1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

1 The Basics of Business Continuity Presented by Mary F. Sandy, CBCP Business Continuity/Disaster Recovery Class DePaul University ©Mary F. Sandy, 2006.
PhoenixPro Procurement. technology. contracts. projects.
Business Continuity Planning Presentation to Management.
Business Continuity Training & Awareness by Sulia Toutai (ANZ)
Business Continuity and Disaster Recovery Planning.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
Session 301 Factors in Assessing Risk Mitigation Actions Impact reducing the identified risks and vulnerabilities in the community Probability that each.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
Managing Risk in Information Systems Strategies for Mitigating Risk
3rd Party Risk Categorization Process
Topic of Session Disaster Recovery Planning Who Am I Joe Noll Founder and President of RKL eSolutions LLC Partner at Reinsel Kuntz Lesher LLP Microsoft.
Evolving IT Framework Standards (Compliance and IT)
Making Business Continuity Child’s Play Solutions Ltd Business Continuity Management Contact details: Contact : Mick O’Regan Mobile :
1 Enterprise Risk Management (ERM) Program PNM Resources, Inc. March 29, 2007 Presentation to American Public Power Association March 2007 Austin, Texas.
CAIRA is a quantitative vulnerability assessment tool for examining the physical security of energy systems (electrical, natural gas, steam and water)
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
ISA 562 Internet Security Theory & Practice
Mitigation can include structural and nonstructural efforts.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Rich Archer Partner, Risk Advisory Services KPMG LLP Auditing Business Continuity Plans.
Risk Management for Technology Projects Geography 463 : GIS Workshop May
1. 2 Cost to Recover Time to Recover Last Backup Work Backlog Created Lost Data Recovery Operations Time Cost Disaster Recovery Time Frame Reconstruct.
Business Continuity and Disaster Recovery Planning.
Business Continuity and Disaster Recovery Chapter 8 Part 1 Pages 897 to 914.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
Business Continuity Program Orientation (insert presentation date) (This presentation is a template that requires adjustments to meet your needs)
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
“Integrating Property Management with Emergency Recovery” Ivonne Bachar, CPPM CF Director, Property Management Office Stanford University
Working with HIT Systems
Slide Number 1 Business Continuity Plan International Rectifier.
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
REC support is. provided under cooperative agreement 90RC0025/01 from the Office of the National Coordinator for HIT, US Dept. of Health and Human Services.
SecSDLC Chapter 2.
Business Continuity and Disaster Recovery Planning
Lecture5 : Contingency planning Lecturer: Kawther Abas 25/12/ CS – Management of Programming Projects.
Chapter 3: Business Continuity Planning. Planning for Business Continuity Assess risks to business processes Minimize impact from disruptions Maintain.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
RISK MANAGEMENT. CONTENTS  DEFINITION  WHAT IS RISK  TYPES OF RISK  RISK MANAGEMENT PROCESS  APPROACHES TO RISK MANAGEMENT.
Business Continuity Disaster Planning
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
A Lightweight Business Continuity & Disaster Recovery Plan Motahareh Moravej Issuers’ Affairs Director at CSDI PHD. Student of Computer Engineering, UT.
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
AUDITING BUSINESS CONTINUITY PROGRAMS AND PLANS What to Look For Presented by: Tommye White, CBCP, DRP Chuck Walts, CBCP, CRP.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Business Continuity Planning 101
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-I)
The process of identifying and controlling the risks is called Risk Management.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Cybersecurity: Risk Management
Southern Insurance Agency Business Continuity Management Services
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Security on the Move & In the Clouds
Business Continuity Plan Training
سيستم مديريت امنيت اطلاعات
CompTIA Security+ Study Guide (SY0-501)
Mary W. Anaya Stephanie R. Gallegos November 19, 2008
Cybersecurity compliance for attorneys
Cyber Risk & Cyber Insurance - Overview
Disaster Mitigation Mitigation reduces the impact of disasters by supporting protection and prevention activities, easing response, and speeding recovery.
INPUT OUTPUT ASSURANCE
Effective Risk Management in Decision Making Process
The Survival Plan.
Presentation transcript:

1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.

2 Business Continuity Planning Process Risk Evaluation Business Impact Analysis Alternative Strategies & Recommendations Develop and Implement BCP Monitor and Test

3 Risk Evaluation Prioritize Probable Threats Vulnerability Analysis Identify Key Risks Return Business Impact Analysis Alternative Strategies & Recommendations Develop & Implement BCP Monitor & Test

4 Business Impact Analysis Return Prioritize Critical Bus. Functions Determine Dollar Value Exposure Cost Benefit Analysis Prioritize Risk X Impact Profitability Analysis Evaluate Security & Controls Risk Evaluation Develop & Implement BCP Business Impact Analysis Alternative Strategies & Recommendations Monitor & Test Establish Recovery Times

5 Develop Alternative Strategies Return Identify Strategy Needs Reduce Risk Profile Alternate Sites & Storage Business Interruption Insurance Focus on Quick Recovery Focus on Mitigating Damages Define & Implement BCP Risk Evaluation Business Impact Analysis Alternative Strategies & Recommendations Monitor & Test

6 Develop & Implement Business Continuity Plan Return People Develop & Implement BCP Risk Evaluation Business Impact Analysis Alternative Strategies & Recommendations Monitor & Test Processes Data

7 Monitor and Test Return Train Implement Testing Program Audit & Adjust Risk Evaluation Business Impact Analysis Alternative Strategies & Recommendations Design & Implement BCP Monitor & Test

8 Professional Services Business Continuity Plan Assessment Business Continuity Policy Development Risk & Business Impact Analysis Business Continuity Plan Development Data Back up & Recovery Audit BC Training: User, Coordinator, Trainer Project Management Vendor Analysis Plan Testing & Maintenance

9 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING AND TRAINING Midwest Data Recovery Inc. Niles, IL