Disaster recovery (DR) and business continuity planning (BCP) are important for organizations to plan for disasters and disruptions. A DR plan provides procedures to recover IT capabilities at an alternate site after a disaster. A BCP addresses risks to business processes and prepares an organization to continue essential operations. Both plans aim to minimize downtime and losses. Key components of DR plans include establishing recovery teams, developing procedures, training, and arranging alternate IT resources. BCP components involve identifying critical resources, conducting risk and impact analyses, and developing prevention, mitigation and recovery strategies. Maintaining and testing plans is important to ensure preparedness for disasters.
Business continuity and disaster recovery are not the same but complement each other. Planning on BCP and DRP is necessary for all business. This slide contains information on how to achieve and maintain them.
Let’s understand the concepts of business continuity and Disaster Recovery in brief. To know more, visit: www.eccouncil.org/business-continuity-and-disaster-recovery
Business continuity and disaster recovery are not the same but complement each other. Planning on BCP and DRP is necessary for all business. This slide contains information on how to achieve and maintain them.
Let’s understand the concepts of business continuity and Disaster Recovery in brief. To know more, visit: www.eccouncil.org/business-continuity-and-disaster-recovery
IT-Centric Disaster Recovery & Business ContinuitySteve Susina
This presentation was delivered to the Business Resumption Planners Association of Chicago meeting on 3/11/2010.
IT leaders who assume responsibility for their firm's DR/BC efforts need to understand how to build a cross-organization strategy that transcends IT organizational boundaries. In the presentation, we discuss the need for IT leaders to reach across the aisles to work with Line-of-Business leaders, and present a six-step framework on how to accomplish a cross-business IT-centric strategy.
This file was presented by me during the study circle meeting at the Mangalore Branch of Southern India Regional Council of the Institute of Chartered Accountants of India.
Successful leaders and managers are always keen to expect the unexpected and plan for it. the More you plan is the less you react, and the less you react, the less you make mistakes.
Disruptions to your business can result in data risk, revenue loss, and Failure to deliver services
That’s why organizations need strong business continuity planning.
This handout was provided at the OCNC Business Emergency Preparedness Series workshop hosted by the Orange County Emergency Services and The Chamber on April 11, 2019.
IT-Centric Disaster Recovery & Business ContinuitySteve Susina
This presentation was delivered to the Business Resumption Planners Association of Chicago meeting on 3/11/2010.
IT leaders who assume responsibility for their firm's DR/BC efforts need to understand how to build a cross-organization strategy that transcends IT organizational boundaries. In the presentation, we discuss the need for IT leaders to reach across the aisles to work with Line-of-Business leaders, and present a six-step framework on how to accomplish a cross-business IT-centric strategy.
This file was presented by me during the study circle meeting at the Mangalore Branch of Southern India Regional Council of the Institute of Chartered Accountants of India.
Successful leaders and managers are always keen to expect the unexpected and plan for it. the More you plan is the less you react, and the less you react, the less you make mistakes.
Disruptions to your business can result in data risk, revenue loss, and Failure to deliver services
That’s why organizations need strong business continuity planning.
This handout was provided at the OCNC Business Emergency Preparedness Series workshop hosted by the Orange County Emergency Services and The Chamber on April 11, 2019.
The A to Z Guide to Business Continuity and Disaster RecoverySirius
Companies often face challenges during business continuity and disaster recovery (BC/DR) planning. One of the key challenges is to reach consensus to ensure everyone at the company is on the same page. Therefore, it is important for the business and IT to have a comprehensive discussion about its current capabilities, needs, procedures and expectations for BC/DR.
To help with these conversations, we have developed an alphabetical guide and identified 26 important terms. This list is not meant to be exhaustive, but rather a good starting point for this discussion.
A short presentation of the essentials of business continuity planning. Often put on the back burner because it's seems too complex. Whereas the principles are quite straightforward.
Best Practices in Disaster Recovery Planning and TestingAxcient
Axcient and industry expert Paul Kirvan have put together this presentation on avoiding common disaster recovery mistakes and leveraging industry best practices to create a technology disaster recovery plan that works best for you.
