry, a step-by-step approach to understanding risks and developing an integrated transformation program is required to help a company become more resilient. Prioritize business resilience needs Establish risk tolerance Evaluate resiliency capabilities Rehearse and review resilience program Plan for business resilience Design a resilient architecture Manage to resilience objectives Implement the architecture 15

16 The transformation begins with identifying critical resources and a thorough impact assessment to help frame what portions of the business need to be secured. Business Lifecycle Assess Plan Execute Identify Resource/ Asset Inventory Reach & Prioritize Business Resource Needs Impact of Actual Outage Range Report Establish Risk Impact of Presumed Outage Tolerance Strategy, Design & Implement Manage and Rehearse 16

17 The next step is to identify and assess risks to those functions deemed critical to the business. Business Lifecycle Assess Plan Execute Identify Threats & Security Risks Risk & Vulnerability Establish Risk Tolerance Validate the Information Report Evaluate Analyze Responses Capabilities Strategy, Design & Implement Manage and Rehearse 17

18 A typical starter list of threats that should be analyzed include the following: Earthquake Volcanic Activity Major Landslide/Mudslide Subsidence Faulting Upstream Dam/Reservoir Failure Seasonal/Local Flooding Tidal Flooding Tsunami (Tidal Wave) Tornado Hurricane/Typhoon Tropical Storm Snow/Ice Storm/Blizzard High Winds (70+mph) Sand Storm Meteor Impact Act of War: Conventional Act of War: Nuclear Sabotage: Internal Physical Sabotage: Internal & External Data Software Sabotage: External Physical Market Epidemic Medical Emergency Radioactive Contamination Fire: Internal - Catastrophic Fire: Internal - Major Fire: Internal - Minor Aircraft Crash Toxic Contamination Plumbing Failure Water Leakage Fire: External Accidental Explosion: Off-site Accidental Explosion: On-site Power Outage: External Power Outage: Internal Power Fluctuation Vandalism Labor Dispute/Strike Riot/Civil Disorder Bomb Threat & Bombing Arson Hostage Taking HVAC Failure Transient Inadequacy Central Computer Equipment Failure Ancillary Equipment Failure Telecommunications Failure (Data) Voice Communications Equipment Failure Media Failure Purchased Software Failure Human Error: Operations & Prgmers Human Error: Users Human Error: Maintenance Loss of Resources Theft: Data Theft: Physical Assets ($250+) Fraud/Embezzlement People Safety Measures Suspicious Package Handling Bio-terrorism Capacity Planning Operational Regulatory 18

19 After understanding what threats may apply to your critical business functions, a thorough examination of your current capabilities to mitigate those threats or risks is required. Business Lifecycle Assess Plan Execute Select Risks to be Mitigated Evaluate Capabilities Evaluate Using the BR Layers Compare Assessment Report Strategy, Design & Implement Manage and Rehearse To Best-in-class 19

20 We have identified six key Business layers that expand into over 130 components in an enterprises. Each must be addressed to achieve business resilience. Governance strategy Financial strategy Security strategy Availability strategy Communications strategy New product/services strategy Risk management Business Process Sales order Finance and accounting Enterprise resource planning Customer relationship management Supply chain management Quality management Research and development IT Process Change management Problem management Incident management Availability management Strategy and Vision Organization Processes Applications and Data Technology Facilities Business Physical and logical security Access controls Power protection Environmental considerations Roles and responsibilities Structures Human resource management Skills Cross-organizational cooperation Data and application security Data storage Application architecture and design Backup and recovery Hardware architectures System software Middleware Networks 20

21 Following a complete analysis and assessment of current capabilities, a plan is then designed that sets a roadmap for achieving Business. Business Lifecycle Assess Plan Execute Initial Strategy Strategy Needs, Risks & Capabilities Plan for Business Alternative Strategies Plan Business Architecture Manage and Rehearse Business Design Roadmap 21

22 After a strategy is chosen, a solution architecture is designed that meets the Business needs of the enterprise. Business Lifecycle Assess Plan Execute Conceptual Design Resilient Architecture Needs, Risks & Capabilities Resilient Architecture Design Solution Design Implement the solution Manage and Rehearse Solution Design 22

