Information Security Management for SMEs: Implementating and Operating a Business Continuity Management System (BCMS) Using PDCA Cycle
|
|
|
- Stuart George
- 10 years ago
- Views:
Transcription
1 Proceedings of FIKUSZ 13 Symposium for Young Researchers, 2013, pp The Author(s). Conference Proceedings compilation Obuda University Keleti Faculty of Business and Management Published by Óbuda University Information Security Management for SMEs: Implementating and Operating a Business Continuity Management System (BCMS) Using PDCA Cycle Gergely Krisztián HORVÁTH, CISA CISM IT security manager, Hungarian National Asset Management Inc. University of Pécs, Faculty of Business and Economics, PhD School in Business Administration [email protected] Abstract: Recent information security incidents and regulatory changes makes highlight the need of solid information security management. From a business perspective one way to be secure is to be able to operate continua hespecially for companies operating critical infrastructure elements. Business continuity management is the discipline that helps organizations to keep on operating in case of disruption or crisis. SMEs oftentimes lack the experience to establish such management systems, Therefore assistance to SMEs to implement and operate a business continuity management system (BCMS) aligned with the information security management system (ISMS) is highly appreciated. The article summarize the background to this topic and related Hungarian regulations, then major BCMS implementation and audit methodologies are discussed. Finally checklists and guidance is given to SMEs, based on professional literature and author s experience, in order to successfully implement a BCMS system and operate it according to business needs and regulatory requirements. Keywords: Information security, Business continuity, management systems, BCP, CIIP, 133
2 1 Drivers to implement integrated business continuity management system for SMEs 1.1 Cyber security incidents are on the rise Media covers cyber threats with great detail in the past few years: from stealing individuals bank accounts, and stealing industrial secrets, to attacks to critical infrastructures, major cyber threats materialize frequently. The result of these events are heavy financial losses (p.e. Diginotar declared bankcrupt in 2011), damaged reputation (p.e.rsa hack in 2011), and mistrust of clients (p.e.sony Playstation hack, 2011). 1.2 Developments in corporate governance practices Corporate governance is an established management discipline with rootes dating back to East India Company (1707). The regulation has evolved to include detailed requirements on internal control (f.e. SOX). In Hungary, the Budapest Stock Exchange (2004), and the the National Asset Management Inc (2013) issued localized version of Corporate Governance Codes. Currently there are projects on corporate governance capability assessments at major state-owned enterprises, to manage strategic business risks based on EU funded GOSPEL project s spin-off Trusted Business Partner. It covers information security practices as well, where the continuity of operation is a key factor. 1.3 ERM and Information security risk management practices Enterprise risk management (COSO ERM) has become the primary tool for organizational risk management: ERM became a regulatory requirement of a wellcontrolled organization! COSO (2004) defines ERM as a process, effected by an entity s board of directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may affect the entity and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives. ISO/IEC 27005:2008 deals with information security risk management. Next year ISO/IEC 31000:2009 became the global standardized method for risk management. Eventually, various aspects of risk management converge to provide an integrated view of the risks affecting enterprise s objectives. 1.4 Regulatory changes Regulators on International level, in the US, EU and Hungary as well adopted the risk management approach, major examples: 134
3 - International: Basel II/III regulates operational risk management 1, - US Congress: Sarbanes-Oxley Act of 2002, section 404, contains a detailed section on internal control systems, - EU: 7 th Company directive 2 - Hungary: Law on Critical infrastructure protection 3 (2012) and the government decree on implementing the CIIP law 4 (2013). New Law on Information protection in central and local governement organizations require strict information security practices to be adopted by governmental bodies. 1.5 Requirement of a major client In this chapter I discuss the main factors that drive Hungarian SMEs to implement BCMS on interviews of information security professionals. If not driven by the owner of a SME, in Hungary, oftentimes the need for BCMS is driven by a major client from a regulated industry, such as financial services. 2 Business continuity management practices Business Continuity Management (BCM) is a relatively new management discipline. It has become increasingly important as organizations are currently finding themselves in a fast changing environment where new risks emerge in an increasing pace. During my research I use the definition of BCMS as set out in the international standard ISO/IEC (clause 3.4), because this is the most widely accepted definition: Holistic management process that identifies potential threats to and organization and the impacts to business operations those threats, if realized, might cause, and which provides a framework for building organizational resilience with the capability for an effective response that safeguards the interests of its key stakeholders, reputation, brand and value-creating activities. Business continuity management allows an organization to react to an incident in an efficient, timely manner and recover critical business processes within established 1 Bank for International Settlements (BIS)publications at 2 Seventh Council Directive 83/349/EEC of 13 June Law on Critical infrastructure protection Act CLXVI of évi CLXVI. tv. a létfontosságú rendszerek és létesítmények azonosításáról, kijelöléséről és védelméről) 4 Decree on implementing Act CLXVI of /2013. (III. 8.) Korm. rendelet a létfontosságú rendszerek és létesítmények azonosításáról, kijelöléséről és védelméről szóló évi CLXVI. törvény végrehajtásáról 135
