SlideShare a Scribd company logo
1 of 16
The CIO and Crisis Leadership, an examination of the role of the CIO when failure presents itself.  “If anything can go wrong, it will”
Crisis By definition a crisis is:  A crucial or decisive point or situation; a turning point. An unstable condition, as in political, social, or economic affairs, involving an impending abrupt or decisive change.
Catastrophe theory ,[object Object]
Complexity of systems is a variable usually directly affected by the inter-relationship of software and hardware and can be thought of in terms of MTTR or Mean Time to Repair or Mean time to recovery depending on the type of system.
Success is a variable that indicates the ability of systems to do the job they were intended in the manner that they were designed. ,[object Object]
Thoughts Systems will fail ,[object Object]
Reliability is the key to success of systems
MTTR will be the key to restoring systems to a success state.
MTTR requires planning and resources usually under the control of the CIO (redundant systems, spares on the shelf, etc.)
MTBF is built in to systems and cannot be measured definitely and is not under the absolute control of the CIO.
The point of failure can be only estimated and never predictable with any accuracy.
Responsive crisis management can reduce MTTR.
Crisis management is under the control of the CIO.,[object Object]
Duties of the CIO as an Incident Commander  Overall field management of the emergency as it relates to CIO’s area of authority; Coordination with Management and/or other senior managers. The CIO of the firm’s Emergency Response Team should co-locate and coordinate with the Fire or Police Department IC (an element of ‘Unified Command’) if the crisis is large enough to have external responders; Ultimate responsibility for the safety of their staff; Approval of all plans and resources; Situational analysis; Setting objectives and priorities; Delegating authority as necessary; Function as primary responder until others arrive.
The full NIMS ICS structure
ICS Management Concepts Common Terminology Modular Organization  Management by Objectives  Incident Action Planning  Manageable Span of Control  Incident Facilities and Locations  Comprehensive Resource Management  Integrated Communications  Establishment and Transfer of Command  Chain of Command and Unity of Command  Unified Command  Accountability  Dispatch/Deployment  Information and Intelligence Management

More Related Content

What's hot

Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security InvestmentRoger Johnston
 
Risk assessment facilitation guide
Risk assessment facilitation guideRisk assessment facilitation guide
Risk assessment facilitation guideAstalapulosListestos
 
Building a risk management system that works
Building a risk management system that worksBuilding a risk management system that works
Building a risk management system that worksVincent O'Neil
 
Chief Information Security Officer - A Critical Leadership Role
Chief Information Security Officer - A Critical Leadership RoleChief Information Security Officer - A Critical Leadership Role
Chief Information Security Officer - A Critical Leadership RoleBrian Donovan
 
Risk management and IT technologies
Risk management and IT technologiesRisk management and IT technologies
Risk management and IT technologiesHadi Fadlallah
 
Calm Org Change Solution D..
Calm Org Change Solution D..Calm Org Change Solution D..
Calm Org Change Solution D..koehndj
 
Facilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq HanayshaFacilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq HanayshaHanaysha
 
The Critical Incident Response Maturity Journey
The Critical Incident Response Maturity JourneyThe Critical Incident Response Maturity Journey
The Critical Incident Response Maturity JourneyEMC
 
Risk Based Security Management
Risk Based Security ManagementRisk Based Security Management
Risk Based Security ManagementLuis Martins
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 
Employee Engagement and Your Enterprise Security Risk Management Strategy
Employee Engagement and Your Enterprise Security Risk Management StrategyEmployee Engagement and Your Enterprise Security Risk Management Strategy
Employee Engagement and Your Enterprise Security Risk Management StrategyResolver Inc.
 
Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Maurice Dawson
 
Risk management by Deepak kumar dwivedi
Risk management by Deepak kumar dwivediRisk management by Deepak kumar dwivedi
Risk management by Deepak kumar dwivediEm Red
 
Integrated Risk Management 101
Integrated Risk Management 101Integrated Risk Management 101
Integrated Risk Management 101Resolver Inc.
 

What's hot (20)

Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security Investment
 
Risk assessment facilitation guide
Risk assessment facilitation guideRisk assessment facilitation guide
Risk assessment facilitation guide
 
Building a risk management system that works
Building a risk management system that worksBuilding a risk management system that works
Building a risk management system that works
 
Chief Information Security Officer - A Critical Leadership Role
Chief Information Security Officer - A Critical Leadership RoleChief Information Security Officer - A Critical Leadership Role
Chief Information Security Officer - A Critical Leadership Role
 
Risk management and IT technologies
Risk management and IT technologiesRisk management and IT technologies
Risk management and IT technologies
 
Calm Org Change Solution D..
Calm Org Change Solution D..Calm Org Change Solution D..
Calm Org Change Solution D..
 
Facilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq HanayshaFacilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq Hanaysha
 
The Critical Incident Response Maturity Journey
The Critical Incident Response Maturity JourneyThe Critical Incident Response Maturity Journey
The Critical Incident Response Maturity Journey
 
Risk Based Security Management
Risk Based Security ManagementRisk Based Security Management
Risk Based Security Management
 
The Ultimate Guide To Business Continuity
The Ultimate Guide To Business ContinuityThe Ultimate Guide To Business Continuity
The Ultimate Guide To Business Continuity
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Applications of ess
Applications of essApplications of ess
Applications of ess
 
Employee Engagement and Your Enterprise Security Risk Management Strategy
Employee Engagement and Your Enterprise Security Risk Management StrategyEmployee Engagement and Your Enterprise Security Risk Management Strategy
Employee Engagement and Your Enterprise Security Risk Management Strategy
 
It risk assessment
It risk assessmentIt risk assessment
It risk assessment
 
Track 4_Dale Uitto_2014 Paper
Track 4_Dale Uitto_2014 PaperTrack 4_Dale Uitto_2014 Paper
Track 4_Dale Uitto_2014 Paper
 
Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)
 
Risk management by Deepak kumar dwivedi
Risk management by Deepak kumar dwivediRisk management by Deepak kumar dwivedi
Risk management by Deepak kumar dwivedi
 
2nd
2nd2nd
2nd
 
Security Assurance
Security AssuranceSecurity Assurance
Security Assurance
 
Integrated Risk Management 101
Integrated Risk Management 101Integrated Risk Management 101
Integrated Risk Management 101
 

Viewers also liked

Vm World Presentation
Vm World PresentationVm World Presentation
Vm World Presentationdbriner
 
Crisis management case studies
Crisis management case studiesCrisis management case studies
Crisis management case studiesKhaled Anter
 
Identifying variables
Identifying variablesIdentifying variables
Identifying variableskimiworley
 
Taller de creación de documentos ePub
Taller de creación de documentos ePubTaller de creación de documentos ePub
Taller de creación de documentos ePubJA Merlo Vega USAL
 
Heritage and Innovation at an 800-Year Old University: The University of Sala...
Heritage and Innovation at an 800-Year Old University: The University of Sala...Heritage and Innovation at an 800-Year Old University: The University of Sala...
Heritage and Innovation at an 800-Year Old University: The University of Sala...JA Merlo Vega USAL
 
Glenn Colquhoun: The Other Side of a River
Glenn Colquhoun: The Other Side of a River Glenn Colquhoun: The Other Side of a River
Glenn Colquhoun: The Other Side of a River Christine Wells
 
Where The Hell Is Matt
Where The Hell Is MattWhere The Hell Is Matt
Where The Hell Is Mattlaurenlaura
 
Schilderluchtboulevard 415 Sims 3
Schilderluchtboulevard 415   Sims 3Schilderluchtboulevard 415   Sims 3
Schilderluchtboulevard 415 Sims 3guest187821
 
Webinar Expense Management 1 december 2010
Webinar Expense Management 1 december 2010Webinar Expense Management 1 december 2010
Webinar Expense Management 1 december 2010ICreative
 
Seven North Web & Graphics
Seven North Web & GraphicsSeven North Web & Graphics
Seven North Web & GraphicsJames cournoyer
 
What's in the Mix: Felecia Alexander Visual Profile
What's in the Mix: Felecia Alexander Visual ProfileWhat's in the Mix: Felecia Alexander Visual Profile
What's in the Mix: Felecia Alexander Visual ProfileFelecia Alexander
 

Viewers also liked (20)

Vm World Presentation
Vm World PresentationVm World Presentation
Vm World Presentation
 
Crisis management case studies
Crisis management case studiesCrisis management case studies
Crisis management case studies
 
Identifying variables
Identifying variablesIdentifying variables
Identifying variables
 
Proposal
ProposalProposal
Proposal
 
R3 a3-2012 russian history gorbachev to putin class three yelsin 2012 - 2013
R3 a3-2012 russian history gorbachev to putin class three yelsin 2012 - 2013R3 a3-2012 russian history gorbachev to putin class three yelsin 2012 - 2013
R3 a3-2012 russian history gorbachev to putin class three yelsin 2012 - 2013
 
