Cloud and Data Center Your Local IT Rooms Need You. DHL Express Europe

Size: px
Start display at page:

Download "Cloud and Data Center Your Local IT Rooms Need You. DHL Express Europe"

Transcription

1 Beyond (or below) Cloud and Data Center Your Local IT Rooms Need You Martin Frevert Too DHL Express Europe

2 Agenda The Challenge The Approach Five Tasks Summary and Q&A

3 Agenda The Challenge The Approach Five Tasks Summary and Q&A

4 The Challenge (1/2) For more than 2.6 million customers One Promise More than 220 countries and territories served ~100,000 employees worldwide de 3 global hubs: Cincinnati, Hong Kong, Leipzig Additional ~4,000 facilities worldwide ~260 dedicated di d aircraft ~29,500 vehicles Connecting ~500 airports around the world Time Definite International Delivery IT needs to ensure smooth operation of the 24/7 business

5 The Challenge (2/2) Central global data centers but ~4,000 facilities with IT equipment critical for site operations From network equipment only to servers and specialized IT equipment for call centers or cross belt sorters One Global Customer Promise Local IT rooms protected properly following a global standard

6 Agenda The Challenge The Approach Five Tasks 1. Clarify, what you mean by IT Room Protection 2. Business Alignment I: Develop something that will be accepted 3. Business Alignment II: Develop something that can be used 4. Define a meaningful standard 5. Be smart about closing any gaps Summary and Q& A

7 IT Room Protection Overall Objective Achieve a common, reduced level of risk of an IT room outage which would lead to a business disruption or significantly impact a country business In Scope Out of Scope What Reduction of most common risk Existing and new rooms Business continuity IT operational procedures Protection against other elemental dangers Where Every IT room in every location Enterprise data centers (follow Key: IT room is relevant for DHL higher, data center focused Express standards)

8 Limitations Risk of IT Room Outage Most common threats, e.g. Power Cooling Fire Intrusion Other threats * Without IT Room Protection Risk Reduction through IT Room Protection Most common threats Other threats With IT Room Protection None of the risk can be completely eliminated Residual risk to be addressed by Continuity Management * e.g. earth quakes

9 Recommendation 1 Manage expectations

10 Agenda The Challenge The Approach Five Tasks 1. Clarify, what you mean by IT Room Protection 2. Business Alignment I: Develop something that will be accepted 3. Business Alignment II: Develop something that can be used 4. Define a meaningful standard 5. Be smart about closing any gaps Summary and Q& A

11 Business Alignment I Customer Criticality determined from top to bottom Costs for IT Room Protection have to be justified ~4,000 sites = ~4,000 individual cases Need for rationalization Business alignment through classes IT room with different protection levels

12 Different Classes of IT Rooms Cost Protection IT Room Class Attribute A B C N Baseline: requirements by local authorities, health & safety regulations etc. Driver for protection need: criticality of IT room for the business Not a driver: size of room or number of servers Standby back-up diesel generator Dedicated Cooling System To be defined per attribute for each class Mandatory Strongly recommended Recommended Not needed

13 Recommendation 2 Introduce different classes of IT rooms for business alignment

14 Agenda The Challenge The Approach Five Tasks 1. Clarify, what you mean by IT Room Protection 2. Business Alignment I: Develop something that will be accepted 3. Business Alignment II: Develop something that can be used 4. Define a meaningful standard 5. Be smart about closing any gaps Summary and Q& A

15 Business Alignment II How to determine the different IT room classes and how to classify IT rooms? Simple, pragmatic approach Classification depending on criticality for the business but Business does not appreciate sophisticated, incomprehensible elaborations If you want to apply it globally, only a simple approach will succeed What it means What-if scenario: what, if the IT room is down? Limited scope of business impact analysis Proxy for business impact Complemented by key business impact scenarios Matrix for classification based on multipliers

16 Business Impact Analysis What, if IT room is down? Impact Economic loss from damaged or destroyed property Regulatory or contractual impact Reputation Economic loss from loss of function How to consider Impossible to standardize Impossible to standardize Impossible to standardize Using a proxy Do not try to determine exact business loss Use revenue that is supported by the IT room in "business-as-usual" (BAU) circumstances as proxy Known within IT function Very powerful and convincing: break down to revenue per day Not equal to revenue loss, but proxy only. Not sufficient to cover complexity of the business.