23 To build a resilient architecture, specific issues should be addressed Governance Program Execution Business Justification Resilient Architecture Design Solution Design Systems Management Business and Financial Justification - Concurrence among business executives - Explanation to internal and external audit groups Governance / Authority / Policies - Communication, mission, discipline Solution Design - Related IT functions (e.g., service desk) - Unrelated business functions Maturity of Systems Management Disciplines - Problem, change, configuration, incident Security - Physical and logical Applications Facilities Security Application - Data protection, backup, restart, synchronization Program Execution - Reporting, roles and responsibilities, public relations, business integration, plan invocation Facilities - Location, management, security, availability 23

24 The implementation phase of the methodology may select from many different solutions, all designed to meet the needs of the overall architecture design and ensure business resilience. Business Lifecycle Assess Plan Execute Strategy Solutions Organization Solutions Needs, Risks & Capabilities Implement Enterprise Solution Process Solutions Apps & Data Solutions Technology Solutions Implementation Project Plan Manage and Rehearse Facility Solutions 24

25 A resilient architecture must accommodate multiple characteristics across the six layers of your enterprise Strategy & Vision Crisis management process Executive knowledge of resilience capabilities Change management process Articulated governance model Supplier awareness of requirements used as competitive advantage Clearly articulated security policy Organization Geographic diversity of staff Call trees and notification Backups of workstation data Articulated roles and responsibilities Identified command center Processes Applications & Data Technology Facilities Identification of most critical processes Integrated contingencies Split of phone support/call center Mirroring for critical data Remote backup for 2 nd tier Regular audit of backup Mirror login and authentication GDPS for mainframe High availability cluster multiprocessing Diverse power sources Diverse network access points UPS with 2+ hours Diesel generator Split of functions Key links with external companies ITIL and CobiT standards implemented Integration into help desk/monitoring Information Life Cycle Management Database (DB2, Oracle) failover & standby Identity management filtering and recovery Blade servers dynamic configuration Availability extra components Grid computing for high-intensity apps 24x7 monitoring of IDS logs Secondary location +50 miles Managed 24x7 physical security Biometrics 25

26 After implementation, managing the solution architecture becomes critical to execution and continued business resilience. Business Lifecycle Assess Plan Execute Needs, Risks & Capabilities Plan, Design & Implement Manage the Solution Business Program Business Reporting Rehearse & Review the Program 26

27 Program Management Report Hierarchy Provides executives the insight into the program in a concise and succinct manner. Management Briefing Booklet Year-to-year comparison of results Next Quarter Program Objectives Intra-Division Benchmarks Test Results Application Report Cards Technology Review Report Initiatives projected for next year ramifications of initiatives Suggested focus areas of program Strategy Definition Report Summary of technical resilience requirements Recommended resilience strategies Cost estimate for recommendations Criticality Analysis Summary Report Priority of business processes Rationale for priority # of applications by recovery tier Program Status Report Prior week s achievements Issues or problems Future week s activities Post Exercise Summary Report Tasks completed during test Duration of tasks vs. estimates Problem log Suggestions for efficiencies 27

28 Part of any effective Business Program is testing it to ensure it will work when you need it. Business Lifecycle Assess Plan Execute Exercise Planning Needs, Risks & Capabilities Plan, Design & Implement Rehearse & Review the Program Technical Procedure Review Business Testing Report Exercise Execution 28

29 Since so much is at stake, businesses cannot afford to wait. The old paradigm was Experience and React - Things happen - We react - The organization is affected The new way of thinking must be to Anticipate and Adjust - Things still happen, but their effect is neutralized - The organization sees or feels no effect 29

30 Thank you

Beyond disaster recovery: becoming a resilient business.

Beyond disaster recovery: becoming a resilient business. IBM Global Services October 2005 Beyond disaster recovery: becoming a resilient business. An object-oriented framework and methodology by Richard Cocchiara Chief technology officer for business resilience

More information

Prepared by Rod Davis, ABCP, MCSA November, 2011

Prepared by Rod Davis, ABCP, MCSA November, 2011 Prepared by Rod Davis, ABCP, MCSA November, 2011 Disaster an event, which causes the loss of an essential service, or part of it, for a length of time which imperils mission achievement. (Andrew Hiles,

More information

Assessing Your Disaster. Andrews Hooper Pavlik PLC. Andrews Hooper Pavlik PLC

Assessing Your Disaster. Andrews Hooper Pavlik PLC. Andrews Hooper Pavlik PLC Assessing Your Disaster Recovery Plans Gregory H. Soule, CPA, CISA, CISSP, CFE Andrews Hooper Pavlik PLC Andrews Hooper Pavlik PLC Agenda Business Continuity Concepts Impact Analysis Risk Assessment Risk

More information

Table of Contents... 1

Table of Contents... 1 ... 1 Chapter 1 Introduction... 4 1.1 Executive Summary... 4 1.2 Goals and Objectives... 5 1.3 Senior Management and Board of Directors Responsibilities... 5 1.4 Business Continuity Planning Processes...