This presentation gives you the many elements necessary of a well-executed disaster recovery plan, including:
- Guidelines for creating your own Disaster Recovery plan
- A checklist of key items to consider based on your business objectives
- The common mistakes and pitfalls to avoid
- Technology considerations for Disaster Recovery
- Tips for planning and executing a successful Disaster Recovery test
Whether you're in the process of creating a disaster recovery plan or you already have one in place, this presentation will guide you through the steps you need to follow to help ensure your plan is complete.
ISO 22301: The New Standard for Business Continuity Best PracticeMissionMode
ISO 22301 is the new international standard for Business Continuity Management best practice. It provides organizations with a framework to manage risk and ensure that they can continue operations in any type of event. In this webinar, ISO 22301 expert John McGill will help you understand the ISO standard, why it's important, and how to plan for certification.
Lean IT, Lean Business: A new perspective to IT cost optimization Imad Almurib
Lean IT, Lean Business: A new perspective to IT cost optimization. In this document, I'm trying to explore the opportunities of applying best practices of IT Service Management and Lean Principles in the Cost Optimization domain.
When planning for Disaster Recovery it is essential to have a clearly defined set of objectives that are based on your businesses needs .InTechnology's Product Director for Data & Cloud Services, Stefan Haase, provides tips for any business to consider when putting together their disaster recovery plan. http://www.intechnology.co.uk/resource-centre/webcast-disaster-recovery-planning.aspx
Nuestro informe Global Risk Landscape 2016 revela que el 87% de los líderes empresariales consideran que
el mundo se ha convertido en un lugar con mayor riesgo. Para la realización de este estudio, que se inició a
comienzos de 2016, BDO ha consultado a 500 altos directivos de las principales empresas de 44 países de
Europa, Oriente Medio, África, Asia y América acerca de lo que consideran que son los mayores riesgos a los que
enfrentan sus empresas en la actualidad y en el futuro.
Para más de la mitad (56 %) de los líderes empresariales encuestados, la mayor amenaza es el aumento
de la competencia, seguida por la desaceleración económica (43%) y la interrupción del negocio (42 %).
La mitigación del riesgo se ha convertido en una cuestión primordial para la mayor parte de las empresas
consultadas, mientras que la creación de valor es visto como el mayor desafío global del futuro.
How to Start a Cold Storage Business Project, Excellent opportunity for inves...Ajjay Kumar Gupta
Cold storage industry is a very important and essential industry. The temperature is maintained low with the help of precision instruments. Cold storage is used to preserve fruits and vegetables. Once they are kept in the cold storage, they do not get spoiled even after many months. This item, when needed, can be taken from the cold storage and can be made available to consumers very easily. Cold storage is a vital link between the production and consumption of perishable products. A new entrepreneur can well venture into this field by installing a project of cold storage to save the fruits and vegetables from wastage.
