SlideShare a Scribd company logo
1 of 28
Barbro Thöyrä
16-09-15 2
General information
- About me
- Content of this webinar
- Duration of the webinar
- Questions
16-09-15 3
Disaster Recovery Problem Statement
• An internal or external event interrupts one or more of our
business processes
• Time -- the length of the interruption -- causes the
situation to become a disaster
16-09-15 4
Disaster Recovery Assumptions
• Major catastrophes, Not Daily Operational Problems
• Will Not Produce a “Business as Usual” environment
• The organization will Still Lose time and money in a
disaster
16-09-15 5
• Move an operational department, with NO WARNING!
and
• Recover Time-Sensitive business operations
– Without notice
– At another (remote?) location/facility
– With less capacity & capability
– Using only data stored Off-Site
– Within a designated recovery time frame
– Without some key personnel
The Disaster Recovery Challenge
16-09-15 6
Disaster
Emergency response
- immediate recovery
Recovery - critical
functions
Return
Home
Business Relocation
long term recovery in
new or semi-
permanent location
Hours Days Weeks
16-09-15 7
- Identify recovery strategies for the mission critical operations
using the BIA and Risk Evaluation
- Recommend strategies to meet the recovery objectives
identified in the BIA
- Perform a cost benefit analysis on the recommended strategies
Risk Assessment
Resources
vul. to risks
1. Identifying risks
2. Risk analysis
3. Risk judgement
List of critical
resources
16-09-15
Risk Category Asset/Element VulnerabilityReal Probability Controls Category
Power outage Critical applications H H M 1
Power outage Information prov. by computers H H M 1
Power outage Critical information/data H H M 1
Power outage Computer facilities H H M 1
Power outage Terminals H H M 1
Power outage Internal links (LAN,WAN) H H M 1
Power outage Documents/conf. information H H M 1
Power outage Operating systems H H M 1
Power outage Gateways H H M 1
Fire Information prov. by computers H H M 1
Fire Critical information/data H H M 1
Fire Computer facilities H H M 1
Fire Terminals H H M 1
Fire Internal links (LAN,WAN) H H M 1
Fire Documents/conf. information H H M 1
Fire Operating systems H H M 1
Fire Gateways H H M 1
Fire Maintenance activities H H M 1
Software failure Daily operations H M M 1
Software failure Customer care H M M 1
Hacker Information prov. by computers H M M 1
Fire Failure indicators H L S 2
Fire Air condition H L S 2
Cable cut to switch Daily operation H L S 2
Cable cut to switch Customer care H L S 2
Major accidents Critical applications H L S 2
Major accidents Information prov. by computers H L S 2
Major accidents Critical information/data H L S 2
16-09-15 10
Operational Impacts of Outage
Customer Impacts of Outage
Financial Impacts of Outage
Legal/Regulatory Impacts of Outage
Other Impacts of Outage
Recovery Time Objectives
Business Unit Recovery Priorities
Recovery Requirements/Resources
Vital Records
Establish
Determine
Business Impact Analysis (BIA)
16-09-15 11
0
5,000,000
10,000,000
15,000,000
20,000,000
25,000,000
30,000,000
35,000,000
< Day
1
Day 1 Day 2 Day 3 Day 4 Day 5 Week 1 Week 2 Week 3 Week 4 > Week
4
USD
Cumulative financial impacts, example
Lost Sales
16-09-15 12
“.....is the time between the point of disruption and the
point at which most critical systems must be
operational AND updated to current status.”
time
Recovery
of
Operations
Critical
Systems
Operational
with Current &
Accurate Data
Recovery Time Frame
The time within which Business Processes must
be recovered at acceptable levels of operational
capability to minimize the impact of an outage
Point of
Disruption
Recovery Time Frame (RTO)
16-09-15 13