4 timeframes (RTO, RPO). Michelberger and Labodi (2012) illustrate the related timeframes in a graph: Figure 1 Business continuity model (Michelberger-Labodi, 2012, p4) Disaster recovery (DR) is a term used for the process of preparation for the replacement of information systems following an incident. ITIL differentiate IT service continuity management (IT SCM) in the Service Design Book (ch. 4.5) which is broader than DR, and supports of the overall BCM process by ensuring that required IT facilities can be resumed within agreed timescales. BCMS and IT SCM related international best practices are: - ISO/IEC 22301:2012 is the first international standard on BCM, - ISO/IEC 27031:2011 is an ICT-focused standard on IT SCM, - NIST (2010) is the US guide for Contingency Planning of federal information systems - Cobit 5 for Information Security is the security view of the Cobit framework also covering continuity practices, Information security governance is the responsibility of senior management, they provide strategic direction and resources. While information security management is the responsibility of information security managers and middle management. Their task is to implement and operate the ISMS. Related international best practices are: - ISO/IEC series standards define ISMS requirement, where ISO define ICT continuity requirements. - NIST (2011) federal guide gives advice on information security risk management. - ISACA is the biggest IT governance and information security association, they have been publishing standards and guidelines for decades. Cobit 5 framework is the recent IT framework that covers information security. 136
5 3 Implementing integrated business continuity management systems for SMEs 3.1 Implementing BCMS as a project Dr. W. Edwards Deming developped the cycle of control based on Walter A. Shewhart s statistical studies in This model is widely used in management systems to achieve continual improvement, the most notable examples are ISO 9001 quality management and ISO/IEC information security management standards and ISO/IEC standard also follows this logic therefore it ensures that it is consistent with other management system standards. Figure 2 Plan, Do, Check, Act cycle (source: BS :2007) The PDCA model in BCMS system produces business continuity outcomes that meet the requirements of interested parties. Related elements of a BCMS: - Plan: Prepare BCM strategy, policy, objectives, processes and procedures in accordance with company policies and objectives. - Do: Implement the BCM policy, processes and procedures and operate the BCMS system. - Check: Monitor and review performance against BCM objectives, and report the results to management to authorize remediation and improvement actions. - Act: Maintain and improve the BCMS. 137
6 3.2 Initiation and planning phase (PLAN) It is important to define the business problem in their own terms as relevant to the SMEs business goals. It is advisable to define more steps to the solution so that it can be implemented step by step as resources are available to an SME. Next, the problem should be elaborated in more detail specifying the exact requirements (business, compliance, IT, security, etc) of the BCMS project in harmony with management systems already in operation. Also important in this phase to analyse supporting ICT services and systems. The methodologies mentioned in chapter 2 of this article are used generally as a foundation. In every business undertaking the knowledge of expectations and preferences of stakeholders helps in planning and also make the foundation for the success of the final acceptance test. Without senior management commitment the BCMS implementation is doomed to failure. After proper planning it is advisable to continue the work as a project with designated project manager experienced in BCM implementation. The project has to have an organization, defined key roles, and defined critical success factors. 3.3 Desing and implementation phase (DO) A methodology is generally not meant to be fully implemented for every process in a company, but careful scoping is required considering business needs and compliance requirements. It is highly advisable to select the international standard ISO as a foundation for BCMS, and use other BCM methodology elements where necessary and to integrate BCMS with other management systems. Integrated ISMS requires the following delivarables, integrated with a BCMS: - Integrated ISMS and BCMS policy - Security and BCM organization - Assets classification and process impact assessment - Standards, procedures and metrics In design phase the project has to define elements of methodologies relevant to the organization. (methodology scoping), and define capability goals of related management processes. In case resources are not available to implement the whole scope in a single project it is important to prioritize requirements and phase the implementation. First the tailored BCMS methodology and policies has to be prepared. The BCMS policy shall cover requirements, resources and organization. All the roles detailed in methodologies are generally not possible delegate to separate people in an SME, so one must usually perform multiple roles to a colleague, but the 138
