SlideShare a Scribd company logo
1 of 21
Download to read offline
BUSINESS
CONTINUITY
GUIDE
PLANNING
AGENDA
• Introduction
• Objectives of BCP
• Approaches to BCP
• Dimensions of Scope
• Entry Points
2
• Q&A
INTRODUCTION
So…you’ve decided to embark on a business continuity
planning (BCP) project
…but where do you start?
• Define the objectives
• Determine the dimensions of scope
• Select an appropriate approach
• Proceed from an entry point
3
OBJECTIVES (1/2)
Satisfy audit or regulatory requirements
1
Rebuild the infrastructure
2
Resumption of business activities
3
Continuity in customer service
4
Four possible objectives of BCP:
4
OBJECTIVES (2/2)
5
Audit or Regulatory
Requirements
• If your focus is on:
– Passing an audit or getting points cleared
– Minimizing costs
• Then your objective is to satisfy audit or
regulatory requirements.
Rebuild the Infrastructure
• If your focus is on:
– Alternative facilities and sites
– Solutions to minimize downtime of key
infrastructure and systems
• Then your objective is to rebuild the
infrastructure.
Resumption of Business
Activities
• If your focus is on:
– Setting up an organization and the required
facilities to enable key staff to resume their
activities
• Then your objective is the resumption of
business activities.
Continuity in Customer Service
• If your focus is on:
– Defining what level of customer service
must be maintained throughout a disaster
– What is required to achieve that level of
customer service
• Then your objective is to ensure continuity in
customer service at an acceptable level.
APPROACHES TO BCP
6
Approaches to BCP based on the objectives:
Objective Approach
Satisfy audit or regulatory requirements Tick-box approach
Rebuild the infrastructure Infrastructure approach
Resumption of business activities Gradual/subplans approach
Continuity in customer service Business approach (holistic)
SCOPE
7
• Event Interrupting Operations
– Asset protection
Protection of assets (e.g., people, building, etc.)
– BCP
Preparation of critical elements for business continuity
• Enterprise-wide versus IT…
...be clear on the scope of your BCP project
8
DIMENSIONS OF SCOPE
Business
Network
Control Room
IT DRP
Network Resilience
Server Mirroring
Dealing Room
Office Relocation
Equipment Failures
Infrastructure
Business Interruption
Risks (BIR)
Infrastructure Risk
Long-Term Business Viability
Brand Image
Client Satisfaction
Capacity
Regulatory
INFRASTRUCTURE
9
• …the identification and protection
of critical (IT) infrastructure required to maintain an acceptable level of business,
• ...to ensure the survival of the organization in times of business disruption.
• Critical infrastructure can include:
– Mainframe
– Networks
– Applications
– PCs and desktops
– Manufacturing infrastructure
– Logistical infrastructure
– Office locations
BUSINESS
10
• …the identification and protection
of critical business processes required to maintain an acceptable level of business,
• ...to ensure the survival of the organization in times of business disruption.
• Critical business processes can include
– Manufacturing
– Sales/order entry
– Payroll
– Dealing room activities
– Delivery
– Client communication
– Accounting and finance
BUSINESS INTERRUPTION RISK
11
• …the identification and protection
against business risks resulting from a business interruption jeopardizing
• ... the survival of the organization in times of business disruption.
ENTRY POINTS
12
There are four possible entry points depending on the drivers of the approach.
If your approach is… Then your entry point is...
Event driven Evaluate threats
Business risk driven Assess risks from interruptions
Business driven Analyze critical processes
Applications or systems driven Dependency on (IT) infrastructure
THREATS
13
Classification of threats according to the type of event:
• Acts of nature – hurricane, flood, earthquake, etc.
• External man-made events – terrorism, evacuation,
security intrusion, etc.
• Internal unintentional events – accidental loss of files,
computer failure, etc.
• Internal intentional events – strike, sabotage, data
deletion, etc.
RISKS
14
Competitor
Catastrophic Loss
Sensitivity
Sovereign/Political
Shareholder Relations
Legal
Capital Availability
Industry
Financial Markets
Information For Decision Making Risk
