SlideShare a Scribd company logo
Importance of Risk alert services in Business Continuity Planning
• Vishal Bargat- Sr. Vice President & Head-INDIA BU
• Rahul Dev. Swarnkar– Operations Lead
About CyberTech Systems & Software Ltd
• A Leading provider of next-generation geospatial,
infrastructure, enterprise applications and Risk Alert
services
• CMMi Level 3 and ISO 9001: 2008 Certified company
• Global Risk Monitoring Center operating 24 x 7 catering to
SAPAC Region
• A Risk Alert provides relevant, timely, comprehensive and accurate information
about all hazards incidents which might have an adverse impact on the asset
location, business operations, employee and travel safety of an organization
• A Risk Alert is the first step of BCP life cycle
What is Risk Alert ?
Importance of Risk Alerts in Business Continuity Planning
Risk Alerts helps organization in
its BCP by safeguarding its
employees
Risk Alert exposes all types of
potential threats to an
organization, how to handle
and be prepared for them
Risk Alert covers all relevant
incidences along with its impact
analysis for an organization,
filtering uneventful news
Risk Alerts provide lead time to
plan and react during any
emergency situation's
Timely
Accurate
Comprehensive,
All Hazards
Relevant
Attributes of Risk Alerts
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
formation Information Information Information Information Information Information Information Information Information Information Information Informatio
Importance of Relevant Information
Obtaining Relevant Information
Man + Machine Combination
Primary Analyst Secondary Analyst
Personalization of Location Settings & Alerts
Comprehensive Risk Alerts
Aviation Geophysical Hazmat Fire Infrastructure Labour
Meteorological Security Structural Terrorism Transportation Advisory
Proactive Risk
Management
Begins with the
“Right”
Information
Develop Plans to
Mitigate Risk
 Create a detailed strategy for
minimizing the impact
 Different strategies are often
necessary to accommodate
the nature of the risk
Be Informed of
Disruption
 What happened
 When did it occur
 Where did it occur
 Analyze / After Action Reports
 Relevant, timely and accurate
information
Identify the Sources
of Potential
Disruption
 Active Shooter
 Natural Disasters
 Severe localized weather
 Infrastructure failure – power
outages
 Labor actions – protests
Assess the Impact of
Disruption
 Life & Safety
 Financial implications
 Duty of Care
 Environmental
 Business viability
 Brand image and reputation
Proactive vs. Reactive
Automation of Alert Generation
Consumption of Risk Alerts – Map
Consumption of Risk Alerts – Email
Consumption of Risk Alerts – Mobile
Your
Asset
Location
Alert Life Cycle
Generation
Updation
Closure
Alerts
Risk Alert Services usage in GPS-Assisted Mobile Tracking App
• Mobile App leveraging smartphone GPS
technology should be able to consume Risk
Alerts to provide on-the-go situational
awareness to Key People of organization on
their mobile app
• Improve your ability to monitor, analyze,
report, and respond to threats by equipping
your Travelers, Expats, Executives and VIPs
with mobile app
• Personal proximity position-based perimeter
alerting – warnings
• Geo-fencing alarms
An intelligent mobile app should be able to make better decisions and should have the
ability to two-way communicate in critical times utilizing Risk Alerts
Risk Alert Services usage in Tracking Employee Travel
Employee safety during travel should be ensured utilizing Risk Alerts by delivering
Actionable intelligence and analysis to the right people at the right time.
• Each and every PNR should be tractable and
ensure Employee safety of an organization
• It should be a web based offering
• It should give a clear picture of what all
challenges one can expect while travel to a
contrary based on Risk intelligence available.
• Pre-trip advisories for travellers and
managers consuming Risk Alerts.
Risk Alert Usages during Vardah Cyclone - 2016
An idea Risk Alert System should have
provided Advisory about arrival of Vardah
Cyclone on 7th Dec, minimizing losses
Vardah Cyclone not only impacted human
lives but also wiped away $1-bn. An ideal Risk
Alert service should provide 360º holistic view
of the incident. It had catastrophic impact on
below listed segments:
• Power Outage
• Network Outage
• Road and Transportation
• Aviation
• Railways
• Tourism
• Agriculture
The image tries to highlight no of unique
updates available from various sources talking
about disruption across categories
Vardah Cyclone – Dec 2016
25
18
9
11
9
2
Advisory Storm Power outage Railways Aviation Transportation
Risk Alert Usages during Chennai Flood – Dec 2015
An idea Risk Alert System should have provided Advisory about arrival of Chennai Flood on 6th Nov, highlighting
low lying areas in Chennai (As shown in image above) which are prone to flood thus minimizing losses
Chennai Flood not only impacted human lives
but also wiped away ₹25000 Cr. An ideal Risk
Alert service should provide 360º holistic view
of the incident. It had catastrophic impact on
below listed segments:
• Power Outage
• Network Outage
• Road and Transportation
• Aviation
• Railways
• Banking
The image tries to highlight no of unique
updates available from various sources talking
about disruption across categories
Chennai Flood – Nov 2015
Thank You