7 roles can be merged only if they are not incompatible. The Head of Business Continuity shall be a manager with adequate skills and authority. After the BCMS frameworks is ready, the next step is to define the most critical business processes by conducting a business impact analysis (BIA). Those processes shall be selected which have high impact on business goals, clients, turnover, or compliance. It is good practice to extend BCP plans gradually by major clients / products. Next, a risk analysis shall be conducted to define high probability and high impact risk events. Based on risk analysis, management shall decide on risk response: transfer, avoid, reduce, or accept the risk. Usually BCP planning covers IT system loss, loss of office, unavailability of key personel. Training of management and employees helps get their support in the planning and implementation phase as well. Key areas to cover in trainings: - Why BCM is important, - How do I get information about a crisis situation, - What to do to in a crisis situation It is important to continue doing trainings for new colleagues, and keep everyone informed with information updates, newsletters. The final step in the implementation phase is BCP testing and acting on test results. Tests shall be detailed covering all major areas of the plan, such as a: - call cascade to test communication details, - walk through test, to verify plan details, - possibly a simulation of most relevant risk scenarios to simulate real life cases 3.4 Monitoring and controlling phase (CHECK) Senior management control of the implementation project keeps the momentum of BCM effort and keeps the project on track. Also important to check compliance with initial project requirements and product quality, if possible by an independent professional. After BCMS implementation project ends an internal or external auditor shall audit the BCMS and individual BCP plans. 3.5 Finalize and operate the BCMS and BCP plans (ACT) The BCMS implementation is not a one time activity. The management systems has to be operated continously, and after major changes to business processes or supporting 139
8 resources, IT systems, the plans have to be revised, re-trained, re-tested to ensure aplicability. The real test of the BCMS is in case an incident happens how the organization react. It is expected that BCP plans minimize the impact of incidents to business and increase SME competitiveness. In the PDCA cycle the improvement of BCMS is also considered to be in this phase: acting on management reviews, implementing improvement actions. 4. Conclusions It is not straight forward for SMEs to implement international best management practices generally, it is even more so in case of business continuity management practices. Firstly, a methodology is generally not meant to be fully implemented for every process in a company, but careful scoping is required considering business needs and compliance requirements. Secondly, BCMS has to be integrated into the corporate governance structure and it has to be aligned and integrated with other management systems like ISMS. Finally, several important soft management factors need to be considered for the successful implementation of a BCMS. Advantages of integrated ISMS and BCMS implementation include: - Comprehensive and verifiable information security and business continuity strategy - Information security and business continuity are transformed into a proactive activity - Ensure compliance to existing and possibly future information security, and infrastructure protection related regulations - Business alignment of information security activities - Alignment with leading industry practices and methods The article discusses related management best practices and provides a guideline to consider for executive management of SMEs on important factors before and while implementing a BCMS using best practices. Subsequent research area could be to analyse the informations security and business conrinuity methods discussed in chapter 2 and link them with ISO to help implement coherent management systems (ISMS, BCMS). 140
9 Acknowledgement I thank prof. Pál Michelberger for his motivation to continue publishing articles in my research area while working as a practicing information security manager. His advice and articles were very helpful. And I thank for my wife and my family for the support they have given me while working on my PhD research topic: information security governance. References [1] Graham, J, Kaye, D: A risk management approach to business continuity: Aligning business continuity with corporate governance, Rothstein Associates, 2006 [2] Michelberger Pál - Lábodi Csaba: After Information Security - Before a Paradigm Change (A Complex Enterprise Security Model), Acta Polytechnica Hungarica, Vol 9., No , ISSN , pp [3] Lábodi Csaba - Michelberger Pál: Necessity or challenge - Information security for small and medium enterprises, Annals of the University of Petrosani, Economics, Vol.X. part 3. ISSN , pp [4] [5] COSO, Enterprise Risk Management Integrated Framework Executive Summary, September 2004, ( [6] Hungarian National Asset Management Inc, Corporate Governance Guidelines, 2013 ( %C5%91s%20v%C3%A1llalatir%C3%A1ny%C3%ADt%C3%A1s) [7] Budapest Stock Exchange, Corporate Governnce Recommendations, 2004 ( [8] Deming, W.E: Elementary Principles of the Statistical Control of Quality, JUSE, 1950 [9] ISO/IEC 27001:2005. Information technology Security techniques Information security management systems Requirements, [10] [11] Cheffins, Brian R., The History of Corporate Governance (December 1, 2011). OXFORD HANDBOOK OF CORPORATE GOVERNANCE, Mike Wright, Donald Siegel, Kevin Keasey and Igor Filatotchev, eds., Oxford University Press, Forthcoming; University of Cambridge Faculty of Law Research Paper No. 54/2011; ECGI - Law Working Paper No. 184/2012. Available at SSRN: or 141
Proposal for Business Continuity Plan and Management Review 6 August 2008
Proposal for Business Continuity Plan and Management Review 6 August 2008 2008/8/6 Contents About Newton IT / Quality of our services. BCM & BS25999 Overview 2. BCM Development in line with BS25999 3.