More information

Why Should Companies Take a Closer Look at Business Continuity Planning?

Why Should Companies Take a Closer Look at Business Continuity Planning? whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters

More information

Using the Cloud for Business Resilience

Using the Cloud for Business Resilience Allen Downs IBM Business Continuity and Resiliency Services Using the Cloud for Business Resilience June 20, 2011 1 Agenda Why resiliency matters A successful cloud-based approach to resiliency Moving

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

EMERGENCY PREPAREDNESS PLAN Business Continuity Plan

EMERGENCY PREPAREDNESS PLAN Business Continuity Plan EMERGENCY PREPAREDNESS PLAN Business Continuity Plan GIS Bankers Insurance Group Powered by DISASTER PREPAREDNESS Implementation Small Business Guide to Business Continuity Planning Surviving a Catastrophic

More information

Business Continuity Planning. Presentation and. Direction

Business Continuity Planning. Presentation and. Direction Business Continuity Planning Presentation and Direction Thomas Bronack, president Data Center Assistance Group, Inc. 15180 20 th Avenue Whitestone, NY 11357 Phone: (718) 591-5553 Email: bronackt@dcag.com

More information

Business Continuity Planning in IT

Business Continuity Planning in IT Introduction: Business Continuity Planning in IT The more your business relies on its IT systems, the more you need to consider how unexpected disruptions might affect your business. These disruptions

More information

How To Back Up A Virtual Machine

How To Back Up A Virtual Machine 2010 Symantec Disaster Recovery Study Global Results Methodology Applied Research performed survey 1,700 enterprises worldwide 5,000 employees or more Cross-industry 2 Key Findings Virtualization and Cloud

More information

With the large number of. How to Avoid Disaster: RIM s Crucial Role in Business Continuity Planning. Virginia A. Jones, CRM, FAI RIM FUNDAMENTALS

With the large number of. How to Avoid Disaster: RIM s Crucial Role in Business Continuity Planning. Virginia A. Jones, CRM, FAI RIM FUNDAMENTALS How to Avoid Disaster: RIM s Crucial Role in Business Continuity Planning The world has experienced a great deal of natural and man-made upheaval and destruction in the past few years, including tornadoes,

More information

Business Continuity Plan

Business Continuity Plan Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions

More information

IT Governance and IT Operations Bizdirect, Mainroad, WeDo, Saphety Lisbon, Portugal October 2 2008

IT Governance and IT Operations Bizdirect, Mainroad, WeDo, Saphety Lisbon, Portugal October 2 2008 IT Governance and IT Operations Bizdirect, Mainroad, WeDo, Saphety Lisbon, Portugal October 2 2008 Jan Duffy, Research Director Industry Insights Agenda About IDC Insights Today s organizational complexities

More information

Beyond disaster recovery: becoming a resilient business.

Beyond disaster recovery: becoming a resilient business. IBM Global Services October 2005 Beyond disaster recovery: becoming a resilient business. An object-oriented framework and methodology by Richard Cocchiara Chief technology officer for business resilience

More information

www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014

www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014 www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014 Agenda Key Definitions Risks Business Continuity Management Program BCM Capability Assessment Process BCM Value Proposition

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity

KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity INFORMATION RISK MANAGEMENT KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity ADVISORY Contents Agenda: Global trends and BCM

More information

Company Management System. Business Continuity in SIA

Company Management System. Business Continuity in SIA Company Management System Business Continuity in SIA Document code: Classification: Company Project/Service Year Document No. Version Public INDEX 1. INTRODUCTION... 3 2. SIA S BUSINESS CONTINUITY MANAGEMENT

More information

Audit, Finance and Legislative Committee Mayor Craig Lowe, Chair Mayor-Commissioner Pro Tem Thomas Hawkins, Member

