SlideShare a Scribd company logo
1 of 57
Download to read offline
Business Continuity
Plan
To Protect your
Critical Services
Yusuf Hadiwinata Sutandar
Linux Geek, Opensource Enthusiast, Security Hobbies
RHCT, RHCSAv5-v7, RHCEv5-v7, RHCVA, RHCI, RHCX, RHCSA-RHOS, RHCJA, CEI,
CEH, CHFI, CND, EDRP, CCNA, MCTCNA, Security+, Network+, VCA, vExpert 2017-
2018
Senior Operation Manager Technology
Key-Service For Your Business
Business is shifting in the digital age
Key-Service For Your Business
The Role IT Play in Digital Transformation Initiatives
and Powers Business Growth
These four constituents are:
• IT Organization - Defines the scope of digital transformation and business continuity.
• Cloud service providers - Ensures service consistency in cloud-driven digital workplace.
• Systems integrators - Share expert perspective and guidance.
• Systems and software vendors - Ensure technology fits the need.
Key-Service For Your Business
Digital Transformation not just solve lot of problem,
but also generate new problem
Now, Business rely on Information Technology
Key-Service For Your Business
What would happen if…
• A hurricane hit?
• A fire occurred?
• Power was interrupted?
• What would you do?
• What would a business do?
Key-Service For Your Business
An Example of Disaster
Key-Service For Your Business
Not just an IT issue!
Key-Service For Your Business
What is a Business Continuity?
"Is the capability of the organization to continue delivery
of products or services at acceptable predefined levels
following a disruptive incident.
(Source: ISO 22313/22301)"
Key-Service For Your Business
Why Should we do Business Continuity Planning
(BCP)?
• To ensures compliance with our ever-increasing
regulatory requirements
• To enhances our ability to avoid:
Goal: To prevent disruptions in business operations
• Financial losses
• Regulatory fines
• Damage to equipment
Key-Service For Your Business
BCP & DRP Triangle
Data Backup and Replication
Alternative Site
IT Recovery Process
Validation & Testing
Business Continuity Plans
Risk Management
Policy & Strategies
Business
Continuity
Business
Continuity
Plan
Disaster
Recovery
Plan
Policy Layer
Management Layer
Infrastructure Layer
Key-Service For Your Business
BCP – Key Elements
• Analysis - Identification of risks/threats
• Response/recovery Design - Plan of action
• Implementation
• Testing
• Maintenance
Key-Service For Your Business
Phases of BCP
Mitigation
After assessing your risk,
do what you can to avoid
the risk or reduce the
impact in case of an
emergency or incident
Preparedness
Be as prepraed as you
can to minimize the
impact in case of an
emergency or incident
Response
Take reasonable action
when emergency or
incident occurs.
Recovery
While still responding
start to think about how
to return to normal
operations as soon as
possible
Incident
Occurs
Phase 1 Phase 2 Phase 3 Phase 4
Key-Service For Your Business
Achieving an Effective BCP
• Obtain Top Management Commitment
• Establish a Planning Committee
• Perform a Risk Assessment
• Establish Priorities for Processing Operations
• Determine Recovery Strategies
• Perform Data Collection
• Develop Testing Criteria and Procedures
• Test the Plan
• Approve the Plan
Key-Service For Your Business
Business Impact
Analysis
Effective Business Continuity Plan
starts with identifying all functions
within and services delivered by
the organization.
A business impact analysis (BIA) is
the primary tool for gathering
this information and then
assigning each with a level of
criticality.
Key-Service For Your Business
Understanding the Organization
• What does your organization do and
deliver?
• What are your most urgent activities?
• What do you need to deliver your
most critical activities?
• What would be the impact over time
if certain activities were disrupted or
interrupted?
• What are the risks to service delivery
e.g. do you rely on a single supplier?
Key-Service For Your Business
Business Impact Analysis (BIA)
• Risk assessment and treatment
• Prioritisation of activities including Recovery Time Objectives (RTO) and
Maximum Tolerable Period of Disruption (MTPD)
• Identify resources required for maintenance of priority services
This systematic process to determine and evaluate the potential effects of an
interruption to critical business operations as a result of a disaster, accident or
emergency
Key-Service For Your Business
Business Impact Analysis
Activities which can tolerate very short periods
of disruption
Activities that cannot tolerate any disruption
Activities which could be scaled down if necessary
for short periods of time
Activities which could be suspended if necessary
Key-Service For Your Business
Business Continuity
Strategy
3 areas that should be considered
in the strategy design process,
including the design of continuity
and recovery strategies and
tactics, threat mitigation
measures, and an incident
response structure.
Key-Service For Your Business http://www.bcmpedia.org/wiki/Maximum_Tolerable_Period_of_Disruption_(MTPOD)
Case study: marketplace
• A = Main website online store
• B = Lapak / Seller center
• C = Internal reporting
Recovery Strategies and Tactics
Key-Service For Your Business
Terms
RTO - Recovery Time Objective
Definition: period of time following an incident within which; product or service must be
resumed, or activity must be resumed, or resources must be recovered
NOTE: For products, services and activities, the recovery time objective must be less than the time it would take for
the adverse impacts that would arise as a result of not providing a product/ service or performing an activity to
become unacceptable.
MTPD- Maximum Tolerable Period of Disruption
Definition: time it would take for adverse impacts, which might arise as a result of not
providing a product/service or performing an activity, to become unacceptable
Source: ISO 22301
Key-Service For Your Business
Thread Mitigation Measurement & Strategies
Measures Brief Description
Administrative Training, physical security
Networking These measures are easier to implement at a network hardware level
System
administration
The OS contains everything needed for implementation
Specialized security
solutions
Specialized security software is applicable
Goal: review of the risks and plans for addressing, or mitigating, each of those risks
to an acceptable level. In some cases, risks are accepted as is; in other cases, risks
are transferred, and in still other cases, risks are minimized to a level acceptable to
the organization
Key-Service For Your Business
Thread Mitigation Measurement & Strategies
Risk References Mitigations
Risk mitigations generally relevant to Human Resources
Disputes over staff pay 1-General …..............
Staff strikes 2-General …..............
Risk mitigations generally relevant to Tenant Infrastructure
Tenant’s cloud service account
credentials compromised
3-General
Provide Identity and Access Management e.g. multi-
factor authentication and account roles with varying
privileges
Tenant’s data compromised in
transit
4-General
Support and use ASD-approved cryptographic controls
to protect data in transit between the tenant and the
BGN
Tenant’s data compromised by
malicious BGN staff
5-General
Restrict BGN staff privileged access to systems and data
based on their job tasks. Require re-approval every
three months for BGN staff requiring privileged access.
Revoke access upon termination of BGN staff
employment.
Key-Service For Your Business
Incident Response Structure
https://response.pagerduty.com/before/different_roles/
Incident Commander acts as the
single source of truth of what is
currently happening and what is
going to happen during an major
incident
Subject Matter Expert (SME),
sometimes called a "Resolver",
is a domain expert or
designated owner of a
component or service
Key-Service For Your Business
Elements of Business
Continuity
Management - 3
Introduction of the continuity
management process by education
and awareness of all stakeholders,
including employees, customers,
suppliers and shareholders.
Key-Service For Your Business
Continuity Requirements
People Premises Technology Information
Suppliers and
Partners
Key-Service For Your Business
Continuity Requirements Complete
People
• What number of
staff do you require
to carry out critical
activities?
• What is the
minimum staffing
level you will need
to deliver these
• What skills/level of
expertise are
required to
undertake these
activities?
Premises
• What locations do
your prioritised
activities operate
from?
• What alternative
premises do you
have?
• What machinery,
equipment and
other facilities are
essential?
Technology
• Is the service
dependant on
electrical
equipment?
• What IT is essential
to carry out your
prioritised
activities?
• What systems and
means of
communication are
required to carry
out your prioritised
activities
Information
• What Information is
essential to carry
out your prioritised
activities?
• How is this
information stored?
Suppliers and
Partners
• Who are your
priority suppliers?
• Are key services
contracted out?
• Do both you and
your suppliers/
partners have
mutual aid
arrangements in
please
Key-Service For Your Business
Exercising and Testing
Exercises are there to test plans to give
an idea how our plans would stand up
in a disruption
Ensures that plans are fit for purpose
Identify gaps and learning actions
Continuous updating of core
information
Key-Service For Your Business
Types of Business Continuity Exercises
It's important for those who are responsible for Business Continuity to know which
type of Business Continuity exercise is appropriate for what they wish to achieve
before planning it. This is because exercises vary in levels and resources required.
There are five main types of exercise and these are summarized below:
• Discussion based exercise
• Table top exercise
• Command post exercise
• Live exercise
• Test
Key-Service For Your Business
Business Continuity Exercises Purpose
• Validation - to validate and identify improvement opportunities in existing
