SlideShare a Scribd company logo
Business Continuity
& Disaster Recovery
Muhammad Adeel Javaid
Imagine a company…
Bank with 1 Million accounts, social
security numbers, credit cards, loans…
Airline serving 50,000 people on 250
flights daily…
Pharmacy system filling 5 million
prescriptions per year, some of the
prescriptions are life-saving…
Factory with 200 employees producing
200,000 products per day using robots…
Imagine a system failure…
 Server failure
 Disk System failure
 Hacker break-in
 Denial of Service attack
 Extended power failure
 Snow storm
 Spyware
 Malevolent virus or worm
 Earthquake, tornado
 Employee error or revenge
How will this affect each
business?
First Step:
Business Impact Analysis
Which business processes are of strategic
importance?
What disasters could occur?
What impact would they have on the
organization financially? Legally? On
human life? On reputation?
What is the required recovery time period?
Answers obtained via questionnaire,
interviews, or meeting with key users of IT
Event Damage Classification
Negligible: No significant cost or damage
Minor: A non-negligible event with no material or
financial impact on the business
Major: Impacts one or more departments and may
impact outside clients
Crisis: Has a major material or financial impact on
the business
Minor, Major, & Crisis events should be
documented and tracked to repair
Workbook:
Disasters and Impact
Problematic Event
or Incident
Affected Business Process(es)
(Assumes a university)
Impact Classification &
Effect on finances, legal
liability, human life,
reputation
Fire Class rooms, business
departments
Crisis, at times Major,
Human life
Hacking Attack Registration, advising, Major,
Legal liability
Network
Unavailable
Registration, advising, classes,
homework, education
Crisis
Social
engineering, /Fraud
Registration, Major,
Legal liability
Server Failure
(Disk/server)
Registration, advising, classes,
homework, education.
Major, at times: Crisis
Recovery Time: Terms
Interruption Window: Time duration organization can wait
between point of failure and service resumption
Service Delivery Objective (SDO): Level of service in Alternate
Mode
Maximum Tolerable Outage: Max time in Alternate Mode
Regular Service
Alternate Mode
Regular
Service
Interruption
Window
Maximum Tolerable Outage
SDO
Interruption
Time…
Disaster
Recovery
Plan Implemented
Restoration
Plan Implemented
Definitions
Business Continuity: Offer critical services in
event of disruption
Disaster Recovery: Survive interruption to
computer information systems
Alternate Process Mode: Service offered by
backup system
Disaster Recovery Plan (DRP): How to transition
to Alternate Process Mode
Restoration Plan: How to return to regular system
mode
Classification of Services
Critical $$$$: Cannot be performed manually.
Tolerance to interruption is very low
Vital $$: Can be performed manually for very short
time
Sensitive $: Can be performed manually for a
period of time, but may cost more in staff
Nonsensitive ¢: Can be performed manually for
an extended period of time with little additional
cost and minimal recovery effort
Determine Criticality of Business
Processes
Corporate
Sales (1) Shipping (2) Engineering (3)
Web Service (1) Sales Calls (2)
Product A (1)
Product B (2)
Product C (3)
Product A (1)
Orders (1)
Inventory (2)
Product B (2)
RPO and RTO
How far back can you fail to? How long can you operate without a system?
One week’s worth of data? Which services can last how long?
Interruption
1 1 1
Hour Day Week
Recovery Point Objective Recovery Time Objective
Interruption
1 1 1
Week Day Hour
Recovery Point Objective
Mirroring:
RAID
Backup
Images
Orphan Data: Data which is lost and never recovered.
RPO influences the Backup Period
Business Impact Analysis
Summary
Service Recovery
Point
Objective
(Hours)
Recovery
Time
Objective
(Hours)
Critical
Resources
(Computer,
people,
peripherals)
Special Notes
(Unusual treatment at
Specific times, unusual risk
conditions)
Registratio
n
0 hours 4 hours SOLAR,
network
Registrar
High priority during Nov-
Jan,
March-June, August.
Personnel 2 hours 8 hours PeopleSoft Can operate manually for
some time
Teaching 1 day 1 hour D2L,
network,
faculty files
During school semester:
high priority.
Work
Book
Partial BIA for a university
RAID – Data Mirroring
ABCDABCD
AB CD Parity
AB CD
RAID 0: Striping RAID 1: Mirroring
Higher Level RAID: Striping & Redundancy
Redundant Array of Independent Disks
Network Disaster Recovery
Redundancy
Includes:
Routing protocols
Fail-over
Multiple paths
Alternative Routing
>1 Medium or
> 1 network provider
Diverse Routing
Multiple paths,
1 medium type
Last-mile circuit protection
E.g., Local: microwave & cable
Long-haul network diversity
Redundant network providers
Voice Recovery
Voice communication backup
Disruption vs. Recovery Costs
Cost
Time
Service Downtime
Alternative Recovery Strategies
Minimum Cost
* Hot Site
* Warm Site
* Cold Site
Alternative Recovery Strategies
Hot Site: Fully configured, ready to operate within hours
Warm Site: Ready to operate within days: no or low power
main computer. Does contain disks, network, peripherals.
Cold Site: Ready to operate within weeks. Contains
electrical wiring, air conditioning, flooring
Duplicate or Redundant Info. Processing Facility:
Standby hot site within the organization
Reciprocal Agreement with another organization or
division
Mobile Site: Fully- or partially-configured trailer comes to
your site, with microwave or satellite communications
What is Cloud Computing?
Database
App Server
Laptop
PC
Web Server
Cloud
Computing
VPN Server
This would cost $200/month.This would cost
$200/month.
Introduction to Cloud
NIST Visual Model of Cloud Computing Definition
National Institute of Standards and Technology, www.cloudstandards.org
Cloud Service Models
Software(SaaS): Provider
runs own applications on
cloud infrastructure.
Platform(PaaS):
Consumer provides apps;
provider provides system
and development
environment.
Infrastructure(laaS):
Provides customers
access to processing,
storage, networks or other
fundamental resources
Cloud Deployment Models
Private Cloud: Dedicated to one organization
Community Cloud: Several organizations with
shared concerns share computer facilities
Public Cloud: Available to the public or a
large industry group
Hybrid Cloud: Two or more clouds (private,
community or public clouds) remain distinct but
are bound together by standardized or
proprietary technology
Major Areas of Security
Concerns
Multi-tenancy: Your app is on same server with other
organizations.
Need: segmentation, isolation, policy
Service Level Agreement (SLA): Defines performance,
security policy, availability, backup, location,
compliance, audit issues
Your Coverage: Total security = your portion + provider
portion
Responsibility varies for IAAS vs. PAAS vs. SAAS
You can transfer security responsibility but not
accountability
Hot Site
 Contractual costs include: basic subscription,
monthly fee, testing charges, activation costs,
and hourly/daily use charges
 Contractual issues include: other subscriber
access, speed of access, configurations, staff
assistance, audit & test
 Hot site is for emergency use – not long term
 May offer warm or cold site for extended
durations
Reciprocal Agreements
Advantage: Low cost
Problems may include:
Quick access
Compatibility (computer, software, …)
Resource availability: computer, network, staff
Priority of visitor
Security (less a problem if same organization)
Testing required
Susceptibility to same disasters
Length of welcomed stay
RPO Controls
Data File and
System/Directory
Location
RPO
(Hours)
Special Treatment
(Backup period, RAID, File
Retention Strategies)
Registration 0 hours RAID.
Mobile Site?
Teaching 1 day Daily backups.
Facilities Computer Center as
Redundant info processing center
Work
Book
Business Continuity Process
 Perform Business Impact Analysis
 Prioritize services to support critical business
processes
 Determine alternate processing modes for
critical and vital services
 Develop the Disaster Recovery plan for IS
systems recovery
 Develop BCP for business operations recovery
and continuation
 Test the plans
 Maintain plans
Question
The amount of data transactions that are
allowed to be lost following a computer
failure (i.e., duration of orphan data) is the:
1.Recovery Time Objective
2.Recovery Point Objective
3.Service Delivery Objective
4.Maximum Tolerable Outage
Question
When the RTO is large, this is associated
with:
1. Critical applications
2. A speedy alternative recovery strategy
3. Sensitive or nonsensitive services
4. An extensive restoration plan
Question
When the RPO is very short, the best
solution is:
1. Cold site
2. Data mirroring
3. A detailed and efficient Disaster
Recovery Plan
4. An accurate Business Continuity Plan
Disaster Recovery
Disaster Recovery
Testing
An Incident Occurs…
Security officer
declares disaster
Call Security
Officer (SO)
or committee
member
SO follows
pre-established
protocol
Emergency Response
Team: Human life:
First concern
Phone tree notifies
relevant participants
IT follows Disaster
Recovery Plan
Public relations
interfaces with media
(everyone else quiet)
Mgmt, legal
council act
Concerns for a BCP/DR Plan
 Evacuation plan: People’s lives always take first
priority
 Disaster declaration: Who, how, for what?
 Responsibility: Who covers necessary disaster
recovery functions
 Procedures for Disaster Recovery
 Procedures for Alternate Mode operation
Resource Allocation: During recovery & continued
operation