Audit, Finance and Legislative Committee Mayor Craig Lowe, Chair Mayor-Commissioner Pro Tem Thomas Hawkins, Member City of Gainesville Inter-Office Communication April 3, 2012 TO: FROM: SUBJECT: Audit, Finance and Legislative Committee Mayor Craig Lowe, Chair Mayor-Commissioner Pro Tem Thomas Hawkins, Member Brent

More information

Business Continuity Management

Business Continuity Management Business Continuity Management cliftonlarsonallen.com Introductions Brian Pye CliftonLarsonAllen Senior Manager Business Risk Services group 15 years of experience with Business Continuity Megan Moore

More information

Interactive-Network Disaster Recovery

Interactive-Network Disaster Recovery Interactive-Network Disaster Recovery BACKGROUND IT systems are vulnerable to a variety of disruptions, ranging from mild (e.g., short-term power outage, disk drive failure) to severe (e.g., terrorism,

More information

Disaster Recovery & Business Continuity Dell IT Executive Learning Series

Disaster Recovery & Business Continuity Dell IT Executive Learning Series Disaster Recovery & Business Continuity Dell IT Executive Learning Series Presented by Rich Armour, Debi Higdon & Mitchell McGovern THIS PRESENTATION SUMMARY IS FOR INFORMATIONAL PURPOSES ONLY AND MAY

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

Building Economic Resilience to Disasters: Developing a Business Continuity Plan

Building Economic Resilience to Disasters: Developing a Business Continuity Plan Building Economic Resilience to Disasters: Developing a Business Continuity Plan Buffalo Niagara Region February 26, 2014 Gail Moraton, CBCP Business Resiliency Manager Business Resiliency one important

More information

Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery

Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery Disaster Recovery 1.1 Introduction Every day, there is the chance that some sort of business interruption, crisis, disaster, or emergency will occur. Anything that prevents access to key processes and

More information

Stop Reacting; Start Anticipating Disasters BEFORE They Occur Using Predictive Analytics

Stop Reacting; Start Anticipating Disasters BEFORE They Occur Using Predictive Analytics Source: IBM CIO s are struggling to address board level requirements that are vastly different from what they were responsible for just 5 years ago. Stop Reacting; Start Anticipating Disasters BEFORE They

More information

Table of contents. Providing continuity for your key business processes. A white paper on HP s Business Continuity and Availability Solutions

Table of contents. Providing continuity for your key business processes. A white paper on HP s Business Continuity and Availability Solutions Providing continuity for your key business processes A white paper on HP s Business Continuity and Availability Solutions Table of contents Executive summary...2 Reducing business risks...3 Availability

More information

Cisco Disaster Recovery: Best Practices White Paper

Cisco Disaster Recovery: Best Practices White Paper Table of Contents Disaster Recovery: Best Practices White Paper...1 Introduction...1 Performance Indicators for Disaster Recovery...1 High Level Process Flow for Disaster Recovery...2 Management Awareness...2

More information

Table of contents. Maintaining Continuity of Operations with a Disaster Tolerance Strategy

Table of contents. Maintaining Continuity of Operations with a Disaster Tolerance Strategy Maintaining Continuity of Operations with a Disaster Tolerance Strategy IT risks must now be considered as serious as any other significant business risk. Business white paper Table of contents Executive

More information

HA / DR Jargon Buster High Availability / Disaster Recovery

HA / DR Jargon Buster High Availability / Disaster Recovery HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster

More information

One major business challenge is maintaining and improving the efficiency and effectiveness of a company s information technology. Wouldn t it be nice

One major business challenge is maintaining and improving the efficiency and effectiveness of a company s information technology. Wouldn t it be nice Contents Managed IT Services Life Cycle Why ProActive SM Outsource Your IT Function Professional Services How Does It Work? How Do You Benefit? Disaster Recovery/Back-up Business Partners ANALYZE MANAGE

More information

Supporting information technology risk management

Supporting information technology risk management IBM Global Technology Services Thought Leadership White Paper October 2011 Supporting information technology risk management It takes an entire organization 2 Supporting information technology risk management

More information

Business Continuity Management Systems. Protecting for tomorrow by building resilience today

Business Continuity Management Systems. Protecting for tomorrow by building resilience today Business Continuity Management Systems Protecting for tomorrow by building resilience today Vital statistics 31% 40% of UK businesses have been affected by bad weather related transport problems, power

More information

Federal Financial Institutions Examination Council FFIEC BCP. Business Continuity Planning FEBRUARY 2015 IT EXAMINATION H ANDBOOK

Federal Financial Institutions Examination Council FFIEC BCP. Business Continuity Planning FEBRUARY 2015 IT EXAMINATION H ANDBOOK Federal Financial Institutions Examination Council FFIEC Business Continuity Planning BCP FEBRUARY 2015 IT EXAMINATION H ANDBOOK Table of Contents Introduction 1 Board and Senior Management Responsibilities

More information

Office of Information Technology

Office of Information Technology Office of Information Technology Core Services Resilience Plan Version 6.5.6 March 2010 Page 1 of 13 Table of Contents Overview... 3 Background... 4 OIT Organizational Resilience Program... 4 Data Centers...