By. Mr. Chomnaphas Tangsook Business Director BSI Group ( Thailand) Co., Ltd
BS 25999 Business Continuity Management By. Mr. Chomnaphas Tangsook Business Director BSI Group ( Thailand) Co., Ltd 1 Contents slide BSI British Standards 2006 BS 25999(Business Continuity) 2002 BS 15000
BCP and DR. P K Patel AGM, MoF
BCP and DR P K Patel AGM, MoF Key difference between BS 25999 and ISO 22301 ISO 22301 puts a much greater emphasis on setting the objectives, monitoring performance and metrics aligning BC to top management
Business Continuity Management
Business Continuity Management Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not
Business Continuity Trends, Requirements and Expectations in 2009. Brian Zawada (MBCP) Director of Consulting Services Avalution Consulting
Business Continuity Trends, Requirements and Expectations in 2009 Brian Zawada (MBCP) Director of Consulting Services Avalution Consulting Overview What Is Business Continuity? The Value Proposition What
Preparing for the Convergence of Risk Management & Business Continuity
Preparing for the Convergence of Risk Management & Business Continuity Disaster Recovery Journal Webinar Series September 5, 2012 2012 Strategic BCP, Inc. All rights reserved. strategicbcp.com 1 Today
Temple university. Auditing a business continuity management BCM. November, 2015
Temple university Auditing a business continuity management BCM November, 2015 Auditing BCM Agenda 1. Introduction 2. Definitions 3. Standards 4. BCM key elements IT Governance class - IT audit program
Business Continuity Management Planning Methodology
, pp.9-16 http://dx.doi.org/10.14257/ijdrbc.2015.6.02 Business Continuity Management Planning Methodology Dr. Goh Moh Heng, Ph.D., BCCLA, BCCE, CMCE, CCCE, DRCE President, BCM Institute [email protected]
Institute for Business Continuity Training 1623 Military Road, # 377 Niagara Falls, NY 14304-1745
ECP - 601: Effective Business Continuity Management: ISO 22301 This 3-day course provides an intensive, hands-on workshop covering all major aspects for the design of an effective Business Continuity Plan
Applying Integrated Risk Management Scenarios for Improving Enterprise Governance
Applying Integrated Risk Management Scenarios for Improving Enterprise Governance János Ivanyos Trusted Business Partners Ltd, Budapest, Hungary, [email protected] Abstract: The term of scenario is used
www.td.com.au Business Continuity - IT Disaster Recovery Discussion Paper - - Commercial in Confidence Version V2.0R Wednesday, 5 September 2012
Business Continuity - IT Disaster Recovery Discussion Paper - - Version V2.0R Wednesday, 5 September 2012 Commercial in Confidence Melbourne Sydney 79-81 Coppin St Level 2 Richmond VIC 3121 414 Kent St
Moving from BS 25999-2 to ISO 22301. The new international standard for business continuity management systems. Transition Guide
Transition Guide Moving from BS 25999-2 to ISO 22301 The new international standard for business continuity management systems Extract from The Route Map to Business Continuity Management: Meeting the
Business Continuity Management
Business Continuity Management Version 1 approved by SMG December 2013 Business Continuity Policy Version 1 1 of 9 Business Continuity Management Summary description: This document provides the rationale
HOW CAN YOU ENSURE BUSINESS CONTINUITY? ISO 22301 AUDITS, CERTIFICATION AND TRAINING
HOW CAN YOU ENSURE BUSINESS CONTINUITY? ISO 22301 AUDITS, CERTIFICATION AND TRAINING ISO 22301 BUSINESS CONTINUITY MANAGEMENT SYSTEMS Most organisations will, at some point, be faced with having to respond
Sustainability through Business Continuity Management
Sustainability through Business Continuity Management R Vaidhyanathan (RV) MBCI,CBCP, TE BS25999, BS25999LA, BCCE, 27001LA, ITIL Practice Head for Crisis Management & BCM Continuity and Resilience (CORE)
Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning
Val-EdTM Valiant Technologies Education & Training Services 2-day Workshop on Business Continuity & Disaster Recovery Planning All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies.
