SlideShare a Scribd company logo
It’s Never So Bad
That It Can’t Get Worse
A REVIEW OF DISASTER RECOVERY AND
BUSINESS CONTINUITY PLANNING IN PRACTICE
HARRY REGAN
VP, SECURITY CONSULTING SERVICES
VALERIE THOMAS
SENIOR SECURITY TECHNOLOGIST
SECURICON, LLC
HTTP://WWW.SECURICON.COM
Agenda
• Who We Are
• Things DRITellsYou
• The Magic of MixingTechnology and Humans
• 3Tales from the Field
o Clouds of 9/11
o What if they threw a disaster and nobody came?
o Financial Services andY2K
• ScarTissue and Recommendations
• Conclusions and Q&A
Who are we?
• Securicon is a 13+ year old security consultancy in
security programs and engineering, both cyber and
physical.
• Broad base of experience in the integration of human
and social issues into the implementation and impact
on security
• Enterprise-level experience in developing COOP and
BCP plans.
The Magic of Mixing Technology and
Humans
• Technology makes the world work
• Humans make the world weird
• Business Continuity happens at the intersection of
people and technology– with one or more
emergencies thrown into the mix.
• Plans may be concise and logical, but human
behavior is not as predictable as we’d like.
• “When the first shot is fired, battle plans go out the
window”
-- George Patton
Reality…
• We’re going to examine three actual case studies
from three different industries.
• All three companies involved had a good Business
Continuity Plan
• All three had a major failure then the disaster really
arrived
Things DRI Tells You…
Key Objectives…
• Safety is #1 priority in a emergency/disaster
• Keep the business operating and revenue flowing
• Maintain basic communications (e-mail, phone)
• Suck it up! Don’t give customers a reason to worry
(Web site up, services available and shipping
with minimal disruptions)
• Maintain billing and accounting
More Things DRI TellsYou…
• Your DR/BCP plan should have strategies for…
• Emergency Response and Operations
Contingencies
• Actionable and detailed Business Continuity
Plans at a situational and granular Level
• Training and Awareness – for everyone, but
especially for key staff involved in the plan
• Maintaining andTesting DR and Business
Continuity Plans and Operability – and really do
it!
• Public Relations and Crisis Communications
• Coordination with Public Authorities
3 tales from the field
• Clouds of September 11
o Hurricane Gabrielle hits Florida
• What if the threw a disaster and nobody came?
o Great plan, now where’s the staff?
• Financial Services andY2K
o Y2K Plan used for 9/11 – successfully!
Clouds of September 11
• September 9, 2001 –Tropical Storm Gabrielle
forms off the west coast of Florida in the Gulf of
Mexico.
• September 11, 2001 – Hurricane Gabrielle
threatens western Florida coast.
• A manufacturing company in central Florida,
already experiencing flooding in their facility and
data center from heavy rain, decides to declare a
disaster and exercise their DR contract with IBM
• Scheduled DR site – Sterling Forest, NY
• The request “could not be accommodated”
Clouds of September 11
• There really was no formal plan. They had backup tapes
on site. They had arranged for specific equipment at
the DR site
• The company assumed they could just “swap over” to
the DR site. Assumed they could just show up with the
tapes, but never tested
• Lessons learned
o With an untested plan, it was really iffy that they could
successfully exercise the DR plan
o With a 3rd party DR contract, you may be able to get your
money back if you “can’t be accommodated”!
o Yes, their data center flooded…
What if the threw a disaster
and nobody came?
• Picture rolling New England hills, nestling a quaint little
mill town. In this town is a manufacturing company
that makes specialty products for the medical industry
• “Shelter in Place” is a strategy some companies adopt–
that’s the approach this company chose – backups and
redundant equipment maintained on site.
• The data center featured a natural gas generator tied to
the city gas lines, so as long as they had fuel, they had
power
• The network featured divergent carriers with failover
• They engineered their systems to be all remotely
administered and operated so there was little need for
staff to be onsite – but functions had to be manually
attended. Robust, tested remote access processes.
What if the threw a disaster
and nobody came?
• In reviewing their DR/BCP documents, it struck me
that they had a a very exacting “Bob will do X,
Frank will doY” approach. Sooner or later, they
said, they’d cross train folks.
• In May of 2006, the area experienced severe
flooding. Telecommunications were out, roads