More information

Business Continuity Trends and Risk Considerations Financial Executives International Portland Chapter June 12 2013

Business Continuity Trends and Risk Considerations Financial Executives International Portland Chapter June 12 2013 Business Continuity Trends and Risk Considerations Financial Executives International Portland Chapter June 12 2013 Chitra Gopalakrishnan Director KPMG LLP Agenda Introduction Business Continuity / Disaster

More information

ISACA Kampala Chapter Feb 2011. Bernard Wanyama Syntech Associates Limited

ISACA Kampala Chapter Feb 2011. Bernard Wanyama Syntech Associates Limited ISACA Kampala Chapter Feb 2011 Bernard Wanyama Syntech Associates Limited Agenda 1. ERP: What is it? 2. ERP: Examples 3. Security: Definitions, Triads & Frameworks 4. Security: Control Framework 5. Traditional

More information

Risk mitigation for business resilience White paper. A comprehensive, best-practices approach to business resilience and risk mitigation.

Risk mitigation for business resilience White paper. A comprehensive, best-practices approach to business resilience and risk mitigation. Risk mitigation for business resilience White paper A comprehensive, best-practices approach to business resilience and risk mitigation. September 2007 2 Contents 2 Overview: Why traditional risk mitigation

More information

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a

More information

Business Continuity Planning for Risk Reduction

Business Continuity Planning for Risk Reduction Business Continuity Planning for Risk Reduction Ion PLUMB ionplumb@yahoo.com Andreea ZAMFIR zamfir_andreea_ileana@yahoo.com Delia TUDOR tudordelia@yahoo.com Faculty of Management Academy of Economic Studies

More information

Risk Assessment Guide

Risk Assessment Guide KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment

More information

New Clerk Academy. August 13, 2015

New Clerk Academy. August 13, 2015 New Clerk Academy August 13, 2015 Disaster Recovery OVERVIEW Presentation Agenda Introduction and Definitions DR Motivators and Drivers Recovery Challenges Scope of Disasters Components of Recovery Plans

More information

Total Business Continuity with Cyberoam High Availability

Total Business Continuity with Cyberoam High Availability White paper Cyberoam UTM Total Business Continuity with Cyberoam High Availability Companies, big and small, must ensure constant availability of their company's network and data and prepare themselves

More information

Federal Financial Institutions Examination Council FFIEC. Business Continuity Planning BCP MARCH 2003 MARCH 2008 IT EXAMINATION

Federal Financial Institutions Examination Council FFIEC. Business Continuity Planning BCP MARCH 2003 MARCH 2008 IT EXAMINATION Federal Financial Institutions Examination Council FFIEC Business Continuity Planning MARCH 2003 MARCH 2008 BCP IT EXAMINATION H ANDBOOK TABLE OF CONTENTS INTRODUCTION... 1 BOARD AND SENIOR MANAGEMENT

More information

Western Intergovernmental Audit Forum

Western Intergovernmental Audit Forum Western Intergovernmental Audit Forum Business Continuity & Disaster Recovery Planning September 12, 2013 Presented by: City of Phoenix City Auditor Department Aaron Cook, Sr Internal Auditor IT Audit

More information

Preparing for the HIPAA Security Rule

Preparing for the HIPAA Security Rule A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

IT Disaster Recovery Plan Template

IT Disaster Recovery Plan Template HOPONE INTERNET CORP IT Disaster Recovery Plan Template Compliments of: Tim Sexton 1/1/2015 An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned

More information

Business Continuity Planning. Donna Curran, Director Audit and Risk Management February, 2014

Business Continuity Planning. Donna Curran, Director Audit and Risk Management February, 2014 Business Continuity Planning Donna Curran, Director Audit and Risk Management February, 2014 Agenda Business Continuity Defined The Importance of a Plan Determining the Costs Business Impact Analysis MTO,

