Creating an Integrated Business Continuity / Disaster Recovery (BC/DR) Program. A Hands on Workshop

Size: px
Start display at page:

Download "Creating an Integrated Business Continuity / Disaster Recovery (BC/DR) Program. A Hands on Workshop"

Transcription

1 Creating an Integrated Business Continuity / Disaster Recovery (BC/DR) Program A Hands on Workshop

2 The material appearing in this presentation is for informational purposes only and is not legal or accounting advice. Communication of this information is not intended to create, and receipt does not constitute, a legal relationship, including, but not limited to, an accountant client relationship. Although these materials may have been prepared by professionals, they should not be used as a substitute for professional services. If legal, accounting, or other professional advice is required, the services of a professional should be sought.

3 December 3rd Agenda 8:30 to 9:00 9:00 to 10:00 10:00 to 10:10 10:10 to 11:00 11:00 to 11:30 11:30 to 12:00 12:00 to 1:00 Introduction Key Stages of BC Management Break Planning and Analysis Emergency Procedures Plan Development Lunch 3

4 December 3rd Agenda 1:00 to 1:30 1:30 to 2:00 2:00 to 2:30 2:30 to 2:40 2:40 to 3:10 3:10 to 3:40 3:40 to 4:10 4:10 to 4:30 Awareness and Training Plan Activation Ongoing maintenance Break Crisis Communication Introduction to Exercises Emerging trends Wrap up 4

5 What we learn from history is that people don t learn from history Warren Buffet 5

6 Business Continuity / Disaster Recovery Participant Introductions 6

7 Introductions Name Organization Existing Role Explain how you became involved in BC/DR Fun Fact / Positive 7

8 It all starts with you! 8

9 Key Stages of BC Management An Introduction 9

10 Business Continuity Planning 10

11 11

12 The Framework for Crisis Management Landscape Survey Strategic Planning Crisis Management Operational Learning The Internal Landscape Internal Crisis Threats Plan for potential crisis events Managing internal stakeholders during a crisis What can we learn The external Landscape External Crisis Threats External planning that could help Managing external stakeholders during a crisis What learning is taking place outside our organization Crandall, Parnell and Spillan (2014) 12

13 The Life Cycle of a Crisis Myers Normal Operations Prevention practices Emergency Response Activities during the first hours Interim Processing Temporary procedures are set up Restoration Transition back to normal Pearson and Mitroff (1993) Signal detection Begins with some form of warnings Preparation/prevention Forming the crisis management team and plan of action Containment/Damage limitation Managing the crisis Recovery Attempts to resume activities Learning Reflecting on what can be learned 13

14 What is a Business Continuity Plan? Business Continuity * A program which develops, exercises and maintains plans to enable the organization to: Respond to a disruption with minimum harm to life and resources; Recover, resume and restore functions within time frames which ensure continuing viability; and Provide crisis communications to all stakeholders. Business Continuity Plan* Process of developing and documenting arrangements and procedures that enable an organization to respond to an even that lasts for an unacceptable period of time and return to performing its critical functions after an interruption. * Disaster Recovery Journal, Definitions can be found at 14

15 A Business Continuity Program: Is Not a project Is Not a one time task Is Not for a fixed length of time Must be an on going, living program that consists of several interdependent and reiterative projects 15

16 BC Program Purpose Protect your People Information Operations Organization 16

17 BC Program Objectives Keep everyone safe Ensure continuity and survival of organization Provide protection of assets Mitigate risks and exposures Provide preventative measures Take control of any business interruption 17

18 Why is a BCM Program Important? Safeguards human life Minimizes confusion and enables effective decisions in a time of crisis Reduces dependency on specific personnel Minimizes loss of data, revenue, customers Facilitates timely recovery of business functions Maintains public image and reputation 18

19 A BCM Program Will Answer What is a disaster? When do the impacts begin? How much loss can be tolerated? What are the options? How to reestablish business functions? What will a recovery capability cost? How much is enough? 19

20 What is a Disaster? Sudden, calamitous event that brings great damage, loss or destruction. (Source: Merriam Webster dictionary) Natural Earthquakes Floods Storms Man Made Power outages Sprinkler system bursts Crime Equipment sabotage Technological Database corruption Viruses Internet worms 20

21 Business Continuity Definitions Disaster Recovery* The process of returning a business function to a state of normal operations either at an interim minimal survival level and/or re establishing fullscale operations Risk Controls* All methods of reducing the frequency and/or severity of losses including exposure avoidance, loss prevention, loss reduction, segregation of exposure units and non insurance transfer of risk * Disaster Recovery Journal, Definitions can be found at 21

22 Disaster Response Disaster* A sudden, unplanned calamitous event causing great damage or loss. An event that compromises an organization s ability to provide critical functions, processes, or services for some unacceptable period of time An event where an organization s management invokes their recovery plans. * Disaster Recovery Journal, Definitions can be found at Then Protect the assets IT department Now Protect critical business processes Mission Critical functions 22

23 Business Continuity Definitions (Cont d) Emergency Response Plan* a documented plan usually addressing the immediate reaction and response to an emergency situation Loss* unrecoverable resources that are redirected or removed as a result of a Business Continuity event. Such losses may be loss of life, revenue, market share, competitive stature, public image, facilities, or operational capability. * Disaster Recovery Journal, Definitions can be found at 23

24 BC/DR Benefits 24

25 Key Components of Disaster Recovery 25

26 Business Continuity Problem Statement Internal or external event interrupts one or more of your business processes Time length of interruption causes situation to become a disaster The financial impact caused by the event What s Important to Your Business? 26

27 Planning and Analysis 27

28 What is Risk Assessment? Process of identifying the risks to an organization Assesses the critical functions necessary for an organization to continue business operations Defines the controls in place to reduce organization exposure Evaluates the cost for such controls Often involves an evaluation of the probabilities of a particular event occurring 28

29 Purpose of Risk Assessment To determine events, probabilities and environmental surroundings that can adversely affect the organization and its facilities with disruption and disaster and the controls needed to prevent or minimize the effects of potential loss To provide a cost benefit analysis to justify investment in controls to mitigate risks 29

30 Cause and Effect Relationship Threat Vulnerability Risk Cause Probability Effect Assets 30

31 Identify Risk Events Low probability High severity Whole building fire Fire Medium probability Medium severity Fire limited to one floor Medium probability High severity Fire in basement mailroom 31

32 Identify Risk Event Probability Low Medium High Less than once every 25 years This could happen, but it would be a freak event Once every 5 to 25 years I saw something similar in the papers recently I know someone this happened to More than once every 5 years I remember the last time this happened 32

33 Risk Analysis & Exposure Estimation Risk Level Matrix Low (10) Impact Medium (50) High (100) Threat Likelihood High (1.0) Medium (0.5) Low (0.1) Low 10 x 1.0 = 10 Low 10 x 0.5 = 5 Low 10 x 0.1 = 1 Medium 50 x 1.0 = 50 Medium 50 x 0.5 = 25 Low 50 x 0.5 = 5 High 100 x 1.0 = 100 Medium 100 x 0.5 = 50 Low 100 x 0.1 = 10 Risk Scale: High = 51 to 100 Medium = 11 to 50 Low = 1 to 10 33

34 Identify Risk Event Impact Low Medium High Availability Periodic reduction in service Intermittent total loss of service, or serious reduction in service No service available at all Duration Service disruption for less than 0.5 days Service disruption for between 0.5 and 3 days Service disruption for more than 3 days Spread Impacts a number of individuals Impacts one business function Impacts many business functions 34

35 Types of Controls Physical controls Fire suppression/sprinkler systems Access control systems Security guards Procedural controls Hiring and termination policies Clean desk policy Document receipting 35

36 Business Impact Analysis (BIA) Purpose To help organizations identify the business units, operations and processes essential to the survival of the business. Considerations: Life or death situation Potential for significant loss of revenue Obligations to external parties may be jeopardized RTO Recovery time objective RPO Recovery point objective Critical for determining the order and priority of system recovery 36

37 What is a BIA? A process designed to Document critical business functions and workflow, Determine the qualitative and quantitative impacts of a disruption, and Prioritize and establish recovery time objectives 37

38 Role of the BIA Documents potential quantitative and qualitative impacts to the organization should a disaster occur Defines financial impacts and cost per unit of downtime RTO/RPO Identifies interdependencies Defines inputs and outputs for the critical processes Documents legal, regulatory and contractual requirements Determines vital records and documents exposures 38

39 Recovery Time Objective (RTO) The deadline at which pre defined critical functions or processes must be restored (to defined minimal levels of operation) to prevent severe impact to the business Severe Business Impact or Out of Business 39

40 RTO (Cont d) 40

41 Business Impact Analysis (BIA) Identify, categorize & prioritize Critical functions Critical/Vital records 41

42 BIA (Cont d) Assess impacts and effects of disruptions over time Determine loss exposure over time 42

43 BIA (Cont d) Identify business processes Interrelationships Dependencies Validate information 43

44 Purpose of a BIA Defines the reasons for establishing a Business Continuity Program and developing plans Communicates the inherent vulnerabilities of the business units, business processes and systems you are trying to protect Provide information to identify and develop recovery strategies Legal and regulatory compliance 44