Operational
Pricing
Contract Commitment
Measurement
Alignment
Completeness and Accuracy
Regulatory Reporting
Financial
Budget and Planning
Completeness and Accuracy
Accounting Information
Financial Reporting Evaluation
Taxation
Pension Fund
Investment Evaluation
Regulatory Reporting
Strategic
Environmental Scan
Business Portfolio
Valuation
Measurement
Organization Structure
Resource Allocation
Planning
Life Cycle
Operations Risk
Customer Satisfaction
Human Resources
Product Development
Efficiency
Capacity
Performance Gap
Cycle Time
Sourcing
Commodity Pricing
Obsolescence Shrinkage
Compliance
Business Interruption
Product Service Failure
Environmental
Health & Safety
Trademark/Brand Name Erosion
Empowerment Risk
Leadership
Authority
Limit
Performance Incentives
Communications
Information Processing/Technology Risk
Access
Integrity
Relevance
Availability
Integrity Risk
Management Fraud
Employee Fraud
Illegal Acts
Unauthorized Use
Reputation
Financial Risk
Currency
Interest Rate
Liquidity
Cash Transfer/Velocity
Derivative
Settlement
Reinvestment/Rollover
Credit
Collateral
Counterparty
Process Risk
Environment Risk
Business Risk Model
15
ENTRY POINT: INFRASTRUCTURE
Business
Network
Control Room
IT DRP
Network Resilience
Server Mirroring
Dealing Room
Office Relocation
Equipment Failures
Infrastructure
Business
Interruption Risks
(BIR)
• Traditional approach.
• Very often limited to IT, then extended to "departmental" infrastructure or office infrastructure.
• Very often the business perspective is used to assess criticality of infrastructure elements, and to justify the cost (business
impact analysis).
• The risk scope is limited to infrastructure risks through analysis of threats (potential events).
Infrastructure Risk
Long-Term Business Viability
Brand Image
Client Satisfaction
Capacity
Regulatory
16
ENTRY POINT: BUSINESS
Business
Infrastructure
Business
Interruption Risks
(BIR)
Network
Control Room
IT DRP
Network Resilience
Server Mirroring
Dealing Room
Office Relocation
Equipment Failures
• Top-down approach.
• Starting from a top-down analysis of the critical business domains or processes.
• For the critical business processes, assess the dependencies and criticality.
• Often, the business interruption risk dimension is included into the business impact assessment, although not always made
explicit or limited to the obvious business interruption risks.
Infrastructure Risk
Long-Term Business Viability
Brand Image
Client Satisfaction
Capacity
Regulatory
17
ENTRY POINT: BUSINESS RISKS
Business
Infrastructure
Business
Interruption Risks
(BIR)
1.
2.
Network
Control Room
IT DRP
Network Resilience
Server Mirroring
Dealing Room
Office Relocation
Equipment Failures
• Entering from looking at the business risks created by a business interruption.
• Allows to include more than only the operational impact, e.g., product quality, brand image, health & safety, cash flow, etc.
• To manage these risks, next to BCP, other actions may be included, e.g., asset protection, supply chain management, crisis
management, media management, etc.
• Here we can provide the best added value.
Infrastructure Risk
Long-Term Business Viability
Brand Image
Client Satisfaction
Capacity
Regulatory
RISKS
The “five As” of risk management :
Assess Risk
1
Accept or reject risk
2
Avoid risk, transfer risk or reduce risk to an
acceptable level
3
Analyze performance gaps
4
Act to improve
5
18
Business Processes
Information Flows
Infrastructure & Resources
19
Identify key dependencies and
vulnerabilities within the business
organization, top-down:
• What does the company depend on to be
successful?
• What are the key business processes
driving the business?
• What are the flows within these business
processes?
• What are the vulnerabilities and
dependencies within these flows and
business operations?
BUSINESS PROCESSES
Key Business Drivers
(IT) INFRASTRUCTURE
20
Identifying recovery solutions
Assessing the possible threats
Selecting the critical infrastructure
Analyzing the potential business impact
Obtaining an inventory of (IT) infrastructure
Achieved by
BCP METHODOLOGIES
21
Two main BCP methodologies:
Entry Points BCP Methodology
Infrastructure
Infrastructure-oriented, threat-based
Threat
Business
Business-oriented, risk-based
Risk