impassable, residents evacuated from the area.
• The systems were up! No one was available to do
anything with them, but they were up!
• Discovered many processes someone had to be on
site for (e.g. IT did not control the phone system or
the PACS)
Financial Services andY2K
• Large globally recognized financial services firm
with heavy transactional network traffic.
• Primary data center in southern New England,
about an hour out of NYC
• Backup data center 150 miles south.
• Standing hotel accommodations for operations
teams near both data centers
• Situational BCP built with input from each business
unit. Tested, tested, tested.
• Identification of positions that needed to be on-site
(the rest would work from home)
Financial Services andY2K
• Monthly live test of failover from primary to
backup. Well understood system and network for
financial services. Business systems were lower
priority.
• NYC staff in 1 Liberty Plaza,Times Square and on
Whitehall Street
• If staff had to be displaced, they would go to one of
several locations or be issued laptops to work from
home
• Y2K – Nothing Happened
• But then there was 9/11
Financial Services andY2K
• On 9/11 the first plane hit before market open– so
the decision was made not to open the market until
we knew what was really happening
• As events unfolded, activated disaster plan
o Liberty Plaza andWhitehall staff evacuated toTimes
Square (until SouthTower collapse)
o Network transferred to Backup Site without incident
• Returned to normal operation by 9/17
• Long-term displacement of workstaff
Financial Services andY2K
• On one level, the DR/BCP was successful.
o Almost seamless transition to backup (turned out
not to be necessary)
o Market systems staff was on-site, in place and
ready for normal operations when the disaster
occurred
o Corporate systems staff generally was in transit
or about to leave home, but in DC – another 9/11
target site
o Market systems were ready for scheduled market
open at 10AM, but decision was made to keep
the market closed.
o There were staff injuries, but no reported
fatalities
Financial Services andY2K
• Problems with the BCP
o No plan for loosing Manhattan
o Evacuation plan assumed navigable streets, availability of
public transportation
o Severe and lasting workforce displacement
o IT not ready for influx of teleworkers
• One element of dumb luck
o AT&T NYC Switch Center was destroyed in theWTC
collapse
o The company used MCI for telephone and network service
Scar Tissue and Recommendations
• Recurring drills are important. Annual drills are
simply not frequent enough. Test it, darn it!
• Still doing weekly/monthly backups with
incrementals? You should rethink your backup
strategy.
• Practice bare-metal restores. Even with great
planning and preparation, odds are good you’ll
have to do one or more and they take time.
• Transactional systems love to have journal
problems. Understand how to identify problems
early and quickly and how to resolve them.
• If you’re using a 3rd party backup site, expect
equipment problems. Plan for it.
Scar Tissue and Recommendations
• Understand what disasters are facing your disaster
recovery sites!
• Understand the logistics of getting the right people
to the right place in different kinds of disasters!
• See if you can arrange to have your restoration
media transmitted to the DR site.
(Throwing the backup media in the van with the DR away
team may make the disaster even worse)
• Maintain the equipment for the DR site! It won’t
help you if the DR hardware can’t run the current
mission critical applications!
Scar Tissue and Recommendations
• Cross train DR/BCP teams onALL roles. DRI
recommends backups roles and backups to
backups. But you won’t know for sure who reports
for duty until the disaster.
“When the first shot is fired,
battle plans go out the window.”
General George Patton
What this “Granular” stuff?
• It’s rare that a disaster/emergency will unfurl on
your terms. The key to survival is flexibility
o Be ready for a “half disaster”
o Also be ready for multiple, simultaneous disasters
o Finally, be ready for key staff unavailability
• Situational planning is important
o Have plans built for the most likely disaster scenarios
o To the extend possible, compartmentalize
o Also have a OCISD Strategy
OCISD = “Oh crud! It’s something different!”
Conclusions and Q&A
If you take nothing else away from this presentation,
remember:
#1 Test. Refine. Repeat.
#2 Be flexible. It probably won’t happen like you think it will
#3 When it does happen, you’ll find out which pieces you
didn’t test enough.
Harry.Regan@securicon.com