17 Impact Scenarios - Example Business, but Business, but No business Business, but shipments low Customer possible at thigher h cost delayed Service quality Customer Visibility Business Impact Very high High Medium None Disruptive Very high High Medium No business possible without the IT room on one or more sites Business still possible without t the IT room Service commitment/ product promise cannot be kept Business still possible without t the IT room Customer Service not able to meet KPIs due to outage of IT room Business still possible without t the IT room Business can only be run at extra costs

18 Classification Thresholds Classification Matrix Define Thresholds Step 1: Baseline Step 2: Multipliers IT Room Class IT Room Class A B C N What are the revenue thresholds for each combination? 1 x 1.0 Threshold [Revenue] A > 100 B >40 C > 10 N N/A x 1.5 x 2.0 x 3.0 >40 x 2.0 >80 Use scenario 1 Use multipliers to increase (business disruption) thresholds to reflect lower as baseline due to business impact maximum business more revenue needed to impact justify a certain class

19 IT Room Classification Step Principle Example 1 Select room Analyze ay eevery eyit room individually Tampa, Florida 2 3 Determine "businessas-usual" (BAU) Use BAU revenue as proxy revenue Determine business impact scenarios Most critical business impact scenarios x EUR p.a. or y EUR per business day Scenario 2: Business possible, but shipments delayed 4 Look up class in matrix 2 BAU revenue Business Impact Scenario Manage classification matrix ti > 100 A 3 IT Room Class > 40 4 B > 10 C D N

20 Recommendation Define a simple approach for IT room classification 4. Use a tailored, but simple approach to 4. Use a tailored, but simple approach to determine IT room classes for your business

21 Agenda The Challenge The Approach Five Tasks 1. Clarify, what you mean by IT Room Protection 2. Business Alignment I: Develop something that will be accepted 3. Business Alignment II: Develop something that can be used 4. Define a meaningful standard 5. Be smart about closing any gaps Summary and Q& A

22 Protection Level per Class Precise specifications Enabling assessment IT Room Class Attribute A B C N Attribute 1 Mandatory Mandatory Strongly Recomme nded Attribute 2 Mandatory Strongly Recomme nded Recomme nded Recomme nded Not needed Expensive attributes managed by class Increasing requirement for higher classes Redundancy levels managed by class Increasing requirement for higher classes Not only equipment, but also responsibilities and procedures

23 Content of the Standard General Physical Fire HVAC Power Network Security Protection Supply Governance Risk Assessment Other Equipment Policies & Procedures Service & Maintenance Equipment Policies & Procedures Service & Maintenance Equipment Policies & Procedures Service & Maintenance Equipment Policies & Procedures Service & Maintenance General LAN WAN

24 Recommendation 5 Define the standard precisely and with meaningful differences between the classes

25 Agenda The Challenge The Approach Five Tasks 1. Clarify, what you mean by IT Room Protection 2. Business Alignment I: Develop something that will be accepted 3. Business Alignment II: Develop something that can be used 4. Define a meaningful standard 5. Be smart about closing any gaps Summary and Q& A

26 Gap Closure As-Is (no DHL example!) Standard Gap Gap Closure Obvious solution: lift to meet the standard. But: Smartest solution needs to be determined individually!

27 Generic Gap Closure Improve IT room protection Move to highly protected data center Make IT capabilities recoverable Design resilient IT capabilities i high high high high Impact I I I IT capability overall For an individual component of the IT capability low low high Likelihood Achievable short- /mid-term, but good investment in long-term? low low high L Achievable short- /mid-term Best for critical services, but restrictions to be considered low low high L Reducing impact through quick recovery Achievable midterm, but requiring significant investment low low high L Outage of 1 component doesn't impact the IT capability as a whole making it less likely to fail

28 Recommendation 6 Think out of the box improving the protection of an individual IT room might not be the smartest solution

29 Agenda The Challenge The Approach Five Tasks Summary and Q& A

30 Recommendations Summary 1. Manage expectations 2. Introduce different classes of IT rooms for business alignment 3. Define a simple approach for IT room classification 4. Use a tailored, but simple approach to determine IT room classes for your business 5. Define the standard precisely and with meaningful differences between the classes 6. Think out of the box improving the protection of an individual IT room might not be the smartest solution

