SlideShare a Scribd company logo
1 of 31
Achieving Enterprise Resiliency
And
Corporate Certification
By
Combining Recovery Operations through a
Common Recovery Language and Recovery Tools,
While adhering to
Domestic and International Compliance Standards
Created by:
Thomas Bronack, CBCP
Bronackt@dcag.com
Phone: (718) 591-5553
Cell: (917) 673-6992
Created by: Thomas Bronack © Page: 1 Date: 25 April 2013
Created by: Thomas Bronack © Page: 2 Date: 25 April 2013
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Abstract
• Are you utilizing your recovery personnel to achieve maximum protection?
• Have you implemented a common recovery glossary of terms so that personnel speak
the same language and can best communicate and respond to disaster events?
• Is your company utilizing a common recovery management toolset?
• Want to reduce disaster events, improve risk management, and insure fewer business
interruptions through automated tools and procedures?
• Does your company adhere to regulatory requirements in the countries that you do
business in?
• Can you monitor and report on security violations, both physical and data, to best
protect personnel, data access, eliminate data corruption, support failover /failback
operations, and protect company locations against workplace violence?
• Are you protecting data by using backup, vaulting, and recovery procedures?
• Can you recover operations in accordance to SLA/SLR and RTO/RPO?
• Is your supply chain able to continue to provide services and products if a disaster
event occurs through SSAE 16 (Domestic), SSAE 3402 (World)?
• Do you coordinate recovery operations with the community and government
agencies like OSHA, OEM, FEMA, Homeland Security, etc.?
• Do you have appropriate insurance against disaster events?
• Can you certify that applications can recover within High Availability (2 hours – 72
hours) or Continuous Availability (immediate) guidelines?
• If not, this presentation will help you achieve the above goals.
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 3 Date: 25 April 2013
What is Enterprise Resiliency and Corporate Certification
The Road to Achieving Enterprise Resiliency:
1. Define Risks (Natural, Man-Made, End-User – refer to CERT RMM and COSO for direction);
2. Determine Compliance Requirements (see GLB, HIPAA, Patriot Act, EPA Superfund, OSHA, NFPA 1600, DHS, and OEM, etc.);
3. Use “Best Practices” tools and procedures (CobIT, ITIL, etc.);
4. Understand road to “Corporate Certification” (DRII, BCI) and domestic and international compliance laws / regulations;
5. Locate Certification Firms / Organizations (“Training the Trainers” is available now) for “Checks and Balances” / “Attestation”;
6. Develop a Business Plan and formulate a Management Direction within Project Initiation Directive defining Scope and Commitment.
7. Perform a Risk Assessment / BIA to define current risks, their costs, and your ability to implement controls to respond to risks;
8. Build Business Recovery Plans for Offices and Business Locations;
9. Build Disaster Recovery Plans to protect data centers and the IT Infrastructure;
10. Build Emergency Response Plans to protect against fires, floods, natural disasters, and man-made disasters;
11. Implement Workplace Violence Preventions Plans to protect personnel within business locations and provide a safe workplace;
12. Implement Physical Security and an Information Security Management System (ISMS) to protect the workplace and data;
13. Define Functional Responsibilities to determine what must be done and by who;
14. Create / Expand Job Descriptions to direct personnel in the Recovery Planning process;
15. Create / Update / Use Standards and Procedures Manuals, Usage Manuals, and required Documentation; and,
16. Provide Awareness and Educational Training, Support, and Maintenance (with Version & Release Management) going forward.
Enterprise Resiliency combines all recovery
operations into one discipline using a common
language and tool set.
Corporate Certification guarantees that the
company complies with all laws in the
countries they do business in.
Enterprise
Resiliency
Emergency Operation
Center (EOC)
Emergency
Management
Business
Continuity
Management
Workplace
Violence
Prevention
Risk & Crisis
Management
Physical and Data
Security
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 4 Date: 25 April 2013
Business Continuity Management Disciplines and Integration
Contingency
Planning
Disaster
Recovery
Risk
Management
Business
Recovery
Charter:
Eliminate Business Interruptions;
Ensure Continuity of Business;
Minimize Financial Impact; and
Adhere to Legal / Regulatory
Requirements
Information Technology
Protection
Critical Jobs;
Data Sensitivity and Access
Controls;
Vital Records Management;
Vaulting and Data Recovery;
Recovery Time Objectives;
Recovery Point Objectives; and
Mainframe, Mid-Range, and
Servers.
Risk Management
Exposures (Gaps and
Exceptions);
Insurance;
Legal / Regulatory
Requirements;
Cost Justification; and
Vendor Agreements.
Corporate Asset
Protection
Inventory Control
Asset Management
Configuration
Management
Business Continuity; and
Office Recovery.
Contingency Recovery
Disciplines
Contingency
Recovery
Planning
Facilities
Executive
Management
Personnel
General
Services
Public
Relations
Finance
Auditing
Company
Operations
Information
Technology
“Contingency Planning affects every part of the
organization and is separated into logical work
areas along lines of responsibility”.
“These four Contingency Planning
Disciplines allow for logical work
separation and better controls”
“Establishing interfaces with key
departments will allow for the inclusion
of corporate-wide recovery procedures
(Security, Salvage, and Restoration, etc.)
in department specific Recovery Plans”
Suppliers
Supply Chain safeguards
must be enforced to
maintain supply delivery
and continued operations
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 5 Date: 25 April 2013
Lifecycle of a Disaster Event (Why we create Recovery Plans)
Secondary Site
Primary Site
Primary Site
Disaster Event:
• Event;
• Analyze;
• Declare;
• Failover.
Primary Site
Safeguard:
• Evacuate;
• Protect Site;
• First
Responders.
Primary Site
Salvage:
• Clean;
• Repair;
• Resupply.
Primary Site
Restoration:
• Restart;
• Test;
• Success;
• Failback.
Primary Site
Resume:
• Reload
Data;
• Restart;
• Continue.
Failover Production Recovery Processing
Production Site Salvage and Restoration
Resume Production
at Primary Site
Failover
Start Up
Failback
Shut Down
High Availability
(HA) is RTO / SLA
based Switch
Continuous
Availability (CA) is
immediate Switch
Repair Primary Site to Resume Production via Failback
CA HA
Normal Production
at Primary Site
Production Production
Switch
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 6 Date: 25 April 2013
Charter and Mission Statement:
1. Insure Continuity of Business and Eliminate / Reduce Business Interruptions (Enterprise Resilience);
2. Assure “Corporate Certification” by complying with Regulatory Requirements for countries that you do
business in, through Risk Management and Crisis Management guidelines (CERT / COSO);
3. Adhere to Service Level Agreements (SLA) through Service Level Reporting (SLR) and the use of Capacity
and Performance Management procedures;
4. Implement Enterprise-Wide Recovery Management by combining Business Continuity Management
(BCM), Disaster Recovery Planning (DRP), and Emergency Management (EM);
5. Utilize “Best Practices” to achieve “Enterprise Resiliency” (CobIT, ITIL, etc.);
6. Protect personnel and achieve physical security through Workplace Violence Prevention principals,
laws, and procedures;
7. Guaranty data security through access controls and vital records management principals and
procedures within an Information Security Management System (ISMS) based on ISO27000;
8. Achieve Failover / Failback and data management procedures to insure RTO, RPO, and Continuity of
Business within acceptable time lines (Dedupe, VTL, Snapshots, CDP, NSS, RecoverTrak, etc.);
9. Integrate recovery management procedures within the everyday functions performed by personnel as
defined within their job descriptions and the Standards and Procedures Manual;
10. Embed Recovery Management and ISMS requirements within the Systems Development Life Cycle
(SDLC) used to Develop, Test, Quality Assure, Production Acceptance / Implement, Data Management,
Support and Problem Management, Incident Management, Recovery Management, Maintenance, and
Version and Release Management for components and supportive documentation;
11. Develop and provide educational awareness and training programs to inform personnel on how best to
achieve the corporate mission.
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 7 Date: 25 April 2013
Goals and Objectives:
Protecting the Business
Protecting Information Technology
Eliminate / Reduce Business
Interruption
Insure Continuity of Business by
certifying application recovery
Conduct Risk Management and
Insurance Protection reviews
Provide Personnel Protections
(HRM, Safe Workplace, and
Employee Assistance Programs)
Vendors - Supply Chain
Management & Control
(ISO 24672 / ISO 27031)
Protect Clients (Products /
Services) via adherence to SLA /
SLR guidelines
Locations / Infrastructure Community / Business / Personnel Lines of Business
Physical / Data Security Compliance Recovery Management
Optimized Operations Insurance Reputation
Build IT Location (Safe Site,
HVAC, Water, Electrical, Raised
Floor, etc.)
Asset Management (Asset
Acquisition, Redeployment, and
Termination)
Configuration Management /
Version and Release Management
Use Best Practices like CERT /
COSO, CobIT, ITIL.v3
Mainframe, Mid-Range, Client /
Server, and PC safeguards
Communications (Local, LAN,
WAN, Internet, cloud)
System Development Life Cycle
(SDLC) optimization
Products and Service Support
Development, Enhancement
Support and Maintenance for
problems and enhancements
Data Management (Dedupe/
VTL / Snapshots / CDP)
Information Security Management
System via ISO27000
Data Sensitivity and Access
Controls (Applid / Userid / Pswd)
Vaulting, Backup, and Recovery Disk / File copy retrieve utilities RTO, RPO, RTC
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 8 Date: 25 April 2013
Risk Management:
• Define Risk Management Process in accordance with COSO / CERT guidelines, including:
• Internal Environment Review;
• Objective Setting;
• Event Identification;
• Risk Assessment and Response Definitions;
• Control Activities;
• Information and Communications; and
• Monitoring and Reporting.
• Define Legal and Regulatory Requirements (Domestic and International as needed);
• Determine OCC, Tax, and Industry compliance requirements;
• Perform an IT Audit / Risk Assessment to uncover Gaps and Exceptions;
• Define Mitigations and their Costs, along with data gathering and reporting guidelines;
• Calculate cost of Mitigation against cost of Gap / Exception to prioritize responses;
• Review Vendor Agreements for primary and secondary sites to eliminate / minimize Supply Chain
interruptions ISO 24762, (SSAE 16, SSAE 3402, NIST 800-34) ISO 27031;
• Obtain Insurance Quotes and select appropriate insurance protection;
• Integrate within the everyday functions performed by personnel as outlines in their job
descriptions and the Standards and Procedures Manual; and,
• Develop documentation, awareness, and training materials.
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 9 Date: 25 April 2013
• Formulate Recovery Management Business Plan, including:
• Charter, Mission Statement, Scope and Deliverables;
• Project Plan, Goals and Objectives, Functional Requirements and Skills, Task Descriptions, Timeline;
• Management Support, Funding, and Announcement, with their “Strong Backing”.
• Develop a Project Plan, Organization Structure, Job Functions;
• Work Flow and Systems Development Life Cycle (SDLC);
• Problem / Incident Management and Help Desk (Command Centers and EOC);
• Change Management and Version and Release Management to repair problems and add enhancements;
• Asset and Configuration Management;
• Access Control and Library Management (Security, Backup / Recovery);
• Service Level Agreements (SLA) / Service Level Reporting (SLR); and,
• Recovery Time Objective (RTO) / Recovery Point Objective (RPO), and Recovery Time Capability (RTC).
• Implement Recovery Document Library Management, including:
• Private Personal and Group Drive for developing / sharing recovery information;
• Public Drive containing: Recovery Plans , Training Materials, Glossary of Terms, and Continuity of Business
Public Documents;
• Backup / Recovery, VTL, Dedupe, Snapshots, Forward Recovery, Virtualization, and WAN optimization.
• Identify and Train Recovery Management Coordinators from Business Units;
• Subject Matter Experts supporting Business Units; and
• Stakeholders and Participants.
• Select automated Recovery Management and Integration Tools:
• Risk Management Assessment, Business Impact Analysis;
• Recovery Plan creations, and Recovery Plan testing from Table-Top to Recovery Certification;
• Mitigate any Gaps & Exceptions;
• Mediate any Obstacles Impeding Recovery Testing;
• Repeat Testing – Repair – Testing Cycle until Recovery Certified;
• Repeat testing until Gold Standard is reached via Flip / Flop ability (can run at Primary or Secondary site);