More information

Building and Maintaining a Business Continuity Program

Building and Maintaining a Business Continuity Program Building and Maintaining a Business Continuity Program Successful strategies for financial institutions for effective preparation and recovery Table of Contents Introduction...3 This white paper was written

More information

Business Continuity and Disaster Recovery Planning from an Information Technology Perspective

Business Continuity and Disaster Recovery Planning from an Information Technology Perspective Business Continuity and Disaster Recovery Planning from an Information Technology Perspective Presenter: David Bird, Director of Sales, Business Technology Consultant phone: 215-672-7100 email: dbird@quatro.com

More information

CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT

CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT JANUARY 2008 GUIDELINE ON BUSINESS CONTINUITY GUIDELINE CBK/PG/14

More information

HP Business Continuity Services. Is your business agile enough to respond to whatever comes your way?

HP Business Continuity Services. Is your business agile enough to respond to whatever comes your way? HP Business Continuity Services Is your business agile enough to respond to whatever comes your way? Ask the right questions. If your business is like most others today, its success depends heavily on

More information

DISASTER RECOVERY PLANNING GUIDE

DISASTER RECOVERY PLANNING GUIDE DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide

More information

A risky business. Why you can t afford to gamble on the resilience of business-critical infrastructure

A risky business. Why you can t afford to gamble on the resilience of business-critical infrastructure A risky business Why you can t afford to gamble on the resilience of business-critical infrastructure Banking on a computer system that never fails? Recent failures in the retail banking system show how

More information

The Big Bang: cloud resiliency and the data explosion

The Big Bang: cloud resiliency and the data explosion Deborah Orr, Forbes Insights Analyst Daniel Witteveen, Director, IBM Cloud Managed Backup and Data Virtualization 03/23/2015 The Big Bang: cloud resiliency and the data explosion 2015 IBM Corporation Agenda

More information

NCUA LETTER TO CREDIT UNIONS

NCUA LETTER TO CREDIT UNIONS NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: December 2001 LETTER NO.: 01-CU-21 TO: SUBJ: ENCL: All Federally Insured Credit Unions Disaster

More information

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11 Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node

More information

Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it

Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it The Cloud Threat Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it This white paper outlines the concerns that often prevent midsized enterprises from taking advantage of the Cloud.

More information

Business Continuity Planning and Disaster Recovery Planning

Business Continuity Planning and Disaster Recovery Planning 4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business

More information

Disaster Recovery and Business Continuity Plan

Disaster Recovery and Business Continuity Plan Disaster Recovery and Business Continuity Plan Table of Contents 1. Introduction... 3 2. Objectives... 3 3. Risks... 3 4. Steps of Disaster Recovery Plan formulation... 3 5. Audit Procedure.... 5 Appendix

More information

Abhi Rathinavelu Foster School of Business

Abhi Rathinavelu Foster School of Business Abhi Rathinavelu Foster School of Business What is Disaster? A disaster is considered any incident or event that results in a major interruption of business operations Major: Earthquake >5.0, Volcanic

More information

Managing business risk

Managing business risk Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Offsite Disaster Recovery Plan

Offsite Disaster Recovery Plan 1 Offsite Disaster Recovery Plan Offsite Disaster Recovery Plan Presented By: Natan Verkhovsky President Disty Portal Inc. 2 Offsite Disaster Recovery Plan Introduction This document is a comprehensive

More information

White Paper. Information Security -- Network Assessment

White Paper. Information Security -- Network Assessment Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer

More information

BUSINESS CONTINUITY PLAN OVERVIEW

BUSINESS CONTINUITY PLAN OVERVIEW BUSINESS CONTINUITY PLAN OVERVIEW INTRODUCTION The purpose of this document is to provide Loomis customers with an overview of the company s Business Continuity Plan (BCP). Because of the specific and

More information

Continuity of Operations Planning. A step by step guide for business

Continuity of Operations Planning. A step by step guide for business What is a COOP? Continuity of Operations Planning A step by step guide for business A Continuity Of Operations Plan (COOP) is a MANAGEMENT APPROVED set of agreed-to preparations and sufficient procedures

More information

courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P

courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview Business Continuity, Disaster Recovery and Data Center Consolidation IT managers today must be ready for the

More information

The Difference Between Disaster Recovery and Business Continuance

The Difference Between Disaster Recovery and Business Continuance The Difference Between Disaster Recovery and Business Continuance In high school geometry we learned that a square is a rectangle, but a rectangle is not a square. The same analogy applies to business

More information

Business Continuity Planning for Schools, Departments & Support Units

Business Continuity Planning for Schools, Departments & Support Units Business Continuity Planning for Schools, Departments & Support Units 1 What is Business Continuity Planning? Examples Planning for an adverse, major or catastrophic event that would cause a disruption

More information

Disaster recovery strategic planning: How achievable will it be?