More Related Content

What's hot

Key considerations for your internal audit plan
Key considerations for your internal audit planKey considerations for your internal audit plan
Key considerations for your internal audit planessbaih
 
Internal audit test type guide
Internal audit test type guideInternal audit test type guide
Internal audit test type guideCenapSerdarolu
 
Internal audit manual template
Internal audit manual templateInternal audit manual template
Internal audit manual templateCenapSerdarolu
 
Coso And Internal Audit
Coso And Internal AuditCoso And Internal Audit
Coso And Internal Auditijazurrehman
 
Performance measures guide
Performance measures guidePerformance measures guide
Performance measures guideCenapSerdarolu
 
Brief overview on Internal control (Audit)
Brief overview on Internal control (Audit)Brief overview on Internal control (Audit)
Brief overview on Internal control (Audit)Hisyam
 
Auditing corporate governance guide
Auditing corporate governance guideAuditing corporate governance guide
Auditing corporate governance guideAstalapulosListestos
 
Risk Assessment For Internal Auditors
Risk Assessment For Internal AuditorsRisk Assessment For Internal Auditors
Risk Assessment For Internal Auditorsminkhollow
 
Internal controls
Internal controlsInternal controls
Internal controlsappan_k
 
Internal Control & Risk Management Framework
Internal Control & Risk Management FrameworkInternal Control & Risk Management Framework
Internal Control & Risk Management FrameworkTreasury Consulting LLP
 
Turning risk into opportunities
Turning risk into opportunitiesTurning risk into opportunities
Turning risk into opportunitiesManoj Agarwal
 

What's hot (17)

Key considerations for your internal audit plan
Key considerations for your internal audit planKey considerations for your internal audit plan
Key considerations for your internal audit plan
 
Internal audit test type guide
Internal audit test type guideInternal audit test type guide
Internal audit test type guide
 
Internal audit manual template
Internal audit manual templateInternal audit manual template
Internal audit manual template
 
Fraud detection guide
Fraud detection guideFraud detection guide
Fraud detection guide
 
Coso And Internal Audit
Coso And Internal AuditCoso And Internal Audit
Coso And Internal Audit
 
Performance measures guide
Performance measures guidePerformance measures guide
Performance measures guide
 
Internal control
Internal controlInternal control
Internal control
 
Internal controls & ai ss
Internal controls & ai ssInternal controls & ai ss
Internal controls & ai ss
 
Brief overview on Internal control (Audit)
Brief overview on Internal control (Audit)Brief overview on Internal control (Audit)
Brief overview on Internal control (Audit)
 
Auditing corporate governance guide
Auditing corporate governance guideAuditing corporate governance guide
Auditing corporate governance guide
 
Risk Assessment For Internal Auditors
Risk Assessment For Internal AuditorsRisk Assessment For Internal Auditors
Risk Assessment For Internal Auditors
 
Internal controls
Internal controlsInternal controls
Internal controls
 
Internal Control & Risk Management Framework
Internal Control & Risk Management FrameworkInternal Control & Risk Management Framework
Internal Control & Risk Management Framework
 
Turning risk into opportunities
Turning risk into opportunitiesTurning risk into opportunities
Turning risk into opportunities
 
Internal controls
Internal controlsInternal controls
Internal controls
 
Functional Audit
Functional AuditFunctional Audit
Functional Audit
 
Cisa domain 1
Cisa domain 1 Cisa domain 1
Cisa domain 1
 

Similar to Business continuity planning guide

Resus Advisory Profile - Resilience services Nov 15
Resus Advisory Profile - Resilience services Nov 15Resus Advisory Profile - Resilience services Nov 15
Resus Advisory Profile - Resilience services Nov 15David John Bollaert
 
IT Outsourcing Risks In Financial Sector
IT Outsourcing Risks In Financial SectorIT Outsourcing Risks In Financial Sector
IT Outsourcing Risks In Financial SectorUKNGroupLtd
 
Security & Risk Management
Security & Risk ManagementSecurity & Risk Management
Security & Risk ManagementAhmed Sayed-
 
Framing the business case service provider v1 2
Framing the business case    service provider  v1 2Framing the business case    service provider  v1 2
Framing the business case service provider v1 2pskoularikos
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop FinalBill Lisse
 
It and business risk alignment guide
It and business risk alignment guideIt and business risk alignment guide
It and business risk alignment guideAstalapulosListestos
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and TrendsMaclear LLC
 