Copies of the plan should be off-site
Disaster Recovery
Responsibilities
General Business
 First responder:
Evacuation, fire, health…
 Damage Assessment
 Emergency Mgmt
 Legal Affairs
 Transportation/Relocation
/Coordination (people,
equipment)
 Supplies
 Salvage
 Training
IT-Specific Functions
 Software
 Application
 Emergency operations
 Network recovery
 Hardware
 Database/Data Entry
 Information Security
BCP Documents
Focus: IT Business
Event
Recovery
Disaster Recovery Plan
Procedures to recover at
alternate site
Business Recovery Plan
Recover business after a
disaster
IT Contingency Plan:
Recovers major
application or system
Occupant Emergency Plan:
Protect life and assets during
physical threat
Cyber Incident
Response Plan:
Malicious cyber incident
Crisis Communication Plan:
Provide status reports to public
and personnel
Business
Continuity
Business Continuity Plan
Continuity of Operations Plan
Longer duration outages
Workbook
Business Continuity Overview
Classifica-
tion
(Critical or
Vital)
Business
Process
Incident or
Problematic
Event(s)
Procedure for Handling
(Section 5)
Vital Registration Computer
Failure
If total failure,
forward requests to UW-System
Otherwise, use 1-week-old
database for read purposes only
Critical Teaching Computer
Failure
Faculty DB Recovery Procedure
MTBF = MTTF + MTTR
• Mean Time to Repair (MTTR)
• Mean Time Between Failure (MTBF)
Measure of availability:
• 5 9s = 99.999% of time working = 5 ½
minutes of failure per year.
works repair works repair works
1 day 84 days
Disaster Recovery
Test Execution
Always tested in this order:
Desk-Based Evaluation/Paper Test: A
group steps through a paper procedure and
mentally performs each step.
Preparedness Test: Part of the full test is
performed. Different parts are tested
regularly.
Full Operational Test: Simulation of a full
disaster
Business Continuity Test Types
Checklist Review: Reviews coverage of plan – are all
important concerns covered?
Structured Walkthrough: Reviews all aspects of plan,
often walking through different scenarios
Simulation Test: Execute plan based upon a specific
scenario, without alternate site
Parallel Test: Bring up alternate off-site facility, without
bringing down regular site
Full-Interruption: Move processing from regular site to
alternate site.
Testing Objectives
Main objective: existing plans will result in
successful recovery of infrastructure & business
processes
Also can:
• Identify gaps or errors
• Verify assumptions
• Test time lines
• Train and coordinate staff
Testing Procedures
Tests start simple and
become more challenging
with progress
Include an independent 3rd
party (e.g. auditor) to
observe test
Retain documentation for
audit reviews
Develop test
objectives
Execute Test
Evaluate Test
Develop recommendations
to improve test effectiveness
Follow-Up to ensure
recommendations
implemented
Test Stages
PreTest: Set the Stage
Set up equipment
Prepare staff
Test: Actual test
PostTest: Cleanup
Returning resources
Calculate metrics: Time required, %
success rate in processing, ratio of
successful transactions in Alternate mode
vs. normal mode
Delete test data
Evaluate plan
Implement improvements
PreTest
Test
PostTest
Gap Analysis
Comparing Current Level with Desired Level
• Which processes need to be improved?
• Where is staff or equipment lacking?
• Where does additional coordination need
to occur?
Insurance
IPF &
Equipment
Data & Media Employee
Damage
Business Interruption:
Loss of profit due to IS
interruption
Valuable Papers &
Records: Covers cash
value of lost/damaged
paper & records
Fidelity Coverage:
Loss from dishonest
employees
Extra Expense:
Extra cost of operation
following IPF damage
Media Reconstruction
Cost of reproduction of
media
Errors & Omissions:
Liability for error resulting
in loss to client
IS Equipment &
Facilities: Loss of IPF &
equipment due to
damage
Media Transportation
Loss of data during xport
IPF = Information Processing Facility
Auditing BCP
Includes:
 Is BIA complete with RPO/RTO defined for all services?
 Is the BCP in-line with business goals, effective, and current?
 Is it clear who does what in the BCP and DRP?
 Is everyone trained, competent, and happy with their jobs?
 Is the DRP detailed, maintained, and tested?
 Is the BCP and DRP consistent in their recovery coverage?
 Are people listed in the BCP/phone tree current and do they have a
copy of BC manual?
 Are the backup/recovery procedures being followed?
 Does the hot site have correct copies of all software?
 Is the backup site maintained to expectations, and are the
expectations effective?
 Was the DRP test documented well, and was the DRP updated?
Summary of BC Security
Controls
• RAID
• Backups: Incremental backup, differential
backup
• Networks: Diverse routing, alternative routing
• Alternative Site: Hot site, warm site, cold site,
reciprocal agreement, mobile site
• Testing: checklist, structured walkthrough,
simulation, parallel, full interruption
• Insurance
Question
The FIRST thing that should be done when you discover
an intruder has hacked into your computer system is to:
1. Disconnect the computer facilities from the computer
network to hopefully disconnect the attacker
2. Power down the server to prevent further loss of
confidentiality and data integrity.
3. Call the manager.
4. Follow the directions of the Incident Response Plan.
Question
During an audit of the business continuity
plan, the finding of MOST concern is:
1. The phone tree has not been double-
checked in 6 months
2. The Business Impact Analysis has not
been updated this year
3. A test of the backup-recovery system is
not performed regularly
4. The backup library site lacks a UPS
Question
The first and most important BCP test is the:
1. Fully operational test
2. Preparedness test
3. Security test
4. Desk-based paper test
Question
When a disaster occurs, the highest
priority is:
1.Ensuring everyone is safe
2.Minimizing data loss by saving important
data
3.Recovery of backup tapes
4.Calling a manager
Question
A documented process where one
determines the most crucial IT operations
from the business perspective
1.Business Continuity Plan
2.Disaster Recovery Plan
3.Restoration Plan
4.Business Impact Analysis
Question
The PRIMARY goal of the Post-Test is:
1. Write a report for audit purposes
2. Return to normal processing
3. Evaluate test effectiveness and update
the response plan
4. Report on test to management
Question
A test that verifies that the alternate site
successfully can process transactions is
known as:
1. Structured walkthrough
2. Parallel test
3. Simulation test
4. Preparedness test
Vocabulary
•Business Continuity Plan (BCP), Business Impact Analysis
(BIA), RAID, Disaster Recovery Plan (DRP)
•Hot site, warm site, cold site, reciprocal agreement, mobile site
•Interruption window, Maximum tolerable outage, Service
delivery objective
•Recovery point objective (RPO), Recovery time objective
(RTO)
•Desk based or paper test, preparedness test, fully operational
test,
•Test: checklist, structured walkthrough, simulation test, parallel
test, full interruption, pretest, post-test
•Diverse routing, alternative routing
•Incremental backup, differential backup
•Define cloud computing, Infrastructure as a Service, Platform
as Service, Software as a Service, Private cloud, Community
cloud, Public cloud, Hybrid cloud.
Interactive Crossword Puzzle
To get more practice the vocabulary from
this section click on the picture below. For
a word bank look at the previous slide.
Definitions adapted from:
All-In-One CISA Exam Guide
HEALTH FIRST CASE STUDY
Business Impact Analysis & Business Continuity
Jamie Ramon MD
Doctor
Chris Ramon RD
Dietician
Terry
Licensed
Practicing Nurse
Pat
Software Consultant
Step 1: Define Threats
Resulting in Business Disruption
Key questions:
•Which business processes
are of strategic importance?
•What disasters could
occur?
•What impact would they
have on the organization
financially? Legally? On
human life? On reputation?
Impact Classification
Negligible: No significant
cost or damage
Minor: A non-negligible event
with no material or financial
impact on the business
Major: Impacts one or more
departments and may impact
outside clients
Crisis: Has a major financial
impact on the business
Step 1: Define Threats
Resulting in Business Disruption
Problematic
Event or
Incident
Affected
Business
Process(es)
Impact Classification &
Effect on finances,
legal liability, human
life, reputation
Fire
Hacking incident
Network Unavailable
(E.g., ISP problem)
Social engineering,
fraud
Server Failure (E.g.,
Disk)
Power Failure
1 1 1
Hour Day Week
Step 2: Define Recovery Objectives
Recovery Point Objective Recovery Time Objective
Interruption
Business
Process
Recovery
Time
Objective
(Hours)
Recovery
Point
Objective
(Hours)
Critical
Resources
(Computer,
people,
peripherals)
Special Notes
(Unusual treatment at
specific times, unusual risk
conditions)
1 1 1
Week Day Hour
Business Continuity
Step 3: Attaining Recovery Point Objective
(RPO)
Step 4: Attaining Recovery Time Objective
(RTO)
Classification
(Critical or
Vital)
Business
Process
Problem Event(s)
or Incident
Procedure for Handling
(Section 5)
Criticality Classification
Critical: Cannot be performed manually.
Tolerance to interruption is very low
Vital: Can be performed manually for very short
time
Sensitive: Can be performed manually for a
period of time, but may cost more in staff
Non-sensitive: Can be performed manually for an
extended period of time with little additional cost
and minimal recovery effort