Some parameters for estimation of RTO:
• Complexity of recovery
• Impacts on customers
• Financial impacts
• Impacts on operations, how long can a site/node be idle
• Any recovery strategies in place?
• Any work around procedures?
• The amount of back-logg in case of an outage (RPO)
Recovery Time Frame (RTO)
16-09-15 14
Major points to consider :
• Recovery of critical business functions
• Business recovery requirement priorities
• Minimization of losses
• Time frame for the recovery – RTO
• Service level desired within the RTO (100% not realistic)
• Stepwise recovery
• Recovery resources
• Cost/Benefit of Recovery solution
• Requirements of the Recovery solution(s)
16-09-15 15
Recovery
time
Recovery
investment
$
Recovery
cost
$
Continuous
process
Hot site
Mobile
site
Cold site
Manual
procedures
Do nothing
Disaster Recovery strategies
Redundant
Hot Site
Mobile Site
Cold Site
Withdraw service
Do nothing
16-09-15 16
Recovery Strategies
Service degradation:
• No recovery strategy
• Manual procedures – work around
• Reduce service response
• Withdrawal of service
• Staff working from home
16-09-15 17
Recovery strategies
Internal/extrenal strategies:
1. Internal back-up facilities
2. Hot site
3. Warm site
4. Mobil site
5. Cold/shell site
6. Reciprocal agreements
7. Third party service vendor
8. Cloud
9. Investigate usage of other internal facilities
16-09-15 18
Develop vital record and work in
progress recovery strategies
16-09-15 19
Considerations when choosing recovery location:
 Threats
 Access control
 Facility security
 Dedicated areas
 Environmental control
 CC (EOC)
 Restricted facilities
 Others
16-09-15 20
 Natural hazards
 Weather changes
 Industrial and commercial hazards
 Accessibility
 Alternate routes
 Shared premises
 Public utilities
 Cabling infrastructure
 Risk mitigation
Threats
16-09-15 21
Access control:
- Selective restriction of entry and exit of users into or out of the area
- Personal security categoies
- Security zones
Facility security :
- Physical building
- Exterior/interior
- Alarm system
Dedicated areas:
- Recovery room
- Assambly areas
16-09-15 22
Environmental control:
- Temperature
- Ventilation
- Humidity
- Vibration and noise
EOC:
Restricted facilities:
- Authorized access for designated
purposes
Others:
• Telecommunication
• Power supply
• Fire protction
• Cabling
• Rest areas
• Parking areas
• Medical care
• Food and drink
• Testing
• Life Cycle
• Vendors
• Outsoursing
16-09-15 23
Compare internal/external solutions
a. Advantages
b. Disadvantages
c. Costs (startup, maintenance
and execution)
e. Mitigation capability and control options
f. Ability to meet defined RTO and RPO
16-09-15 24
Prerequisites for mobile sites:
• Transmission connection points at each site
• Possible parking places are at the IT center
• Power supply (generators)
• Off-site storage and suitable back-up regime
16-09-15 25
100%
West
Middle
East
North
10 %
18 %
27 %
36 %
Transport
4 hours
West&East
Transport
10 hours
Mid&North
• Part 1,2,3,4 of transmission up
• SDH backbone
• Far end transmission up
• Start the switches
• RBS reloaded,
• Switches loaded, HLR loaded
• Test, 8hours
Activate teams
2 hours
12,12,12,12
hours
6 hours
32 44 50 62 Hours
‘Cold Site’
For 5 HLR and 5 SCPs
HLR-redundancy (0 hours)
or
‘Warm site’ HLR (3 hours)
or
Mobile HLR (6 hours at site)
Enough capacity in
other GMSCs in the network
16-09-15 26
Activation and Deactivation
Response plan
Recovery plan
Restoration plan
16-09-15 27
Exercise/test
If you do not exercise your plan you do not
have any…..
Only 30% of the companies exercise their
plans…...
Plan for the worst,
exercise for the rest!
16-09-15 28
...in case of
a disaster?