Bpo risk management 2013
Bpo risk management 2013Bpo risk management 2013
Bpo risk management 2013Nidhi Gupta
 
Bpo risk management 2013
Bpo risk management 2013Bpo risk management 2013
Bpo risk management 2013Nidhi Gupta
 
Insurance application modernisation
Insurance application modernisationInsurance application modernisation
Insurance application modernisationBrian Maguire
 
Rob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcmRob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcmRobert Kloots
 
Lean dqm reporting
Lean dqm reportingLean dqm reporting
Lean dqm reportingdatatovalue
 
Get Smart About Technical Debt
Get Smart About Technical DebtGet Smart About Technical Debt
Get Smart About Technical DebtCAST
 
J-Knolla Presentation S1000D Users Forum 2015-W-Notes
J-Knolla Presentation S1000D Users Forum 2015-W-NotesJ-Knolla Presentation S1000D Users Forum 2015-W-Notes
J-Knolla Presentation S1000D Users Forum 2015-W-NotesJohn Knolla
 

Similar to Business continuity planning guide (20)

BiznetGio Presentation Business Continuity
BiznetGio Presentation Business ContinuityBiznetGio Presentation Business Continuity
BiznetGio Presentation Business Continuity
 
Resus Advisory Profile - Resilience services Nov 15
Resus Advisory Profile - Resilience services Nov 15Resus Advisory Profile - Resilience services Nov 15
Resus Advisory Profile - Resilience services Nov 15
 
IT Outsourcing Risks In Financial Sector
IT Outsourcing Risks In Financial SectorIT Outsourcing Risks In Financial Sector
IT Outsourcing Risks In Financial Sector
 
Security & Risk Management
Security & Risk ManagementSecurity & Risk Management
Security & Risk Management
 
Framing the business case service provider v1 2
Framing the business case    service provider  v1 2Framing the business case    service provider  v1 2
Framing the business case service provider v1 2
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop Final
 
Government and SOX Compliance for ERP Systems
Government and SOX Compliance for ERP SystemsGovernment and SOX Compliance for ERP Systems
Government and SOX Compliance for ERP Systems
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
It and business risk alignment guide
It and business risk alignment guideIt and business risk alignment guide
It and business risk alignment guide
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 
Bpo risk management 2013
Bpo risk management 2013Bpo risk management 2013
Bpo risk management 2013
 
Bpo risk management 2013
Bpo risk management 2013Bpo risk management 2013
Bpo risk management 2013
 
Bpo risk management 2013
Bpo risk management 2013Bpo risk management 2013
Bpo risk management 2013
 
Bpo risk management 2013
Bpo risk management 2013Bpo risk management 2013
Bpo risk management 2013
 
Bpo risk management 2013
Bpo risk management 2013Bpo risk management 2013
Bpo risk management 2013
 
Insurance application modernisation
Insurance application modernisationInsurance application modernisation
Insurance application modernisation
 
Rob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcmRob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcm
 
Lean dqm reporting
Lean dqm reportingLean dqm reporting
Lean dqm reporting
 
Get Smart About Technical Debt
Get Smart About Technical DebtGet Smart About Technical Debt
Get Smart About Technical Debt
 
J-Knolla Presentation S1000D Users Forum 2015-W-Notes
J-Knolla Presentation S1000D Users Forum 2015-W-NotesJ-Knolla Presentation S1000D Users Forum 2015-W-Notes
J-Knolla Presentation S1000D Users Forum 2015-W-Notes
 

Recently uploaded

Bhubaneswar Call Girls 💯Call Us 🔝 9777949614 🔝 💃 Top Class Russian Bhubaneswa...
Bhubaneswar Call Girls 💯Call Us 🔝 9777949614 🔝 💃 Top Class Russian Bhubaneswa...Bhubaneswar Call Girls 💯Call Us 🔝 9777949614 🔝 💃 Top Class Russian Bhubaneswa...
Bhubaneswar Call Girls 💯Call Us 🔝 9777949614 🔝 💃 Top Class Russian Bhubaneswa...jaspritkaur4u
 