• Integrate process within everyday functions performed by personnel.
Establishing the Recovery Management and Enterprise Resiliency process
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 10 Date: 25 April 2013
Achieving Enterprise Resiliency and Corporate Certification Process
1. Review existing Recovery Operations, including:
• Emergency Management Preparedness;
• Business Continuity and Disaster Recovery Management;
• Workplace Violence Prevention; and,
• Enterprise Security (Physical / Data).
2. Evaluate Command Centers and how they interact with Recovery Operations, including:
• Emergency Operations Center (EOC);
• Incident Command Center (ICC);
• Help Desk (HD);
• Network Command Center (NCC); and,
• Operations Command Center (OCC).
3. Define Company Lines of Business (LOB’s), including:
• Business Functions, Products, and Services provided;
• Locations and Personnel;
• Customers and Suppliers;
• Applications and Business Processes; and,
• Existing Evacuation, Crisis Management, and Recovery Operations.
4. Document Integration Requirements, including:
• Service Level Agreements (SLA) and Service Level Reporting (SLR);
• Systems Development Life Cycle (SDLC) and Workflow Management;
• Use of Best Practices Tools and Procedures like COSO, CobIT, and ITIL;
• Ensure adherence to Regulatory Requirements, and Security Requirements (Domestic & International); and
• Define Functional Responsibilities, Job Descriptions, Standards and Procedures.
5. Create Business and Implementation Plan, including:
• Mission Statement, Goals and Objectives, Assumptions, and Scope and Deliverables;
• Gain Management approval through written report and presentation, then initiate project;
• Develop a Detailed Project Plan with tasks, deliverables, time frame, costs, and resource requirements;
• Define Functional Responsibilities, Standards and Procedures, and Job Descriptions for personnel;
• Establish Support, Maintenance, Change Management, and Version and Release Management procedures; and,
• Provide Oversight, Awareness, and Training.
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 11 Date: 25 April 2013
Foundation consist of:
Enterprise Resiliency;
Risks and Compliance issues;
Corporate Certification Guidelines;
Best Practices;
Available Tools; and
Certification Firm.
Workplace Violence Prevention
Threats;
Predators;
Violent Events; and
Employee Assistance Programs.
Best Practices consist of:
COSO / CobIT / ITIL;
ISO 27000; and
FFIEC, etc.
Enterprise Resiliency consist of:
Emergency Management;
Business Continuity Management;
Workplace Violence Prevention;
Workflow Management;
Functional Responsibilities;
Job Descriptions; and
Standards and Procedures.
Corporate Certification consist of:
BS 25999 / ISO 22301;
Private Sector Preparedness Act;
CERT Enterprise RMM Framework; and
NFPA 1600.
Physical Security
and
Access Controls
Global Standards include:
ISO 22300 – Global Standard;
NYSE 446;
SS 540 (Singapore);
ANZ 5050 (Australia)
BC Guidelines (Japan); and more.
House of Enterprise Resilience
Enterprise Resiliency must be built upon a Solid Foundation
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 12 Date: 25 April 2013
-confidential-
Building Your Team & Capabilities
Staff / Management Awareness & Training
Training Matrix & Master PlanShort Training SessionsWorkshops / Awareness Sessions
Organizational Roles
Incorporate R&R into JD’sDefining Roles & ResponsibilitiesDefining the Committees & Teams
Continual Improvement
Testing & Review
Update
Review
Testing
Implementation
Emergency Response
Damage
Assessment
Life & Safety
Crisis Mgmt
Plan Development
Procedure Development
Checklist Development
Contact Information
Escalation &
Notification
Disaster Declaration
Data & Record
Recovery
Understanding Your Business
Requirements & Strategy
Policies Business Impact
Risk Assessment
Continuity
Strategies
Initiation
Program Management
Project Statement
Timeline
Maturity Assessment
Preventive
Measures
Assurance
DEFINE OVERALL
IMPLEMENTATION
APPROACH
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 13 Date: 25 April 2013
COSO Risk Assessment
Committee Of Sponsoring Organizations (COSO) was formed to develop
Risk Management and Mitigation Guidelines throughout the industry.
Designed to protect Stakeholders from uncertainty and associated risk that could erode value.
A Risk Assessment in accordance with the COSO Enterprise Risk Management Framework, consists of
(see www.erm.coso.org for details):
• Internal Environment Review,
• Objective Setting,
• Event Identification,
• Risk Assessment,
• Risk Response,
• Control Activities,
• Information and Communication,
• Monitoring and Reporting.
Creation of Organizational Structure, Personnel Job Descriptions and Functional Responsibilities,
Workflows, Personnel Evaluation and Career Path Definition, Human Resource Management.
Implementation of Standards and Procedures guidelines associated with Risk Assessment to guaranty
compliance to laws and regulations.
Employee awareness training, support, and maintenance going forward.
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 14 Date: 25 April 2013
CobiT Framework
Control Objectives for Information
Technology (CobiT)
Is designed to extend COSO
controls over the IT environment by:
• Providing guidelines for Planning
and integrating new products and
services into the IT Organization
• Integrating new acquisitions;
• Delivering new Acquisitions / Mergers
and supporting them going forward;
• Monitoring IT activity, capacity, and
performance; so that
• Management can meet Business
Objectives, while protecting
Information and IT Resources.
CobiT
Business
Objectives
Information
IT Resources
Monitoring
and
Reporting
Delivery and
Support
Acquisition and
Implementation
Planning and
Organization
IT Plan
Information Architecture
Technology Direction
IT Organization and
Relationships
Manage IT investment
Communicate Management
Goals and Direction
Manage Human Resources
Ensure Compliance with
External Requirements
Assess Risks
Manage Projects
Manage Quality
Manage The Process
Assess Internal Control
Adequacy
Obtain Independent
Assurance
Provide for Independent
Audit
Define Service Levels
Manage third party services
Manage Performance and Capacity
Ensure continuous service
Identify and attribute costs
Educate and train users
Assist and advise IT customers
Manage the configuration
Manage problems and incidents
Manage Data
Manage Facilities
Manage Operations
Identify Solutions,
Acquire and maintain application
software,
Implement Asset Management
procedures for acquisition,
redeployment, and termination of
resources,
Develop and maintain IT
procedures,
Install and accept systems,
Manage change.
CobiT Framework and Functionality
Criteria
Effectiveness
Efficiency
Confidentiality
Integrity
Availability
Compliance
Reliability
Data
Application Systems
Technology
Facilities
People
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 15 Date: 25 April 2013
ITIL V3 Overview
3. Service Transition
• Change Management
• Project Management (Transition Planning and Support)
• Release and Deployment Management (V & R Mgmnt)
• Service Validation and Testing
• Application Development and Customization
• Service Asset and Configuration Management
• Knowledge Management
4. Service Operation
• Event Management
• Incident Management
• Request Fulfillment
• Access Management
• Problem Management
• IT Operations Management
• Facilities Management
1. Service Strategy
• Service Portfolio Management (available
Services and Products)
• Financial Management (PO, WO, A/R, A/P,
G/L, Taxes and Treasury)
2. Service Design
• Service Catalogue Management
• Service Level Management (SLA / SLR)
• Risk Management (CERT / COSO)
• Capacity and Performance Management
• Availability Management (SLA / SLR)
• IT Service Continuity Management (BCM)
• Information Security Management (ISMS)
• Compliance Management (Regulatory)
• Architecture Management (AMS, CFM)
• Supplier Management (Supply Chain)
ITIL Available Modules
ITIL Five Phase approach to IT Service Support
1. Service Strategy,
2. Service Design,
3. Service Transition,
4. Service Operation, and
5. Continual Service Improvement.
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 16 Date: 25 April 2013
Compliance Laws that must be adhered
• Gramm Leach Bliley – Safeguard Act (was Bank Holding Act);
• Dodd – Frank – Wall Street Reform and Consumer Protection Act;
• HIPAA – Healthcare regulations (including ePHI, HITECH, and Final Ombudsman Rule);
• Sarbanes – Oxley Act (sections 302, 404, and 409) on financial assessment and reporting
by authorized “Signing Officer”;
• EPA and Superfund (how it applies to Dumping and Asset Management Disposal);
• Supply Chain Management “Laws and Guidelines” included in ISO 24762 (SSAE 16 for
Domestic compliance and SSAE 3402 for International Compliance, and NIST 800-34);
• Supply Chain Management “Technical Guidelines” described in ISO 27031;
• Patriots Act (Know Your Customer, Money Laundering, etc.);
• Workplace Safety and Violence Prevention via OSHA, OEM, DHS, and governmental
regulations (State Workplace Guidelines and Building Requirements);
• Income Tax and Financial Information protection via Office of the Comptroller of the
Currency (OCC) regulations (Foreign Corrupt Practices Act, OCC-177 Contingency
Recovery Plan, OCC-187 Identifying Financial Records, OCC-229 Access Controls, and
OCC-226 End User Computing).
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 17 Date: 25 April 2013
Laws and Regulations concentrate on the VALIDITY of PROVIDED DATA, so
we start with a review of how sensitive data is described, created, protected,
and used, including:
• Identify the lifecycle of data used in financial reporting and compliance;
• Where does it come from and who owns it?
• What form is it in (Excel, Database, manual, fax, email, etc.),
• Who has access to the data and how can they impact data (CRUD - create, read,
update, and delete).
• Review current Data Sensitivity and IT Security procedures;
• Examine Library Management, Backup, Recovery, and Vaulting procedures associated
with sensitive data;
• Review Business Continuity Planning and Disaster Recovery procedures used to protect
and safeguard critical Information Technology and Business facilities;
• Utilize existing Standards and Procedures to duplicate process and identify errors; and,
• Examine the available Employee Awareness and Education programs.
As a result of this study, it will be possible to identify weaknesses and develop
procedures to overcome the weaknesses, thereby improving data efficiency and
productivity.
How do we comply?
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 18 Date: 25 April 2013
Vendor
DR
DR
Process
ISO 24762
End
ISO 27031
DR
Testing
SSAE 16
Domestic
SSAE 3402
International
NIST 800-34
Technical
End User IT
DR Plans
Risk
Assessment
Business Impact
Analysis
Certifying Vendor Recovery Plans and Validating
Supply Chain resiliency
Recognize
DR Event
Respond
To Event
Salvage &
Restoration
Return to
Primary Site
Initial
Testing
After
Change
After
Enhancement
After
Growth
Include
Vendors
Use Primary &
Secondary Sites
Laws and
Guidelines
Technical
Guidelines
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 19 Date: 25 April 2013
How reporting is accomplished
Operations
Risk Manager
Operations
Risk Manager
Technical
Risk Manager
Chief Executive
Officer (CEO)
Chief Financial
Officer (CFO)
Compliance
Reports
Company Operations Technical Services Executive Management Compliance Reporting
Section 404 of the Sarbanes-Oxley Act (SOX) says that publicly traded companies must establish, document, and maintain
internal controls and procedures for Financial and Compliance reporting. It also requires companies to check the
effectiveness of internal controls and procedures for Financial and Compliance reporting.
In order to do this, companies must:
• Document existing controls and procedures that relate to financial reporting.
• Test their effectiveness.
• Report on any gaps or poorly documented areas, then determine if mitigation should be performed.
• Repair deficiencies and update any Standards and Procedures associated with the defects.
- Extract Information,
- Generate Financial Reports,
- Ensure Record Safeguards,
- Ensure Record Formats,
- Generate Compliance Reports,
- Validate Information,
- Submit Reports.
- Protect Information,
- Data Security,
- Access Controls,
- Library Management,
- Production Acceptance,
- Version and Release Mgmt.,
- Business Continuity,
- Disaster Recovery,
- Emergency Management,
- Standards and Procedures.
- Validate Information,
- Establish Reporting Criteria,
- Gather data and report,
- Review Reports,
- Attest to their accuracy,
- Submit Reports.
- Report Information,
- Submitted Quarterly,
- Attested to Annually,
- Reviewed by SEC and
other agencies to insure
compliance.
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 20 Date: 25 April 2013
• Review of Compliance Requirements (Business and Industry)
• Ensure Data Sensitivity, IT Security and Vital Records Management,
• Eliminate Data Corruption and Certify HA / CA Application recovery,
• Adhere to Systems Development Life Cycle (SDLC),
• Utilize Automated Tools whenever practicle,
• Elimination of Single-Point-Of-Failure concerns,
