SlideShare a Scribd company logo
Alphabet Soup – A(utomation), BC(Business
Continuity) and DR (Disaster Recovery)
Christopher Rogers
Senior Technical Advisor, Intelligent Infrastructure
Internetwork Engineering
Agenda
• BC or DR? Defined….
• Business Continuity (BC)
• Disaster Recovery (DR)
• What about “Cloud”?
• Other Thoughts
• Automation
• Conclusion
What does it take to make a great soup?
A good base – maybe start with the trinity
(onions, celery, and bell peppers) sautéed
A good broth (probably chicken)
Layer in other flavors and ingredients
• How many have a DR Plan?
• How many have a BC Strategy?
• How many thought they had a BC Strategy because they had a DR Plan?
• May not be you, but what about others in your organization?
• How many are performing some type of automation in IT?
Quick Status Check
What does
it take to
have good
BC/DR
“soup”
BC or DR? Defined…
The processes, procedures,
and solutions needed to make
sure an organization can
continue to function
The plan an organization has in
place to recover data or
technology losses
Business Continuity Disaster Recovery
Business Continuity
Disaster
Recovery
Focused on planning for the
restoration and recovery of any
technology functionality or data
that was lost
Focused on risk analysis and
planning to ensure the
business can continue to
operate
Organizational
Arrangement of
BC and DR
Business Continuity Questions
• What is the organization’s primary function?
• What secondary functions support the primary
function?
• How does the organization perform its function?
• What processes and procedures that govern this
function?
• Are these functions offered virtually? Online,
telephone?
• Are there compliance/legal requirements that govern
how the functions are performed?
• Where do employees perform their job functions?
• Do they come to a brick and mortar?
• What do they use to perform their job functions?
Business Continuity Questions context
• What is the organization’s primary function?
• What is the impact/result of this function not being performed? Can the loss be quantified?
• Who (what) is affected by the loss of the primary function? How long can the constituents
continue without this function?
• What secondary functions support the primary function?
• Are these secondary functions essential to the operation of the primary function? What is the
operational impact of operating without a given secondary function?
• How does the organization perform this function
• What processes and procedures that govern this function? Essential processes?
• Can and are these functions offered virtually? Online, telephone? Require employee
interaction?
• Are there compliance/legal requirements that govern how the functions are performed?
• What requirements govern these functions? If necessary, can special operating procedures be
implemented?
• Where do employees perform their job functions?
• Do they HAVE come to a brick and mortar? If so has a location been identified?
• What do they use to perform their job functions? How do they work?
• No brick and mortar? Can they work virtually, What do they need to work virtually, Are
process changes needed to work virtually?
• May have to make hard decisions
• Not all business functions are truly necessary to support primary function
• Understand how to re-incorporate secondary business functions and impact
• Incident Response – Is your incident response incorporated?
Key Ingredient:
1) Know the top (up to 5)
critical function(s) of the
organization.
2) Think like a business,
what is the bare minimum
need to stay in operation
during the event and after
the event.
3) Incident Response
Why BC Strategy
– Scenarios
• Pandemic
• Regional Disaster
• Primary (Only) Site
• Many others …
Disaster Recovery Questions
• How is the organization’s primary function impacted by loss of
technology?
• What technology services support the organization’s primary
function?
• Is technology service dependency understood?
• What technology services support the organization’s secondary
functions?
• What compliance/legal requirements govern technology services?
• Are Service Level Agreements between organizational groups and the
technology group in place?
• What is the expected RPO (Recovery Point Objective)?
• What is the expected RTO (Recovery Time Objective)?
Disaster Recovery Questions context
• How is the organization’s primary function impacted by loss of technology?
• Can the primary function be performed without technology? If so, for how long? What is the perception
if technology services are lost?
• What technology services support the organization’s primary function?
• Is technology service dependency understood and documented? Have all technology services that
support the function been identified? Rank services, Know the order of service resumption, Understand
prerequisites for services
• What technology services support the organization’s secondary functions? Ask same questions