More Related Content

What's hot

Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
Nicholas Davis
 
Business-Critical Backup: Preparing for a Disaster
Business-Critical Backup: Preparing for a DisasterBusiness-Critical Backup: Preparing for a Disaster
Business-Critical Backup: Preparing for a Disaster
NetWize
 
Runtime Protection in the Real World
Runtime Protection in the Real WorldRuntime Protection in the Real World
Runtime Protection in the Real World
Brooks Garrett
 
Brighttalk getting back on track - final
Brighttalk   getting back on track - finalBrighttalk   getting back on track - final
Brighttalk getting back on track - final
Andrew White
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
EnergySec
 
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatData Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Resilient Systems
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
centralohioissa
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - final
Andrew White
 
NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development Presentation
EnergySec
 
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
Jane Alexander
 
"We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec..."We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec...
Jisc
 
Cloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar AssociationCloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar Association
Amy Larrimore
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
centralohioissa
 
Deral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail LaterDeral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail Later
centralohioissa
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec
 
ISM and its impact on Government Project Delivery
ISM and its impact on Government Project DeliveryISM and its impact on Government Project Delivery
ISM and its impact on Government Project Delivery
Kevin Landale
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
centralohioissa
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
centralohioissa
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
NetIQ
 
Co3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarCo3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions Webinar
Resilient Systems
 

What's hot (20)

Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
Business-Critical Backup: Preparing for a Disaster
Business-Critical Backup: Preparing for a DisasterBusiness-Critical Backup: Preparing for a Disaster
Business-Critical Backup: Preparing for a Disaster
 
Runtime Protection in the Real World
Runtime Protection in the Real WorldRuntime Protection in the Real World
Runtime Protection in the Real World
 
Brighttalk getting back on track - final
Brighttalk   getting back on track - finalBrighttalk   getting back on track - final
Brighttalk getting back on track - final
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatData Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - final
 
NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development Presentation
 
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
 
"We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec..."We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec...
 
Cloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar AssociationCloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar Association
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
 
Deral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail LaterDeral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail Later
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
ISM and its impact on Government Project Delivery
ISM and its impact on Government Project DeliveryISM and its impact on Government Project Delivery
ISM and its impact on Government Project Delivery
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
Co3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarCo3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions Webinar
 

Similar to Harry Regan - It's Never So Bad That It Can't Get Worse

Business continuity at_northrop_grumman
Business continuity at_northrop_grummanBusiness continuity at_northrop_grumman
Business continuity at_northrop_grumman
Anshuman Jaiswal
 
DR luncheon presentation
DR luncheon presentationDR luncheon presentation
DR luncheon presentation
seishi1
 
Disaster Recovery on a Dime!
Disaster Recovery on a Dime!Disaster Recovery on a Dime!
Disaster Recovery on a Dime!
Daniel Hanttula
 
It's Snow Joke; Protecting your Business from Acts of God, Mother Nature and ...
It's Snow Joke; Protecting your Business from Acts of God, Mother Nature and ...It's Snow Joke; Protecting your Business from Acts of God, Mother Nature and ...
It's Snow Joke; Protecting your Business from Acts of God, Mother Nature and ...
jdixonbrash
 
Bcp coop training taxpayer services 1-15-09
Bcp coop training taxpayer services 1-15-09Bcp coop training taxpayer services 1-15-09
Bcp coop training taxpayer services 1-15-09
Richard Turner
 
