SlideShare a Scribd company logo
1 of 33
Barbo Thöyrä
Owner of CeBeLOT
Barbro Thöyrä, MBA, holds certificates in ISO 22301 Master and Lead Auditor, ICT Disaster
Recovery Manager, ISO 28000 Provisional Implementer, PECB Certified Outsourcing Manager and DRI
Risk Management. She is an approved PECB and DRI trainer and BCI Instructor. She has several years of
experience as an IT manager, product manager and subject matter expert in
BCMS. She has worked as senior consultant, project management, IT architect, wrote manuals and
developed services within BCMS and CRM. Furthermore, she is a trainer in IT and BCMS and carried out
several international BCMS and IT projects as an expert and project manager.
Contact Information
+46 (0)708794652
info@cebelot.se
www.cebelot.se
https://se.linkedin.com/in/barbro-thöyrä-119b0427
General information
- About me
- Content of this webinar
- Duration of the webinar
- Questions
Content of this webinar
• Why do we need to document
• What is included in the documentation
• How is the documentation used
Why do we need to document
Because:
A plan highlights the dependencies to :
a) Internal support functions
b) External vendors
c) Information that the critical operations depend on
Support at critical decision making
Support response and recovery
Reduce the risks of serious financial, operational and
other impacts
When dealing with a disruptive incident, there are number of actions that may need to be considered.
These should be included in documented procedures and include:
a) responding to and assessing the incident:
b) evaluating the incident assessment against activation criteria for each of the procedures; c)declaring an
incident and activating the procedures when activation criteria have been met;
c) stabilization, continuity, resumption and recovery activities;
d) establishing and running the incident management location;
e) prioritizing issues and activities to be undertaken in managing the incident and its impacts;
f) controlling and coordinating all activated procedures;
g) activating or establishing alternate sites for the restoration of IT or other infrastructure capability and for the
temporary operation of the activities;
h) monitoring the incident as it progresses;
i) reviewing and adapting plans in response to changing circumstances;
j) standing down of plans and return to routine management as sustainable capability is re-established;
k) conducting a debrief and identifying learning opportunities; and
l) ensuring good governance and collation and security of documentation generated during the management
and recovery from the incident.
What is included in the documentation
Major plan components
 Reduction and
Prevention
 Response
 Recovery
 Restoration and
Return
– Risk Analysis
– Controls
– Vulnerability Corrections
– Business Impact Analysis
– Testing/exercise and training
– Initial Shock and Personnel Evacuation/Safety
– Damage Assessment and Security
– Notification and Disaster Declaration
– Assembly & movement to holding areas
– Vital Records and Critical Functions Recovery
– Transportation of essential personnel
– Resumption of critical business functions
– Recovery of essential support systems/technology
– Grow to full operational capacities
– Salvage operations and damage assessment
– Facilities restoration or reconstruction
– Restoration of all support functions/systems/technology
– Return to “business-as-usual”
EVENT
TIME
BCMS should at least contain:
1. Incident response plan;
2. Emergency response plan;
3. Crisis management plan;
4. Recovery plan;
5. Restoration plan;
6. Communication plan;
7. Training and awareness plan.
8. The business continuity organization
9. Escalation procedures
10. Notification Groups
11. Command Centers
The different plans should follow the same guidelines on the plan
development process, format, structure, etc.
Other documented plans could be:
Incident plan
Interruption plan
Disaster Recovery plan
Evacuation plan
Media response plan
Supplier service plan
The planning process should minimally intent to:
1. Appoint a responsible for the plan;
2. Define the strategy, approach, scope and the objectives of the plan;
3. Decide the structure, format and components of the plan;
4. Gather information to populate the plan;
5. Draft the plan and circulate the draft of the plan for consultation, review and
challenge;
6. Gather feedback and review from consultation of the stakeholders;
7. Publish the plan after formal approbation;
8. Use the plan in the operations;
9. Ongoing exercising, review, testing and maintenance of the plan to keep it
effective, update plan as appropriate.
