Security / Business Continuity Impact of Flexible Working Martin G Bell Johnson Controls Consulting BIFM ANNUAL CONFERENCE Oxford 2006.

Slides:



Advertisements
Similar presentations
Disaster Recovery The People Dimension. Today’s Agenda Why bother with any Disaster Recovery/Business Continuity Planning? Importance of the People Factor.
Advertisements

The Way We Work Transforming the Government Workplace.
IBM Corporate Environmental Affairs and Product Safety
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Business Continuity Training & Awareness by Sulia Toutai (ANZ)
Protecting the Public, Astronauts and Pilots, the NASA Workforce, and High-Value Equipment and Property Mission Success Starts With Safety “September 11th.
Work / Life Balance A Business Issue or another HR fad? City Forum 19 September 2002 Sue Young, Innova Partnership Limited.
How JCPenney is Managing Corporate Risk
BCP/DRP Consultancy Project- An approach
Security Controls – What Works
Chapter 12 Strategies for Managing the Technology Infrastructure.
Disaster Prevention and Recovery Presented By: Sean Snodgrass and Theodore Smith.
Absence Management To be used in conjunction with the 1st Class HR ‘Absence Management’ Management Guide available at
1.  Consider: What are my Hazard Risks & consequences?  Awareness to storm and flood risks ◦ Winds ◦ Floods ◦ Nor’easter ◦ Snow/Ice Storms ◦ Hurricane.
 Value Proposition  Key Features  A Closer Look  Operational Support  Essential Payback Employee Access TM Your Window to Employee and Manager Self-Service.
Presentation to the Housing Technology Conference Tim Cowland- Senior Consultant 27 th February 2014 The Rise of the Housing Cloud.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Confidential The Power to Connect. Business presentations in boardrooms, conference rooms and outside the office are always in high demand. With CircleHub,
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
A Major Business Disruption A Strategy for Minimising the Downtime Anthony Hegarty Mitigating Risks.
Teleworking and Remote Access Presented by: Khalid Anjum Director, Department of Information Technology Middlesex County New Jersey.
Security and Privacy Strategic Global Partners, LLC.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Environmental Health and Safety (EH&S) Supplier Awareness Training ISR Systems Danbury, CT 2011.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Implementing an Effective Safety and Health Program
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
 Virtual Solutions. Are you protected?  Back up procedures  Disaster recovery plan  Information security policies in action.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Preparing for Disasters General Liability. Introduction  The one coverage that provides you and your business the most protection is General Liability.
2012 MITA-ATA Annual Conference August 6-8, 2012 Disaster Recovery Planning for Telecommunications Companies.
Cyber Security & Fraud – The impact on small businesses.
Business Continuity and Disaster Recovery Chapter 8 Part 1 Pages 897 to 914.
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
Microsoft Office 365 Proposal Presentation
SECURITY CONSULTING /DISASTER RECOVERY SERVICE The “Must Have Plans” for a Business in the World of Tomorrow.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Policies and Processes Team meeting – February 2010.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
WESTERN PA CHAPTER OF THE AMERICAN PAYROLL ASSOCIATION – NOVEMBER 4, 2015 Risk Management for Payroll.
The PL&B Insurance Solution Risk Counselling EPL Education Service Review Safety Wellness Return to Work Legal Compliance Continuity Planning Cyber Liability.
Business Continuity Disaster Planning
SEC 420 Entire Course (UOP) For more course tutorials visit  SEC 420 Week 1 Individual Assignment Responsibilities of Personal Protection.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
SEC 420 Entire Course (UOP) SEC 420 Week 1 DQ 1 (UOP)  SEC 420 Week 1 Individual Assignment Responsibilities of Personal Protection Officers Paper 
Warehousing and Storage Principles Session 12 – Security Day 6 / PM.
Ron Johnson, CFA Litman/Gregory Asset Management.
SEC 420 aid Expect Success/sec420aiddotcom FOR MORE CLASSES VISIT
SEC 420 UOP professional tutor / sec420dotcom.  SEC 420 Entire Course (UOP)  SEC 420 Week 1 DQ 1 (UOP)  SEC 420 Week 1 Individual Assignment Responsibilities.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Welcome to the ICT Department Unit 3_5 Security Policies.
© 2013 Work Wise UK David Lennan Work Wise UK Remote working is wise working- Transforming into the 21 st Century.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Technology and Business Continuity
Explaining strategies to ensure compliance with workplace legislation
Lecture 14: Business Information Systems - ICT Security
Environmental Health and Safety (EH&S) Supplier Awareness Training
Business Continuity Technology
Developing and testing the Plan
IS-907 – Active Shooter: What You Can Do
European initiatives for an ageing workforce: trends in age management at the workplace LABOR Centre for Employment Studies Torino, 22 November 2006.
EREA Emergency Planning for 2018 and beyond
Presentation transcript:

Security / Business Continuity Impact of Flexible Working Martin G Bell Johnson Controls Consulting BIFM ANNUAL CONFERENCE Oxford 2006