• Create Inventory / Configuration / Asset Management guidelines,
• Develop Incident / Problem and Crisis Management procedures,
• Integrate Work-Flow automation through Re-Engineering processes,
• Implement and conduct Training and Awareness programs.
Strategies for Eliminating Audit Exceptions
Achieving Recovery Time Objective (RTO) / Recovery Point
Objective (RPO) and Recovery Time Capability (RTC)
Disaster
Event
Recovery
Point
Objective
(RPO)
Recovery
Time
Objective
(RTO)
Recovery
Time
Capability
(RTC)
Production Processing
CA Immediate switch to Secondary Site
HA Certified Recovery to Secondary Site
Reload Last
Backup
Or Snapshot
Production
Processing
Interrupted
Data
Forward
Recovery
Planned
Recovery
Time
Time needed
to
Recover
Data saved
in last good
Backup or
Snapshot
(Restore
Duration will
vary)
Actual Time
needed to
Recover
Extended
Loss
Production Processing
Resumed
Secondary Site must contain synchronized data and infrastructure
Primary Site recovers data and infrastructure within RTO
Other Terms include:
RTE – Recovery Time Expectation;
RPE – Recovery Point Expectation; and
SRE – Service Recovery Expectation.
Loss equals Actual Time needed to
Recover, costs for staff, loss of
client productivity, and damage to
corporate reputation.
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 21 Date: 25 April 2013
CA Gold
Standard
HA Recovery
Certification
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 22 Date: 25 April 2013
Optimized Protection / Recovery Data Services
Snapshots
Data De-duplication eliminates
duplicate data files and network traffic
to a Virtual Tape Library (VTL)
Real backup tapes can be
created directly from the VTL.
Forward Recovery
between Snapshots
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 23 Date: 25 April 2013
Store and Forward concept for data transmission / reception and
achieving Recovery Certification and the Flip / Flop Gold Standard
Data
End User
Application
Primary
System
Access
Method
NC
NO
System
Application
Secondary
System
Access
Method
Switch
Telco
Data
Modem Switch
Line Switch
Exchange Switch
Telco Tests:
• Internal Modem Test;
• End-to-End Continuity Test; and,
• Data Transmission Testing.
Data is Transmitted via
Read / Write or Get / Put
command and placed in
originating data buffer.
Data is safeguarded via
backup / recover within
RTO time frame
required. Use of Dedupe,
VTL, CDS, and High Speed
WAN can speed data
recovery to within
dictated recovery time
frames.
If Primary System fails
you should be able to
“Failover” to a Secondary
System and return via
“Failback” operation.
Flip / Flop is when you
can run operations from
either site if desired.
Data is passed through the
System to the Access Method
for transmission.
Data Buffer is maintained until a
“Positive Acknowledgement” is
received. Retries occur when
“Negative Acknowledgements”
are received. If retry threshold
is reached, error message is
presented and corrective actions
can be taken.
Because Data stays in “Originating” buffer until a “Positive Acknowledgement” is received, it is protected from loss. If failure
occurs, data is not transmitted and error message generated so that recovery and corrective actions can be performed.
Switches are used to select
secondary paths when errors
occur, so elimination of
“Single Point of Failure” is a
critical issue.
NC
NO
Switch
HA / CA Availability,
Failover / Failback
“Certification”, And Flip
/ Flop “Gold Standard”
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Management
Commitment
Risk
Management
Business
Impact Analysis
BIA
Select
BCM Tools
Recognize the
Need for Recovery
(Business Loss)
Initiate Recovery
Executive
Committee
Define Goals
And Objectives
Obtain
Funding
Compliance &
Regulatory Needs
Audit
Controls
Supply
Chain
Gaps &
Exceptions
SLA’s
/ SLR
Insurance Cost to
Repair
Mediate /
Mitigate
Location &
Applications
Rate
Criticality
RTO, RPO,
RTC
Rate Ability to Achieve
Recovery Goals
Gaps &
Exceptions
Cost to
Repair
Automated
BCM Tool?
BIA & Plan
Creation
Train
Staff
Create, Test, &
Implement BCM Plans
Start
A
Creating Business Recovery Plans
Mediate /
Mitigate
Impeding
Obstacles
Created by: Thomas Bronack © Page: 24 Date: 25 April 2013
A
Define Critical
Applications
Substantiation
Recovery
Testing
Mediation /
Mitigation
High Availability
And Continuous
Availability
Identify
Stakeholders and
Contributors
Design Meeting
Agenda and
Deliverables
Schedule &
Conduct
Meetings
Validate
Application
Criticality (SLA)
Use Artifacts to
support criticality
and RTO / RPO
Any Gaps &
Exceptions
found?
Architectural
Assessment to
locate Obstacles
Mediate / Mitigate Impeding Obstacles, Gaps &
Exceptions until application is able to be Tested
Test Applications &
Secondary Site
Certify HA Recovery or
CA Gold Standard
Define Obstacles
That Impede
Gaps &
Exceptions?
Failed
Applications
Obstacles &
Impediments
Define Repair
Costs
Re-Test Application until
Certified, if possible
End
Re-Test Application
Until Certified
Attestation
Letter
High Availability and Continuous Availability Certification
Mediate /
Mitigate
Mitigate /
Mitigate
OK
OK
OK
OK
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
(This process should be performed periodically to insure recoverability after changes)
Created by: Thomas Bronack © Page: 25 Date: 25 April 2013
Compliance to
Country Laws and
Regulations
Infrastructure &
Suppliers capable of
supporting needs
Hardware capable of
supporting workload
processing
Software capable of
supporting workload
processing
Recovery Plans and
Personnel Procedures
need improvement
Gaps & Exceptions
Mitigate
Obstacles & Impediments
Mediate
Test
HA Recovery
Certification
Failure
Success
Testing High Availability (HA) and Continuous Availability (CA) for Recovery
Certification and ability to Flip / Flop between Primary and Secondary Sites
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Ready for
Testing
Ready for
Re-Testing
Problem
Repaired
The Road to Successful Recovery Certification
Testing Failure Loop, until Successful Recovery Certification
Created by: Thomas Bronack © Page: 26 Date: 25 April 2013
CA Gold
Standard
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 27 Date: 25 April 2013
Development Testing
Release
And
Version
Control
Business
Recovery
Facility
Disaster
Recovery
Facility
Off-Site
Vault
End-User
Request for
New Product
Or Service
On-Line
Data Files
BKUP
Unit and
System
Testing
Quality
Assurance
Naming,
Documents,
and
Placement
Security,
Vital Records,
Back-up,
Recovery,
Audit.
Production Acceptance
On-Line
Data Files
BKUP
Security,
Vital Records,
Back-up,
Recovery,
Audit.
Production
On-Line
Data Files
BKUP
Vendor SiteVendor Site
Change
Management
Maintenance
Enhance
And
Repair
Periodic
Real-Time
End-User Defines:
• Business Purpose,
• Business Data,
• Ownership,
• Sensitivity,
• Criticality,
• Usage,
• Restrictions,
• Back-Up, and
• Recovery.
Company or
Client Site
End-User
Location
Update
Recovery
New
Systems Development Life Cycle (SDLC), Components and flow
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 28 Date: 25 April 2013
Disaster
Recovery Site
Development Maintenance
Testing and
Quality
Assurance
Development And Maintenance Environments
Company
Data
Electronic
Transmission
Electronic
Transmission
Systems Development Life Cycle (SDLC)
New
ApplicationsEnd User
“Work Order”
to create a new
Product or
Service
Open Network
With
Multiple Access Points
Remote
Locations
Production
Site #2
Customers;
Credit Bureaus;
Feed-Files; and,
Other Locations.
Physically Transported
Using Tape
Only Encryption
Problem Resolution
And
Enhancements
Send Approved
Applications
To Production
Acceptance
Cloud
Computing
Local
Sites
Local
Tape / Data
Vault
Local
Tape / Data
Vault
Remote
Tape / Data
Vault
Production
Site #1
Electronic Vaulting;
Incremental Vaulting; and,
Electronic transmission to
Disaster Recovery Site
Local
SitesEncryption of “Data at Rest”
to Provide Total Protection
Overview of the Enterprise Information Technology Environment
Encrypting Data-In-
Movement will protect
data being transmitted to
remote sites
Business Locations
IT Locations
Physical /
Cloud
Physical
/ Virtual
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 29 Date: 25 April 2013
Fully Integrated Recovery Operations and Disciplines (Physical End Goal)
Business Continuity
Management
Emergency
Operations Center
(EOC)
Emergency
Response
Management
Network
Command
Center
Operations
Command
Center
Help
Desk
Risk
Management
Disaster and
Business
Recovery
Crisis
Management
Workplace
Violence
Prevention
Incident
Command
Center
First Responders
(Fire, Police & EMT)
Department of
Homeland Security
(DHS)
State and Local
Government
Office of Emergency
Management
(OEM)
Lines of
Business
Locations
Employees
Customers
Suppliers
Contingency
Command
Center
Command
Centers
Corporate
Certification
Private Sector
Preparedness Act
(Domestic
Standard)
BS 25999 / ISO
22301
(International
Standard)
National Fire
Prevention
Association
Standard 1600
Business
Integration
Service Level
Agreements and
Reporting
Systems
Development
Life Cycle
Six Sigma /
Standards and
Procedures
COSO / CobIT /
ITIL / FFIEC
Workplace
Violence Prevention
CERT Resiliency
Engineering
Framework
Information Security
Management System (ISMS)
based on ISO 27000
ISO2700
Security
Standards
OSHA,
DHS, OEM,
Workplace
Safety
A fully integrated recovery organization will include
the components shown in this picture.
Corporate Certification is achieved through the
compliance laws and regulations used to provide
domestic and international guidelines that
enterprises must adhere to before they can do
business in a country.
Workplace Violence Prevention and Information
Security is adhered to by implementing guidelines
to protect personnel and data by following the
latest guidelines related to these topics.
Internal command centers responsible for
monitoring operations, network, help desk, and
the contingency command center will provide vital
information to the Emergency Operations Center
staff.
Organizational departments, locations, and
functions should be identified and connections
provided to the EOC so that communications and
coordination can be achieved in a more accurate
and speedy manner.
Using this structure will help organizations better
collect recovery information and develop recovery
operations to lessen business interruptions and
protect the company’s reputation.
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 30 Date: 25 April 2013
Fully Integrated Resiliency Operations and Disciplines (Logical End Goal)
• State and Local
Government,
• First Responders (Fire,
Police, & EMT),
• Department of
Homeland Security
(DHS),
• Office of Emergency
Management (OEM),
• Local Community.
• Risk Management (COSO),
• Disaster Recovery,
• Business Continuity,
• Crisis Management,
• Emergency Management,
• Workplace Violence
Prevention,
• Failover / Failback,
• Protection, Salvage &
Restoration.
Private Sector
Preparedness Act
(Domestic
Standard)
CERT Resiliency
Engineering
Framework, ITIL
and COSO
ISO22313 and
ISO22318
(International
Standard)
National Fire
Prevention
Association
1600 Standard
Contingency
Command
Center (CCC)
Incident
Command
Center (IC)
Help Desk
(HD)
Operations
Command
Center (OCC)
Network
Command
Center (NCC)
Corporate
Certification
Command
Centers
Information Security
Management System (ISMS)
based on ISO27000
Workplace
Violence
Prevention Emergency Operations
Center (EOC)
Lines of
Business
Emergency
Response
Management
Business
Continuity
Management
Business
Integration
• Locations,
• Employees,
• Infrastructure,
• Equipment,
• Systems,
• Applications,
• Services,
• Supplies,
• Customers,
• RTO, RPO, and
RTC.
• Service Level Agreements (SLA)
& Reporting (SLR),
• Systems Development Life Cycle
(SDLC),
• CobIT, ITIL, and FFIEC,
• ISO Guidelines,
• Audit and Human Resources,
• Six Sigma or Equivalent for
Performance and Workflow
Management
Office of the
Controller of
the Currency
OSHA, OEM,
DHS
Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com
Created by: Thomas Bronack © Page: 31 Date: 25 April 2013
Where do we go from here
• Allow us to present to your management and technical staffs to review the subject and
determine your needs.
• Agree that you want to achieve Enterprise Resiliency and Corporate Certification.
• Allow us to work with your staff to perform a Risk Assessment that will define your
needs, which we will deliver to management as a written report and presentation.
• Obtain management approval to initiate the project with their strong support.
• Identify Stakeholders and Participants.
• Formulate teams and train them on the goals and objectives of this project.
• Create a detailed Project Plan and have teams work towards achieving the deliverables
described in the document, within the stated time frame and costs.
• Develop, Test, Implement “Proof of Concept”, gain approval and then: “Rollout”
Enterprise Resiliency and Corporate Certification to all locations.
• Fully document and Integrate the Standards and Procedures associated with Enterprise
Resiliency and Corporate Certification, Functional Responsibilities, Job Descriptions,
Security Procedures, and Recovery Plans within the everyday functions performed.
• Deliver Awareness and Training services.
• Provide Support and Maintenance services going forward.