• What compliance/legal requirements govern technology services? What impact do compliance/legal
requirements have? How do requirements impact ability to perform disaster recovery?
• Are there DOCUMENTED Service Level Agreements (SLAs) between organizational groups and the
technology group in place? Does the organization understand the impact of fulfilling the SLAs?
(BC quantifies loss of ability to perform primary function)
• What is the expected RPO (Recovery Point Objective)? How much data loss is acceptable?
• What is the expected RTO (Recovery Time Objective)? How quickly do the technology services need to
be restored?
• Have to make hard decisions
• Not all technology services will be required for primary function
• Understand how to re-incorporate secondary services and impact
• In House - Start Small
• One Application that supports primary function or major secondary function
• Preferably one that has well documented guidelines and recommendations for DR
• Seek Assistance – Still Start Small
• Onboarding – As Applications are added or replaced – Assess and incorporate into DR
• Incident Response – Align your cybersecurity IR process with DR
Key Ingredient(s):
1) Know technological
dependencies for the top
(up to 5) function(s)
2) Availability path for the
technological
dependencies
3) Incident Response
Why DR Plan – Scenarios
• Localized (DC Center) Issues
• Ransomware – Malicious behavior
• Human Error
• Many others …
What About the “Cloud”?
• Primary Technology Platform
• IaaS, PaaS, SaaS, DaaS, BaaS, DRaaS
• Business Continuity
• Provide worker access to IT Resources (DaaS)
• DR
• IaaS, PaaS, SaaS, DRaaS, BaaS
• Things to think about
• Backups
• Provide redundancy – not backups
• Disaster Recovery
• Provide redundancy – but not normally beyond site
unless chosen
• Data Movement
• Free to bring in – Pay to leave
• Alternative Cloud https://docs.microsoft.com/en-
us/azure/architecture/resiliency/disas
ter-recovery-azure-applications
Things to think about
• Practice, Practice, Practice
• More Practice
• People
• Where are they?
• Are they affected by the situation?
• To what extent are they affected?
• What is the personal effect on them?
• Will they be able to fulfill their duties?
• Third Party
• Logistical
• Physical Access
• Card Access?
• Disaster causes card process to fail?
• Impassable?
• Documentation – secondary copy?
• BC/DR Equipment
• Understand where you are in CIP (Critical Infrastructure Protection)
• https://www.dhs.gov/what-critical-infrastructure
Automation
• Why Automation?
• Get things done faster!?!
• Steps to Automation –
• Looks for repetitive tasks
• Understand what we want to automate
• Document the process
• Standardize the process
• Utilize best practice
• Results of Automation
• Faster deployment
• Documented deployment
• Consistent deployment – less human error
• Better maintenance processes – help stay up to date
Automation – Reservations
• We’re too small organization – Don’t need Automation
• Moving to the Cloud
• Don’t have a mature IT process or governance
• Automate myself out of a job 
• Automate yourself into a disaster!?
• Build out in layers
• Treat like Dev Process – Test, Test, Test (not in Production )
• Where to start
• Semi-automate processes
• Change Management
• Request and approval
• Update BC/DR
• MAC (Moves, Adds, Changes)
• Information gathering
• Existing setups and configurations
• Topology
Automation – Impact
• BC/DR Impact
• Documented process for service restoration
• Known good configuration state
• Systematic restoration
• Faster restoration time
• Organizational Results
• Business continuity strategy and disaster recovery plan can be better maintained
• Less downtime of mission critical applications when a disaster or unexpected event
occurs
• Reduced risk of downtime due to human error
• Confidence that the recovery process is solid
• Reduced risk of recovery process failure due to inaccurate information or human
error
Key Ingredient:
Automation can make
your BC/DR process
better.
Conclusion
• What are the top 5 critical functions of the
organization. If the organization were a business,
what is the bare minimum it would take to stay in
business during the event and after the event.
• What technological dependencies do those top 5
functions require?
• What is the availability path for the technological
dependencies, should an event occur? Meaning, if an
event affects those resources, what is the
contingency.
• Incident Response
• Know how it integrates
• IR may require BC or DR to be put in motion
• Automation – Its your friend 
Thank you!
Questions?
Christopher Rogers
SeniorTechnical Advisor – Intelligent Infrastructure
SNR (704) 944-0072 | crogers@ineteng.com
Raleigh Security Users Group (Quarterly) – next mtg 6/7
Charlotte Security Users Group (Bi-monthly) – next mtg 6/22
www.ineteng.com/events

