Jump to first page Business Continuity Planning The evolution of Disaster Recovery Planning.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Practical Preparations Planning for Safety and Emergencies.
Disaster Recovery Plan By Chanrithy Pol ESA Regional Information System Analyst ITIL Certified / Certified Microsoft Solution Expert Share Point / Infrastructure.
Crime and Security in the Networked Economy Part 4.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
“Your On-Call Source for Technology Solutions”. Our Mission We help our clients make the right Technology decisions for their business We help our clients.
John Sell March 17, Disaster Recovery Emergency Management Incident Control including all Press Releases Communication to all employees Temporary.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
© 2003, Educational Institute Chapter 12 Systems and Security Maintenance Managing Technology in the Hospitality Industry Fourth Edition (469T or 469)
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Disaster Prevention and Recovery Presented By: Sean Snodgrass and Theodore Smith.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
TEL382 Wallace Chapter 2. 11/3/09 2 Outline Introduction Building a Risk Analysis Scope of Risk The Five Layers of Risk Layer 1: External Risks Layer.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Chapter 8: Disaster Management
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Creating an IT Disaster Recovery Plan.  Disaster Recovery vs Business Continuity  Events  Plan Development  Determining which services (thus servers)
Business Crisis and Continuity Management (BCCM) Class Session
November 2009 Network Disaster Recovery October 2014.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Protecting ICT Systems
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
Presented By: MICHAEL HOFFMAN President & CEO - Bolt Data Systems June 16, 2010 Data Backup for the Shared Platform.
Security+ All-In-One Edition Chapter 16 – Disaster Recovery and Business Continuity Brian E. Brzezicki.
ISA Topic 9: Operations Security ISA 562 Internet Security Theory & Practice.
Crisis Management – Process & Review Robert DiLossi – Director Crisis Management Office.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Business Continuity & Disaster recovery
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
Information Availability Brett Paulson Sr. VP and Chief Information Officer Board of Trade Clearing Corporation FIA – November 7, 2002.
Preparing for Disasters General Liability. Introduction  The one coverage that provides you and your business the most protection is General Liability.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Information Systems Security Operations Security Domain #9.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1.
Disaster Recovery and Business Continuity Planning.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Note1 (Admi1) Overview of administering security.
Chapter 8 Managing Operations. Key Points in Chapter 8 Outsourcing IS Functions Outsourcing IS Functions Security in the Internet Age Security in the.
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
Security fundamentals Topic 11 Maintaining operational security.
HalFILE 2.1 Network Protection & Disaster Recovery.
Fault Tolerance and Disaster Recovery. Topics Using Antivirus software Fault tolerance –Power –Redundancy –Storage –Services Disaster Recovery –Backup/Restore.
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY.
Assuring Reliable and Secure IT Services Chapter 6.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Health Safety and Preparedness.  Identify the resources required to develop and maintain a safe and prepared workplace  Understand the key roles and.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Disaster Preparedness Are you prepared?. Effective Disaster Plans  Your plan should outline the basic preparedness steps needed to handle the anticipated.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Information Systems Technology Ross Malaga "Part III - Building and Managing Information Systems III 12 Copyright © 2005 Prentice Hall, Inc MANAGING.
Information Systems Security
MANAGING SECURITY, DISASTER RECOVERY, AND DATA RETENTION
It’s all about the dpisd dr plan
NETW4005 COMPUTER SECURITY A
Processing Integrity and Availability Controls
Audit Plan Michelangelo Collura, Folake Stella Alabede, Felice Walden, Matthew Zimmerman.
Planning and Security Policies
Business Continuity Planning
The Survival Plan.
Presentation transcript:

Jump to first page Business Continuity Planning The evolution of Disaster Recovery Planning

Jump to first page A dose of Reality…. n4n4 out of 5 Businesses affected by the 1993 WTC bombings did not survive past 6 months nTnThe range of Risks has expanded since September 11. nTnThe Global climate for doing business has changed permanently

Jump to first page Keys to Success n A successful plan must have Executive sponsorship n Departments must be realistic about relative importance to the overall business n Any plan must be periodically tested, results reviewed, and modifications made, if required

Jump to first page External Risk Factors n Extreme Weather u Blizzards, Flooding, Tornadoes, Hurricanes, Ice Storms n Earthquakes n Long duration Power or Communications failure n Area Evacuation due to chemical spill, etc. n Terrorist Attacks, Criminal actions

Jump to first page Internal Risk Factors n Structural Damage u Roof collapse (Sears Hickory Hill) u Fire, Water Pipe Burst n HVAC n IT concerns u Equipment Spares u Backup / Mirroring process n Personnel

Jump to first page Step 1: Risk Analysis n Identify and weigh most probable risks n Identify and weigh business functions n Correlate risks with business functions Make a List!

Jump to first page Step 2: Prioritization Threat x Impact = Priority

Jump to first page Step 3: Evaluation n Identify key components to prioritized list u Facilities (Building, furniture, fixtures) u Utilities (Electricity, Water, Gas) u Network (Voice, Data, IP) u Hardware (Servers, Workstations) n Weigh components against alternate sites, if applicable (Natural hot-site)

Jump to first page Step 4: Plan n Facilities u Alternate site F Intra-company or Buddy system u Hot or Cold backup u Fire Suppression system n Utilities (Electricity, Water, Gas) u Dual Entrance facilities u UPS with suitable battery life u Backup Generator

Jump to first page Step 4: Plan n Software u Virus protection, Firewall revision u User-loaded software u Common platform and partitions u Disk backup and/or mirroring n Hardware u Spares u Maintenance routines F Virus scans, disk utilities u Duplication for recovery

Jump to first page Step 4: Plan n Network Resiliency u Legacy platform designed with alternate mirror site, either in-house or 3rd party. Network provisioned or automated dial backup u Backup tapes/disks verified, storage off-site u IP/ATM/FR platform with alternate hot site. Semi- to full mesh design

Jump to first page Step 5: Prevention n Password protect all remote access capabilities n Firewalls for IP connections n Maintain latest Virus protection and Firewall software n Corrective software controls n Intrusion (hacker) detection

Jump to first page Sometimes the best way to facilitate effective Business Continuity Planning is to use an outside expert without any bias towards any one department, group, or function. The Gartner Group Your Chief Technology Officer on Call CompetitiveNetworkSolutions.com