SlideShare a Scribd company logo
Silvana Tomić Rotim
Director -ZIH
Silvana Tomić Rotim, Consultant and Trainer at ZIH, gives her
experience working with PECB. She is a Certified Quality Lead Auditor,
Certified IS Auditor, Certified Information Security Lead Auditor,
Certified Management Consultant (CMC), Certified Management
Trainer and a Certified TickIT Lead Auditor.
Contact Information
+385 1 4855-271
stomic@zih.hr
www.zih.hr
https://hr.linkedin.com/in/silvana-tomic-
rotim-27b5573
Webiner: How to select the best business
continuity strategy and solution?
Ph.D. Silvana Tomić Rotim, CISA,
PMP, Lead Auditor, Lead Implementer
Some Industry Survey Results
• 2 out of 5 enterprises experiencing a disaster will go out
of business within 5 years
• Gartner estimates that 40% of all businesses wich lose
all their data go out of business within 5 years
Gartner
• 30% of businesses never reopen, while 29% go out of
business within 2 years
Meta, Insurance
disaster report
• 80% of businesses that do not have Business Continuity
plans go out of business within 13 months of a major
incident
Business
Continuity Institute
Top 5 consequences of a disaster, 2006
1. Decreased employee productivity (62%)
2. Data Loss (43%)
3. Reduction in profits (40%)
4. Damage to customer relationship (38%)
5. Reduction in revenue (27%)
Veritas Recovery
Research Group
Why we need a good BCM?
These survey results, recent events and natural
disasters around the world illustrate the importance
of having a robust BCM program
There are a lot of threats that can cause disruption
of business processes
BCM is an established component of risk
management
Value of Business Continuity to the
entire business
Continuity of business operations
Regulatory compliance
Reduce the cost of risk management
Security, privacy, and data protection
Expertise and skills (outsourcing or training)
Maintaining market readiness
Become a more attractive partner
How to start with BCM?
Common practice within BCM is to conduct
business impact analysis (BIA)
The starting-points of the BCM are RTO and RPO
BC touches almost every part of an organization’s
business processes, infrastructure and people
Price of BCM solution grows with its level
Need to implement a cost-effective Business
Continuity program in phases
RTO – Recovery Time Objective
Data recovery
INCIDENT
Time
The recovery of
critical processes
RTO
Renewal of IT infrastructure
Renewal of operating
resources
RPO – Recovery Point Objective
INCIDENT
Time
Regul
ar
back-
up
Therecoveryof
criticalprocesses
RPO RTO
Regul
ar
back-
up
Regul
ar
back-
up
Data recovery
Criteria for Business Continuity
solutions
Need for Business Process
segmentation
Typical evolution of a Business
Continuity program
Business Continuity planning process
Triangle: Downtime – BC Solution -
Costs
Cost of Outage versus Cost of Solution
INCIDENT
TIME
COST
COST of
Solution and
TIME to Recover
COST of Outage
over TIME
RTO
Maximum
Tolerated
COST
Seven Tiers of BC Solutions
Mapping of 7 tiers to the 3 BC
segments
Continuous Availability
Integrations of servers, storage, software and
automation, and networking
Mostly based on some form of operating system
server clustering to provide application availability
Usually perform a predefined set of tasks required
to restart the application on another server
Rapid Data Recovery
Based on maintaining a second disk-resident copy
of data that is consistent at a point-in-time as close
to the time of a failure as possible
Allows for the restart of systems and applications
without having to restore data and re-applying
updates that have occurred since the time of the
data backup
Spans Tier 4 through Tier 6
Distinguished from Continuous Availability by the
fact that the automation required to be a Tier 7
solution is not present
Backup and Restore
Most simple and basic solution
Protect and recover data from failure by creating
another copy of data from the production system
Second copy of data allows you to restore data to
the time of the data backup
Spans Tier 1 through Tier 3
Requirements for BC based on BIA results
Other Key Components
Networking
Properly configured network infrastructure is critical for
the efficient transmission of data from one location to
another
Application and Database Considerations
Creating high availability clusters and their use with
regard to databases and other applications
Small and Medium Business Considerations
Increasingly rely on their IT systems to support their
business, any system downtime and data loss has severe
negative impacts on revenues, profits, and client
satisfaction
BC Solution Selection Methodology
The starter set of questions (1)
1. What is/are the business processes and
applications that need to be recovered?
2. On what IT platform or platforms does it run?
3. What is the desired RTO?
4. What is the distance between the recovery sites (if
there is one)?
5. What is the form of connectivity or infrastructure
transport that will be used to transport the data to
the recovery site? How much bandwidth is that?
The starter set of questions (2)
6. What are the specific IT hardware and software
configurations that need to be recovered?
7. What is the desired level of recovery? (Planned /
Unplanned / Transaction Integrity)
8. What is the RPO?
9. What is the amount of data that needs to be
recovered?
10. Who will design the solution?
11. Who will implement the solution?
Considering budget pressure, you
may also ask:
What business problem(s) will Business Continuity
solution solve, especially if you do not experience
an unplanned outage?
How much will Business Continuity solution cost?
How do we discover how much we can afford?
How should we define what level of Business
Continuity we really need?
BC Tier based on RPO/RTO
BC
Tier
Recovery Point
Objective (RPO)
Recovery Time
Objective
(RTO)
Relative price
0 Not specified Not specified 0,5 - 1
1 > 24 H > 48 H 2 - 3
2 16 - 24 H > 24 H 3 - 4
3 8 - 16 H 12 - 24 H 4 - 5
4 4 - 8 H 6 - 12 H 5 - 6
5 8 H 4 - 8 H 6 - 7
6 10 min – few hours 1 - 6 H 8 - 9
7 seconds – 10 min < 2 H 9 - 10
CONCLUSION
Disruption to the critical business processes could leave the
entire business exposed
Today’s organizations face ever-escalating customer
demands and expectations
There is no room for downtime
To remain competitive, it is necessary to have a resilient IT
infrastructure
There is a methodology for design and selection of the most
suitable Business Continuity solution
You can choose the best one based on the BIA results and
your needs from one side and cost from the other side
Sources
1. IBM Red Book: Business Continuity, Part 1.
Planning Guide
2. IBM Red Book: Business Continuity, Part 2.
Solution Overview
3. Standard Recovery Costs, Gartner
4. Certified ISO 22301 Lead Implementer, PECB
presentation
THANK YOU
?
+385 1 4855-271
stomic@zih.hr
www.zih.h
https://hr.linkedin.com/in/silvana-tomic-
rotim-27b5573