31 Q & A Your questions, please!

Offsite Disaster Recovery Plan

Offsite Disaster Recovery Plan 1 Offsite Disaster Recovery Plan Offsite Disaster Recovery Plan Presented By: Natan Verkhovsky President Disty Portal Inc. 2 Offsite Disaster Recovery Plan Introduction This document is a comprehensive

More information

Bus incident management planning: Guidelines

Bus incident management planning: Guidelines Bus incident management planning: Guidelines What is incident management planning? Incident management planning is everything your business does to prepare for potential disruptive or damaging incidents.

More information

Business Continuity Planning

Business Continuity Planning Business Continuity Planning We believe all organisations recognise the importance of having a Business Continuity Plan, however we understand that it can be difficult to know where to start. That s why

More information

How to measure your business resiliency

How to measure your business resiliency How to measure your business resiliency Define the KPI s/kri s and scorecards to control your security and business continuity capabilities Krzysztof Pulkiewicz BCMLogic [email protected]

More information

PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA

PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA 1 Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand

More information

Share the webinar Ask a question Votes (polling questions) Rate (before you leave) Attachments (you can download today s presentation)

Share the webinar Ask a question Votes (polling questions) Rate (before you leave) Attachments (you can download today s presentation) Data Center Migration Primer Mark Smith Wednesday, June 27, 2012 General Information Share the webinar Ask a question Votes (polling questions) Rate (before you leave) Attachments (you can download today

More information

Cisco Disaster Recovery: Best Practices White Paper

Cisco Disaster Recovery: Best Practices White Paper Table of Contents Disaster Recovery: Best Practices White Paper...1 Introduction...1 Performance Indicators for Disaster Recovery...1 High Level Process Flow for Disaster Recovery...2 Management Awareness...2

More information

Managing business risk

Managing business risk Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success

More information

Desktop Scenario Self Assessment Exercise Page 1

Desktop Scenario Self Assessment Exercise Page 1 Page 1 Neil Jarvis Head of IT Security & IT Risk DHL Page 2 From reputation to data loss - how important is business continuity? Neil Jarvis Head of IT Security (EMEA) DHL Logistics IT Security Taking

More information

The FDA recently announced a significant

The FDA recently announced a significant This article illustrates the risk analysis guidance discussed in GAMP 4. 5 By applying GAMP s risk analysis method to three generic classes of software systems, this article acts as both an introduction

More information

Key Components of a Risk-Based Security Plan

Key Components of a Risk-Based Security Plan Key Components of a Risk-Based Security Plan How to Create a Plan That Works Authors: Vivek Chudgar Principal Consultant Foundstone Professional Services Jason Bevis Director Foundstone Professional Services

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

AdvancedHosting SM Solutions from SunGard Availability Services

AdvancedHosting SM Solutions from SunGard Availability Services AdvancedHosting SM Solutions from SunGard Availability Services A SINGLE POINT OF CONTACT A COMPLETE MANAGED SERVICES SOLUTION Higher levels of availability Continuous investment in people, technology

More information

<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP

<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP IT Disaster Recovery Plan Template By Paul Kirvan, CISA, CISSP, FBCI, CBCP Revision History REVISION DATE NAME DESCRIPTION Original 1.0 2 Table of Contents Information Technology Statement

More information

IT Disaster Recovery Plan Template

IT Disaster Recovery Plan Template HOPONE INTERNET CORP IT Disaster Recovery Plan Template Compliments of: Tim Sexton 1/1/2015 An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned

More information

Disaster Recovery Policy

Disaster Recovery Policy Disaster Recovery Policy INTRODUCTION This policy provides a framework for the ongoing process of planning, developing and implementing disaster recovery management for IT Services at UCD. A disaster is

More information

Business resilience: The best defense is a good offense

Business resilience: The best defense is a good offense IBM Business Continuity and Resiliency Services January 2009 Business resilience: The best defense is a good offense Develop a best practices strategy using a tiered approach Page 2 Contents 2 Introduction

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify

More information

Security Officer s Checklist in a Sourcing Deal

Security Officer s Checklist in a Sourcing Deal Security Officer s Checklist in a Sourcing Deal Guide Share Europe Ostend, May 9th 2014 Johan Van Mengsel IBM Distinguished IT Specialist IBM Client Abstract Sourcing deals creates opportunities and challenges.