Business continuity
Business continuityBusiness continuity
Business continuity
Alka Mehar
 
Mastering disaster e book Telehouse
Mastering disaster e book TelehouseMastering disaster e book Telehouse
Mastering disaster e book Telehouse
Telehouse
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR Presentation
Andrew Miller
 
Best Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business ContinuityBest Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business Continuity
ReadWrite
 
Disaster recovery and WiFi hacking
Disaster recovery and WiFi hackingDisaster recovery and WiFi hacking
Disaster recovery and WiFi hacking
Abeera Naeem
 
Disaster Recovery Planning PowerPoint Presentation Slides
Disaster Recovery Planning PowerPoint Presentation SlidesDisaster Recovery Planning PowerPoint Presentation Slides
Disaster Recovery Planning PowerPoint Presentation Slides
SlideTeam
 
Mastering disaster a data center checklist
Mastering disaster a data center checklistMastering disaster a data center checklist
Mastering disaster a data center checklist
Chris Wick
 
Disaster Recovery Planning Powerpoint Presentation Slides
Disaster Recovery Planning Powerpoint Presentation SlidesDisaster Recovery Planning Powerpoint Presentation Slides
Disaster Recovery Planning Powerpoint Presentation Slides
SlideTeam
 
Siegel - keynote presentation, 18 may 2013
Siegel  - keynote presentation, 18 may 2013Siegel  - keynote presentation, 18 may 2013
Siegel - keynote presentation, 18 may 2013
NeilSiegelslideshare
 
Dr Steve Goldman's Top Ten Business Continuity Predictions / Trends for 2014
Dr Steve Goldman's Top Ten Business Continuity Predictions / Trends for 2014Dr Steve Goldman's Top Ten Business Continuity Predictions / Trends for 2014
Dr Steve Goldman's Top Ten Business Continuity Predictions / Trends for 2014
xMatters Inc
 
Aipm conference 2013 the reality of measuring 21st century leadership and t...
Aipm conference 2013   the reality of measuring 21st century leadership and t...Aipm conference 2013   the reality of measuring 21st century leadership and t...
Aipm conference 2013 the reality of measuring 21st century leadership and t...
Ian Sharpe
 
smAlbany 2013 gn bdr pp
smAlbany 2013 gn bdr ppsmAlbany 2013 gn bdr pp
smAlbany 2013 gn bdr pp
Liberteks
 
Chapter 13 heragu
Chapter 13 heraguChapter 13 heragu
Chapter 13 heragu
Ajit Kumar
 
Innovations™ Magazine July - September 2013
Innovations™ Magazine July - September 2013Innovations™ Magazine July - September 2013
Innovations™ Magazine July - September 2013
T.D. Williamson
 
Cloud Computing and Intelligent Systems: Two Fields at a Crossroads
Cloud Computing and Intelligent Systems: Two Fields at a CrossroadsCloud Computing and Intelligent Systems: Two Fields at a Crossroads
Cloud Computing and Intelligent Systems: Two Fields at a Crossroads
Jeffrey Wallace
 

Similar to Harry Regan - It's Never So Bad That It Can't Get Worse (20)

Business continuity at_northrop_grumman
Business continuity at_northrop_grummanBusiness continuity at_northrop_grumman
Business continuity at_northrop_grumman
 
DR luncheon presentation
DR luncheon presentationDR luncheon presentation
DR luncheon presentation
 
Disaster Recovery on a Dime!
Disaster Recovery on a Dime!Disaster Recovery on a Dime!
Disaster Recovery on a Dime!
 
It's Snow Joke; Protecting your Business from Acts of God, Mother Nature and ...
It's Snow Joke; Protecting your Business from Acts of God, Mother Nature and ...It's Snow Joke; Protecting your Business from Acts of God, Mother Nature and ...
It's Snow Joke; Protecting your Business from Acts of God, Mother Nature and ...
 