More Related Content

What's hot

What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
Adv Prashant Mali
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
Dipankar Ghosh
 
Business Impact Analysis
Business Impact AnalysisBusiness Impact Analysis
Business Impact Analysis
dlfrench
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
Indeevari Ramanayake
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IThhuihhui
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
John Wilson
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recovery
KrutiShah114
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and Testing
Axcient
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017
Atef Yassin
 
BCP Awareness
BCP Awareness BCP Awareness
BCP Awareness
Imad Almurib
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
gcleary
 
Risk and Business Continuity Management
Risk and Business Continuity ManagementRisk and Business Continuity Management
Risk and Business Continuity Management
Continuity and Resilience
 
business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929
Andy Willams
 
Incident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesIncident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation Slides
SlideTeam
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
Bharath Rao
 
Business Continuity Planning Presentation
Business Continuity Planning PresentationBusiness Continuity Planning Presentation
Business Continuity Planning Presentation
The Chamber For a Greater Chapel Hill-Carrboro
 
IT-Centric Disaster Recovery & Business Continuity
IT-Centric Disaster Recovery & Business ContinuityIT-Centric Disaster Recovery & Business Continuity
IT-Centric Disaster Recovery & Business Continuity
Steve Susina
 
Assess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAssess Your Business Continuity Management Process
Assess Your Business Continuity Management Process
Anand Subramaniam
 
009.itsecurity bcp v1
009.itsecurity bcp v1009.itsecurity bcp v1
009.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 

What's hot (20)

What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Business Impact Analysis
Business Impact AnalysisBusiness Impact Analysis
Business Impact Analysis
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IT
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recovery
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and Testing
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017
 
BCP Awareness
BCP Awareness BCP Awareness
BCP Awareness
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Risk and Business Continuity Management
Risk and Business Continuity ManagementRisk and Business Continuity Management
Risk and Business Continuity Management
 
business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929
 
Incident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesIncident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation Slides
 
DRP vs BCP
DRP vs BCPDRP vs BCP
DRP vs BCP
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Business Continuity Planning Presentation
Business Continuity Planning PresentationBusiness Continuity Planning Presentation
Business Continuity Planning Presentation
 
IT-Centric Disaster Recovery & Business Continuity
IT-Centric Disaster Recovery & Business ContinuityIT-Centric Disaster Recovery & Business Continuity
IT-Centric Disaster Recovery & Business Continuity
 
Assess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAssess Your Business Continuity Management Process
Assess Your Business Continuity Management Process
 
009.itsecurity bcp v1
009.itsecurity bcp v1009.itsecurity bcp v1
009.itsecurity bcp v1
 