arrangements
• Training - to develop staff competencies and confidence by giving them
practice in carrying out their roles in a incident
• Testing - to test existing procedures, plans and systems to ensure they function
correctly and offer the degree of protection expected
Key-Service For Your Business
HP YouTube Example Exercises
https://www.youtube.com/watch?v=ndpjNhd1MtE
Key-Service For Your Business
Reviewing Business Continuity
Plans should be reviewed and updated when:
• Changes to key staff or partners take place
• The organization is restructured
• Prioritized activity is delivered differently
• Change to the external environment e.g. statutory change, company
requirement
• Following lessons identified from an incident or exercise
Key-Service For Your Business
The most common problem
Key-Service For Your Business
Multi-Region
BCP & DRP Triangle Solutions
Data Backup and Replication
Alternative Site
IT Recovery Process
Validation & Testing
Business Continuity Plans
Risk Management
Policy & Strategies
Business
Continuity
Business
Continuity
Plan
Disaster
Recovery
Plan
BaaS
DRaaS
NSS
GIO Backup
Key-Service For Your Business
Multi Region Data Center
As Alternative Site to Provide High Availability
Key-Service For Your Business
Multi Region Data Center Product
GIO Private
GIO BMaaS
NVC
NEO BMaaS
Jakarta
NSS
GIO Advanced
GIO OEM
NEO Flex
Storage
GIO Private
GIO BMaaS
NVC
NEO BMaaS
NSS
GIO Advanced
GIO OEM
NEO Flex
Storage
West-Java
InterDC
InterDC
Key-Service For Your Business
Benefit Multi Region Data Center
Decentralization IT Infrastructure -
Deploy your Infra on Multi Avability-
zone and Region Data Center
Provide High Availability (Service
continuity) and Scalability for business-
critical IT Infrastructure
Align with regional regulatory
enforcement
Reduce latency for regional access
and Help to partition traffic among the
regions
Key-Service For Your Business
Multi Region Data Center
Region Jakarta
Region West-Java
On-Premise Infrastructure
Region #3
Availability
Zone A
Availability
Zone B
Availability
Zone C
Availability
Zone A
Availability
Zone B
Availability
Zone C
Availability
Zone A
Availability
Zone B
Availability
Zone C
Availability
Zone A
Availability
Zone B
Availability
Zone C
3 avability zone
for each Region
Key-Service For Your Business
Multi Region Data Center Use Case
Region Jakarta
Region West-Java
Availability
Zone A
Availability
Zone B Availability
Zone C
Availability Z
one A
Availability
Zone B
Availability
Zone C
Frontend Frontend
Backend Backend
Database Database
Free 10Gb InterDC
For Replication
User
High
Availability
and Scalability
Infrastructure
Key-Service For Your Business
High Availability & Multi-Layer Clustering
Region Jakarta
Region West-Java
Geo Clustering Virtualization
Free 10Gb InterDC
For Replication
OS Clustering
App/DB Clustering
Layer 1 - Hardware
Layer 2 - OS
Layer 3 - App/DB
Global server load balancing (GSLB)
Key-Service For Your Business
Business Model Multi-Region Infrastructure
Services
Gio Manage
Support
BGN Manage
Services
BGN Maintenance
Support
BGN Implementation &
Consulting
Assessment Current Requirement
Topology and Architecture Design
Propose Solution and Technology
Join Planning Session
Implementation & Documentation
Training and Sharing Knowledge
Key-Service For Your Business
Disaster Recovery as a Services
Cost Effective Solution for Replication and High Availability
Key-Service For Your Business
Disaster Recovery Benefit
Machines and Hardware Fail
While modern IT hardware is fairly
resistant to failures, most devices fall
far short of a perfect track record
Backup and disaster recovery solutions
help preserve a company’s reputation
with customers and partners
Helps prevent companies from losing
business to the competition when
disaster occurs
Backup and disaster recovery helps
ensure compliance with industry
regulations.
Extra Layer of Protection - Out of all the disaster
recovery benefits, having an extra layer of protection
is what strongly secures your business
Key-Service For Your Business
Disaster Recovery as a Service (DRaaS) Solution
Replicate your VM
Infrastructure between
multiple BGN Region w/h
additional charge for
InterDC
Protect & Backup on-
premise Data Center into
our Region DC
Replicate your Cloud
VM Infrastrucutre into
your local Copy
Between BGN Region DC Into BGN Region DC To On-Premise DC
Technology
Help your business to keep doing business-even during major IT outages. DRaaS
offers ease of deployment, cost effectiveness, and dependability. Deploy
replication, failover, and recovery processes t to help keep your applications running
during planned and unplanned outages.
Key-Service For Your Business
DRaaS Benefit
With a DRaaS solution in place, Customer do not have to worry if a disaster strikes,
Customer will be able to restore normal operations within minutes.
Rapid and Immediate Recovery
Virtualized DRaaS uses fast and scalable infrastructure, and allows virtual access of
assets, with little or no hardware and software expenditures
Resources Used
Compared to more traditional methods of backup, DRaaS is much more flexible.
Flexibility
Key-Service For Your Business
DRaaS Benefit in term of Investment
Businesses that currently have a secondary site for disaster recovery purposes are surely
familiar with the high costs associated with it. Beyond the unavoidable investments in
replication software and the required software licenses for servers, storage, and security,
there are a number of significant additional costs. Most of these additional costs are
effectively eliminated by using DRaaS through a managed service provide, Our DRaaS
offering eliminates the need for the following expenses:
Reduce Disaster Recovery costs
Building and maintaining a secondary DR site can be both costly and complex, If all of that
infrastructure could be eliminated, then the administration, upgrade requirements, and
maintenance contracts could be eliminated as well
Reduce Complexity
Owning or leasing space for a secondary data center
Monthly costs associated with power, cooling, and internet bandwidth
Purchase or lease of servers, storage, and network equipment
Key-Service For Your Business
DRaaS Scenario Offering
Region Jakarta
Region West-Java
Availability
Zone A
Availability
Zone B
Availability
Zone C
Availability
Zone A
Availability
Zone B
Availability
Zone C
Primary Data Center Disaster Recovery
On-Premise Infrastructure
Availability
Zone A
Availability
Zone B
Availability
Zone C
Continuous
Replicationto
achieve Lowest
RPOs
Primary Data Center
Disaster Recovery
Between BGN Region DC
Into BGN Region DC To On-Premise DC
Primary Data Center
Disaster Recovery
Key-Service For Your Business
DRaaS RTO and RPO
3 HOURS 3 HOURS 3 HOURS
RPO RTO
Data Loss
Disaster
Strike
1:05 PM
Data
Restore
4:05 PM
Recovery Point Objective (RPO)
Limitshow far to roll back in time and
defines the maximum allowable amount
of lost data measured in time from a
failure occurrence to the last valid
backup.
Recovery Time Objective (RPO)
how long it takes to restore from the
incident until normal operationsare
available to users
• Tier-1: Mission-critical applicationsthat require an RTP ofless than 15 minutes
• Tier-2: Business-critical applications that require RTO of 2 hoursand RPO of4 hours
• Tier-3: Non-critical applicationsthat require RTO of 4 hoursand RPO of24 hours
Key-Service For Your Business
Backup as a Service
Solution for Data Protection
Key-Service For Your Business
Why Backup as a Service
Support's on Laptop and
Desktop enables you to
keep critical data safe
and workflows
uninterrupted
The patented backup
technology able to
capture everything on
your system disk in one
quick step.
You can trigger backup
without user action. You
can configure backup
start by using scheduler
or specific events (Login
Activity, Power off/on,
etc).
Keeping your Business Run
Best Choice for Disaster
Recovery
Less Manpower
Key-Service For Your Business
Why Backup as a Service
Data compression capability of
BaaS enable you to reduce data
volume up to 90%. This will enable
you to maximize backup speed,
reduce storage requirements, and
minimize network loads.
Remote offices and multiple
work sites present unique
challenges to enterprise data
protection. With BaaS, you can
utilize centralized management
features to remotely manage
back up process in remote
branches.
Reduce Storage and Minimize
Network Loads
Best Solution for your Remote
Branches
Key-Service For Your Business
Features & Benefit Backup as a Service
Centralized Management for All Operation
You can easily manage all backup operation for both
virtual and physical machine on one single console. You
can review status, assign new backup, monitorall
backup from one place.
Support for various Backup Resources
BaaS supportsvarious data and system for backup such
as files, disk images, application, configuration,as well
as physical system.GIO Backup supports backup from
enterprise server as well as laptop and desktop.
Data Compressionand Encryption
GIO Backup comes with a built-in block-level data
deduplicationand compression.All backups will be
encrypted by default and transmitted over.
Restore Anywhere
GIO Backup givesyou the convenient ability to instantly
restore backups to any machine, regardlessof platform.
The data can be restored either to same hardware,
different hardware, or virtual server.
Key-Service For Your Business
Business Model BaaS
Services
Gio Manage
Support
BGN Manage
Services
BGN Maintenance
Support
BGN Implementation
& Consulting
Assessment Current Backup
Topology and Architecture Design
Propose Solution and Technology
Join Planning Session
Implementation & Documentation
Training and Sharing Knowledge
Solution
DRaaS BaaS
MSSP
Key-Service For Your Business
Compliance and Certifications
Key-Service For Your Business
Peace of Mind
Key-Service For Your Business
Question and Answer
Key-Service For Your Business
Key-Service
For Your Business
www.biznetgiocloud.com
PT. Biznet Gio Nusantara MidPlaza 1, 7th Floor Jl. Jend Sudirman Kav. 10-11 Jakarta 10220 – Indonesia