More Related Content

What's hot

Feb2007 Kelly Services Hdi Chapter Meeting 020807 Public Domain
Feb2007   Kelly Services   Hdi Chapter Meeting 020807 Public DomainFeb2007   Kelly Services   Hdi Chapter Meeting 020807 Public Domain
Feb2007 Kelly Services Hdi Chapter Meeting 020807 Public Domain
IT Service and Support
 
Segregation of Duties and Continuous Delivery
Segregation of Duties and Continuous DeliverySegregation of Duties and Continuous Delivery
Segregation of Duties and Continuous Delivery
Sriram Narayanan
 
ITIL and CMMI for service
ITIL and CMMI for serviceITIL and CMMI for service
ITIL and CMMI for service
BoonNam Goh
 
ITIL & CMMI for Services
ITIL & CMMI for ServicesITIL & CMMI for Services
ITIL & CMMI for Services
NUS-ISS
 
Daniel Breston - DevOps metrics that matter
Daniel Breston - DevOps metrics that matterDaniel Breston - DevOps metrics that matter
Daniel Breston - DevOps metrics that matter
itSMF UK
 
Concepts of cutover planning and management
Concepts of cutover planning and managementConcepts of cutover planning and management
Concepts of cutover planning and management
Sanjay Choubey
 
It's the organisation, Stupid
It's the organisation, StupidIt's the organisation, Stupid
It's the organisation, Stupid
John M Walsh
 
MY BUSINESS - MY IT - MY ITSM
MY BUSINESS - MY IT - MY ITSMMY BUSINESS - MY IT - MY ITSM
MY BUSINESS - MY IT - MY ITSM
Aditya Dashora
 
Improving Performance Improvement (Market Requirements Document - MRD)
Improving Performance Improvement (Market Requirements Document - MRD)Improving Performance Improvement (Market Requirements Document - MRD)
Improving Performance Improvement (Market Requirements Document - MRD)
Adam "AB" Bloom
 
Andrew Shepherd - Rethink the service desk role to change its image forever
Andrew Shepherd - Rethink the service desk role to change its image foreverAndrew Shepherd - Rethink the service desk role to change its image forever
Andrew Shepherd - Rethink the service desk role to change its image forever
itSMF UK
 
Steve Chambers - Cloud for GrownUps ITSM17
Steve Chambers - Cloud for GrownUps ITSM17Steve Chambers - Cloud for GrownUps ITSM17
Steve Chambers - Cloud for GrownUps ITSM17
itSMF UK
 
Operating a Highly Available Cloud Service
Operating a Highly Available Cloud ServiceOperating a Highly Available Cloud Service
Operating a Highly Available Cloud Service
Depankar Neogi
 
Sage People Migration
Sage People MigrationSage People Migration
Sage People Migration
Net at Work
 
Are processes masquerading as projects hurting your business
Are processes masquerading as projects hurting your businessAre processes masquerading as projects hurting your business
Are processes masquerading as projects hurting your business
Ben Bradley
 
Office Lean Overview
Office Lean OverviewOffice Lean Overview
Office Lean Overview
ahmad bassiouny
 
La gouvernance au cœur de la transformation numérique - Comment COBIT 5 peut ...
La gouvernance au cœur de la transformation numérique - Comment COBIT 5 peut ...La gouvernance au cœur de la transformation numérique - Comment COBIT 5 peut ...
La gouvernance au cœur de la transformation numérique - Comment COBIT 5 peut ...
Antoine Vigneron
 
Process modeling in agile environment alec sharp
Process modeling in agile environment alec sharpProcess modeling in agile environment alec sharp
Process modeling in agile environment alec sharp
Loihde Advisory
 
Aces 405 - Team that actually saved the most money..!!
Aces 405 - Team that actually saved the most money..!!Aces 405 - Team that actually saved the most money..!!
Aces 405 - Team that actually saved the most money..!!
Satwinder Singh
 

What's hot (20)

Feb2007 Kelly Services Hdi Chapter Meeting 020807 Public Domain
Feb2007   Kelly Services   Hdi Chapter Meeting 020807 Public DomainFeb2007   Kelly Services   Hdi Chapter Meeting 020807 Public Domain
Feb2007 Kelly Services Hdi Chapter Meeting 020807 Public Domain
 