More Related Content

Similar to Importance of Risk alert services in Business Continuity Planning

RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™
CPaschal
 
cyberready-solutions
cyberready-solutionscyberready-solutions
cyberready-solutions
Noah Kline
 
Business Continuity - Lessons from our experience of recovering from a Cyclo...
 Business Continuity - Lessons from our experience of recovering from a Cyclo... Business Continuity - Lessons from our experience of recovering from a Cyclo...
Business Continuity - Lessons from our experience of recovering from a Cyclo...
Manish Jain
 
Ensuring Cyber Safety - An Overview of Cyber Security Policies.pdf
Ensuring Cyber Safety - An Overview of Cyber Security Policies.pdfEnsuring Cyber Safety - An Overview of Cyber Security Policies.pdf
Ensuring Cyber Safety - An Overview of Cyber Security Policies.pdf
Altius IT
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
Resolver Inc.
 
Reporting, Tracking and Resolving Near Misses
Reporting, Tracking and Resolving Near MissesReporting, Tracking and Resolving Near Misses
Reporting, Tracking and Resolving Near Misses
Garrett Foley
 
Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Wasn't expecting that! Now what?
Wasn't expecting that! Now what?
Jisc
 
ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 
Cv HASSAN RIAZ
Cv HASSAN RIAZCv HASSAN RIAZ
Cv HASSAN RIAZ
Hassan Riaz
 
SunGard Risk Assessment Module
SunGard Risk Assessment ModuleSunGard Risk Assessment Module
SunGard Risk Assessment Module
SunGard Availability Services, India
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Andrew Gerber
 
Titas Global Ltd
Titas Global LtdTitas Global Ltd
Titas Global Ltd
Andrew Newcombe
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
JustinBrown267905
 
DAI.pptx
DAI.pptxDAI.pptx
DAI.pptx
AM Shamsuddula
 
International Business Travel
International Business TravelInternational Business Travel
International Business Travel
Jim Rovers
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2
Mark Skilton
 
BIFM Risk Management Event 8th September 2016
BIFM Risk Management Event 8th September 2016BIFM Risk Management Event 8th September 2016
BIFM Risk Management Event 8th September 2016
Whitbags
 
Anvil TRIS Brochure FINAL_US
Anvil TRIS Brochure FINAL_USAnvil TRIS Brochure FINAL_US
Anvil TRIS Brochure FINAL_US
Dylan Shaver
 
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 VersionAccidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
Murray Security Services
 
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptxSWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 

Similar to Importance of Risk alert services in Business Continuity Planning (20)

RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™
 
cyberready-solutions
cyberready-solutionscyberready-solutions
cyberready-solutions
 
Business Continuity - Lessons from our experience of recovering from a Cyclo...
 Business Continuity - Lessons from our experience of recovering from a Cyclo... Business Continuity - Lessons from our experience of recovering from a Cyclo...
Business Continuity - Lessons from our experience of recovering from a Cyclo...
 
Ensuring Cyber Safety - An Overview of Cyber Security Policies.pdf
Ensuring Cyber Safety - An Overview of Cyber Security Policies.pdfEnsuring Cyber Safety - An Overview of Cyber Security Policies.pdf
Ensuring Cyber Safety - An Overview of Cyber Security Policies.pdf
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
 
Reporting, Tracking and Resolving Near Misses
Reporting, Tracking and Resolving Near MissesReporting, Tracking and Resolving Near Misses
Reporting, Tracking and Resolving Near Misses
 
Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Wasn't expecting that! Now what?
Wasn't expecting that! Now what?
 
ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
 
Cv HASSAN RIAZ
Cv HASSAN RIAZCv HASSAN RIAZ
Cv HASSAN RIAZ
 
SunGard Risk Assessment Module
SunGard Risk Assessment ModuleSunGard Risk Assessment Module
SunGard Risk Assessment Module
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 
Titas Global Ltd
Titas Global LtdTitas Global Ltd
Titas Global Ltd
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
DAI.pptx
DAI.pptxDAI.pptx
DAI.pptx
 
International Business Travel
International Business TravelInternational Business Travel
International Business Travel
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2
 
BIFM Risk Management Event 8th September 2016
BIFM Risk Management Event 8th September 2016BIFM Risk Management Event 8th September 2016
BIFM Risk Management Event 8th September 2016
 
Anvil TRIS Brochure FINAL_US
Anvil TRIS Brochure FINAL_USAnvil TRIS Brochure FINAL_US
Anvil TRIS Brochure FINAL_US
 
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 VersionAccidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
 
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptxSWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
 

More from Continuity and Resilience

The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq BajwaThe Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
Continuity and Resilience
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha EltinayThe Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
Continuity and Resilience
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh -  Paul GantThe Business Continuity Conference, 25th October 2023 in Riyadh -  Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul Gant
Continuity and Resilience
 
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
Continuity and Resilience
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
Continuity and Resilience
 
DEFLUFFING RESILIENCE
DEFLUFFING RESILIENCEDEFLUFFING RESILIENCE
DEFLUFFING RESILIENCE
Continuity and Resilience
 
CREATING AND MAINTAINING A BCM PROGRAM
CREATING AND MAINTAINING A BCM PROGRAMCREATING AND MAINTAINING A BCM PROGRAM
CREATING AND MAINTAINING A BCM PROGRAM
Continuity and Resilience
 
BCM Challenges and Compliance
BCM Challenges and Compliance BCM Challenges and Compliance
BCM Challenges and Compliance
Continuity and Resilience
 
Thriving in the Crisis Situation
Thriving in the Crisis SituationThriving in the Crisis Situation
Thriving in the Crisis Situation
Continuity and Resilience
 
Cyber Security & IT Resilience
Cyber Security & IT Resilience Cyber Security & IT Resilience
Cyber Security & IT Resilience
Continuity and Resilience
 
Enterprise Resilience
Enterprise ResilienceEnterprise Resilience
Enterprise Resilience
Continuity and Resilience
 
Advancing the Enterprise Towards Enterprise Resilience
Advancing the Enterprise Towards Enterprise ResilienceAdvancing the Enterprise Towards Enterprise Resilience
Advancing the Enterprise Towards Enterprise Resilience
Continuity and Resilience
 
Bcm is all about people!
Bcm   is all about people!Bcm   is all about people!
Bcm is all about people!
Continuity and Resilience
 
SAMA BCM Framework
SAMA BCM Framework SAMA BCM Framework
SAMA BCM Framework
Continuity and Resilience
 
Value of Work Place Services in the Middle East
Value of Work Place Services in the Middle EastValue of Work Place Services in the Middle East
Value of Work Place Services in the Middle East
Continuity and Resilience
 
Social Media Influence in the field of Crisis Management– Case Studies
Social Media Influence in the field of Crisis Management– Case StudiesSocial Media Influence in the field of Crisis Management– Case Studies
Social Media Influence in the field of Crisis Management– Case Studies
Continuity and Resilience
 
Cyber Resilience Tips and Techniques For Protection & Response
Cyber ResilienceTips and Techniques For Protection & Response Cyber ResilienceTips and Techniques For Protection & Response
Cyber Resilience Tips and Techniques For Protection & Response
Continuity and Resilience
 
Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!
Continuity and Resilience
 
Crisis Communication & BCM in Aviation Sector
Crisis Communication & BCM in Aviation SectorCrisis Communication & BCM in Aviation Sector
Crisis Communication & BCM in Aviation Sector
Continuity and Resilience
 
Effectiveness of Disaster Management Ground Reality and Potential.
Effectiveness of Disaster Management Ground Reality and Potential.Effectiveness of Disaster Management Ground Reality and Potential.
Effectiveness of Disaster Management Ground Reality and Potential.
Continuity and Resilience
 

More from Continuity and Resilience (20)

The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq BajwaThe Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha EltinayThe Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh -  Paul GantThe Business Continuity Conference, 25th October 2023 in Riyadh -  Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul Gant
 
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
 
DEFLUFFING RESILIENCE
DEFLUFFING RESILIENCEDEFLUFFING RESILIENCE
DEFLUFFING RESILIENCE
 
CREATING AND MAINTAINING A BCM PROGRAM
CREATING AND MAINTAINING A BCM PROGRAMCREATING AND MAINTAINING A BCM PROGRAM
CREATING AND MAINTAINING A BCM PROGRAM
 
