SlideShare a Scribd company logo
1 of 24
Download to read offline
October 20, 2010
Presented By:
Susan Kastan
Penny Klein
Bio
 Susan Kastan has been in the information technology
field for 20+ years, and currently specializes in
Business Continuity. She has developed numerous
security policies, procedures and plans for various
government, association and private industry.
 Penny Klein brings 20+ years of information
assurance experience, specializing in IA policies. She
has developed a Business Contingency Program for a
major association, as well as policies, procedures and
plans for numerous government and private industries
October 20, 2010 2Kastan Consulting/PJKlein Consulting
Business Continuity
 Business Continuity – The smooth continuation of
business activity despite an interruption of service
 No size restrictions
 Tailored to environment
 Information technology as well as personnel and
processes
October 20, 2010 3Kastan Consulting/PJKlein Consulting
Business Continuity
 In the event a incident occurs:
 Operations are likely to be disrupted
 Offices are likely to be closed down or destroyed
 People may get hurt or killed
 People are likely to have their employment disrupted
October 20, 2010 4Kastan Consulting/PJKlein Consulting
Risk Assessment
 Risk Assessment – Activities that discover an
organization's vulnerabilities, threats and impact.
Additionally , it identifies the countermeasure to
mitigate the risk, the associated costs, and the risk
tolerance (risk the organization is willing to accept)
October 20, 2010 5Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Business Impact Assessment (BIA) - Analyzes
mission criticality of all enterprise functions, the
current threats, and consequences of losing some or all
of these functions.
 Also known as Business Impact Analysis
October 20, 2010 6Kastan Consulting/PJKlein Consulting
Steps in Business Continuity
 Conduct Risk Assessment
 Conduct BIA
 Develop and Document
 Train & Test
 Implement
 Maintain
October 20, 2010 7Kastan Consulting/PJKlein Consulting
Risk Assessment
 Purpose of a Risk Assessment
 Identifies current threats
 Identifies current vulnerabilities
 Identifies impact of the threats to the vulnerabilities
 Provides for Risk Management, that is, what risk is the
organization willing to accept, reduce/correct, or
transfer
October 20, 2010 8Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Identifies:
 Mission Critical and Mission Essential Requirements
 Recovery Phases
 Critical Factors
 Assumptions
 Evaluation Criteria
 Critical Dependencies
 Recommendations
October 20, 2010 9Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Benefits
 Raises senior management’s awareness of the state of
their business and helps to justify the need for a
business continuity plan
 Ensures that a suitable business continuity strategy and
effective business continuity plan will be developed
 Identifies and prioritizes recovery of mission critical
business functions and processes
October 20, 2010 10Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Benefits – cont’d
 Identifies requirements for recovery of critical IT
systems, applications, vital records, equipment and
resources
 Identifies extent of financial impact
 Identifies extent of operational impact
October 20, 2010 11Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Process
 Awareness
 Provide to Management and Team
 Ensure buy-in to the process
 Data Gathering
 Management’s vision
 Interviews and/or general surveys
 Threat Analysis and Requirements Analysis
 Reviews
 Department review
 Senior management review
 Evaluation and Recommendation
 Build recovery plans for “time sensitive”/mission critical plans
October 20, 2010 12Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Awareness
 Brief Senior Management and Stakeholders
 GET BUY-IN
 Provide a high level overview of the process
 Identify benefits
 Reference guide
 Useful and easy to follow presentation of the data collected
 Comprehensive view of all the requirements
 Requirements guide for developing and implementing risk
mitigation strategies
 Provides validation and justification for funding all BCP
requirements
October 20, 2010 13Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Gather data
 Business processes
 Resources
 Interdependencies
 Impacts over time
 Maximum Allowable Downtime (MAD)
 Recovery Time Objective (RTO)
 Recovery Point Objective (RPO)
October 20, 2010 14Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Determine the impact of scenarios on processes
 Loss of key people
 Loss of location
 Loss of power
 Loss of communications
 Loss of technology
 Loss of information
October 20, 2010 15Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Impact types/categories
 Financial
 Legal/regulatory
 Customer loss/dissatisfaction
 Reputation impact
 Time sensitive material
October 20, 2010 16Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Low - May result in the loss of some tangible
assets or resources or may noticeably affect an
organization’s mission, reputation, or interest.
 Medium - May result in the costly loss of tangible
assets or resources; may violate, harm, or impede
an organization’s mission, reputation, or interest;
or may result in human injury.
Based on NIST 800-30
October 20, 2010 17Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 High - May result in the highly costly loss of major
tangible assets or resources; may significantly
violate, harm, or impede an organization’s
mission, reputation, or interest; or may result in
human death or serious injury.
Based on NIST 800-30
October 20, 2010 18Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Department Review
 Changes
 Inaccuracies/ misinterpretation
 Verify timelines are correct
 RTO
 RPO
 MAD
October 20, 2010 19Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Senior Management Review
 Prioritize for entire company
 Determine path forward based on
 Cost
 Speed of Recovery
 Quality
 Impacts to business
October 20, 2010 20Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Follow On
 Take what you’ve learned and build out the Business
Continuity Plan
 BIA is the basis for the risk decisions
 Start with most critical or time sensitive
October 20, 2010 21Kastan Consulting/PJKlein Consulting
Exercise
 Santa attended a conference in January about business
continuity.
 He wants to put a business continuity plan in place.
 It’s a little later than he would like, but he would like to
start with the Business Impact Assessments.
 Our goal:
 Identify critical processes
 Create list of top 10
October 20, 2010 22Kastan Consulting/PJKlein Consulting
Exercise
 Santa delivers 2 toys (or coal) to all children around
the globe who believe in him
 24 hours to do it
 Santa is the President of Santa’s Workshop, Inc.
 151,000+ employees
 Week before (and Christmas day) is critical to him
 Everyone believes what they do is critical to operations
 A little bit of technology helps!
October 20, 2010 Kastan Consulting/PJKlein Consulting 23
Contact Information
Penny Klein
PJKlein Consulting, LLC
Penny.Klein@
pjkleinllc.com
www.pjkleinllc.com
703.901.1932
Susan Kastan
Kastan Consulting, LLC
Susan.Kastan@
kastanconsulting.com
www.kastanconsulting.com
585.724.0804
October 20, 2010 24Kastan Consulting/PJKlein Consulting