Segregation of Duties and Continuous Delivery
Segregation of Duties and Continuous DeliverySegregation of Duties and Continuous Delivery
Segregation of Duties and Continuous Delivery
 
ITIL and CMMI for service
ITIL and CMMI for serviceITIL and CMMI for service
ITIL and CMMI for service
 
ITIL & CMMI for Services
ITIL & CMMI for ServicesITIL & CMMI for Services
ITIL & CMMI for Services
 
Daniel Breston - DevOps metrics that matter
Daniel Breston - DevOps metrics that matterDaniel Breston - DevOps metrics that matter
Daniel Breston - DevOps metrics that matter
 
Concepts of cutover planning and management
Concepts of cutover planning and managementConcepts of cutover planning and management
Concepts of cutover planning and management
 
It's the organisation, Stupid
It's the organisation, StupidIt's the organisation, Stupid
It's the organisation, Stupid
 
MY BUSINESS - MY IT - MY ITSM
MY BUSINESS - MY IT - MY ITSMMY BUSINESS - MY IT - MY ITSM
MY BUSINESS - MY IT - MY ITSM
 
Improving Performance Improvement (Market Requirements Document - MRD)
Improving Performance Improvement (Market Requirements Document - MRD)Improving Performance Improvement (Market Requirements Document - MRD)
Improving Performance Improvement (Market Requirements Document - MRD)
 
Andrew Shepherd - Rethink the service desk role to change its image forever
Andrew Shepherd - Rethink the service desk role to change its image foreverAndrew Shepherd - Rethink the service desk role to change its image forever
Andrew Shepherd - Rethink the service desk role to change its image forever
 
Steve Chambers - Cloud for GrownUps ITSM17
Steve Chambers - Cloud for GrownUps ITSM17Steve Chambers - Cloud for GrownUps ITSM17
Steve Chambers - Cloud for GrownUps ITSM17
 
Operating a Highly Available Cloud Service
Operating a Highly Available Cloud ServiceOperating a Highly Available Cloud Service
Operating a Highly Available Cloud Service
 
Sage People Migration
Sage People MigrationSage People Migration
Sage People Migration
 
6 service operation
6 service operation6 service operation
6 service operation
 
Group b opm-ppt_final
Group b opm-ppt_finalGroup b opm-ppt_final
Group b opm-ppt_final
 
Are processes masquerading as projects hurting your business
Are processes masquerading as projects hurting your businessAre processes masquerading as projects hurting your business
Are processes masquerading as projects hurting your business
 
Office Lean Overview
Office Lean OverviewOffice Lean Overview
Office Lean Overview
 
La gouvernance au cœur de la transformation numérique - Comment COBIT 5 peut ...
La gouvernance au cœur de la transformation numérique - Comment COBIT 5 peut ...La gouvernance au cœur de la transformation numérique - Comment COBIT 5 peut ...
La gouvernance au cœur de la transformation numérique - Comment COBIT 5 peut ...
 
Process modeling in agile environment alec sharp
Process modeling in agile environment alec sharpProcess modeling in agile environment alec sharp
Process modeling in agile environment alec sharp
 
Aces 405 - Team that actually saved the most money..!!
Aces 405 - Team that actually saved the most money..!!Aces 405 - Team that actually saved the most money..!!
Aces 405 - Team that actually saved the most money..!!
 

Similar to Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery

SharePoint Backup best Practices
SharePoint Backup best PracticesSharePoint Backup best Practices
SharePoint Backup best Practices
Ron Charity
 
Engineering Teams and Systems for Velocity
Engineering Teams and Systems for VelocityEngineering Teams and Systems for Velocity
Engineering Teams and Systems for Velocity
Jean Barmash
 
Atlassian Based DevOps Command Center: Adding Opsgenie to the Powerful Mix!
Atlassian Based DevOps Command Center: Adding Opsgenie to the Powerful Mix!Atlassian Based DevOps Command Center: Adding Opsgenie to the Powerful Mix!
Atlassian Based DevOps Command Center: Adding Opsgenie to the Powerful Mix!
Cprime
 