More Related Content

What's hot

Business Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationBusiness Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS Implementation
PECB
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
Rod Davis
 
02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIA02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIA
BCM Institute
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop Final
Bill Lisse
 
Business Continuity and Disaster Recovery Strategy
Business Continuity and Disaster Recovery Strategy Business Continuity and Disaster Recovery Strategy
Business Continuity and Disaster Recovery Strategy
Chandrak Trivedi
 
Comment construire un plan de continuité d'activité ?
Comment construire un plan de continuité d'activité ?Comment construire un plan de continuité d'activité ?
Comment construire un plan de continuité d'activité ?
BRIVA
 
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
PECB
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
Narudom Roongsiriwong, CISSP
 
Governance Culture & Incentives- Fundamentals of Operational Risk
Governance Culture & Incentives- Fundamentals of Operational RiskGovernance Culture & Incentives- Fundamentals of Operational Risk
Governance Culture & Incentives- Fundamentals of Operational Risk
Andrew Smart
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
Adv Prashant Mali
 
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
Association for Project Management
 
Business Continuity Management & ISO 22301
Business Continuity Management & ISO 22301Business Continuity Management & ISO 22301
Business Continuity Management & ISO 22301
IT Governance Ltd
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
ECC International
 
Integrated GRC
Integrated GRCIntegrated GRC
Integrated GRC
Transcendent Group
 
Integrating Risk Appetite With Strategy Feb 14 2011
Integrating Risk Appetite With Strategy   Feb 14 2011Integrating Risk Appetite With Strategy   Feb 14 2011
Integrating Risk Appetite With Strategy Feb 14 2011
Andrew Smart
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
 