Taller de creación de documentos ePub
Taller de creación de documentos ePubTaller de creación de documentos ePub
Taller de creación de documentos ePub
 
Pearson social media survey 2011
Pearson social media survey 2011Pearson social media survey 2011
Pearson social media survey 2011
 
Heritage and Innovation at an 800-Year Old University: The University of Sala...
Heritage and Innovation at an 800-Year Old University: The University of Sala...Heritage and Innovation at an 800-Year Old University: The University of Sala...
Heritage and Innovation at an 800-Year Old University: The University of Sala...
 
Glenn Colquhoun: The Other Side of a River
Glenn Colquhoun: The Other Side of a River Glenn Colquhoun: The Other Side of a River
Glenn Colquhoun: The Other Side of a River
 
Close up on film 1.11
Close up on film 1.11Close up on film 1.11
Close up on film 1.11
 
Where The Hell Is Matt
Where The Hell Is MattWhere The Hell Is Matt
Where The Hell Is Matt
 
Schilderluchtboulevard 415 Sims 3
Schilderluchtboulevard 415   Sims 3Schilderluchtboulevard 415   Sims 3
Schilderluchtboulevard 415 Sims 3
 
Young MCA FRIENDS
Young MCA FRIENDSYoung MCA FRIENDS
Young MCA FRIENDS
 
Jessica Cox
Jessica  CoxJessica  Cox
Jessica Cox
 
Services and Products
Services and ProductsServices and Products
Services and Products
 
Webinar Expense Management 1 december 2010
Webinar Expense Management 1 december 2010Webinar Expense Management 1 december 2010
Webinar Expense Management 1 december 2010
 
Seven North Web & Graphics
Seven North Web & GraphicsSeven North Web & Graphics
Seven North Web & Graphics
 
E5 class five egyptian history - the new kingdom - part one the problem wi...
E5  class five egyptian history  - the new kingdom  - part one the problem wi...E5  class five egyptian history  - the new kingdom  - part one the problem wi...
E5 class five egyptian history - the new kingdom - part one the problem wi...
 
BNI Two Valleys
BNI Two ValleysBNI Two Valleys
BNI Two Valleys
 
What's in the Mix: Felecia Alexander Visual Profile
What's in the Mix: Felecia Alexander Visual ProfileWhat's in the Mix: Felecia Alexander Visual Profile
What's in the Mix: Felecia Alexander Visual Profile
 

Similar to The Cio And Crisis Leadership, An Examination

Coordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCoordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCognizant
 
Contingency based information system.
Contingency based information system.Contingency based information system.
Contingency based information system.shoaibzaheer1
 
Chaitanya Kosaraju Week 4 discussionCOLLAPSETop of FormHan.docx
Chaitanya Kosaraju Week 4 discussionCOLLAPSETop of FormHan.docxChaitanya Kosaraju Week 4 discussionCOLLAPSETop of FormHan.docx
Chaitanya Kosaraju Week 4 discussionCOLLAPSETop of FormHan.docxketurahhazelhurst
 
What Are The Advantages And Disadvantages Of Management...
What Are The Advantages And Disadvantages Of Management...What Are The Advantages And Disadvantages Of Management...
What Are The Advantages And Disadvantages Of Management...Diana Turner
 
Technology Implementation Paper
Technology Implementation PaperTechnology Implementation Paper
Technology Implementation PaperDeb Birch
 
Why Community-based Financial Institutions Should Practice Enterprise Risk Ma...
Why Community-based Financial Institutions Should Practice Enterprise Risk Ma...Why Community-based Financial Institutions Should Practice Enterprise Risk Ma...
Why Community-based Financial Institutions Should Practice Enterprise Risk Ma...WolfPAC - Integrated Risk Management
 
Please respond words Discuss how the concepts and.docx
Please respond words Discuss how the concepts and.docxPlease respond words Discuss how the concepts and.docx
Please respond words Discuss how the concepts and.docxwrite31
 
Please respond words Discuss how the concepts and.docx
Please respond words Discuss how the concepts and.docxPlease respond words Discuss how the concepts and.docx
Please respond words Discuss how the concepts and.docx4934bk
 