Why er ps maybe magic dust
Why er ps maybe magic dustWhy er ps maybe magic dust
Why er ps maybe magic dustAppchemi
 
Building enterprise platforms - off the beaten path - SharePoint User Group U...
Building enterprise platforms - off the beaten path - SharePoint User Group U...Building enterprise platforms - off the beaten path - SharePoint User Group U...
Building enterprise platforms - off the beaten path - SharePoint User Group U...
Andy Talbot
 
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
Dave Archer
 
Service catalogue presentation
Service catalogue presentationService catalogue presentation
Service catalogue presentation
subtitle
 
Data Governance: Why, What & How
Data Governance: Why, What & HowData Governance: Why, What & How
Data Governance: Why, What & How
Senturus
 
Phil Green - We're migrating to the cloud - Who needs service management
Phil Green - We're migrating to the cloud - Who needs service managementPhil Green - We're migrating to the cloud - Who needs service management
Phil Green - We're migrating to the cloud - Who needs service management
itSMF UK
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
Rod Davis
 
Future Proof Your DAM
Future Proof Your DAMFuture Proof Your DAM
Future Proof Your DAM
jflorance
 
Best practices in networks and infrastructure
Best practices in networks and infrastructureBest practices in networks and infrastructure
Best practices in networks and infrastructure
nicholas njoroge
 
Barclay rae itsmf itsm12 presentation nov 2012
Barclay rae itsmf itsm12 presentation nov 2012Barclay rae itsmf itsm12 presentation nov 2012
Barclay rae itsmf itsm12 presentation nov 2012Barclay Rae
 
Scaling on Atlassian: Avoiding The Top 5 Pitfalls When Migrating From a Legac...
Scaling on Atlassian: Avoiding The Top 5 Pitfalls When Migrating From a Legac...Scaling on Atlassian: Avoiding The Top 5 Pitfalls When Migrating From a Legac...
Scaling on Atlassian: Avoiding The Top 5 Pitfalls When Migrating From a Legac...
Cprime
 
Bua 235 teamwork
Bua 235 teamwork Bua 235 teamwork
Bua 235 teamwork UMaine
 
DevOps
DevOpsDevOps
DevOps
Dawn Keenan
 
Using Machine Learning to Optimize DevOps Practices
Using Machine Learning to Optimize DevOps PracticesUsing Machine Learning to Optimize DevOps Practices
Using Machine Learning to Optimize DevOps Practices
Peter Varhol
 
The elusive root cause
The elusive root causeThe elusive root cause
The elusive root causeneebula
 
Experience everywhere: The post-crisis ITSM revolution
Experience everywhere: The post-crisis ITSM revolutionExperience everywhere: The post-crisis ITSM revolution
Experience everywhere: The post-crisis ITSM revolution
nexthink
 
SharePoint Group Therapy Expanded Edition - SPEngage Phoenix 2017
SharePoint Group Therapy Expanded Edition - SPEngage Phoenix 2017SharePoint Group Therapy Expanded Edition - SPEngage Phoenix 2017
SharePoint Group Therapy Expanded Edition - SPEngage Phoenix 2017
Jim Adcock
 

Similar to Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery (20)

SharePoint Backup best Practices
SharePoint Backup best PracticesSharePoint Backup best Practices
SharePoint Backup best Practices
 
Engineering Teams and Systems for Velocity
Engineering Teams and Systems for VelocityEngineering Teams and Systems for Velocity
Engineering Teams and Systems for Velocity
 
Atlassian Based DevOps Command Center: Adding Opsgenie to the Powerful Mix!
Atlassian Based DevOps Command Center: Adding Opsgenie to the Powerful Mix!Atlassian Based DevOps Command Center: Adding Opsgenie to the Powerful Mix!
Atlassian Based DevOps Command Center: Adding Opsgenie to the Powerful Mix!
 
Why er ps maybe magic dust
Why er ps maybe magic dustWhy er ps maybe magic dust
Why er ps maybe magic dust
 
Building enterprise platforms - off the beaten path - SharePoint User Group U...
Building enterprise platforms - off the beaten path - SharePoint User Group U...Building enterprise platforms - off the beaten path - SharePoint User Group U...
Building enterprise platforms - off the beaten path - SharePoint User Group U...
 