Company Management System. Business Continuity in SIA
Company Management System Business Continuity in SIA Document code: Classification: Company Project/Service Year Document No. Version Public INDEX 1. INTRODUCTION... 3 2. SIA S BUSINESS CONTINUITY MANAGEMENT
RSA ARCHER BUSINESS CONTINUITY MANAGEMENT AND OPERATIONS Solution Brief
RSA ARCHER BUSINESS CONTINUITY MANAGEMENT AND OPERATIONS Solution Brief INTRODUCTION Now more than ever, organizations depend on services, business processes and technologies to generate revenue and meet
Bank of Papua New Guinea Prudential Standard BPS251: Business Continuity Management
Bank of Papua New Guinea Prudential Standard BPS251: Business Continuity Management Issued under Section 27 of the Banks and Financial Institutions Act 2000 Overview and Key Requirements Business Continuity
Global Statement of Business Continuity
Business Continuity Management Version 1.0-2014 Date October 18, 2014 Status Author Business Continuity Management (BCM) Page 1 of 8 Table of Contents 1. Credit Suisse Business Continuity Statement 3 2.
Measuring IT Governance Maturity Evidences from using regulation framework in the Republic Croatia
Measuring IT Governance Maturity Evidences from using regulation framework in the Republic Croatia MARIO SPREMIĆ, Ph.D., CGEIT, Full Professor Faculty of Economics and Business Zagreb, University of Zagreb
Business Continuity Management Framework 2014 2017
Business Continuity Management Framework 2014 2017 Blackpool Council Business Continuity Framework V3.0 Page 1 of 13 CONTENTS 1.0 Forward 03 2.0 Administration 04 3.0 Policy 05 4.0 Business Continuity
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis
Business Continuity Management and BS 25999 by Steve Chan, Head of Training - HK, BSI Management Systems
Business Continuity Management and BS 25999 by Steve Chan, Head of Training - HK, BSI Management Systems 9 April, 2008 2 Presentation content Drivers for Business Continuity Standards and definitions.
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page
External Supplier Control Requirements BCM
External Supplier Control Requirements BCM BCM Requirement Description BCM Tiers Recovery Time Objective Why this is important 1. Business Continuity Policy Supplier will have a documented Business Continuity
Business Continuity Planning in IT
Introduction: Business Continuity Planning in IT The more your business relies on its IT systems, the more you need to consider how unexpected disruptions might affect your business. These disruptions
The ABC s of BCP. Jeremy Sucharski Governance Risk and Compliance G31
The ABC s of BCP Jeremy Sucharski Governance Risk and Compliance G31 Jeremy Sucharski, CISA, CRISC Over 12 years of experience CISA and CRISC Certifications Governance, Risk and Compliance Practice Leader
CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data
CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical
Il nuovo standard ISO 22301 sulla Business Continuity Scenari ed opportunità
Il nuovo standard ISO 22301 sulla Business Continuity Scenari ed opportunità Massimo Cacciotti Business Services Manager BSI Group Italia Agenda BSI: Introduction 1. Why we need BCM? 2. Benefits of BCM
Shankar Gawade VP IT INFRASTRUCTURE ENAM SECURITIES PVT. LTD.