More Related Content

What's hot

Article on Emergency Management and Corporate Certification
Article on Emergency Management and Corporate CertificationArticle on Emergency Management and Corporate Certification
Article on Emergency Management and Corporate CertificationThomas Bronack
 
Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...
Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...
Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...Healthcare Network marcus evans
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0Aladdin Dandis
 
CMGT 400 Effective Communication/tutorialrank.com
 CMGT 400 Effective Communication/tutorialrank.com CMGT 400 Effective Communication/tutorialrank.com
CMGT 400 Effective Communication/tutorialrank.comjonhson268
 
Contractor management slides #1 unit1& 2
Contractor management slides #1 unit1& 2 Contractor management slides #1 unit1& 2
Contractor management slides #1 unit1& 2 Michael Shellshear
 
CIS 527 Entire Course NEW
CIS 527 Entire Course NEWCIS 527 Entire Course NEW
CIS 527 Entire Course NEWshyamuopuop
 
Module 2 information security risk management student slides ver 1.0
Module 2 information security risk management    student slides ver 1.0Module 2 information security risk management    student slides ver 1.0
Module 2 information security risk management student slides ver 1.0Aladdin Dandis
 
Contractor management sect 2 unit 3
Contractor management sect 2 unit 3Contractor management sect 2 unit 3
Contractor management sect 2 unit 3Michael Shellshear
 
Disaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an EmergencyDisaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an Emergencysco813f8ko
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
Process Safety Bulletin Sep 2015
Process Safety Bulletin Sep 2015Process Safety Bulletin Sep 2015
Process Safety Bulletin Sep 2015Aamish J. Khan, CSP
 
Process Safety Booklet 1st issue Dec2014 FINAL
Process Safety Booklet 1st issue Dec2014 FINALProcess Safety Booklet 1st issue Dec2014 FINAL
Process Safety Booklet 1st issue Dec2014 FINALAamish J. Khan, CSP
 
IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesSlideTeam
 
2002 ibc - Assessing the safety of staffing arrangements
2002 ibc - Assessing the safety of staffing arrangements2002 ibc - Assessing the safety of staffing arrangements
2002 ibc - Assessing the safety of staffing arrangementsAndy Brazier
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAPPECB
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 

What's hot (19)

Article on Emergency Management and Corporate Certification
Article on Emergency Management and Corporate CertificationArticle on Emergency Management and Corporate Certification
Article on Emergency Management and Corporate Certification
 
Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...
Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...
Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0
 
CMGT 400 Effective Communication/tutorialrank.com
 CMGT 400 Effective Communication/tutorialrank.com CMGT 400 Effective Communication/tutorialrank.com
CMGT 400 Effective Communication/tutorialrank.com
 
Contractor management slides #1 unit1& 2
Contractor management slides #1 unit1& 2 Contractor management slides #1 unit1& 2
Contractor management slides #1 unit1& 2
 
CIS 527 Entire Course NEW
CIS 527 Entire Course NEWCIS 527 Entire Course NEW
CIS 527 Entire Course NEW
 
7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan
 
Module 2 information security risk management student slides ver 1.0
Module 2 information security risk management    student slides ver 1.0Module 2 information security risk management    student slides ver 1.0
Module 2 information security risk management student slides ver 1.0
 
Contractor management sect 2 unit 3
Contractor management sect 2 unit 3Contractor management sect 2 unit 3
Contractor management sect 2 unit 3
 
Disaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an EmergencyDisaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an Emergency
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Process Safety Bulletin Sep 2015
Process Safety Bulletin Sep 2015Process Safety Bulletin Sep 2015
Process Safety Bulletin Sep 2015
 
Process Safety Booklet 1st issue Dec2014 FINAL
Process Safety Booklet 1st issue Dec2014 FINALProcess Safety Booklet 1st issue Dec2014 FINAL
Process Safety Booklet 1st issue Dec2014 FINAL
 
IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation Slides
 
2002 ibc - Assessing the safety of staffing arrangements
2002 ibc - Assessing the safety of staffing arrangements2002 ibc - Assessing the safety of staffing arrangements
2002 ibc - Assessing the safety of staffing arrangements
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Erm talking points
Erm talking pointsErm talking points
Erm talking points
 
SHEA-AR2003
SHEA-AR2003SHEA-AR2003
SHEA-AR2003
 

Similar to Achieving Enterprise Resiliency and Compliance

Achieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate CertificationAchieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate CertificationThomas Bronack
 
Dcag service optimization offering01
Dcag service optimization offering01Dcag service optimization offering01
Dcag service optimization offering01Thomas Bronack
 
Optimizing the IT and Business Environment
Optimizing the IT and Business EnvironmentOptimizing the IT and Business Environment
Optimizing the IT and Business EnvironmentThomas Bronack
 
Achieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate CertificationAchieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate CertificationThomas Bronack
 
Achieving enterprise resiliency and corporate certification through the use o...
Achieving enterprise resiliency and corporate certification through the use o...Achieving enterprise resiliency and corporate certification through the use o...
Achieving enterprise resiliency and corporate certification through the use o...Thomas Bronack
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recoveryKrutiShah114
 
Covid19 hort business_survival_guide
Covid19 hort business_survival_guideCovid19 hort business_survival_guide
Covid19 hort business_survival_guideChrisGamuyao1
 
Optimizing the it and business environment through dashboards
Optimizing the it and business environment through dashboardsOptimizing the it and business environment through dashboards
Optimizing the it and business environment through dashboardsThomas Bronack
 
Business Continuity Getting Started
Business Continuity Getting StartedBusiness Continuity Getting Started
Business Continuity Getting Startedmxp5714
 