45 Objectives of a BIA Determine when exposures and impacts begin Determine and assess the impacts over time Identify potential financial exposures and impacts Provide financial data to define exposures and determine appropriate levels of BCM investment 45

46 Objectives of a BIA (Cont d) Establish RTOs Identify resources required to meet RTOs Technology Personnel Infrastructure Vendor support Establish RPOs Determine acceptable data loss Define procedures to recover lost data or transactions 46

47 Objectives of a BIA (Cont d) Establish BCM time line and recovery objectives Determine order of recovery and acceptable service levels Categorize groupings of recovery priorities Establish the value of each business unit as it relates to the total organization 47

48 Emergency Procedures 48

49 Emergency Response Plan

50 Emergency Response Event Response Recover Normal Life Safety Property Protection/ Physical Security Evacuate Shelter in Place Provide Emergency Care Organization Technology Recover Restore Resume Respond/Stabilize/Manage/Recover Normalize 50

51 Life Safety Systems Centralized systems and procedures Fire detection systems Smoke or heat sensors Fire suppression systems Gas (Halon 1301, FM 200, Novec 1230) Water (sprinklers, hoses) Procedures Prevention (good housekeeping, welding restrictions, etc.) Notification Public address system Signal lights (strobes) Warning sounds (annunciators, klaxons) 51

52 Life Safety Procedures Emergency evacuation Run away to safety Pre defined rally points Evacuation outside of established areas Hazardous material spill Flooding/Severe weather Martial Law situations Shelter in place Move to predetermined locations 52

53 Property Protection/Physical Security Mission: protect Employees Physical plant assets Facilities Equipment Intellectual property of organization Vital records Security measures should be increased during any event that compromises normal operations 53

54 Property Protection Components Identify all critical operations Utilities Security and alarm systems Manufacturing equipment Pollution control equipment Communication systems Data and voice Transportation systems 54

55 Property Protection Components (Cont d) Activities during disaster/event Contact emergency response providers Assist employees as needed (i.e. evacuation) Containment activities after disaster Secure Area Facility Stabilization Limit access by non authorized personnel Physical security of entry Storage, roof, and mechanical areas Securing access to the outdoor air intakes of the building HVAC system 55

56 Property Protection Systems Determine needs for systems to detect abnormal situations, provide warning and protect property Fire protection Lightning protection Water level monitoring Access and monitoring Emergency power Automatic shutoffs Overflow detection 56

57 Property Protection Procedures Establish procedures for Shutting down the building Closing or barricading doors and windows Covering/securing equipment Moving equipment to a safe place Identify & stock backup equipment, parts, and supplies Identify and label all hazardous materials containers 57

58 Protecting Your Technology Responsible for: Providing automated and technology services to organization Backing up data on a regular basis Recovering lost data and/or services Restoring services if they become impaired 58

59 Protecting Your Technology (Cont d) Ensure that key technicians, operators and personnel are familiar with all systems Establish orderly shutdown procedures Establish procedures for restoring systems Determine need for backup systems Establish preventative maintenance schedules for all systems and equipment 59

60 Implementation Procedures Identify command and control requirements Emergency Operations Center Command and decision authority roles Communication options/tools Manage incident command center Establish liaison with external agencies Establish procedures with service providers 60

61 Implementation Procedures (Cont d) Creating the Emergency Response Plan Purpose of plan: To prevent or limit personnel injury To limit damage to physical assets To protect organizational viability 61

62 Implementation Procedures (Cont d) Documented emergency response plan Update, publish, and distribute emergency procedures manual to the teams Periodically review and audit the life safety systems and procedures for all properties 62

63 Implementation Procedures (Cont d) Emergency response plan elements Escalation, notification, and plan activation Emergency response team responsibilities Reporting/Notification procedures Emergency procedures Recovery teams responsibilities and procedures Plan maintenance procedures Recommended testing procedures 63

64 Plan Development 64

65 Emergency Response Plan (ERP) Evacuation Workplace Violence Shelter in Place Medical Emergency Bomb Threat Sniper Cyber Attack 65

66 ERP Elements Purpose Definitions Key contact information Roles/Responsibilities Procedures/Strategies Assembly areas Description/Location of Life Safety Sys. Call Tress Site Schematics 66

67 Purpose of an ERP To identify the components of the planning process including: Planning methodology Plan organization Implementing the plan Documenting the plan To develop processes to maintain the currency of continuity capabilities and the plan document in accordance with the organization s strategic direction 67

68 Objectives of an ERP To review terminology, DRI International approved plan definitions, address BCM planning approaches, elements and components, and discuss plan document structure To explore the planner s role in conducting plan audits, plan maintenance programs, and BCM plan document control 68

69 ERP Contents Objectives & Requirements Teams & Tasks Emergency Procedures Crisis Communication Procedures Coordinating with External Agencies Plan Activation Procedures Plan Documentation 69

70 Business Continuity Management Plan Elements Employees, visitors, consultants, contractors, vendors, customers, suppliers, etc. Sales, Manufacturing, Distribution, Accounting, Payroll, HR, Customer Service, etc. BCM Plan The site and building which accommodates part or all of the organization, and where some or all of the processes are conducted. 70

71 Types of Plans Business Continuity Focus on critical process Core competencies Key personnel RTOs & RPOs Alternate location(s) Command & control Vital records protection Data security Workarounds & interim operations Disaster Recovery Focus on restoring technology & business infrastructure Critical systems restoration RTOs & RPOs Vital records recovery Data recovery Recovery sites 71

72 Types of Plans (Cont d) Crisis Management Focus on strategic leadership Executive protection, response and succession Public relations/legal Employee death or injury Product tampering Hostile take overs Emergency Response Managed by operational personnel Focus on people and property Escalation procedures Notification procedures Life safety procedures Physical security procedures Technology or war room procedures 72

73 Types of Plans (Cont d) COOP Focused on government bodies Department and agency levels Similar to BCM, inserts COOP for BCP Includes management support policy (PDD 67) Business Unit Focuses on the business unit Identifies critical process/function Defines key personnel/resources Needs to be integrated with overall organizational plan 73

74 Successful Plans Clear and concise Coordinated with suppliers & vendors Senior management support/organization commitment On going/part of strategic effort Appropriate budget Retention, backups, & off site storage program Fully documented & exercised regularly Risks are managed Vulnerabilities are prioritized Flexible and adaptable 74

75 Methods of Building Plans Quick plan Initial protection and capabilities Comprehensive plan Fill in the gaps Add capabilities More detailed procedures Maintained plans 75

76 Document the Plan Who is going to do it? How are you going to do it? Conveying organizational program information Defining specific plan detail Structure of plan document Standardize plan documents 76

77 Document the Plan (Cont d) Primary writes the plan They do it every day Secondary edits the draft procedures They will question every step they don t understand Tertiary approves draft plan Manager of area 77

78 Business Continuity Planning Methods In House Contract Turn Key All work is done for you by vendor or consultants Combination Organization and the vendor or consultants work together to develop and maintain plan 78

79 Outsourcing BC Plan Can someone else perform the service better, more efficiently, or more economically than you? Risks vs. rewards Knowledge transfer Specific expertise Broader BCP experience Focus on strategies and plans Ownership & commitment Availability and response Knowledge of organization Driven by contractual objectives 79

80 Relationship Between Strategic, Operational, and Tactical Planning 80

81 Plan Activation 81

82 Declaration of a Disaster Criteria for invoking the disaster recovery plan Severe disruption to service Potential for major data loss Data security may have been compromised Initiating the call tree process Disaster Recovery Coordinator starts the notification and activates the other teams involved in the recovery effort Business unit managers responsible for notifying their teams Get the word out! (external website & intranet if both available, local media) 82

83 Crisis Phases Landscape Survey & Strategic Planning Situation Assessment Decision Making Team Coordination Communicating Monitoring Delegating Prioritizing Planning End of the Crisis Organizational Learning 83

84 Changing Roles Day to Day Operations During a Crisis Normal company organization Business as usual Business Continuity Organization Survival of time sensitive operations Steering Committee Business Managers Emergency Management Committee Team Leaders report to EMT (DRI International 2006) 84

85 What Type of Leadership Style during a Crisis? Autocratic Leadership Participative (democratic) Leadership Free rein Leadership Autocratic Leadership which means making managerial decisions without consulting others. This necessary in situations when absolute followership is needed. IC makes decision and announces it IC sells decision IC presents ideas and invites questions Nickels, McHugh and McHugh, Understanding Business, 9 th edition, McGraw Hill Irwin,

86 7 Lessons for Leading in Crisis* Face Reality, Starting with Yourself Don t be Atlas, Get the World Off Your Shoulders Dig Deep for the Root Cause Get Ready for the Long Haul Never Waste a Good Crisis You re in the Spotlight: Follow True North Go on Offense, Focus on Winning Now *George, Bill, 7 Lessons for Leading in Crisis, Jossey Bass, A Wiley Imprint, San Francisco, CA,

87 Change Management 87

88 Change Management Evolving business environment Competition, a declining economy, technological change, and pressure to preserve the natural environment Managing change has become a critical managerial function Some organizations have been set up to facilitate management than to please customers Developing rules and regulations to give managers control over employees Change Agent approach CEO/General Managers must create an environment of continual reinvention Short term disturbances: anxiety, confusion, and poorer financial results 88

