SlideShare a Scribd company logo
1 of 7
Download to read offline
WHO IS
RESPONSIBLE FOR WHAT
IN AN IT DISASTER ?
If you’ve been through a disaster,
you know. It’s the worst day in an IT
professional’s career. There are huge
demands on the team coordinating
the recovery.
Who is responsible for what?
IT
Admin team
IT
Manager
Department
Heads
IT
Director /CIO
CEO
1
IT Admin Team
Critical internal
communicator
IT Admins play a significant
role in the execution of the DR
plan.
Their job is to carry out the
instructions in the DR runbooks
and they are responsible for
passing accurate information
up the chain of command.
IT Manager
On the ground
figurehead
IT Managers are the lynchpin
of disaster events. They must
co-ordinate internal teams and
external service providers,
allocating resource to diagnostic
and recovery work.
They must understand the
technology dependencies
across all departments and
business functions.
2
Department Heads
Business unit
champion
Individual department heads
are responsible for ensuring
their teams and the systems
they use are accurately
represented in a crisis. They
are the conduit from the Crisis
Management Team to their
department.
3
IT Director /CIO
Business and IT
Ambassador
The most senior IT staff are IT’s
representative to the Board. They
need to communicate accurate
information about what systems
and services are affected and what
the impact is on the business.
Their role is also to make the most
difficult decisions. Should you
invoke DR? Do you need to take-
down systems to limit the spread
of a cyber attack?
4
CEO
The face of the
organisation
The CEO is ultimately
responsible for the survivability
of the business and protecting
its reputation.
They are also the figurehead
and public-face of the organi-
sation throughout the crisis.
5

More Related Content

Similar to Who's responsible for what in a crisis

Data Management for Market Risk - PRMIA webinar presentation
Data Management for Market Risk - PRMIA webinar presentationData Management for Market Risk - PRMIA webinar presentation
Data Management for Market Risk - PRMIA webinar presentationBrian Sentance
 
Disaster Recovery Policy .docx
Disaster Recovery Policy .docxDisaster Recovery Policy .docx
Disaster Recovery Policy .docxCharliePhan
 
Assingment 1 fundementals of it
Assingment 1 fundementals of itAssingment 1 fundementals of it
Assingment 1 fundementals of itAldi Luthfie
 
2. information technology management a critical analysis of managerial impedi...
2. information technology management a critical analysis of managerial impedi...2. information technology management a critical analysis of managerial impedi...
2. information technology management a critical analysis of managerial impedi...Alexander Decker
 
11.0002www.iiste.org call for paper. information technology management-a crit...
11.0002www.iiste.org call for paper. information technology management-a crit...11.0002www.iiste.org call for paper. information technology management-a crit...
11.0002www.iiste.org call for paper. information technology management-a crit...Alexander Decker
 
Assingment 1 fundementals of it 1
Assingment 1 fundementals of it 1Assingment 1 fundementals of it 1
Assingment 1 fundementals of it 1Aldi Luthfie
 
Essay On Women In Information Technology
Essay On Women In Information TechnologyEssay On Women In Information Technology
Essay On Women In Information TechnologyJessica Cannella
 
The Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITThe Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITInsight
 
IT_Crisis_Problem_Management_Whitepaper
IT_Crisis_Problem_Management_WhitepaperIT_Crisis_Problem_Management_Whitepaper
IT_Crisis_Problem_Management_WhitepaperChuck Boutcher
 
Network Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster recNetwork Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster recrosu555
 
Contingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMContingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMWajahat Ali Khan
 
I+Diagnostic Overview
I+Diagnostic OverviewI+Diagnostic Overview
I+Diagnostic OverviewRickMark
 
5 Keys to Mastering Today's Communication Domain
5 Keys to Mastering Today's Communication Domain5 Keys to Mastering Today's Communication Domain
5 Keys to Mastering Today's Communication DomainAvaya Inc.
 
Mis and it dependency
Mis and it dependencyMis and it dependency
Mis and it dependencyanijitu
 
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
Satori Whitepaper: Threat Intelligence  - a path to taming digital threatsSatori Whitepaper: Threat Intelligence  - a path to taming digital threats
Satori Whitepaper: Threat Intelligence - a path to taming digital threatsDean Evans
 

Similar to Who's responsible for what in a crisis (20)

Mis1.ppt
Mis1.pptMis1.ppt
Mis1.ppt
 
Data Management for Market Risk - PRMIA webinar presentation
Data Management for Market Risk - PRMIA webinar presentationData Management for Market Risk - PRMIA webinar presentation
Data Management for Market Risk - PRMIA webinar presentation
 
Disaster Recovery Policy .docx
Disaster Recovery Policy .docxDisaster Recovery Policy .docx
Disaster Recovery Policy .docx
 
Assingment 1 fundementals of it
Assingment 1 fundementals of itAssingment 1 fundementals of it
Assingment 1 fundementals of it
 
2. information technology management a critical analysis of managerial impedi...
2. information technology management a critical analysis of managerial impedi...2. information technology management a critical analysis of managerial impedi...
2. information technology management a critical analysis of managerial impedi...
 