Ensuring Business Continuity in the cloud
Ensuring Business Continuity in the cloudEnsuring Business Continuity in the cloud
Ensuring Business Continuity in the cloudKrzysztofKkol1
 
BCP – How to develop BCP strategies and Plans 2016.pptx
BCP – How to develop BCP strategies and Plans 2016.pptxBCP – How to develop BCP strategies and Plans 2016.pptx
BCP – How to develop BCP strategies and Plans 2016.pptxFerriFatra1
 
Covid19 Business Guide
Covid19 Business GuideCovid19 Business Guide
Covid19 Business GuideChrisGamuyao1
 
A to Z of Business Continuity Managment
A to Z of Business Continuity ManagmentA to Z of Business Continuity Managment
A to Z of Business Continuity ManagmentMark Conway
 
COM-CON Session Topics, Audiences, and Presentation Types
COM-CON Session Topics, Audiences, and Presentation Types COM-CON Session Topics, Audiences, and Presentation Types
COM-CON Session Topics, Audiences, and Presentation Types LynellBull52
 
Business continuity plan
Business continuity planBusiness continuity plan
Business continuity planSafwan Hashmi
 
Topic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxTopic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxjuliennehar
 
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdfBronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdfThomasBronack
 
The Surprising Truth About Your Disaster Recovery Maturity Level
The Surprising Truth About Your Disaster Recovery Maturity LevelThe Surprising Truth About Your Disaster Recovery Maturity Level
The Surprising Truth About Your Disaster Recovery Maturity LevelAxcient
 
Incident managment plan
Incident managment planIncident managment plan
Incident managment planSafwan Hashmi
 

Similar to Achieving Enterprise Resiliency and Compliance (20)

Achieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate CertificationAchieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate Certification
 
Dcag service optimization offering01
Dcag service optimization offering01Dcag service optimization offering01
Dcag service optimization offering01
 
Optimizing the IT and Business Environment
Optimizing the IT and Business EnvironmentOptimizing the IT and Business Environment
Optimizing the IT and Business Environment
 
Achieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate CertificationAchieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate Certification
 
Achieving enterprise resiliency and corporate certification through the use o...
Achieving enterprise resiliency and corporate certification through the use o...Achieving enterprise resiliency and corporate certification through the use o...
Achieving enterprise resiliency and corporate certification through the use o...
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recovery
 
Covid19 hort business_survival_guide
Covid19 hort business_survival_guideCovid19 hort business_survival_guide
Covid19 hort business_survival_guide
 
Optimizing the it and business environment through dashboards
Optimizing the it and business environment through dashboardsOptimizing the it and business environment through dashboards
Optimizing the it and business environment through dashboards
 
Business Continuity Getting Started
Business Continuity Getting StartedBusiness Continuity Getting Started
Business Continuity Getting Started
 
Ensuring Business Continuity in the cloud
Ensuring Business Continuity in the cloudEnsuring Business Continuity in the cloud
Ensuring Business Continuity in the cloud
 
DDHI Board Report.ppsx
DDHI Board Report.ppsxDDHI Board Report.ppsx
DDHI Board Report.ppsx
 
BCP – How to develop BCP strategies and Plans 2016.pptx
BCP – How to develop BCP strategies and Plans 2016.pptxBCP – How to develop BCP strategies and Plans 2016.pptx
BCP – How to develop BCP strategies and Plans 2016.pptx
 
Covid19 Business Guide
Covid19 Business GuideCovid19 Business Guide
Covid19 Business Guide
 
A to Z of Business Continuity Managment
A to Z of Business Continuity ManagmentA to Z of Business Continuity Managment
A to Z of Business Continuity Managment
 
COM-CON Session Topics, Audiences, and Presentation Types
COM-CON Session Topics, Audiences, and Presentation Types COM-CON Session Topics, Audiences, and Presentation Types
COM-CON Session Topics, Audiences, and Presentation Types
 
Business continuity plan
Business continuity planBusiness continuity plan
Business continuity plan
 
Topic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxTopic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docx
 
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdfBronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
 
The Surprising Truth About Your Disaster Recovery Maturity Level
The Surprising Truth About Your Disaster Recovery Maturity LevelThe Surprising Truth About Your Disaster Recovery Maturity Level
The Surprising Truth About Your Disaster Recovery Maturity Level
 
Incident managment plan
Incident managment planIncident managment plan
Incident managment plan
 

More from Thomas Bronack

Personnel Productivity System - Exec Pres
Personnel Productivity System - Exec PresPersonnel Productivity System - Exec Pres
Personnel Productivity System - Exec PresThomas Bronack
 
Utilizing Dashboards to improve efficiency
Utilizing Dashboards to improve efficiencyUtilizing Dashboards to improve efficiency
Utilizing Dashboards to improve efficiencyThomas Bronack
 
Dcag training on VMware DR Process
Dcag training on VMware DR ProcessDcag training on VMware DR Process
Dcag training on VMware DR ProcessThomas Bronack
 
Enterprise resiliency and world-wide compliance, in-depth article.
Enterprise resiliency and world-wide compliance, in-depth article.Enterprise resiliency and world-wide compliance, in-depth article.
Enterprise resiliency and world-wide compliance, in-depth article.Thomas Bronack
 
Auditing contingency Plans
Auditing contingency PlansAuditing contingency Plans
Auditing contingency PlansThomas Bronack
 
Equipment Redeployment and Termination Procedures
Equipment Redeployment and Termination ProceduresEquipment Redeployment and Termination Procedures
Equipment Redeployment and Termination ProceduresThomas Bronack
 
Updated Healthcare Industry Compliance Presentation
Updated Healthcare Industry Compliance PresentationUpdated Healthcare Industry Compliance Presentation
Updated Healthcare Industry Compliance PresentationThomas Bronack
 
Executive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry complianceExecutive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry complianceThomas Bronack
 
Personnel Productivity System - Updated 6-6-2013
Personnel Productivity System - Updated 6-6-2013Personnel Productivity System - Updated 6-6-2013
Personnel Productivity System - Updated 6-6-2013Thomas Bronack
 
Asset Management (Acquisition, Redeployment, and Termination)(
Asset Management (Acquisition, Redeployment, and Termination)(Asset Management (Acquisition, Redeployment, and Termination)(
Asset Management (Acquisition, Redeployment, and Termination)(Thomas Bronack
 
Application migration guideline document
Application migration guideline documentApplication migration guideline document
Application migration guideline documentThomas Bronack
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisThomas Bronack
 

More from Thomas Bronack (12)

Personnel Productivity System - Exec Pres
Personnel Productivity System - Exec PresPersonnel Productivity System - Exec Pres
Personnel Productivity System - Exec Pres
 
Utilizing Dashboards to improve efficiency
Utilizing Dashboards to improve efficiencyUtilizing Dashboards to improve efficiency
Utilizing Dashboards to improve efficiency
 
Dcag training on VMware DR Process
Dcag training on VMware DR ProcessDcag training on VMware DR Process
Dcag training on VMware DR Process
 
Enterprise resiliency and world-wide compliance, in-depth article.
Enterprise resiliency and world-wide compliance, in-depth article.Enterprise resiliency and world-wide compliance, in-depth article.
Enterprise resiliency and world-wide compliance, in-depth article.
 
Auditing contingency Plans
Auditing contingency PlansAuditing contingency Plans
Auditing contingency Plans
 
Equipment Redeployment and Termination Procedures
Equipment Redeployment and Termination ProceduresEquipment Redeployment and Termination Procedures
Equipment Redeployment and Termination Procedures
 
Updated Healthcare Industry Compliance Presentation
Updated Healthcare Industry Compliance PresentationUpdated Healthcare Industry Compliance Presentation
Updated Healthcare Industry Compliance Presentation
 
Executive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry complianceExecutive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry compliance
 
Personnel Productivity System - Updated 6-6-2013
Personnel Productivity System - Updated 6-6-2013Personnel Productivity System - Updated 6-6-2013
Personnel Productivity System - Updated 6-6-2013
 
Asset Management (Acquisition, Redeployment, and Termination)(
Asset Management (Acquisition, Redeployment, and Termination)(Asset Management (Acquisition, Redeployment, and Termination)(
Asset Management (Acquisition, Redeployment, and Termination)(
 
Application migration guideline document
Application migration guideline documentApplication migration guideline document
Application migration guideline document
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysis
 

Recently uploaded

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Recently uploaded (20)

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Achieving Enterprise Resiliency and Compliance