Assessing the Impact of a Disruption: Building an Effective Business Impact A...
Assessing the Impact of a Disruption: Building an Effective Business Impact A...Assessing the Impact of a Disruption: Building an Effective Business Impact A...
Assessing the Impact of a Disruption: Building an Effective Business Impact A...
PECB
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
Lusungu Mkandawire CISA,CISM,CGEIT,CPF,PRINCE2
 
Iso 22301
Iso 22301Iso 22301
Business continuity management per ISO 22301 - a certification training cour...
 Business continuity management per ISO 22301 - a certification training cour... Business continuity management per ISO 22301 - a certification training cour...
Business continuity management per ISO 22301 - a certification training cour...
Mart Rovers
 

What's hot (20)

Business Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationBusiness Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS Implementation
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
 
02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIA02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIA
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop Final
 
Business Continuity and Disaster Recovery Strategy
Business Continuity and Disaster Recovery Strategy Business Continuity and Disaster Recovery Strategy
Business Continuity and Disaster Recovery Strategy
 
Comment construire un plan de continuité d'activité ?
Comment construire un plan de continuité d'activité ?Comment construire un plan de continuité d'activité ?
Comment construire un plan de continuité d'activité ?
 
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
 
Governance Culture & Incentives- Fundamentals of Operational Risk
Governance Culture & Incentives- Fundamentals of Operational RiskGovernance Culture & Incentives- Fundamentals of Operational Risk
Governance Culture & Incentives- Fundamentals of Operational Risk
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
 
Business Continuity Management & ISO 22301
Business Continuity Management & ISO 22301Business Continuity Management & ISO 22301
Business Continuity Management & ISO 22301
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
Integrated GRC
Integrated GRCIntegrated GRC
Integrated GRC
 
Integrating Risk Appetite With Strategy Feb 14 2011
Integrating Risk Appetite With Strategy   Feb 14 2011Integrating Risk Appetite With Strategy   Feb 14 2011
Integrating Risk Appetite With Strategy Feb 14 2011
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Assessing the Impact of a Disruption: Building an Effective Business Impact A...
Assessing the Impact of a Disruption: Building an Effective Business Impact A...Assessing the Impact of a Disruption: Building an Effective Business Impact A...
Assessing the Impact of a Disruption: Building an Effective Business Impact A...
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
Iso 22301
Iso 22301Iso 22301
Iso 22301
 
Business continuity management per ISO 22301 - a certification training cour...
 Business continuity management per ISO 22301 - a certification training cour... Business continuity management per ISO 22301 - a certification training cour...
Business continuity management per ISO 22301 - a certification training cour...
 

Viewers also liked

Bcp
BcpBcp
Bcp
madunix
 
EMC VPLEX Continuous availability and non disruptive
EMC VPLEX Continuous availability and non disruptiveEMC VPLEX Continuous availability and non disruptive
EMC VPLEX Continuous availability and non disruptive
solarisyougood
 
Is it Necessary to Document the BCMS plan?
Is it Necessary to Document the BCMS plan?Is it Necessary to Document the BCMS plan?
Is it Necessary to Document the BCMS plan?
PECB
 
Kristopher Lovegrove resume
Kristopher Lovegrove  resumeKristopher Lovegrove  resume
Kristopher Lovegrove resume
Kristopher Lovegrove
 
Business Resilience
Business ResilienceBusiness Resilience
Business Resilience
rix57
 
How to better understand the context and the scope of the BCMS?
How to better understand the context and the scope of the BCMS?How to better understand the context and the scope of the BCMS?
How to better understand the context and the scope of the BCMS?
PECB
 
Business Continuity A Primer Andrews - September 2015
Business Continuity A Primer  Andrews - September 2015Business Continuity A Primer  Andrews - September 2015
Business Continuity A Primer Andrews - September 2015
Ron Andrews
 