More Related Content

Similar to Protect Critical Services with a Business Continuity Plan

Business continuity planning guide
Business continuity planning guideBusiness continuity planning guide
Business continuity planning guideCenapSerdarolu
 
Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2Smart ERP Solutions, Inc.
 
Resus Advisory Profile - Resilience services Nov 15
Resus Advisory Profile - Resilience services Nov 15Resus Advisory Profile - Resilience services Nov 15
Resus Advisory Profile - Resilience services Nov 15David John Bollaert
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Net at Work
 
Risk management & compliance with xyea october 2012
Risk management & compliance with xyea october 2012Risk management & compliance with xyea october 2012
Risk management & compliance with xyea october 2012Xyea
 
Disaster Biz Resumpt
Disaster Biz ResumptDisaster Biz Resumpt
Disaster Biz ResumptJimGroark
 
Managed IT Services: What It Is and Why It Matters
Managed IT Services: What It Is and Why It MattersManaged IT Services: What It Is and Why It Matters
Managed IT Services: What It Is and Why It MattersNet at Work
 
CIT2015TheCaseITServiceManagement.pptx
CIT2015TheCaseITServiceManagement.pptxCIT2015TheCaseITServiceManagement.pptx
CIT2015TheCaseITServiceManagement.pptxAnishKumar509840
 
Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examKadimil
 
3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department 3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department Sandeep S Jaryal
 
