SlideShare a Scribd company logo
10 Business Resilience
Questions Every Business
Should Be Asking Itself
About it’s Business
Resilience
About me
• Michael Bowers
• Sr Solutions Specialist
• CAM Business Solutions, Los Angeles
• Established in 2002
• IT consultant in the 1990s
• Director of IT for Nadel Architects in 2001
• Specialty
• Security
• Operations
• Backup and Recovery
• Networking
What is Business Resilience
• Business resilience is the ability to prepare for, respond to, and
recover from just about disaster it may face.
• It helps an organization protect against the countless threats that can
cripple it’s operations, and limit the severity of any incident, and
ensure its continued survival despite an event.
Business Resilience
• Cyber resilience has emerged over the past few years because
traditional cybersecurity measures are no longer enough.
• It is now commonly accepted that it’s no longer a matter of ‘if’ but
‘when’ an organization will suffer data loss or a cyber attack.
• This means that instead of focusing your efforts on keeping criminals
out of your network, it’s better to assume they will eventually break
through your defenses, and start working on a strategy to reduce the
impact.
What could possibly happen?
Question #1
How do you feel about your company’s current Risk Posture?
Question #2
WWYD – If there was a fire, flood, cyber attack, or a malicious attack at
your main office?
Question #3
Do we have an accurate inventory of all of our data locations?
Question #4
What’s our Cyber Security strategy and would it detect the threats I keep
hearing about?
Question #5
Where do we keep our incident response policies?
Question #6
Where do we keep our incident response policies?
Question #7
What solutions / vendors are needed to fulfill our responsibilities to our
clients?
Question #8
What’s the focus of our backups? Copies? Current data? Speed of being
back up?
Question #8
Question #9
Communications- WWYD
Question #10
Who is responsible for managing our threat exposure?
Summary
• While there is no way for a company to truly predict
every disaster it will face - having risk management
policies in place can help soften the blow of business
disruptions and sometimes prevent the problems
altogether.
• Risks are something businesses are exposed to daily.
Whether it is an internal failure or an external event,
there is a seemingly endless list of things that can
threaten business productivity at any given moment.
Some of these risks are even serious enough to
jeopardize an organization’s survival.
IMPROVING YOUR RISK MANAGEMENT
APPROACH
The benefits of good risk management combined
with the potential risk of neglecting these
practices makes an enticing case for improving
your approach immediately.
So, what should be your first steps?
Action steps
Assess and plan: The first step to good risk management is assessing your
current state. Where are you most susceptible to risk and how much work
needs to be done to prevent it? Deciding what state you are in currently
can help you better formulate the correct plan for your business. From
there, you should start laying out a concrete strategy.
Action steps
Communicate your plan: A plan is rendered useless when it's not
efficiently communicated to the necessary parties. Business leaders
should make sure these new processes and risk policies are readily
available to employees new and old. Upon the completion of your risk
management plan, hold a company wide meeting and open the field for
questions and clarifications.
Action steps
Improve internal processes: Improving internal management functions is
one of the best ways to tackle potential business risks immediately. From
improving your cyber protection to better tracking your data and assets,
leveraging the resources of your IT partner can help significantly lower
your chances of falling victim to common industry problems.
Thank you for your time
Michael Bowers
818-356-7187
Mbowers@CAMBusinessSolutions.com
10 Questions Every Company Should Be Asking Itself About its Business Resilience

More Related Content

What's hot

Risk management in simple terms with some humor
Risk management in simple terms with some humorRisk management in simple terms with some humor
Risk management in simple terms with some humor
Kumar Kolaganti
 
What people analytics can't capture
What people analytics can't captureWhat people analytics can't capture
What people analytics can't capture
SanyamArora13
 
You will be breached
You will be breachedYou will be breached
You will be breached
Mike Saunders
 
When You Should Use Analytics for Decisions
When You Should Use Analytics for DecisionsWhen You Should Use Analytics for Decisions
When You Should Use Analytics for Decisions
Vessment
 
How Does Your Company Handle Distracted Driving?
How Does Your Company Handle Distracted Driving?How Does Your Company Handle Distracted Driving?
How Does Your Company Handle Distracted Driving?
National Retail Federation
 
Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment
Rick van der Kleij
 
10 Most Common Business Mistakes
10 Most Common Business Mistakes10 Most Common Business Mistakes
10 Most Common Business Mistakes
Christine Reason
 
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...
Health IT Conference – iHT2
 
Analysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuff
Analysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuffAnalysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuff
Analysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuff
Matt Hansen
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
zapp0
 
Smartcon 2015 – Automated Decisions in the Supply Chain
Smartcon 2015 – Automated Decisions in the Supply ChainSmartcon 2015 – Automated Decisions in the Supply Chain
Smartcon 2015 – Automated Decisions in the Supply ChainLars Trieloff
 
NAWBO/Travelers 2013 Survey results
NAWBO/Travelers 2013 Survey resultsNAWBO/Travelers 2013 Survey results
NAWBO/Travelers 2013 Survey results
Tinu Abayomi-Paul
 
Orientation and alignment in a vuca world
Orientation and alignment in a vuca worldOrientation and alignment in a vuca world
Orientation and alignment in a vuca world
Bernhard Sterchi
 
React Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident ResponseReact Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident Response
SilvioPappalardo
 
10 Rules for Vendors - an Overview
10 Rules for Vendors - an Overview10 Rules for Vendors - an Overview
10 Rules for Vendors - an Overview
Gary Hayslip CISSP, CISA, CRISC, CCSK
 
Kepner Tregoe (KT) - How did the chicken
Kepner Tregoe (KT) - How did the chicken Kepner Tregoe (KT) - How did the chicken
Kepner Tregoe (KT) - How did the chicken
ilgor
 
011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs
Richard Smiraldi
 
Program delivery - that doesn't have a snowball's chance in hell!
Program delivery - that doesn't have a snowball's chance in hell!Program delivery - that doesn't have a snowball's chance in hell!
Program delivery - that doesn't have a snowball's chance in hell!
Mentor
 
Testing 2.0
Testing 2.0Testing 2.0
Testing 2.0
Armands Baranovskis
 

What's hot (20)

Risk management in simple terms with some humor
Risk management in simple terms with some humorRisk management in simple terms with some humor
Risk management in simple terms with some humor
 
What people analytics can't capture
What people analytics can't captureWhat people analytics can't capture
What people analytics can't capture
 
You will be breached
You will be breachedYou will be breached
You will be breached
 
When You Should Use Analytics for Decisions
When You Should Use Analytics for DecisionsWhen You Should Use Analytics for Decisions
When You Should Use Analytics for Decisions
 
How Does Your Company Handle Distracted Driving?
How Does Your Company Handle Distracted Driving?How Does Your Company Handle Distracted Driving?
How Does Your Company Handle Distracted Driving?
 
Continuity Mag Q3 2013
Continuity Mag Q3 2013Continuity Mag Q3 2013
Continuity Mag Q3 2013
 
Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment
 
10 Most Common Business Mistakes
10 Most Common Business Mistakes10 Most Common Business Mistakes
10 Most Common Business Mistakes
 
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...
 
Analysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuff
Analysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuffAnalysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuff
Analysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuff
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Smartcon 2015 – Automated Decisions in the Supply Chain
Smartcon 2015 – Automated Decisions in the Supply ChainSmartcon 2015 – Automated Decisions in the Supply Chain
Smartcon 2015 – Automated Decisions in the Supply Chain
 
NAWBO/Travelers 2013 Survey results
NAWBO/Travelers 2013 Survey resultsNAWBO/Travelers 2013 Survey results
NAWBO/Travelers 2013 Survey results
 
Orientation and alignment in a vuca world
Orientation and alignment in a vuca worldOrientation and alignment in a vuca world
Orientation and alignment in a vuca world
 
React Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident ResponseReact Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident Response
 
10 Rules for Vendors - an Overview
10 Rules for Vendors - an Overview10 Rules for Vendors - an Overview
10 Rules for Vendors - an Overview
 
Kepner Tregoe (KT) - How did the chicken
Kepner Tregoe (KT) - How did the chicken Kepner Tregoe (KT) - How did the chicken
Kepner Tregoe (KT) - How did the chicken
 
011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs
 
Program delivery - that doesn't have a snowball's chance in hell!
Program delivery - that doesn't have a snowball's chance in hell!Program delivery - that doesn't have a snowball's chance in hell!
Program delivery - that doesn't have a snowball's chance in hell!
 