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
 
Service catalogue presentation
Service catalogue presentationService catalogue presentation
Service catalogue presentation
 
Data Governance: Why, What & How
Data Governance: Why, What & HowData Governance: Why, What & How
Data Governance: Why, What & How
 
Phil Green - We're migrating to the cloud - Who needs service management
Phil Green - We're migrating to the cloud - Who needs service managementPhil Green - We're migrating to the cloud - Who needs service management
Phil Green - We're migrating to the cloud - Who needs service management
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
 
Future Proof Your DAM
Future Proof Your DAMFuture Proof Your DAM
Future Proof Your DAM
 
Best practices in networks and infrastructure
Best practices in networks and infrastructureBest practices in networks and infrastructure
Best practices in networks and infrastructure
 
Barclay rae itsmf itsm12 presentation nov 2012
Barclay rae itsmf itsm12 presentation nov 2012Barclay rae itsmf itsm12 presentation nov 2012
Barclay rae itsmf itsm12 presentation nov 2012
 
Scaling on Atlassian: Avoiding The Top 5 Pitfalls When Migrating From a Legac...
Scaling on Atlassian: Avoiding The Top 5 Pitfalls When Migrating From a Legac...Scaling on Atlassian: Avoiding The Top 5 Pitfalls When Migrating From a Legac...
Scaling on Atlassian: Avoiding The Top 5 Pitfalls When Migrating From a Legac...
 
Bua 235 teamwork
Bua 235 teamwork Bua 235 teamwork
Bua 235 teamwork
 
DevOps
DevOpsDevOps
DevOps
 
Using Machine Learning to Optimize DevOps Practices
Using Machine Learning to Optimize DevOps PracticesUsing Machine Learning to Optimize DevOps Practices
Using Machine Learning to Optimize DevOps Practices
 
The elusive root cause
The elusive root causeThe elusive root cause
The elusive root cause
 
Experience everywhere: The post-crisis ITSM revolution
Experience everywhere: The post-crisis ITSM revolutionExperience everywhere: The post-crisis ITSM revolution
Experience everywhere: The post-crisis ITSM revolution
 
SharePoint Group Therapy Expanded Edition - SPEngage Phoenix 2017
SharePoint Group Therapy Expanded Edition - SPEngage Phoenix 2017SharePoint Group Therapy Expanded Edition - SPEngage Phoenix 2017
SharePoint Group Therapy Expanded Edition - SPEngage Phoenix 2017
 

More from Internetwork Engineering (IE)

2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
Internetwork Engineering (IE)
 
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
Internetwork Engineering (IE)
 
Re-inventing the Wireless Network | 2019 Tri-State Technology Conference Pres...
Re-inventing the Wireless Network | 2019 Tri-State Technology Conference Pres...Re-inventing the Wireless Network | 2019 Tri-State Technology Conference Pres...
Re-inventing the Wireless Network | 2019 Tri-State Technology Conference Pres...
Internetwork Engineering (IE)
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
Internetwork Engineering (IE)
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
Internetwork Engineering (IE)
 
Eliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber InsuranceEliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber Insurance
Internetwork Engineering (IE)
 
Lessons Learned from the Field: CyberSecurity that Works - Jason Smith Ses...
   Lessons Learned from the Field: CyberSecurity that Works - Jason Smith Ses...   Lessons Learned from the Field: CyberSecurity that Works - Jason Smith Ses...
Lessons Learned from the Field: CyberSecurity that Works - Jason Smith Ses...
Internetwork Engineering (IE)
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Internetwork Engineering (IE)
 
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Internetwork Engineering (IE)
 

More from Internetwork Engineering (IE) (9)

2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
 
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
 
Re-inventing the Wireless Network | 2019 Tri-State Technology Conference Pres...
Re-inventing the Wireless Network | 2019 Tri-State Technology Conference Pres...Re-inventing the Wireless Network | 2019 Tri-State Technology Conference Pres...
Re-inventing the Wireless Network | 2019 Tri-State Technology Conference Pres...
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
 
Eliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber InsuranceEliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber Insurance
 