11.0002www.iiste.org call for paper. information technology management-a crit...
11.0002www.iiste.org call for paper. information technology management-a crit...11.0002www.iiste.org call for paper. information technology management-a crit...
11.0002www.iiste.org call for paper. information technology management-a crit...
 
Assingment 1 fundementals of it 1
Assingment 1 fundementals of it 1Assingment 1 fundementals of it 1
Assingment 1 fundementals of it 1
 
Essay On Women In Information Technology
Essay On Women In Information TechnologyEssay On Women In Information Technology
Essay On Women In Information Technology
 
The Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITThe Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector IT
 
IT_Crisis_Problem_Management_Whitepaper
IT_Crisis_Problem_Management_WhitepaperIT_Crisis_Problem_Management_Whitepaper
IT_Crisis_Problem_Management_Whitepaper
 
Crisis management
Crisis managementCrisis management
Crisis management
 
Network Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster recNetwork Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster rec
 
Contingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMContingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATM
 
Resume
ResumeResume
Resume
 
I+Diagnostic Overview
I+Diagnostic OverviewI+Diagnostic Overview
I+Diagnostic Overview
 
5 Keys to Mastering Today's Communication Domain
5 Keys to Mastering Today's Communication Domain5 Keys to Mastering Today's Communication Domain
5 Keys to Mastering Today's Communication Domain
 
S36169184
S36169184S36169184
S36169184
 
Mis and it dependency
Mis and it dependencyMis and it dependency
Mis and it dependency
 
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
Satori Whitepaper: Threat Intelligence  - a path to taming digital threatsSatori Whitepaper: Threat Intelligence  - a path to taming digital threats
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
 
Ict security essay
Ict security essay Ict security essay
Ict security essay
 

More from Databarracks

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanHow to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanDatabarracks
 
Lessons from 100+ ransomware recoveries
Lessons from 100+ ransomware recoveriesLessons from 100+ ransomware recoveries
Lessons from 100+ ransomware recoveriesDatabarracks
 
How to write an IT Disaster Recovery Plan
How to write an IT Disaster Recovery PlanHow to write an IT Disaster Recovery Plan
How to write an IT Disaster Recovery PlanDatabarracks
 
Cyber Incident Response Plan
Cyber Incident Response PlanCyber Incident Response Plan
Cyber Incident Response PlanDatabarracks
 
How to communicate in a crisis
How to communicate in a crisisHow to communicate in a crisis
How to communicate in a crisisDatabarracks
 
How to protect backups from ransomware
How to protect backups from ransomwareHow to protect backups from ransomware
How to protect backups from ransomwareDatabarracks
 
Requirements for cyber insurance
Requirements for cyber insuranceRequirements for cyber insurance
Requirements for cyber insuranceDatabarracks
 
How to make your supply chain resilient
How to make your supply chain resilientHow to make your supply chain resilient
How to make your supply chain resilientDatabarracks
 
How to recover from ransomware lessons from real recoveries
How to recover from ransomware   lessons from real recoveriesHow to recover from ransomware   lessons from real recoveries
How to recover from ransomware lessons from real recoveriesDatabarracks
 
How to decommission a data centre
How to decommission a data centreHow to decommission a data centre
How to decommission a data centreDatabarracks
 
Zerto in azure technical deep dive
Zerto in azure   technical deep diveZerto in azure   technical deep dive
Zerto in azure technical deep diveDatabarracks
 
How to know when combined backup and replication is for you
How to know when combined backup and replication is for youHow to know when combined backup and replication is for you
How to know when combined backup and replication is for youDatabarracks
 
How to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanHow to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanDatabarracks
 
Introducing rubrik a new approach to data protection
Introducing rubrik   a new approach to data protectionIntroducing rubrik   a new approach to data protection
Introducing rubrik a new approach to data protectionDatabarracks
 
How to invoke Disaster Recovery
How to invoke Disaster RecoveryHow to invoke Disaster Recovery
How to invoke Disaster RecoveryDatabarracks
 
How to setup disaster recovery
How to setup disaster recoveryHow to setup disaster recovery
How to setup disaster recoveryDatabarracks
 
DRaaS to Azure with Zerto
DRaaS to Azure with ZertoDRaaS to Azure with Zerto
DRaaS to Azure with ZertoDatabarracks
 