More Related Content

Similar to PECB Webinar: Implementing Effective Disaster Recovery Strategies – ISO/IEC 24762

Disaster Recovery vs. Business Continuity
Disaster Recovery vs. Business ContinuityDisaster Recovery vs. Business Continuity
Disaster Recovery vs. Business ContinuityRapidScale
 
Engineering plant facilities 12 mechanics building preventive maintenance and...
Engineering plant facilities 12 mechanics building preventive maintenance and...Engineering plant facilities 12 mechanics building preventive maintenance and...
Engineering plant facilities 12 mechanics building preventive maintenance and...Luis Cabrera
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationAndrew Miller
 
European Data Centre Standards
European Data Centre StandardsEuropean Data Centre Standards
European Data Centre StandardsICT FOOTPRINT .eu
 
Stork Presentation on Migration (Willem Hazenberg)
Stork Presentation on Migration (Willem Hazenberg)Stork Presentation on Migration (Willem Hazenberg)
Stork Presentation on Migration (Willem Hazenberg)ARC Advisory Group
 
Business Continuity Planning and Disaster Recovery Plannin.docx
Business Continuity Planning and Disaster Recovery Plannin.docxBusiness Continuity Planning and Disaster Recovery Plannin.docx
Business Continuity Planning and Disaster Recovery Plannin.docxfelicidaddinwoodie
 
SI_050212_Olsen_Alknecht_PGE_CBMproject
SI_050212_Olsen_Alknecht_PGE_CBMprojectSI_050212_Olsen_Alknecht_PGE_CBMproject
SI_050212_Olsen_Alknecht_PGE_CBMprojectJerry Olson
 
Introduction to energy audit part 3
Introduction to energy audit part 3Introduction to energy audit part 3
Introduction to energy audit part 3ZAINI ABDUL WAHAB
 
Business Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesBusiness Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesAlan McSweeney
 
Delta Telecom O&amp;m presentation
Delta Telecom O&amp;m presentationDelta Telecom O&amp;m presentation
Delta Telecom O&amp;m presentationengramjadislam78
 
The Connected Building Transformation
The Connected Building TransformationThe Connected Building Transformation
The Connected Building TransformationTrane Commercial
 
Transition to online AMS reduces maintenance costs and improves operations
Transition to online AMS reduces maintenance costs and improves operationsTransition to online AMS reduces maintenance costs and improves operations
Transition to online AMS reduces maintenance costs and improves operationsEmerson Exchange
 
M-Reporting introduction and faq pharma 20140316
M-Reporting introduction and faq pharma 20140316M-Reporting introduction and faq pharma 20140316
M-Reporting introduction and faq pharma 20140316sabbir456
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentEagle Technologies
 

Similar to PECB Webinar: Implementing Effective Disaster Recovery Strategies – ISO/IEC 24762 (20)

Disaster Recovery vs. Business Continuity
Disaster Recovery vs. Business ContinuityDisaster Recovery vs. Business Continuity
Disaster Recovery vs. Business Continuity
 
Engineering plant facilities 12 mechanics building preventive maintenance and...
Engineering plant facilities 12 mechanics building preventive maintenance and...Engineering plant facilities 12 mechanics building preventive maintenance and...
Engineering plant facilities 12 mechanics building preventive maintenance and...
 
Bcp
BcpBcp
Bcp
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR Presentation
 
Lessons Learned from AMI Deployments and Asset Management Readiness
Lessons Learned from AMI Deployments and Asset Management ReadinessLessons Learned from AMI Deployments and Asset Management Readiness
Lessons Learned from AMI Deployments and Asset Management Readiness
 
European Data Centre Standards
European Data Centre StandardsEuropean Data Centre Standards
European Data Centre Standards
 
Stork Presentation on Migration (Willem Hazenberg)
Stork Presentation on Migration (Willem Hazenberg)Stork Presentation on Migration (Willem Hazenberg)
Stork Presentation on Migration (Willem Hazenberg)
 
Business Continuity Planning and Disaster Recovery Plannin.docx
Business Continuity Planning and Disaster Recovery Plannin.docxBusiness Continuity Planning and Disaster Recovery Plannin.docx
Business Continuity Planning and Disaster Recovery Plannin.docx
 
SI_050212_Olsen_Alknecht_PGE_CBMproject
SI_050212_Olsen_Alknecht_PGE_CBMprojectSI_050212_Olsen_Alknecht_PGE_CBMproject
SI_050212_Olsen_Alknecht_PGE_CBMproject
 
Introduction to energy audit part 3
Introduction to energy audit part 3Introduction to energy audit part 3
Introduction to energy audit part 3
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
Business Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesBusiness Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery Notes
 
Delta Telecom O&amp;m presentation
Delta Telecom O&amp;m presentationDelta Telecom O&amp;m presentation
Delta Telecom O&amp;m presentation
 
Planning for Substation Maintenance and Reliability
Planning for Substation Maintenance and ReliabilityPlanning for Substation Maintenance and Reliability
Planning for Substation Maintenance and Reliability
 