Viewers also liked

Perils of an Old Metric: MTBF
Perils of an Old Metric: MTBFPerils of an Old Metric: MTBF
Perils of an Old Metric: MTBF
Accendo Reliability
 
Business Impact Analysis - Clause 4 Of BS25999 In Practice
Business Impact Analysis - Clause 4 Of BS25999 In PracticeBusiness Impact Analysis - Clause 4 Of BS25999 In Practice
Business Impact Analysis - Clause 4 Of BS25999 In Practice
Dipankar Ghosh
 
Drp Bcp Testing Alternatives
Drp Bcp Testing AlternativesDrp Bcp Testing Alternatives
Drp Bcp Testing Alternatives
Gewurtz
 
PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...
PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...
PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...
PECB
 
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENTBUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
Continuity and Resilience
 
RSM India Publication - Business Continuity Plan: A Digital Age Imperative
RSM India Publication - Business Continuity Plan: A Digital Age ImperativeRSM India Publication - Business Continuity Plan: A Digital Age Imperative
RSM India Publication - Business Continuity Plan: A Digital Age Imperative
RSM India
 
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
BCM Institute
 
Business Continuity Management Culture at NCBC
 Business Continuity Management Culture at NCBC Business Continuity Management Culture at NCBC
Business Continuity Management Culture at NCBC
Continuity and Resilience
 
Application migration guideline document
Application migration guideline documentApplication migration guideline document
Application migration guideline document
Thomas Bronack
 
Business continuity management www.reconglobal.in
Business continuity management   www.reconglobal.inBusiness continuity management   www.reconglobal.in
Business continuity management www.reconglobal.in
Satya Yadav
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)
Goutama Bachtiar
 
BIA - Example of Business Impact Analysis and Dependencies
BIA - Example of Business Impact Analysis and DependenciesBIA - Example of Business Impact Analysis and Dependencies
BIA - Example of Business Impact Analysis and Dependencies
Ramiro Cid
 
9 Bcp+Drp
9 Bcp+Drp9 Bcp+Drp
9 Bcp+Drp
Alfred Ouyang
 
Business continuity overview slideshare
Business continuity overview slideshareBusiness continuity overview slideshare
Business continuity overview slideshare
Chris Greenhill
 
MISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery PlanMISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery PlanJan Wong
 
Reliability engineering chapter-2 reliability of systems
Reliability engineering chapter-2 reliability of systemsReliability engineering chapter-2 reliability of systems
Reliability engineering chapter-2 reliability of systems
Charlton Inao
 
How to manage a service company with Odoo
How to manage a service company with OdooHow to manage a service company with Odoo
How to manage a service company with Odoo
Odoo
 
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy WebinarRole with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
ITSM Academy, Inc.
 
Emirates Airlines Draft Strategic 2013-2014
Emirates Airlines Draft Strategic 2013-2014Emirates Airlines Draft Strategic 2013-2014
Emirates Airlines Draft Strategic 2013-2014Arthur Ashidiqy
 

Viewers also liked (20)

Perils of an Old Metric: MTBF
Perils of an Old Metric: MTBFPerils of an Old Metric: MTBF
Perils of an Old Metric: MTBF
 
Business Impact Analysis - Clause 4 Of BS25999 In Practice
Business Impact Analysis - Clause 4 Of BS25999 In PracticeBusiness Impact Analysis - Clause 4 Of BS25999 In Practice
Business Impact Analysis - Clause 4 Of BS25999 In Practice
 
Drp Bcp Testing Alternatives
Drp Bcp Testing AlternativesDrp Bcp Testing Alternatives
Drp Bcp Testing Alternatives
 
PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...
PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...
PECB Webinar: Rethinking Business Continuity: Applying ISO 22301 to improve r...
 
Business resiliency workshop
Business resiliency workshopBusiness resiliency workshop
Business resiliency workshop
 
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENTBUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
 
RSM India Publication - Business Continuity Plan: A Digital Age Imperative
RSM India Publication - Business Continuity Plan: A Digital Age ImperativeRSM India Publication - Business Continuity Plan: A Digital Age Imperative
RSM India Publication - Business Continuity Plan: A Digital Age Imperative
 
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
 
Business Continuity Management Culture at NCBC
 Business Continuity Management Culture at NCBC Business Continuity Management Culture at NCBC
Business Continuity Management Culture at NCBC
 
Application migration guideline document
Application migration guideline documentApplication migration guideline document
Application migration guideline document
 
Business continuity management www.reconglobal.in
Business continuity management   www.reconglobal.inBusiness continuity management   www.reconglobal.in
Business continuity management www.reconglobal.in
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)
 
BIA - Example of Business Impact Analysis and Dependencies
BIA - Example of Business Impact Analysis and DependenciesBIA - Example of Business Impact Analysis and Dependencies
BIA - Example of Business Impact Analysis and Dependencies
 
9 Bcp+Drp
9 Bcp+Drp9 Bcp+Drp
9 Bcp+Drp
 
Business continuity overview slideshare
Business continuity overview slideshareBusiness continuity overview slideshare
Business continuity overview slideshare
 
MISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery PlanMISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery Plan
 
Reliability engineering chapter-2 reliability of systems
Reliability engineering chapter-2 reliability of systemsReliability engineering chapter-2 reliability of systems
Reliability engineering chapter-2 reliability of systems
 
How to manage a service company with Odoo
How to manage a service company with OdooHow to manage a service company with Odoo
How to manage a service company with Odoo
 
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy WebinarRole with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
 
Emirates Airlines Draft Strategic 2013-2014
Emirates Airlines Draft Strategic 2013-2014Emirates Airlines Draft Strategic 2013-2014
Emirates Airlines Draft Strategic 2013-2014
 

Similar to Business continuity and disaster recovery

Ultan kinahan dr - minasi 2010
Ultan kinahan   dr - minasi 2010Ultan kinahan   dr - minasi 2010
Ultan kinahan dr - minasi 2010
Nathan Winters
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
RapidScale
 
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryPHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
Mark McHenry
 
Fulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BCFulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BC
Steve Meek
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Christian Caracciolo
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR Presentation
Andrew Miller
 
Disaster Biz Resumpt
Disaster Biz ResumptDisaster Biz Resumpt
Disaster Biz ResumptJimGroark
 
Business Meets IT Presentatie
Business Meets IT PresentatieBusiness Meets IT Presentatie
Business Meets IT Presentatie
Ruud Stroet
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
Rod Davis
 
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery:  Understanding Trend, Methodology, Solution, and StandardDisaster Recovery:  Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
PT Datacomm Diangraha
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
Quest
 
Enterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bankEnterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bank
actualtechmedia
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
Dell World
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
Miriam O'Brien
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
Miriam O'Brien
 
End user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideEnd user business-continuity.pptx datto slide
End user business-continuity.pptx datto slide
Laura Breese
 
Disaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docxDisaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docx
duketjoy27252
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Donna Perlstein
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
CloudEndure
 

Similar to Business continuity and disaster recovery (20)

Disaster recovery enw
Disaster recovery enwDisaster recovery enw
Disaster recovery enw
 