Nehru Place Call Girls 💯Call Us 🔝 9xx000xx09 🔝 💃 Top Class Russian Ahmedabad ...
Nehru Place Call Girls 💯Call Us 🔝 9xx000xx09 🔝 💃 Top Class Russian Ahmedabad ...Nehru Place Call Girls 💯Call Us 🔝 9xx000xx09 🔝 💃 Top Class Russian Ahmedabad ...
Nehru Place Call Girls 💯Call Us 🔝 9xx000xx09 🔝 💃 Top Class Russian Ahmedabad ...Call Girls Mumbai
 
Top profile Call Girls In Rajahmundry [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In Rajahmundry [ 7014168258 ] Call Me For Genuine Mode...Top profile Call Girls In Rajahmundry [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In Rajahmundry [ 7014168258 ] Call Me For Genuine Mode...nirzagarg
 
Nangloi Jat Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nangloi Jat
Nangloi Jat Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nangloi JatNangloi Jat Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nangloi Jat
Nangloi Jat Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nangloi Jatmeghakumariji156
 
Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...
Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...
Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...gragfaguni
 
Nashik Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nashik
Nashik Escorts Service Girl ^ 9332606886, WhatsApp Anytime NashikNashik Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nashik
Nashik Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nashikmeghakumariji156
 
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一avy6anjnd
 
Kolkata Call Girls Bengal 👉👉 0000000000 Top Class Call Girl Service Available
Kolkata Call Girls Bengal 👉👉 0000000000 Top Class Call Girl Service AvailableKolkata Call Girls Bengal 👉👉 0000000000 Top Class Call Girl Service Available
Kolkata Call Girls Bengal 👉👉 0000000000 Top Class Call Girl Service AvailableCall Girls Mumbai
 
Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...
Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...
Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...vershagrag
 
Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...nirzagarg
 
Goa ❤CALL GIRL ❤CALL GIRLS IN Goa ESCORT SERVICE❤CALL GIRL
Goa ❤CALL GIRL  ❤CALL GIRLS IN Goa ESCORT SERVICE❤CALL GIRLGoa ❤CALL GIRL  ❤CALL GIRLS IN Goa ESCORT SERVICE❤CALL GIRL
Goa ❤CALL GIRL ❤CALL GIRLS IN Goa ESCORT SERVICE❤CALL GIRLCall Girls Mumbai
 
Muslim Call Girls Churchgate WhatsApp +91-9930687706, Best Service
Muslim Call Girls Churchgate WhatsApp +91-9930687706, Best ServiceMuslim Call Girls Churchgate WhatsApp +91-9930687706, Best Service
Muslim Call Girls Churchgate WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
FULL ENJOY 8377087607 Call Girls In Paharganj (DELHI NCr) Call Girl Service
FULL ENJOY 8377087607 Call Girls In Paharganj (DELHI NCr) Call Girl ServiceFULL ENJOY 8377087607 Call Girls In Paharganj (DELHI NCr) Call Girl Service
FULL ENJOY 8377087607 Call Girls In Paharganj (DELHI NCr) Call Girl Servicedollysharma2066
 
Bhubaneswar🌹Vip Call Girls Odisha❤Heer 9777949614 💟 Full Trusted CALL GIRLS I...
Bhubaneswar🌹Vip Call Girls Odisha❤Heer 9777949614 💟 Full Trusted CALL GIRLS I...Bhubaneswar🌹Vip Call Girls Odisha❤Heer 9777949614 💟 Full Trusted CALL GIRLS I...
Bhubaneswar🌹Vip Call Girls Odisha❤Heer 9777949614 💟 Full Trusted CALL GIRLS I...jabtakhaidam7
 
Stacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
Stacey+= Dubai Calls Girls O525547819 Call Girls In DubaiStacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
Stacey+= Dubai Calls Girls O525547819 Call Girls In Dubaikojalkojal131
 
Kolkata🌹Vip Call Girls Bengal ❤Heer 0000000000💟 Full Trusted CALL GIRLS IN Ko...
Kolkata🌹Vip Call Girls Bengal ❤Heer 0000000000💟 Full Trusted CALL GIRLS IN Ko...Kolkata🌹Vip Call Girls Bengal ❤Heer 0000000000💟 Full Trusted CALL GIRLS IN Ko...
Kolkata🌹Vip Call Girls Bengal ❤Heer 0000000000💟 Full Trusted CALL GIRLS IN Ko...Call Girls Mumbai
 
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...gajnagarg
 
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样wsppdmt
 
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...gajnagarg
 

Recently uploaded (20)

Bhubaneswar Call Girls 💯Call Us 🔝 9777949614 🔝 💃 Top Class Russian Bhubaneswa...
Bhubaneswar Call Girls 💯Call Us 🔝 9777949614 🔝 💃 Top Class Russian Bhubaneswa...Bhubaneswar Call Girls 💯Call Us 🔝 9777949614 🔝 💃 Top Class Russian Bhubaneswa...
Bhubaneswar Call Girls 💯Call Us 🔝 9777949614 🔝 💃 Top Class Russian Bhubaneswa...
 
