SlideShare a Scribd company logo
Security Program and
Policies
Principles and Practices
by Sari Stern Greene
Chapter 12: Business Continuity Management
Copyright 2014 Pearson Education, Inc. 2
Objectives
❑ Define a disaster
❑ Appreciate the importance of emergency
preparedness
❑ Analyze threats, risks, and business impact
assessments
❑ Explain the components of a business continuity
plan and program
❑ Develop policies related to business continuity
management
Copyright 2014 Pearson Education, Inc. 3
Emergency Preparedness
■ Disaster
❑ Any event that results in damage or destruction,
loss of life, or drastic change to the environment
❑ A disruption of normal business functions where
the expected time for returning to normalcy would
seriously impact the organization’s capability to
maintain operations, including customer
commitments and regulatory compliance
❑ The cause can be environmental, operational,
accidental, or willful
Emergency Preparedness cont.
■ Resilient organization
❑ Has the capability to quickly adapt and recover
from known or unknown change to the
environment
■ Business disruption has an economic and
societal ripple effect
■ Emergency preparedness is a civic duty and
regulatory requirement
❑ Presidential Decision Directive (PDD) 63 Critical
Infrastructure Protection
❑ Federal Continuity Directive 1
Copyright 2014 Pearson Education, Inc. 4
Copyright 2014 Pearson Education, Inc. 5
Business Continuity Risk
Management
■ Continuity planning
❑ The business practice of ensuring the execution of
essential functions
❑ Component of organizational risk management
❑ Risk management for continuity of operations
requires the organizations to
■ Identify the threats that can disrupt operations
■ Determine the risk
■ Assess the impact on the company
Business Continuity Risk
Management cont.
■ Business continuity threat assessment
❑ Identify viable threats and predict the likelihood of
occurrence
❑ Threat modeling takes into account historical and
predictive geographic, technological, physical,
environmental, industry, and third-party factors
■ Business continuity threat assessment
❑ Evaluates the sufficiency of controls to prevent a
threat from occurring or to minimize its impact
Copyright 2014 Pearson Education, Inc. 6
Copyright 2014 Pearson Education, Inc. 7
What Is a Business Impact
Assessment?
■ Business Impact Analysis
❑ Identify essential services/processes and recovery
timeframes
❑ It is a multistep collaborative activity that involves
business process owners, stakeholders, and
corporate officers
❑ A BIA incorporates three metrics
■ Maximum tolerable downtime (MTD)
■ Recovery time objective (RTO)
■ Recovery point objective (RPO)
Copyright 2014 Pearson Education, Inc. 8
Business Continuity Plan
■ The objective is to ensure the organization
has the capability to respond and recover
from a disaster
■ Component:
❑ Response plans
❑ Contingency plans
❑ Recovery plans
❑ Resumption plans
Business Continuity Plan cont.
■ Business continuity management involves the
entire organization
❑ Board of Directors provides oversight and
guidance, authorizes the related policy, and is
legally accountable for the actions of the
organization
❑ Executive management provides leadership
❑ Business Continuity Team (BCT) has the authority
to make decisions related to disaster preparation,
response, and recovery
Copyright 2014 Pearson Education, Inc. 9
Copyright 2014 Pearson Education, Inc. 10
Disaster Response Plans
■ Addresses what should be done immediately following a
significant incident
■ Defines who has the authority to declare a disaster
■ Defines who has the authority to contact external entities
■ Defines evacuation procedures
■ Defines emergency communication & notification procedures
■ Upon declaration of a disaster, all BCT members should
report to a designated command and control center
■ Occupant emergency Plan (OEP)
❑ Describes evacuation and shelter-in-place procedures in the