89 Change Management (Cont d) Plan, Do, Check, Act continuous improvement Develop a new strategy and implement Understand Porter s Five Forces Identify a Change Manager Communicate, Communicate, Communicate Continually show the vision of the future Meet regularly with stakeholders and beat the drum of change Reward the employees who embrace change 89

90 Steps to Sizing up any Situation Gather facts Assess Damage Consider Probabilities Assess Your Situation Establish Priorities Make Decisions Develop Plans of Action Take Action Evaluate Progress 90

91 Emergency Management Functions Command (Direction) and Control Crisis Communications Life Safety Property Protection Community (Stakeholder) Outreach Recovery and Restoration Administration and Logistics 91

92 Command and Control 92

93 Function: Command and Control The system for managing resources, analyzing information and making decisions in an emergency is called direction and control. Emergency Management Committee (EMC) Incident Command System (ICS) Emergency Operations Center (EOC) Planning Considerations Security Coordination of Outside Response 93

94 Command and Control 1. Laws and Authorities 2. Risk Analysis A legal basis for the establishment of the emergency management organization, the implementation of an emergency management program, and continuity of government exists in local law/ordinance and is consistent with State statutes concerning emergency management. The organization has a method for identifying and evaluating natural, technological, and human caused threats within its jurisdiction. 3. Hazard Mitigation 4. Resource Management The organization has established a predisaster hazard mitigation program. The organization has the human resources required to carry out assigned responsibilities. 94

95 Command and Control 5. Planning 6. Direction, Control, and Coordination 7. Communication 8. Operations and Procedures The organization has developed a comprehensive mitigation plan and an EOP. EOP operating procedures are developed and tested annually. Communications system capabilities are established. The organization has developed procedures for conducting needs and damage assessments, requesting disaster assistance, and conducting a range of response functions 95

96 Command and Control (Cont d) 9. Logistics and Facilities The primary and alternate EOC have the capabilities to sustain emergency operations for the duration of the emergency and have developed logistics management and operations plans. 10. Training/Safety training 11. Exercises, Evaluations, and Corrective Actions The organization conducts an annual training to all personnel with assigned emergency management responsibilities. The jurisdiction has established an emergency management exercises program, exercises the EOP on an annual basis, and incorporates an evaluation component and corrective action program. 96

97 Command and Control (Cont d) 12. Public Education and Information An emergency preparedness public education program is established, procedures are established for disseminating and managing emergency public information in a disaster, and procedures are developed for establishing and operating a Joint Information Center (JIC). 13. Finance and Administration The jurisdiction has established an administrative system for day to day operations. 97

98 Sample Response 98

99 ERP Activation Levels Incident Monitoring Heightened alert Incident Director assigned Pre Positioning Imminent event with pre warning ID assigned, Logistics and Information Minor Incident Minor adverse impact ID, mobilize additional staff Major Incident High impact to operations or life safety ID, Full activation of ICS 99

100 Awareness and Training 100

101 Definitions Awareness Awareness is knowing or reality Awareness implies you have knowledge of something through alertness or observing or interpolating what you see, hear, feel, etc. Training Training is to provide schooling using a process or method Repetition to achieve desired results Train to instruct so as to make proficient or qualified* *from Webster s New World Dictionary of the American Language 101

102 ERP Training/Awareness Training CPR/AED Training Safety Training Fire Drills Emergency Notifications Awareness Programs Staff Awareness Open House E mail Communications National Preparedness Month (Sept) 102

103 The Case for Awareness & Training Human error accounts for a significant degree of loss Training employees shows that the organization has taken a standard of due care Supports the mission of the organization Demonstrates organizational commitment 103

104 The Case for Awareness & Training (Cont d) Reminds people of basic security practices Knowledge of the vulnerabilities and viable risks allows employees to implement better procedures If employees are not aware or trained on these vulnerabilities and risks, they cannot be held expected to demonstrate accountability Orients new employees to BCM program 104

105 The Case for Awareness & Training (Cont d) Raises awareness of the risks of downtime due to business interruption Visibility lets people know who you are and what you do 105

106 Purpose of Awareness Programs Increase knowledge and awareness on how to prepare for and respond to emergency situations that impact: The organization A facility or location Employees, contractors & visitors 106

107 Purpose of Training Programs Knowing how to protect the organization and how to respond to an event will increase the chances for survival Making employees aware of the risks to the organization and the impact of those risks Making employees aware of the plans in place to protect them from a disaster Training employees how to respond during a disaster 107

108 Program Outline Who will develop the BCM awareness and training program for your organization? What are the organizational BCM awareness and training needs? Define a target audience 108

109 Program Outline (Cont d) Create the Vision To minimize the impact of emergencies and natural disasters on the organization and its employees. Define the Mission To provide the organization and its employees with the training and resources to meet this vision. 109

110 Program Outline, (Cont d) Set goals and objectives Identify specific actions individuals will be encouraged to take Identify the existing organizational capabilities and determine the need for modifications 110

111 Program Outline (Cont d) Develop key message Logo & slogan Implementing the program Match activities with target audience How will it be funded? Identify challenges Measure progress 111

112 BCM Awareness Program Topics 1. Components of Business Continuity Plan 2. Importance of Business Continuity Plans 3. Who are the Business Continuity Plan coordinators 4. Where BC plan information can be found 5. When the BC plan is exercised / invoked 6. How the BC plan is exercised / invoked 112

113 Types of Awareness Activities Kick off day Annual presentation to senior management on state of program Orientation for new employees BCM Awareness Week Design a website Videos/DVD 113

114 Promoting Awareness Print materials Newsletters Posters, Signs, Stickers Personal Memo from CEO, CIO, or Director Pamphlets and brochures Pay check inserts Information packages Surveys Calendars Safety Kits Display booths 114

115 BCM Training Program Topics All personnel should be responsible for: Recognizing and reporting an emergency Warning other employees in the area Taking security and safety measures Location and use of common emergency equipment DRI 115

116 BCM Training Program Topics Role in execution of BC plan Function specific training Hazardous materials Safety & security Emergency response procedures Pre exercise training BCM software training 116

117 BCM Training Program Topics Individual roles and responsibilities Notification procedures Escalation procedures Evacuation, shelter, and accountability procedures 117

118 Types of Training Activities Computer Classroom Exercise based External to organization Organization wide campaign 118

119 Types of Training Activities Exercise based Tabletop exercises Walk through drills Functional drills Evacuation drills Full scale exercises 119

120 Ongoing Maintenance 120

121 BCM Maintenance Activities Exercise Plan Review & Updates Business Technology Awareness Project Training 121

122 Maintenance Objective To evaluate consistency within the plan, between the plan and other aspects of the overall program, and between the plans and the current characteristics of the organization 122

123 Plan Review & Audit Methodology Audits Business continuity planner responsibilities Assist auditor Auditor responsibilities Set audit objectives and scope Assess and select audit method Audit administrative aspects of the BCM program Audit plan structure, content, and action sections Audit plan documentation control procedures 123

124 Plan Review & Audit Methodology (Cont d) A plan review should involve Key staff of that plan Participants becoming familiar with the plan document Participants validate that the plan represents strategies and objectives Participants revealing gaps, oversights, and mistakes 124

125 Plan Review & Audit Methodology (Cont d) Should address (minimum) Personnel and assigned recovery tasks Personnel and contact numbers Text (recovery procedure) changes Back up process and what is included Periodic reviews with known deadlines Where input can be made to review process 125

126 Goals Efficient or effective? Is your goal to be efficient? Maintaining the plan by doing the job on time and as expected Is your goal to be effective? Doing the right thing vs doing the job right 126

127 Objectives Does your plan measure up? Is it accurate, thorough, and complete? Is it logical and make suitable assumptions? Does it support the resumption of necessary information systems and business processes within appropriate timeframes? Are management, personnel, and other stakeholders capable of executing plan? 127

128 Objectives (Cont d) Is the structure of plan correct? Is plan and supporting documentation valid? Do the assumptions and scope match the contents? Is the team structure and members current? Are the roles, responsibilities, and tasks current and executable? Is the plan integrated and does it support any dependent plans and the overall organizational objectives? 128

129 Maintenance Responsibilities Who should review plan? Business continuity staff Auditors Plan owners/dept. chair Teams Senior management Other 129

130 Maintenance Responsibilities (Cont d) Examples BCM planner directs and controls plan maintenance Team members are responsible for team sections Department heads are responsible for detail relating to their department Senior management review and approve plan Internal audit examines plan to determine if it satisfies recovery objectives of organization, is accurate, and up todate 130

131 Maintenance Schedule Develop plan maintenance schedule Scheduled Time driven Scheduled at decided time intervals Unscheduled Event driven Result of major changes to organization Personnel Responsibilities Equipment 131

132 Maintaining Plans Maintain the plan Select tools Monitor activities Establish update process Audit and control 132

133 Sources of Change Information Exercise results Organization directives, announcements, internal messages, strategic business meetings Regularly scheduled meetings with recovery team leaders Change management meetings 133