More information

Metrics that Matter Security Risk Analytics

Metrics that Matter Security Risk Analytics Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa [email protected] April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk

More information

Information Security Team

Information Security Team Title Document number Add document Document status number Draft Owner Approver(s) CISO Information Security Team Version Version history Version date 0.01-0.05 Initial drafts of handbook 26 Oct 2015 Preface

More information

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

DRAFT Disaster Recovery Policy Template

DRAFT Disaster Recovery Policy Template DRAFT Disaster Recovery Policy Template NOTE: This is a boiler plate template much information is needed from to finalizeconsider this document pre-draft FOREWARD... 3 Policy Overview...

More information

Technology Resilience and Failover policy

Technology Resilience and Failover policy Technology Resilience and Failover policy Status: Approved Contents 1 Introduction... 4 2 Technology Resilience and Failover policy... 6 2.1 Policy scope... 6 2.2 Policy statements... 6 2.3 Exception management...

More information

The Difference Between Disaster Recovery and Business Continuance

The Difference Between Disaster Recovery and Business Continuance The Difference Between Disaster Recovery and Business Continuance In high school geometry we learned that a square is a rectangle, but a rectangle is not a square. The same analogy applies to business

More information

Varicent View. Core Principles of Sales Compensation: a 10-Step Approach By Laura Roach, CCP General Manager Varicent Software Incorporated

Varicent View. Core Principles of Sales Compensation: a 10-Step Approach By Laura Roach, CCP General Manager Varicent Software Incorporated Varicent View Core Principles of Sales Compensation: a 10-Step Approach By Laura Roach, CCP General Manager Varicent Software Incorporated Historically, and over the course of the last 20 years, sales

More information

Delivering peace of mind in outsourcing

Delivering peace of mind in outsourcing > Delivering peace of mind in outsourcing How to increase enterprise performance when outsourcing mission critical systems www.thalesgroup.com/security-services AND >> PERFORMANCE OUTSOURCING OF MISSION

More information

CIS 523/423 Disaster Recovery Business Continuity

CIS 523/423 Disaster Recovery Business Continuity CIS 523/423 Disaster Recovery Business Continuity Course Description A study of disaster recovery and business continuity as related to the information technology function in organizations. Topics will

More information

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or

More information

Hong Kong Baptist University

Hong Kong Baptist University Hong Kong Baptist University Disaster Recovery Standard FOR INTERNAL USE ONLY Date of Issue: JULY 2012 Revision History Version Author Date Revision 1.0 Information Security Subcommittee (ISSC) July 2012

More information

Risk Based Internal Auditing & Enterprise Risk

Risk Based Internal Auditing & Enterprise Risk Risk Based Internal Auditing & Enterprise Risk Management PRESENTERS: JUDITH NELSON, UNIVERSITY MANAGEMENT AUDITOR DWIGHT WALTERS, MANAGER, PROJECTS & COMMERCIAL OPERATIONS What we will cover today: 1.

More information

Oracle Data Centre Rationalisation

Oracle Data Centre Rationalisation Ian Gardner - Oracle Applications Architect 2012-06-13 Oracle Data Centre Rationalisation A Practical View [email protected] Tel. 07740 923060 2012 IBM Corporation Why perform Oracle Data Centre Rationalisations...

More information

AUSTRACLEAR REGULATIONS Guidance Note 10

AUSTRACLEAR REGULATIONS Guidance Note 10 BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they

More information

ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 10

ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 10 BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they

More information

Disaster Recovery Hosting Provider Selection Criteria

Disaster Recovery Hosting Provider Selection Criteria Disaster Recovery Hosting Provider Selection Criteria By, Solution Director 6/18/07 As more and more companies choose to use Disaster Recovery (DR), services the questions that keep coming up are What

More information

Business Continuity Planning Principles and Best Practices Tom Hinkel and Zach Duke