See more
http://goo.gl/FFzEsI
http://goo.gl/XRhbCp
http://goo.gl/Z7Qo05
http://www.entrepreneurindia.co/
Tags
Are you planning to set up Potato Cold Storage, Business consultancy, Business consultant, Business Planning Cold Storage & Warehouse, Business Planning for a Cold Storage Facility - Cold room, cold storage (controlled atmosphere or ca) for potato, cold storage business, cold storage business model, cold storage business opportunity, cold storage business plan ppt, Cold Storage Consultant, cold storage cost of construction, cold storage for plantation and horticulture produce, cold storage industry trends, cold storage investment cost, cold storage profit and loss, cold storage project cost in India, Cold Storage Scheme, Cold Storage Unit for Fresh Onions - Vibrant Gujarat, Cold Storage unit Projects, cold storage warehouse construction cost, Cold Storage: Hot Investment, Cold Storages and Controlled Atmosphere Storages, Cold Store Detailed Project Report (Dpr), Complete Cold storage plant machinery with project profile, Construction of Cold Storage, Detailed Project Report on Cold Storage plant, Download free project profiles on Cold Storage plant, Excellent opportunity in investing in 'cold-storages', Feasibility report on Cold Storage Unit, Feasibility Study-Business Plan - Cold Store Storage Cold storage, Free Project Profiles on Cold Storage plant, How to Start a Cold Storage Business, How to Start Cold Storage Industry in India, Industrial Project Report, is cold storage a profitable business in India, mini cold storage project cost, mini cold storage project report, Most Profitable Cold Storage Business Ideas, multipurpose cold storage project report, Niir, NPCS, Onion Cold Storage, Perspectives on cold storage investment opportunities, potato cold storage project report, Pre-Feasibility Study, Compartmentalized Cold Storage, Pre-Investment Feasibility Study on Cold Storage Unit, Preparation of Project Profiles, Process technology books, profit in cold storage business in India, Project consultancy, Project consultant, Project identification and selection, Project profiles on Cold Storage Unit, Project Proposal for Establishment of cold storage, Project Report on Cold Storage for Potato, Project Report on Cold Storage plant, project report on Cold Storage Unit
Devolución de cotizaciones a la Seguridad Social para AutónomosBDO Spain
El equipo de laboral de BDO ha diseñado una infografía para explicar qué requisitos deben cumplir los autónomos y trabajadores por cuenta ajena que quieran solicitar la devolución de ingresos a la Seguridad Social.
A Proactive Approach to Business ContinuityDiana DePaola
Get to know why a well-planned and strategized business continuity management plan can help organizations from risks and threats such as natural disasters, currency disruptions, cyber-attacks and other potentially disastrous circumstances.
A business continuity plan (8CP) is a document that includes the key info a company requires to continue running in the case of a crisis.
A business continuity plan incorporates preparations for business operations, capital, people personnel, and strategic partners - any component
of the firm which could be affected. It describes how well a company will keep running through an unforeseen interruption in operation.
What is the purpose of a business continuity plan?
The business continuity plan outlines the fundamental operations of the company, points out the systems and procedures that should be
maintained, and provides instructions regarding how to do so. It ought to account for any potential turbulence in the organization.
A business continuity plan addresses vulnerabilities such as computer hacking, epidemics, natural calamities, and human negligence. A business
continuity plan is essential for an organization to possess to maintain its viability and credibility given the variety of potential hazards. A sound
business continuity plan reduces the likelihood of expensive IT or brownouts.
The strategy is frequently made by IT professionals. The executive staff, on the other hand, takes a role in the process and contributes to the control
and expertise of the business. They likewise see to it that the business continuity plan is frequently updated.
Topic Describe each of the elements of a Business Continuity Plan .docxjuliennehar
Topic Describe each of the elements of a Business Continuity Plan (BCP).
Read and respond to below two student’s discussions. (150 words for each response) reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions
#1. Posted by Sai Srinivas
Most companies till now doesn't have any backout or disaster plan in their list. It's tough to grow higher and even a cyberattack can damage their information, money, stock price, customers and reputation. All this need to be demolished by having few key elements as part of their business plan called Business Continuity Planning (BCP). We will discuss more about the elements in BCP.
Firstly, create a planning team - depends on the size of the team that includes all the required employees. Next one is perform a analysis on the business products - its key that the we always need to analyze if we need to alter any improvements and also, to calculate the impact for loss, interruption or discretion. Migitate risks and effective testing - testing always helps to find any security flaws and we can migitate the cyber risks.
Crisis communications and employee safety - these are very important because if a company hit by any cyber threat, communication should be fast and everyone must be updated and must be on the same page. At this moment, employee safety also comes into the picture as companies need to train them properly during these disasters operations.
Establishment of the business continuity strategies and access to the business resources - Companies must create certain strategies based on the business impact analysis results, their goals, objectives, maintenance of supplier relationships and with policies and standards. Finally, IT operations at off-site locations, companies which are beware of these ransomware attacks, having storing their data as a backup in the offsite centers. This makes a better plan rather than thinking about the lost data and how to recover it - which cannot be done during the current times.