Nehru Place Call Girls 💯Call Us 🔝 9xx000xx09 🔝 💃 Top Class Russian Ahmedabad ...
Nehru Place Call Girls 💯Call Us 🔝 9xx000xx09 🔝 💃 Top Class Russian Ahmedabad ...Nehru Place Call Girls 💯Call Us 🔝 9xx000xx09 🔝 💃 Top Class Russian Ahmedabad ...
Nehru Place Call Girls 💯Call Us 🔝 9xx000xx09 🔝 💃 Top Class Russian Ahmedabad ...
 
Top profile Call Girls In Rajahmundry [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In Rajahmundry [ 7014168258 ] Call Me For Genuine Mode...Top profile Call Girls In Rajahmundry [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In Rajahmundry [ 7014168258 ] Call Me For Genuine Mode...
 
Nangloi Jat Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nangloi Jat
Nangloi Jat Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nangloi JatNangloi Jat Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nangloi Jat
Nangloi Jat Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nangloi Jat
 
Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...
Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...
Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...
 
Nashik Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nashik
Nashik Escorts Service Girl ^ 9332606886, WhatsApp Anytime NashikNashik Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nashik
Nashik Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nashik
 
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
 
Kolkata Call Girls Bengal 👉👉 0000000000 Top Class Call Girl Service Available
Kolkata Call Girls Bengal 👉👉 0000000000 Top Class Call Girl Service AvailableKolkata Call Girls Bengal 👉👉 0000000000 Top Class Call Girl Service Available
Kolkata Call Girls Bengal 👉👉 0000000000 Top Class Call Girl Service Available
 
Obat Penggugur Kandungan Di Apotek Klinik Banyuwangi +6287776558899
Obat Penggugur Kandungan Di Apotek Klinik Banyuwangi +6287776558899Obat Penggugur Kandungan Di Apotek Klinik Banyuwangi +6287776558899
Obat Penggugur Kandungan Di Apotek Klinik Banyuwangi +6287776558899
 
Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...
Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...
Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...
 
Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...
 
Goa ❤CALL GIRL ❤CALL GIRLS IN Goa ESCORT SERVICE❤CALL GIRL
Goa ❤CALL GIRL  ❤CALL GIRLS IN Goa ESCORT SERVICE❤CALL GIRLGoa ❤CALL GIRL  ❤CALL GIRLS IN Goa ESCORT SERVICE❤CALL GIRL
Goa ❤CALL GIRL ❤CALL GIRLS IN Goa ESCORT SERVICE❤CALL GIRL
 
Muslim Call Girls Churchgate WhatsApp +91-9930687706, Best Service
Muslim Call Girls Churchgate WhatsApp +91-9930687706, Best ServiceMuslim Call Girls Churchgate WhatsApp +91-9930687706, Best Service
Muslim Call Girls Churchgate WhatsApp +91-9930687706, Best Service
 
FULL ENJOY 8377087607 Call Girls In Paharganj (DELHI NCr) Call Girl Service
FULL ENJOY 8377087607 Call Girls In Paharganj (DELHI NCr) Call Girl ServiceFULL ENJOY 8377087607 Call Girls In Paharganj (DELHI NCr) Call Girl Service
FULL ENJOY 8377087607 Call Girls In Paharganj (DELHI NCr) Call Girl Service
 
Bhubaneswar🌹Vip Call Girls Odisha❤Heer 9777949614 💟 Full Trusted CALL GIRLS I...
Bhubaneswar🌹Vip Call Girls Odisha❤Heer 9777949614 💟 Full Trusted CALL GIRLS I...Bhubaneswar🌹Vip Call Girls Odisha❤Heer 9777949614 💟 Full Trusted CALL GIRLS I...
Bhubaneswar🌹Vip Call Girls Odisha❤Heer 9777949614 💟 Full Trusted CALL GIRLS I...
 
Stacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
Stacey+= Dubai Calls Girls O525547819 Call Girls In DubaiStacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
Stacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
 
Kolkata🌹Vip Call Girls Bengal ❤Heer 0000000000💟 Full Trusted CALL GIRLS IN Ko...
Kolkata🌹Vip Call Girls Bengal ❤Heer 0000000000💟 Full Trusted CALL GIRLS IN Ko...Kolkata🌹Vip Call Girls Bengal ❤Heer 0000000000💟 Full Trusted CALL GIRLS IN Ko...
Kolkata🌹Vip Call Girls Bengal ❤Heer 0000000000💟 Full Trusted CALL GIRLS IN Ko...
 
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
 
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
 
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
 

Business continuity planning guide

  • 2. AGENDA • Introduction • Objectives of BCP • Approaches to BCP • Dimensions of Scope • Entry Points 2 • Q&A
  • 3. INTRODUCTION So…you’ve decided to embark on a business continuity planning (BCP) project …but where do you start? • Define the objectives • Determine the dimensions of scope • Select an appropriate approach • Proceed from an entry point 3
  • 4. OBJECTIVES (1/2) Satisfy audit or regulatory requirements 1 Rebuild the infrastructure 2 Resumption of business activities 3 Continuity in customer service 4 Four possible objectives of BCP: 4
  • 5. OBJECTIVES (2/2) 5 Audit or Regulatory Requirements • If your focus is on: – Passing an audit or getting points cleared – Minimizing costs • Then your objective is to satisfy audit or regulatory requirements. Rebuild the Infrastructure • If your focus is on: – Alternative facilities and sites – Solutions to minimize downtime of key infrastructure and systems • Then your objective is to rebuild the infrastructure. Resumption of Business Activities • If your focus is on: – Setting up an organization and the required facilities to enable key staff to resume their activities • Then your objective is the resumption of business activities. Continuity in Customer Service • If your focus is on: – Defining what level of customer service must be maintained throughout a disaster – What is required to achieve that level of customer service • Then your objective is to ensure continuity in customer service at an acceptable level.
  • 6. APPROACHES TO BCP 6 Approaches to BCP based on the objectives: Objective Approach Satisfy audit or regulatory requirements Tick-box approach Rebuild the infrastructure Infrastructure approach Resumption of business activities Gradual/subplans approach Continuity in customer service Business approach (holistic)
  • 7. SCOPE 7 • Event Interrupting Operations – Asset protection Protection of assets (e.g., people, building, etc.) – BCP Preparation of critical elements for business continuity • Enterprise-wide versus IT… ...be clear on the scope of your BCP project
  • 8. 8 DIMENSIONS OF SCOPE Business Network Control Room IT DRP Network Resilience Server Mirroring Dealing Room Office Relocation Equipment Failures Infrastructure Business Interruption Risks (BIR) Infrastructure Risk Long-Term Business Viability Brand Image Client Satisfaction Capacity Regulatory
  • 9. INFRASTRUCTURE 9 • …the identification and protection of critical (IT) infrastructure required to maintain an acceptable level of business, • ...to ensure the survival of the organization in times of business disruption. • Critical infrastructure can include: – Mainframe – Networks – Applications – PCs and desktops – Manufacturing infrastructure – Logistical infrastructure – Office locations
  • 10. BUSINESS 10 • …the identification and protection of critical business processes required to maintain an acceptable level of business, • ...to ensure the survival of the organization in times of business disruption. • Critical business processes can include – Manufacturing – Sales/order entry – Payroll – Dealing room activities – Delivery – Client communication – Accounting and finance
  • 11. BUSINESS INTERRUPTION RISK 11 • …the identification and protection against business risks resulting from a business interruption jeopardizing • ... the survival of the organization in times of business disruption.
  • 12. ENTRY POINTS 12 There are four possible entry points depending on the drivers of the approach. If your approach is… Then your entry point is... Event driven Evaluate threats Business risk driven Assess risks from interruptions Business driven Analyze critical processes Applications or systems driven Dependency on (IT) infrastructure
  • 13. THREATS 13 Classification of threats according to the type of event: • Acts of nature – hurricane, flood, earthquake, etc. • External man-made events – terrorism, evacuation, security intrusion, etc. • Internal unintentional events – accidental loss of files, computer failure, etc. • Internal intentional events – strike, sabotage, data deletion, etc.