134 Change Factors Changes in Procedure Organizational structure Personnel Physical Technology Recovery requirements Testing issues 134

135 Change Factors (Cont d) Tracking changes helps to Carry out more effective reviews Hold more effective exercises Point to areas of plan that need closer attention Develop scenarios for exercises 135

136 Updating Plans Generate change management items from incident logs Assign updating task to accountable individual Set due date for update Validate that update is completed Ensure changes required by exercise results are implemented Ensure next exercise includes issues indicated by previous results 136

137 Plan Document Control Procedures Establish procedures for plan document control Version control of all documents Assign document ownership Assign numbers to each recovery document Assign each numbered document to specific team member 137

138 Plan Document Control Procedures (Cont d) Page replacement Chapter replacement Plan replacement Old materials should be returned and destroyed 138

139 Plan Document Control Procedures (Cont d) Confidential information Security and control Master distribution list Version identification number Record recipient on distribution list Full copies to all team managers Partial copies to others 139

140 Date Team Name Document Control Log Business Continuity Plan Control List Member Name Plan Number Storage Location Signature 140

141 141

142 BCM Program Maintenance Should incorporate all levels of the organization and include Policies Guidelines Standards & procedures Awareness/Training Testing/Exercising Plan review & updates Multi-year schedule Multi-year budget Evaluation criteria & measures 142

143 Crisis Communication Communicate, Communicate, Communicate 143

144 What is Crisis Communication? Effective and managed communication about an event or occurrence that can impact people, organizations, and communities Simple Direct Honest 144

145 Crisis Communication Objectives To identify crisis communication plan elements To identify strategies to effectively communicate with all groups 145

146 Communication Plan Elements During a crisis How will you communicate with different audiences? Who will communicate with the different audiences? What needs to be communicated to the different audiences? 146

147 Communication Plan Elements Public relations policy and procedures Organizational profile with detail on core offerings Reference files on potential crises Call & emergency contact lists Designated spokesperson(s) Media directory Media contact log 147

148 Audiences Affected by Crises Community Public, neighbors, special interest groups External Agencies Government, regulators, emergency response organizations External Groups Customers, vendors, contractors, suppliers, unions Internal Groups BoD, senior management, steering committee, spokesperson, employees, stakeholders, retirees 148

149 Identify Your Audience How do I select what to say to whom? Who needs to know? What do they need to know? When do they need to know it? 149

150 Establish Spokesperson(s) Match target audience with appropriate spokesperson Senior management Employees Stakeholders Media External groups/agencies Community 150

151 Sources of Information Facilities Structure and plant issues Business units Data processing equipment Business related issues Level of damage Risk management / insurance Cost estimates to repair Insurance adjustor Damage assessment team Report of condition of facility and contents Security Building contents Life safety issues Human Resources Injuries Employee issues Special services 151

152 Key Messages Clear and easy to comprehend Repeated constantly Integrated with messages sent to other audiences Consistent Be up front regarding confidential information Speak to the specific audiences concerns Use personal language and acknowledge emotions Appreciate the individuality of responses 152

153 Key Messages Have answers to: What happened? Were there deaths or injuries? What is the extent of the damage? Why did it happen? Who or what is responsible? What is being done? When will it be over? What would you say to those affected? 153

154 Methods of Communication Direct mailings Telephone calls hotlines Newsletters Web sites Conference calls to investors Employee meetings Public meetings Paid advertisements Prepared statements Press briefings & releases 154

155 Prepared Statements 5 w s Clear and concise Name of organization Date Time Number sequence For more information 155

156 Mistakes to Avoid Don t Be timid Guess or speculate Stick to a story if it has changed Wear sunglasses, chew gum, or smoke Get trapped into making predictions Lie 156

157 Introduction to Exercise 157

158 Why Exercise? Exercises give entities, communities, and regions a set of essential tools to prevent, prepare for, respond to and recover from disasters. Exercising encompasses people handling the following activities: 1) evacuation procedures, 2) incident notification, 3) familiarity with alternate locations, interim procedures and manual processes Testing, not to be confused with Exercises, involves equipment, technologies and durable goods 158

159 Reasons for Conducting Exercises Key Concept: Exercise (n) Something performed or practiced in order to develop, improve, or display a specific power skill. (v) To practice in order to train, strengthen, or develop Merriam Webster s Dictionary Exercises improve readiness by: Providing a way to evaluate operations and plans Reinforce teamwork Demonstrating a community s resolve to prepare for disastrous and catastrophic events. 159

160 Exercise Main Goals Exercises help: Test and evaluate plans, policies and procedures Identify strengths and shortfalls Improve organizational coordination and communications Find resource gaps Train personnel in roles and responsibilities Improve individual (and team) performance Satisfy regulatory requirements 160

161 The Building Block Approach There are seven types of exercises in the building block approach. Discussion Seminar involves brief discussion of preparedness strategies and goals. Workshops is a formal discussion based exercise led by a facilitator or presenter, used to build or achieve a product. Tabletop Exercise involves senior staff or other key personnel in a informal group discussion centered on a hypothetical scenario. Games a simulation of operations using rules, data, and procedures designed to depict an actual or assumed real life situation. Operations Drills is a supervised activity that tests a specific operation or function of a single agency. Full Scale Exercise (FES) is a high stress multi entities, multi jurisdictional activity involving actual deployment of resources in a coordinated response, as if a real incident had occurred. 161

162 Planning the Exercise 162

163 Incident Command System (ICS) Federal Emergency Management Agency (FEMA) defines the Incident Command System (ICS) as a standardized, on scene, all hazards incident management approach that: Allows for the integration of facilities, equipment, personnel, procedures, and communications. Enables a coordinated response among various groups, both public and private. Establishes common processes for planning and managing resources. 163

164 ICS (Cont d) Can be used to manage an emergency incident or non emergency event Can be used for both small and large events or situations System has considerable internal flexibility System can grow or shrink to meet differing needs Cost effective & efficient management system 164

165 ICS (Cont d) ICS is flexible and can be used for incidents of any type, scope, and complexity. ICS is used by all levels of government, nongovernmental organizations and the private sector. As a system, ICS is extremely useful; not only does it provide an organizational structure for incident management, but it also guides the process for planning, building, and adapting that structure. 165

166 ICS Structure Incident Command Public Information Officer Safety Officer Liaison Officer Command Staff: The Command Staff provide Information, Safety, and Liaison services for the entire organization. Operations Section Planning Section Logistics Section Finance/ Administration Section General Staff: The General Staff are assigned functional authority for Operations, Planning, Logistics, and Finance/Administration. 166

167 ICS App for Smart Phones 167

168 FEMA Training 168

169 FEMA Independent Study Courses IS 100: Introduction to ICS IS 200: ICS for Single Resources and Initial Action Incidents IS 700: Introduction to the National Incident Management System IS 800 B: National Response Framework ICS 300, 400: Advance ICS (Classroom only) 169

170 170

171 Emerging Trends 171

172 The State of Business Continuity Preparedness* Risk officers are finally getting involved with BC/DR BC Programs do not always report to C Level BC funding will stay the same, IT departments are receiving more dollars Most conduct Threat Assessments and BIAs BC are becoming Scenario based *Market Study done by Forrester Research and Disaster Recovery Journal in

173 The State of Business Continuity Preparedness* (Cont d) Exercising is not occurring regularly BC is not taking an active role throughout the organization Companies use a mix of strategies Invocations are frequent Everyone wants to know if you re ready *Market Study done by Forrester Research and Disaster Recovery Journal in

174 Wrap Up 174

175 Questions/Answers Contact: Dennis V. Rose, MBA, CBCP

176 Resources Disaster Recovery Journal drj.com DRII the Institute for Continuity Management drii.org Moss Adams BC/DR Consulting Group 176

177 Creating an Integrated Business Continuity / Disaster Recovery (BC/DR) Program A Hands on Workshop 177

178 December 4th Agenda 8:30 to 9:00 9:00 to 10:00 9:40 to 10:00 10:00 to 10:10 10:10 to 11:30 11:30 to 11:50 11:50 to 12:00 Overview from the first day Cyber Security Introduction Introduction to Exercises Break Mock Exercise Hot Wash Wrap Up 178

179 Overview from the First Day 179

180 Lessons Learned Understand the risks and business impact facing your organization Establish Command and Control through ICS Stay ahead of Crisis Communications Establish before hand communication with the department heads open communication Provide After Action reports Provide Awareness and Training Exercise, Exercise, Exercise 180

181 Summary Prepare yourself and your family visit ready.gov Crises have life cycles, and understanding what occurs before a crisis commences is important to helping preventing it. This information you have been presented has provided you with a general background on ICS. Be the change you want to happen in the organization Business Continuity is Strategic Planning 181

182 Cyber Security Introduction 182

183 Introductions Kevin Villanueva, CISA, CISSP, PCI QSA Senior Manager Moss Adams Advisory Services IT Security and Infrastructure Practice Leader 18+ years of IT consulting and cybersecurity experience BS, Business Administration, Pepperdine University Certified Information Systems Auditor (CISA) Certified Information Systems Security Professional (CISSP) Payment Card Industry Qualified Security Assessor (PCI QSA) Practice areas include cybersecurity assessments; penetration testing; PCI DSS and HIPAA compliance auditing; strategic technology planning; disaster recovery and business continuity planning, policy and procedure development Dozens of IT Security Assessments over the years for large and small clients, including Microsoft, RingCentral, ESCO Corporation, Multnomah County, Portland State University, Sound Transit, King County, STRATA Networks, among others. 183