ACM Tech Talk - Signature based Problem Solving
ACM Tech Talk - Signature based Problem SolvingACM Tech Talk - Signature based Problem Solving
ACM Tech Talk - Signature based Problem SolvingVinayak Hegde
 
Business recovery with Smart Strategies
Business recovery with Smart StrategiesBusiness recovery with Smart Strategies
Business recovery with Smart StrategiesPECB
 
Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007Abdulaziz AlFaify
 
New hospital it strategy 2
New hospital it strategy 2New hospital it strategy 2
New hospital it strategy 2Pankaj Gupta
 
Security & Risk Management
Security & Risk ManagementSecurity & Risk Management
Security & Risk ManagementAhmed Sayed-
 
Achieving Excellence in OH&S performance through OH&S Management Systems
Achieving Excellence in OH&S performance through OH&S Management SystemsAchieving Excellence in OH&S performance through OH&S Management Systems
Achieving Excellence in OH&S performance through OH&S Management SystemsDQS India
 
Ais development strategy
Ais development strategyAis development strategy
Ais development strategyRahat Chowdhury
 
RTC Migration for EM Services Offerings from Rational Lab Services
RTC Migration for EM Services Offerings from Rational Lab Services RTC Migration for EM Services Offerings from Rational Lab Services
RTC Migration for EM Services Offerings from Rational Lab Services IBM Rational software
 

Similar to Protect Critical Services with a Business Continuity Plan (20)

Business continuity planning guide
Business continuity planning guideBusiness continuity planning guide
Business continuity planning guide
 
Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2
 
Resus Advisory Profile - Resilience services Nov 15
Resus Advisory Profile - Resilience services Nov 15Resus Advisory Profile - Resilience services Nov 15
Resus Advisory Profile - Resilience services Nov 15
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
Itsm
ItsmItsm
Itsm
 
Panduit_ERP_061407
Panduit_ERP_061407Panduit_ERP_061407
Panduit_ERP_061407
 
Risk management & compliance with xyea october 2012
Risk management & compliance with xyea october 2012Risk management & compliance with xyea october 2012
Risk management & compliance with xyea october 2012
 
Disaster Biz Resumpt
Disaster Biz ResumptDisaster Biz Resumpt
Disaster Biz Resumpt
 
Managed IT Services: What It Is and Why It Matters
Managed IT Services: What It Is and Why It MattersManaged IT Services: What It Is and Why It Matters
Managed IT Services: What It Is and Why It Matters
 
CIT2015TheCaseITServiceManagement.pptx
CIT2015TheCaseITServiceManagement.pptxCIT2015TheCaseITServiceManagement.pptx
CIT2015TheCaseITServiceManagement.pptx
 
Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation exam
 
3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department 3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department
 
ACM Tech Talk - Signature based Problem Solving
ACM Tech Talk - Signature based Problem SolvingACM Tech Talk - Signature based Problem Solving
ACM Tech Talk - Signature based Problem Solving
 
Business recovery with Smart Strategies
Business recovery with Smart StrategiesBusiness recovery with Smart Strategies
Business recovery with Smart Strategies
 
Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007
 
New hospital it strategy 2
New hospital it strategy 2New hospital it strategy 2
New hospital it strategy 2
 
Security & Risk Management
Security & Risk ManagementSecurity & Risk Management
Security & Risk Management
 
Achieving Excellence in OH&S performance through OH&S Management Systems
Achieving Excellence in OH&S performance through OH&S Management SystemsAchieving Excellence in OH&S performance through OH&S Management Systems
Achieving Excellence in OH&S performance through OH&S Management Systems
 
Ais development strategy
Ais development strategyAis development strategy
Ais development strategy
 
RTC Migration for EM Services Offerings from Rational Lab Services
RTC Migration for EM Services Offerings from Rational Lab Services RTC Migration for EM Services Offerings from Rational Lab Services
RTC Migration for EM Services Offerings from Rational Lab Services
 

More from Yusuf Hadiwinata Sutandar

LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPracticeLOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPracticeYusuf Hadiwinata Sutandar
 
March of the Penguin - 31 years Linux Snapshot
March of the Penguin - 31 years Linux SnapshotMarch of the Penguin - 31 years Linux Snapshot
March of the Penguin - 31 years Linux SnapshotYusuf Hadiwinata Sutandar
 
Choose the Right Container Storage for Kubernetes
Choose the Right Container Storage for KubernetesChoose the Right Container Storage for Kubernetes
Choose the Right Container Storage for KubernetesYusuf Hadiwinata Sutandar
 
Biznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital ForensicsBiznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital ForensicsYusuf Hadiwinata Sutandar
 
PHPIDOL#80: Kubernetes 101 for PHP Developer. Yusuf Hadiwinata - VP Operation...
PHPIDOL#80: Kubernetes 101 for PHP Developer. Yusuf Hadiwinata - VP Operation...PHPIDOL#80: Kubernetes 101 for PHP Developer. Yusuf Hadiwinata - VP Operation...
PHPIDOL#80: Kubernetes 101 for PHP Developer. Yusuf Hadiwinata - VP Operation...Yusuf Hadiwinata Sutandar
 
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with KialiKubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with KialiYusuf Hadiwinata Sutandar
 
Protecting National Critical Infrastructure Asiangames 2018
Protecting National Critical Infrastructure Asiangames 2018Protecting National Critical Infrastructure Asiangames 2018
Protecting National Critical Infrastructure Asiangames 2018Yusuf Hadiwinata Sutandar
 
Devops Indonesia Presentation Monitoring Framework
Devops Indonesia Presentation Monitoring FrameworkDevops Indonesia Presentation Monitoring Framework
Devops Indonesia Presentation Monitoring FrameworkYusuf Hadiwinata Sutandar
 
Devops Indonesia - DevSecOps - The Open Source Way
Devops Indonesia - DevSecOps - The Open Source WayDevops Indonesia - DevSecOps - The Open Source Way
Devops Indonesia - DevSecOps - The Open Source WayYusuf Hadiwinata Sutandar
 
Journey to the devops automation with docker kubernetes and openshift
Journey to the devops automation with docker kubernetes and openshiftJourney to the devops automation with docker kubernetes and openshift
Journey to the devops automation with docker kubernetes and openshiftYusuf Hadiwinata Sutandar
 
create auto scale jboss cluster with openshift
create auto scale jboss cluster with openshiftcreate auto scale jboss cluster with openshift
create auto scale jboss cluster with openshiftYusuf Hadiwinata Sutandar
 

More from Yusuf Hadiwinata Sutandar (20)

LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPracticeLOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
 
How DevOps works in the Enterprise
How DevOps works  in the EnterpriseHow DevOps works  in the Enterprise
How DevOps works in the Enterprise
 
