SlideShare a Scribd company logo
1 of 2
Download to read offline
The workable, practical guide to Do IT Yourself

Vol. 5.37 • September 17, 2009

Continuity Management – Planning for Unnatural Disasters
By Rick Lemieux

Many IT professionals have followed the path of planning for natural disasters like power
outages due to tornados etc. But how many have planned for unnatural disasters like
identify theft and software viruses?
Natural disasters like floods and fires can cost enterprises significant lost revenue and
customers. Unnatural disasters like identity theft and software viruses can be even more costly. IT
organizations need to consider both natural and unnatural disasters when using ITSM best practices
to prepare their disaster responses.
As a practitioner in the business of IT Service Management, I have seen many business executives take chances with their
approach to Business Continuity Management (BCM). While business issues like supply chain management are outside
the scope of most IT departments, IT Service Continuity Management (ITSCM) is not.
ITSCM is a sub-set of BCM focused on establishing the risk-appetite of the business, and then providing recommended
planning guidance to the business and IT processes. The ITIL describes the goal of IT Service Continuity Management
(ITSCM) as "...to support the overall Business Continuity Management process by ensuring that the required IT technical
and services facilities (including computer systems, networks, applications, telecommunications, technical support and
Service Desk) can be recovered within required, and agreed, business timescales."
Based on my experience, this newsletter outlines six steps I believe IT organizations should follow in order to build an
effective ITSCM program to protect IT services and systems from those unnatural disasters that could have a devastating
impact on the business.

IT Service Continuity Management
Step #1 - Managing the Big Picture
IT organizations, through the use of ITSM best practices, need to provide executive management with a holistic
understanding of what IT does for the business, how it does it and the impact it will have on the business if it does not
continue to do so. In many cases, this will be the first time the management team sees a complete view of IT’s contribution
to the operational business which will help them make better investment decisions in the area of IT business continuity
management.
Step #2 - Scenario planning
IT organizations need to help executive management understand the details of what it would take to recover from an
unnatural disaster. Scenarios should include detailed timelines and information about the people, process and
technologies required to restore the services to business level operations.
Step #3 – Consultants & Training
If you need to hire a consultant, it is very important to hire individuals or organizations who not only focus on extracting
information and delivering reports but those that deliver their final product as a series of training /mentoring sessions
that engage the internal (or external) Continuity Management team. Ideally, the consultant will act as a mentor to the
team and enable them to acquire the knowledge and skills to maintain and update the program long after the consultants
disappear.
Step #4 - In-source or Outsource
Executive management need to understand their continuity options – in-source or outsource. IT organizations need a
model that helps identify what continuity services should be sourced internally and what should sourced externally. The

Page 1 of 2
internally sourced services are prime candidates for investment, as they are critical to the success of the business. The
business may out-source other activities according to the capability of the enterprise using established sourcing policies
and guidelines.
Step #5 - Software
Business continuity management is all about executing a recovery process that involves people, process and technologies.
Automating some or all of the recovery process has the potential to help the enterprise get to the business operations state
faster. The challenge is to find vendors that actually have off-the-shelf software solutions vs. those that offer custom-built
solutions that are cost-prohibitive to the enterprise.
Step #6 Documentation
We have seen too many examples of corporate recovery procedures that require you to read six chapters of project history,
steering committee minutes, etc. before you get to the first recovery step. History and reason are important, but only when
planning the business continuity management program. The final set of documents needs to be streamlined to enable the
Continuity Management team to implement the processes that will get the enterprise to the business operations state as
quickly as possible.

Summary
Unnatural disasters in IT are becoming more commonplace than hurricanes, fires, floods, and ice storms we usually
associate with disasters. One can also argue that unnatural disasters are even more devastating than their natural
counterparts are.
Enterprises need to think beyond the four walls of the buildings they occupy when building their IT Service Continuity
program. The six steps to effective IT Service Continuity Management are:
1. Managing the big picture
2. Scenario planning
3. Consultants & training
4. In-source or outsource
5. Software
6. Documentation

Entire Contents © 2009 itSM Solutions® LLC. All Rights Reserved.
ITIL ® and IT Infrastructure Library ® are Registered Trade Marks of the Office of Government Commerce and is used here by itSM Solutions LLC
under license from and with the permission of OGC (Trade Mark License No. 0002).

