SlideShare a Scribd company logo
Business Continuity
Predict – Preempt – Protect
Karthikeyan Dhayalan
Business Continuity
• Used to maintain the continuous operations of business critical functions in the event of
a disaster
• Disaster Recovery
• Goal is to minimize the immediate effects of a disaster.
• Usually IT focused
• Continuity Planning
• Provides methods and procedures for long term outages and disasters
• It takes a broader approach to disaster recovery
• 4 Main process steps for BCP
• Project scope and planning
• Business Impact assessment (BIA)
• Continuity planning
• Approval and Implementation
Project Scope and Planning
• First step in effective BCP
• Involves 4 key work streams
• Structured analysis of business organization from crisis point of
view
• Creation of BCP team with approval from senior management
• Resource availability assessment
• Legal and Regulatory requirement analysis
Business Organization Analysis
• First step is to perform an analysis of business organization to identify all critical
departments and key stakeholders
• Operational departments that are responsible for core services
• Critical support services, responsible for upkeep of systems that support
operational departments
• Senior executives and other key Individuals essential for ongoing business
operations
• This step provides necessary ground work to identify potential members of BCP team
• It provides foundation for the business continuity process
BCP Team Selection
• The team should include at the minimum the following representatives
• Representatives from each of the organizational departments
• Representatives from key support departments
• IT representatives with technical expertise
• Security representatives with knowledge of BCP
• Legal representatives
• Senior Management representatives
BCP Resource Requirements
• Assess the resource required for 3 distinct functions
• BCP Development:
• Team will require resources for BCP process development.
• BCP Testing, training and maintenance:
• Will require hardware and software commitments, major
commitment will be the people
• BCP Implementation:
• Implementation will require a large amount of resources both from
the HW/SW as well as human capital front
Human capital is the most significant resources consumed during a BCP process
Business Impact Assessment
• Also considered a functional analysis
• Identifies the resources that are critical to the organization, the threats
posed to the resources
• Assess the likelihood that each threat will actually occur and the impact
of those threats
• The result helps in prioritizing the commitment of Business continuity
resources to various risk exposures
BIA - Steps
Select individuals
for data gathering
Create data
gathering
technique
Identify company
critical business
functions
Identify the
resources these
functions depend
on
Calculate how long
these functions can
survive without
these resources
Identify
vulnerabilities and
threats to these
functions
Calculate the risk
for each different
business function
Document and
report the findings
to managment
Identify Priorities
• 1st step in BIA is to identify the business priorities
• It involves creating a comprehensive list of business process and
ranking them in order of importance
• This is a qualitative process; to begin quantitative assessment,
assign AV in monetary terms to each asset
• Develop the Maximum Tolerable Downtime (MTD)
• Maximum time the business can be inoperable without causing
irrecoverable damage to the business
• Develop the Recovery Time Objective (RTO)
• Amount of time by which the business function can be recovered
GOAL – RTO must be less than MTD
Risk Identification
• Next step in BIA process
• Risk comes in two forms : Man-made or Natural
• The risk identification portion of the process is purely Qualitative
• BCP team should not be concerned about likelihood or the amount of
damage in this phase
Likelihood Assessment
• Follows the Risk Identification Phase
• Identifies the likelihood that each risk will occur
• It is expressed in ARO
• ARO should be based on company history, professional experience of
team members and advice from experts
Impact Assessment
• Most critical portion of BCP
• Analyse the data gathered during risk identification and Likelihood
assessment to determine what impact each one of the identified risks
would have on the business
Continuity Planning
• Focuses on developing and implementing a continuity strategy to
minimize the impact realized risks might have on protected assets
• Strategy Development:
• Bridges the gap between BIA and continuity planning phases.
• Take the risks identified and determine which risks will be
addressed by BCP
BCP Policy
• BCP policy benefits
• Ensures BCP professionals have a written continuity document to
reference in the event of an emergency
• Provides historical record of the BCP that will be useful to future
personnel
• Forces the team members to commit their thoughts to paper
Karthikeyan Dhayalan

More Related Content

What's hot

CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
Karthikeyan Dhayalan
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
Chapter 1 Law & Ethics
Chapter 1   Law & EthicsChapter 1   Law & Ethics
Chapter 1 Law & Ethics
Karthikeyan Dhayalan
 
CISSP - Security Assessment
CISSP - Security AssessmentCISSP - Security Assessment
CISSP - Security Assessment
Karthikeyan Dhayalan
 
Cissp combined notes
Cissp combined notesCissp combined notes
Cissp combined notes
Joshua Fonseca
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranets
Karthikeyan Dhayalan
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
PECB
 