BCM Challenges and Compliance
BCM Challenges and Compliance BCM Challenges and Compliance
BCM Challenges and Compliance
 
Thriving in the Crisis Situation
Thriving in the Crisis SituationThriving in the Crisis Situation
Thriving in the Crisis Situation
 
Cyber Security & IT Resilience
Cyber Security & IT Resilience Cyber Security & IT Resilience
Cyber Security & IT Resilience
 
Enterprise Resilience
Enterprise ResilienceEnterprise Resilience
Enterprise Resilience
 
Advancing the Enterprise Towards Enterprise Resilience
Advancing the Enterprise Towards Enterprise ResilienceAdvancing the Enterprise Towards Enterprise Resilience
Advancing the Enterprise Towards Enterprise Resilience
 
Bcm is all about people!
Bcm   is all about people!Bcm   is all about people!
Bcm is all about people!
 
SAMA BCM Framework
SAMA BCM Framework SAMA BCM Framework
SAMA BCM Framework
 
Value of Work Place Services in the Middle East
Value of Work Place Services in the Middle EastValue of Work Place Services in the Middle East
Value of Work Place Services in the Middle East
 
Social Media Influence in the field of Crisis Management– Case Studies
Social Media Influence in the field of Crisis Management– Case StudiesSocial Media Influence in the field of Crisis Management– Case Studies
Social Media Influence in the field of Crisis Management– Case Studies
 
Cyber Resilience Tips and Techniques For Protection & Response
Cyber ResilienceTips and Techniques For Protection & Response Cyber ResilienceTips and Techniques For Protection & Response
Cyber Resilience Tips and Techniques For Protection & Response
 
Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!
 
Crisis Communication & BCM in Aviation Sector
Crisis Communication & BCM in Aviation SectorCrisis Communication & BCM in Aviation Sector
Crisis Communication & BCM in Aviation Sector
 
Effectiveness of Disaster Management Ground Reality and Potential.
Effectiveness of Disaster Management Ground Reality and Potential.Effectiveness of Disaster Management Ground Reality and Potential.
Effectiveness of Disaster Management Ground Reality and Potential.
 

Recently uploaded

Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...
Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...
Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...
ssuserf63bd7
 
A comprehensive-study-of-biparjoy-cyclone-disaster-management-in-gujarat-a-ca...
A comprehensive-study-of-biparjoy-cyclone-disaster-management-in-gujarat-a-ca...A comprehensive-study-of-biparjoy-cyclone-disaster-management-in-gujarat-a-ca...
A comprehensive-study-of-biparjoy-cyclone-disaster-management-in-gujarat-a-ca...
Samirsinh Parmar
 
9 Ways Managers Kill Morale (and What to Do Instead)
9 Ways Managers Kill Morale (and What to Do Instead)9 Ways Managers Kill Morale (and What to Do Instead)
9 Ways Managers Kill Morale (and What to Do Instead)
experienceprosarah
 
Maximize Your Efficiency with This Comprehensive Project Management Platform ...
Maximize Your Efficiency with This Comprehensive Project Management Platform ...Maximize Your Efficiency with This Comprehensive Project Management Platform ...
Maximize Your Efficiency with This Comprehensive Project Management Platform ...
SOFTTECHHUB
 
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Alexey Krivitsky
 
m249-saw PMI To familiarize the soldier with the M249 Squad Automatic Weapon ...
m249-saw PMI To familiarize the soldier with the M249 Squad Automatic Weapon ...m249-saw PMI To familiarize the soldier with the M249 Squad Automatic Weapon ...
m249-saw PMI To familiarize the soldier with the M249 Squad Automatic Weapon ...
LinghuaKong2
 
Neal Elbaum Shares Top 5 Trends Shaping the Logistics Industry in 2024
Neal Elbaum Shares Top 5 Trends Shaping the Logistics Industry in 2024Neal Elbaum Shares Top 5 Trends Shaping the Logistics Industry in 2024
Neal Elbaum Shares Top 5 Trends Shaping the Logistics Industry in 2024
Neal Elbaum
 
team presentation of the role and responsibility of HSE teamreviewed.pptx
team presentation of the role and responsibility of HSE teamreviewed.pptxteam presentation of the role and responsibility of HSE teamreviewed.pptx
team presentation of the role and responsibility of HSE teamreviewed.pptx
ProsperOghalomeno1
 
