Download presentation
Presentation is loading. Please wait.
Published byDonald Hankins Modified over 10 years ago
2
Jump to first page Business Continuity Planning The evolution of Disaster Recovery Planning
3
Jump to first page A dose of Reality…. n4n4 out of 5 Businesses affected by the 1993 WTC bombings did not survive past 6 months nTnThe range of Risks has expanded since September 11. nTnThe Global climate for doing business has changed permanently
4
Jump to first page Keys to Success n A successful plan must have Executive sponsorship n Departments must be realistic about relative importance to the overall business n Any plan must be periodically tested, results reviewed, and modifications made, if required
5
Jump to first page External Risk Factors n Extreme Weather u Blizzards, Flooding, Tornadoes, Hurricanes, Ice Storms n Earthquakes n Long duration Power or Communications failure n Area Evacuation due to chemical spill, etc. n Terrorist Attacks, Criminal actions
6
Jump to first page Internal Risk Factors n Structural Damage u Roof collapse (Sears Hickory Hill) u Fire, Water Pipe Burst n HVAC n IT concerns u Equipment Spares u Backup / Mirroring process n Personnel
7
Jump to first page Step 1: Risk Analysis n Identify and weigh most probable risks n Identify and weigh business functions n Correlate risks with business functions Make a List!
8
Jump to first page Step 2: Prioritization Threat x Impact = Priority
9
Jump to first page Step 3: Evaluation n Identify key components to prioritized list u Facilities (Building, furniture, fixtures) u Utilities (Electricity, Water, Gas) u Network (Voice, Data, IP) u Hardware (Servers, Workstations) n Weigh components against alternate sites, if applicable (Natural hot-site)
10
Jump to first page Step 4: Plan n Facilities u Alternate site F Intra-company or Buddy system u Hot or Cold backup u Fire Suppression system n Utilities (Electricity, Water, Gas) u Dual Entrance facilities u UPS with suitable battery life u Backup Generator
11
Jump to first page Step 4: Plan n Software u Virus protection, Firewall revision u User-loaded software u Common platform and partitions u Disk backup and/or mirroring n Hardware u Spares u Maintenance routines F Virus scans, disk utilities u Duplication for recovery
12
Jump to first page Step 4: Plan n Network Resiliency u Legacy platform designed with alternate mirror site, either in-house or 3rd party. Network provisioned or automated dial backup u Backup tapes/disks verified, storage off-site u IP/ATM/FR platform with alternate hot site. Semi- to full mesh design
13
Jump to first page Step 5: Prevention n Password protect all remote access capabilities n Firewalls for IP connections n Maintain latest Virus protection and Firewall software n Corrective software controls n Intrusion (hacker) detection
14
Jump to first page Sometimes the best way to facilitate effective Business Continuity Planning is to use an outside expert without any bias towards any one department, group, or function. The Gartner Group Your Chief Technology Officer on Call CompetitiveNetworkSolutions.com 901-757-0379
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.