More Related Content

What's hot

02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIA02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIABCM Institute
 
BUSINESS IMPACT ‎ANALYSIS- DRM
BUSINESS IMPACT ‎ANALYSIS- DRMBUSINESS IMPACT ‎ANALYSIS- DRM
BUSINESS IMPACT ‎ANALYSIS- DRMLibcorpio
 
Business Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation SlidesBusiness Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation SlidesSlideTeam
 
Business continuity management www.reconglobal.in
Business continuity management   www.reconglobal.inBusiness continuity management   www.reconglobal.in
Business continuity management www.reconglobal.inSatya Yadav
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop FinalBill Lisse
 
Business Continuity Management or Risk Management? Aligning Expectations for ...
Business Continuity Management or Risk Management? Aligning Expectations for ...Business Continuity Management or Risk Management? Aligning Expectations for ...
Business Continuity Management or Risk Management? Aligning Expectations for ...BCM Institute
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Goutama Bachtiar
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity ManagementECC International
 
Business Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationBusiness Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationPECB
 
Business impact analysis and Cost-benefit Analysis. Risk Assesment
Business impact analysis and Cost-benefit Analysis. Risk AssesmentBusiness impact analysis and Cost-benefit Analysis. Risk Assesment
Business impact analysis and Cost-benefit Analysis. Risk Assesmenterfan7486
 
ISO 22301 Business Continuity Management
ISO 22301 Business Continuity ManagementISO 22301 Business Continuity Management
ISO 22301 Business Continuity ManagementRamiro Cid
 
Business Impact Analysis module 3.ppt
Business Impact Analysis module 3.pptBusiness Impact Analysis module 3.ppt
Business Impact Analysis module 3.pptMohamedMoustafa91763
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planningalanlund
 
A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5Gewurtz
 

What's hot (20)

Bcp
BcpBcp
Bcp
 
02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIA02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIA
 
BUSINESS IMPACT ‎ANALYSIS- DRM
BUSINESS IMPACT ‎ANALYSIS- DRMBUSINESS IMPACT ‎ANALYSIS- DRM
BUSINESS IMPACT ‎ANALYSIS- DRM
 
Business Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation SlidesBusiness Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation Slides
 
Business continuity management www.reconglobal.in
Business continuity management   www.reconglobal.inBusiness continuity management   www.reconglobal.in
Business continuity management www.reconglobal.in
 
Awareness iso 22301 danang suryo
Awareness iso 22301 danang suryoAwareness iso 22301 danang suryo
Awareness iso 22301 danang suryo
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop Final
 
Business Continuity Management or Risk Management? Aligning Expectations for ...
Business Continuity Management or Risk Management? Aligning Expectations for ...Business Continuity Management or Risk Management? Aligning Expectations for ...
Business Continuity Management or Risk Management? Aligning Expectations for ...
 