Bcp coop training taxpayer services 1-15-09
Bcp coop training taxpayer services 1-15-09Bcp coop training taxpayer services 1-15-09
Bcp coop training taxpayer services 1-15-09
 
Business continuity
Business continuityBusiness continuity
Business continuity
 
Mastering disaster e book Telehouse
Mastering disaster e book TelehouseMastering disaster e book Telehouse
Mastering disaster e book Telehouse
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR Presentation
 
Best Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business ContinuityBest Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business Continuity
 
Disaster recovery and WiFi hacking
Disaster recovery and WiFi hackingDisaster recovery and WiFi hacking
Disaster recovery and WiFi hacking
 
Disaster Recovery Planning PowerPoint Presentation Slides
Disaster Recovery Planning PowerPoint Presentation SlidesDisaster Recovery Planning PowerPoint Presentation Slides
Disaster Recovery Planning PowerPoint Presentation Slides
 
Mastering disaster a data center checklist
Mastering disaster a data center checklistMastering disaster a data center checklist
Mastering disaster a data center checklist
 
Disaster Recovery Planning Powerpoint Presentation Slides
Disaster Recovery Planning Powerpoint Presentation SlidesDisaster Recovery Planning Powerpoint Presentation Slides
Disaster Recovery Planning Powerpoint Presentation Slides
 
Siegel - keynote presentation, 18 may 2013
Siegel  - keynote presentation, 18 may 2013Siegel  - keynote presentation, 18 may 2013
Siegel - keynote presentation, 18 may 2013
 
Dr Steve Goldman's Top Ten Business Continuity Predictions / Trends for 2014
Dr Steve Goldman's Top Ten Business Continuity Predictions / Trends for 2014Dr Steve Goldman's Top Ten Business Continuity Predictions / Trends for 2014
Dr Steve Goldman's Top Ten Business Continuity Predictions / Trends for 2014
 
Aipm conference 2013 the reality of measuring 21st century leadership and t...
Aipm conference 2013   the reality of measuring 21st century leadership and t...Aipm conference 2013   the reality of measuring 21st century leadership and t...
Aipm conference 2013 the reality of measuring 21st century leadership and t...
 
smAlbany 2013 gn bdr pp
smAlbany 2013 gn bdr ppsmAlbany 2013 gn bdr pp
smAlbany 2013 gn bdr pp
 
Chapter 13 heragu
Chapter 13 heraguChapter 13 heragu
Chapter 13 heragu
 
Innovations™ Magazine July - September 2013
Innovations™ Magazine July - September 2013Innovations™ Magazine July - September 2013
Innovations™ Magazine July - September 2013
 
Cloud Computing and Intelligent Systems: Two Fields at a Crossroads
Cloud Computing and Intelligent Systems: Two Fields at a CrossroadsCloud Computing and Intelligent Systems: Two Fields at a Crossroads
Cloud Computing and Intelligent Systems: Two Fields at a Crossroads
 

More from centralohioissa

Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
centralohioissa
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
centralohioissa
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
centralohioissa
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
centralohioissa
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
centralohioissa
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
centralohioissa
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?
centralohioissa
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
centralohioissa
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospital
centralohioissa
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
centralohioissa
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
centralohioissa
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
centralohioissa
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
centralohioissa
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
centralohioissa
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
centralohioissa
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
centralohioissa
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
centralohioissa
 
Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50
centralohioissa
 
Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!
centralohioissa
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
centralohioissa
 

More from centralohioissa (20)

Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospital
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
 
Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50
 
Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 

Recently uploaded

Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 

Recently uploaded (20)

Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 

Harry Regan - It's Never So Bad That It Can't Get Worse

  • 1. It’s Never So Bad That It Can’t Get Worse A REVIEW OF DISASTER RECOVERY AND BUSINESS CONTINUITY PLANNING IN PRACTICE HARRY REGAN VP, SECURITY CONSULTING SERVICES VALERIE THOMAS SENIOR SECURITY TECHNOLOGIST SECURICON, LLC HTTP://WWW.SECURICON.COM
  • 2. Agenda • Who We Are • Things DRITellsYou • The Magic of MixingTechnology and Humans • 3Tales from the Field o Clouds of 9/11 o What if they threw a disaster and nobody came? o Financial Services andY2K • ScarTissue and Recommendations • Conclusions and Q&A
  • 3. Who are we? • Securicon is a 13+ year old security consultancy in security programs and engineering, both cyber and physical. • Broad base of experience in the integration of human and social issues into the implementation and impact on security • Enterprise-level experience in developing COOP and BCP plans.
  • 4. The Magic of Mixing Technology and Humans • Technology makes the world work • Humans make the world weird • Business Continuity happens at the intersection of people and technology– with one or more emergencies thrown into the mix. • Plans may be concise and logical, but human behavior is not as predictable as we’d like. • “When the first shot is fired, battle plans go out the window” -- George Patton
  • 5. Reality… • We’re going to examine three actual case studies from three different industries. • All three companies involved had a good Business Continuity Plan • All three had a major failure then the disaster really arrived
  • 6. Things DRI Tells You… Key Objectives… • Safety is #1 priority in a emergency/disaster • Keep the business operating and revenue flowing • Maintain basic communications (e-mail, phone) • Suck it up! Don’t give customers a reason to worry (Web site up, services available and shipping with minimal disruptions) • Maintain billing and accounting
  • 7. More Things DRI TellsYou… • Your DR/BCP plan should have strategies for… • Emergency Response and Operations Contingencies • Actionable and detailed Business Continuity Plans at a situational and granular Level • Training and Awareness – for everyone, but especially for key staff involved in the plan • Maintaining andTesting DR and Business Continuity Plans and Operability – and really do it! • Public Relations and Crisis Communications • Coordination with Public Authorities
  • 8. 3 tales from the field • Clouds of September 11 o Hurricane Gabrielle hits Florida • What if the threw a disaster and nobody came? o Great plan, now where’s the staff? • Financial Services andY2K o Y2K Plan used for 9/11 – successfully!
  • 9. Clouds of September 11 • September 9, 2001 –Tropical Storm Gabrielle forms off the west coast of Florida in the Gulf of Mexico. • September 11, 2001 – Hurricane Gabrielle threatens western Florida coast. • A manufacturing company in central Florida, already experiencing flooding in their facility and data center from heavy rain, decides to declare a disaster and exercise their DR contract with IBM • Scheduled DR site – Sterling Forest, NY • The request “could not be accommodated”
  • 10. Clouds of September 11 • There really was no formal plan. They had backup tapes on site. They had arranged for specific equipment at the DR site • The company assumed they could just “swap over” to the DR site. Assumed they could just show up with the tapes, but never tested • Lessons learned o With an untested plan, it was really iffy that they could successfully exercise the DR plan o With a 3rd party DR contract, you may be able to get your money back if you “can’t be accommodated”! o Yes, their data center flooded…
  • 11. What if the threw a disaster and nobody came? • Picture rolling New England hills, nestling a quaint little mill town. In this town is a manufacturing company that makes specialty products for the medical industry • “Shelter in Place” is a strategy some companies adopt– that’s the approach this company chose – backups and redundant equipment maintained on site. • The data center featured a natural gas generator tied to the city gas lines, so as long as they had fuel, they had power • The network featured divergent carriers with failover • They engineered their systems to be all remotely administered and operated so there was little need for staff to be onsite – but functions had to be manually attended. Robust, tested remote access processes.
