Protect critical information with a smart information-based-risk management strategy. Prepared by: Firas Mohamed Taher.

Slides:



Advertisements
Similar presentations
THE ROLE OF CSDs DURING ENVIRONMENTAL CRISIS OR OPERATIONAL DISRUPTION THE ROLE OF CSDs DURING ENVIRONMENTAL CRISIS OR OPERATIONAL DISRUPTION A PRESENTATION.
Advertisements

Information Systems in Business
Determining CLIMASP Competencies Jerash University Development of Interdisciplinary Program on Climate Change and Sustainability Policy- CLIMASP Development.
“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
©2002, Pearson Education Canada 1.1 c h a p t e r 1 1 MANAGING THE DIGITAL FIRM: CANADA AND BEYOND CANADA AND BEYOND.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
We make it easier for businesses of all sizes to safely accept checks transmodus offers clients automation utilizing our online processing platform for.
Principles and Learning Objectives
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.
Principles of Information Systems, Seventh Edition2 An organization’s TPS must support the routine, day-to- day activities that occur in the normal course.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
Why Managers Must Understand IT Managers play a key role –Frame opportunities and threats so others can understand them –Evaluate and prioritize problems.
McGraw-Hill/Irwin © 2005 The McGraw-Hill Companies, Inc. All rights reserved Chapter The Future of Training and Development.
DRIVING INNOVATION AND ABILITY TO COMPETE THROUGH OUTSOURCING Anthony (Tony) C. Bernardo, Alloy Polymers Inc. NPE 2003 bernardo:
Supplier Selection & Evaluation
Supply Chain Management
Karolina Muszyńska Based on
Internal Auditing and Outsourcing
Getting Smarter with Information An Information Agenda Approach
Navigating the Maze How to sell to the public sector Adrian Farley Chief Deputy CIO State of California
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Customer Relationship Management (CRM)
Nick Wildgoose 8 March 2012 BCI Workshop DELETE THIS TEXT AND PUT COMPANY LOGO IN THIS WHITE SPACE Understanding Risk within your Supply Chain SC1(V1)Jul/05/10GC/ZCA.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Transforming Services Creating Efficiencies Empowering Citizens Transforming Services Creating Efficiencies Empowering Citizens Transforming Services Creating.
operational-level system. management-level system.
2.1 © 2007 by Prentice Hall 2 Chapter How Businesses Use Information Systems.
Human Resource Management Lecture 27 MGT 350. Last Lecture What is change. why do we require change. You have to be comfortable with the change before.
Logistics and supply chain strategy planning
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
@ ?!.
2010 Virginia RIMS and PRIMA Conference October 5, 2010 Business Impact Analysis: The Road Map to Managing Risks.
COMPETING WITH INFORMATION TECHNOLOGY
CHALLENGING BOUNDARIES Rhodia way, The way we do business.
Slide 1 of 24 Week 1: Lecture Structure Title: Managing IT –Business importance of IT –Role of CIO –Review the IS Pyramid –Top Business IT Issues –Discuss.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
BUSINESS DRIVEN TECHNOLOGY
Chapter 6 Supporting Knowledge Management through Technology
Department of Industrial Engineering Sharif University of Technology Session # 2.
1 Information Systems in a Changing Environment With thanks to Laudon & Laudon Session 1.
“Integrating Property Management with Emergency Recovery” Ivonne Bachar, CPPM CF Director, Property Management Office Stanford University
New World, New World Bank Group Presentation to Fiduciary Forum On Post Crisis Direction and Reforms March 01, 2010.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
Part Three: Management Strategy and Decision Making Chapter 7: Strategic Management Chapter 8: Managing the Planning Process Chapter 9: Decision Making.
Page 1 Strategic Foresight Initiative Summary Briefing Emergency Management Higher Education Conference June 6, :30 – 11:30 am.
Microsoft Belgium Security Summit Georges Ataya S olvay B usiness S chool, ISACA Belux Detlef Eckert Microsoft EMEA.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Kathy Corbiere Service Delivery and Performance Commission
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
INFORMATION SYSTEMS IN THE ENTERPRISE
Demand Management and Customer Service
Foundations of Information Systems in Business
Fundamentals of Information Systems, Sixth Edition Chapter 1 Part A An Introduction to Information Systems in Organizations.
GRC: Aligning Policy, Risk and Compliance
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
PGDM/ / II Trimester/E-Business. What is supply chain management?  Supply chain management is the co- ordination of entities, activities, information.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
THINK DIFFERENT. THINK SUCCESS.
Attention CFOs How to tighten your belt and still survive May 18, 2017.
Process Improvement Process Identification
Supply Chain Process ISCOM/ 374.
SOUTH AFRICAN INSURANCE ASSOCIATION
Managed Content Services
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Presentation transcript:

Protect critical information with a smart information-based-risk management strategy. Prepared by: Firas Mohamed Taher

introduction World becomes more global and interconnected, information based risk grows at multiple facilities, at home offices and through mobile devices such as laptops and personal digital assistants. The volume of data is available online for partners, suppliers, customers and the general public. but systems and processes that support information storage and flow are becoming more complex. The recent variables make it even more critical for organizations to protect their information, to a greater degree than ever before. And any event that disrupts the flow of information can put an organization at risk.