Acronis Meet and Learn
Acronis Meet and LearnAcronis Meet and Learn
Acronis Meet and Learn
 
March of the Penguin - 31 years Linux Snapshot
March of the Penguin - 31 years Linux SnapshotMarch of the Penguin - 31 years Linux Snapshot
March of the Penguin - 31 years Linux Snapshot
 
Choose the Right Container Storage for Kubernetes
Choose the Right Container Storage for KubernetesChoose the Right Container Storage for Kubernetes
Choose the Right Container Storage for Kubernetes
 
Biznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital ForensicsBiznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital Forensics
 
PHPIDOL#80: Kubernetes 101 for PHP Developer. Yusuf Hadiwinata - VP Operation...
PHPIDOL#80: Kubernetes 101 for PHP Developer. Yusuf Hadiwinata - VP Operation...PHPIDOL#80: Kubernetes 101 for PHP Developer. Yusuf Hadiwinata - VP Operation...
PHPIDOL#80: Kubernetes 101 for PHP Developer. Yusuf Hadiwinata - VP Operation...
 
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with KialiKubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
 
Protecting National Critical Infrastructure Asiangames 2018
Protecting National Critical Infrastructure Asiangames 2018Protecting National Critical Infrastructure Asiangames 2018
Protecting National Critical Infrastructure Asiangames 2018
 
Devops Indonesia Presentation Monitoring Framework
Devops Indonesia Presentation Monitoring FrameworkDevops Indonesia Presentation Monitoring Framework
Devops Indonesia Presentation Monitoring Framework
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
 
Biznet Gio Presentation - Cloud Computing
Biznet Gio Presentation - Cloud ComputingBiznet Gio Presentation - Cloud Computing
Biznet Gio Presentation - Cloud Computing
 
Bssn book security awarness
Bssn book security awarnessBssn book security awarness
Bssn book security awarness
 
Job vacancies cti group
Job vacancies cti groupJob vacancies cti group
Job vacancies cti group
 
Devops Indonesia - DevSecOps - The Open Source Way
Devops Indonesia - DevSecOps - The Open Source WayDevops Indonesia - DevSecOps - The Open Source Way
Devops Indonesia - DevSecOps - The Open Source Way
 
Devops indonesia - The Future Container
Devops indonesia - The Future ContainerDevops indonesia - The Future Container
Devops indonesia - The Future Container
 
Journey to the devops automation with docker kubernetes and openshift
Journey to the devops automation with docker kubernetes and openshiftJourney to the devops automation with docker kubernetes and openshift
Journey to the devops automation with docker kubernetes and openshift
 
War of Openstack Private Cloud Distribution
War of Openstack Private Cloud DistributionWar of Openstack Private Cloud Distribution
War of Openstack Private Cloud Distribution
 
create auto scale jboss cluster with openshift
create auto scale jboss cluster with openshiftcreate auto scale jboss cluster with openshift
create auto scale jboss cluster with openshift
 
Docker handons-workshop-for-charity
Docker handons-workshop-for-charityDocker handons-workshop-for-charity
Docker handons-workshop-for-charity
 

Recently uploaded

如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一ga6c6bdl
 
Presentation.pptxjnfoigneoifnvoeifnvklfnvf
Presentation.pptxjnfoigneoifnvoeifnvklfnvfPresentation.pptxjnfoigneoifnvoeifnvklfnvf
Presentation.pptxjnfoigneoifnvoeifnvklfnvfchapmanellie27
 
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCRReal Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCRdollysharma2066
 
vip Model Basti Call Girls 9999965857 Call or WhatsApp Now Book
vip Model Basti Call Girls 9999965857 Call or WhatsApp Now Bookvip Model Basti Call Girls 9999965857 Call or WhatsApp Now Book
vip Model Basti Call Girls 9999965857 Call or WhatsApp Now Bookmanojkuma9823
 
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一ga6c6bdl
 
《1:1仿制麦克马斯特大学毕业证|订制麦克马斯特大学文凭》
《1:1仿制麦克马斯特大学毕业证|订制麦克马斯特大学文凭》《1:1仿制麦克马斯特大学毕业证|订制麦克马斯特大学文凭》
《1:1仿制麦克马斯特大学毕业证|订制麦克马斯特大学文凭》o8wvnojp
 
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...nagunakhan
 
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...Amil baba
 
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degreeyuu sss
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)861c7ca49a02
 
如何办理伦敦大学伯贝克学院毕业证(BBK毕业证) 成绩单留信学历认证原版一比一
如何办理伦敦大学伯贝克学院毕业证(BBK毕业证) 成绩单留信学历认证原版一比一如何办理伦敦大学伯贝克学院毕业证(BBK毕业证) 成绩单留信学历认证原版一比一
如何办理伦敦大学伯贝克学院毕业证(BBK毕业证) 成绩单留信学历认证原版一比一ga6c6bdl
 
(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一C SSS
 
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...srsj9000
 
Call Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile serviceCall Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile servicerehmti665
 
定制(Salford学位证)索尔福德大学毕业证成绩单原版一比一
定制(Salford学位证)索尔福德大学毕业证成绩单原版一比一定制(Salford学位证)索尔福德大学毕业证成绩单原版一比一
定制(Salford学位证)索尔福德大学毕业证成绩单原版一比一ss ss
 
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一ga6c6bdl
 
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...ttt fff
 
威廉玛丽学院毕业证学位证成绩单-安全学历认证
威廉玛丽学院毕业证学位证成绩单-安全学历认证威廉玛丽学院毕业证学位证成绩单-安全学历认证
威廉玛丽学院毕业证学位证成绩单-安全学历认证kbdhl05e
 
Call Girls Delhi {Rs-10000 Laxmi Nagar] 9711199012 Whats Up Number
Call Girls Delhi {Rs-10000 Laxmi Nagar] 9711199012 Whats Up NumberCall Girls Delhi {Rs-10000 Laxmi Nagar] 9711199012 Whats Up Number
Call Girls Delhi {Rs-10000 Laxmi Nagar] 9711199012 Whats Up NumberMs Riya
 

Recently uploaded (20)

如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
如何办理萨省大学毕业证(UofS毕业证)成绩单留信学历认证原版一比一
 
Presentation.pptxjnfoigneoifnvoeifnvklfnvf
Presentation.pptxjnfoigneoifnvoeifnvklfnvfPresentation.pptxjnfoigneoifnvoeifnvklfnvf
Presentation.pptxjnfoigneoifnvoeifnvklfnvf
 
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCRReal Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
 
vip Model Basti Call Girls 9999965857 Call or WhatsApp Now Book
vip Model Basti Call Girls 9999965857 Call or WhatsApp Now Bookvip Model Basti Call Girls 9999965857 Call or WhatsApp Now Book
vip Model Basti Call Girls 9999965857 Call or WhatsApp Now Book
 