The Connected Building Transformation
The Connected Building TransformationThe Connected Building Transformation
The Connected Building Transformation
 
IoT
IoTIoT
IoT
 
Transition to online AMS reduces maintenance costs and improves operations
Transition to online AMS reduces maintenance costs and improves operationsTransition to online AMS reduces maintenance costs and improves operations
Transition to online AMS reduces maintenance costs and improves operations
 
M-Reporting introduction and faq pharma 20140316
M-Reporting introduction and faq pharma 20140316M-Reporting introduction and faq pharma 20140316
M-Reporting introduction and faq pharma 20140316
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery Environment
 

More from PECB

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemPECB
 

More from PECB (20)

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management system
 

Recently uploaded

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 

Recently uploaded (20)

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

PECB Webinar: Implementing Effective Disaster Recovery Strategies – ISO/IEC 24762

  • 2. 16-09-15 2 General information - About me - Content of this webinar - Duration of the webinar - Questions
  • 3. 16-09-15 3 Disaster Recovery Problem Statement • An internal or external event interrupts one or more of our business processes • Time -- the length of the interruption -- causes the situation to become a disaster
  • 4. 16-09-15 4 Disaster Recovery Assumptions • Major catastrophes, Not Daily Operational Problems • Will Not Produce a “Business as Usual” environment • The organization will Still Lose time and money in a disaster
  • 5. 16-09-15 5 • Move an operational department, with NO WARNING! and • Recover Time-Sensitive business operations – Without notice – At another (remote?) location/facility – With less capacity & capability – Using only data stored Off-Site – Within a designated recovery time frame – Without some key personnel The Disaster Recovery Challenge
  • 6. 16-09-15 6 Disaster Emergency response - immediate recovery Recovery - critical functions Return Home Business Relocation long term recovery in new or semi- permanent location Hours Days Weeks
  • 7. 16-09-15 7 - Identify recovery strategies for the mission critical operations using the BIA and Risk Evaluation - Recommend strategies to meet the recovery objectives identified in the BIA - Perform a cost benefit analysis on the recommended strategies
  • 8. Risk Assessment Resources vul. to risks 1. Identifying risks 2. Risk analysis 3. Risk judgement List of critical resources 16-09-15
  • 9. Risk Category Asset/Element VulnerabilityReal Probability Controls Category Power outage Critical applications H H M 1 Power outage Information prov. by computers H H M 1 Power outage Critical information/data H H M 1 Power outage Computer facilities H H M 1 Power outage Terminals H H M 1 Power outage Internal links (LAN,WAN) H H M 1 Power outage Documents/conf. information H H M 1 Power outage Operating systems H H M 1 Power outage Gateways H H M 1 Fire Information prov. by computers H H M 1 Fire Critical information/data H H M 1 Fire Computer facilities H H M 1 Fire Terminals H H M 1 Fire Internal links (LAN,WAN) H H M 1 Fire Documents/conf. information H H M 1 Fire Operating systems H H M 1 Fire Gateways H H M 1 Fire Maintenance activities H H M 1 Software failure Daily operations H M M 1 Software failure Customer care H M M 1 Hacker Information prov. by computers H M M 1 Fire Failure indicators H L S 2 Fire Air condition H L S 2 Cable cut to switch Daily operation H L S 2 Cable cut to switch Customer care H L S 2 Major accidents Critical applications H L S 2 Major accidents Information prov. by computers H L S 2 Major accidents Critical information/data H L S 2
  • 10. 16-09-15 10 Operational Impacts of Outage Customer Impacts of Outage Financial Impacts of Outage Legal/Regulatory Impacts of Outage Other Impacts of Outage Recovery Time Objectives Business Unit Recovery Priorities Recovery Requirements/Resources Vital Records Establish Determine Business Impact Analysis (BIA)
  • 11. 16-09-15 11 0 5,000,000 10,000,000 15,000,000 20,000,000 25,000,000 30,000,000 35,000,000 < Day 1 Day 1 Day 2 Day 3 Day 4 Day 5 Week 1 Week 2 Week 3 Week 4 > Week 4 USD Cumulative financial impacts, example Lost Sales