184 Agenda Cybersecurity Framework Basics Attacks Against Critical Infrastructure Entities Cybersecurity Framework Key Controls Conclusion and Questions 184

185 Cybersecurity framework basics Executive Order Improving Critical Infrastructure Cybersecurity (2013) National Institute of Standards and Technology (NIST) Over 3,000 individuals from various sectors contributed Definition: Guidance based on best practices, standards, and guidelines for critical infrastructure to manage and reduce cybersecurity risk. Currently in version 1.0, issued in February 2014 Three tiers: Core, Profile, and Implementation Not intended to be a one size fits all framework. Technology neutral. Purely voluntary 185

186 Critical infrastructure Definition: Sectors whose assets, systems, networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof. Dept. of Homeland Security Includes the following 16 sectors: 1) Chemical 2) Commercial Facilities 3) Communication 4) Critical Manufacturing 5) Dams 6) Defense Industrial Base 7) Emergency Services 8) Energy 9) Financial Services 10) Food and Agriculture 11) Government Facilities 12) Healthcare and Public Health 13) Information Technology 14) Nuclear Reactors, Materials, and Waste 15) Transportation Systems 16) Water and Wastewater Systems 186

187 Attacks against critical infrastructure Entities SCADA or ICS networks are common targets Cyber attacks doubled in 2014 to 675,186 Most common attack type is buffer overflow Motivation is frequently political, but also financial Common against older equipment that is not as secure Communications Sector Breaches o Cox Communications (April 2014): customer database hacked; FCC fined company $595,000 o TerraCom and YourTel America (March 2013): PII of 300,000 customers; FCC fined both $3.5MM 187

188 CYBERSECURITY FRAMEWORK KEY CONTROLS

189 Functions and categories Function Unique Identifier Function Category Unique Identifier Category ID.AM Asset Management ID.BE Business Environment ID Identify ID.GV Governance ID.RA Risk Assessment ID.RM Risk Management Strategy PR.AC Access Control PR.AT Awareness and Training PR Protect PR.DS PR.IP Data Security Information Protection Processes and Procedures PR.MA Maintenance PR.PT Protective Technology 189

190 Functions and categories (cont.) Function Unique Identifier Function Category Unique Identifier Category DE.AE Anomalies and Events DE Detect DE.CM Security Continuous Monitoring DE.DP Detection Processes RS.RP Response Planning RS.CO Communications RS Respond RS.AN Analysis RS.MI Mitigation RS.IM Improvements RC.RP Recovery Planning RC Recover RC.IM Improvements RC.CO Communications 190

191 Risk Assessment (ID.RA) and risk management strategy (ID.RM) Goal/Definition: The organization understands the cybersecurity risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals. ID.RA 1: Asset vulnerabilities are identified and documented. ID.RA 5: Threats, vulnerabilities, likelihoods, and impacts are used to determine risk. ID.RM 1: Risk management processes are established, managed, and agreed to by organizational stakeholders. 191

192 Access control (PR.AC) Goal/Definition: Access to assets and associated facilities is limited to authorized users, processes, or devices, and to authorized activities and transactions. PR.AC 4: Access permissions are managed, incorporating the principles of least privilege and separation of duties. PR.AC 5: Network integrity is protected, incorporating network segregation where appropriate. 192

193 Awareness and training (PR.AT) Goal/Definition: The organization s personnel and partners are provided cybersecurity awareness education and are adequately trained to perform their information security related duties and responsibilities consistent with related policies, procedures, and agreements. PR.AT 3: Third party stakeholders (e.g., suppliers, customers, partners) understand roles and responsibilities. PR.AT 4: Senior executives understand roles and responsibilities. 193

194 Data security (PR.DS) Goal/Definition: Information and records (data) are managed in a way that is consistent with the organization s risk strategy to protect the confidentiality, integrity, and availability of information. PR.DS 1: Data at rest is protected. PR.DS 2: Data in transit is protected. 194

195 Protective technology (PR.PT) Goal/Definition: Technical security solutions are managed to ensure the security and resilience of systems and assets, consistent with related policies, procedures, and agreements. PR.PT 2: Removable media is protected and its use restricted according to policy. 195

196 Anomalies and events (DE.AE) Goal/Definition: Anomalous activity is detected in a timely manner and the potential impact of events is understood. DE.AE 3: Event data are aggregated and correlated from multiple sources and sensors. DE.CM 6: External service provider activity is monitored to detect potential cybersecurity events. 196

197 Response planning (RS.RP) Goal/Definition: Response processes and procedures are executed and maintained, to ensure a timely response to detected cybersecurity events. RS.RP 1: Response plan is executed during or after an event. 197

198 Improvements (RC.IM) Goal/Definition: Recovery planning and processes are improved by incorporating lessons learned into future activities. RC.IM 1: Recovery plans incorporate lessons learned. RC.IM 2: Recovery strategies are updated. 198

199 SUMMARY The amount and frequency of breaches will continue Security responsibilities flow downstream to third party service providers Leverage the Cybersecurity Framework (or other framework) for a strategic advantage Prepare, be vigilant, and continually evolve and improve your approach toward protecting critical information assets 199

200 QUESTIONS? Kevin Villanueva, Senior Manager

201 Exercise Recap 201

202 Why Exercise? Exercises give entities, communities, and regions a set of essential tools to prevent, prepare for, respond to and recover from disasters. Exercising encompasses people handling the following activities: 1) evacuation procedures, 2) incident notification, 3) familiarity with alternate locations, interim procedures and manual processes Testing, not to be confused with Exercises, involves equipment, technologies and durable goods 202

203 Reasons for Conducting Exercises Key Concept: Exercise (n) Something performed or practiced in order to develop, improve, or display a specific power skill. (v) To practice in order to train, strengthen, or develop Merriam Webster s Dictionary Exercises improve readiness by: Providing a way to evaluate operations and plans Reinforce teamwork Demonstrating a community s resolve to prepare for disastrous and catastrophic events. 203

204 Exercise Main Goals Exercises help: Test and evaluate plans, policies and procedures Identify strengths and shortfalls Improve organizational coordination and communications Find resource gaps Train personnel in roles and responsibilities Improve individual (and team) performance Satisfy regulatory requirements 204

205 The Building Block Approach There are seven types of exercises in the building block approach. Discussion Seminar involves brief discussion of preparedness strategies and goals. Workshops is a formal discussion based exercise led by a facilitator or presenter, used to build or achieve a product. Tabletop Exercise involves senior staff or other key personnel in a informal group discussion centered on a hypothetical scenario. Games a simulation of operations using rules, data, and procedures designed to depict an actual or assumed real life situation. Operations Drills is a supervised activity that tests a specific operation or function of a single agency. Full Scale Exercise (FES) is a high stress multi entities, multi jurisdictional activity involving actual deployment of resources in a coordinated response, as if a real incident had occurred. 205

206 Planning the Exercise 206

207 Incident Command System (ICS) Federal Emergency Management Agency (FEMA) defines the Incident Command System (ICS) as a standardized, on scene, all hazards incident management approach that: Allows for the integration of facilities, equipment, personnel, procedures, and communications. Enables a coordinated response among various groups, both public and private. Establishes common processes for planning and managing resources. 207

208 ICS (Cont d) Can be used to manage an emergency incident or non emergency event Can be used for both small and large events or situations System has considerable internal flexibility System can grow or shrink to meet differing needs Cost effective & efficient management system 208

209 ICS (Cont d) ICS is flexible and can be used for incidents of any type, scope, and complexity. ICS is used by all levels of government, nongovernmental organizations and the private sector. As a system, ICS is extremely useful; not only does it provide an organizational structure for incident management, but it also guides the process for planning, building, and adapting that structure. 209

210 ICS Structure Incident Command Public Information Officer Safety Officer Liaison Officer Command Staff: The Command Staff provide Information, Safety, and Liaison services for the entire organization. Operations Section Planning Section Logistics Section Finance/ Administration Section General Staff: The General Staff are assigned functional authority for Operations, Planning, Logistics, and Finance/Administration. 210

211 Mock Exercise 211

212 Table Top Exercises 212

213 Exercise Documents Situation Manual (SitMan) Lessons Learned Evaluation After Action Report (AAR) 213

214 Tabletop Exercise Instructions: 1. Working in two teams, review the SITMAN and the resource list provided 2. Identify the Incident Commander and roles and responsibilities necessary to respond 3. Answer the questions Identify the roles and responsibilities utilizing the ICS organization How will you employ your utility crews? How will your group respond? What safety measure will be utilized? 214

215 215

216 216

217 Hot Wash 217

218 Questions/Answers Contact: Dennis V. Rose, MBA, CBCP

Cybersecurity Framework Security Policy Mapping Table

Cybersecurity Framework Security Policy Mapping Table Cybersecurity Framework Security Policy Mapping Table The following table illustrates how specific requirements of the US Cybersecurity Framework [1] are addressed by the ISO 27002 standard and covered