Emc vmax3 technical deep workshop
Emc vmax3 technical deep workshopEmc vmax3 technical deep workshop
Emc vmax3 technical deep workshop
solarisyougood
 
We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?
PECB
 
Emc recoverpoint technical
Emc recoverpoint technicalEmc recoverpoint technical
Emc recoverpoint technical
solarisyougood
 
Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301
PECB
 
Crisis Management & Evacuation Planning
Crisis Management & Evacuation Planning Crisis Management & Evacuation Planning
Crisis Management & Evacuation Planning
bcilondonforum
 
Business Impact Analysis
Business Impact AnalysisBusiness Impact Analysis
Business Impact Analysis
dlfrench
 
EMC Vmax3 tech-deck deep dive
EMC Vmax3 tech-deck deep diveEMC Vmax3 tech-deck deep dive
EMC Vmax3 tech-deck deep dive
solarisyougood
 

Viewers also liked (14)

Bcp
BcpBcp
Bcp
 
EMC VPLEX Continuous availability and non disruptive
EMC VPLEX Continuous availability and non disruptiveEMC VPLEX Continuous availability and non disruptive
EMC VPLEX Continuous availability and non disruptive
 
Is it Necessary to Document the BCMS plan?
Is it Necessary to Document the BCMS plan?Is it Necessary to Document the BCMS plan?
Is it Necessary to Document the BCMS plan?
 
Kristopher Lovegrove resume
Kristopher Lovegrove  resumeKristopher Lovegrove  resume
Kristopher Lovegrove resume
 
Business Resilience
Business ResilienceBusiness Resilience
Business Resilience
 
How to better understand the context and the scope of the BCMS?
How to better understand the context and the scope of the BCMS?How to better understand the context and the scope of the BCMS?
How to better understand the context and the scope of the BCMS?
 
Business Continuity A Primer Andrews - September 2015
Business Continuity A Primer  Andrews - September 2015Business Continuity A Primer  Andrews - September 2015
Business Continuity A Primer Andrews - September 2015
 
Emc vmax3 technical deep workshop
Emc vmax3 technical deep workshopEmc vmax3 technical deep workshop
Emc vmax3 technical deep workshop
 
We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?
 
Emc recoverpoint technical
Emc recoverpoint technicalEmc recoverpoint technical
Emc recoverpoint technical
 
Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301
 
Crisis Management & Evacuation Planning
Crisis Management & Evacuation Planning Crisis Management & Evacuation Planning
Crisis Management & Evacuation Planning
 
Business Impact Analysis
Business Impact AnalysisBusiness Impact Analysis
Business Impact Analysis
 
EMC Vmax3 tech-deck deep dive
EMC Vmax3 tech-deck deep diveEMC Vmax3 tech-deck deep dive
EMC Vmax3 tech-deck deep dive
 

Similar to How to select the best business continuity strategy and solution?

Business continuity presentation
Business continuity presentationBusiness continuity presentation
Business continuity presentation
SteveKutzer
 
Business Case4 Process Improvement
Business Case4 Process ImprovementBusiness Case4 Process Improvement
Business Case4 Process Improvement
Al Bennett
 
Business Continuity Awareness Week 2009
Business Continuity Awareness Week 2009Business Continuity Awareness Week 2009
Business Continuity Awareness Week 2009
Brigitte Theuma
 
BPM Fundamentals: Develop Your Game Plan For BPM Success
BPM Fundamentals: Develop Your Game Plan For BPM SuccessBPM Fundamentals: Develop Your Game Plan For BPM Success
BPM Fundamentals: Develop Your Game Plan For BPM Success
Clay Richardson
 
IBM Smarter Process (Stockholm)
IBM Smarter Process (Stockholm)IBM Smarter Process (Stockholm)
IBM Smarter Process (Stockholm)
IBM Sverige
 
Kick-Starting Digital Transformation: Four IT Strategies
Kick-Starting Digital Transformation: Four IT StrategiesKick-Starting Digital Transformation: Four IT Strategies
Kick-Starting Digital Transformation: Four IT Strategies
Cognizant
 