Disaster recovery strategic planning: How achievable will it be? Disaster recovery strategic planning: How achievable will it be? Amr Ahmed Ernst & Young Advisory Services, Executive Director amr.ahmed@ey.com Christopher Rivera Ernst & Young Advisory Services, Manager

More information

Toronto Public Library Disaster Recovery recommended safeguards and controls

Toronto Public Library Disaster Recovery recommended safeguards and controls BCE Security Solutions Restricted Attachment 1 Toronto Public Library Disaster Recovery recommended safeguards and controls Final Prepared by: Bell Security Solutions Inc. Professional Services 333 Preston

More information

What is Business Continuity Planning (BCP) / Disaster Recovery Plan(DRP)?

What is Business Continuity Planning (BCP) / Disaster Recovery Plan(DRP)? Workshop on System Audit of Banks BCP Workshop on System Audit of Banks What is Business Continuity Planning (BCP) / Disaster Recovery Plan(DRP)? - Preparedness of an organisation to ensure continuity,

More information

Management of IT Risks

Management of IT Risks 10 number 39 // 2-2006 Management of IT Risks Esther Cerdeño Deputy Director of IT MAPFRE REASEGUROS (Spain) The market needs insurers to study the feasibility of insuring costs relating to loss of information;

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

NHS 24 - Business Continuity Strategy

NHS 24 - Business Continuity Strategy NHS 24 - Strategy Version: 0.3 Issue Date: 20/09/2005 Status: Issued for Board Approval Status: draft Page 1 of 13 Table of Contents 1 INTRODUCTION...3 2 PURPOSE...3 3 SCOPE...3 4 ASSUMPTIONS...4 5 BUSINESS

More information

Business Continuity Management

Business Continuity Management Business Continuity Management Policy Statement & Strategy July 2009 Basildon District Council Business Continuity Management Policy Statement The Council is committed to ensuring robust and effective

More information

The PNC Financial Services Group, Inc. Business Continuity Program

The PNC Financial Services Group, Inc. Business Continuity Program The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page

More information

Unit Guide to Business Continuity/Resumption Planning

Unit Guide to Business Continuity/Resumption Planning Unit Guide to Business Continuity/Resumption Planning (February 2009) Revised June 2011 Executive Summary... 3 Purpose and Scope for a Unit Business Continuity Plan(BCP)... 3 Resumption Planning... 4 Assumptions

More information

IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity

IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity Simplifying storage processes and ensuring business continuity and high availability IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity The risks are even greater for companies that

More information

Information Security Management: Business Continuity Planning. Presentation by Stanislav Nurilov March 9th, 2005 CS 996: Info. Sec. Mgmt.

Information Security Management: Business Continuity Planning. Presentation by Stanislav Nurilov March 9th, 2005 CS 996: Info. Sec. Mgmt. Information Security Management: Business Continuity Planning Presentation by Stanislav Nurilov March 9th, 2005 CS 996: Info. Sec. Mgmt. Overview BCP: Definition BCP: Need for (Why?) BCP: When BCP: Who

More information

This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses.

This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses. 1. An Introduction This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses. This presentation was prepared by the South Central Economic

More information

Defense in Depth: Off-Site Storage of Biological Specimens and Biopharmaceuticals. for Risk Mitigation 5 4.5 4 3.5 3 2.5 2 1.5 0.5

Defense in Depth: Off-Site Storage of Biological Specimens and Biopharmaceuticals. for Risk Mitigation 5 4.5 4 3.5 3 2.5 2 1.5 0.5 Defense in Depth: Off-Site Storage of Biological Specimens and Biopharmaceuticals 5 4.5 4 3.5 3 2.5 2 1.5 1 0.5 for Risk Mitigation By Bruce C. Simpson, Director of Commercial Operations, Fisher BioServices