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单留信学历认证原版一比一
 
《1:1仿制麦克马斯特大学毕业证|订制麦克马斯特大学文凭》
《1:1仿制麦克马斯特大学毕业证|订制麦克马斯特大学文凭》《1:1仿制麦克马斯特大学毕业证|订制麦克马斯特大学文凭》
《1:1仿制麦克马斯特大学毕业证|订制麦克马斯特大学文凭》
 
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
 
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
 
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
 
如何办理伦敦大学伯贝克学院毕业证(BBK毕业证) 成绩单留信学历认证原版一比一
如何办理伦敦大学伯贝克学院毕业证(BBK毕业证) 成绩单留信学历认证原版一比一如何办理伦敦大学伯贝克学院毕业证(BBK毕业证) 成绩单留信学历认证原版一比一
如何办理伦敦大学伯贝克学院毕业证(BBK毕业证) 成绩单留信学历认证原版一比一
 
(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一
 
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
Hifi Defence Colony Call Girls Service WhatsApp -> 9999965857 Available 24x7 ...
 
Call Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile serviceCall Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile service
 
young call girls in Khanpur,🔝 9953056974 🔝 escort Service
young call girls in  Khanpur,🔝 9953056974 🔝 escort Serviceyoung call girls in  Khanpur,🔝 9953056974 🔝 escort Service
young call girls in Khanpur,🔝 9953056974 🔝 escort Service
 
定制(Salford学位证)索尔福德大学毕业证成绩单原版一比一
定制(Salford学位证)索尔福德大学毕业证成绩单原版一比一定制(Salford学位证)索尔福德大学毕业证成绩单原版一比一
定制(Salford学位证)索尔福德大学毕业证成绩单原版一比一
 
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
 
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
 
威廉玛丽学院毕业证学位证成绩单-安全学历认证
威廉玛丽学院毕业证学位证成绩单-安全学历认证威廉玛丽学院毕业证学位证成绩单-安全学历认证
威廉玛丽学院毕业证学位证成绩单-安全学历认证
 
Call Girls Delhi {Rs-10000 Laxmi Nagar] 9711199012 Whats Up Number
Call Girls Delhi {Rs-10000 Laxmi Nagar] 9711199012 Whats Up NumberCall Girls Delhi {Rs-10000 Laxmi Nagar] 9711199012 Whats Up Number
Call Girls Delhi {Rs-10000 Laxmi Nagar] 9711199012 Whats Up Number
 