4.Gather information to populate the plan;
a) objectives and measures of success in terms of prioritized activities;
b) activation criteria and procedures;
c) implementation procedures;
d) roles, responsibilities, and authorities;
e) communication requirements and procedures;
f) internal and external interdependencies and interactions;
g) resource requirements; and
h) information flow and documentation processes.
» Plan scope and objectives
» Major plan components - format and structure
1. BCMS Organisation
2. The BCMS Plan Structure
3. Planning assumptions
4. Scenario to execute plan, Disaster Definition
5. Escalation/Notification Procedures
6. Command Centers
» Crisis Management plan elements
» Emergency response plan element
» Business recovery organisation and responsibilities (Recovery Team Concept)
» Business recovery plan elements
Design and develop the BCMS plan:
Not included in the plan:
• Results of risk analysis
• Result of BIA
• Result of strategy analysis
• Result of exercises
• Business Continuity Planning considerations
• Each organisation is unique
• Tailored plan
• Design flexibility
• Business Continuity Planning concerns
• Minimised dependency on specific individuals
• Ensure establishment of critical decisions
• Minimised dependency on outside entities
• Ensure completeness
Design and develop the BCMS plans:
Design and develop the BCMS plan:
Plan Elements - Required Preparations
 People: Assignments, Responsibilities, & Training
 Sites: Selection and environmental preparation
 Data and Master Files: Inventory & Backup
 Software Systems: Inventory & Backup
 Application Systems: Inventory & Backup
 Hardware: inventory, agreements, documentation
 Communications: current, backup, & planned
Design and develop the BCMS plan:
Plan Elements - Required Preparations
 Transportation: emergency requirements
 Supplies: critical items - vendors
 Documentation: inventory & off-site backup
 Other equipment
 Vendor contracts, etc...
 Test plans
 ........
 ........
Design and develop the BCMS plan :
The teams concept
- Crisis Management
- Emergency Management Team
- Emergency Response Teams
o Damage assessment
o Real estate
- Recovery teams for critical business functions
o Facilities recovery teams
o Business functions recovery teams
o Supporting teams
- Teams formed by members from:
o Management
o Business unit personnel most familiar with critical business functions
to ensure effective recovery
The BCMS Plan
CLASSIC:
WHO - WHAT - WHEN - WHERE - HOW
Who will execute recovery actions
• Crisis Management Team
- Senior Management
- Plan Manager
- Public/Finance
• Emergency Management Team
• Response/Recovery teams
- Network operation teams
- Service operation teams
- Information system support teams
- Other teams
Recoveryteam,switch Recoveryteam,NMC Recoveryteam,IT RecovryTeam,CallCenter RecoveryTeam,NewServices
EmergencyManagement
CrisisManagement
What is needed to respond, recover business functions
“.....is the time between the point of disruption and the
point at which most critical functions must be
operational AND updated to current status.”
time
Recovery
of
Operations
Critical
Systems
Operational
with Current &
Accurate Data
Recovery Time Frame
The time within which Business Processes must be
restored at acceptable levels of operational capability to
minimize the impact of an outage
Point of
Disruption
When business functions and operations must recover
Where to go to recover business & operational functions
Detailed procedures for response and recovery
- how
Crisis
Management
Respons
team
Recovery
teams
Supporting
team
Emergency
management
Business continuity organization
Crisis
Management plan
Respons plan Recovery plan Supporting plan
Emergency
Management plan
Plan structure
How is the documentation used
Normal business
Incident
Crisis
Normal
org.
Crisis
org.
Implementing BCMS plans :
Disaster operations time line
Advance Warning
Crisis Occurs
Emergency Response
Recovery Effort
Restoration Effort
Resumption - Critical Functions
Return home
Personnel-oriented programs (evacuation and safety programs)
Escalation, notification, and plan activation
Vital records and off-site storage program
Data/information loss limitations
At response, recovery,
Exercising
Evidence of management preparedness for internal/external parties
Compliance with legal regulatory and governance requirements
How is the documentation used
Review
Organization changes
Major business process change
Changes of personal
IT services changes
Plan administration
THANK YOU
?
46 (0)708794652
info@cebelot.se
www.cebelot.se
https://se.linkedin.com/in/barbro-thöyrä-119b0427