The importance of information in business success The information played a more important role in organizations' success. And considered as the essence in every business decision and every transaction. Businesses rely on timely, accurate information to make major decisions and to recognize and take advantage of business opportunities when they appear. Business need it to communicate with customers and to enable collaboration both internally and externally. It is clear that information, and its protection, should not be treated lightly in any organization.

How can Information operates effectively The organizations must identify the data that yields useful information and must understand why it is important to the business. The organization must know how to transform different types of business critical data into information, and then into shared institutional knowledge.

Different form of information to business The Information at its most basic level is in the form of raw data,ones and zeros in a computer; documents in file cabinets; fax transmissions. Data can come from a variety of sources and can exist in a wide range of formats, such as an employee’s handwritten notes, an message, a customer relationship management (CRM) database, and photographs or drawings that have been scanned into electronic files. This disparate, raw data remains relatively useless and insignificant until it is compiled, interpreted and transformed into relevant information.

knowledge base contribution for decision-making activities The knowledge base can be used systematically for decision- making activities that directly influence business performance, if handled correctly. Many of these activities are performed by employees, but it is not only the organization’s human resources that interpret data and put it to use. Computerized decision support systems can facilitate advanced decision making by using a combination of explicit, programmed knowledge and heuristics. These systems can often account for a larger number of variables than humans do from environmental concerns and market conditions to interpersonal dynamics and collective past experience.

Dealing with the based risk Organizations must put strict controls in place to manage and protect this vital corporate asset. The Information based-risk management must take into account not only the data itself, but also the assistant components that support and make use of the information for decision making. These components include the systems, processes and resources needed to create, capture, store, integrate, access, analyze and distribute information.

The challenge that facing information based risk Developing a strategy for managing information-based risk can be a difficult task. The risk-management strategy not only must address the data, IT systems, processes and human resources involved, it must be compatible with the company’s overarching business strategy, corporate governance framework and crisis-management procedures.

Information based risk helpful strategies The strategy should help facilitate the following: 1. Managing regulatory compliance requirements. 2. Integration with security policies. 3. Data synchronization among systems. 4. Integration across the supply chain, including with vendors, distributors, partners, suppliers and customers. 5. Flexibility to adapt to changing business conditions and emerging threats. 6. Reporting capabilities to enable ongoing adjustments in risk management priorities. 7. A system of checks and balances among business units.

The complexity of IT on managing information Though continuing advances can deliver significant improvements in information access and system performance, they can also increase complexity and drive up management requirements. This complexity can make it difficult to synchronize data, facilitate physical security, efficiently utilize capacity and live up to service level agreements. The challenge of managing and controlling information flow can increase, as the ability to access and distribute information extends farther across and beyond the organization.

How can make information based risk managed successfully : There are many factors contributing to the flow of information across the organization, it is important to take a comprehensive and systematic approach to managing risk. An effective program for managing information based risk should be multifaceted, covering four basic areas: continuity, availability,recovery and security.

Continuity:- Creating a continuity plan requires an identification of the processes and information that are most important in sustaining business operations. Organizations should start by performing a detailed analysis of business functions, mapping business critical activities and their supporting systems, processes, data and resources to get a comprehensive view of the enterprise.

Availability:- Business continuity plans will likely have limited effectiveness. That is why it is so important to link availability plans to business continuity efforts and prioritize them using the same set of principles and assumptions about the relative criticality of processes and information. An availability plan should be developed based on business priorities, not on the underlying technology requirements.

Recovery:- Designing recovery program should define complex business interdependencies and map out the supporting delivery infrastructure and should be integrated with overall business objectives as well as associated continuity and recovery strategies. Recovery programs should be designed as a complement to both continuity and availability plans providing alternative processing capabilities in the event of an outage or other disruption that could compromise local processing, such as disaster recovery, crisis management, incident management and vital records management.

Security:- Security represents an integral component in every enterprise information based risk program, and should be a common consideration in continuity, availability and recovery plans. The Organizations need to start by assessing their current capabilities as they relate to both physical and logical security, and identifying potential exposures and single points of failure. It is important to develop policies that govern infrastructure, need the ability to detect threats, intrusions and unauthorized access and to act quickly to mitigate the damage. Security plans should focus on the protection of not only intellectual capital and confidential information but the physical infrastructure and employees, as well.

Information based risk management program

Conclusion The challenges that companies face it in managing and protecting information are changed dramatically. Continually evolving technology affords greater opportunities to extend the enterprise, often on a global basis. threats to the enterprise’s information are increasing, as are cost pressures to deliver more effective solutions with less funding. In a changing business climate, strategy must be implemented to control information-based risk.

Thank you