CISSP - Chapter 3 - CPU Architecture
CISSP - Chapter 3 - CPU ArchitectureCISSP - Chapter 3 - CPU Architecture
CISSP - Chapter 3 - CPU Architecture
Karthikeyan Dhayalan
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
Sam Bowne
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
Karthikeyan Dhayalan
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
Eryk Budi Pratama
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk Management
Deepak Bansal, CPA CISSP
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
Shriya Rai
 
Introduction: CISSP Certification
Introduction: CISSP CertificationIntroduction: CISSP Certification
Introduction: CISSP Certification
Sam Bowne
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
John Gilligan
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
Sam Bowne
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
Erik Taavila
 
Ch07 Managing Risk
Ch07 Managing RiskCh07 Managing Risk
Ch07 Managing Riskphanleson
 
NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)
James W. De Rienzo
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
Sam Bowne
 

What's hot (20)

CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Chapter 1 Law & Ethics
Chapter 1   Law & EthicsChapter 1   Law & Ethics
Chapter 1 Law & Ethics
 
CISSP - Security Assessment
CISSP - Security AssessmentCISSP - Security Assessment
CISSP - Security Assessment
 
Cissp combined notes
Cissp combined notesCissp combined notes
Cissp combined notes
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranets
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
CISSP - Chapter 3 - CPU Architecture
CISSP - Chapter 3 - CPU ArchitectureCISSP - Chapter 3 - CPU Architecture
CISSP - Chapter 3 - CPU Architecture
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk Management
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Introduction: CISSP Certification
Introduction: CISSP CertificationIntroduction: CISSP Certification
Introduction: CISSP Certification
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Ch07 Managing Risk
Ch07 Managing RiskCh07 Managing Risk
Ch07 Managing Risk
 
NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
 

Viewers also liked

Business Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBusiness Continuity Planning Presentation Overview
Business Continuity Planning Presentation Overview
Bob Winkler
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
Adv Prashant Mali
 
[Japan Tech summit 2017] CLD 013
[Japan Tech summit 2017]  CLD 013[Japan Tech summit 2017]  CLD 013
[Japan Tech summit 2017] CLD 013
Microsoft Tech Summit 2017
 
Chapter 1 Personal security
Chapter 1  Personal securityChapter 1  Personal security
Chapter 1 Personal security
Karthikeyan Dhayalan
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
Karthikeyan Dhayalan
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
Karthikeyan Dhayalan
 
CISSP - Chapter 3 - System security architecture
CISSP - Chapter 3  - System security architectureCISSP - Chapter 3  - System security architecture
CISSP - Chapter 3 - System security architecture
Karthikeyan Dhayalan
 

Viewers also liked (7)

Business Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBusiness Continuity Planning Presentation Overview
Business Continuity Planning Presentation Overview
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
[Japan Tech summit 2017] CLD 013
[Japan Tech summit 2017]  CLD 013[Japan Tech summit 2017]  CLD 013
[Japan Tech summit 2017] CLD 013
 
Chapter 1 Personal security
Chapter 1  Personal securityChapter 1  Personal security
Chapter 1 Personal security
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 
CISSP - Chapter 3 - System security architecture
CISSP - Chapter 3  - System security architectureCISSP - Chapter 3  - System security architecture
CISSP - Chapter 3 - System security architecture
 

Similar to CISSP Chapter 1 BCP

How to integrate BCMS with Organization's culture?
How to integrate BCMS with Organization's culture?How to integrate BCMS with Organization's culture?
How to integrate BCMS with Organization's culture?
Abdul Naseer
 
3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department 3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department
Sandeep S Jaryal
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptx
dotco
 
man power utilization in hrp
man power utilization in hrpman power utilization in hrp
man power utilization in hrp
Himabindu Mangiri
 
BiznetGio Presentation Business Continuity
BiznetGio Presentation Business ContinuityBiznetGio Presentation Business Continuity
BiznetGio Presentation Business Continuity
Yusuf Hadiwinata Sutandar
 
Presentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCMPresentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCM
Shantanu Rai
 
crisc_wk_6.pptx
crisc_wk_6.pptxcrisc_wk_6.pptx
crisc_wk_6.pptx
dotco
 
The project manager and business analyst partnership - ensuring project success
The project manager and business analyst partnership - ensuring project successThe project manager and business analyst partnership - ensuring project success
The project manager and business analyst partnership - ensuring project success
Mark Troncone MBA, PMP, CBAP, ITILv3, CSM
 
IT Business Continuity Planning 2004
IT Business Continuity Planning 2004IT Business Continuity Planning 2004
IT Business Continuity Planning 2004
Donald E. Hester
 
HRM Auditing – Principles, Practice and Process
HRM Auditing – Principles, Practice and Process HRM Auditing – Principles, Practice and Process
HRM Auditing – Principles, Practice and Process
Charles Cotter, PhD
 
Getting Started with Business Continuity
Getting Started with Business ContinuityGetting Started with Business Continuity
Getting Started with Business Continuity
Stephen Cobb
 