event of a threat or incident to the health and safety of personnel
Disaster Response Plans cont.
■ Relocation strategies
❑ Hot site
❑ Fully operational location with redundant equipment.
❑ The data has been streamed to the site on a real-time basis or close to real time
❑ Warm site
❑ Configured to support operations including communications capabilities, peripheral
devices, power, and HVAC.
❑ Spare computers may be located there that then would need to be configured in the
event of a disaster
❑ Date must be restored
❑ Cold site
❑ Available alternative location
❑ Equipped with power, HVAC, and secure access
❑ Mobile site
❑ Self-contained unit
❑ Equipped with the required hardware, software, and peripherals
❑ Data needs to be restored
Copyright 2014 Pearson Education, Inc. 11
Operational Contingency Plans
■ Addresses how an organization’s essential
business processes will be delivered during
the recovery process
■ Developed at the departmental level
■ Responsibility of the business process owner
■ The documentation should follow the same
form as the SOPs
Copyright 2014 Pearson Education, Inc. 12
Copyright 2014 Pearson Education, Inc. 13
The Disaster Recovery Phase
■ Recovery strategies
❑ The path to bringing the company back to a
normal business environment
❑ A plan should be in place that breaks down each
category of the overall recovery effort to simplify
the daunting recovery process:
■ Mainframe
■ Network
■ Communications
■ Infrastructure
■ Facilities
Copyright 2014 Pearson Education, Inc. 14
The Disaster Recovery Phase
Cont.
■ Recovery procedures
❑ All procedures should be designed, tested,
documented, and approved prior to when the disaster
strikes
❑ Procedures should be written as if the person who will
be following them is not intimately familiar with the
information system or component
❑ Procedures should explain what needs to be done,
when, where, and how
❑ The key is to respond fast using predefined steps
❑ Recovery procedures should be reviewed annually
Copyright 2014 Pearson Education, Inc. 15
The Resumption Phase
■ The objective is to transition to normal
operations
■ Two major activities
❑ Validation
■ Verifying recovered systems are operating correctly
❑ Deactivation
■ The official notification that the organization is no longer
operating in emergency or disaster mode
Copyright 2014 Pearson Education, Inc. 16
Plan Testing and Maintenance
❑ Proactive testing of the plan is essential
❑ Until tested, the plan is theoretical at best
❑ The tests should prove that the procedures and
the plan are:
■ Relevant
■ Operable under adverse conditions
■ Accurate
❑ Tests are used to discover errors and
inadequacies
Copyright 2014 Pearson Education, Inc. 17
Plan Testing and Maintenance
Cont.
■ Three standard testing methodologies
❑ Tabletop exercise
■ Structured review
■ Simulation
❑ Functional exercises
❑ Full-scale testing
■ Business continuity plan audit
❑ Evaluation of how the business continuity program
in its entirety is being managed
❑ Auditors must be independent
Copyright 2014 Pearson Education, Inc. 18
Plan Maintenance
❑ Business environments are dynamic: The plan
should be reviewed and edited regularly to match
the changes that occur in the company and/or the
industry in which the company is involved
❑ The plan cannot be reviewed without the risk
assessment being reviewed as well
❑ Responsibility for maintaining the plan should be
assigned to a specific role such as the ISO
Copyright 2014 Pearson Education, Inc. 19
Summary
■ A disaster can strike at any time. The organization
must be prepared to respond to continue to provide
services/products to its clients.
■ It is the responsibility of executive management to
insure that threats are evaluated, impact to business
processes recognized, and resources allocated.
■ This requires the creation and maintenance of an
audited business continuity plan and of a set of
ancillary procedures.