Ultan kinahan dr - minasi 2010
Ultan kinahan   dr - minasi 2010Ultan kinahan   dr - minasi 2010
Ultan kinahan dr - minasi 2010
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
 
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryPHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
 
Fulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BCFulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BC
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR Presentation
 
Disaster Biz Resumpt
Disaster Biz ResumptDisaster Biz Resumpt
Disaster Biz Resumpt
 
Business Meets IT Presentatie
Business Meets IT PresentatieBusiness Meets IT Presentatie
Business Meets IT Presentatie
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
 
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery:  Understanding Trend, Methodology, Solution, and StandardDisaster Recovery:  Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
Enterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bankEnterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bank
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
End user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideEnd user business-continuity.pptx datto slide
End user business-continuity.pptx datto slide
 
Disaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docxDisaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docx
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 

More from Adeel Javaid

Cybersecurity threat assessment manual
Cybersecurity threat assessment manualCybersecurity threat assessment manual
Cybersecurity threat assessment manual
Adeel Javaid
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
Adeel Javaid
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system security
Adeel Javaid
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
Adeel Javaid
 
Proposed pricing model for cloud computing
Proposed pricing model for cloud computingProposed pricing model for cloud computing
Proposed pricing model for cloud computing
Adeel Javaid
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
Adeel Javaid
 
How hackers attack networks
How hackers attack networksHow hackers attack networks
How hackers attack networks
Adeel Javaid
 
How To Get a Good Job in Academia
How To Get a Good Job in AcademiaHow To Get a Good Job in Academia
How To Get a Good Job in AcademiaAdeel Javaid
 
Secrets of success
Secrets of successSecrets of success
Secrets of successAdeel Javaid
 
Smartphone healthcare
Smartphone healthcareSmartphone healthcare
Smartphone healthcareAdeel Javaid
 
Share point presentation
Share point presentationShare point presentation
Share point presentationAdeel Javaid
 
Project management
Project managementProject management
Project managementAdeel Javaid
 
Inside the entreprenurial mind
Inside the entreprenurial mindInside the entreprenurial mind
Inside the entreprenurial mindAdeel Javaid
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architectureAdeel Javaid
 
Template for marketing strategy
Template for marketing strategyTemplate for marketing strategy
Template for marketing strategy
Adeel Javaid
 
The toyota production system
The toyota production systemThe toyota production system
The toyota production system
Adeel Javaid
 
Tps and lean manufacturing
Tps and lean manufacturingTps and lean manufacturing
Tps and lean manufacturingAdeel Javaid
 
Cloud security
Cloud securityCloud security
Cloud security
Adeel Javaid
 

More from Adeel Javaid (20)

Cybersecurity threat assessment manual
Cybersecurity threat assessment manualCybersecurity threat assessment manual
Cybersecurity threat assessment manual
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system security
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Proposed pricing model for cloud computing
Proposed pricing model for cloud computingProposed pricing model for cloud computing
Proposed pricing model for cloud computing
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
 
How hackers attack networks
How hackers attack networksHow hackers attack networks
How hackers attack networks
 
What is ph d
What is ph dWhat is ph d
What is ph d
 
How To Get a Good Job in Academia
How To Get a Good Job in AcademiaHow To Get a Good Job in Academia
How To Get a Good Job in Academia
 
Secrets of success
Secrets of successSecrets of success
Secrets of success
 
Smartphone healthcare
Smartphone healthcareSmartphone healthcare
Smartphone healthcare
 
Share point presentation
Share point presentationShare point presentation
Share point presentation
 
Project management
Project managementProject management
Project management
 
Inside the entreprenurial mind
Inside the entreprenurial mindInside the entreprenurial mind
Inside the entreprenurial mind
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
Template for marketing strategy
Template for marketing strategyTemplate for marketing strategy
Template for marketing strategy
 
The toyota production system
The toyota production systemThe toyota production system
The toyota production system
 
Channel marketing
Channel marketingChannel marketing
Channel marketing
 
Tps and lean manufacturing
Tps and lean manufacturingTps and lean manufacturing
Tps and lean manufacturing
 
Cloud security
Cloud securityCloud security
Cloud security
 

Recently uploaded

Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 

Recently uploaded (20)

Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 

Business continuity and disaster recovery

  • 1. Business Continuity & Disaster Recovery Muhammad Adeel Javaid
  • 2. Imagine a company… Bank with 1 Million accounts, social security numbers, credit cards, loans… Airline serving 50,000 people on 250 flights daily… Pharmacy system filling 5 million prescriptions per year, some of the prescriptions are life-saving… Factory with 200 employees producing 200,000 products per day using robots…
  • 3. Imagine a system failure…  Server failure  Disk System failure  Hacker break-in  Denial of Service attack  Extended power failure  Snow storm  Spyware  Malevolent virus or worm  Earthquake, tornado  Employee error or revenge How will this affect each business?
  • 4. First Step: Business Impact Analysis Which business processes are of strategic importance? What disasters could occur? What impact would they have on the organization financially? Legally? On human life? On reputation? What is the required recovery time period? Answers obtained via questionnaire, interviews, or meeting with key users of IT
  • 5. Event Damage Classification Negligible: No significant cost or damage Minor: A non-negligible event with no material or financial impact on the business Major: Impacts one or more departments and may impact outside clients Crisis: Has a major material or financial impact on the business Minor, Major, & Crisis events should be documented and tracked to repair
  • 6. Workbook: Disasters and Impact Problematic Event or Incident Affected Business Process(es) (Assumes a university) Impact Classification & Effect on finances, legal liability, human life, reputation Fire Class rooms, business departments Crisis, at times Major, Human life Hacking Attack Registration, advising, Major, Legal liability Network Unavailable Registration, advising, classes, homework, education Crisis Social engineering, /Fraud Registration, Major, Legal liability Server Failure (Disk/server) Registration, advising, classes, homework, education. Major, at times: Crisis
  • 7. Recovery Time: Terms Interruption Window: Time duration organization can wait between point of failure and service resumption Service Delivery Objective (SDO): Level of service in Alternate Mode Maximum Tolerable Outage: Max time in Alternate Mode Regular Service Alternate Mode Regular Service Interruption Window Maximum Tolerable Outage SDO Interruption Time… Disaster Recovery Plan Implemented Restoration Plan Implemented
  • 8. Definitions Business Continuity: Offer critical services in event of disruption Disaster Recovery: Survive interruption to computer information systems Alternate Process Mode: Service offered by backup system Disaster Recovery Plan (DRP): How to transition to Alternate Process Mode Restoration Plan: How to return to regular system mode
  • 9. Classification of Services Critical $$$$: Cannot be performed manually. Tolerance to interruption is very low Vital $$: Can be performed manually for very short time Sensitive $: Can be performed manually for a period of time, but may cost more in staff Nonsensitive ¢: Can be performed manually for an extended period of time with little additional cost and minimal recovery effort
  • 10. Determine Criticality of Business Processes Corporate Sales (1) Shipping (2) Engineering (3) Web Service (1) Sales Calls (2) Product A (1) Product B (2) Product C (3) Product A (1) Orders (1) Inventory (2) Product B (2)
  • 11. RPO and RTO How far back can you fail to? How long can you operate without a system? One week’s worth of data? Which services can last how long? Interruption 1 1 1 Hour Day Week Recovery Point Objective Recovery Time Objective Interruption 1 1 1 Week Day Hour
  • 12. Recovery Point Objective Mirroring: RAID Backup Images Orphan Data: Data which is lost and never recovered. RPO influences the Backup Period
  • 13. Business Impact Analysis Summary Service Recovery Point Objective (Hours) Recovery Time Objective (Hours) Critical Resources (Computer, people, peripherals) Special Notes (Unusual treatment at Specific times, unusual risk conditions) Registratio n 0 hours 4 hours SOLAR, network Registrar High priority during Nov- Jan, March-June, August. Personnel 2 hours 8 hours PeopleSoft Can operate manually for some time Teaching 1 day 1 hour D2L, network, faculty files During school semester: high priority. Work Book Partial BIA for a university
  • 14. RAID – Data Mirroring ABCDABCD AB CD Parity AB CD RAID 0: Striping RAID 1: Mirroring Higher Level RAID: Striping & Redundancy Redundant Array of Independent Disks
  • 15. Network Disaster Recovery Redundancy Includes: Routing protocols Fail-over Multiple paths Alternative Routing >1 Medium or > 1 network provider Diverse Routing Multiple paths, 1 medium type Last-mile circuit protection E.g., Local: microwave & cable Long-haul network diversity Redundant network providers Voice Recovery Voice communication backup
  • 16. Disruption vs. Recovery Costs Cost Time Service Downtime Alternative Recovery Strategies Minimum Cost * Hot Site * Warm Site * Cold Site
  • 17. Alternative Recovery Strategies Hot Site: Fully configured, ready to operate within hours Warm Site: Ready to operate within days: no or low power main computer. Does contain disks, network, peripherals. Cold Site: Ready to operate within weeks. Contains electrical wiring, air conditioning, flooring Duplicate or Redundant Info. Processing Facility: Standby hot site within the organization Reciprocal Agreement with another organization or division Mobile Site: Fully- or partially-configured trailer comes to your site, with microwave or satellite communications
  • 18. What is Cloud Computing? Database App Server Laptop PC Web Server Cloud Computing VPN Server
  • 19. This would cost $200/month.This would cost $200/month. Introduction to Cloud NIST Visual Model of Cloud Computing Definition National Institute of Standards and Technology, www.cloudstandards.org
  • 20. Cloud Service Models Software(SaaS): Provider runs own applications on cloud infrastructure. Platform(PaaS): Consumer provides apps; provider provides system and development environment. Infrastructure(laaS): Provides customers access to processing, storage, networks or other fundamental resources
  • 21. Cloud Deployment Models Private Cloud: Dedicated to one organization Community Cloud: Several organizations with shared concerns share computer facilities Public Cloud: Available to the public or a large industry group Hybrid Cloud: Two or more clouds (private, community or public clouds) remain distinct but are bound together by standardized or proprietary technology
  • 22. Major Areas of Security Concerns Multi-tenancy: Your app is on same server with other organizations. Need: segmentation, isolation, policy Service Level Agreement (SLA): Defines performance, security policy, availability, backup, location, compliance, audit issues Your Coverage: Total security = your portion + provider portion Responsibility varies for IAAS vs. PAAS vs. SAAS You can transfer security responsibility but not accountability
  • 23. Hot Site  Contractual costs include: basic subscription, monthly fee, testing charges, activation costs, and hourly/daily use charges  Contractual issues include: other subscriber access, speed of access, configurations, staff assistance, audit & test  Hot site is for emergency use – not long term  May offer warm or cold site for extended durations
  • 24. Reciprocal Agreements Advantage: Low cost Problems may include: Quick access Compatibility (computer, software, …) Resource availability: computer, network, staff Priority of visitor Security (less a problem if same organization) Testing required Susceptibility to same disasters Length of welcomed stay
  • 25. RPO Controls Data File and System/Directory Location RPO (Hours) Special Treatment (Backup period, RAID, File Retention Strategies) Registration 0 hours RAID. Mobile Site? Teaching 1 day Daily backups. Facilities Computer Center as Redundant info processing center Work Book
  • 26. Business Continuity Process  Perform Business Impact Analysis  Prioritize services to support critical business processes  Determine alternate processing modes for critical and vital services  Develop the Disaster Recovery plan for IS systems recovery  Develop BCP for business operations recovery and continuation  Test the plans  Maintain plans
  • 27. Question The amount of data transactions that are allowed to be lost following a computer failure (i.e., duration of orphan data) is the: 1.Recovery Time Objective 2.Recovery Point Objective 3.Service Delivery Objective 4.Maximum Tolerable Outage
  • 28. Question When the RTO is large, this is associated with: 1. Critical applications 2. A speedy alternative recovery strategy 3. Sensitive or nonsensitive services 4. An extensive restoration plan
  • 29. Question When the RPO is very short, the best solution is: 1. Cold site 2. Data mirroring 3. A detailed and efficient Disaster Recovery Plan 4. An accurate Business Continuity Plan
  • 31. An Incident Occurs… Security officer declares disaster Call Security Officer (SO) or committee member SO follows pre-established protocol Emergency Response Team: Human life: First concern Phone tree notifies relevant participants IT follows Disaster Recovery Plan Public relations interfaces with media (everyone else quiet) Mgmt, legal council act
  • 32. Concerns for a BCP/DR Plan  Evacuation plan: People’s lives always take first priority  Disaster declaration: Who, how, for what?  Responsibility: Who covers necessary disaster recovery functions  Procedures for Disaster Recovery  Procedures for Alternate Mode operation Resource Allocation: During recovery & continued operation Copies of the plan should be off-site