Risk crisis nad management
Risk crisis nad managementRisk crisis nad management
Risk crisis nad management
PasangdolmoTamang
 
Internal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality AuditsInternal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality Audits
Nimonik
 
auditing Fram . from the start to Reporting .pdf
auditing Fram . from the start to Reporting .pdfauditing Fram . from the start to Reporting .pdf
auditing Fram . from the start to Reporting .pdf
nguyenanvuong2007
 
Intro to ISO
Intro to ISOIntro to ISO
Intro to ISO
Adrian Hall
 
BCM Institute MTE Jeremy Wong - Business Continuty Management Benchmarking i...
BCM Institute MTE  Jeremy Wong - Business Continuty Management Benchmarking i...BCM Institute MTE  Jeremy Wong - Business Continuty Management Benchmarking i...
BCM Institute MTE Jeremy Wong - Business Continuty Management Benchmarking i...
BCM Institute
 
[Project] FRAMEWORK FOR SUPPORTING “BUSINESS PROCESS REENGINEERING “-BASED BU...
[Project] FRAMEWORK FOR SUPPORTING “BUSINESS PROCESS REENGINEERING “-BASED BU...[Project] FRAMEWORK FOR SUPPORTING “BUSINESS PROCESS REENGINEERING “-BASED BU...
[Project] FRAMEWORK FOR SUPPORTING “BUSINESS PROCESS REENGINEERING “-BASED BU...
Biswadeep Ghosh Hazra
 
Communicating with stakeholders on cybersecurity risk-a road map for success
Communicating with stakeholders on cybersecurity risk-a road map for successCommunicating with stakeholders on cybersecurity risk-a road map for success
Communicating with stakeholders on cybersecurity risk-a road map for success
Claus Thaudahl Hansen
 
ThinkGRC Introduction to Business Continuity for Middle Management
ThinkGRC Introduction to Business Continuity for Middle ManagementThinkGRC Introduction to Business Continuity for Middle Management
ThinkGRC Introduction to Business Continuity for Middle Management
ThinkGRC
 
business_continuity_management_presentation.ppt
business_continuity_management_presentation.pptbusiness_continuity_management_presentation.ppt
business_continuity_management_presentation.ppt
LucintaLuna4
 

Similar to CISSP Chapter 1 BCP (20)

How to integrate BCMS with Organization's culture?
How to integrate BCMS with Organization's culture?How to integrate BCMS with Organization's culture?
How to integrate BCMS with Organization's culture?
 
3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department 3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptx
 
man power utilization in hrp
man power utilization in hrpman power utilization in hrp
man power utilization in hrp
 
BiznetGio Presentation Business Continuity
BiznetGio Presentation Business ContinuityBiznetGio Presentation Business Continuity
BiznetGio Presentation Business Continuity
 
Presentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCMPresentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCM
 
crisc_wk_6.pptx
crisc_wk_6.pptxcrisc_wk_6.pptx
crisc_wk_6.pptx
 
The project manager and business analyst partnership - ensuring project success
The project manager and business analyst partnership - ensuring project successThe project manager and business analyst partnership - ensuring project success
The project manager and business analyst partnership - ensuring project success
 
IT Business Continuity Planning 2004
IT Business Continuity Planning 2004IT Business Continuity Planning 2004
IT Business Continuity Planning 2004
 
HRM Auditing – Principles, Practice and Process
HRM Auditing – Principles, Practice and Process HRM Auditing – Principles, Practice and Process
HRM Auditing – Principles, Practice and Process
 
Getting Started with Business Continuity
Getting Started with Business ContinuityGetting Started with Business Continuity
Getting Started with Business Continuity
 
Risk crisis nad management
Risk crisis nad managementRisk crisis nad management
Risk crisis nad management
 
Internal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality AuditsInternal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality Audits
 
auditing Fram . from the start to Reporting .pdf
auditing Fram . from the start to Reporting .pdfauditing Fram . from the start to Reporting .pdf
auditing Fram . from the start to Reporting .pdf
 
Intro to ISO
Intro to ISOIntro to ISO
Intro to ISO
 
BCM Institute MTE Jeremy Wong - Business Continuty Management Benchmarking i...
BCM Institute MTE  Jeremy Wong - Business Continuty Management Benchmarking i...BCM Institute MTE  Jeremy Wong - Business Continuty Management Benchmarking i...
BCM Institute MTE Jeremy Wong - Business Continuty Management Benchmarking i...
 
[Project] FRAMEWORK FOR SUPPORTING “BUSINESS PROCESS REENGINEERING “-BASED BU...
[Project] FRAMEWORK FOR SUPPORTING “BUSINESS PROCESS REENGINEERING “-BASED BU...[Project] FRAMEWORK FOR SUPPORTING “BUSINESS PROCESS REENGINEERING “-BASED BU...
[Project] FRAMEWORK FOR SUPPORTING “BUSINESS PROCESS REENGINEERING “-BASED BU...
 