More Related Content

What's hot

CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
Karthikeyan Dhayalan
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
Dam Frank
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IThhuihhui
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and Maintenance
Nada G.Youssef
 
Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security
Nada G.Youssef
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
Maganathin Veeraragaloo
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
Nada G.Youssef
 
Risk and Business Continuity Management
Risk and Business Continuity ManagementRisk and Business Continuity Management
Risk and Business Continuity Management
Continuity and Resilience
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
gcleary
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
Diane Christina
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
IBM Security
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
Syaiful Ahdan
 
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENTBUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
Continuity and Resilience
 
Cissp Training PPT
Cissp Training PPTCissp Training PPT
Cissp Training PPT
ADEPT TECHNOLOGY
 
Business Impact Analysis
Business Impact AnalysisBusiness Impact Analysis
Business Impact Analysis
dlfrench
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
Karthikeyan Dhayalan
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
mhdpaknejad
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
Imran Ahmed
 
Business Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBusiness Continuity Planning Presentation Overview
Business Continuity Planning Presentation Overview
Bob Winkler
 
Cybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxCybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptx
Azra'ee Mamat
 

What's hot (20)

CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IT
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and Maintenance
 
Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
Risk and Business Continuity Management
Risk and Business Continuity ManagementRisk and Business Continuity Management
Risk and Business Continuity Management
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENTBUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
BUSINESS CONTINUITY PLANNING AND RISK MANAGEMENT
 
Cissp Training PPT
Cissp Training PPTCissp Training PPT
Cissp Training PPT
 
Business Impact Analysis
Business Impact AnalysisBusiness Impact Analysis
Business Impact Analysis
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
Business Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBusiness Continuity Planning Presentation Overview
Business Continuity Planning Presentation Overview
 
Cybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxCybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptx
 

Viewers also liked

Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants
Nada G.Youssef
 
Chapter 1: Understanding Policy
Chapter 1: Understanding Policy Chapter 1: Understanding Policy
Chapter 1: Understanding Policy
Nada G.Youssef
 
Chapter 2: Policy Elements and style
Chapter 2: Policy Elements and style Chapter 2: Policy Elements and style
Chapter 2: Policy Elements and style
Nada G.Youssef
 
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsChapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial Institutions
Nada G.Youssef
 
Chapter 4: Governance and Risk Management
Chapter 4: Governance and Risk ManagementChapter 4: Governance and Risk Management
Chapter 4: Governance and Risk Management
Nada G.Youssef
 
Chapter 9: Using Cost Information to Make Special Decisions
Chapter 9: Using Cost Information to Make Special DecisionsChapter 9: Using Cost Information to Make Special Decisions
Chapter 9: Using Cost Information to Make Special Decisions
Nada G.Youssef
 
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorChapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare Sector
Nada G.Youssef
 
Chapter 1: Context of Health Care Financial Management
Chapter 1: Context of Health Care Financial ManagementChapter 1: Context of Health Care Financial Management
Chapter 1: Context of Health Care Financial Management
Nada G.Youssef
 
Chapter 8: Capital Financing for Health Care Providers
Chapter 8: Capital Financing for Health Care ProvidersChapter 8: Capital Financing for Health Care Providers
Chapter 8: Capital Financing for Health Care Providers
Nada G.Youssef
 
Chapter 2: Health Care Financial Statements
Chapter 2: Health Care Financial StatementsChapter 2: Health Care Financial Statements
Chapter 2: Health Care Financial Statements
Nada G.Youssef
 

Viewers also liked (10)

Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants
 
Chapter 1: Understanding Policy
Chapter 1: Understanding Policy Chapter 1: Understanding Policy
Chapter 1: Understanding Policy
 
Chapter 2: Policy Elements and style
Chapter 2: Policy Elements and style Chapter 2: Policy Elements and style
Chapter 2: Policy Elements and style
 
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsChapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial Institutions
 
Chapter 4: Governance and Risk Management
Chapter 4: Governance and Risk ManagementChapter 4: Governance and Risk Management
Chapter 4: Governance and Risk Management
 
Chapter 9: Using Cost Information to Make Special Decisions
Chapter 9: Using Cost Information to Make Special DecisionsChapter 9: Using Cost Information to Make Special Decisions
Chapter 9: Using Cost Information to Make Special Decisions
 
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorChapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare Sector
 
Chapter 1: Context of Health Care Financial Management
Chapter 1: Context of Health Care Financial ManagementChapter 1: Context of Health Care Financial Management
Chapter 1: Context of Health Care Financial Management
 
Chapter 8: Capital Financing for Health Care Providers
Chapter 8: Capital Financing for Health Care ProvidersChapter 8: Capital Financing for Health Care Providers
Chapter 8: Capital Financing for Health Care Providers
 
Chapter 2: Health Care Financial Statements
Chapter 2: Health Care Financial StatementsChapter 2: Health Care Financial Statements
Chapter 2: Health Care Financial Statements
 

Similar to Chapter 12: Business Continuity Management

Disaster Recovery Policy
Disaster Recovery PolicyDisaster Recovery Policy
Disaster Recovery Policy
Continuity Control
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recovery
KrutiShah114
 