Business Continuity Management & Disaster Recovery Planning Presented by: Shankar Gawade VP IT INFRASTRUCTURE ENAM SECURITIES PVT. LTD. 1 What is Business Continuity Management? Is a holistic management
CLASSIFICATION SPECIFICATION FORM
www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information
Business Continuity Policy
Business Continuity Policy Page 1 of 15 Business Continuity Policy First published: Amendment record Version Date Reviewer Comment 1.0 07/01/2014 Debbie Campbell 2.0 11/07/14 Vicky Ryan Updated to include
Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza
Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank
White Paper: ISO 22301 Business Continuity Management An Overview. ISO 22301 Business Continuity Management An Overview
White Paper: ISO 22301 Business Continuity Management An Overview ISO 22301 Business Continuity Management An Overview Introduction As incidents such as malicious activism, terrorist attacks and environmental
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA
1 Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand
Business Continuity Management
GENERALLY ACCESSIBLE Business Continuity Management Field Report from an Audit Point of View ISACA Swiss Chapter - After Hour Seminar 28 August 2006 - Urs Voigt - Group Internal Audit Disasters Happen
BUSINESS CONTINUITY MANAGEMENT FRAMEWORK
BUSINESS CONTINUITY MANAGEMENT FRAMEWORK Document Author: Civil Contingencies Service - Authorised by the CCS Joint Management Board - Version 1.0. Issued December 2012 Page 1 FRAMEWORK STATEMENT Business
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com [email protected] 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event
Business Continuity Policy
Page 1 of 16 Business Continuity Policy Issue Date: Aug 2013 Document Number: 00241 Prepared by: Business Management and Continuity Senior Manager Next Review Date: April 2014 Page 2 of 16 NHS England
Risk Management for Business Trust
Pál Michelberger Óbuda University, Keleti Faculty of Business and Management [email protected] Abstract: Si vis pacem, para bellum, or if you want peace, prepare for war, as the Roman adage
Business Continuity and Risk Management. Ken Kaberia Principal BCM Officer, Enterprise Risk Safaricom Limited
Business Continuity and Risk Management Ken Kaberia Principal BCM Officer, Enterprise Risk Safaricom Limited What does Business Continuity mean? Business Continuity Management- Definition Business Continuity
Business Continuity Policy
Business Continuity Policy St Mary Magdalene Academy V1.0 / September 2014 Document Control Document Details Document Title Document Type Business Continuity Policy Policy Version 2.0 Effective From 1st
Business Continuity Policy
Business Continuity Policy 1 NHS England INFORMATION READER BOX Directorate Medical Commissioning Operations Patients and Information Nursing Trans. & Corp. Ops. Commissioning Strategy Finance Publications
Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management
Course: Information Security Management in e-governance Day 1 Session 3: Models and Frameworks for Information Security Management Agenda Introduction to Enterprise Security framework Overview of security
BS 25999 BUSINESS CONTINUITY MANAGEMENT
BS 25999 BUSINESS CONTINUITY MANAGEMENT AUDIT, CERTIFICATION & training services HOW CAN YOU ENSURE BUSINESS CONTINUITY? BS 25999 AUDITS & CERTIFICATION FROM SGS Most organisations will, at some point,
Business Continuity and Disaster Recovery Planning
Business Continuity and Disaster Recovery Planning Jennifer Brandt, CISA A p r i l 16, 2015 HISTORY OF STINNETT & ASSOCIATES Stinnett & Associates (Stinnett) is a professional advisory firm offering services
AN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
Plan Development Getting from Principles to Paper
Plan Development Getting from Principles to Paper March 22, 2015 Table of Contents / Agenda Goals of the workshop Overview of relevant standards Industry standards Government regulations Company standards
Enhancing IT Governance, Risk and Compliance Management (IT GRC)
Enhancing IT Governance, Risk and Compliance Management (IT GRC) Enabling Reliable eservices Tawfiq F. Alrushaid Saudi Aramco Agenda GRC Overview IT GRC Introduction IT Governance IT Risk Management IT
Business Continuity Trends and Risk Considerations Financial Executives International Portland Chapter June 12 2013
Business Continuity Trends and Risk Considerations Financial Executives International Portland Chapter June 12 2013 Chitra Gopalakrishnan Director KPMG LLP Agenda Introduction Business Continuity / Disaster
NHS 24 - Business Continuity Strategy