Business Continuity Planning Principles and Best Practices Tom Hinkel and Zach Duke Business Continuity Planning Principles and Best Practices Tom Hinkel and Zach Duke Agenda Key components essential to a FFIEC compliant Business Continuity Plan Recovery Time Objectives & Recovery Point

More information

The PMO as a Project Management Integrator, Innovator and Interventionist

The PMO as a Project Management Integrator, Innovator and Interventionist Article by Peter Mihailidis, Rad Miletich and Adel Khreich: Peter Mihailidis is an Associate Director with bluevisions, a project and program management consultancy based in Milsons Point in Sydney. Peter

More information

An ITIL Perspective for Storage Resource Management

An ITIL Perspective for Storage Resource Management An ITIL Perspective for Storage Resource Management BJ Klingenberg, IBM Greg Van Hise, IBM Abstract Providing an ITIL perspective to storage resource management supports the consistent integration of storage

More information

Protecting your Enterprise

Protecting your Enterprise Understanding Disaster Recovery in California Protecting your Enterprise Session Overview Why do we Prepare What is? How do I analyze (measure) it? What to do with it? How do I communicate it? What does

More information

BT Conferencing Business Continuity Management. Planning to stay in business

BT Conferencing Business Continuity Management. Planning to stay in business BT Conferencing Business Continuity Management Planning to stay in business Planning for the unexpected In today s connected world, businesses are increasingly dependent on their communications and networked

More information

ASX SETTLEMENT OPERATING RULES Guidance Note 10

ASX SETTLEMENT OPERATING RULES Guidance Note 10 BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they

More information

Supporting information technology risk management

Supporting information technology risk management IBM Global Technology Services Thought Leadership White Paper October 2011 Supporting information technology risk management It takes an entire organization 2 Supporting information technology risk management

More information

Identifying & Managing IT Risks to Your Business

Identifying & Managing IT Risks to Your Business Identifying & Managing IT Risks to Your Business In a competitive business environment, every organization operates in a climate of risk. It is never possible to remove all risk from a business, but it

More information

SECURITY RISK MANAGEMENT

SECURITY RISK MANAGEMENT SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W

More information

What is the Cloud, and why should it matter?

What is the Cloud, and why should it matter? 391 12 What is the Cloud, and why should it matter? 23 Everyone seems to be asking about it. No one seems to know exactly what it is, what they need, and where to find it. 4 A Philosophy of Design and

More information

Data Center Consolidation: Lessons From The Field. John Tsiofas, Kraft Kennedy David Carlson, Kraft Kennedy

Data Center Consolidation: Lessons From The Field. John Tsiofas, Kraft Kennedy David Carlson, Kraft Kennedy Data Center Consolidation: Lessons From The Field John Tsiofas, Kraft Kennedy David Carlson, Kraft Kennedy Agenda Factors to consider Technology strategy Building a project team How to use vendors wisely

More information

Overview TECHIS60851. Manage information security business resilience activities

Overview TECHIS60851. Manage information security business resilience activities Overview Information security business resilience encompasses business continuity and disaster recovery from information security threats. As well as addressing the consequences of a major security incident,

More information

Disaster Recovery. Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support

Disaster Recovery. Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support Disaster Recovery Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support Categories of Risk Financial Operational Reputational Market share Revenue

More information

Maintaining PCI-DSS compliance. Daniele Bertolotti [email protected] Antonio Ricci [email protected]

Maintaining PCI-DSS compliance. Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com Maintaining PCI-DSS compliance Daniele Bertolotti [email protected] Antonio Ricci [email protected] Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance

More information

eet Business continuity and disaster recovery Enhancing enterprise resiliency for the power and utilities industry Power and Utilities Fact Sheet

eet Business continuity and disaster recovery Enhancing enterprise resiliency for the power and utilities industry Power and Utilities Fact Sheet Power and Utilities Fact Sh Business continuity and disaster recovery Enhancing enterprise resiliency for the power and utilities industry A holistic approach to business resiliency and disaster recovery

More information

Ensure Absolute Protection with Our Backup and Data Recovery Services. ds-inc.com (609) 655 1707

Ensure Absolute Protection with Our Backup and Data Recovery Services. ds-inc.com (609) 655 1707 Ensure Absolute Protection with Our Backup and Data Recovery Services ds-inc.com (609) 655 1707 Ensure Absolute Protection with Our Backup and Data Recovery Services STAY PROTECTED WITH OUR BACKUP AND