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
Major K. Subramaniam Kmaravehlu
 
Chap6 2007 C I S A Review Course
Chap6 2007 C I S A Review CourseChap6 2007 C I S A Review Course
Chap6 2007 C I S A Review CourseDesmond Devendran
 
Chap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseChap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseDesmond Devendran
 
BCP – How to develop BCP strategies and Plans 2016.pptx
BCP – How to develop BCP strategies and Plans 2016.pptxBCP – How to develop BCP strategies and Plans 2016.pptx
BCP – How to develop BCP strategies and Plans 2016.pptx
FerriFatra1
 
Buisness contingency plan
Buisness contingency planBuisness contingency plan
Buisness contingency planRMC
 
Lecture-3-Introduction to Maintenance Management.ppt
Lecture-3-Introduction to Maintenance Management.pptLecture-3-Introduction to Maintenance Management.ppt
Lecture-3-Introduction to Maintenance Management.ppt
Thushan9
 
Business continuity overview slideshare
Business continuity overview slideshareBusiness continuity overview slideshare
Business continuity overview slideshare
Chris Greenhill
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)
Goutama Bachtiar
 
Smart simple inc_bcp_aug_2014
Smart simple inc_bcp_aug_2014Smart simple inc_bcp_aug_2014
Smart simple inc_bcp_aug_2014
Joel Gomes
 
B E Aerospace case study - Oracle Primavera P6 Collaborate 14
B E Aerospace case study - Oracle Primavera P6 Collaborate 14B E Aerospace case study - Oracle Primavera P6 Collaborate 14
B E Aerospace case study - Oracle Primavera P6 Collaborate 14
p6academy
 
business_continuity_management_presentation.ppt
business_continuity_management_presentation.pptbusiness_continuity_management_presentation.ppt
business_continuity_management_presentation.ppt
LucintaLuna4
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery
EC-Council
 
Steps Asset Intensive Industries can take to PIVOT in Response to COVID-19
Steps Asset Intensive Industries can take to PIVOT in Response to COVID-19Steps Asset Intensive Industries can take to PIVOT in Response to COVID-19
Steps Asset Intensive Industries can take to PIVOT in Response to COVID-19
Subodh Nayar
 
Disaster Biz Resumpt
Disaster Biz ResumptDisaster Biz Resumpt
Disaster Biz ResumptJimGroark
 
6741 Ch 4 PowerPoint.pptx
6741 Ch 4 PowerPoint.pptx6741 Ch 4 PowerPoint.pptx
6741 Ch 4 PowerPoint.pptx
NickPalmisano2
 
Business continuity & Disaster recovery planing
Business continuity & Disaster recovery planingBusiness continuity & Disaster recovery planing
Business continuity & Disaster recovery planing
Hanaysha
 
Principles of Incident Response and Disaster Recovery, 2nd E.docx
Principles of Incident Response and Disaster Recovery, 2nd E.docxPrinciples of Incident Response and Disaster Recovery, 2nd E.docx
Principles of Incident Response and Disaster Recovery, 2nd E.docx
stilliegeorgiana
 
Cissp Week 24
Cissp Week 24Cissp Week 24
Cissp Week 24jemtallon
 

Similar to Chapter 12: Business Continuity Management (20)

Disaster Recovery Policy
Disaster Recovery PolicyDisaster Recovery Policy
Disaster Recovery Policy
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recovery
 
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
 
Chap6 2007 C I S A Review Course
Chap6 2007 C I S A Review CourseChap6 2007 C I S A Review Course
Chap6 2007 C I S A Review Course
 
Chap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseChap6 2007 Cisa Review Course
Chap6 2007 Cisa Review Course
 
BCP – How to develop BCP strategies and Plans 2016.pptx
BCP – How to develop BCP strategies and Plans 2016.pptxBCP – How to develop BCP strategies and Plans 2016.pptx
BCP – How to develop BCP strategies and Plans 2016.pptx
 
Buisness contingency plan
Buisness contingency planBuisness contingency plan
Buisness contingency plan
 