NHS 24 - Strategy Version: 0.3 Issue Date: 20/09/2005 Status: Issued for Board Approval Status: draft Page 1 of 13 Table of Contents 1 INTRODUCTION...3 2 PURPOSE...3 3 SCOPE...3 4 ASSUMPTIONS...4 5 BUSINESS
How to measure your business resiliency
How to measure your business resiliency Define the KPI s/kri s and scorecards to control your security and business continuity capabilities Krzysztof Pulkiewicz BCMLogic [email protected]
Business Continuity Management Policy
Business Continuity Management Policy Business Continuity Policy Version 1.0 1 Version control Version Date Changes Author 0.1 April 13 1 st draft PH 0.2 June 13 Amendments in line with guidance PH 0.3
Governance and Management of Information Security
Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information
Business Continuity Management Emerging Trends
Business Continuity Management Emerging Trends Presentation Title Goes Here Samir Shah CA, CISA, DISA, CIA, CISSP, CFE, ISO 22301 LI Associate Director Axis Risk Consulting March 2013 Outline 2 1. Business
ISO 22301: Societal Security Terminology ISO 22313: BCMS Guidance ISO 22398: Exercises and Testing - Guidance
The Impact of ISO 22301 Moving Your BCM Program to a Management System Implementing the Newly Approved International Business Continuity Management System Standard & Guidance Documents ISO 22301: Societal
Business Continuity Management
Business Continuity Management Factsheet To prepare for change, change the way you prepare In an intensely competitive environment, a permanent market presence is essential in order to satisfy customers
BUSINESS CONTINUITY MANAGEMENT POLICY
This document is uncontrolled once printed. Please check on the CCG s Intranet site for the most up to date version BUSINESS CONTINUITY MANAGEMENT POLICY DOCUMENT CONTROL Type of Document Document Title
NHS ISLE OF WIGHT CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY POLICY
NHS ISLE OF WIGHT CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY POLICY AUTHOR/ APPROVAL DETAILS Document Author Written By: Human Resources Authorised Signature Authorised By: Helen Shields Date: 20
Information Security Management Systems
Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector
COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)
COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA
Moving from ISO/IEC 27001:2005 to ISO/IEC 27001:2013
Transition guide Moving from ISO/IEC 27001:2005 to ISO/IEC 27001:2013 The new international standard for information security management systems ISO/IEC 27001 - Information Security Management - Transition
Western Intergovernmental Audit Forum
Western Intergovernmental Audit Forum Business Continuity & Disaster Recovery Planning September 12, 2013 Presented by: City of Phoenix City Auditor Department Aaron Cook, Sr Internal Auditor IT Audit
The New International Standard on the Practice of Risk Management A Comparison of ISO 31000:2009 and the COSO ERM Framework
The New International Standard on the Practice of Risk Management A Comparison of ISO 31000:2009 and the COSO ERM Framework Dorothy Gjerdrum, ARM-P, Chair of the ISO 31000 US TAG and Executive Director,
How To Manage A Disruption Event
BUSINESS CONTINUITY FRAMEWORK DOCUMENT INFORMATION DOCUMENT TYPE: DOCUMENT STATUS: POLICY OWNER POSITION: INTERNAL COMMITTEE ENDORSEMENT: APPROVED BY: Strategic document Approved Manager Organisational
This article will provide background on the Sarbanes-Oxley Act of 2002, prior to discussing the implications for business continuity practitioners.
Auditing the Business Continuity Process Dr. Eric Schmidt, Principal, Transitional Data Services, Inc. Business continuity audits are rapidly becoming one of the most urgent issues throughout the international
IT Governance Dr. Michael Shaw Term Project
IT Governance Dr. Michael Shaw Term Project IT Auditing Framework and Issues Dealing with Regulatory and Compliance Issues Submitted by: Gajin Tsai [email protected] May 3 rd, 2007 1 Table of Contents: Abstract...3
Business Continuity Management Systems. Protecting for tomorrow by building resilience today
Business Continuity Management Systems Protecting for tomorrow by building resilience today Vital statistics 31% 40% of UK businesses have been affected by bad weather related transport problems, power
STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices
A S I S I N T E R N A T I O N A L Supply Chain Risk Management: Risk Assessment A Compilation of Best Practices ANSI/ASIS/RIMS SCRM.1-2014 RA.1-2015 STANDARD The worldwide leader in security standards
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
Principles for BCM requirements for the Dutch financial sector and its providers.