Business Continuity Planning Presentation
Business Continuity Planning PresentationBusiness Continuity Planning Presentation
Business Continuity Planning Presentation
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)
 
Introduction to Business Continuity Management
Introduction to Business Continuity ManagementIntroduction to Business Continuity Management
Introduction to Business Continuity Management
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
Business Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationBusiness Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS Implementation
 
Business impact analysis and Cost-benefit Analysis. Risk Assesment
Business impact analysis and Cost-benefit Analysis. Risk AssesmentBusiness impact analysis and Cost-benefit Analysis. Risk Assesment
Business impact analysis and Cost-benefit Analysis. Risk Assesment
 
ISO 22301 Business Continuity Management
ISO 22301 Business Continuity ManagementISO 22301 Business Continuity Management
ISO 22301 Business Continuity Management
 
Business Impact Analysis module 3.ppt
Business Impact Analysis module 3.pptBusiness Impact Analysis module 3.ppt
Business Impact Analysis module 3.ppt
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Bcp drp
Bcp drpBcp drp
Bcp drp
 
Risk and Business Continuity Management
Risk and Business Continuity ManagementRisk and Business Continuity Management
Risk and Business Continuity Management
 
A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5
 

Viewers also liked

BSidesSF 2014 Fix What Matters:Why CVSS Sucks
BSidesSF 2014 Fix What Matters:Why CVSS SucksBSidesSF 2014 Fix What Matters:Why CVSS Sucks
BSidesSF 2014 Fix What Matters:Why CVSS SucksEd Bellis
 
[Risk] Risk Manager for IRAM2 Application
[Risk] Risk Manager for IRAM2 Application[Risk] Risk Manager for IRAM2 Application
[Risk] Risk Manager for IRAM2 ApplicationAffy Morris MSc, ACIM
 
Cdc up business_impact_analysis_template
Cdc up business_impact_analysis_templateCdc up business_impact_analysis_template
Cdc up business_impact_analysis_templatedimakarmi
 
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)PECB
 
Disaster Recovery Presentation
Disaster Recovery PresentationDisaster Recovery Presentation
Disaster Recovery PresentationTimSchaefer
 
An Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery PlanningAn Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery PlanningNEBizRecovery
 
The A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster RecoveryThe A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster RecoverySirius
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat ModelingCigital
 
Threat modeling with architectural risk patterns
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patternsStephen de Vries
 
OHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentOHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentTechnoSysCon
 

Viewers also liked (11)

BSidesSF 2014 Fix What Matters:Why CVSS Sucks
BSidesSF 2014 Fix What Matters:Why CVSS SucksBSidesSF 2014 Fix What Matters:Why CVSS Sucks
BSidesSF 2014 Fix What Matters:Why CVSS Sucks
 
[Risk] Risk Manager for IRAM2 Application
[Risk] Risk Manager for IRAM2 Application[Risk] Risk Manager for IRAM2 Application
[Risk] Risk Manager for IRAM2 Application
 
Cdc up business_impact_analysis_template
Cdc up business_impact_analysis_templateCdc up business_impact_analysis_template
Cdc up business_impact_analysis_template
 
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
 
Disaster Recovery Presentation
Disaster Recovery PresentationDisaster Recovery Presentation
Disaster Recovery Presentation
 
An Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery PlanningAn Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery Planning
 
The A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster RecoveryThe A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster Recovery
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 
Threat modeling with architectural risk patterns
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patterns
 
ISO 31000
ISO 31000ISO 31000
ISO 31000
 
OHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentOHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessment
 

Similar to Business Impact and Risk Assessments in Business Continuity and Disaster Recovery

Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010
Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010
Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010UNSW Canberra
 
Legal Services Act Seminar 3rd March 2010
Legal Services Act Seminar 3rd March 2010Legal Services Act Seminar 3rd March 2010
Legal Services Act Seminar 3rd March 2010Gateway Media
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Jim Kaplan CIA CFE
 
Consultancy Report Final
Consultancy Report FinalConsultancy Report Final
Consultancy Report FinalBilal Ahmed
 
Prospectus vcssgoc
Prospectus  vcssgocProspectus  vcssgoc
Prospectus vcssgocvinay verma
 