Lecture-3-Introduction to Maintenance Management.ppt
Lecture-3-Introduction to Maintenance Management.pptLecture-3-Introduction to Maintenance Management.ppt
Lecture-3-Introduction to Maintenance Management.ppt
 
Business continuity overview slideshare
Business continuity overview slideshareBusiness continuity overview slideshare
Business continuity overview slideshare
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)
 
Smart simple inc_bcp_aug_2014
Smart simple inc_bcp_aug_2014Smart simple inc_bcp_aug_2014
Smart simple inc_bcp_aug_2014
 
B E Aerospace case study - Oracle Primavera P6 Collaborate 14
B E Aerospace case study - Oracle Primavera P6 Collaborate 14B E Aerospace case study - Oracle Primavera P6 Collaborate 14
B E Aerospace case study - Oracle Primavera P6 Collaborate 14
 
business_continuity_management_presentation.ppt
business_continuity_management_presentation.pptbusiness_continuity_management_presentation.ppt
business_continuity_management_presentation.ppt
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery
 
Steps Asset Intensive Industries can take to PIVOT in Response to COVID-19
Steps Asset Intensive Industries can take to PIVOT in Response to COVID-19Steps Asset Intensive Industries can take to PIVOT in Response to COVID-19
Steps Asset Intensive Industries can take to PIVOT in Response to COVID-19
 
Disaster Biz Resumpt
Disaster Biz ResumptDisaster Biz Resumpt
Disaster Biz Resumpt
 
6741 Ch 4 PowerPoint.pptx
6741 Ch 4 PowerPoint.pptx6741 Ch 4 PowerPoint.pptx
6741 Ch 4 PowerPoint.pptx
 
Business continuity & Disaster recovery planing
Business continuity & Disaster recovery planingBusiness continuity & Disaster recovery planing
Business continuity & Disaster recovery planing
 
Principles of Incident Response and Disaster Recovery, 2nd E.docx
Principles of Incident Response and Disaster Recovery, 2nd E.docxPrinciples of Incident Response and Disaster Recovery, 2nd E.docx
Principles of Incident Response and Disaster Recovery, 2nd E.docx
 
Cissp Week 24
Cissp Week 24Cissp Week 24
Cissp Week 24
 

More from Nada G.Youssef

مجلة 1
مجلة 1مجلة 1
مجلة 1
Nada G.Youssef
 
Chapter Tewlve
Chapter TewlveChapter Tewlve
Chapter Tewlve
Nada G.Youssef
 
Chapter Eleven
Chapter ElevenChapter Eleven
Chapter Eleven
Nada G.Youssef
 
Chapter Ten
Chapter TenChapter Ten
Chapter Ten
Nada G.Youssef
 
Chapter Nine
Chapter NineChapter Nine
Chapter Nine
Nada G.Youssef
 
Chapter Eight
Chapter Eight Chapter Eight
Chapter Eight
Nada G.Youssef
 
Chapter Seven
Chapter SevenChapter Seven
Chapter Seven
Nada G.Youssef
 
Chapter Six
Chapter SixChapter Six
Chapter Six
Nada G.Youssef
 
Chapter Five
Chapter FiveChapter Five
Chapter Five
Nada G.Youssef
 
Chapter Four
Chapter FourChapter Four
Chapter Four
Nada G.Youssef
 
Chapter Three
Chapter ThreeChapter Three
Chapter Three
Nada G.Youssef
 
Chapter Two
Chapter TwoChapter Two
Chapter Two
Nada G.Youssef
 
Chapter one
Chapter oneChapter one
Chapter one
Nada G.Youssef
 
Preparatory Year of Saudi Electronic University
Preparatory Year of Saudi Electronic University Preparatory Year of Saudi Electronic University
Preparatory Year of Saudi Electronic University
Nada G.Youssef
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
Nada G.Youssef
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
Nada G.Youssef
 

More from Nada G.Youssef (16)