PWC Software Robotics
PWC Software RoboticsPWC Software Robotics
PWC Software Robotics
UiPath
 
Feasibility Analysis.ppt
Feasibility Analysis.pptFeasibility Analysis.ppt
Feasibility Analysis.ppt
BetshaTizazu2
 
CEMMethod(tm) Overview
CEMMethod(tm) OverviewCEMMethod(tm) Overview
CEMMethod(tm) Overview
Steve Towers, CEO and CPP Champion
 
Roger l brathwaite_cover_letter_it_2020
Roger l brathwaite_cover_letter_it_2020Roger l brathwaite_cover_letter_it_2020
Roger l brathwaite_cover_letter_it_2020
Accenture
 
Product Lifecycle management PowerPoint Presentation Slides
Product Lifecycle management PowerPoint Presentation Slides Product Lifecycle management PowerPoint Presentation Slides
Product Lifecycle management PowerPoint Presentation Slides
SlideTeam
 
The Fundamentals Of BPM Innovation In Telecommunications
The Fundamentals Of BPM Innovation In TelecommunicationsThe Fundamentals Of BPM Innovation In Telecommunications
The Fundamentals Of BPM Innovation In Telecommunications
Nathaniel Palmer
 
BPMN + BPSim PEX Week 2014
BPMN + BPSim PEX Week 2014BPMN + BPSim PEX Week 2014
BPMN + BPSim PEX Week 2014
Denis Gagné
 
ROI in BCM Benefits and Alternatives Final
ROI in BCM   Benefits and Alternatives FinalROI in BCM   Benefits and Alternatives Final
ROI in BCM Benefits and Alternatives Final
Continuity and Resilience
 
The importance of IT Change Management to the DR and BCP process
The importance of IT Change Management to the DR and BCP processThe importance of IT Change Management to the DR and BCP process
The importance of IT Change Management to the DR and BCP process
Paul Monk (CBCI)
 
Test 2
Test 2Test 2
Test 2
Justin Wong
 
The overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure managementThe overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure management
NIIT Technologies
 
Bpms
BpmsBpms
Bpms
Su Diro
 
An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...
An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...
An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...
Cisco Canada
 
It Sales Presentation 2010 03 31
It Sales Presentation   2010 03 31It Sales Presentation   2010 03 31
It Sales Presentation 2010 03 31
rhissrich
 

Similar to How to select the best business continuity strategy and solution? (20)

Business continuity presentation
Business continuity presentationBusiness continuity presentation
Business continuity presentation
 
Business Case4 Process Improvement
Business Case4 Process ImprovementBusiness Case4 Process Improvement
Business Case4 Process Improvement
 
Business Continuity Awareness Week 2009
Business Continuity Awareness Week 2009Business Continuity Awareness Week 2009
Business Continuity Awareness Week 2009
 
BPM Fundamentals: Develop Your Game Plan For BPM Success
BPM Fundamentals: Develop Your Game Plan For BPM SuccessBPM Fundamentals: Develop Your Game Plan For BPM Success
BPM Fundamentals: Develop Your Game Plan For BPM Success
 
IBM Smarter Process (Stockholm)
IBM Smarter Process (Stockholm)IBM Smarter Process (Stockholm)
IBM Smarter Process (Stockholm)
 
Kick-Starting Digital Transformation: Four IT Strategies
Kick-Starting Digital Transformation: Four IT StrategiesKick-Starting Digital Transformation: Four IT Strategies
Kick-Starting Digital Transformation: Four IT Strategies
 
PWC Software Robotics
PWC Software RoboticsPWC Software Robotics
PWC Software Robotics
 
Feasibility Analysis.ppt
Feasibility Analysis.pptFeasibility Analysis.ppt
Feasibility Analysis.ppt
 
CEMMethod(tm) Overview
CEMMethod(tm) OverviewCEMMethod(tm) Overview
CEMMethod(tm) Overview
 
Roger l brathwaite_cover_letter_it_2020
Roger l brathwaite_cover_letter_it_2020Roger l brathwaite_cover_letter_it_2020
Roger l brathwaite_cover_letter_it_2020
 