More information

DISASTER RECOVERY PLANNING GUIDE

DISASTER RECOVERY PLANNING GUIDE DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide

More information

Introduction UNDERSTANDING BUSINESS CONTINUITY MANAGEMENT

Introduction UNDERSTANDING BUSINESS CONTINUITY MANAGEMENT INFORMATION SECURITY: UNDERSTANDING BUSINESS CONTINUITY MANAGEMENT FACTSHEET This factsheet will introduce you to Business Continuity Management (BCM), which is a process developed to counteract systems

More information

Backup and Redundancy

Backup and Redundancy Backup and Redundancy White Paper NEC s UC for Business Backup and Redundancy allow businesses to operate with confidence, providing security for themselves and their customers. When a server goes down

More information

TO AN EFFECTIVE BUSINESS CONTINUITY PLAN

TO AN EFFECTIVE BUSINESS CONTINUITY PLAN 5 STEPS TO AN EFFECTIVE BUSINESS CONTINUITY PLAN Introduction The Snowpocalypse of 2015 brought one winter storm after another, paralyzing the eastern half of the United States. It knocked out power for

More information

KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity

KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity INFORMATION RISK MANAGEMENT KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity ADVISORY Contents Agenda: Global trends and BCM

More information

The reality of cloud. Go beyond the hype and make a better choice. t 0845 5055 365 e [email protected]. www.365itms.co.uk

The reality of cloud. Go beyond the hype and make a better choice. t 0845 5055 365 e sales@365itms.co.uk. www.365itms.co.uk The reality of cloud Go beyond the hype and make a better choice www. The meaning of cloud 1. Cloud means different things to different people, something that s reflected in the many definitions of what

More information

Business Continuity Planning Guide

Business Continuity Planning Guide Business Continuity Planning Guide For Small Businesses Prepared by the City of Vaughan Emergency Planning Department 1 Business Continuity Planning Business Continuity Planning (BCP) is a planning process

More information

Endeavour Dynamics Offering

Endeavour Dynamics Offering Endeavour Dynamics Offering Microsoft Dynamics AX 2012 is recognised as a global leading ERP system that supports a single instance strategy for medium to large enterprise companies. Endeavour is proud

More information

Introduction. The Inherent Unpredictability of IP Networks # $# #

Introduction. The Inherent Unpredictability of IP Networks # $# # Introduction " $ % & ' The Inherent Unpredictability of IP Networks A major reason that IP became the de facto worldwide standard for data communications networks is its automated resiliency based on intelligent

More information

MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure.

MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure. MM8000 safety and security with smart danger management A scalable and flexible management station for any requirement Answers for infrastructure. Sophisticated technology for comprehensive safety Safety

More information

ICT Business Continuity & Disaster Recovery for Local Authorities. White Paper

ICT Business Continuity & Disaster Recovery for Local Authorities. White Paper ICT Business Continuity & Disaster Recovery for Local Authorities White Paper Contents 1 Introduction...3 1.1 What Constitutes a Disaster?...3 1.2 Phases...3 1.3 Overall Contingency Planning...3 2 Discovery

More information

Building a better branch office. www.citrix.com

Building a better branch office. www.citrix.com Building a better branch office www.citrix.com Introduction The majority of workers today are in branch offices, not in a headquarters facility. In many instances, all of the applications used by branch

More information

Data center solutions from Siemens. For the factories of the 21 st century. siemens.com/datacenters

Data center solutions from Siemens. For the factories of the 21 st century. siemens.com/datacenters Data center solutions from Siemens For the factories of the 21 st century siemens.com/datacenters We face the challenges for the factories of the 21 st century Based on our vast experience, we offer a

More information

THE INTERNATIONAL JOURNAL OF BUSINESS & MANAGEMENT

THE INTERNATIONAL JOURNAL OF BUSINESS & MANAGEMENT THE INTERNATIONAL JOURNAL OF BUSINESS & MANAGEMENT Performance Management Model for SMEs Rusaneanu Alexandra Ph.D. Student, Faculty of Cybernetics, Statistics and Economic Informatics, Bucharest University