Customer Relationship Managemenet’s Impact on Customer Satisfaction and Perfo...
Customer Relationship Managemenet’s Impact on Customer Satisfaction and Perfo...Customer Relationship Managemenet’s Impact on Customer Satisfaction and Perfo...
Customer Relationship Managemenet’s Impact on Customer Satisfaction and Perfo...
Istanbul Beykent University (İstanbul Beykent Üniversitesi)
 
From Concept to reality : Implementing Lean Managements DMAIC Methodology for...
From Concept to reality : Implementing Lean Managements DMAIC Methodology for...From Concept to reality : Implementing Lean Managements DMAIC Methodology for...
From Concept to reality : Implementing Lean Managements DMAIC Methodology for...
Rokibul Hasan
 
一比一原版(philau毕业证书)美国费城大学毕业证如何办理
一比一原版(philau毕业证书)美国费城大学毕业证如何办理一比一原版(philau毕业证书)美国费城大学毕业证如何办理
一比一原版(philau毕业证书)美国费城大学毕业证如何办理
nozaxy
 

Recently uploaded (11)

Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...
Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...
Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...
 
A comprehensive-study-of-biparjoy-cyclone-disaster-management-in-gujarat-a-ca...
A comprehensive-study-of-biparjoy-cyclone-disaster-management-in-gujarat-a-ca...A comprehensive-study-of-biparjoy-cyclone-disaster-management-in-gujarat-a-ca...
A comprehensive-study-of-biparjoy-cyclone-disaster-management-in-gujarat-a-ca...
 
9 Ways Managers Kill Morale (and What to Do Instead)
9 Ways Managers Kill Morale (and What to Do Instead)9 Ways Managers Kill Morale (and What to Do Instead)
9 Ways Managers Kill Morale (and What to Do Instead)
 
Maximize Your Efficiency with This Comprehensive Project Management Platform ...
Maximize Your Efficiency with This Comprehensive Project Management Platform ...Maximize Your Efficiency with This Comprehensive Project Management Platform ...
Maximize Your Efficiency with This Comprehensive Project Management Platform ...
 
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
 
m249-saw PMI To familiarize the soldier with the M249 Squad Automatic Weapon ...
m249-saw PMI To familiarize the soldier with the M249 Squad Automatic Weapon ...m249-saw PMI To familiarize the soldier with the M249 Squad Automatic Weapon ...
m249-saw PMI To familiarize the soldier with the M249 Squad Automatic Weapon ...
 
Neal Elbaum Shares Top 5 Trends Shaping the Logistics Industry in 2024
Neal Elbaum Shares Top 5 Trends Shaping the Logistics Industry in 2024Neal Elbaum Shares Top 5 Trends Shaping the Logistics Industry in 2024
Neal Elbaum Shares Top 5 Trends Shaping the Logistics Industry in 2024
 
team presentation of the role and responsibility of HSE teamreviewed.pptx
team presentation of the role and responsibility of HSE teamreviewed.pptxteam presentation of the role and responsibility of HSE teamreviewed.pptx
team presentation of the role and responsibility of HSE teamreviewed.pptx
 
Customer Relationship Managemenet’s Impact on Customer Satisfaction and Perfo...
Customer Relationship Managemenet’s Impact on Customer Satisfaction and Perfo...Customer Relationship Managemenet’s Impact on Customer Satisfaction and Perfo...
Customer Relationship Managemenet’s Impact on Customer Satisfaction and Perfo...
 
From Concept to reality : Implementing Lean Managements DMAIC Methodology for...
From Concept to reality : Implementing Lean Managements DMAIC Methodology for...From Concept to reality : Implementing Lean Managements DMAIC Methodology for...
From Concept to reality : Implementing Lean Managements DMAIC Methodology for...
 