مجلة 1
مجلة 1مجلة 1
مجلة 1
 
Chapter Tewlve
Chapter TewlveChapter Tewlve
Chapter Tewlve
 
Chapter Eleven
Chapter ElevenChapter Eleven
Chapter Eleven
 
Chapter Ten
Chapter TenChapter Ten
Chapter Ten
 
Chapter Nine
Chapter NineChapter Nine
Chapter Nine
 
Chapter Eight
Chapter Eight Chapter Eight
Chapter Eight
 
Chapter Seven
Chapter SevenChapter Seven
Chapter Seven
 
Chapter Six
Chapter SixChapter Six
Chapter Six
 
Chapter Five
Chapter FiveChapter Five
Chapter Five
 
Chapter Four
Chapter FourChapter Four
Chapter Four
 
Chapter Three
Chapter ThreeChapter Three
Chapter Three
 
Chapter Two
Chapter TwoChapter Two
Chapter Two
 
Chapter one
Chapter oneChapter one
Chapter one
 
Preparatory Year of Saudi Electronic University
Preparatory Year of Saudi Electronic University Preparatory Year of Saudi Electronic University
Preparatory Year of Saudi Electronic University
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 

Recently uploaded

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 

Recently uploaded (20)

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 

Chapter 12: Business Continuity Management

  • 1. Security Program and Policies Principles and Practices by Sari Stern Greene Chapter 12: Business Continuity Management
  • 2. Copyright 2014 Pearson Education, Inc. 2 Objectives ❑ Define a disaster ❑ Appreciate the importance of emergency preparedness ❑ Analyze threats, risks, and business impact assessments ❑ Explain the components of a business continuity plan and program ❑ Develop policies related to business continuity management
  • 3. Copyright 2014 Pearson Education, Inc. 3 Emergency Preparedness ■ Disaster ❑ Any event that results in damage or destruction, loss of life, or drastic change to the environment ❑ A disruption of normal business functions where the expected time for returning to normalcy would seriously impact the organization’s capability to maintain operations, including customer commitments and regulatory compliance ❑ The cause can be environmental, operational, accidental, or willful
  • 4. Emergency Preparedness cont. ■ Resilient organization ❑ Has the capability to quickly adapt and recover from known or unknown change to the environment ■ Business disruption has an economic and societal ripple effect ■ Emergency preparedness is a civic duty and regulatory requirement ❑ Presidential Decision Directive (PDD) 63 Critical Infrastructure Protection ❑ Federal Continuity Directive 1 Copyright 2014 Pearson Education, Inc. 4
  • 5. Copyright 2014 Pearson Education, Inc. 5 Business Continuity Risk Management ■ Continuity planning ❑ The business practice of ensuring the execution of essential functions ❑ Component of organizational risk management ❑ Risk management for continuity of operations requires the organizations to ■ Identify the threats that can disrupt operations ■ Determine the risk ■ Assess the impact on the company
  • 6. Business Continuity Risk Management cont. ■ Business continuity threat assessment ❑ Identify viable threats and predict the likelihood of occurrence ❑ Threat modeling takes into account historical and predictive geographic, technological, physical, environmental, industry, and third-party factors ■ Business continuity threat assessment ❑ Evaluates the sufficiency of controls to prevent a threat from occurring or to minimize its impact Copyright 2014 Pearson Education, Inc. 6
  • 7. Copyright 2014 Pearson Education, Inc. 7 What Is a Business Impact Assessment? ■ Business Impact Analysis ❑ Identify essential services/processes and recovery timeframes ❑ It is a multistep collaborative activity that involves business process owners, stakeholders, and corporate officers ❑ A BIA incorporates three metrics ■ Maximum tolerable downtime (MTD) ■ Recovery time objective (RTO) ■ Recovery point objective (RPO)
  • 8. Copyright 2014 Pearson Education, Inc. 8 Business Continuity Plan ■ The objective is to ensure the organization has the capability to respond and recover from a disaster ■ Component: ❑ Response plans ❑ Contingency plans ❑ Recovery plans ❑ Resumption plans
  • 9. Business Continuity Plan cont. ■ Business continuity management involves the entire organization ❑ Board of Directors provides oversight and guidance, authorizes the related policy, and is legally accountable for the actions of the organization ❑ Executive management provides leadership ❑ Business Continuity Team (BCT) has the authority to make decisions related to disaster preparation, response, and recovery Copyright 2014 Pearson Education, Inc. 9