More information

Happy First Anniversary NIST Cybersecurity Framework:

Happy First Anniversary NIST Cybersecurity Framework: Happy First Anniversary NIST Cybersecurity Framework: We ve Hardly Known Ya Chad Stowe, CISSP, CISA, MBA Who is your organization on Cybersecurity? Problem Statement Management has not been given the correct

More information

Automation Suite for NIST Cyber Security Framework

Automation Suite for NIST Cyber Security Framework WHITEPAPER NIST Cyber Security Framework Automation Suite for NIST Cyber Security Framework NOVEMBER 2014 Automation Suite for NIST Cyber Security Framework The National Institute of Standards and Technology

More information

NIST Cybersecurity Framework & A Tale of Two Criticalities

NIST Cybersecurity Framework & A Tale of Two Criticalities NIST Cybersecurity Framework & A Tale of Two Criticalities Vendor Management & Incident Response Presented by: John H Rogers, CISSP Advisory Services Practice Manager [email protected] Presented

More information

Business Continuity Plan

Business Continuity Plan Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions

More information

Applying IBM Security solutions to the NIST Cybersecurity Framework

Applying IBM Security solutions to the NIST Cybersecurity Framework IBM Software Thought Leadership White Paper August 2014 Applying IBM Security solutions to the NIST Cybersecurity Framework Help avoid gaps in security and compliance coverage as threats and business requirements

More information

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a

More information

CRR-NIST CSF Crosswalk 1

CRR-NIST CSF Crosswalk 1 IDENTIFY (ID) Asset Management (AM): The data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes are identified and managed consistent with their relative

More information

Temple university. Auditing a business continuity management BCM. November, 2015

Temple university. Auditing a business continuity management BCM. November, 2015 Temple university Auditing a business continuity management BCM November, 2015 Auditing BCM Agenda 1. Introduction 2. Definitions 3. Standards 4. BCM key elements IT Governance class - IT audit program

More information

PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA

PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA 1 Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand

More information

Business Continuity and Disaster Recovery Planning

Business Continuity and Disaster Recovery Planning Business Continuity and Disaster Recovery Planning Jennifer Brandt, CISA A p r i l 16, 2015 HISTORY OF STINNETT & ASSOCIATES Stinnett & Associates (Stinnett) is a professional advisory firm offering services

More information

Business Continuity Planning 101. +1 610 768-4120 (800) 634-2016 www.strohlsystems.com [email protected]

Business Continuity Planning 101. +1 610 768-4120 (800) 634-2016 www.strohlsystems.com info@strohlsystems.com Business Continuity Planning 101 Presentation Overview What is business continuity planning Plan Development Plan Testing Plan Maintenance Future advancements in BCP Question & Answer What is a Disaster?

More information

Business Continuity Planning and Disaster Recovery Planning

Business Continuity Planning and Disaster Recovery Planning 4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business

More information

EMERGENCY PREPAREDNESS PLAN Business Continuity Plan

EMERGENCY PREPAREDNESS PLAN Business Continuity Plan EMERGENCY PREPAREDNESS PLAN Business Continuity Plan GIS Bankers Insurance Group Powered by DISASTER PREPAREDNESS Implementation Small Business Guide to Business Continuity Planning Surviving a Catastrophic

More information

Business Continuity Glossary

Business Continuity Glossary Developed In Conjuction with Business Continuity Glossary ACTIVATION: The implementation of business continuity capabilities, procedures, activities, and plans in response to an emergency or disaster declaration;

More information

Federal Financial Institutions Examination Council FFIEC. Business Continuity Planning BCP MARCH 2003 MARCH 2008 IT EXAMINATION

Federal Financial Institutions Examination Council FFIEC. Business Continuity Planning BCP MARCH 2003 MARCH 2008 IT EXAMINATION Federal Financial Institutions Examination Council FFIEC Business Continuity Planning MARCH 2003 MARCH 2008 BCP IT EXAMINATION H ANDBOOK TABLE OF CONTENTS INTRODUCTION... 1 BOARD AND SENIOR MANAGEMENT

More information

SCADA Business Continuity and Disaster Recovery. Presented By: William Biehl, P.E. 913-601-0104 (mobile) [email protected]

SCADA Business Continuity and Disaster Recovery. Presented By: William Biehl, P.E. 913-601-0104 (mobile) Bill.Biehl@we-inc.com SCADA Business Continuity and Disaster Recovery Presented By: William Biehl, P.E. 913-601-0104 (mobile) [email protected] Business Continuity Planning, a Sound Process A Business Continuity Plan: "A

More information

CISM Certified Information Security Manager

CISM Certified Information Security Manager CISM Certified Information Security Manager Firebrand Custom Designed Courseware Chapter 4 Information Security Incident Management Exam Relevance Ensure that the CISM candidate Establish an effective

More information

Business Continuity and Emergency Preparedness Planning. Vandita Zachariah, MA, MBA, CIA HHSC Internal Audit Division May 21, 2010

Business Continuity and Emergency Preparedness Planning. Vandita Zachariah, MA, MBA, CIA HHSC Internal Audit Division May 21, 2010 Business Continuity and Emergency Preparedness Planning Vandita Zachariah, MA, MBA, CIA HHSC Internal Audit Division May 21, 2010 Overview Define key terms and list essential elements of business continuity

More information

www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014

www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014 www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014 Agenda Key Definitions Risks Business Continuity Management Program BCM Capability Assessment Process BCM Value Proposition

More information

Federal Financial Institutions Examination Council FFIEC BCP. Business Continuity Planning FEBRUARY 2015 IT EXAMINATION H ANDBOOK

Federal Financial Institutions Examination Council FFIEC BCP. Business Continuity Planning FEBRUARY 2015 IT EXAMINATION H ANDBOOK Federal Financial Institutions Examination Council FFIEC Business Continuity Planning BCP FEBRUARY 2015 IT EXAMINATION H ANDBOOK Table of Contents Introduction 1 Board and Senior Management Responsibilities

More information

<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP

<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP IT Disaster Recovery Plan Template By Paul Kirvan, CISA, CISSP, FBCI, CBCP Revision History REVISION DATE NAME DESCRIPTION Original 1.0 2 Table of Contents Information Technology Statement

More information

NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015

NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015 NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015 Overview The University of Pittsburgh NIST Cybersecurity Framework Pitt NIST Cybersecurity Framework Program Wrap Up Questions

More information

BUSINESS CONTINUITY PLANNING GUIDELINES

BUSINESS CONTINUITY PLANNING GUIDELINES BUSINESS CONTINUITY PLANNING GUIDELINES Washington University in St. Louis The purpose of this guide is to serve as a tool to all departments, divisions, and labs across the University in building a Business

More information

CRR Supplemental Resource Guide. Volume 5. Incident Management. Version 1.1

CRR Supplemental Resource Guide. Volume 5. Incident Management. Version 1.1 CRR Supplemental Resource Guide Volume 5 Incident Management Version 1.1 Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by Department of Homeland Security

More information

Evaluating and Improving Your Business Continuity Plan

Evaluating and Improving Your Business Continuity Plan Evaluating and Improving Your Business Continuity Plan As presented to the Northeast Florida IIA Chapter January 23, 2015 Contact Information Karen Weir, MAC, CISA, CBCP Manager [email protected]

More information

Critical Manufacturing Cybersecurity Framework Implementation Guidance

Critical Manufacturing Cybersecurity Framework Implementation Guidance F Critical Manufacturing Cybersecurity Framework Implementation Guidance i Foreword The National Institute of Standards and Technology (NIST) released the 2014 Framework for Improving Critical Infrastructure

More information

Unit Guide to Business Continuity/Resumption Planning

Unit Guide to Business Continuity/Resumption Planning Unit Guide to Business Continuity/Resumption Planning (February 2009) Revised June 2011 Executive Summary... 3 Purpose and Scope for a Unit Business Continuity Plan(BCP)... 3 Resumption Planning... 4 Assumptions

More information

Assessing Your Disaster. Andrews Hooper Pavlik PLC. Andrews Hooper Pavlik PLC

Assessing Your Disaster. Andrews Hooper Pavlik PLC. Andrews Hooper Pavlik PLC Assessing Your Disaster Recovery Plans Gregory H. Soule, CPA, CISA, CISSP, CFE Andrews Hooper Pavlik PLC Andrews Hooper Pavlik PLC Agenda Business Continuity Concepts Impact Analysis Risk Assessment Risk

More information

Company Management System. Business Continuity in SIA

Company Management System. Business Continuity in SIA Company Management System Business Continuity in SIA Document code: Classification: Company Project/Service Year Document No. Version Public INDEX 1. INTRODUCTION... 3 2. SIA S BUSINESS CONTINUITY MANAGEMENT

More information

IT Disaster Recovery Plan Template

IT Disaster Recovery Plan Template HOPONE INTERNET CORP IT Disaster Recovery Plan Template Compliments of: Tim Sexton 1/1/2015 An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned

More information

BUSINESS CONTINUITY MANAGEMENT GUIDELINES FOR BANKS AND FINANCIAL INSTITUTIONS

BUSINESS CONTINUITY MANAGEMENT GUIDELINES FOR BANKS AND FINANCIAL INSTITUTIONS BUSINESS CONTINUITY MANAGEMENT GUIDELINES FOR BANKS AND FINANCIAL INSTITUTIONS DIRECTORATE OF BANKING SUPERVISION AUGUST 2009 TABLE OF CONTENTS PAGE 1.0 INTRODUCTION..3 1.1 Background...3 1.2 Citation...3

More information

How To Prepare For A Disaster

How To Prepare For A Disaster Building an effective Tabletop Exercise Presented by: Ken M. Shaurette, CISSP, CISA, CISM, CRISC FIPCO Director IT Services 3/26/2013 #1 Continuity Plan Testing Flowchart 3/26/2013 #2 1 Ongoing Multi-Year

More information

2014 NABRICO Conference

2014 NABRICO Conference Business Continuity Planning 2014 NABRICO Conference September 19, 2014 6 CityPlace Drive, Suite 900 St. Louis, Missouri 63141 314.983.1200 1520 S. Fifth Street, Suite 309 St. Charles, Missouri 63303 636.255.3000

More information

Business Continuity Template

Business Continuity Template Emergency Management Business Continuity Template The Regional Municipality of Wood Buffalo would like to give credit to the Calgary Emergency Management Agency (CEMA) and the Calgary Chamber of Commerce

More information

CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT

CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT JANUARY 2008 GUIDELINE ON BUSINESS CONTINUITY GUIDELINE CBK/PG/14

More information

Assessment of natural hazards, man made hazards, technical and societal related risks and associated impact.

Assessment of natural hazards, man made hazards, technical and societal related risks and associated impact. Aon Business Continuity Planning The Aon Business Continuity Planning practice provides consulting services that allow Aon clients to measure and manage their strategic and tactical risks through Crisis

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Four

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Four Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Four Data Handling in University Business Impact Analysis ( BIA ) Agenda Overview Terminologies Performing

More information

Improving Critical Infrastructure Cybersecurity Executive Order 13636. Preliminary Cybersecurity Framework

Improving Critical Infrastructure Cybersecurity Executive Order 13636. Preliminary Cybersecurity Framework 1 Improving Critical Infrastructure Cybersecurity Executive Order 13636 Preliminary Cybersecurity Framework 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35

More information

How To Plan A Crisis Management Program

How To Plan A Crisis Management Program Building a Security Conscious Business Continuity Management (BCM) Program Sam Stahl, CBCP, MBCI EMC Global Professional Services Program Manager [email protected] ASIS Singapore, 2014 Agenda Overview

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity Version 1.0 National Institute of Standards and Technology February 12, 2014 Table of Contents Executive Summary...1 1.0 Framework Introduction...3

More information

Emergency Preparedness Guidelines

Emergency Preparedness Guidelines DM-PH&SD-P7-TG6 رقم النموذج : I. Introduction This Guideline on supports the national platform for disaster risk reduction. It specifies requirements to enable both the public and private sector to develop

More information

Principles for BCM requirements for the Dutch financial sector and its providers.

Principles for BCM requirements for the Dutch financial sector and its providers. Principles for BCM requirements for the Dutch financial sector and its providers. Platform Business Continuity Vitale Infrastructuur Financiële sector (BC VIF) Werkgroep BCM requirements 21 September 2011

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

The handouts and presentations attached are copyright and trademark protected and provided for individual use only.

The handouts and presentations attached are copyright and trademark protected and provided for individual use only. The handouts and presentations attached are copyright and trademark protected and provided for individual use only. READINESS RESOURCES American Bar Association -- www.abanet.org Disaster Recovery: www.abanet.org/lpm/lpt/articles/slc02051.html

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity Version 1.0 National Institute of Standards and Technology February 12, 2014 Table of Contents Executive Summary...1 1.0 Framework Introduction...3

More information

Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain

Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain 1. What is the most common planned performance duration for a continuity of operations plan (COOP)? A. 30 days B. 60 days C. 90 days D. It depends on the severity of a disaster. 2. What is the business

More information

OREGON STATE UNIVERSITY MASTER EMERGENCY MANAGEMENT PLAN

OREGON STATE UNIVERSITY MASTER EMERGENCY MANAGEMENT PLAN OREGON STATE UNIVERSITY MASTER EMERGENCY MANAGEMENT PLAN Last Edit 2/8/2011 OVERVIEW This document provides a management framework for responding to incidents that may threaten the health and safety of

More information

UNION COLLEGE INCIDENT RESPONSE PLAN

UNION COLLEGE INCIDENT RESPONSE PLAN UNION COLLEGE INCIDENT RESPONSE PLAN The college is committed to supporting the safety and welfare of all its students, faculty, staff and visitors. It also consists of academic, research and other facilities,

More information

What is an Exercise? Agenda. Types of Exercises. Tabletop Exercises for Executives. Defining the Tabletop Exercise. Types of Tabletop Exercises

What is an Exercise? Agenda. Types of Exercises. Tabletop Exercises for Executives. Defining the Tabletop Exercise. Types of Tabletop Exercises Tabletop Exercises for Executives Kathy Lee Patterson, CBCP, PMP Independence Blue Cross Defining the Tabletop Exercise Types of Tabletop Exercises Advantages to conducting Exercises Agenda 12 Step Approach

More information

Why Should Companies Take a Closer Look at Business Continuity Planning?

Why Should Companies Take a Closer Look at Business Continuity Planning? whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters

More information

Chapter 1: An Overview of Emergency Preparedness and Business Continuity

Chapter 1: An Overview of Emergency Preparedness and Business Continuity Chapter 1: An Overview of Emergency Preparedness and Business Continuity After completing this chapter, students will be able to: Describe organization and facility stakeholder needs during and after emergencies.

More information

The PNC Financial Services Group, Inc. Business Continuity Program

The PNC Financial Services Group, Inc. Business Continuity Program The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis

More information

Business Continuity Planning. Donna Curran, Director Audit and Risk Management February, 2014

Business Continuity Planning. Donna Curran, Director Audit and Risk Management February, 2014 Business Continuity Planning Donna Curran, Director Audit and Risk Management February, 2014 Agenda Business Continuity Defined The Importance of a Plan Determining the Costs Business Impact Analysis MTO,

More information

BUSINESS CONTINUITY PLAN OVERVIEW

BUSINESS CONTINUITY PLAN OVERVIEW BUSINESS CONTINUITY PLAN OVERVIEW INTRODUCTION The purpose of this document is to provide Loomis customers with an overview of the company s Business Continuity Plan (BCP). Because of the specific and

More information

Institute for Business Continuity Training 1623 Military Road, # 377 Niagara Falls, NY 14304-1745

Institute for Business Continuity Training 1623 Military Road, # 377 Niagara Falls, NY 14304-1745 ECP - 601: Effective Business Continuity Management: ISO 22301 This 3-day course provides an intensive, hands-on workshop covering all major aspects for the design of an effective Business Continuity Plan

More information

BCP and DR. P K Patel AGM, MoF

BCP and DR. P K Patel AGM, MoF BCP and DR P K Patel AGM, MoF Key difference between BS 25999 and ISO 22301 ISO 22301 puts a much greater emphasis on setting the objectives, monitoring performance and metrics aligning BC to top management

More information

Business Continuity. Port environment

Business Continuity. Port environment Business Continuity Port environment DEFINE BUSINESS CONTINUITY WHAT IT IS NOT RECOVERY FOCUS: PEOPLE PROCESSES TECHNOLOGY DELIVERABLES INFRAGARD DEFINITION MANAGEMENT PROCESS DEVELOPING ADVANCE PROCEDURES

More information

EXECUTIVE CRISIS MANAGEMENT TRAINING. Presented by Roseanne Rostron, CBCP Raido Response

EXECUTIVE CRISIS MANAGEMENT TRAINING. Presented by Roseanne Rostron, CBCP Raido Response EXECUTIVE CRISIS MANAGEMENT TRAINING Presented by Roseanne Rostron, CBCP Raido Response 1 Introduction Roseanne Rostron President Raido Response Over 12 years Crisis Management, Business Continuity, Disaster

More information

DISASTER RECOVERY PLANNING FOR CITY COMPUTER FACILITIES

DISASTER RECOVERY PLANNING FOR CITY COMPUTER FACILITIES APPENDIX 1 DISASTER RECOVERY PLANNING FOR CITY COMPUTER FACILITIES March 2008 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto TABLE OF CONTENTS EXECUTIVE SUMMARY...1

More information

85-01-55 Overview of Business Continuity Planning Sally Meglathery Payoff

85-01-55 Overview of Business Continuity Planning Sally Meglathery Payoff 85-01-55 Overview of Business Continuity Planning Sally Meglathery Payoff Because a business continuity plan affects all functional units within the organization, each functional unit must participate

More information

Emergency Response Plan

Emergency Response Plan Emergency Response Plan Public Version Contents INTRODUCTION... 4 SCOPE... 5 DEFINITION OF AN EMERGENCY... 5 AUTHORITY... 6 ACTION PRIOR TO DECLARATION... 6 FREEDOM OF INFORMATION & PRIVACY PROTECTION...