#2. Posted by Naresh
Business continuity planning (BCP) is the process involved in creating a system of prevention and recovery from potential threats to a business organization. The plan ensures that personnel and assets are protected and are able to function quickly in the event of a disaster due to natural causes or human-made mistakes. The important elements of Business continuity process involves defining any and all risks that can affect the company's operations, making it an important part of the organization's risk management strategy. Risks may include natural disasters like fire, flood, or weather-related events, Power outages and cyber-attacks. Once the risks identified, BCP strategic steps must involve how those risks will affect operations, implementing safeguards and procedures to mitigate the risks and reviewing the process to make sure that it is up to date.
There are seven key elements for Business c ...
Key Features of Effective Business Continuity PlanContinuSys
No leader wants to think about all the ways in which their businesses might be disrupted but, as the saying goes, failing to plan is akin to planning to fail. Disasters can strike at any moment and without warning, and long-term disruptions can drag on for much longer than anyone may have anticipated. From natural catastrophes to lasting disruption due to far-reaching changes in the market, the best approach to mitigation is a rock-solid business continuity plan.
Read more: https://continusys.com/7-non-negotiable-features-of-any-effective-business-continuity-plan/
Facilitated Risk Analysis Process - Tareq HanayshaHanaysha
One of the most popular methods to perform a risk analysis is called Facilitated Risk Analysis Process (FRAP),FRAP will allow any organization to implement risk management techniques in a highly cost-effective way,develop an efficient and disciplined process to ensure that information-related risks to business operations are considered and documented.
Vulnerability scanning report by Tareq HanayshaHanaysha
In this executive summary, we will go visually through the vulnerability scan we`ve done using Nessus and Nsauditor by providing the reader with screen shoots to clarify our scan and to make it easier for the readers to understand our vulnerability scan procedures, then we will introduce our work and give a summary of our findings, vulnerabilities, risks and threats, and try to find solutions or recommendations for these security problems in our conclusion.
In this report, the author will take you through detailed steps of on-site backup using Acronis
true image server edition on MS windows vista and Ms windows 03 server, this lab experiment
takes us through three different backup procedures, and then the restoration of these backed up
data using the same software.
This software is considered as layer 7 in the classification of disaster recover /business
continuity planning layers, but it is still provide us with all the on-site backup procedures ,security
options for our archives ,and a bootable zone in case of operating systems failure .
Going through this lab will help the reader to better understand or give a general image of how
the backup /recovery process take place using one of the available software for backup & recovery.
Detailed information of all the steps taken to accomplish the Lab is explained in this report with the
screen shots
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Business continuity & Disaster recovery planing
1. By Tareq Hanaysha , MISSM Candidate
ISSM 511 -Introduction to Information Systems Security
Concordia University College Of Alberta
2/18/2015DR & BCP 1
2. 2/18/2015DR & BCP 2
1. Introduction & Definition of DR and BCP
2.Diefferences and purposes
3.DR & BCP Objectives
4. Major Component of DR & BCP
5. Best Practices
6.Refrences
6.Conclusion
3. 2/18/2015DR & BCP 3
Planning for the worst while hoping that it won’t happen is
something that all security professionals do, disaster recovery
for business continuity has always been a key part for the job .
disaster: is any event that has a
significant impact on an
enterprise's ability to conduct
normal business like
earthquakes, extreme weather,
other natural disasters,
pandemics and terrorism.
Disaster Recovery Plan: Includes
the information and procedures
needed to resume an organization's
operation after some sort of disaster.
Sometimes the plan is split into
several plans, one to address
recoverable disasters (e.g., loss of a
server) and a more comprehensive
business continuity plan for use in
total loss situations.
SIMILAR TERMS: Contingency Plan,
Business Resumption Plan, Continuity
Plan
4. 2/18/2015DR & BCP 4
Business Continuity :is the
enterprise-wide proactive
business process by which we
manage the risks we operate
within.