Lessons Learned from the Field: CyberSecurity that Works - Jason Smith Ses...
   Lessons Learned from the Field: CyberSecurity that Works - Jason Smith Ses...   Lessons Learned from the Field: CyberSecurity that Works - Jason Smith Ses...
Lessons Learned from the Field: CyberSecurity that Works - Jason Smith Ses...
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
 
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
 

Recently uploaded

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery

  • 1. Alphabet Soup – A(utomation), BC(Business Continuity) and DR (Disaster Recovery) Christopher Rogers Senior Technical Advisor, Intelligent Infrastructure Internetwork Engineering
  • 2. Agenda • BC or DR? Defined…. • Business Continuity (BC) • Disaster Recovery (DR) • What about “Cloud”? • Other Thoughts • Automation • Conclusion
  • 3. What does it take to make a great soup? A good base – maybe start with the trinity (onions, celery, and bell peppers) sautéed A good broth (probably chicken) Layer in other flavors and ingredients
  • 4. • How many have a DR Plan? • How many have a BC Strategy? • How many thought they had a BC Strategy because they had a DR Plan? • May not be you, but what about others in your organization? • How many are performing some type of automation in IT? Quick Status Check
  • 5. What does it take to have good BC/DR “soup”
  • 6. BC or DR? Defined… The processes, procedures, and solutions needed to make sure an organization can continue to function The plan an organization has in place to recover data or technology losses Business Continuity Disaster Recovery Business Continuity Disaster Recovery Focused on planning for the restoration and recovery of any technology functionality or data that was lost Focused on risk analysis and planning to ensure the business can continue to operate
  • 8. Business Continuity Questions • What is the organization’s primary function? • What secondary functions support the primary function? • How does the organization perform its function? • What processes and procedures that govern this function? • Are these functions offered virtually? Online, telephone? • Are there compliance/legal requirements that govern how the functions are performed? • Where do employees perform their job functions? • Do they come to a brick and mortar? • What do they use to perform their job functions?
  • 9. Business Continuity Questions context • What is the organization’s primary function? • What is the impact/result of this function not being performed? Can the loss be quantified? • Who (what) is affected by the loss of the primary function? How long can the constituents continue without this function? • What secondary functions support the primary function? • Are these secondary functions essential to the operation of the primary function? What is the operational impact of operating without a given secondary function? • How does the organization perform this function • What processes and procedures that govern this function? Essential processes? • Can and are these functions offered virtually? Online, telephone? Require employee interaction? • Are there compliance/legal requirements that govern how the functions are performed? • What requirements govern these functions? If necessary, can special operating procedures be implemented? • Where do employees perform their job functions? • Do they HAVE come to a brick and mortar? If so has a location been identified? • What do they use to perform their job functions? How do they work? • No brick and mortar? Can they work virtually, What do they need to work virtually, Are process changes needed to work virtually? • May have to make hard decisions • Not all business functions are truly necessary to support primary function • Understand how to re-incorporate secondary business functions and impact • Incident Response – Is your incident response incorporated? Key Ingredient: 1) Know the top (up to 5) critical function(s) of the organization. 2) Think like a business, what is the bare minimum need to stay in operation during the event and after the event. 3) Incident Response
  • 10. Why BC Strategy – Scenarios • Pandemic • Regional Disaster • Primary (Only) Site • Many others …
  • 11. Disaster Recovery Questions • How is the organization’s primary function impacted by loss of technology? • What technology services support the organization’s primary function? • Is technology service dependency understood? • What technology services support the organization’s secondary functions? • What compliance/legal requirements govern technology services? • Are Service Level Agreements between organizational groups and the technology group in place? • What is the expected RPO (Recovery Point Objective)? • What is the expected RTO (Recovery Time Objective)?