Protect Critical Services with a Business Continuity Plan

  • 1. Business Continuity Plan To Protect your Critical Services
  • 2. Yusuf Hadiwinata Sutandar Linux Geek, Opensource Enthusiast, Security Hobbies RHCT, RHCSAv5-v7, RHCEv5-v7, RHCVA, RHCI, RHCX, RHCSA-RHOS, RHCJA, CEI, CEH, CHFI, CND, EDRP, CCNA, MCTCNA, Security+, Network+, VCA, vExpert 2017- 2018 Senior Operation Manager Technology
  • 3. Key-Service For Your Business Business is shifting in the digital age
  • 4. Key-Service For Your Business The Role IT Play in Digital Transformation Initiatives and Powers Business Growth These four constituents are: • IT Organization - Defines the scope of digital transformation and business continuity. • Cloud service providers - Ensures service consistency in cloud-driven digital workplace. • Systems integrators - Share expert perspective and guidance. • Systems and software vendors - Ensure technology fits the need.
  • 5. Key-Service For Your Business Digital Transformation not just solve lot of problem, but also generate new problem Now, Business rely on Information Technology
  • 6. Key-Service For Your Business What would happen if… • A hurricane hit? • A fire occurred? • Power was interrupted? • What would you do? • What would a business do?
  • 7. Key-Service For Your Business An Example of Disaster
  • 8. Key-Service For Your Business Not just an IT issue!
  • 9. Key-Service For Your Business What is a Business Continuity? "Is the capability of the organization to continue delivery of products or services at acceptable predefined levels following a disruptive incident. (Source: ISO 22313/22301)"
  • 10. Key-Service For Your Business Why Should we do Business Continuity Planning (BCP)? • To ensures compliance with our ever-increasing regulatory requirements • To enhances our ability to avoid: Goal: To prevent disruptions in business operations • Financial losses • Regulatory fines • Damage to equipment
  • 11. Key-Service For Your Business BCP & DRP Triangle Data Backup and Replication Alternative Site IT Recovery Process Validation & Testing Business Continuity Plans Risk Management Policy & Strategies Business Continuity Business Continuity Plan Disaster Recovery Plan Policy Layer Management Layer Infrastructure Layer
  • 12. Key-Service For Your Business BCP – Key Elements • Analysis - Identification of risks/threats • Response/recovery Design - Plan of action • Implementation • Testing • Maintenance
  • 13. Key-Service For Your Business Phases of BCP Mitigation After assessing your risk, do what you can to avoid the risk or reduce the impact in case of an emergency or incident Preparedness Be as prepraed as you can to minimize the impact in case of an emergency or incident Response Take reasonable action when emergency or incident occurs. Recovery While still responding start to think about how to return to normal operations as soon as possible Incident Occurs Phase 1 Phase 2 Phase 3 Phase 4
  • 14. Key-Service For Your Business Achieving an Effective BCP • Obtain Top Management Commitment • Establish a Planning Committee • Perform a Risk Assessment • Establish Priorities for Processing Operations • Determine Recovery Strategies • Perform Data Collection • Develop Testing Criteria and Procedures • Test the Plan • Approve the Plan
  • 15. Key-Service For Your Business Business Impact Analysis Effective Business Continuity Plan starts with identifying all functions within and services delivered by the organization. A business impact analysis (BIA) is the primary tool for gathering this information and then assigning each with a level of criticality.
  • 16. Key-Service For Your Business Understanding the Organization • What does your organization do and deliver? • What are your most urgent activities? • What do you need to deliver your most critical activities? • What would be the impact over time if certain activities were disrupted or interrupted? • What are the risks to service delivery e.g. do you rely on a single supplier?
  • 17. Key-Service For Your Business Business Impact Analysis (BIA) • Risk assessment and treatment • Prioritisation of activities including Recovery Time Objectives (RTO) and Maximum Tolerable Period of Disruption (MTPD) • Identify resources required for maintenance of priority services This systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency
  • 18. Key-Service For Your Business Business Impact Analysis Activities which can tolerate very short periods of disruption Activities that cannot tolerate any disruption Activities which could be scaled down if necessary for short periods of time Activities which could be suspended if necessary
  • 19. Key-Service For Your Business Business Continuity Strategy 3 areas that should be considered in the strategy design process, including the design of continuity and recovery strategies and tactics, threat mitigation measures, and an incident response structure.
  • 20. Key-Service For Your Business http://www.bcmpedia.org/wiki/Maximum_Tolerable_Period_of_Disruption_(MTPOD) Case study: marketplace • A = Main website online store • B = Lapak / Seller center • C = Internal reporting Recovery Strategies and Tactics
  • 21. Key-Service For Your Business Terms RTO - Recovery Time Objective Definition: period of time following an incident within which; product or service must be resumed, or activity must be resumed, or resources must be recovered NOTE: For products, services and activities, the recovery time objective must be less than the time it would take for the adverse impacts that would arise as a result of not providing a product/ service or performing an activity to become unacceptable. MTPD- Maximum Tolerable Period of Disruption Definition: time it would take for adverse impacts, which might arise as a result of not providing a product/service or performing an activity, to become unacceptable Source: ISO 22301
  • 22. Key-Service For Your Business Thread Mitigation Measurement & Strategies Measures Brief Description Administrative Training, physical security Networking These measures are easier to implement at a network hardware level System administration The OS contains everything needed for implementation Specialized security solutions Specialized security software is applicable Goal: review of the risks and plans for addressing, or mitigating, each of those risks to an acceptable level. In some cases, risks are accepted as is; in other cases, risks are transferred, and in still other cases, risks are minimized to a level acceptable to the organization
  • 23. Key-Service For Your Business Thread Mitigation Measurement & Strategies Risk References Mitigations Risk mitigations generally relevant to Human Resources Disputes over staff pay 1-General ….............. Staff strikes 2-General ….............. Risk mitigations generally relevant to Tenant Infrastructure Tenant’s cloud service account credentials compromised 3-General Provide Identity and Access Management e.g. multi- factor authentication and account roles with varying privileges Tenant’s data compromised in transit 4-General Support and use ASD-approved cryptographic controls to protect data in transit between the tenant and the BGN Tenant’s data compromised by malicious BGN staff 5-General Restrict BGN staff privileged access to systems and data based on their job tasks. Require re-approval every three months for BGN staff requiring privileged access. Revoke access upon termination of BGN staff employment.
  • 24. Key-Service For Your Business Incident Response Structure https://response.pagerduty.com/before/different_roles/ Incident Commander acts as the single source of truth of what is currently happening and what is going to happen during an major incident Subject Matter Expert (SME), sometimes called a "Resolver", is a domain expert or designated owner of a component or service
  • 25. Key-Service For Your Business Elements of Business Continuity Management - 3 Introduction of the continuity management process by education and awareness of all stakeholders, including employees, customers, suppliers and shareholders.
  • 26. Key-Service For Your Business Continuity Requirements People Premises Technology Information Suppliers and Partners
  • 27. Key-Service For Your Business Continuity Requirements Complete People • What number of staff do you require to carry out critical activities? • What is the minimum staffing level you will need to deliver these • What skills/level of expertise are required to undertake these activities? Premises • What locations do your prioritised activities operate from? • What alternative premises do you have? • What machinery, equipment and other facilities are essential? Technology • Is the service dependant on electrical equipment? • What IT is essential to carry out your prioritised activities? • What systems and means of communication are required to carry out your prioritised activities Information • What Information is essential to carry out your prioritised activities? • How is this information stored? Suppliers and Partners • Who are your priority suppliers? • Are key services contracted out? • Do both you and your suppliers/ partners have mutual aid arrangements in please
  • 28. Key-Service For Your Business Exercising and Testing Exercises are there to test plans to give an idea how our plans would stand up in a disruption Ensures that plans are fit for purpose Identify gaps and learning actions Continuous updating of core information
  • 29. Key-Service For Your Business Types of Business Continuity Exercises It's important for those who are responsible for Business Continuity to know which type of Business Continuity exercise is appropriate for what they wish to achieve before planning it. This is because exercises vary in levels and resources required. There are five main types of exercise and these are summarized below: • Discussion based exercise • Table top exercise • Command post exercise • Live exercise • Test
