Two separate tracks: Crisis Management Business Continuity.

Slides:



Advertisements
Similar presentations
Ensure the Disaster Housing Strategy is institutionalized throughout the jurisdiction Identify a process to update and maintain the Disaster Housing Strategy.
Advertisements

Business Continuity Training & Awareness by Sulia Toutai (ANZ)
CIP Cyber Security – Security Management Controls
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Framework for Improving Critical Infrastructure Cybersecurity NIST Feb 2014.
SOX and IT Audit Programs John R. Robles Thursday, May 31, Tel:
Business Crisis and Continuity Management (BCCM) Class Session
ISO General Awareness Training
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
First Practice - Information Security Management System Implementation and ISO Certification.
Stephen S. Yau CSE , Fall Security Strategies.
Disaster Recovery and Business Continuity Ensuring Member Service in Times of Crisis.
Project Risk Management Risk Mitigation. Risk Management  The prime objective of risk management is to minimize the impact and probability of the occurrence.
Disaster Recovery Policy & Procedures An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
Business Preparedness: Best Practices 7 Steps to Protect Your Organization Against 21 st Century Threats.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
Business Continuity and You! The Ohio State University Business & Finance Enterprise Continuity Program Quarterly Update October 2008Business and Finance.
Crisis Management Planning Employee Health Safety and Security Expertise Panel · Presenter Name · 2008.
Company Program. Disaster Recovery A Disaster Recovery Plan is a plan for business continuity in the event of a disaster that destroys part or all of.
Business Crisis and Continuity Management (BCCM) Class Session
Key changes from OHSAS 18001:1999
Insight Consulting Exercising the Top Team Simon Langdon, Principal Consultant.
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
Information Security Training for Management Complying with the HIPAA Security Law.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
SMS Operation.  Internal safety (SMS) audits are used to ensure that the structure of an SMS is sound.  It is also a formal process to ensure continuous.
1 MITIGATION of RISK PROTECT ASSETS (PREVENTION) Phases Event Time Line EVENT / CRISIS RESTORED Resume time-sensitive operations Recover other operations.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
הקריה למחקר גרעיני - נגב Nuclear Research Center – Negev (NRCN) Society of Electrical and Electronics Engineers in Israel (SEEEI) 2012 Eran Salfati, Amir.
David N. Wozei Systems Administrator, IT Auditor.
Effectively Managing Transit Emergencies. Nature of Emergencies and Disasters Overview What Is an Emergency? What Is a Disaster? Differences What Is Emergency.
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
Supply Chain Risk Leadership Council 1 SCRLC August Supply Chain Risk Leadership Council August 2009 Meeting.
Cowlitz-Lewis Economic Development District th Avenue North, Adm. Annex, Kelso, WA Ph: ; FAX:
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Introductions. Emergency Planning Emergency Management & Preparedness Street Smarts Version.
Emergency Management Open House What Is Emergency Management? An inter-disciplinary field that focuses on saving lives, preserving the.
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.
2 Gordon Barber March 14, 2003 Focus Group Committee Chairs F Cable: John Thrower (Cox Communications) F CLECs: Robert Smith (McLeod USA) F Equipment.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Tom Lenart & John Field CT DEMHS Region 2.  Department of Emergency Services and Public Protection (DESPP)  Commission on Fire Prevention and Control.
Business Continuity Disaster Planning
Recreation & Security HPR 413. General Security Must encompass all operations of the organization Should be written into management plans – Plans include.
Information Security tools for records managers Frank Rankin.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
AUDITING BUSINESS CONTINUITY PROGRAMS AND PLANS What to Look For Presented by: Tommye White, CBCP, DRP Chuck Walts, CBCP, CRP.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Business Continuity Planning 101
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-I)
Cybersecurity: Risk Management
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Chris Lintern Co-operative Financial Services
Creating a common understanding on Adverse events information requirements I. Bejar Alonso.
Cybersecurity Policies & Procedures ICA
“The Link” - Continuity of Operations and Emergency Management
Boeing Business Continuity
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Stage 1 - Business Impact Review
Business Continuity Program Overview
INPUT OUTPUT ASSURANCE
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Manage Business Continuity Introductory Brief
PAYROLL DISASTER RECOVERY PLAN
DATA DISASTER RECOVERY PLAN
SaaS DISASTER RECOVERY PLAN
APPLICATION DISASTER RECOVERY RESPONSE
IT DISASTER RECOVERY PLAN
Presentation transcript:

Two separate tracks: Crisis Management Business Continuity

Business Continuity & Crisis Management Track Members (in person attendance) Crisis Management –Randy DiGirolamo – FedEx –Bob Smola – John Deere –Steve Kay – GE –Bob Weronik – GE Business Continuity –Karen Juhl – Boeing –Craig Babcock – P&G –Mike Steckel - Genentech

Simple terms Prevent –Mitigate –Protect Prepare Respond –Detect Recover

Crisis Management core practices Scope & authority Crisis management team organization Incident detection, assessment, & monitoring Activating crisis management process –Thresholds for reporting Command & control Resource allocation Communication –Internal –External Escalation –Local team to corporate team Deactivating crisis management process –Definition of satisfying need –Standard process and identified personnel responsible for deeming closure. Continuous improvement –After action reviews –Training & exercise

Business Continuity best practices Business continuity policy –Scope: plans go to recovery and make a note regarding resumption –Organization Business Impact Analysis (Criticality assessment) Risk assessment (covered under another track) Business Continuity strategy –Risk mitigation –Risk transfer –Risk acceptance Competence, training, & awareness

Business Continuity best practices (cont.) Business Continuity plans –Emergency Life, property, & asset protection –Information Technology Hardware Software Data management –Business Suppliers Internal dependencies Buildings Logistics Etc. Plan test/exercise & maintain –Periodic frequency as dictated by company management & risk –Recommend annually for emergency plans Results reporting: Assess & validate