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Citrix Online
 
Pitch Short Deck KEA_Reboost.pdf
Pitch Short Deck KEA_Reboost.pdfPitch Short Deck KEA_Reboost.pdf
Pitch Short Deck KEA_Reboost.pdfAugustoCaceres6
 
bipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docx
bipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docxbipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docx
bipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docxAASTHA76
 
Financials and Human Resource Planning MGT465 Version 2
Financials and Human Resource Planning MGT465 Version 2Financials and Human Resource Planning MGT465 Version 2
Financials and Human Resource Planning MGT465 Version 2ShainaBoling829
 
Financials and human resource planning mgt465 version 2
Financials and human resource planning mgt465 version 2Financials and human resource planning mgt465 version 2
Financials and human resource planning mgt465 version 2RAHUL126667
 
Finance in Cornwall - 10 May 2016 (Segment 2b)
Finance in Cornwall - 10 May 2016 (Segment 2b)Finance in Cornwall - 10 May 2016 (Segment 2b)
Finance in Cornwall - 10 May 2016 (Segment 2b)PKF Francis Clark
 
Fractal analytics ace solution
Fractal analytics ace solutionFractal analytics ace solution
Fractal analytics ace solutionFractal_Analytics
 
Business Valuation Tips and Traps
Business Valuation Tips and TrapsBusiness Valuation Tips and Traps
Business Valuation Tips and TrapsCraig West
 
Optimise Learning Impact August 2010
Optimise Learning Impact August 2010Optimise Learning Impact August 2010
Optimise Learning Impact August 2010AndrewFletcher
 
Optimise Learning Impact August 2010
Optimise Learning Impact August 2010Optimise Learning Impact August 2010
Optimise Learning Impact August 2010AndrewFletcher
 
P4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdf
P4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdfP4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdf
P4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdfKnowledgeDevourer
 
Keeping up with Accounting - Business & Industry edition
Keeping up with Accounting - Business & Industry editionKeeping up with Accounting - Business & Industry edition
Keeping up with Accounting - Business & Industry editionTom Hood, CPA,CITP,CGMA
 

Similar to Business Impact and Risk Assessments in Business Continuity and Disaster Recovery (20)

Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010
Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010
Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010
 
Legal Services Act Seminar 3rd March 2010
Legal Services Act Seminar 3rd March 2010Legal Services Act Seminar 3rd March 2010
Legal Services Act Seminar 3rd March 2010
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
 
Consultancy Report Final
Consultancy Report FinalConsultancy Report Final
Consultancy Report Final
 
Prospectus vcssgoc
Prospectus  vcssgocProspectus  vcssgoc
Prospectus vcssgoc
 
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
 
Pitch Short Deck KEA_Reboost.pdf
Pitch Short Deck KEA_Reboost.pdfPitch Short Deck KEA_Reboost.pdf
Pitch Short Deck KEA_Reboost.pdf
 
bipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docx
bipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docxbipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docx
bipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docx
 
Financials and Human Resource Planning MGT465 Version 2
Financials and Human Resource Planning MGT465 Version 2Financials and Human Resource Planning MGT465 Version 2
Financials and Human Resource Planning MGT465 Version 2
 
Financials and human resource planning mgt465 version 2
Financials and human resource planning mgt465 version 2Financials and human resource planning mgt465 version 2
Financials and human resource planning mgt465 version 2
 
Centers of Change
Centers of ChangeCenters of Change
Centers of Change
 
Finance in Cornwall - 10 May 2016 (Segment 2b)
Finance in Cornwall - 10 May 2016 (Segment 2b)Finance in Cornwall - 10 May 2016 (Segment 2b)
Finance in Cornwall - 10 May 2016 (Segment 2b)
 
Fractal analytics ace solution
Fractal analytics ace solutionFractal analytics ace solution
Fractal analytics ace solution
 
Business Valuation Tips and Traps
Business Valuation Tips and TrapsBusiness Valuation Tips and Traps
Business Valuation Tips and Traps
 
Optimise Learning Impact August 2010
Optimise Learning Impact August 2010Optimise Learning Impact August 2010
Optimise Learning Impact August 2010
 
Optimise Learning Impact August 2010
Optimise Learning Impact August 2010Optimise Learning Impact August 2010
Optimise Learning Impact August 2010
 
P4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdf
P4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdfP4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdf
P4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdf
 