  • 1. Achieving Enterprise Resiliency And Corporate Certification By Combining Recovery Operations through a Common Recovery Language and Recovery Tools, While adhering to Domestic and International Compliance Standards Created by: Thomas Bronack, CBCP Bronackt@dcag.com Phone: (718) 591-5553 Cell: (917) 673-6992 Created by: Thomas Bronack © Page: 1 Date: 25 April 2013
  • 2. Created by: Thomas Bronack © Page: 2 Date: 25 April 2013 Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Abstract • Are you utilizing your recovery personnel to achieve maximum protection? • Have you implemented a common recovery glossary of terms so that personnel speak the same language and can best communicate and respond to disaster events? • Is your company utilizing a common recovery management toolset? • Want to reduce disaster events, improve risk management, and insure fewer business interruptions through automated tools and procedures? • Does your company adhere to regulatory requirements in the countries that you do business in? • Can you monitor and report on security violations, both physical and data, to best protect personnel, data access, eliminate data corruption, support failover /failback operations, and protect company locations against workplace violence? • Are you protecting data by using backup, vaulting, and recovery procedures? • Can you recover operations in accordance to SLA/SLR and RTO/RPO? • Is your supply chain able to continue to provide services and products if a disaster event occurs through SSAE 16 (Domestic), SSAE 3402 (World)? • Do you coordinate recovery operations with the community and government agencies like OSHA, OEM, FEMA, Homeland Security, etc.? • Do you have appropriate insurance against disaster events? • Can you certify that applications can recover within High Availability (2 hours – 72 hours) or Continuous Availability (immediate) guidelines? • If not, this presentation will help you achieve the above goals.
  • 3. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 3 Date: 25 April 2013 What is Enterprise Resiliency and Corporate Certification The Road to Achieving Enterprise Resiliency: 1. Define Risks (Natural, Man-Made, End-User – refer to CERT RMM and COSO for direction); 2. Determine Compliance Requirements (see GLB, HIPAA, Patriot Act, EPA Superfund, OSHA, NFPA 1600, DHS, and OEM, etc.); 3. Use “Best Practices” tools and procedures (CobIT, ITIL, etc.); 4. Understand road to “Corporate Certification” (DRII, BCI) and domestic and international compliance laws / regulations; 5. Locate Certification Firms / Organizations (“Training the Trainers” is available now) for “Checks and Balances” / “Attestation”; 6. Develop a Business Plan and formulate a Management Direction within Project Initiation Directive defining Scope and Commitment. 7. Perform a Risk Assessment / BIA to define current risks, their costs, and your ability to implement controls to respond to risks; 8. Build Business Recovery Plans for Offices and Business Locations; 9. Build Disaster Recovery Plans to protect data centers and the IT Infrastructure; 10. Build Emergency Response Plans to protect against fires, floods, natural disasters, and man-made disasters; 11. Implement Workplace Violence Preventions Plans to protect personnel within business locations and provide a safe workplace; 12. Implement Physical Security and an Information Security Management System (ISMS) to protect the workplace and data; 13. Define Functional Responsibilities to determine what must be done and by who; 14. Create / Expand Job Descriptions to direct personnel in the Recovery Planning process; 15. Create / Update / Use Standards and Procedures Manuals, Usage Manuals, and required Documentation; and, 16. Provide Awareness and Educational Training, Support, and Maintenance (with Version & Release Management) going forward. Enterprise Resiliency combines all recovery operations into one discipline using a common language and tool set. Corporate Certification guarantees that the company complies with all laws in the countries they do business in. Enterprise Resiliency Emergency Operation Center (EOC) Emergency Management Business Continuity Management Workplace Violence Prevention Risk & Crisis Management Physical and Data Security
  • 4. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 4 Date: 25 April 2013 Business Continuity Management Disciplines and Integration Contingency Planning Disaster Recovery Risk Management Business Recovery Charter: Eliminate Business Interruptions; Ensure Continuity of Business; Minimize Financial Impact; and Adhere to Legal / Regulatory Requirements Information Technology Protection Critical Jobs; Data Sensitivity and Access Controls; Vital Records Management; Vaulting and Data Recovery; Recovery Time Objectives; Recovery Point Objectives; and Mainframe, Mid-Range, and Servers. Risk Management Exposures (Gaps and Exceptions); Insurance; Legal / Regulatory Requirements; Cost Justification; and Vendor Agreements. Corporate Asset Protection Inventory Control Asset Management Configuration Management Business Continuity; and Office Recovery. Contingency Recovery Disciplines Contingency Recovery Planning Facilities Executive Management Personnel General Services Public Relations Finance Auditing Company Operations Information Technology “Contingency Planning affects every part of the organization and is separated into logical work areas along lines of responsibility”. “These four Contingency Planning Disciplines allow for logical work separation and better controls” “Establishing interfaces with key departments will allow for the inclusion of corporate-wide recovery procedures (Security, Salvage, and Restoration, etc.) in department specific Recovery Plans” Suppliers Supply Chain safeguards must be enforced to maintain supply delivery and continued operations
  • 5. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 5 Date: 25 April 2013 Lifecycle of a Disaster Event (Why we create Recovery Plans) Secondary Site Primary Site Primary Site Disaster Event: • Event; • Analyze; • Declare; • Failover. Primary Site Safeguard: • Evacuate; • Protect Site; • First Responders. Primary Site Salvage: • Clean; • Repair; • Resupply. Primary Site Restoration: • Restart; • Test; • Success; • Failback. Primary Site Resume: • Reload Data; • Restart; • Continue. Failover Production Recovery Processing Production Site Salvage and Restoration Resume Production at Primary Site Failover Start Up Failback Shut Down High Availability (HA) is RTO / SLA based Switch Continuous Availability (CA) is immediate Switch Repair Primary Site to Resume Production via Failback CA HA Normal Production at Primary Site Production Production Switch
  • 6. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 6 Date: 25 April 2013 Charter and Mission Statement: 1. Insure Continuity of Business and Eliminate / Reduce Business Interruptions (Enterprise Resilience); 2. Assure “Corporate Certification” by complying with Regulatory Requirements for countries that you do business in, through Risk Management and Crisis Management guidelines (CERT / COSO); 3. Adhere to Service Level Agreements (SLA) through Service Level Reporting (SLR) and the use of Capacity and Performance Management procedures; 4. Implement Enterprise-Wide Recovery Management by combining Business Continuity Management (BCM), Disaster Recovery Planning (DRP), and Emergency Management (EM); 5. Utilize “Best Practices” to achieve “Enterprise Resiliency” (CobIT, ITIL, etc.); 6. Protect personnel and achieve physical security through Workplace Violence Prevention principals, laws, and procedures; 7. Guaranty data security through access controls and vital records management principals and procedures within an Information Security Management System (ISMS) based on ISO27000; 8. Achieve Failover / Failback and data management procedures to insure RTO, RPO, and Continuity of Business within acceptable time lines (Dedupe, VTL, Snapshots, CDP, NSS, RecoverTrak, etc.); 9. Integrate recovery management procedures within the everyday functions performed by personnel as defined within their job descriptions and the Standards and Procedures Manual; 10. Embed Recovery Management and ISMS requirements within the Systems Development Life Cycle (SDLC) used to Develop, Test, Quality Assure, Production Acceptance / Implement, Data Management, Support and Problem Management, Incident Management, Recovery Management, Maintenance, and Version and Release Management for components and supportive documentation; 11. Develop and provide educational awareness and training programs to inform personnel on how best to achieve the corporate mission.
  • 7. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 7 Date: 25 April 2013 Goals and Objectives: Protecting the Business Protecting Information Technology Eliminate / Reduce Business Interruption Insure Continuity of Business by certifying application recovery Conduct Risk Management and Insurance Protection reviews Provide Personnel Protections (HRM, Safe Workplace, and Employee Assistance Programs) Vendors - Supply Chain Management & Control (ISO 24672 / ISO 27031) Protect Clients (Products / Services) via adherence to SLA / SLR guidelines Locations / Infrastructure Community / Business / Personnel Lines of Business Physical / Data Security Compliance Recovery Management Optimized Operations Insurance Reputation Build IT Location (Safe Site, HVAC, Water, Electrical, Raised Floor, etc.) Asset Management (Asset Acquisition, Redeployment, and Termination) Configuration Management / Version and Release Management Use Best Practices like CERT / COSO, CobIT, ITIL.v3 Mainframe, Mid-Range, Client / Server, and PC safeguards Communications (Local, LAN, WAN, Internet, cloud) System Development Life Cycle (SDLC) optimization Products and Service Support Development, Enhancement Support and Maintenance for problems and enhancements Data Management (Dedupe/ VTL / Snapshots / CDP) Information Security Management System via ISO27000 Data Sensitivity and Access Controls (Applid / Userid / Pswd) Vaulting, Backup, and Recovery Disk / File copy retrieve utilities RTO, RPO, RTC
  • 8. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 8 Date: 25 April 2013 Risk Management: • Define Risk Management Process in accordance with COSO / CERT guidelines, including: • Internal Environment Review; • Objective Setting; • Event Identification; • Risk Assessment and Response Definitions; • Control Activities; • Information and Communications; and • Monitoring and Reporting. • Define Legal and Regulatory Requirements (Domestic and International as needed); • Determine OCC, Tax, and Industry compliance requirements; • Perform an IT Audit / Risk Assessment to uncover Gaps and Exceptions; • Define Mitigations and their Costs, along with data gathering and reporting guidelines; • Calculate cost of Mitigation against cost of Gap / Exception to prioritize responses; • Review Vendor Agreements for primary and secondary sites to eliminate / minimize Supply Chain interruptions ISO 24762, (SSAE 16, SSAE 3402, NIST 800-34) ISO 27031; • Obtain Insurance Quotes and select appropriate insurance protection; • Integrate within the everyday functions performed by personnel as outlines in their job descriptions and the Standards and Procedures Manual; and, • Develop documentation, awareness, and training materials.
  • 9. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 9 Date: 25 April 2013 • Formulate Recovery Management Business Plan, including: • Charter, Mission Statement, Scope and Deliverables; • Project Plan, Goals and Objectives, Functional Requirements and Skills, Task Descriptions, Timeline; • Management Support, Funding, and Announcement, with their “Strong Backing”. • Develop a Project Plan, Organization Structure, Job Functions; • Work Flow and Systems Development Life Cycle (SDLC); • Problem / Incident Management and Help Desk (Command Centers and EOC); • Change Management and Version and Release Management to repair problems and add enhancements; • Asset and Configuration Management; • Access Control and Library Management (Security, Backup / Recovery); • Service Level Agreements (SLA) / Service Level Reporting (SLR); and, • Recovery Time Objective (RTO) / Recovery Point Objective (RPO), and Recovery Time Capability (RTC). • Implement Recovery Document Library Management, including: • Private Personal and Group Drive for developing / sharing recovery information; • Public Drive containing: Recovery Plans , Training Materials, Glossary of Terms, and Continuity of Business Public Documents; • Backup / Recovery, VTL, Dedupe, Snapshots, Forward Recovery, Virtualization, and WAN optimization. • Identify and Train Recovery Management Coordinators from Business Units; • Subject Matter Experts supporting Business Units; and • Stakeholders and Participants. • Select automated Recovery Management and Integration Tools: • Risk Management Assessment, Business Impact Analysis; • Recovery Plan creations, and Recovery Plan testing from Table-Top to Recovery Certification; • Mitigate any Gaps & Exceptions; • Mediate any Obstacles Impeding Recovery Testing; • Repeat Testing – Repair – Testing Cycle until Recovery Certified; • Repeat testing until Gold Standard is reached via Flip / Flop ability (can run at Primary or Secondary site); • Integrate process within everyday functions performed by personnel. Establishing the Recovery Management and Enterprise Resiliency process