Page 2 of 2

More Related Content

What's hot

AIIM Info360 Conference - What ECM Success Looks Like - 2010 04 21
AIIM Info360 Conference - What ECM Success Looks Like - 2010 04 21AIIM Info360 Conference - What ECM Success Looks Like - 2010 04 21
AIIM Info360 Conference - What ECM Success Looks Like - 2010 04 21Greg Clark
 
Business-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersBusiness-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersEMC
 
Business Driven Technology Considerations
Business Driven Technology ConsiderationsBusiness Driven Technology Considerations
Business Driven Technology ConsiderationsDominic Lumsden
 
13 Top GRC Tools for an Integrated Governance, Risk and Compliance Strategy
13 Top GRC Tools for an Integrated Governance, Risk and Compliance Strategy13 Top GRC Tools for an Integrated Governance, Risk and Compliance Strategy
13 Top GRC Tools for an Integrated Governance, Risk and Compliance StrategyQuekelsBaro
 
Enterprise Information Management
Enterprise Information ManagementEnterprise Information Management
Enterprise Information ManagementBilly Cripe
 
Aligning IT to meet Business Obectives in Investment Management
Aligning IT to meet Business Obectives in Investment ManagementAligning IT to meet Business Obectives in Investment Management
Aligning IT to meet Business Obectives in Investment Managementdanielp3
 
Aiim ibm advanced casemanagement-2013-01
Aiim ibm advanced casemanagement-2013-01Aiim ibm advanced casemanagement-2013-01
Aiim ibm advanced casemanagement-2013-01Katleen Aems
 
7 information management trends
7 information management trends7 information management trends
7 information management trendsVander Loto
 
Aiim electronic records management trends
Aiim electronic records management trendsAiim electronic records management trends
Aiim electronic records management trendsVander Loto
 
Telecom Mergers and Acquisitions
Telecom Mergers and AcquisitionsTelecom Mergers and Acquisitions
Telecom Mergers and AcquisitionsInfosys
 
10 Steps to Reduce Complexity, Increase Transparency, and Get Value from you...
 10 Steps to Reduce Complexity, Increase Transparency, and Get Value from you... 10 Steps to Reduce Complexity, Increase Transparency, and Get Value from you...
10 Steps to Reduce Complexity, Increase Transparency, and Get Value from you...eprentise
 
Mergers & Acquisitions: Realizing the Value
Mergers & Acquisitions: Realizing the Value Mergers & Acquisitions: Realizing the Value
Mergers & Acquisitions: Realizing the Value eprentise
 
Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...
Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...
Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...Cognizant
 
Creating Optimized Business Relationships - Article #1
Creating Optimized Business Relationships - Article #1Creating Optimized Business Relationships - Article #1
Creating Optimized Business Relationships - Article #1Lawrence Dillon
 

What's hot (20)

AIIM Info360 Conference - What ECM Success Looks Like - 2010 04 21
AIIM Info360 Conference - What ECM Success Looks Like - 2010 04 21AIIM Info360 Conference - What ECM Success Looks Like - 2010 04 21
AIIM Info360 Conference - What ECM Success Looks Like - 2010 04 21
 
Business-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersBusiness-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach Matters
 
Dit yvol5iss10
Dit yvol5iss10Dit yvol5iss10
Dit yvol5iss10
 
Business Driven Technology Considerations
Business Driven Technology ConsiderationsBusiness Driven Technology Considerations
Business Driven Technology Considerations
 
13 Top GRC Tools for an Integrated Governance, Risk and Compliance Strategy
13 Top GRC Tools for an Integrated Governance, Risk and Compliance Strategy13 Top GRC Tools for an Integrated Governance, Risk and Compliance Strategy
13 Top GRC Tools for an Integrated Governance, Risk and Compliance Strategy
 
Dit yvol3iss20
Dit yvol3iss20Dit yvol3iss20
Dit yvol3iss20
 
Enterprise Information Management
Enterprise Information ManagementEnterprise Information Management
Enterprise Information Management
 