Product Lifecycle management PowerPoint Presentation Slides
Product Lifecycle management PowerPoint Presentation Slides Product Lifecycle management PowerPoint Presentation Slides
Product Lifecycle management PowerPoint Presentation Slides
 
The Fundamentals Of BPM Innovation In Telecommunications
The Fundamentals Of BPM Innovation In TelecommunicationsThe Fundamentals Of BPM Innovation In Telecommunications
The Fundamentals Of BPM Innovation In Telecommunications
 
BPMN + BPSim PEX Week 2014
BPMN + BPSim PEX Week 2014BPMN + BPSim PEX Week 2014
BPMN + BPSim PEX Week 2014
 
ROI in BCM Benefits and Alternatives Final
ROI in BCM   Benefits and Alternatives FinalROI in BCM   Benefits and Alternatives Final
ROI in BCM Benefits and Alternatives Final
 
The importance of IT Change Management to the DR and BCP process
The importance of IT Change Management to the DR and BCP processThe importance of IT Change Management to the DR and BCP process
The importance of IT Change Management to the DR and BCP process
 
Test 2
Test 2Test 2
Test 2
 
The overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure managementThe overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure management
 
Bpms
BpmsBpms
Bpms
 
An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...
An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...
An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...
 
It Sales Presentation 2010 03 31
It Sales Presentation   2010 03 31It Sales Presentation   2010 03 31
It Sales Presentation 2010 03 31
 

More from PECB

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 

More from PECB (20)

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 

Recently uploaded

Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 

Recently uploaded (20)

Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 

How to select the best business continuity strategy and solution?