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

Emergency Response and Business Continuity Management Policy

Emergency Response and Business Continuity Management Policy Emergency Response and Business Continuity Management Policy Owner: John Duffy, Registrar & Secretary Last updated: September 2012 Version: 04 Document control Date Version Author Changes To be populated

More information

Ensure Absolute Protection with Our Backup and Data Recovery Services. ds-inc.com (609) 655 1707

Ensure Absolute Protection with Our Backup and Data Recovery Services. ds-inc.com (609) 655 1707 Ensure Absolute Protection with Our Backup and Data Recovery Services ds-inc.com (609) 655 1707 Ensure Absolute Protection with Our Backup and Data Recovery Services STAY PROTECTED WITH OUR BACKUP AND

More information

BUSINESS RESILIENCE READY OR NOT

BUSINESS RESILIENCE READY OR NOT BUSINESS RESILIENCE READY OR NOT EDC Whitepaper 2014 Table of Contents Executive Summary 2 Need for Effective BCM 2 Government requirements for BCM 4 The Challenge - Disasters and Threats 4 Pandemic and

More information

Disaster Recovery and Business Continuity What Every Executive Needs to Know

Disaster Recovery and Business Continuity What Every Executive Needs to Know Disaster Recovery and Business Continuity What Every Executive Needs to Know Bruce Campbell & Sandra Evans Contents Why you need DR and BC What constitutes a Disaster? The difference between disaster recovery

More information

From Big Data to Rich Data How Data Analytics Add Value to Security Risk Management. Patrick Hennies, Rainer Rex 15th European ASIS, 04/08/2016

From Big Data to Rich Data How Data Analytics Add Value to Security Risk Management. Patrick Hennies, Rainer Rex 15th European ASIS, 04/08/2016 How Data Analytics Add Value to Security Risk Management Patrick Hennies, Rainer Rex 15th European ASIS, 04/08/2016 Who we are Global leading positions in consumer and industrial businesses Consumer Businesses

More information

RSA ARCHER BUSINESS CONTINUITY MANAGEMENT AND OPERATIONS Solution Brief

RSA ARCHER BUSINESS CONTINUITY MANAGEMENT AND OPERATIONS Solution Brief RSA ARCHER BUSINESS CONTINUITY MANAGEMENT AND OPERATIONS Solution Brief INTRODUCTION Now more than ever, organizations depend on services, business processes and technologies to generate revenue and meet

More information

Creating the Resilient Corporation

Creating the Resilient Corporation Creating the Resilient Corporation Business Continuity Planning and Pandemics Presented by: Eric Millard, Delivery Manager, Business Continuity and Recovery Services, Hewlett-Packard 2006 Hewlett-Packard

More information

DASTA Guide to Business Continuity (BC) and Disaster Recovery (DR) Planning

DASTA Guide to Business Continuity (BC) and Disaster Recovery (DR) Planning Your Documents. Our Management. DASTA Guide to Business Continuity (BC) and Disaster Recovery (DR) Planning Dr. Robert L. Bailey, CRM, MIT, ECMp L E A R N M O R E A B O U T D A S T A A T W W W. D R M.

More information

How To Manage A Business Continuity Strategy

How To Manage A Business Continuity Strategy Business continuity strategy 2009 2012 Table of contents 1 Why this strategy is needed 3 2 Aim of the strategy 4 3 Our approach to business continuity 4 PROCESS 4 STRUCTURE 5 DOCUMENTATION 6 DISRUPTION

More information

<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP

<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP IT Disaster Recovery Plan Template By Paul Kirvan, CISA, CISSP, FBCI, CBCP Revision History REVISION DATE NAME DESCRIPTION Original 1.0 2 Table of Contents Information Technology Statement

More information

The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1

The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1 Version 3.1 November 22, 2004 TABLE OF CONTENTS PART 1: DISASTER RECOVERY EXPECTATIONS... 3 OVERVIEW...3 EXPECTATIONS PRIOR TO AN INCIDENT OCCURRENCE...3 EXPECTATIONS PRIOR TO A DISASTER OCCURRENCE...4

More information

Bridging the HIPAA/HITECH Compliance Gap

Bridging the HIPAA/HITECH Compliance Gap CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According

More information

Business Continuity in Healthcare

Business Continuity in Healthcare Business Continuity in Healthcare Cynthia Simeone, CBCP, PMP Director Business Resilience Catholic Health Initiatives Scott Ream President Virtual Corporation 1 Session Speakers Cynthia Simeone, CBCP,

More information