  • 12. What if the threw a disaster and nobody came? • In reviewing their DR/BCP documents, it struck me that they had a a very exacting “Bob will do X, Frank will doY” approach. Sooner or later, they said, they’d cross train folks. • In May of 2006, the area experienced severe flooding. Telecommunications were out, roads impassable, residents evacuated from the area. • The systems were up! No one was available to do anything with them, but they were up! • Discovered many processes someone had to be on site for (e.g. IT did not control the phone system or the PACS)
  • 13. Financial Services andY2K • Large globally recognized financial services firm with heavy transactional network traffic. • Primary data center in southern New England, about an hour out of NYC • Backup data center 150 miles south. • Standing hotel accommodations for operations teams near both data centers • Situational BCP built with input from each business unit. Tested, tested, tested. • Identification of positions that needed to be on-site (the rest would work from home)
  • 14. Financial Services andY2K • Monthly live test of failover from primary to backup. Well understood system and network for financial services. Business systems were lower priority. • NYC staff in 1 Liberty Plaza,Times Square and on Whitehall Street • If staff had to be displaced, they would go to one of several locations or be issued laptops to work from home • Y2K – Nothing Happened • But then there was 9/11
  • 15. Financial Services andY2K • On 9/11 the first plane hit before market open– so the decision was made not to open the market until we knew what was really happening • As events unfolded, activated disaster plan o Liberty Plaza andWhitehall staff evacuated toTimes Square (until SouthTower collapse) o Network transferred to Backup Site without incident • Returned to normal operation by 9/17 • Long-term displacement of workstaff
  • 16. Financial Services andY2K • On one level, the DR/BCP was successful. o Almost seamless transition to backup (turned out not to be necessary) o Market systems staff was on-site, in place and ready for normal operations when the disaster occurred o Corporate systems staff generally was in transit or about to leave home, but in DC – another 9/11 target site o Market systems were ready for scheduled market open at 10AM, but decision was made to keep the market closed. o There were staff injuries, but no reported fatalities
  • 17. Financial Services andY2K • Problems with the BCP o No plan for loosing Manhattan o Evacuation plan assumed navigable streets, availability of public transportation o Severe and lasting workforce displacement o IT not ready for influx of teleworkers • One element of dumb luck o AT&T NYC Switch Center was destroyed in theWTC collapse o The company used MCI for telephone and network service
  • 18. Scar Tissue and Recommendations • Recurring drills are important. Annual drills are simply not frequent enough. Test it, darn it! • Still doing weekly/monthly backups with incrementals? You should rethink your backup strategy. • Practice bare-metal restores. Even with great planning and preparation, odds are good you’ll have to do one or more and they take time. • Transactional systems love to have journal problems. Understand how to identify problems early and quickly and how to resolve them. • If you’re using a 3rd party backup site, expect equipment problems. Plan for it.
  • 19. Scar Tissue and Recommendations • Understand what disasters are facing your disaster recovery sites! • Understand the logistics of getting the right people to the right place in different kinds of disasters! • See if you can arrange to have your restoration media transmitted to the DR site. (Throwing the backup media in the van with the DR away team may make the disaster even worse) • Maintain the equipment for the DR site! It won’t help you if the DR hardware can’t run the current mission critical applications!
  • 20. Scar Tissue and Recommendations • Cross train DR/BCP teams onALL roles. DRI recommends backups roles and backups to backups. But you won’t know for sure who reports for duty until the disaster. “When the first shot is fired, battle plans go out the window.” General George Patton
  • 21. What this “Granular” stuff? • It’s rare that a disaster/emergency will unfurl on your terms. The key to survival is flexibility o Be ready for a “half disaster” o Also be ready for multiple, simultaneous disasters o Finally, be ready for key staff unavailability • Situational planning is important o Have plans built for the most likely disaster scenarios o To the extend possible, compartmentalize o Also have a OCISD Strategy OCISD = “Oh crud! It’s something different!”
  • 22. Conclusions and Q&A If you take nothing else away from this presentation, remember: #1 Test. Refine. Repeat. #2 Be flexible. It probably won’t happen like you think it will #3 When it does happen, you’ll find out which pieces you didn’t test enough.

Editor's Notes

  1. V
  2. H
  3. V&H