Testing 2.0
Testing 2.0Testing 2.0
Testing 2.0
 

Similar to 10 Questions Every Company Should Be Asking Itself About its Business Resilience

Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small Business
BrendanRose
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
Rogers Communications
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and response
ZyrellLalaguna
 
Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...
Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...
Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...
LDM Global
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourYasser Mohammed
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
Joel Cardella
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
Jack Nichelson
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business Problems
Brooke Bordelon
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
Stacy Willis
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
Booz Allen Hamilton
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
Mighty Guides, Inc.
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach Checklist
Morrison & Foerster
 
CISO Interview Question.pdf
CISO Interview Question.pdfCISO Interview Question.pdf
CISO Interview Question.pdf
infosec train
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
infosec train
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
Livingstone Advisory
 
10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk
Mark Gibson
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
SurfWatch Labs
 
Marathon overview
Marathon overviewMarathon overview
Marathon overview
Marathon Consulting
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
John Rapa
 

Similar to 10 Questions Every Company Should Be Asking Itself About its Business Resilience (20)

Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small Business
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and response
 
Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...
Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...
Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business Problems
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach Checklist
 
CISO Interview Question.pdf
CISO Interview Question.pdfCISO Interview Question.pdf
CISO Interview Question.pdf
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
 
Marathon overview
Marathon overviewMarathon overview
Marathon overview
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

10 Questions Every Company Should Be Asking Itself About its Business Resilience

  • 1. 10 Business Resilience Questions Every Business Should Be Asking Itself About it’s Business Resilience
  • 2. About me • Michael Bowers • Sr Solutions Specialist • CAM Business Solutions, Los Angeles • Established in 2002 • IT consultant in the 1990s • Director of IT for Nadel Architects in 2001 • Specialty • Security • Operations • Backup and Recovery • Networking
  • 3. What is Business Resilience • Business resilience is the ability to prepare for, respond to, and recover from just about disaster it may face. • It helps an organization protect against the countless threats that can cripple it’s operations, and limit the severity of any incident, and ensure its continued survival despite an event.
  • 4. Business Resilience • Cyber resilience has emerged over the past few years because traditional cybersecurity measures are no longer enough. • It is now commonly accepted that it’s no longer a matter of ‘if’ but ‘when’ an organization will suffer data loss or a cyber attack. • This means that instead of focusing your efforts on keeping criminals out of your network, it’s better to assume they will eventually break through your defenses, and start working on a strategy to reduce the impact.
  • 6. Question #1 How do you feel about your company’s current Risk Posture?
  • 7. Question #2 WWYD – If there was a fire, flood, cyber attack, or a malicious attack at your main office?
  • 8. Question #3 Do we have an accurate inventory of all of our data locations?
  • 9. Question #4 What’s our Cyber Security strategy and would it detect the threats I keep hearing about?
  • 10. Question #5 Where do we keep our incident response policies?
  • 11. Question #6 Where do we keep our incident response policies?
  • 12. Question #7 What solutions / vendors are needed to fulfill our responsibilities to our clients?
  • 13. Question #8 What’s the focus of our backups? Copies? Current data? Speed of being back up?
  • 16. Question #10 Who is responsible for managing our threat exposure?
  • 17. Summary • While there is no way for a company to truly predict every disaster it will face - having risk management policies in place can help soften the blow of business disruptions and sometimes prevent the problems altogether. • Risks are something businesses are exposed to daily. Whether it is an internal failure or an external event, there is a seemingly endless list of things that can threaten business productivity at any given moment. Some of these risks are even serious enough to jeopardize an organization’s survival.
  • 18. IMPROVING YOUR RISK MANAGEMENT APPROACH The benefits of good risk management combined with the potential risk of neglecting these practices makes an enticing case for improving your approach immediately. So, what should be your first steps?
  • 19. Action steps Assess and plan: The first step to good risk management is assessing your current state. Where are you most susceptible to risk and how much work needs to be done to prevent it? Deciding what state you are in currently can help you better formulate the correct plan for your business. From there, you should start laying out a concrete strategy.
  • 20. Action steps Communicate your plan: A plan is rendered useless when it's not efficiently communicated to the necessary parties. Business leaders should make sure these new processes and risk policies are readily available to employees new and old. Upon the completion of your risk management plan, hold a company wide meeting and open the field for questions and clarifications.
  • 21. Action steps Improve internal processes: Improving internal management functions is one of the best ways to tackle potential business risks immediately. From improving your cyber protection to better tracking your data and assets, leveraging the resources of your IT partner can help significantly lower your chances of falling victim to common industry problems.
  • 22. Thank you for your time Michael Bowers 818-356-7187 Mbowers@CAMBusinessSolutions.com