  • 10. Copyright 2014 Pearson Education, Inc. 10 Disaster Response Plans ■ Addresses what should be done immediately following a significant incident ■ Defines who has the authority to declare a disaster ■ Defines who has the authority to contact external entities ■ Defines evacuation procedures ■ Defines emergency communication & notification procedures ■ Upon declaration of a disaster, all BCT members should report to a designated command and control center ■ Occupant emergency Plan (OEP) ❑ Describes evacuation and shelter-in-place procedures in the event of a threat or incident to the health and safety of personnel
  • 11. Disaster Response Plans cont. ■ Relocation strategies ❑ Hot site ❑ Fully operational location with redundant equipment. ❑ The data has been streamed to the site on a real-time basis or close to real time ❑ Warm site ❑ Configured to support operations including communications capabilities, peripheral devices, power, and HVAC. ❑ Spare computers may be located there that then would need to be configured in the event of a disaster ❑ Date must be restored ❑ Cold site ❑ Available alternative location ❑ Equipped with power, HVAC, and secure access ❑ Mobile site ❑ Self-contained unit ❑ Equipped with the required hardware, software, and peripherals ❑ Data needs to be restored Copyright 2014 Pearson Education, Inc. 11
  • 12. Operational Contingency Plans ■ Addresses how an organization’s essential business processes will be delivered during the recovery process ■ Developed at the departmental level ■ Responsibility of the business process owner ■ The documentation should follow the same form as the SOPs Copyright 2014 Pearson Education, Inc. 12
  • 13. Copyright 2014 Pearson Education, Inc. 13 The Disaster Recovery Phase ■ Recovery strategies ❑ The path to bringing the company back to a normal business environment ❑ A plan should be in place that breaks down each category of the overall recovery effort to simplify the daunting recovery process: ■ Mainframe ■ Network ■ Communications ■ Infrastructure ■ Facilities
  • 14. Copyright 2014 Pearson Education, Inc. 14 The Disaster Recovery Phase Cont. ■ Recovery procedures ❑ All procedures should be designed, tested, documented, and approved prior to when the disaster strikes ❑ Procedures should be written as if the person who will be following them is not intimately familiar with the information system or component ❑ Procedures should explain what needs to be done, when, where, and how ❑ The key is to respond fast using predefined steps ❑ Recovery procedures should be reviewed annually
  • 15. Copyright 2014 Pearson Education, Inc. 15 The Resumption Phase ■ The objective is to transition to normal operations ■ Two major activities ❑ Validation ■ Verifying recovered systems are operating correctly ❑ Deactivation ■ The official notification that the organization is no longer operating in emergency or disaster mode
  • 16. Copyright 2014 Pearson Education, Inc. 16 Plan Testing and Maintenance ❑ Proactive testing of the plan is essential ❑ Until tested, the plan is theoretical at best ❑ The tests should prove that the procedures and the plan are: ■ Relevant ■ Operable under adverse conditions ■ Accurate ❑ Tests are used to discover errors and inadequacies
  • 17. Copyright 2014 Pearson Education, Inc. 17 Plan Testing and Maintenance Cont. ■ Three standard testing methodologies ❑ Tabletop exercise ■ Structured review ■ Simulation ❑ Functional exercises ❑ Full-scale testing ■ Business continuity plan audit ❑ Evaluation of how the business continuity program in its entirety is being managed ❑ Auditors must be independent
  • 18. Copyright 2014 Pearson Education, Inc. 18 Plan Maintenance ❑ Business environments are dynamic: The plan should be reviewed and edited regularly to match the changes that occur in the company and/or the industry in which the company is involved ❑ The plan cannot be reviewed without the risk assessment being reviewed as well ❑ Responsibility for maintaining the plan should be assigned to a specific role such as the ISO
  • 19. Copyright 2014 Pearson Education, Inc. 19 Summary ■ A disaster can strike at any time. The organization must be prepared to respond to continue to provide services/products to its clients. ■ It is the responsibility of executive management to insure that threats are evaluated, impact to business processes recognized, and resources allocated. ■ This requires the creation and maintenance of an audited business continuity plan and of a set of ancillary procedures.