一比一原版(philau毕业证书)美国费城大学毕业证如何办理
一比一原版(philau毕业证书)美国费城大学毕业证如何办理一比一原版(philau毕业证书)美国费城大学毕业证如何办理
一比一原版(philau毕业证书)美国费城大学毕业证如何办理
 

Importance of Risk alert services in Business Continuity Planning

  • 1. Importance of Risk alert services in Business Continuity Planning • Vishal Bargat- Sr. Vice President & Head-INDIA BU • Rahul Dev. Swarnkar– Operations Lead
  • 2. About CyberTech Systems & Software Ltd • A Leading provider of next-generation geospatial, infrastructure, enterprise applications and Risk Alert services • CMMi Level 3 and ISO 9001: 2008 Certified company • Global Risk Monitoring Center operating 24 x 7 catering to SAPAC Region
  • 3. • A Risk Alert provides relevant, timely, comprehensive and accurate information about all hazards incidents which might have an adverse impact on the asset location, business operations, employee and travel safety of an organization • A Risk Alert is the first step of BCP life cycle What is Risk Alert ?
  • 4. Importance of Risk Alerts in Business Continuity Planning Risk Alerts helps organization in its BCP by safeguarding its employees Risk Alert exposes all types of potential threats to an organization, how to handle and be prepared for them Risk Alert covers all relevant incidences along with its impact analysis for an organization, filtering uneventful news Risk Alerts provide lead time to plan and react during any emergency situation's
  • 6. formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio formation Information Information Information Information Information Information Information Information Information Information Information Informatio Importance of Relevant Information
  • 7. Obtaining Relevant Information Man + Machine Combination Primary Analyst Secondary Analyst
  • 8. Personalization of Location Settings & Alerts
  • 9. Comprehensive Risk Alerts Aviation Geophysical Hazmat Fire Infrastructure Labour Meteorological Security Structural Terrorism Transportation Advisory
  • 10. Proactive Risk Management Begins with the “Right” Information Develop Plans to Mitigate Risk  Create a detailed strategy for minimizing the impact  Different strategies are often necessary to accommodate the nature of the risk Be Informed of Disruption  What happened  When did it occur  Where did it occur  Analyze / After Action Reports  Relevant, timely and accurate information Identify the Sources of Potential Disruption  Active Shooter  Natural Disasters  Severe localized weather  Infrastructure failure – power outages  Labor actions – protests Assess the Impact of Disruption  Life & Safety  Financial implications  Duty of Care  Environmental  Business viability  Brand image and reputation Proactive vs. Reactive
  • 11. Automation of Alert Generation
  • 12. Consumption of Risk Alerts – Map
  • 13. Consumption of Risk Alerts – Email
  • 14. Consumption of Risk Alerts – Mobile Your Asset Location
  • 16. Risk Alert Services usage in GPS-Assisted Mobile Tracking App • Mobile App leveraging smartphone GPS technology should be able to consume Risk Alerts to provide on-the-go situational awareness to Key People of organization on their mobile app • Improve your ability to monitor, analyze, report, and respond to threats by equipping your Travelers, Expats, Executives and VIPs with mobile app • Personal proximity position-based perimeter alerting – warnings • Geo-fencing alarms An intelligent mobile app should be able to make better decisions and should have the ability to two-way communicate in critical times utilizing Risk Alerts
  • 17. Risk Alert Services usage in Tracking Employee Travel Employee safety during travel should be ensured utilizing Risk Alerts by delivering Actionable intelligence and analysis to the right people at the right time. • Each and every PNR should be tractable and ensure Employee safety of an organization • It should be a web based offering • It should give a clear picture of what all challenges one can expect while travel to a contrary based on Risk intelligence available. • Pre-trip advisories for travellers and managers consuming Risk Alerts.
  • 18. Risk Alert Usages during Vardah Cyclone - 2016 An idea Risk Alert System should have provided Advisory about arrival of Vardah Cyclone on 7th Dec, minimizing losses
  • 19. Vardah Cyclone not only impacted human lives but also wiped away $1-bn. An ideal Risk Alert service should provide 360º holistic view of the incident. It had catastrophic impact on below listed segments: • Power Outage • Network Outage • Road and Transportation • Aviation • Railways • Tourism • Agriculture The image tries to highlight no of unique updates available from various sources talking about disruption across categories Vardah Cyclone – Dec 2016 25 18 9 11 9 2 Advisory Storm Power outage Railways Aviation Transportation
  • 20. Risk Alert Usages during Chennai Flood – Dec 2015 An idea Risk Alert System should have provided Advisory about arrival of Chennai Flood on 6th Nov, highlighting low lying areas in Chennai (As shown in image above) which are prone to flood thus minimizing losses
  • 21. Chennai Flood not only impacted human lives but also wiped away ₹25000 Cr. An ideal Risk Alert service should provide 360º holistic view of the incident. It had catastrophic impact on below listed segments: • Power Outage • Network Outage • Road and Transportation • Aviation • Railways • Banking The image tries to highlight no of unique updates available from various sources talking about disruption across categories Chennai Flood – Nov 2015