  • 12. 16-09-15 12 “.....is the time between the point of disruption and the point at which most critical systems must be operational AND updated to current status.” time Recovery of Operations Critical Systems Operational with Current & Accurate Data Recovery Time Frame The time within which Business Processes must be recovered at acceptable levels of operational capability to minimize the impact of an outage Point of Disruption Recovery Time Frame (RTO)
  • 13. 16-09-15 13 Some parameters for estimation of RTO: • Complexity of recovery • Impacts on customers • Financial impacts • Impacts on operations, how long can a site/node be idle • Any recovery strategies in place? • Any work around procedures? • The amount of back-logg in case of an outage (RPO) Recovery Time Frame (RTO)
  • 14. 16-09-15 14 Major points to consider : • Recovery of critical business functions • Business recovery requirement priorities • Minimization of losses • Time frame for the recovery – RTO • Service level desired within the RTO (100% not realistic) • Stepwise recovery • Recovery resources • Cost/Benefit of Recovery solution • Requirements of the Recovery solution(s)
  • 15. 16-09-15 15 Recovery time Recovery investment $ Recovery cost $ Continuous process Hot site Mobile site Cold site Manual procedures Do nothing Disaster Recovery strategies Redundant Hot Site Mobile Site Cold Site Withdraw service Do nothing
  • 16. 16-09-15 16 Recovery Strategies Service degradation: • No recovery strategy • Manual procedures – work around • Reduce service response • Withdrawal of service • Staff working from home
  • 17. 16-09-15 17 Recovery strategies Internal/extrenal strategies: 1. Internal back-up facilities 2. Hot site 3. Warm site 4. Mobil site 5. Cold/shell site 6. Reciprocal agreements 7. Third party service vendor 8. Cloud 9. Investigate usage of other internal facilities
  • 18. 16-09-15 18 Develop vital record and work in progress recovery strategies
  • 19. 16-09-15 19 Considerations when choosing recovery location:  Threats  Access control  Facility security  Dedicated areas  Environmental control  CC (EOC)  Restricted facilities  Others
  • 20. 16-09-15 20  Natural hazards  Weather changes  Industrial and commercial hazards  Accessibility  Alternate routes  Shared premises  Public utilities  Cabling infrastructure  Risk mitigation Threats
  • 21. 16-09-15 21 Access control: - Selective restriction of entry and exit of users into or out of the area - Personal security categoies - Security zones Facility security : - Physical building - Exterior/interior - Alarm system Dedicated areas: - Recovery room - Assambly areas
  • 22. 16-09-15 22 Environmental control: - Temperature - Ventilation - Humidity - Vibration and noise EOC: Restricted facilities: - Authorized access for designated purposes Others: • Telecommunication • Power supply • Fire protction • Cabling • Rest areas • Parking areas • Medical care • Food and drink • Testing • Life Cycle • Vendors • Outsoursing
  • 23. 16-09-15 23 Compare internal/external solutions a. Advantages b. Disadvantages c. Costs (startup, maintenance and execution) e. Mitigation capability and control options f. Ability to meet defined RTO and RPO
  • 24. 16-09-15 24 Prerequisites for mobile sites: • Transmission connection points at each site • Possible parking places are at the IT center • Power supply (generators) • Off-site storage and suitable back-up regime
  • 25. 16-09-15 25 100% West Middle East North 10 % 18 % 27 % 36 % Transport 4 hours West&East Transport 10 hours Mid&North • Part 1,2,3,4 of transmission up • SDH backbone • Far end transmission up • Start the switches • RBS reloaded, • Switches loaded, HLR loaded • Test, 8hours Activate teams 2 hours 12,12,12,12 hours 6 hours 32 44 50 62 Hours ‘Cold Site’ For 5 HLR and 5 SCPs HLR-redundancy (0 hours) or ‘Warm site’ HLR (3 hours) or Mobile HLR (6 hours at site) Enough capacity in other GMSCs in the network
  • 26. 16-09-15 26 Activation and Deactivation Response plan Recovery plan Restoration plan
  • 27. 16-09-15 27 Exercise/test If you do not exercise your plan you do not have any….. Only 30% of the companies exercise their plans…... Plan for the worst, exercise for the rest!
  • 28. 16-09-15 28 ...in case of a disaster?