Avoiding Mistakes when Implementing Incident and Problem Management
Avoiding Mistakes when Implementing Incident and Problem ManagementAvoiding Mistakes when Implementing Incident and Problem Management
Avoiding Mistakes when Implementing Incident and Problem ManagementJavier García Bolao
 
Forkomil 2009 Soetam
Forkomil 2009 SoetamForkomil 2009 Soetam
Forkomil 2009 SoetamSoetam Rizky
 
Leadership and motivation.pptx
Leadership and motivation.pptxLeadership and motivation.pptx
Leadership and motivation.pptxManudas Mohandas
 
ISACA Belgium CERT view 2011
ISACA Belgium CERT view 2011ISACA Belgium CERT view 2011
ISACA Belgium CERT view 2011Marc Vael
 
Organizational dynamics in the TBLS strategy
Organizational dynamics in the TBLS strategyOrganizational dynamics in the TBLS strategy
Organizational dynamics in the TBLS strategyRicardo Anselmo de Castro
 
Management Team, Change Management And A Disaster Recovery...
Management Team, Change Management And A Disaster Recovery...Management Team, Change Management And A Disaster Recovery...
Management Team, Change Management And A Disaster Recovery...Jenny Calhoon
 
Please respond to the student as if you were another student.5.docx
Please respond to the student as if you were another student.5.docxPlease respond to the student as if you were another student.5.docx
Please respond to the student as if you were another student.5.docxmattjtoni51554
 

Similar to The Cio And Crisis Leadership, An Examination (20)

Coordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCoordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management Planning
 
Contingency based information system.
Contingency based information system.Contingency based information system.
Contingency based information system.
 
Crisis Management
Crisis ManagementCrisis Management
Crisis Management
 
Chaitanya Kosaraju Week 4 discussionCOLLAPSETop of FormHan.docx
Chaitanya Kosaraju Week 4 discussionCOLLAPSETop of FormHan.docxChaitanya Kosaraju Week 4 discussionCOLLAPSETop of FormHan.docx
Chaitanya Kosaraju Week 4 discussionCOLLAPSETop of FormHan.docx
 
Bcrm chapter2
Bcrm chapter2Bcrm chapter2
Bcrm chapter2
 
What Are The Advantages And Disadvantages Of Management...
What Are The Advantages And Disadvantages Of Management...What Are The Advantages And Disadvantages Of Management...
What Are The Advantages And Disadvantages Of Management...
 
Technology Implementation Paper
Technology Implementation PaperTechnology Implementation Paper
Technology Implementation Paper
 
Why Community-based Financial Institutions Should Practice Enterprise Risk Ma...
Why Community-based Financial Institutions Should Practice Enterprise Risk Ma...Why Community-based Financial Institutions Should Practice Enterprise Risk Ma...
Why Community-based Financial Institutions Should Practice Enterprise Risk Ma...
 
Please respond words Discuss how the concepts and.docx
Please respond words Discuss how the concepts and.docxPlease respond words Discuss how the concepts and.docx
Please respond words Discuss how the concepts and.docx
 
Please respond words Discuss how the concepts and.docx
Please respond words Discuss how the concepts and.docxPlease respond words Discuss how the concepts and.docx
Please respond words Discuss how the concepts and.docx
 
Avoiding Mistakes when Implementing Incident and Problem Management
Avoiding Mistakes when Implementing Incident and Problem ManagementAvoiding Mistakes when Implementing Incident and Problem Management
Avoiding Mistakes when Implementing Incident and Problem Management
 
CSIRT Management Issues
CSIRT Management IssuesCSIRT Management Issues
CSIRT Management Issues
 
Forkomil 2009 Soetam
Forkomil 2009 SoetamForkomil 2009 Soetam
Forkomil 2009 Soetam
 
Leadership and motivation.pptx
Leadership and motivation.pptxLeadership and motivation.pptx
Leadership and motivation.pptx
 
Executive Breach Response Playbook
Executive Breach Response PlaybookExecutive Breach Response Playbook
Executive Breach Response Playbook
 
ISACA Belgium CERT view 2011
ISACA Belgium CERT view 2011ISACA Belgium CERT view 2011
ISACA Belgium CERT view 2011
 
Organizational dynamics in the TBLS strategy
Organizational dynamics in the TBLS strategyOrganizational dynamics in the TBLS strategy
Organizational dynamics in the TBLS strategy
 
Management Team, Change Management And A Disaster Recovery...
Management Team, Change Management And A Disaster Recovery...Management Team, Change Management And A Disaster Recovery...
Management Team, Change Management And A Disaster Recovery...
 