  • 14. RISKS 14 Competitor Catastrophic Loss Sensitivity Sovereign/Political Shareholder Relations Legal Capital Availability Industry Financial Markets Information For Decision Making Risk Operational Pricing Contract Commitment Measurement Alignment Completeness and Accuracy Regulatory Reporting Financial Budget and Planning Completeness and Accuracy Accounting Information Financial Reporting Evaluation Taxation Pension Fund Investment Evaluation Regulatory Reporting Strategic Environmental Scan Business Portfolio Valuation Measurement Organization Structure Resource Allocation Planning Life Cycle Operations Risk Customer Satisfaction Human Resources Product Development Efficiency Capacity Performance Gap Cycle Time Sourcing Commodity Pricing Obsolescence Shrinkage Compliance Business Interruption Product Service Failure Environmental Health & Safety Trademark/Brand Name Erosion Empowerment Risk Leadership Authority Limit Performance Incentives Communications Information Processing/Technology Risk Access Integrity Relevance Availability Integrity Risk Management Fraud Employee Fraud Illegal Acts Unauthorized Use Reputation Financial Risk Currency Interest Rate Liquidity Cash Transfer/Velocity Derivative Settlement Reinvestment/Rollover Credit Collateral Counterparty Process Risk Environment Risk Business Risk Model
  • 15. 15 ENTRY POINT: INFRASTRUCTURE Business Network Control Room IT DRP Network Resilience Server Mirroring Dealing Room Office Relocation Equipment Failures Infrastructure Business Interruption Risks (BIR) • Traditional approach. • Very often limited to IT, then extended to "departmental" infrastructure or office infrastructure. • Very often the business perspective is used to assess criticality of infrastructure elements, and to justify the cost (business impact analysis). • The risk scope is limited to infrastructure risks through analysis of threats (potential events). Infrastructure Risk Long-Term Business Viability Brand Image Client Satisfaction Capacity Regulatory
  • 16. 16 ENTRY POINT: BUSINESS Business Infrastructure Business Interruption Risks (BIR) Network Control Room IT DRP Network Resilience Server Mirroring Dealing Room Office Relocation Equipment Failures • Top-down approach. • Starting from a top-down analysis of the critical business domains or processes. • For the critical business processes, assess the dependencies and criticality. • Often, the business interruption risk dimension is included into the business impact assessment, although not always made explicit or limited to the obvious business interruption risks. Infrastructure Risk Long-Term Business Viability Brand Image Client Satisfaction Capacity Regulatory
  • 17. 17 ENTRY POINT: BUSINESS RISKS Business Infrastructure Business Interruption Risks (BIR) 1. 2. Network Control Room IT DRP Network Resilience Server Mirroring Dealing Room Office Relocation Equipment Failures • Entering from looking at the business risks created by a business interruption. • Allows to include more than only the operational impact, e.g., product quality, brand image, health & safety, cash flow, etc. • To manage these risks, next to BCP, other actions may be included, e.g., asset protection, supply chain management, crisis management, media management, etc. • Here we can provide the best added value. Infrastructure Risk Long-Term Business Viability Brand Image Client Satisfaction Capacity Regulatory
  • 18. RISKS The “five As” of risk management : Assess Risk 1 Accept or reject risk 2 Avoid risk, transfer risk or reduce risk to an acceptable level 3 Analyze performance gaps 4 Act to improve 5 18
  • 19. Business Processes Information Flows Infrastructure & Resources 19 Identify key dependencies and vulnerabilities within the business organization, top-down: • What does the company depend on to be successful? • What are the key business processes driving the business? • What are the flows within these business processes? • What are the vulnerabilities and dependencies within these flows and business operations? BUSINESS PROCESSES Key Business Drivers
  • 20. (IT) INFRASTRUCTURE 20 Identifying recovery solutions Assessing the possible threats Selecting the critical infrastructure Analyzing the potential business impact Obtaining an inventory of (IT) infrastructure Achieved by
  • 21. BCP METHODOLOGIES 21 Two main BCP methodologies: Entry Points BCP Methodology Infrastructure Infrastructure-oriented, threat-based Threat Business Business-oriented, risk-based Risk