Aligning IT to meet Business Obectives in Investment Management
Aligning IT to meet Business Obectives in Investment ManagementAligning IT to meet Business Obectives in Investment Management
Aligning IT to meet Business Obectives in Investment Management
 
Aiim ibm advanced casemanagement-2013-01
Aiim ibm advanced casemanagement-2013-01Aiim ibm advanced casemanagement-2013-01
Aiim ibm advanced casemanagement-2013-01
 
7 information management trends
7 information management trends7 information management trends
7 information management trends
 
Aiim electronic records management trends
Aiim electronic records management trendsAiim electronic records management trends
Aiim electronic records management trends
 
Telecom Mergers and Acquisitions
Telecom Mergers and AcquisitionsTelecom Mergers and Acquisitions
Telecom Mergers and Acquisitions
 
Select collaboration platform
Select collaboration platformSelect collaboration platform
Select collaboration platform
 
BPM in Healthcare
BPM in HealthcareBPM in Healthcare
BPM in Healthcare
 
Dit yvol2iss40
Dit yvol2iss40Dit yvol2iss40
Dit yvol2iss40
 
10 Steps to Reduce Complexity, Increase Transparency, and Get Value from you...
 10 Steps to Reduce Complexity, Increase Transparency, and Get Value from you... 10 Steps to Reduce Complexity, Increase Transparency, and Get Value from you...
10 Steps to Reduce Complexity, Increase Transparency, and Get Value from you...
 
Mergers & Acquisitions: Realizing the Value
Mergers & Acquisitions: Realizing the Value Mergers & Acquisitions: Realizing the Value
Mergers & Acquisitions: Realizing the Value
 
Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...
Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...
Navigating Through Post-Merger Integration of CRM Systems: A Salesforce Persp...
 
Sourcing I.T. Value
Sourcing I.T. ValueSourcing I.T. Value
Sourcing I.T. Value
 
Creating Optimized Business Relationships - Article #1
Creating Optimized Business Relationships - Article #1Creating Optimized Business Relationships - Article #1
Creating Optimized Business Relationships - Article #1
 

Similar to Plan for Unnatural IT Disasters

Innovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfInnovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfAbdulbasit Almauly
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefVisal Thach
 
The need for it infrastructure management services
The need for it infrastructure management servicesThe need for it infrastructure management services
The need for it infrastructure management servicesnebula12_23
 
RSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT SystemRSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT SystemRSM India
 
IT Alignment Is Not Enough
IT Alignment Is Not EnoughIT Alignment Is Not Enough
IT Alignment Is Not EnoughBIJ MISHRA
 
The Ultimate Guide to Managed IT Services for the Modern Business
The Ultimate Guide to Managed IT Services for the Modern BusinessThe Ultimate Guide to Managed IT Services for the Modern Business
The Ultimate Guide to Managed IT Services for the Modern BusinessTechvera
 
Cfo insights evaluating_it
Cfo insights evaluating_itCfo insights evaluating_it
Cfo insights evaluating_itKamalakar Yadav
 
The Role of IT in Supporting Mergers and Acquisitions
The Role of IT in Supporting Mergers and AcquisitionsThe Role of IT in Supporting Mergers and Acquisitions
The Role of IT in Supporting Mergers and AcquisitionsCognizant
 
ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6Michael Punzo
 
1. Top of FormResource Project Systems Acquisition Plan Gradi.docx
1. Top of FormResource Project Systems Acquisition Plan Gradi.docx1. Top of FormResource Project Systems Acquisition Plan Gradi.docx
1. Top of FormResource Project Systems Acquisition Plan Gradi.docxambersalomon88660
 
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdfBerryHughes
 
The overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure managementThe overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure managementNIIT Technologies
 
Information-Systems-and-Technology.pptx
Information-Systems-and-Technology.pptxInformation-Systems-and-Technology.pptx
Information-Systems-and-Technology.pptxAhimsaBhardwaj
 

Similar to Plan for Unnatural IT Disasters (17)

ITIL
ITILITIL
ITIL
 
Innovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfInnovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdf
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-brief
 