  • 10. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 10 Date: 25 April 2013 Achieving Enterprise Resiliency and Corporate Certification Process 1. Review existing Recovery Operations, including: • Emergency Management Preparedness; • Business Continuity and Disaster Recovery Management; • Workplace Violence Prevention; and, • Enterprise Security (Physical / Data). 2. Evaluate Command Centers and how they interact with Recovery Operations, including: • Emergency Operations Center (EOC); • Incident Command Center (ICC); • Help Desk (HD); • Network Command Center (NCC); and, • Operations Command Center (OCC). 3. Define Company Lines of Business (LOB’s), including: • Business Functions, Products, and Services provided; • Locations and Personnel; • Customers and Suppliers; • Applications and Business Processes; and, • Existing Evacuation, Crisis Management, and Recovery Operations. 4. Document Integration Requirements, including: • Service Level Agreements (SLA) and Service Level Reporting (SLR); • Systems Development Life Cycle (SDLC) and Workflow Management; • Use of Best Practices Tools and Procedures like COSO, CobIT, and ITIL; • Ensure adherence to Regulatory Requirements, and Security Requirements (Domestic & International); and • Define Functional Responsibilities, Job Descriptions, Standards and Procedures. 5. Create Business and Implementation Plan, including: • Mission Statement, Goals and Objectives, Assumptions, and Scope and Deliverables; • Gain Management approval through written report and presentation, then initiate project; • Develop a Detailed Project Plan with tasks, deliverables, time frame, costs, and resource requirements; • Define Functional Responsibilities, Standards and Procedures, and Job Descriptions for personnel; • Establish Support, Maintenance, Change Management, and Version and Release Management procedures; and, • Provide Oversight, Awareness, and Training.
  • 11. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 11 Date: 25 April 2013 Foundation consist of: Enterprise Resiliency; Risks and Compliance issues; Corporate Certification Guidelines; Best Practices; Available Tools; and Certification Firm. Workplace Violence Prevention Threats; Predators; Violent Events; and Employee Assistance Programs. Best Practices consist of: COSO / CobIT / ITIL; ISO 27000; and FFIEC, etc. Enterprise Resiliency consist of: Emergency Management; Business Continuity Management; Workplace Violence Prevention; Workflow Management; Functional Responsibilities; Job Descriptions; and Standards and Procedures. Corporate Certification consist of: BS 25999 / ISO 22301; Private Sector Preparedness Act; CERT Enterprise RMM Framework; and NFPA 1600. Physical Security and Access Controls Global Standards include: ISO 22300 – Global Standard; NYSE 446; SS 540 (Singapore); ANZ 5050 (Australia) BC Guidelines (Japan); and more. House of Enterprise Resilience Enterprise Resiliency must be built upon a Solid Foundation
  • 12. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 12 Date: 25 April 2013 -confidential- Building Your Team & Capabilities Staff / Management Awareness & Training Training Matrix & Master PlanShort Training SessionsWorkshops / Awareness Sessions Organizational Roles Incorporate R&R into JD’sDefining Roles & ResponsibilitiesDefining the Committees & Teams Continual Improvement Testing & Review Update Review Testing Implementation Emergency Response Damage Assessment Life & Safety Crisis Mgmt Plan Development Procedure Development Checklist Development Contact Information Escalation & Notification Disaster Declaration Data & Record Recovery Understanding Your Business Requirements & Strategy Policies Business Impact Risk Assessment Continuity Strategies Initiation Program Management Project Statement Timeline Maturity Assessment Preventive Measures Assurance DEFINE OVERALL IMPLEMENTATION APPROACH
  • 13. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 13 Date: 25 April 2013 COSO Risk Assessment Committee Of Sponsoring Organizations (COSO) was formed to develop Risk Management and Mitigation Guidelines throughout the industry. Designed to protect Stakeholders from uncertainty and associated risk that could erode value. A Risk Assessment in accordance with the COSO Enterprise Risk Management Framework, consists of (see www.erm.coso.org for details): • Internal Environment Review, • Objective Setting, • Event Identification, • Risk Assessment, • Risk Response, • Control Activities, • Information and Communication, • Monitoring and Reporting. Creation of Organizational Structure, Personnel Job Descriptions and Functional Responsibilities, Workflows, Personnel Evaluation and Career Path Definition, Human Resource Management. Implementation of Standards and Procedures guidelines associated with Risk Assessment to guaranty compliance to laws and regulations. Employee awareness training, support, and maintenance going forward.
  • 14. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 14 Date: 25 April 2013 CobiT Framework Control Objectives for Information Technology (CobiT) Is designed to extend COSO controls over the IT environment by: • Providing guidelines for Planning and integrating new products and services into the IT Organization • Integrating new acquisitions; • Delivering new Acquisitions / Mergers and supporting them going forward; • Monitoring IT activity, capacity, and performance; so that • Management can meet Business Objectives, while protecting Information and IT Resources. CobiT Business Objectives Information IT Resources Monitoring and Reporting Delivery and Support Acquisition and Implementation Planning and Organization IT Plan Information Architecture Technology Direction IT Organization and Relationships Manage IT investment Communicate Management Goals and Direction Manage Human Resources Ensure Compliance with External Requirements Assess Risks Manage Projects Manage Quality Manage The Process Assess Internal Control Adequacy Obtain Independent Assurance Provide for Independent Audit Define Service Levels Manage third party services Manage Performance and Capacity Ensure continuous service Identify and attribute costs Educate and train users Assist and advise IT customers Manage the configuration Manage problems and incidents Manage Data Manage Facilities Manage Operations Identify Solutions, Acquire and maintain application software, Implement Asset Management procedures for acquisition, redeployment, and termination of resources, Develop and maintain IT procedures, Install and accept systems, Manage change. CobiT Framework and Functionality Criteria Effectiveness Efficiency Confidentiality Integrity Availability Compliance Reliability Data Application Systems Technology Facilities People
  • 15. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 15 Date: 25 April 2013 ITIL V3 Overview 3. Service Transition • Change Management • Project Management (Transition Planning and Support) • Release and Deployment Management (V & R Mgmnt) • Service Validation and Testing • Application Development and Customization • Service Asset and Configuration Management • Knowledge Management 4. Service Operation • Event Management • Incident Management • Request Fulfillment • Access Management • Problem Management • IT Operations Management • Facilities Management 1. Service Strategy • Service Portfolio Management (available Services and Products) • Financial Management (PO, WO, A/R, A/P, G/L, Taxes and Treasury) 2. Service Design • Service Catalogue Management • Service Level Management (SLA / SLR) • Risk Management (CERT / COSO) • Capacity and Performance Management • Availability Management (SLA / SLR) • IT Service Continuity Management (BCM) • Information Security Management (ISMS) • Compliance Management (Regulatory) • Architecture Management (AMS, CFM) • Supplier Management (Supply Chain) ITIL Available Modules ITIL Five Phase approach to IT Service Support 1. Service Strategy, 2. Service Design, 3. Service Transition, 4. Service Operation, and 5. Continual Service Improvement.
  • 16. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 16 Date: 25 April 2013 Compliance Laws that must be adhered • Gramm Leach Bliley – Safeguard Act (was Bank Holding Act); • Dodd – Frank – Wall Street Reform and Consumer Protection Act; • HIPAA – Healthcare regulations (including ePHI, HITECH, and Final Ombudsman Rule); • Sarbanes – Oxley Act (sections 302, 404, and 409) on financial assessment and reporting by authorized “Signing Officer”; • EPA and Superfund (how it applies to Dumping and Asset Management Disposal); • Supply Chain Management “Laws and Guidelines” included in ISO 24762 (SSAE 16 for Domestic compliance and SSAE 3402 for International Compliance, and NIST 800-34); • Supply Chain Management “Technical Guidelines” described in ISO 27031; • Patriots Act (Know Your Customer, Money Laundering, etc.); • Workplace Safety and Violence Prevention via OSHA, OEM, DHS, and governmental regulations (State Workplace Guidelines and Building Requirements); • Income Tax and Financial Information protection via Office of the Comptroller of the Currency (OCC) regulations (Foreign Corrupt Practices Act, OCC-177 Contingency Recovery Plan, OCC-187 Identifying Financial Records, OCC-229 Access Controls, and OCC-226 End User Computing).
  • 17. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 17 Date: 25 April 2013 Laws and Regulations concentrate on the VALIDITY of PROVIDED DATA, so we start with a review of how sensitive data is described, created, protected, and used, including: • Identify the lifecycle of data used in financial reporting and compliance; • Where does it come from and who owns it? • What form is it in (Excel, Database, manual, fax, email, etc.), • Who has access to the data and how can they impact data (CRUD - create, read, update, and delete). • Review current Data Sensitivity and IT Security procedures; • Examine Library Management, Backup, Recovery, and Vaulting procedures associated with sensitive data; • Review Business Continuity Planning and Disaster Recovery procedures used to protect and safeguard critical Information Technology and Business facilities; • Utilize existing Standards and Procedures to duplicate process and identify errors; and, • Examine the available Employee Awareness and Education programs. As a result of this study, it will be possible to identify weaknesses and develop procedures to overcome the weaknesses, thereby improving data efficiency and productivity. How do we comply?
  • 18. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 18 Date: 25 April 2013 Vendor DR DR Process ISO 24762 End ISO 27031 DR Testing SSAE 16 Domestic SSAE 3402 International NIST 800-34 Technical End User IT DR Plans Risk Assessment Business Impact Analysis Certifying Vendor Recovery Plans and Validating Supply Chain resiliency Recognize DR Event Respond To Event Salvage & Restoration Return to Primary Site Initial Testing After Change After Enhancement After Growth Include Vendors Use Primary & Secondary Sites Laws and Guidelines Technical Guidelines
  • 19. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 19 Date: 25 April 2013 How reporting is accomplished Operations Risk Manager Operations Risk Manager Technical Risk Manager Chief Executive Officer (CEO) Chief Financial Officer (CFO) Compliance Reports Company Operations Technical Services Executive Management Compliance Reporting Section 404 of the Sarbanes-Oxley Act (SOX) says that publicly traded companies must establish, document, and maintain internal controls and procedures for Financial and Compliance reporting. It also requires companies to check the effectiveness of internal controls and procedures for Financial and Compliance reporting. In order to do this, companies must: • Document existing controls and procedures that relate to financial reporting. • Test their effectiveness. • Report on any gaps or poorly documented areas, then determine if mitigation should be performed. • Repair deficiencies and update any Standards and Procedures associated with the defects. - Extract Information, - Generate Financial Reports, - Ensure Record Safeguards, - Ensure Record Formats, - Generate Compliance Reports, - Validate Information, - Submit Reports. - Protect Information, - Data Security, - Access Controls, - Library Management, - Production Acceptance, - Version and Release Mgmt., - Business Continuity, - Disaster Recovery, - Emergency Management, - Standards and Procedures. - Validate Information, - Establish Reporting Criteria, - Gather data and report, - Review Reports, - Attest to their accuracy, - Submit Reports. - Report Information, - Submitted Quarterly, - Attested to Annually, - Reviewed by SEC and other agencies to insure compliance.
  • 20. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 20 Date: 25 April 2013 • Review of Compliance Requirements (Business and Industry) • Ensure Data Sensitivity, IT Security and Vital Records Management, • Eliminate Data Corruption and Certify HA / CA Application recovery, • Adhere to Systems Development Life Cycle (SDLC), • Utilize Automated Tools whenever practicle, • Elimination of Single-Point-Of-Failure concerns, • Create Inventory / Configuration / Asset Management guidelines, • Develop Incident / Problem and Crisis Management procedures, • Integrate Work-Flow automation through Re-Engineering processes, • Implement and conduct Training and Awareness programs. Strategies for Eliminating Audit Exceptions