More information

Page Administrative Summary...3 Introduction Comprehensive Approach Conclusion

Page Administrative Summary...3 Introduction Comprehensive Approach Conclusion TABLE OF CONTENTS Page Administrative Summary...3 Introduction Comprehensive Approach Conclusion PART 1: PLANNING General Considerations and Planning Guidelines... 4 Policy Group Oversight Committee Extended

More information

Building Economic Resilience to Disasters: Developing a Business Continuity Plan

Building Economic Resilience to Disasters: Developing a Business Continuity Plan Building Economic Resilience to Disasters: Developing a Business Continuity Plan Buffalo Niagara Region February 26, 2014 Gail Moraton, CBCP Business Resiliency Manager Business Resiliency one important

More information

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be

More information

NORTH HAMPSHIRE CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY MANAGEMENT POLICY AND PLAN (COR/017/V1.00)

NORTH HAMPSHIRE CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY MANAGEMENT POLICY AND PLAN (COR/017/V1.00) NORTH HAMPSHIRE CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY MANAGEMENT POLICY AND PLAN (COR/017/V1.00) Subject and version number of document: Serial Number: Business Continuity Management Policy

More information

Proposal for Business Continuity Plan and Management Review 6 August 2008

Proposal for Business Continuity Plan and Management Review 6 August 2008 Proposal for Business Continuity Plan and Management Review 6 August 2008 2008/8/6 Contents About Newton IT / Quality of our services. BCM & BS25999 Overview 2. BCM Development in line with BS25999 3.

More information

Western Washington University Basic Plan 2013. A part of Western s Comprehensive Emergency Management Plan

Western Washington University Basic Plan 2013. A part of Western s Comprehensive Emergency Management Plan 2013 A part of Western s Record of Changes Change # Date Entered Description and Location of Change(s) Person making changes 2 1. PURPOSE, SCOPE, SITUATION OVERVIEW, ASSUMPTIONS AND LIMITATIONS A. PURPOSE

More information

Creating a Business Continuity Plan for your Health Center

Creating a Business Continuity Plan for your Health Center Creating a Business Continuity Plan for your Health Center 1 Page Left Intentionally Blank 2 About This Manual This tool is the result of collaboration between the Primary Care Development Corporation

More information

The PNC Financial Services Group, Inc. Business Continuity Program

The PNC Financial Services Group, Inc. Business Continuity Program The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page

More information

Business Continuity (Policy & Procedure)

Business Continuity (Policy & Procedure) Business Continuity (Policy & Procedure) Publication Scheme Y/N Can be published on Force Website Department of Origin Force Operations Policy Holder Ch Supt Head of Force Ops Author Business Continuity

More information

Business Continuity Plan Toolkit

Business Continuity Plan Toolkit Business Continuity Plan Toolkit March 2015 1 Contents The Template instructions for use... 2 Introduction... 3 What is the purpose of this toolkit?... 3 Why do you need a Business Continuity Plan?...

More information

BUILDING A SECURITY CONSCIOUS BUSINESS CONTINUITY MANAGEMENT (BCM) PROGRAM

BUILDING A SECURITY CONSCIOUS BUSINESS CONTINUITY MANAGEMENT (BCM) PROGRAM BUILDING A SECURITY CONSCIOUS BUSINESS CONTINUITY MANAGEMENT (BCM) PROGRAM SAM STAHL, CBCP, MBCI EMC GLOBAL PROFESSIONAL SERVICES PROGRAM MANAGER [email protected] ASIS SHANGHAI, 2015 1 AGENDA Overview

More information

Business Continuity and Crisis Management

Business Continuity and Crisis Management Business Continuity and Crisis Management Crisis Management, Business Continuity and The Incident Command System Understanding Differences and Putting it all together? by Max Ckonjevic FBCI, CBCP 1 Objectives

More information

Appendix B: Mapping Cybersecurity Assessment Tool to NIST

Appendix B: Mapping Cybersecurity Assessment Tool to NIST Appendix B: to NIST Cybersecurity Framework In 2014, the National Institute of Standards and Technology (NIST) released a Cybersecurity Framework for all sectors. The following provides a mapping of the

More information

Overview of how to test a. Business Continuity Plan

Overview of how to test a. Business Continuity Plan Overview of how to test a Business Continuity Plan Prepared by: Thomas Bronack Phone: (718) 591-5553 Email: [email protected] BRP/DRP Test Plan Creation and Exercise Page: 1 Table of Contents BCP/DRP Test

More information

BUSINESS CONTINUITY POLICY

BUSINESS CONTINUITY POLICY BUSINESS CONTINUITY POLICY Last Review Date Approving Body n/a Audit Committee Date of Approval 9 th January 2014 Date of Implementation 1 st February 2014 Next Review Date February 2017 Review Responsibility

More information

KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity

KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity INFORMATION RISK MANAGEMENT KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity ADVISORY Contents Agenda: Global trends and BCM

More information

CONTINUITY OF OPERATION PLAN (COOP) FOR NONPROFIT HUMAN SERVICES PROVIDERS

CONTINUITY OF OPERATION PLAN (COOP) FOR NONPROFIT HUMAN SERVICES PROVIDERS A L L I A N C E F O R H U M A N S E R V I C E S www.alliance4hs.org CONTINUITY OF OPERATION PLAN (COOP) FOR NONPROFIT HUMAN SERVICES PROVIDERS ALLIANCE FOR HUMAN SERVICES & MIAMI-DADE COUNTY OFFICE OF

More information

Protecting your Enterprise

Protecting your Enterprise Understanding Disaster Recovery in California Protecting your Enterprise Session Overview Why do we Prepare What is? How do I analyze (measure) it? What to do with it? How do I communicate it? What does

More information

Hospital Emergency Operations Plan

Hospital Emergency Operations Plan Hospital Emergency Operations Plan I-1 Emergency Management Plan I PURPOSE The mission of University Hospital of Brooklyn (UHB) is to improve the health of the people of Kings County by providing cost-effective,

More information

D2-02_01 Disaster Recovery in the modern EPU

D2-02_01 Disaster Recovery in the modern EPU CONSEIL INTERNATIONAL DES GRANDS RESEAUX ELECTRIQUES INTERNATIONAL COUNCIL ON LARGE ELECTRIC SYSTEMS http:d2cigre.org STUDY COMMITTEE D2 INFORMATION SYSTEMS AND TELECOMMUNICATION 2015 Colloquium October

More information

MHA Consulting. Business Continuity Management 101

MHA Consulting. Business Continuity Management 101 0 MHA Consulting Business Continuity Management 101 Presented by: Michael Herrera Brandon Magestro MHA Consulting Agenda MHA Consulting Introduction Business Continuity Management (BCM) Defined 2013 Trends

More information

STEP-BY-STEP BUSINESS CONTINUITY AND EMERGENCY PLANNING MAY 27 2015

STEP-BY-STEP BUSINESS CONTINUITY AND EMERGENCY PLANNING MAY 27 2015 STEP-BY-STEP BUSINESS CONTINUITY AND EMERGENCY PLANNING MAY 27 2015 AGENDA: Emergency Management Business Continuity Planning Q & A MONTH DAY, YEAR TITLE OF THE PRESENTATION 2 CANADIAN RED CROSS Disaster

More information

With the large number of. How to Avoid Disaster: RIM s Crucial Role in Business Continuity Planning. Virginia A. Jones, CRM, FAI RIM FUNDAMENTALS

With the large number of. How to Avoid Disaster: RIM s Crucial Role in Business Continuity Planning. Virginia A. Jones, CRM, FAI RIM FUNDAMENTALS How to Avoid Disaster: RIM s Crucial Role in Business Continuity Planning The world has experienced a great deal of natural and man-made upheaval and destruction in the past few years, including tornadoes,

More information

Update from the Business Continuity Working Group

Update from the Business Continuity Working Group 23 June 2014 Performance and Resources Board 19 To note Update from the Business Continuity Working Group Issue 1 The Business Continuity Working Group oversees the development, maintenance and improvement

More information

The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1

The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1 Version 3.1 November 22, 2004 TABLE OF CONTENTS PART 1: DISASTER RECOVERY EXPECTATIONS... 3 OVERVIEW...3 EXPECTATIONS PRIOR TO AN INCIDENT OCCURRENCE...3 EXPECTATIONS PRIOR TO A DISASTER OCCURRENCE...4

More information

State of South Carolina Policy Guidance and Training

State of South Carolina Policy Guidance and Training State of South Carolina Policy Guidance and Training Policy Workshop All Agencies Business Continuity Management Policy June 2014 Agenda Questions & Follow-Up Policy Workshop Overview & Timeline Policy

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity January 2016 [email protected] Improving Critical Infrastructure Cybersecurity It is the policy of the United States to enhance the security

More information

Business Continuity Business Continuity Management Policy

Business Continuity Business Continuity Management Policy Business Continuity Business Continuity Management Policy : Date of Issue: 28 January 2009 Version no: 1.1 Review Date: January 2010 Document Owner: Patricia Hughes Document Authoriser: Tony Curtis 1 Version

More information

This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses.

This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses. 1. An Introduction This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses. This presentation was prepared by the South Central Economic

More information