The need for it infrastructure management services
The need for it infrastructure management servicesThe need for it infrastructure management services
The need for it infrastructure management services
 
RSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT SystemRSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT System
 
IT Infrastructure - Importance of IT to Business
IT Infrastructure - Importance of IT to BusinessIT Infrastructure - Importance of IT to Business
IT Infrastructure - Importance of IT to Business
 
IT Alignment Is Not Enough
IT Alignment Is Not EnoughIT Alignment Is Not Enough
IT Alignment Is Not Enough
 
The Ultimate Guide to Managed IT Services for the Modern Business
The Ultimate Guide to Managed IT Services for the Modern BusinessThe Ultimate Guide to Managed IT Services for the Modern Business
The Ultimate Guide to Managed IT Services for the Modern Business
 
Cfo insights evaluating_it
Cfo insights evaluating_itCfo insights evaluating_it
Cfo insights evaluating_it
 
The Role of IT in Supporting Mergers and Acquisitions
The Role of IT in Supporting Mergers and AcquisitionsThe Role of IT in Supporting Mergers and Acquisitions
The Role of IT in Supporting Mergers and Acquisitions
 
ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6
 
NLOGIX
NLOGIXNLOGIX
NLOGIX
 
1. Top of FormResource Project Systems Acquisition Plan Gradi.docx
1. Top of FormResource Project Systems Acquisition Plan Gradi.docx1. Top of FormResource Project Systems Acquisition Plan Gradi.docx
1. Top of FormResource Project Systems Acquisition Plan Gradi.docx
 
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
 
The overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure managementThe overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure management
 
IT Service Management.pdf
IT Service Management.pdfIT Service Management.pdf
IT Service Management.pdf
 
Information-Systems-and-Technology.pptx
Information-Systems-and-Technology.pptxInformation-Systems-and-Technology.pptx
Information-Systems-and-Technology.pptx
 

More from Rick Lemieux (20)