It addresses all aspects of the
business: People, Processes,
Resources and Technology
(PPRT)
The goal is: preventing or
mitigating the risks we can and
preparing for recovery from
those we cannot, or choose not
to prevent.
Business continuity plans: are
designed to help organisations
protect themselves from the
losses to infrastructure and
resources caused by natural
disasters, pandemics and
terrorism.
Preparation is the key: You fight
like you train!
SIMILAR TERMS: Contingency
Planning, Business Resumption
Planning, Corporate
Contingency Planning, Business
Interruption Planning, Disaster
Preparedness.
5. 2/18/2015DR & BCP 5
Plan Purpose Scope
Business Continuity Plan
(BCP)
Provide procedures for
sustaining essential
business operations
while recovering from a
significant disruption
Addresses business
processes; IT addressed
based only on its support
for business process
Disaster Recovery Plan
(DRP)
Provide detailed
procedures to facilitate
recovery of capabilities
at an alternate site
Often IT-focused; limited
to major disruptions with
long-term effects
6. 2/18/2015DR & BCP 6
1. Limit severity of the event and the magnitude of loss
2. Minimize extent of the interruption
3. Identify critical resources
4. Identify critical functions
5. Define a process to protect critical resources
6. Define alternatives for continuing critical functions
7. Minimize decision making during a crisis
8. Train personnel
9. Continual review and maintenance
10. Integration of Business Continuity with Enterprise Strategic Planning
7. 2/18/2015DR & BCP 7
Disaster recovery
planning
components :
1. Establishment of the
Recovery Team(s)
2. Development of
Recovery Procedures
3. Training of the
Recovery Team(s)
4. Change Management
to keep plan current
5. Provision of
Necessary Resources
(Beans, Bombs and
Bubbas…)
6. Arrangement for
alternate technology
platform, and retrieval
of backup data
8. 2/18/2015DR & BCP 8
Business
Continuity Plan
Component
1. Establishment of
Cross-Functional
Team(s)
2. Inventory of
People, Processes,
Resources and
Technology (PPRT)
3. Risk/Threat
Identification and
Categorization
4. Impact Analysis
and Loss Estimation
5. Prevention,
Mitigation and
Recovery
Strategizing
6. Gap Analysis
and Resolution
Planning
9. 2/18/2015DR & BCP 9
Plan Scope and Support
Senior Management Support (tone at the top)
Defined objectives, policies, scope and success factors and requirements
Standard terms and assumptions
Project plan and budget
Risk Analysis
Risks – Quantitative and Qualitative
Threats – Natural and Man Made
Vulnerabilities – Possibilities of threats occurring have been taken into account
Figure 2-1 Contingency Planning as an Element of Risk Management Implementation
10. 2/18/2015DR & BCP 10
Business Impact Analysis
Time criticality
RTO & RPO
Critical Business Units/Functions
Results based on established quantitative and qualitative metrics
Recovery Strategies
Reasonable strategies identified
Advantages and Disadvantages
Cost vs. Benefit
Business unit buy-in
The BCP Plan
Scope and Objective
Business Recovery Organization
Escalation, Notification, Activation
Resumption, Recovery, Restoration
Maintenance, Testing
11. 2/18/2015DR & BCP 11
Plan Maintenance
Defined timetables
Version control
Changes
Plan Testing
Periodic and methodical
Address major components
Goals objectives for each test
Monitor, analyze, report
Training and Awareness
Plan existence
Responsibilities
Various training methods
12. 2/18/2015DR & BCP 12
Thinking systematically about risk, mitigating risks, and proactively
planning an optimized BCM program is something every company, large
or small, can and should do.
13. 2/18/2015DR & BCP 13
NIST: National Institute of Standards and Technology.
Many Sample DRPs can be seen at www.drj.com.
Planning, a chapter of the book Disaster Recovery Planning: Preparing For The
Unthinkable by Jon Toigo.
www.disasterrecoveryworld.com is a commercial site that also provides excellent
resources, and explains the COBRA method of analysis.
www.crisis-management-and-disaster-recovery.com
Business continuity planning / management (BCM) from wikipedia.org