More information

Exposing the Cloud: It It s More than a Buzzword Tim Connors, Director, AT&T AT&T

Exposing the Cloud: It It s More than a Buzzword Tim Connors, Director, AT&T AT&T Exposing the Cloud: It s More than a Buzzword Tim Connors, Director, AT&T Exposing the Cloud: It s More than a Buzzword Discussion Agenda Cloud Storage Target Uses When is it right? When is it wrong? Specific

More information

Certified Information Security Manager (CISM)

Certified Information Security Manager (CISM) Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security

More information

Security from a customer s perspective. Halogen s approach to security

Security from a customer s perspective. Halogen s approach to security September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving

More information

Service availability (in the clouds)

Service availability (in the clouds) Warsaw, 24 th of March 2014 Service availability (in the clouds) Aleksander P. Czarnowski, AVET INS / EuroCloud Polska Page 1 of 16 Table of Contents 1. Introduction... 3 2. Availability concept for IaaS,

More information

Coping with a major business disruption. Some practical advice

Coping with a major business disruption. Some practical advice Coping with a major business disruption Some practical advice Coping with a major business disruption What is business continuity? Business continuity planning (BCP) is a management process that helps

More information

Architecting the Cloud

Architecting the Cloud Architecting the Cloud Sumanth Tarigopula Director, India Center, Best Shore Applications Services 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

Security Risk Management Strategy in a Mobile and Consumerised World

Security Risk Management Strategy in a Mobile and Consumerised World Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key

More information

Interactive-Network Disaster Recovery

Interactive-Network Disaster Recovery Interactive-Network Disaster Recovery BACKGROUND IT systems are vulnerable to a variety of disruptions, ranging from mild (e.g., short-term power outage, disk drive failure) to severe (e.g., terrorism,

More information

Protecting Your Business

Protecting Your Business Protecting Your Business Business Continuity/Disaster Recovery Planning Robert Haberman Senior Product Manager BCP/DRP TELUS BUSINESS SOLUTIONS Business Continuity/Disaster Recovery Planning 1 Agenda:

More information

Test Data Management Best Practice

Test Data Management Best Practice Test Data Management Best Practice, Inc. 5210 Belfort Parkway, Suite 400 Author: Stephanie Chace Quality Practice Lead [email protected], Inc. 2011 www.meridiantechnologies.net Table of

More information

A VERITAS PERSPECTIVE: Maximize Agility, Minimize Risk In The Multi-Vendor Hybrid Cloud

A VERITAS PERSPECTIVE: Maximize Agility, Minimize Risk In The Multi-Vendor Hybrid Cloud A VERITAS PERSPECTIVE: Maximize Agility, Minimize Risk In The Multi-Vendor Hybrid Cloud 1 THE HYBRID CLOUD DILEMMA Finding Agility without Adding Fragility Today, businesses have to move fast to stay competitive.

More information

Q uick Guide to Disaster Recovery Planning An ITtoolkit.com White Paper

Q uick Guide to Disaster Recovery Planning An ITtoolkit.com White Paper This quick reference guide provides an introductory overview of the key principles and issues involved in IT related disaster recovery planning, including needs evaluation, goals, objectives and related

More information

Developing a Risk Management Plan. New Partners Initiative Technical Assistance Project (NuPITA)

Developing a Risk Management Plan. New Partners Initiative Technical Assistance Project (NuPITA) Developing a Risk Management Plan New Partners Initiative Technical Assistance Project (NuPITA) The New Partners Initiative Technical Assistance (NuPITA) is funded by the United States Agency for International

More information

Private Cloud: Key considerations for an insurance agency

Private Cloud: Key considerations for an insurance agency white paper private cloud Private Cloud: Key considerations for an insurance agency in the insurance industry, there are many options for meeting insurance agency information technology requirements. An

More information

Project Risk Analysis toolkit

Project Risk Analysis toolkit Risk Analysis toolkit MMU has a corporate Risk Management framework that describes the standard for risk management within the university. However projects are different from business as usual activities,

More information

Setting smar ter sales per formance management goals

Setting smar ter sales per formance management goals IBM Software Business Analytics Sales performance management Setting smar ter sales per formance management goals Use dedicated SPM solutions with analytics capabilities to improve sales performance 2

More information