Communicating with stakeholders on cybersecurity risk-a road map for success
Communicating with stakeholders on cybersecurity risk-a road map for successCommunicating with stakeholders on cybersecurity risk-a road map for success
Communicating with stakeholders on cybersecurity risk-a road map for success
 
ThinkGRC Introduction to Business Continuity for Middle Management
ThinkGRC Introduction to Business Continuity for Middle ManagementThinkGRC Introduction to Business Continuity for Middle Management
ThinkGRC Introduction to Business Continuity for Middle Management
 
business_continuity_management_presentation.ppt
business_continuity_management_presentation.pptbusiness_continuity_management_presentation.ppt
business_continuity_management_presentation.ppt
 

Recently uploaded

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 

Recently uploaded (20)

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 

CISSP Chapter 1 BCP

  • 1. Business Continuity Predict – Preempt – Protect Karthikeyan Dhayalan
  • 2. Business Continuity • Used to maintain the continuous operations of business critical functions in the event of a disaster • Disaster Recovery • Goal is to minimize the immediate effects of a disaster. • Usually IT focused • Continuity Planning • Provides methods and procedures for long term outages and disasters • It takes a broader approach to disaster recovery • 4 Main process steps for BCP • Project scope and planning • Business Impact assessment (BIA) • Continuity planning • Approval and Implementation
  • 3. Project Scope and Planning • First step in effective BCP • Involves 4 key work streams • Structured analysis of business organization from crisis point of view • Creation of BCP team with approval from senior management • Resource availability assessment • Legal and Regulatory requirement analysis
  • 4. Business Organization Analysis • First step is to perform an analysis of business organization to identify all critical departments and key stakeholders • Operational departments that are responsible for core services • Critical support services, responsible for upkeep of systems that support operational departments • Senior executives and other key Individuals essential for ongoing business operations • This step provides necessary ground work to identify potential members of BCP team • It provides foundation for the business continuity process
  • 5. BCP Team Selection • The team should include at the minimum the following representatives • Representatives from each of the organizational departments • Representatives from key support departments • IT representatives with technical expertise • Security representatives with knowledge of BCP • Legal representatives • Senior Management representatives
  • 6. BCP Resource Requirements • Assess the resource required for 3 distinct functions • BCP Development: • Team will require resources for BCP process development. • BCP Testing, training and maintenance: • Will require hardware and software commitments, major commitment will be the people • BCP Implementation: • Implementation will require a large amount of resources both from the HW/SW as well as human capital front Human capital is the most significant resources consumed during a BCP process
  • 7. Business Impact Assessment • Also considered a functional analysis • Identifies the resources that are critical to the organization, the threats posed to the resources • Assess the likelihood that each threat will actually occur and the impact of those threats • The result helps in prioritizing the commitment of Business continuity resources to various risk exposures
  • 8. BIA - Steps Select individuals for data gathering Create data gathering technique Identify company critical business functions Identify the resources these functions depend on Calculate how long these functions can survive without these resources Identify vulnerabilities and threats to these functions Calculate the risk for each different business function Document and report the findings to managment
  • 9. Identify Priorities • 1st step in BIA is to identify the business priorities • It involves creating a comprehensive list of business process and ranking them in order of importance • This is a qualitative process; to begin quantitative assessment, assign AV in monetary terms to each asset • Develop the Maximum Tolerable Downtime (MTD) • Maximum time the business can be inoperable without causing irrecoverable damage to the business • Develop the Recovery Time Objective (RTO) • Amount of time by which the business function can be recovered GOAL – RTO must be less than MTD
  • 10. Risk Identification • Next step in BIA process • Risk comes in two forms : Man-made or Natural • The risk identification portion of the process is purely Qualitative • BCP team should not be concerned about likelihood or the amount of damage in this phase
  • 11. Likelihood Assessment • Follows the Risk Identification Phase • Identifies the likelihood that each risk will occur • It is expressed in ARO • ARO should be based on company history, professional experience of team members and advice from experts
  • 12. Impact Assessment • Most critical portion of BCP • Analyse the data gathered during risk identification and Likelihood assessment to determine what impact each one of the identified risks would have on the business
  • 13. Continuity Planning • Focuses on developing and implementing a continuity strategy to minimize the impact realized risks might have on protected assets • Strategy Development: • Bridges the gap between BIA and continuity planning phases. • Take the risks identified and determine which risks will be addressed by BCP
  • 14. BCP Policy • BCP policy benefits • Ensures BCP professionals have a written continuity document to reference in the event of an emergency • Provides historical record of the BCP that will be useful to future personnel • Forces the team members to commit their thoughts to paper