Keeping up with Accounting - Business & Industry edition
Keeping up with Accounting - Business & Industry editionKeeping up with Accounting - Business & Industry edition
Keeping up with Accounting - Business & Industry edition
 
Company Directors Update 2016
Company Directors Update 2016Company Directors Update 2016
Company Directors Update 2016
 

More from Rochester Security Summit

Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleRochester Security Summit
 
Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Rochester Security Summit
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudRochester Security Summit
 
State Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltState Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltRochester Security Summit
 
You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…Rochester Security Summit
 
A Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetA Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetRochester Security Summit
 

More from Rochester Security Summit (16)

IPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be IgnoredIPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be Ignored
 
Radio Reconnaissance in Penetration Testing
Radio Reconnaissance in Penetration TestingRadio Reconnaissance in Penetration Testing
Radio Reconnaissance in Penetration Testing
 
Real Business Threats!
Real Business Threats!Real Business Threats!
Real Business Threats!
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)
 
Dissecting the Hack: Malware Analysis 101
Dissecting the Hack: Malware Analysis 101 Dissecting the Hack: Malware Analysis 101
Dissecting the Hack: Malware Analysis 101
 
GRC– The Way Forward
GRC– The Way ForwardGRC– The Way Forward
GRC– The Way Forward
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public Cloud
 
Finding Patterns in Data Breaches
Finding Patterns in Data BreachesFinding Patterns in Data Breaches
Finding Patterns in Data Breaches
 
State Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltState Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork Quilt
 
It's All About the Data!
It's All About the Data!It's All About the Data!
It's All About the Data!
 
You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…
 
A Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetA Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT Budget
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
Firewall Defense against Covert Channels
Firewall Defense against Covert Channels Firewall Defense against Covert Channels
Firewall Defense against Covert Channels
 

Recently uploaded

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Business Impact and Risk Assessments in Business Continuity and Disaster Recovery