  • 33. Disaster Recovery Responsibilities General Business  First responder: Evacuation, fire, health…  Damage Assessment  Emergency Mgmt  Legal Affairs  Transportation/Relocation /Coordination (people, equipment)  Supplies  Salvage  Training IT-Specific Functions  Software  Application  Emergency operations  Network recovery  Hardware  Database/Data Entry  Information Security
  • 34. BCP Documents Focus: IT Business Event Recovery Disaster Recovery Plan Procedures to recover at alternate site Business Recovery Plan Recover business after a disaster IT Contingency Plan: Recovers major application or system Occupant Emergency Plan: Protect life and assets during physical threat Cyber Incident Response Plan: Malicious cyber incident Crisis Communication Plan: Provide status reports to public and personnel Business Continuity Business Continuity Plan Continuity of Operations Plan Longer duration outages
  • 35. Workbook Business Continuity Overview Classifica- tion (Critical or Vital) Business Process Incident or Problematic Event(s) Procedure for Handling (Section 5) Vital Registration Computer Failure If total failure, forward requests to UW-System Otherwise, use 1-week-old database for read purposes only Critical Teaching Computer Failure Faculty DB Recovery Procedure
  • 36. MTBF = MTTF + MTTR • Mean Time to Repair (MTTR) • Mean Time Between Failure (MTBF) Measure of availability: • 5 9s = 99.999% of time working = 5 ½ minutes of failure per year. works repair works repair works 1 day 84 days
  • 37. Disaster Recovery Test Execution Always tested in this order: Desk-Based Evaluation/Paper Test: A group steps through a paper procedure and mentally performs each step. Preparedness Test: Part of the full test is performed. Different parts are tested regularly. Full Operational Test: Simulation of a full disaster
  • 38. Business Continuity Test Types Checklist Review: Reviews coverage of plan – are all important concerns covered? Structured Walkthrough: Reviews all aspects of plan, often walking through different scenarios Simulation Test: Execute plan based upon a specific scenario, without alternate site Parallel Test: Bring up alternate off-site facility, without bringing down regular site Full-Interruption: Move processing from regular site to alternate site.
  • 39. Testing Objectives Main objective: existing plans will result in successful recovery of infrastructure & business processes Also can: • Identify gaps or errors • Verify assumptions • Test time lines • Train and coordinate staff
  • 40. Testing Procedures Tests start simple and become more challenging with progress Include an independent 3rd party (e.g. auditor) to observe test Retain documentation for audit reviews Develop test objectives Execute Test Evaluate Test Develop recommendations to improve test effectiveness Follow-Up to ensure recommendations implemented
  • 41. Test Stages PreTest: Set the Stage Set up equipment Prepare staff Test: Actual test PostTest: Cleanup Returning resources Calculate metrics: Time required, % success rate in processing, ratio of successful transactions in Alternate mode vs. normal mode Delete test data Evaluate plan Implement improvements PreTest Test PostTest
  • 42. Gap Analysis Comparing Current Level with Desired Level • Which processes need to be improved? • Where is staff or equipment lacking? • Where does additional coordination need to occur?
  • 43. Insurance IPF & Equipment Data & Media Employee Damage Business Interruption: Loss of profit due to IS interruption Valuable Papers & Records: Covers cash value of lost/damaged paper & records Fidelity Coverage: Loss from dishonest employees Extra Expense: Extra cost of operation following IPF damage Media Reconstruction Cost of reproduction of media Errors & Omissions: Liability for error resulting in loss to client IS Equipment & Facilities: Loss of IPF & equipment due to damage Media Transportation Loss of data during xport IPF = Information Processing Facility
  • 44. Auditing BCP Includes:  Is BIA complete with RPO/RTO defined for all services?  Is the BCP in-line with business goals, effective, and current?  Is it clear who does what in the BCP and DRP?  Is everyone trained, competent, and happy with their jobs?  Is the DRP detailed, maintained, and tested?  Is the BCP and DRP consistent in their recovery coverage?  Are people listed in the BCP/phone tree current and do they have a copy of BC manual?  Are the backup/recovery procedures being followed?  Does the hot site have correct copies of all software?  Is the backup site maintained to expectations, and are the expectations effective?  Was the DRP test documented well, and was the DRP updated?
  • 45. Summary of BC Security Controls • RAID • Backups: Incremental backup, differential backup • Networks: Diverse routing, alternative routing • Alternative Site: Hot site, warm site, cold site, reciprocal agreement, mobile site • Testing: checklist, structured walkthrough, simulation, parallel, full interruption • Insurance
  • 46. Question The FIRST thing that should be done when you discover an intruder has hacked into your computer system is to: 1. Disconnect the computer facilities from the computer network to hopefully disconnect the attacker 2. Power down the server to prevent further loss of confidentiality and data integrity. 3. Call the manager. 4. Follow the directions of the Incident Response Plan.
  • 47. Question During an audit of the business continuity plan, the finding of MOST concern is: 1. The phone tree has not been double- checked in 6 months 2. The Business Impact Analysis has not been updated this year 3. A test of the backup-recovery system is not performed regularly 4. The backup library site lacks a UPS
  • 48. Question The first and most important BCP test is the: 1. Fully operational test 2. Preparedness test 3. Security test 4. Desk-based paper test
  • 49. Question When a disaster occurs, the highest priority is: 1.Ensuring everyone is safe 2.Minimizing data loss by saving important data 3.Recovery of backup tapes 4.Calling a manager
  • 50. Question A documented process where one determines the most crucial IT operations from the business perspective 1.Business Continuity Plan 2.Disaster Recovery Plan 3.Restoration Plan 4.Business Impact Analysis
  • 51. Question The PRIMARY goal of the Post-Test is: 1. Write a report for audit purposes 2. Return to normal processing 3. Evaluate test effectiveness and update the response plan 4. Report on test to management
  • 52. Question A test that verifies that the alternate site successfully can process transactions is known as: 1. Structured walkthrough 2. Parallel test 3. Simulation test 4. Preparedness test
  • 53. Vocabulary •Business Continuity Plan (BCP), Business Impact Analysis (BIA), RAID, Disaster Recovery Plan (DRP) •Hot site, warm site, cold site, reciprocal agreement, mobile site •Interruption window, Maximum tolerable outage, Service delivery objective •Recovery point objective (RPO), Recovery time objective (RTO) •Desk based or paper test, preparedness test, fully operational test, •Test: checklist, structured walkthrough, simulation test, parallel test, full interruption, pretest, post-test •Diverse routing, alternative routing •Incremental backup, differential backup •Define cloud computing, Infrastructure as a Service, Platform as Service, Software as a Service, Private cloud, Community cloud, Public cloud, Hybrid cloud.
  • 54. Interactive Crossword Puzzle To get more practice the vocabulary from this section click on the picture below. For a word bank look at the previous slide. Definitions adapted from: All-In-One CISA Exam Guide
  • 55. HEALTH FIRST CASE STUDY Business Impact Analysis & Business Continuity Jamie Ramon MD Doctor Chris Ramon RD Dietician Terry Licensed Practicing Nurse Pat Software Consultant
  • 56. Step 1: Define Threats Resulting in Business Disruption Key questions: •Which business processes are of strategic importance? •What disasters could occur? •What impact would they have on the organization financially? Legally? On human life? On reputation? Impact Classification Negligible: No significant cost or damage Minor: A non-negligible event with no material or financial impact on the business Major: Impacts one or more departments and may impact outside clients Crisis: Has a major financial impact on the business
  • 57. Step 1: Define Threats Resulting in Business Disruption Problematic Event or Incident Affected Business Process(es) Impact Classification & Effect on finances, legal liability, human life, reputation Fire Hacking incident Network Unavailable (E.g., ISP problem) Social engineering, fraud Server Failure (E.g., Disk) Power Failure
  • 58. 1 1 1 Hour Day Week Step 2: Define Recovery Objectives Recovery Point Objective Recovery Time Objective Interruption Business Process Recovery Time Objective (Hours) Recovery Point Objective (Hours) Critical Resources (Computer, people, peripherals) Special Notes (Unusual treatment at specific times, unusual risk conditions) 1 1 1 Week Day Hour
  • 59. Business Continuity Step 3: Attaining Recovery Point Objective (RPO) Step 4: Attaining Recovery Time Objective (RTO) Classification (Critical or Vital) Business Process Problem Event(s) or Incident Procedure for Handling (Section 5)
  • 60. Criticality Classification Critical: Cannot be performed manually. Tolerance to interruption is very low Vital: Can be performed manually for very short time Sensitive: Can be performed manually for a period of time, but may cost more in staff Non-sensitive: Can be performed manually for an extended period of time with little additional cost and minimal recovery effort