  • 12. Disaster Recovery Questions context • How is the organization’s primary function impacted by loss of technology? • Can the primary function be performed without technology? If so, for how long? What is the perception if technology services are lost? • What technology services support the organization’s primary function? • Is technology service dependency understood and documented? Have all technology services that support the function been identified? Rank services, Know the order of service resumption, Understand prerequisites for services • What technology services support the organization’s secondary functions? Ask same questions • What compliance/legal requirements govern technology services? What impact do compliance/legal requirements have? How do requirements impact ability to perform disaster recovery? • Are there DOCUMENTED Service Level Agreements (SLAs) between organizational groups and the technology group in place? Does the organization understand the impact of fulfilling the SLAs? (BC quantifies loss of ability to perform primary function) • What is the expected RPO (Recovery Point Objective)? How much data loss is acceptable? • What is the expected RTO (Recovery Time Objective)? How quickly do the technology services need to be restored? • Have to make hard decisions • Not all technology services will be required for primary function • Understand how to re-incorporate secondary services and impact • In House - Start Small • One Application that supports primary function or major secondary function • Preferably one that has well documented guidelines and recommendations for DR • Seek Assistance – Still Start Small • Onboarding – As Applications are added or replaced – Assess and incorporate into DR • Incident Response – Align your cybersecurity IR process with DR Key Ingredient(s): 1) Know technological dependencies for the top (up to 5) function(s) 2) Availability path for the technological dependencies 3) Incident Response
  • 13. Why DR Plan – Scenarios • Localized (DC Center) Issues • Ransomware – Malicious behavior • Human Error • Many others …
  • 14. What About the “Cloud”? • Primary Technology Platform • IaaS, PaaS, SaaS, DaaS, BaaS, DRaaS • Business Continuity • Provide worker access to IT Resources (DaaS) • DR • IaaS, PaaS, SaaS, DRaaS, BaaS • Things to think about • Backups • Provide redundancy – not backups • Disaster Recovery • Provide redundancy – but not normally beyond site unless chosen • Data Movement • Free to bring in – Pay to leave • Alternative Cloud https://docs.microsoft.com/en- us/azure/architecture/resiliency/disas ter-recovery-azure-applications
  • 15. Things to think about • Practice, Practice, Practice • More Practice • People • Where are they? • Are they affected by the situation? • To what extent are they affected? • What is the personal effect on them? • Will they be able to fulfill their duties? • Third Party • Logistical • Physical Access • Card Access? • Disaster causes card process to fail? • Impassable? • Documentation – secondary copy? • BC/DR Equipment • Understand where you are in CIP (Critical Infrastructure Protection) • https://www.dhs.gov/what-critical-infrastructure
  • 16. Automation • Why Automation? • Get things done faster!?! • Steps to Automation – • Looks for repetitive tasks • Understand what we want to automate • Document the process • Standardize the process • Utilize best practice • Results of Automation • Faster deployment • Documented deployment • Consistent deployment – less human error • Better maintenance processes – help stay up to date
  • 17. Automation – Reservations • We’re too small organization – Don’t need Automation • Moving to the Cloud • Don’t have a mature IT process or governance • Automate myself out of a job  • Automate yourself into a disaster!? • Build out in layers • Treat like Dev Process – Test, Test, Test (not in Production ) • Where to start • Semi-automate processes • Change Management • Request and approval • Update BC/DR • MAC (Moves, Adds, Changes) • Information gathering • Existing setups and configurations • Topology
  • 18. Automation – Impact • BC/DR Impact • Documented process for service restoration • Known good configuration state • Systematic restoration • Faster restoration time • Organizational Results • Business continuity strategy and disaster recovery plan can be better maintained • Less downtime of mission critical applications when a disaster or unexpected event occurs • Reduced risk of downtime due to human error • Confidence that the recovery process is solid • Reduced risk of recovery process failure due to inaccurate information or human error Key Ingredient: Automation can make your BC/DR process better.
  • 19. Conclusion • What are the top 5 critical functions of the organization. If the organization were a business, what is the bare minimum it would take to stay in business during the event and after the event. • What technological dependencies do those top 5 functions require? • What is the availability path for the technological dependencies, should an event occur? Meaning, if an event affects those resources, what is the contingency. • Incident Response • Know how it integrates • IR may require BC or DR to be put in motion • Automation – Its your friend 
  • 20. Thank you! Questions? Christopher Rogers SeniorTechnical Advisor – Intelligent Infrastructure SNR (704) 944-0072 | crogers@ineteng.com Raleigh Security Users Group (Quarterly) – next mtg 6/7 Charlotte Security Users Group (Bi-monthly) – next mtg 6/22 www.ineteng.com/events