BIFM ANNUAL CONFERENCEOxford 2006 Objectives Background Drivers Trends Risks of flexible working Benefits for business continuity management Security issues Solutions

BIFM ANNUAL CONFERENCEOxford 2006 Background Flexible working –Many different types –All part of ‘modern workplace’ Risk management –Security –Disaster recovery –Business continuity planning –Business continuity management

BIFM ANNUAL CONFERENCEOxford 2006 Drivers Flexible Working PROCESS PEOPLE TECHNOLOGY FACILITIES Reduced total cost of occupancy Lower staff turnover Attract staff Productivity

BIFM ANNUAL CONFERENCEOxford 2006 Facilities “Static 1:1 Inflexible workspaces” “Flexible / Sharing 1:2 Social hub Perception linking workspace to productivity” “Mobile 1:5 Total flexibility On demand work space” Progress Time

BIFM ANNUAL CONFERENCEOxford 2006 Productivity “Task based 9-5 mentality Resource intensive” “Multi tasking, Interactive 24/7 Output intensive” “Interactive 24/7/365 Output obsessed?” Progress Time

BIFM ANNUAL CONFERENCEOxford 2006 Technology “Intranet & Internet Wireless” “Access anytime, anywhere, WiFi, RFID / tagging Smart technology” Progress Time “Limited possibilities Slow, cumbersome, problematic”

BIFM ANNUAL CONFERENCEOxford 2006 Processes 1996 Progress Time “Homeworking policies, % Mobile / Flexible working Manual / electronic archiving on /off site Data protection ‘on agenda” “Defined flexible working policies Majority of archiving electronic Data protection ‘respected” “No flexible working, Paper based archiving, held on site / no restrictions” 2002 Employment Act (2003) Data Protection Act

BIFM ANNUAL CONFERENCEOxford 2006 Risks with current working practices Increasing number of residual risks: –Risks of violence and terrorism and travel –Risk of theft or loss of IT equipment and sensitive or confidential information –Risks of above whilst actually in the work place –Delays, disruption and lost working time from travel

BIFM ANNUAL CONFERENCEOxford 2006 Benefits for BCM Increasing flexible working could reduce company vulnerability Major risk in bringing all employees to a main population centre Staff impact Reduced cost and concern with security Business recovery can be quicker, reduced cost of backup sites

BIFM ANNUAL CONFERENCEOxford 2006 Critique Will always be a demand for physical meeting places –Creativity –Staff / supplier / client and commercial reviews Effectiveness of other mediums of communication Not all roles are suitable for flexible working Long term sustainability if the workplace is unavailable for any length of time Who does the business continuity if there’s no office?

BIFM ANNUAL CONFERENCEOxford 2006 Security Issues of Flexible Working Flexible working brings new security challenges Do we understand what the issues are and who should own them? Flexible Working ? ? ? HR IT FM

BIFM ANNUAL CONFERENCEOxford 2006 Security Issues of Flexible Working (1 of 2) Policy ownership Confidentiality FM –Person verification (entry and exit) –Multi-site working; access control? –Fire marshals and first-aiders –Understanding utilisation / property portfolio planning –Emergency planning with staff unfamiliar with building

BIFM ANNUAL CONFERENCEOxford 2006 Security Issues of Flexible Working (2 of 2) FM –Security standards offsite –Adequate protection when staff work late HR –Whereabouts during or after an emergency –Communication during emergency IT –Keeping up to date with the increased threat posed by new technology –How do you implement procedures?

BIFM ANNUAL CONFERENCEOxford 2006 Security Solutions for the Flexible Workplace (1 of 2) No magic bullet! HR –Training and testing the BCP –Awareness sessions with staff –Call cascade software –Documented, open policy with home telephone numbers FM –Consistent, security / emergency processes –Confidential waste policies, procedures and policing –Guidance notes for staff

BIFM ANNUAL CONFERENCEOxford 2006 Security Solutions for the Flexible Workplace (2 of 2) FM –Use common access control cards with consistent standards –Enforcement OPERATIONS –Encourage out of hours travel –Promote other mediums of communication –Have an effective travel security policy –Awareness training –Confidentiality procedures and processes

BIFM ANNUAL CONFERENCEOxford 2006 Conclusion Flexible working practices will continue to increase Many business benefits for flexible working –Reduced costs –Sustainable BCM –Reduced risk of impact on staff A different type of risk needs to be managed We need to be aware of the issues Risk needs to be managed through investing –Hardware / technology –Focus on process, policies and procedures

BIFM ANNUAL CONFERENCEOxford 2006 Summary Flexible working is changing how we conduct our business Technology that was once seen as a barrier is now an enabler Technology is the catalyst for change –Emphasis is on individuals in terms of how they manage –The biggest gap is with process What does this mean in terms of business risk?

BIFM ANNUAL CONFERENCEOxford 2006 Analysis Business case for investment Measurables of success Risk is if the process foundations are missing Flexible Working PROCESS PEOPLE TECHNOLOGY FACILITIES