  • 30. Key-Service For Your Business Business Continuity Exercises Purpose • Validation - to validate and identify improvement opportunities in existing arrangements • Training - to develop staff competencies and confidence by giving them practice in carrying out their roles in a incident • Testing - to test existing procedures, plans and systems to ensure they function correctly and offer the degree of protection expected
  • 31. Key-Service For Your Business HP YouTube Example Exercises https://www.youtube.com/watch?v=ndpjNhd1MtE
  • 32. Key-Service For Your Business Reviewing Business Continuity Plans should be reviewed and updated when: • Changes to key staff or partners take place • The organization is restructured • Prioritized activity is delivered differently • Change to the external environment e.g. statutory change, company requirement • Following lessons identified from an incident or exercise
  • 33. Key-Service For Your Business The most common problem
  • 34. Key-Service For Your Business Multi-Region BCP & DRP Triangle Solutions Data Backup and Replication Alternative Site IT Recovery Process Validation & Testing Business Continuity Plans Risk Management Policy & Strategies Business Continuity Business Continuity Plan Disaster Recovery Plan BaaS DRaaS NSS GIO Backup
  • 35. Key-Service For Your Business Multi Region Data Center As Alternative Site to Provide High Availability
  • 36. Key-Service For Your Business Multi Region Data Center Product GIO Private GIO BMaaS NVC NEO BMaaS Jakarta NSS GIO Advanced GIO OEM NEO Flex Storage GIO Private GIO BMaaS NVC NEO BMaaS NSS GIO Advanced GIO OEM NEO Flex Storage West-Java InterDC InterDC
  • 37. Key-Service For Your Business Benefit Multi Region Data Center Decentralization IT Infrastructure - Deploy your Infra on Multi Avability- zone and Region Data Center Provide High Availability (Service continuity) and Scalability for business- critical IT Infrastructure Align with regional regulatory enforcement Reduce latency for regional access and Help to partition traffic among the regions
  • 38. Key-Service For Your Business Multi Region Data Center Region Jakarta Region West-Java On-Premise Infrastructure Region #3 Availability Zone A Availability Zone B Availability Zone C Availability Zone A Availability Zone B Availability Zone C Availability Zone A Availability Zone B Availability Zone C Availability Zone A Availability Zone B Availability Zone C 3 avability zone for each Region
  • 39. Key-Service For Your Business Multi Region Data Center Use Case Region Jakarta Region West-Java Availability Zone A Availability Zone B Availability Zone C Availability Z one A Availability Zone B Availability Zone C Frontend Frontend Backend Backend Database Database Free 10Gb InterDC For Replication User High Availability and Scalability Infrastructure
  • 40. Key-Service For Your Business High Availability & Multi-Layer Clustering Region Jakarta Region West-Java Geo Clustering Virtualization Free 10Gb InterDC For Replication OS Clustering App/DB Clustering Layer 1 - Hardware Layer 2 - OS Layer 3 - App/DB Global server load balancing (GSLB)
  • 41. Key-Service For Your Business Business Model Multi-Region Infrastructure Services Gio Manage Support BGN Manage Services BGN Maintenance Support BGN Implementation & Consulting Assessment Current Requirement Topology and Architecture Design Propose Solution and Technology Join Planning Session Implementation & Documentation Training and Sharing Knowledge
  • 42. Key-Service For Your Business Disaster Recovery as a Services Cost Effective Solution for Replication and High Availability
  • 43. Key-Service For Your Business Disaster Recovery Benefit Machines and Hardware Fail While modern IT hardware is fairly resistant to failures, most devices fall far short of a perfect track record Backup and disaster recovery solutions help preserve a company’s reputation with customers and partners Helps prevent companies from losing business to the competition when disaster occurs Backup and disaster recovery helps ensure compliance with industry regulations. Extra Layer of Protection - Out of all the disaster recovery benefits, having an extra layer of protection is what strongly secures your business
  • 44. Key-Service For Your Business Disaster Recovery as a Service (DRaaS) Solution Replicate your VM Infrastructure between multiple BGN Region w/h additional charge for InterDC Protect & Backup on- premise Data Center into our Region DC Replicate your Cloud VM Infrastrucutre into your local Copy Between BGN Region DC Into BGN Region DC To On-Premise DC Technology Help your business to keep doing business-even during major IT outages. DRaaS offers ease of deployment, cost effectiveness, and dependability. Deploy replication, failover, and recovery processes t to help keep your applications running during planned and unplanned outages.
  • 45. Key-Service For Your Business DRaaS Benefit With a DRaaS solution in place, Customer do not have to worry if a disaster strikes, Customer will be able to restore normal operations within minutes. Rapid and Immediate Recovery Virtualized DRaaS uses fast and scalable infrastructure, and allows virtual access of assets, with little or no hardware and software expenditures Resources Used Compared to more traditional methods of backup, DRaaS is much more flexible. Flexibility
  • 46. Key-Service For Your Business DRaaS Benefit in term of Investment Businesses that currently have a secondary site for disaster recovery purposes are surely familiar with the high costs associated with it. Beyond the unavoidable investments in replication software and the required software licenses for servers, storage, and security, there are a number of significant additional costs. Most of these additional costs are effectively eliminated by using DRaaS through a managed service provide, Our DRaaS offering eliminates the need for the following expenses: Reduce Disaster Recovery costs Building and maintaining a secondary DR site can be both costly and complex, If all of that infrastructure could be eliminated, then the administration, upgrade requirements, and maintenance contracts could be eliminated as well Reduce Complexity Owning or leasing space for a secondary data center Monthly costs associated with power, cooling, and internet bandwidth Purchase or lease of servers, storage, and network equipment
  • 47. Key-Service For Your Business DRaaS Scenario Offering Region Jakarta Region West-Java Availability Zone A Availability Zone B Availability Zone C Availability Zone A Availability Zone B Availability Zone C Primary Data Center Disaster Recovery On-Premise Infrastructure Availability Zone A Availability Zone B Availability Zone C Continuous Replicationto achieve Lowest RPOs Primary Data Center Disaster Recovery Between BGN Region DC Into BGN Region DC To On-Premise DC Primary Data Center Disaster Recovery
  • 48. Key-Service For Your Business DRaaS RTO and RPO 3 HOURS 3 HOURS 3 HOURS RPO RTO Data Loss Disaster Strike 1:05 PM Data Restore 4:05 PM Recovery Point Objective (RPO) Limitshow far to roll back in time and defines the maximum allowable amount of lost data measured in time from a failure occurrence to the last valid backup. Recovery Time Objective (RPO) how long it takes to restore from the incident until normal operationsare available to users • Tier-1: Mission-critical applicationsthat require an RTP ofless than 15 minutes • Tier-2: Business-critical applications that require RTO of 2 hoursand RPO of4 hours • Tier-3: Non-critical applicationsthat require RTO of 4 hoursand RPO of24 hours
  • 49. Key-Service For Your Business Backup as a Service Solution for Data Protection
  • 50. Key-Service For Your Business Why Backup as a Service Support's on Laptop and Desktop enables you to keep critical data safe and workflows uninterrupted The patented backup technology able to capture everything on your system disk in one quick step. You can trigger backup without user action. You can configure backup start by using scheduler or specific events (Login Activity, Power off/on, etc). Keeping your Business Run Best Choice for Disaster Recovery Less Manpower
  • 51. Key-Service For Your Business Why Backup as a Service Data compression capability of BaaS enable you to reduce data volume up to 90%. This will enable you to maximize backup speed, reduce storage requirements, and minimize network loads. Remote offices and multiple work sites present unique challenges to enterprise data protection. With BaaS, you can utilize centralized management features to remotely manage back up process in remote branches. Reduce Storage and Minimize Network Loads Best Solution for your Remote Branches
  • 52. Key-Service For Your Business Features & Benefit Backup as a Service Centralized Management for All Operation You can easily manage all backup operation for both virtual and physical machine on one single console. You can review status, assign new backup, monitorall backup from one place. Support for various Backup Resources BaaS supportsvarious data and system for backup such as files, disk images, application, configuration,as well as physical system.GIO Backup supports backup from enterprise server as well as laptop and desktop. Data Compressionand Encryption GIO Backup comes with a built-in block-level data deduplicationand compression.All backups will be encrypted by default and transmitted over. Restore Anywhere GIO Backup givesyou the convenient ability to instantly restore backups to any machine, regardlessof platform. The data can be restored either to same hardware, different hardware, or virtual server.
  • 53. Key-Service For Your Business Business Model BaaS Services Gio Manage Support BGN Manage Services BGN Maintenance Support BGN Implementation & Consulting Assessment Current Backup Topology and Architecture Design Propose Solution and Technology Join Planning Session Implementation & Documentation Training and Sharing Knowledge Solution DRaaS BaaS MSSP
  • 54. Key-Service For Your Business Compliance and Certifications
  • 55. Key-Service For Your Business Peace of Mind
  • 56. Key-Service For Your Business Question and Answer
  • 57. Key-Service For Your Business Key-Service For Your Business www.biznetgiocloud.com PT. Biznet Gio Nusantara MidPlaza 1, 7th Floor Jl. Jend Sudirman Kav. 10-11 Jakarta 10220 – Indonesia