  • 21. Achieving Recovery Time Objective (RTO) / Recovery Point Objective (RPO) and Recovery Time Capability (RTC) Disaster Event Recovery Point Objective (RPO) Recovery Time Objective (RTO) Recovery Time Capability (RTC) Production Processing CA Immediate switch to Secondary Site HA Certified Recovery to Secondary Site Reload Last Backup Or Snapshot Production Processing Interrupted Data Forward Recovery Planned Recovery Time Time needed to Recover Data saved in last good Backup or Snapshot (Restore Duration will vary) Actual Time needed to Recover Extended Loss Production Processing Resumed Secondary Site must contain synchronized data and infrastructure Primary Site recovers data and infrastructure within RTO Other Terms include: RTE – Recovery Time Expectation; RPE – Recovery Point Expectation; and SRE – Service Recovery Expectation. Loss equals Actual Time needed to Recover, costs for staff, loss of client productivity, and damage to corporate reputation. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 21 Date: 25 April 2013 CA Gold Standard HA Recovery Certification
  • 22. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 22 Date: 25 April 2013 Optimized Protection / Recovery Data Services Snapshots Data De-duplication eliminates duplicate data files and network traffic to a Virtual Tape Library (VTL) Real backup tapes can be created directly from the VTL. Forward Recovery between Snapshots
  • 23. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 23 Date: 25 April 2013 Store and Forward concept for data transmission / reception and achieving Recovery Certification and the Flip / Flop Gold Standard Data End User Application Primary System Access Method NC NO System Application Secondary System Access Method Switch Telco Data Modem Switch Line Switch Exchange Switch Telco Tests: • Internal Modem Test; • End-to-End Continuity Test; and, • Data Transmission Testing. Data is Transmitted via Read / Write or Get / Put command and placed in originating data buffer. Data is safeguarded via backup / recover within RTO time frame required. Use of Dedupe, VTL, CDS, and High Speed WAN can speed data recovery to within dictated recovery time frames. If Primary System fails you should be able to “Failover” to a Secondary System and return via “Failback” operation. Flip / Flop is when you can run operations from either site if desired. Data is passed through the System to the Access Method for transmission. Data Buffer is maintained until a “Positive Acknowledgement” is received. Retries occur when “Negative Acknowledgements” are received. If retry threshold is reached, error message is presented and corrective actions can be taken. Because Data stays in “Originating” buffer until a “Positive Acknowledgement” is received, it is protected from loss. If failure occurs, data is not transmitted and error message generated so that recovery and corrective actions can be performed. Switches are used to select secondary paths when errors occur, so elimination of “Single Point of Failure” is a critical issue. NC NO Switch HA / CA Availability, Failover / Failback “Certification”, And Flip / Flop “Gold Standard”
  • 24. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Management Commitment Risk Management Business Impact Analysis BIA Select BCM Tools Recognize the Need for Recovery (Business Loss) Initiate Recovery Executive Committee Define Goals And Objectives Obtain Funding Compliance & Regulatory Needs Audit Controls Supply Chain Gaps & Exceptions SLA’s / SLR Insurance Cost to Repair Mediate / Mitigate Location & Applications Rate Criticality RTO, RPO, RTC Rate Ability to Achieve Recovery Goals Gaps & Exceptions Cost to Repair Automated BCM Tool? BIA & Plan Creation Train Staff Create, Test, & Implement BCM Plans Start A Creating Business Recovery Plans Mediate / Mitigate Impeding Obstacles Created by: Thomas Bronack © Page: 24 Date: 25 April 2013
  • 25. A Define Critical Applications Substantiation Recovery Testing Mediation / Mitigation High Availability And Continuous Availability Identify Stakeholders and Contributors Design Meeting Agenda and Deliverables Schedule & Conduct Meetings Validate Application Criticality (SLA) Use Artifacts to support criticality and RTO / RPO Any Gaps & Exceptions found? Architectural Assessment to locate Obstacles Mediate / Mitigate Impeding Obstacles, Gaps & Exceptions until application is able to be Tested Test Applications & Secondary Site Certify HA Recovery or CA Gold Standard Define Obstacles That Impede Gaps & Exceptions? Failed Applications Obstacles & Impediments Define Repair Costs Re-Test Application until Certified, if possible End Re-Test Application Until Certified Attestation Letter High Availability and Continuous Availability Certification Mediate / Mitigate Mitigate / Mitigate OK OK OK OK Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com (This process should be performed periodically to insure recoverability after changes) Created by: Thomas Bronack © Page: 25 Date: 25 April 2013
  • 26. Compliance to Country Laws and Regulations Infrastructure & Suppliers capable of supporting needs Hardware capable of supporting workload processing Software capable of supporting workload processing Recovery Plans and Personnel Procedures need improvement Gaps & Exceptions Mitigate Obstacles & Impediments Mediate Test HA Recovery Certification Failure Success Testing High Availability (HA) and Continuous Availability (CA) for Recovery Certification and ability to Flip / Flop between Primary and Secondary Sites Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Ready for Testing Ready for Re-Testing Problem Repaired The Road to Successful Recovery Certification Testing Failure Loop, until Successful Recovery Certification Created by: Thomas Bronack © Page: 26 Date: 25 April 2013 CA Gold Standard
  • 27. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 27 Date: 25 April 2013 Development Testing Release And Version Control Business Recovery Facility Disaster Recovery Facility Off-Site Vault End-User Request for New Product Or Service On-Line Data Files BKUP Unit and System Testing Quality Assurance Naming, Documents, and Placement Security, Vital Records, Back-up, Recovery, Audit. Production Acceptance On-Line Data Files BKUP Security, Vital Records, Back-up, Recovery, Audit. Production On-Line Data Files BKUP Vendor SiteVendor Site Change Management Maintenance Enhance And Repair Periodic Real-Time End-User Defines: • Business Purpose, • Business Data, • Ownership, • Sensitivity, • Criticality, • Usage, • Restrictions, • Back-Up, and • Recovery. Company or Client Site End-User Location Update Recovery New Systems Development Life Cycle (SDLC), Components and flow
  • 28. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 28 Date: 25 April 2013 Disaster Recovery Site Development Maintenance Testing and Quality Assurance Development And Maintenance Environments Company Data Electronic Transmission Electronic Transmission Systems Development Life Cycle (SDLC) New ApplicationsEnd User “Work Order” to create a new Product or Service Open Network With Multiple Access Points Remote Locations Production Site #2 Customers; Credit Bureaus; Feed-Files; and, Other Locations. Physically Transported Using Tape Only Encryption Problem Resolution And Enhancements Send Approved Applications To Production Acceptance Cloud Computing Local Sites Local Tape / Data Vault Local Tape / Data Vault Remote Tape / Data Vault Production Site #1 Electronic Vaulting; Incremental Vaulting; and, Electronic transmission to Disaster Recovery Site Local SitesEncryption of “Data at Rest” to Provide Total Protection Overview of the Enterprise Information Technology Environment Encrypting Data-In- Movement will protect data being transmitted to remote sites Business Locations IT Locations Physical / Cloud Physical / Virtual
  • 29. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 29 Date: 25 April 2013 Fully Integrated Recovery Operations and Disciplines (Physical End Goal) Business Continuity Management Emergency Operations Center (EOC) Emergency Response Management Network Command Center Operations Command Center Help Desk Risk Management Disaster and Business Recovery Crisis Management Workplace Violence Prevention Incident Command Center First Responders (Fire, Police & EMT) Department of Homeland Security (DHS) State and Local Government Office of Emergency Management (OEM) Lines of Business Locations Employees Customers Suppliers Contingency Command Center Command Centers Corporate Certification Private Sector Preparedness Act (Domestic Standard) BS 25999 / ISO 22301 (International Standard) National Fire Prevention Association Standard 1600 Business Integration Service Level Agreements and Reporting Systems Development Life Cycle Six Sigma / Standards and Procedures COSO / CobIT / ITIL / FFIEC Workplace Violence Prevention CERT Resiliency Engineering Framework Information Security Management System (ISMS) based on ISO 27000 ISO2700 Security Standards OSHA, DHS, OEM, Workplace Safety A fully integrated recovery organization will include the components shown in this picture. Corporate Certification is achieved through the compliance laws and regulations used to provide domestic and international guidelines that enterprises must adhere to before they can do business in a country. Workplace Violence Prevention and Information Security is adhered to by implementing guidelines to protect personnel and data by following the latest guidelines related to these topics. Internal command centers responsible for monitoring operations, network, help desk, and the contingency command center will provide vital information to the Emergency Operations Center staff. Organizational departments, locations, and functions should be identified and connections provided to the EOC so that communications and coordination can be achieved in a more accurate and speedy manner. Using this structure will help organizations better collect recovery information and develop recovery operations to lessen business interruptions and protect the company’s reputation.
  • 30. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 30 Date: 25 April 2013 Fully Integrated Resiliency Operations and Disciplines (Logical End Goal) • State and Local Government, • First Responders (Fire, Police, & EMT), • Department of Homeland Security (DHS), • Office of Emergency Management (OEM), • Local Community. • Risk Management (COSO), • Disaster Recovery, • Business Continuity, • Crisis Management, • Emergency Management, • Workplace Violence Prevention, • Failover / Failback, • Protection, Salvage & Restoration. Private Sector Preparedness Act (Domestic Standard) CERT Resiliency Engineering Framework, ITIL and COSO ISO22313 and ISO22318 (International Standard) National Fire Prevention Association 1600 Standard Contingency Command Center (CCC) Incident Command Center (IC) Help Desk (HD) Operations Command Center (OCC) Network Command Center (NCC) Corporate Certification Command Centers Information Security Management System (ISMS) based on ISO27000 Workplace Violence Prevention Emergency Operations Center (EOC) Lines of Business Emergency Response Management Business Continuity Management Business Integration • Locations, • Employees, • Infrastructure, • Equipment, • Systems, • Applications, • Services, • Supplies, • Customers, • RTO, RPO, and RTC. • Service Level Agreements (SLA) & Reporting (SLR), • Systems Development Life Cycle (SDLC), • CobIT, ITIL, and FFIEC, • ISO Guidelines, • Audit and Human Resources, • Six Sigma or Equivalent for Performance and Workflow Management Office of the Controller of the Currency OSHA, OEM, DHS
  • 31. Achieving Enterprise Resiliency and Corporate Certification © Thomas Bronack bronackt@dcag.com Created by: Thomas Bronack © Page: 31 Date: 25 April 2013 Where do we go from here • Allow us to present to your management and technical staffs to review the subject and determine your needs. • Agree that you want to achieve Enterprise Resiliency and Corporate Certification. • Allow us to work with your staff to perform a Risk Assessment that will define your needs, which we will deliver to management as a written report and presentation. • Obtain management approval to initiate the project with their strong support. • Identify Stakeholders and Participants. • Formulate teams and train them on the goals and objectives of this project. • Create a detailed Project Plan and have teams work towards achieving the deliverables described in the document, within the stated time frame and costs. • Develop, Test, Implement “Proof of Concept”, gain approval and then: “Rollout” Enterprise Resiliency and Corporate Certification to all locations. • Fully document and Integrate the Standards and Procedures associated with Enterprise Resiliency and Corporate Certification, Functional Responsibilities, Job Descriptions, Security Procedures, and Recovery Plans within the everyday functions performed. • Deliver Awareness and Training services. • Provide Support and Maintenance services going forward.