The Databarracks Continuity Toolshed: Free tools for better recoveries
The Databarracks Continuity Toolshed: Free tools for better recoveriesThe Databarracks Continuity Toolshed: Free tools for better recoveries
The Databarracks Continuity Toolshed: Free tools for better recoveriesDatabarracks
 
Webinar how to write a business continuity plan
Webinar how to write a business continuity planWebinar how to write a business continuity plan
Webinar how to write a business continuity planDatabarracks
 

More from Databarracks (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanHow to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response Plan
 
Lessons from 100+ ransomware recoveries
Lessons from 100+ ransomware recoveriesLessons from 100+ ransomware recoveries
Lessons from 100+ ransomware recoveries
 
How to write an IT Disaster Recovery Plan
How to write an IT Disaster Recovery PlanHow to write an IT Disaster Recovery Plan
How to write an IT Disaster Recovery Plan
 
Cyber Incident Response Plan
Cyber Incident Response PlanCyber Incident Response Plan
Cyber Incident Response Plan
 
How to communicate in a crisis
How to communicate in a crisisHow to communicate in a crisis
How to communicate in a crisis
 
How to protect backups from ransomware
How to protect backups from ransomwareHow to protect backups from ransomware
How to protect backups from ransomware
 
Requirements for cyber insurance
Requirements for cyber insuranceRequirements for cyber insurance
Requirements for cyber insurance
 
How to make your supply chain resilient
How to make your supply chain resilientHow to make your supply chain resilient
How to make your supply chain resilient
 
How to recover from ransomware lessons from real recoveries
How to recover from ransomware   lessons from real recoveriesHow to recover from ransomware   lessons from real recoveries
How to recover from ransomware lessons from real recoveries
 
How to decommission a data centre
How to decommission a data centreHow to decommission a data centre
How to decommission a data centre
 
Zerto in azure technical deep dive
Zerto in azure   technical deep diveZerto in azure   technical deep dive
Zerto in azure technical deep dive
 
How to know when combined backup and replication is for you
How to know when combined backup and replication is for youHow to know when combined backup and replication is for you
How to know when combined backup and replication is for you
 
How to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanHow to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response Plan
 
Introducing rubrik a new approach to data protection
Introducing rubrik   a new approach to data protectionIntroducing rubrik   a new approach to data protection
Introducing rubrik a new approach to data protection
 
How to invoke Disaster Recovery
How to invoke Disaster RecoveryHow to invoke Disaster Recovery
How to invoke Disaster Recovery
 
How to setup disaster recovery
How to setup disaster recoveryHow to setup disaster recovery
How to setup disaster recovery
 
DRaaS to Azure with Zerto
DRaaS to Azure with ZertoDRaaS to Azure with Zerto
DRaaS to Azure with Zerto
 
The Databarracks Continuity Toolshed: Free tools for better recoveries
The Databarracks Continuity Toolshed: Free tools for better recoveriesThe Databarracks Continuity Toolshed: Free tools for better recoveries
The Databarracks Continuity Toolshed: Free tools for better recoveries
 
Webinar how to write a business continuity plan
Webinar how to write a business continuity planWebinar how to write a business continuity plan
Webinar how to write a business continuity plan
 

Recently uploaded

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Who's responsible for what in a crisis

  • 1. WHO IS RESPONSIBLE FOR WHAT IN AN IT DISASTER ?
  • 2. If you’ve been through a disaster, you know. It’s the worst day in an IT professional’s career. There are huge demands on the team coordinating the recovery. Who is responsible for what? IT Admin team IT Manager Department Heads IT Director /CIO CEO
  • 3. 1 IT Admin Team Critical internal communicator IT Admins play a significant role in the execution of the DR plan. Their job is to carry out the instructions in the DR runbooks and they are responsible for passing accurate information up the chain of command.
  • 4. IT Manager On the ground figurehead IT Managers are the lynchpin of disaster events. They must co-ordinate internal teams and external service providers, allocating resource to diagnostic and recovery work. They must understand the technology dependencies across all departments and business functions. 2
  • 5. Department Heads Business unit champion Individual department heads are responsible for ensuring their teams and the systems they use are accurately represented in a crisis. They are the conduit from the Crisis Management Team to their department. 3
  • 6. IT Director /CIO Business and IT Ambassador The most senior IT staff are IT’s representative to the Board. They need to communicate accurate information about what systems and services are affected and what the impact is on the business. Their role is also to make the most difficult decisions. Should you invoke DR? Do you need to take- down systems to limit the spread of a cyber attack? 4
  • 7. CEO The face of the organisation The CEO is ultimately responsible for the survivability of the business and protecting its reputation. They are also the figurehead and public-face of the organi- sation throughout the crisis. 5