  • 1.
  • 2. Silvana Tomić Rotim Director -ZIH Silvana Tomić Rotim, Consultant and Trainer at ZIH, gives her experience working with PECB. She is a Certified Quality Lead Auditor, Certified IS Auditor, Certified Information Security Lead Auditor, Certified Management Consultant (CMC), Certified Management Trainer and a Certified TickIT Lead Auditor. Contact Information +385 1 4855-271 stomic@zih.hr www.zih.hr https://hr.linkedin.com/in/silvana-tomic- rotim-27b5573
  • 3. Webiner: How to select the best business continuity strategy and solution? Ph.D. Silvana Tomić Rotim, CISA, PMP, Lead Auditor, Lead Implementer
  • 4. Some Industry Survey Results • 2 out of 5 enterprises experiencing a disaster will go out of business within 5 years • Gartner estimates that 40% of all businesses wich lose all their data go out of business within 5 years Gartner • 30% of businesses never reopen, while 29% go out of business within 2 years Meta, Insurance disaster report • 80% of businesses that do not have Business Continuity plans go out of business within 13 months of a major incident Business Continuity Institute Top 5 consequences of a disaster, 2006 1. Decreased employee productivity (62%) 2. Data Loss (43%) 3. Reduction in profits (40%) 4. Damage to customer relationship (38%) 5. Reduction in revenue (27%) Veritas Recovery Research Group
  • 5. Why we need a good BCM? These survey results, recent events and natural disasters around the world illustrate the importance of having a robust BCM program There are a lot of threats that can cause disruption of business processes BCM is an established component of risk management
  • 6. Value of Business Continuity to the entire business Continuity of business operations Regulatory compliance Reduce the cost of risk management Security, privacy, and data protection Expertise and skills (outsourcing or training) Maintaining market readiness Become a more attractive partner
  • 7. How to start with BCM? Common practice within BCM is to conduct business impact analysis (BIA) The starting-points of the BCM are RTO and RPO BC touches almost every part of an organization’s business processes, infrastructure and people Price of BCM solution grows with its level Need to implement a cost-effective Business Continuity program in phases
  • 8. RTO – Recovery Time Objective Data recovery INCIDENT Time The recovery of critical processes RTO Renewal of IT infrastructure Renewal of operating resources
  • 9. RPO – Recovery Point Objective INCIDENT Time Regul ar back- up Therecoveryof criticalprocesses RPO RTO Regul ar back- up Regul ar back- up Data recovery
  • 10. Criteria for Business Continuity solutions
  • 11. Need for Business Process segmentation
  • 12. Typical evolution of a Business Continuity program
  • 14. Triangle: Downtime – BC Solution - Costs
  • 15. Cost of Outage versus Cost of Solution INCIDENT TIME COST COST of Solution and TIME to Recover COST of Outage over TIME RTO Maximum Tolerated COST
  • 16. Seven Tiers of BC Solutions
  • 17. Mapping of 7 tiers to the 3 BC segments
  • 18. Continuous Availability Integrations of servers, storage, software and automation, and networking Mostly based on some form of operating system server clustering to provide application availability Usually perform a predefined set of tasks required to restart the application on another server
  • 19. Rapid Data Recovery Based on maintaining a second disk-resident copy of data that is consistent at a point-in-time as close to the time of a failure as possible Allows for the restart of systems and applications without having to restore data and re-applying updates that have occurred since the time of the data backup Spans Tier 4 through Tier 6 Distinguished from Continuous Availability by the fact that the automation required to be a Tier 7 solution is not present
  • 20. Backup and Restore Most simple and basic solution Protect and recover data from failure by creating another copy of data from the production system Second copy of data allows you to restore data to the time of the data backup Spans Tier 1 through Tier 3
  • 21. Requirements for BC based on BIA results
  • 22. Other Key Components Networking Properly configured network infrastructure is critical for the efficient transmission of data from one location to another Application and Database Considerations Creating high availability clusters and their use with regard to databases and other applications Small and Medium Business Considerations Increasingly rely on their IT systems to support their business, any system downtime and data loss has severe negative impacts on revenues, profits, and client satisfaction
  • 23. BC Solution Selection Methodology
  • 24. The starter set of questions (1) 1. What is/are the business processes and applications that need to be recovered? 2. On what IT platform or platforms does it run? 3. What is the desired RTO? 4. What is the distance between the recovery sites (if there is one)? 5. What is the form of connectivity or infrastructure transport that will be used to transport the data to the recovery site? How much bandwidth is that?
  • 25. The starter set of questions (2) 6. What are the specific IT hardware and software configurations that need to be recovered? 7. What is the desired level of recovery? (Planned / Unplanned / Transaction Integrity) 8. What is the RPO? 9. What is the amount of data that needs to be recovered? 10. Who will design the solution? 11. Who will implement the solution?
  • 26. Considering budget pressure, you may also ask: What business problem(s) will Business Continuity solution solve, especially if you do not experience an unplanned outage? How much will Business Continuity solution cost? How do we discover how much we can afford? How should we define what level of Business Continuity we really need?
  • 27. BC Tier based on RPO/RTO BC Tier Recovery Point Objective (RPO) Recovery Time Objective (RTO) Relative price 0 Not specified Not specified 0,5 - 1 1 > 24 H > 48 H 2 - 3 2 16 - 24 H > 24 H 3 - 4 3 8 - 16 H 12 - 24 H 4 - 5 4 4 - 8 H 6 - 12 H 5 - 6 5 8 H 4 - 8 H 6 - 7 6 10 min – few hours 1 - 6 H 8 - 9 7 seconds – 10 min < 2 H 9 - 10
  • 28. CONCLUSION Disruption to the critical business processes could leave the entire business exposed Today’s organizations face ever-escalating customer demands and expectations There is no room for downtime To remain competitive, it is necessary to have a resilient IT infrastructure There is a methodology for design and selection of the most suitable Business Continuity solution You can choose the best one based on the BIA results and your needs from one side and cost from the other side
  • 29. Sources 1. IBM Red Book: Business Continuity, Part 1. Planning Guide 2. IBM Red Book: Business Continuity, Part 2. Solution Overview 3. Standard Recovery Costs, Gartner 4. Certified ISO 22301 Lead Implementer, PECB presentation
  • 30. THANK YOU ? +385 1 4855-271 stomic@zih.hr www.zih.h https://hr.linkedin.com/in/silvana-tomic- rotim-27b5573