  • 1. October 20, 2010 Presented By: Susan Kastan Penny Klein
  • 2. Bio  Susan Kastan has been in the information technology field for 20+ years, and currently specializes in Business Continuity. She has developed numerous security policies, procedures and plans for various government, association and private industry.  Penny Klein brings 20+ years of information assurance experience, specializing in IA policies. She has developed a Business Contingency Program for a major association, as well as policies, procedures and plans for numerous government and private industries October 20, 2010 2Kastan Consulting/PJKlein Consulting
  • 3. Business Continuity  Business Continuity – The smooth continuation of business activity despite an interruption of service  No size restrictions  Tailored to environment  Information technology as well as personnel and processes October 20, 2010 3Kastan Consulting/PJKlein Consulting
  • 4. Business Continuity  In the event a incident occurs:  Operations are likely to be disrupted  Offices are likely to be closed down or destroyed  People may get hurt or killed  People are likely to have their employment disrupted October 20, 2010 4Kastan Consulting/PJKlein Consulting
  • 5. Risk Assessment  Risk Assessment – Activities that discover an organization's vulnerabilities, threats and impact. Additionally , it identifies the countermeasure to mitigate the risk, the associated costs, and the risk tolerance (risk the organization is willing to accept) October 20, 2010 5Kastan Consulting/PJKlein Consulting
  • 6. Business Impact Assessment  Business Impact Assessment (BIA) - Analyzes mission criticality of all enterprise functions, the current threats, and consequences of losing some or all of these functions.  Also known as Business Impact Analysis October 20, 2010 6Kastan Consulting/PJKlein Consulting
  • 7. Steps in Business Continuity  Conduct Risk Assessment  Conduct BIA  Develop and Document  Train & Test  Implement  Maintain October 20, 2010 7Kastan Consulting/PJKlein Consulting
  • 8. Risk Assessment  Purpose of a Risk Assessment  Identifies current threats  Identifies current vulnerabilities  Identifies impact of the threats to the vulnerabilities  Provides for Risk Management, that is, what risk is the organization willing to accept, reduce/correct, or transfer October 20, 2010 8Kastan Consulting/PJKlein Consulting
  • 9. Business Impact Assessment  Identifies:  Mission Critical and Mission Essential Requirements  Recovery Phases  Critical Factors  Assumptions  Evaluation Criteria  Critical Dependencies  Recommendations October 20, 2010 9Kastan Consulting/PJKlein Consulting
  • 10. Business Impact Assessment  Benefits  Raises senior management’s awareness of the state of their business and helps to justify the need for a business continuity plan  Ensures that a suitable business continuity strategy and effective business continuity plan will be developed  Identifies and prioritizes recovery of mission critical business functions and processes October 20, 2010 10Kastan Consulting/PJKlein Consulting
  • 11. Business Impact Assessment  Benefits – cont’d  Identifies requirements for recovery of critical IT systems, applications, vital records, equipment and resources  Identifies extent of financial impact  Identifies extent of operational impact October 20, 2010 11Kastan Consulting/PJKlein Consulting
  • 12. Business Impact Assessment  Process  Awareness  Provide to Management and Team  Ensure buy-in to the process  Data Gathering  Management’s vision  Interviews and/or general surveys  Threat Analysis and Requirements Analysis  Reviews  Department review  Senior management review  Evaluation and Recommendation  Build recovery plans for “time sensitive”/mission critical plans October 20, 2010 12Kastan Consulting/PJKlein Consulting
  • 13. Business Impact Assessment  Awareness  Brief Senior Management and Stakeholders  GET BUY-IN  Provide a high level overview of the process  Identify benefits  Reference guide  Useful and easy to follow presentation of the data collected  Comprehensive view of all the requirements  Requirements guide for developing and implementing risk mitigation strategies  Provides validation and justification for funding all BCP requirements October 20, 2010 13Kastan Consulting/PJKlein Consulting
  • 14. Business Impact Assessment  Gather data  Business processes  Resources  Interdependencies  Impacts over time  Maximum Allowable Downtime (MAD)  Recovery Time Objective (RTO)  Recovery Point Objective (RPO) October 20, 2010 14Kastan Consulting/PJKlein Consulting
  • 15. Business Impact Assessment  Determine the impact of scenarios on processes  Loss of key people  Loss of location  Loss of power  Loss of communications  Loss of technology  Loss of information October 20, 2010 15Kastan Consulting/PJKlein Consulting
  • 16. Business Impact Assessment  Impact types/categories  Financial  Legal/regulatory  Customer loss/dissatisfaction  Reputation impact  Time sensitive material October 20, 2010 16Kastan Consulting/PJKlein Consulting
  • 17. Business Impact Assessment  Low - May result in the loss of some tangible assets or resources or may noticeably affect an organization’s mission, reputation, or interest.  Medium - May result in the costly loss of tangible assets or resources; may violate, harm, or impede an organization’s mission, reputation, or interest; or may result in human injury. Based on NIST 800-30 October 20, 2010 17Kastan Consulting/PJKlein Consulting
  • 18. Business Impact Assessment  High - May result in the highly costly loss of major tangible assets or resources; may significantly violate, harm, or impede an organization’s mission, reputation, or interest; or may result in human death or serious injury. Based on NIST 800-30 October 20, 2010 18Kastan Consulting/PJKlein Consulting
  • 19. Business Impact Assessment  Department Review  Changes  Inaccuracies/ misinterpretation  Verify timelines are correct  RTO  RPO  MAD October 20, 2010 19Kastan Consulting/PJKlein Consulting
  • 20. Business Impact Assessment  Senior Management Review  Prioritize for entire company  Determine path forward based on  Cost  Speed of Recovery  Quality  Impacts to business October 20, 2010 20Kastan Consulting/PJKlein Consulting
  • 21. Business Impact Assessment  Follow On  Take what you’ve learned and build out the Business Continuity Plan  BIA is the basis for the risk decisions  Start with most critical or time sensitive October 20, 2010 21Kastan Consulting/PJKlein Consulting
  • 22. Exercise  Santa attended a conference in January about business continuity.  He wants to put a business continuity plan in place.  It’s a little later than he would like, but he would like to start with the Business Impact Assessments.  Our goal:  Identify critical processes  Create list of top 10 October 20, 2010 22Kastan Consulting/PJKlein Consulting
  • 23. Exercise  Santa delivers 2 toys (or coal) to all children around the globe who believe in him  24 hours to do it  Santa is the President of Santa’s Workshop, Inc.  151,000+ employees  Week before (and Christmas day) is critical to him  Everyone believes what they do is critical to operations  A little bit of technology helps! October 20, 2010 Kastan Consulting/PJKlein Consulting 23
  • 24. Contact Information Penny Klein PJKlein Consulting, LLC Penny.Klein@ pjkleinllc.com www.pjkleinllc.com 703.901.1932 Susan Kastan Kastan Consulting, LLC Susan.Kastan@ kastanconsulting.com www.kastanconsulting.com 585.724.0804 October 20, 2010 24Kastan Consulting/PJKlein Consulting