Principles for BCM requirements for the Dutch financial sector and its providers. Platform Business Continuity Vitale Infrastructuur Financiële sector (BC VIF) Werkgroep BCM requirements 21 September 2011
Certified Information Security Manager (CISM)
Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security
BUSINESS CONTINUITY POLICY
BUSINESS CONTINUITY POLICY Last Review Date Approving Body n/a Audit Committee Date of Approval 9 th January 2014 Date of Implementation 1 st February 2014 Next Review Date February 2017 Review Responsibility
BSO Board Director of Human Resources & Corporate Services Business Continuity Policy. 28 February 2012
To: From: Subject: Status: Date of Meeting: BSO Board Director of Human Resources & Corporate Services Business Continuity Policy For Approval 28 February 2012 The Board is asked to agree the attached
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
our enterprise security Empowering business
our enterprise security Empowering business Introduction Communication is changing the way we live and work. Ericsson plays a key role in this evolution, using innovation to empower people, business and
Business Continuity Management
Business Continuity Management Policy Statement & Strategy July 2009 Basildon District Council Business Continuity Management Policy Statement The Council is committed to ensuring robust and effective
Business Continuity Management
Prudential Standard CPS 232 Business Continuity Management Objective and key requirements of this Prudential Standard This Prudential Standard requires each APRA-regulated institution to implement a whole-of-business
Introduction to Business Continuity Planning
Introduction to Business Continuity Planning Business Continuity and Disaster Resilience Forum May 10, 2012 Rizal Ballroom A, Makati Shangri-la Manila, Philippines Dr Goh Moh Heng President BCM Institute
Chapter I: Fundamentals of Business Continuity Management
Chapter I: Fundamentals of Business Continuity Management Objectives Define Business Continuity Management (BCM) Define the relationship between BCM and risk management Review BCM responsibilities Identify
INSURANCE REGULATORY AUTHORITY IRA/PG/ GUIDELINE TO THE INSURANCE INDUSTRY ON THE BUSINESS CONTINUITY MANAGEMENT
INSURANCE REGULATORY AUTHORITY IRA/PG/ GUIDELINE TO THE INSURANCE INDUSTRY ON THE BUSINESS CONTINUITY MANAGEMENT SEPTEMBER 2014 To Insurance Companies Reinsurance Companies GUIDELINEON BUSINESS CONTINUITY
Prudential Standard CPS 232 Business Continuity Management
Prudential Standard CPS 232 Business Continuity Management Objective and key requirements of this Prudential Standard This Prudential Standard requires each regulated institution and Level 2 group to implement
Overview TECHIS60851. Manage information security business resilience activities
Overview Information security business resilience encompasses business continuity and disaster recovery from information security threats. As well as addressing the consequences of a major security incident,
WEST YORKSHIRE FIRE & RESCUE SERVICE. Business Continuity Management Strategy
WEST YORKSHIRE FIRE & RESCUE SERVICE Business Continuity Management Strategy Date Issued: 12 November 2012 Review Date: 12 November 2015 Version Control Version Number Date Author Comment 0.1 June 2011
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT
CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT JANUARY 2008 GUIDELINE ON BUSINESS CONTINUITY GUIDELINE CBK/PG/14
IT Risk Management Era: Research Challenges and Best Practices. Eyal Adar, Founder & CEO [email protected] Chairman of the EU SRMI
IT Risk Management Era: Research Challenges and Best Practices IARA Work Group July 1 st, 2007, Santa Clara - California Eyal Adar, Founder & CEO [email protected] Chairman of the EU SRMI (Security
D2-02_01 Disaster Recovery in the modern EPU
CONSEIL INTERNATIONAL DES GRANDS RESEAUX ELECTRIQUES INTERNATIONAL COUNCIL ON LARGE ELECTRIC SYSTEMS http:d2cigre.org STUDY COMMITTEE D2 INFORMATION SYSTEMS AND TELECOMMUNICATION 2015 Colloquium October
Leveraging the IT Service Continuity Management framework Gord Novoselnik Business Continuity Office Enterprise Solutions Division
Leveraging the IT Service Continuity Management framework Gord Novoselnik Business Continuity Office Enterprise Solutions Division 1 MTS Allstream Inc. proprietary. Use pursuant to company instructions./
EPRR: Toolkit Facilitator Guide
NHS England Business Continuity Management EPRR: Toolkit Facilitator Guide APPENDIX 1 1 [Intentionally Blank] INTRODUCTION The document has been designed to assist you to deliver the outcomes of the workshop