Dit yvol5iss36
Dit yvol5iss36Dit yvol5iss36
Dit yvol5iss36
 
Dit yvol5iss35
Dit yvol5iss35Dit yvol5iss35
Dit yvol5iss35
 
Dit yvol5iss34
Dit yvol5iss34Dit yvol5iss34
Dit yvol5iss34
 
Dit yvol5iss31
Dit yvol5iss31Dit yvol5iss31
Dit yvol5iss31
 
Dit yvol5iss33
Dit yvol5iss33Dit yvol5iss33
Dit yvol5iss33
 
Dit yvol5iss32
Dit yvol5iss32Dit yvol5iss32
Dit yvol5iss32
 
Dit yvol5iss30
Dit yvol5iss30Dit yvol5iss30
Dit yvol5iss30
 
Dit yvol5iss29
Dit yvol5iss29Dit yvol5iss29
Dit yvol5iss29
 
Dit yvol5iss28
Dit yvol5iss28Dit yvol5iss28
Dit yvol5iss28
 
Dit yvol5iss26
Dit yvol5iss26Dit yvol5iss26
Dit yvol5iss26
 
Dit yvol5iss25
Dit yvol5iss25Dit yvol5iss25
Dit yvol5iss25
 
Dit yvol5iss24
Dit yvol5iss24Dit yvol5iss24
Dit yvol5iss24
 
Dit yvol5iss23
Dit yvol5iss23Dit yvol5iss23
Dit yvol5iss23
 
Dit yvol5iss22
Dit yvol5iss22Dit yvol5iss22
Dit yvol5iss22
 
Dit yvol5iss21
Dit yvol5iss21Dit yvol5iss21
Dit yvol5iss21
 
Dit yvol5iss20
Dit yvol5iss20Dit yvol5iss20
Dit yvol5iss20
 
Dit yvol5iss19
Dit yvol5iss19Dit yvol5iss19
Dit yvol5iss19
 
Dit yvol5iss17
Dit yvol5iss17Dit yvol5iss17
Dit yvol5iss17
 
Dit yvol5iss16
Dit yvol5iss16Dit yvol5iss16
Dit yvol5iss16
 
Dit yvol5iss15
Dit yvol5iss15Dit yvol5iss15
Dit yvol5iss15
 

Plan for Unnatural IT Disasters

  • 1. The workable, practical guide to Do IT Yourself Vol. 5.37 • September 17, 2009 Continuity Management – Planning for Unnatural Disasters By Rick Lemieux Many IT professionals have followed the path of planning for natural disasters like power outages due to tornados etc. But how many have planned for unnatural disasters like identify theft and software viruses? Natural disasters like floods and fires can cost enterprises significant lost revenue and customers. Unnatural disasters like identity theft and software viruses can be even more costly. IT organizations need to consider both natural and unnatural disasters when using ITSM best practices to prepare their disaster responses. As a practitioner in the business of IT Service Management, I have seen many business executives take chances with their approach to Business Continuity Management (BCM). While business issues like supply chain management are outside the scope of most IT departments, IT Service Continuity Management (ITSCM) is not. ITSCM is a sub-set of BCM focused on establishing the risk-appetite of the business, and then providing recommended planning guidance to the business and IT processes. The ITIL describes the goal of IT Service Continuity Management (ITSCM) as "...to support the overall Business Continuity Management process by ensuring that the required IT technical and services facilities (including computer systems, networks, applications, telecommunications, technical support and Service Desk) can be recovered within required, and agreed, business timescales." Based on my experience, this newsletter outlines six steps I believe IT organizations should follow in order to build an effective ITSCM program to protect IT services and systems from those unnatural disasters that could have a devastating impact on the business. IT Service Continuity Management Step #1 - Managing the Big Picture IT organizations, through the use of ITSM best practices, need to provide executive management with a holistic understanding of what IT does for the business, how it does it and the impact it will have on the business if it does not continue to do so. In many cases, this will be the first time the management team sees a complete view of IT’s contribution to the operational business which will help them make better investment decisions in the area of IT business continuity management. Step #2 - Scenario planning IT organizations need to help executive management understand the details of what it would take to recover from an unnatural disaster. Scenarios should include detailed timelines and information about the people, process and technologies required to restore the services to business level operations. Step #3 – Consultants & Training If you need to hire a consultant, it is very important to hire individuals or organizations who not only focus on extracting information and delivering reports but those that deliver their final product as a series of training /mentoring sessions that engage the internal (or external) Continuity Management team. Ideally, the consultant will act as a mentor to the team and enable them to acquire the knowledge and skills to maintain and update the program long after the consultants disappear. Step #4 - In-source or Outsource Executive management need to understand their continuity options – in-source or outsource. IT organizations need a model that helps identify what continuity services should be sourced internally and what should sourced externally. The Page 1 of 2
  • 2. internally sourced services are prime candidates for investment, as they are critical to the success of the business. The business may out-source other activities according to the capability of the enterprise using established sourcing policies and guidelines. Step #5 - Software Business continuity management is all about executing a recovery process that involves people, process and technologies. Automating some or all of the recovery process has the potential to help the enterprise get to the business operations state faster. The challenge is to find vendors that actually have off-the-shelf software solutions vs. those that offer custom-built solutions that are cost-prohibitive to the enterprise. Step #6 Documentation We have seen too many examples of corporate recovery procedures that require you to read six chapters of project history, steering committee minutes, etc. before you get to the first recovery step. History and reason are important, but only when planning the business continuity management program. The final set of documents needs to be streamlined to enable the Continuity Management team to implement the processes that will get the enterprise to the business operations state as quickly as possible. Summary Unnatural disasters in IT are becoming more commonplace than hurricanes, fires, floods, and ice storms we usually associate with disasters. One can also argue that unnatural disasters are even more devastating than their natural counterparts are. Enterprises need to think beyond the four walls of the buildings they occupy when building their IT Service Continuity program. The six steps to effective IT Service Continuity Management are: 1. Managing the big picture 2. Scenario planning 3. Consultants & training 4. In-source or outsource 5. Software 6. Documentation Entire Contents © 2009 itSM Solutions® LLC. All Rights Reserved. ITIL ® and IT Infrastructure Library ® are Registered Trade Marks of the Office of Government Commerce and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No. 0002). Page 2 of 2