Editor's Notes

  1. This covers most of the CISA Chapter on Business Continuity and Disaster Recovery.
  2. Different companies will react in different ways to problems. A bank may want to bring down a network as fast as possible if an intruder penetrates their network. A pharmacy may want to leave their network up as much as possible but doublecheck integrity – or decide to bring down a partial network.
  3. This shows a lot of vocabulary in pictorial form. The alternate mode is not a full service mode.
  4. It is a good idea to classify business processes. Upper management should do this.
  5. We may decide that the Sales function is most critical (or perhaps not), and so Sales is number 1. If we don’t have sales, we don’t ship. Engineers can work at home on their projects. While their work is critical to backup, if they lose a week, it may mean ½ week lost productivity, resulting in lost salary. Within Sales, the web service is 50% of sales, and cannot be done manually, so it is rated number 1. The Sales calls can be done manually at home or most of our sales people are on the road anyway.
  6. A note here is that sometimes the RTO varies by day of year (scheduling system for a school is most important the week before and first week of school.) Also, management and people involved with a database may disagree, in which case management sees the larger picture, and their opinion is most important. However a risk manager may consider both perspectives.
  7. The interruption (red thing) is far to the right. If we want a short RPO, then RAID or disk mirroring is the best option. Otherwise we may want to save off a disk image. A slower recovery would involve tape.
  8. RAID 1 and above use redundancy, offering survival if a single disk fails.
  9. With redundancy, if one part fails, another part can take over. Diverse Routing means one provider, but multiple routes (or paths). Alternate Routing means multiple network providers, and/or multiple mediums (fiber, cable, radio) Long-haul = Long Distance Last-mile circuit = from office (or home) to service provider (local telco or cable company)
  10. There is a curve showing the cost of having a system down, and another curve showing the cost of bringing an alternative system up quickly. The least cost is the cross-point of these two curves.
  11. Hot, warm, cold, and mobile sites can be rented from special companies. Contracts must be carefully looked over. A duplicate info processing facility can be a computer system in another division of the company.
  12. Definition: Cloud Computing: A shared pool of configurable computing resources (such as Servers, Applications, Databases, Services, Computers) that can be rapidly customized and released with minimal management effort or service provider. Any user within the network is allow access to the shred configurable resource by providing authentication. Once authentication is approved, user is allowed to customize resource. Advantages: Cost Since the cloud provider supplies the organization’s infrastructure, cloud computing becomes an operational cost rather than a capital cost. Also cost is reduced by reducing technical staff and centralizing computing resources Scalability Reduces or eliminates physical space for storing data Reliability Large cloud computing providers have redundant sites for users, which may address business continuity and disaster recovery risk Performance Provider continuous and consistent monitoring Agility Rapidly providing infrastructure resources Disadvantage: Potential for High Risk/Security Concerns Since cloud computing is new technology, there maybe unknown bugs or holes Technical Support is not familiar dealing with arising problems Solutions may take longer to solve Source:  CISM® Review Manual 2012 , © 2011, ISACA. All rights reserved. Used by permission.
  13. Some things to consider: Infrastructure: Creates options if the cloud provider has a service interruption Platform: Availability Confidentiality If a security breach happens, privacy and legal liability Data ownerships Concern around e-discovery Software: Who owns the application Where are the applications locations Source:  CISM® Review Manual 2012 , © 2011, ISACA. All rights reserved. Used by permission. Exhibit 3.15
  14. Some things to consider: Private Cloud: Cloud services with minimum risk May not provide scalability and agility of public cloud services Company wants higher control over the environment Community Cloud: Data may be stored with the data of competitors Company needs more than one organization in the company access to the cloud Public Cloud: Data may be stored in unknown locations and may b easily retrievable Company wants general public/large industry group access to the cloud Hybrid Cloud: Aggregate risk from having different cloud computing development models Data should be classified and labeled to assign correct type Source:  CISM® Review Manual 2012 , © 2011, ISACA. All rights reserved. Used by permission. Exhibit 3.16
  15. Some business processes are more important than other business processes. Sales is more important in the short term than engineering, and possibly more than the factory. That is why business processes are prioritized.
  16. 2
  17. 3---Large RTOs mean the application can run manually with little problem for an extended length of time. This is associated with services classified as sensitive or nonsensitive.
  18. 2---RPO requires recovery of data (gathered in the past) immediately. Therefore, the correct answer is data mirroring (or using redundant disks).
  19. This activity diagram shows that some events can happen in parallel, including all the tasks to the right. In some cases there is a security committee, and anyone on the committee can decide a disaster has occurred. There is also a procedure that includes the criteria for making the declaration in the first place. Once that determination is made, disaster protocols can begin.
  20. People’s lives take FIRST PRIORITY is often a question on a CISA or CISM exam.
  21. Each of these potentially need addressing
  22. Here Event Recovery is how to react or recover from the incident. Business Continuity is how Alternate Processing mode should operate.
  23. Mean time means statistical average.
  24. Start with the simplest tests and proceed to the more complex tests. From: All-in-One CISSP Exam Guide, 4 th Edition, Shon Harris, McGraw Hill, 2008
  25. Testing incident response can start with easier operations and proceed to more complex. Often part of the problem is the long time it takes or the errors which are made, which can be optimized by practice.
  26. When testing IR or DR, there are three stages for the testing.
  27. This is an optional slide for Computer Scientists, but may be useful for MIS or IT majors. It is also necessary information for CISA applicants.
  28. 4
  29. 3---The most critical asset for a company is its data. The backup-restore must be tested to ensure that this critical data is always available.
  30. The Desk-based paper test is the first of the three tests, and is considered to be the most critical to perform.
  31. 1
  32. 4. Business Impact Analysis
  33. 3
  34. 2
  35. MINOR CHANGES TYPED FULL NAME INSTEAD OF ABBREVIATION (MEGAN)
  36. Vocabulary answers with multiple words will include spaces between words. Definitions for crossword puzzle are adapted from CISA ® Certified Information Systems Auditor All-in-One Exam Guide, Peter H Gregory, McGraw-Hill Co., 2010.
  37. There will be more threat ideas in the Workbook
  38. There will be more threat ideas in the Workbook
  39. A note here is that sometimes the RTO varies by day of year (scheduling system for a school is most important the week before and first week of school.) Also, management and people involved with a database may disagree, in which case management sees the larger picture, and their opinion is most important. However a risk manager may consider both perspectives.
  40. The full procedure for handling would be documented in section 5 of the workbook.