Please respond to the student as if you were another student.5.docx
Please respond to the student as if you were another student.5.docxPlease respond to the student as if you were another student.5.docx
Please respond to the student as if you were another student.5.docx
 
Im1013 Chap 9
Im1013 Chap 9Im1013 Chap 9
Im1013 Chap 9
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

The Cio And Crisis Leadership, An Examination

  • 1. The CIO and Crisis Leadership, an examination of the role of the CIO when failure presents itself. “If anything can go wrong, it will”
  • 2. Crisis By definition a crisis is: A crucial or decisive point or situation; a turning point. An unstable condition, as in political, social, or economic affairs, involving an impending abrupt or decisive change.
  • 3.
  • 4. Complexity of systems is a variable usually directly affected by the inter-relationship of software and hardware and can be thought of in terms of MTTR or Mean Time to Repair or Mean time to recovery depending on the type of system.
  • 5.
  • 6.
  • 7. Reliability is the key to success of systems
  • 8. MTTR will be the key to restoring systems to a success state.
  • 9. MTTR requires planning and resources usually under the control of the CIO (redundant systems, spares on the shelf, etc.)
  • 10. MTBF is built in to systems and cannot be measured definitely and is not under the absolute control of the CIO.
  • 11. The point of failure can be only estimated and never predictable with any accuracy.
  • 12. Responsive crisis management can reduce MTTR.
  • 13.
  • 14. Duties of the CIO as an Incident Commander Overall field management of the emergency as it relates to CIO’s area of authority; Coordination with Management and/or other senior managers. The CIO of the firm’s Emergency Response Team should co-locate and coordinate with the Fire or Police Department IC (an element of ‘Unified Command’) if the crisis is large enough to have external responders; Ultimate responsibility for the safety of their staff; Approval of all plans and resources; Situational analysis; Setting objectives and priorities; Delegating authority as necessary; Function as primary responder until others arrive.
  • 15. The full NIMS ICS structure
  • 16. ICS Management Concepts Common Terminology Modular Organization Management by Objectives Incident Action Planning Manageable Span of Control Incident Facilities and Locations Comprehensive Resource Management Integrated Communications Establishment and Transfer of Command Chain of Command and Unity of Command Unified Command Accountability Dispatch/Deployment Information and Intelligence Management
  • 17. What works and doesn’t Weaknesses in incident management are often due to: Lack of accountability, including unclear chains of command and supervision. Poor communication, due to both inefficient uses of available communications systems and conflicting codes and terminology. Lack of an orderly, systematic planning process. No common, flexible, predesigned management structure that enabled commanders to delegate responsibilities and manage workloads efficiently. No predefined methods to integrate interagency requirements into the management structure and planning process effectively.
  • 18. What works and doesn’t When applying the Incident Command System to the business/industrial setting, you need: Templates for doing things right such as forms and procedures in written form that are familiar to the likely staff and other responders. Organization and Focus on strategic, as well as, tactical applications. Creation of superior information flow is of particular importance for a CIO. Creation of a function based structure that practices upward, as well as, downward management. Maximization of resource throughput through cross training and functional backups. Creating a seamless vertical and horizontal structure that enhances communications throughout the incident command system.
  • 20. Odds and Ends Mitigation and restoration must be the mantra of the CIO. This is the first priority. How do we restore damaged or lost items? When it is all over the thought the CIO put into the backup and disaster recovery policies and practices will be tested. Hopefully they work as intended. Hopefully the CIO has tested the various activities and in fact they worked as intended. From experience this is an area of gray hair. How do we prevent this from occurring again? If the CIO can’t say with a straight face to his or her bosses that “here is what I am doing so it will either never happen again or if it does the outcome will be less disruptive”, they should find another line of work. The framework for preparation? Is there an atmosphere supported by the CIO that takes disaster / crisis planning seriously. Since people only respect what you inspect, this means the CIO must be actively engaged not a just delegate the responsibility. How to flex the response when we do not know the full extent of the crisis is an art. The CIO must be fast on their feet and have the ability to think through the “what if” questions. Keys to adaptive responses are motivated and committed staff with the right training and education both in the methods of ICS but also the understanding of the department and its systems. Execution and follow-up are the keys. A flawless execution that has no follow-up is almost as bad as a failed execution.
  • 21.
  • 22.
  • 23. Buy my book only $19.95