More Related Content

What's hot

Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity ManagementECC International
 
Business Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBusiness Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBob Winkler
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity PlanningBharath Rao
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recoverymadunix
 
Business continuity overview slideshare
Business continuity overview slideshareBusiness continuity overview slideshare
Business continuity overview slideshareChris Greenhill
 
A Business Case for Establishing BCP
A Business Case for Establishing BCPA Business Case for Establishing BCP
A Business Case for Establishing BCPBusiness Beam
 
Business Continuity Planning Seminar
Business Continuity Planning SeminarBusiness Continuity Planning Seminar
Business Continuity Planning Seminarcmckinney
 
Audit report October 2017
Audit report October 2017Audit report October 2017
Audit report October 2017Yvette Coetzer
 
Bcm Roadmap
Bcm RoadmapBcm Roadmap
Bcm Roadmapbtrmuray
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017Atef Yassin
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity CapabilityRod Davis
 
Best-in-Class Crisis Preparation: Maximize Readiness with the Four T’s
Best-in-Class Crisis Preparation: Maximize Readiness with the Four T’sBest-in-Class Crisis Preparation: Maximize Readiness with the Four T’s
Best-in-Class Crisis Preparation: Maximize Readiness with the Four T’sMissionMode
 
Business Continuity Planning with Bareos and rear (Loadays 2015)
Business Continuity Planning with Bareos and rear (Loadays 2015)Business Continuity Planning with Bareos and rear (Loadays 2015)
Business Continuity Planning with Bareos and rear (Loadays 2015)Gratien D'haese
 
Business Continuity Planning: Documentation During EMR Downtime Webcast
Business Continuity Planning: Documentation During EMR Downtime WebcastBusiness Continuity Planning: Documentation During EMR Downtime Webcast
Business Continuity Planning: Documentation During EMR Downtime WebcastJulie Champagne
 
Pecha Kuch - BCP & DRP - By Balasubramanian P
Pecha Kuch - BCP & DRP - By Balasubramanian P Pecha Kuch - BCP & DRP - By Balasubramanian P
Pecha Kuch - BCP & DRP - By Balasubramanian P Compassites Navigator
 
Disaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanDisaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanMarcelo Silva
 
02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIA02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIABCM Institute
 

What's hot (20)

Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
Business Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBusiness Continuity Planning Presentation Overview
Business Continuity Planning Presentation Overview
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Bcp drp
Bcp drpBcp drp
Bcp drp
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recovery
 
Business continuity overview slideshare
Business continuity overview slideshareBusiness continuity overview slideshare
Business continuity overview slideshare
 
A Business Case for Establishing BCP
A Business Case for Establishing BCPA Business Case for Establishing BCP
A Business Case for Establishing BCP
 
Business Continuity Planning Seminar
Business Continuity Planning SeminarBusiness Continuity Planning Seminar
Business Continuity Planning Seminar
 
Audit report October 2017
Audit report October 2017Audit report October 2017
Audit report October 2017
 
Bcm Roadmap
Bcm RoadmapBcm Roadmap
Bcm Roadmap
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
 
Best-in-Class Crisis Preparation: Maximize Readiness with the Four T’s
Best-in-Class Crisis Preparation: Maximize Readiness with the Four T’sBest-in-Class Crisis Preparation: Maximize Readiness with the Four T’s
Best-in-Class Crisis Preparation: Maximize Readiness with the Four T’s
 
Business Continuity Planning with Bareos and rear (Loadays 2015)
Business Continuity Planning with Bareos and rear (Loadays 2015)Business Continuity Planning with Bareos and rear (Loadays 2015)
Business Continuity Planning with Bareos and rear (Loadays 2015)
 
Business Continuity Planning: Documentation During EMR Downtime Webcast
Business Continuity Planning: Documentation During EMR Downtime WebcastBusiness Continuity Planning: Documentation During EMR Downtime Webcast
Business Continuity Planning: Documentation During EMR Downtime Webcast
 
Pecha Kuch - BCP & DRP - By Balasubramanian P
Pecha Kuch - BCP & DRP - By Balasubramanian P Pecha Kuch - BCP & DRP - By Balasubramanian P
Pecha Kuch - BCP & DRP - By Balasubramanian P
 
Disaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanDisaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity Plan
 
Develop a Business Continuity Plan
Develop a Business Continuity PlanDevelop a Business Continuity Plan
Develop a Business Continuity Plan
 
Business Continuity Planning Presentation
Business Continuity Planning PresentationBusiness Continuity Planning Presentation
Business Continuity Planning Presentation
 
02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIA02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIA
 

Viewers also liked

Social Media Crisis Management - Flow Diagram
Social Media Crisis Management - Flow DiagramSocial Media Crisis Management - Flow Diagram
Social Media Crisis Management - Flow DiagramDr Matt McDougall
 
Топ 10 причин критических несоответствий при сертификации по ISO 22000
Топ 10 причин критических несоответствий при сертификации по ISO 22000Топ 10 причин критических несоответствий при сертификации по ISO 22000
Топ 10 причин критических несоответствий при сертификации по ISO 22000PECB
 
Cybersecurity on Business Resilience
Cybersecurity on Business ResilienceCybersecurity on Business Resilience
Cybersecurity on Business ResiliencePECB
 
How to select the best business continuity strategy and solution?
How to select the best business continuity strategy and solution?How to select the best business continuity strategy and solution?
How to select the best business continuity strategy and solution?PECB
 
Key Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System ImplementationKey Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System ImplementationPECB
 
How to better understand the context and the scope of the BCMS?
How to better understand the context and the scope of the BCMS?How to better understand the context and the scope of the BCMS?
How to better understand the context and the scope of the BCMS?PECB
 
Business Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationBusiness Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationPECB
 
We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?PECB
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsPECB
 
Best Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 SimultaneouslyBest Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 SimultaneouslyPECB
 
Organizational Resilience – How ISO 22316 Provides Guidance for Your Organiza...
Organizational Resilience – How ISO 22316 Provides Guidance for Your Organiza...Organizational Resilience – How ISO 22316 Provides Guidance for Your Organiza...
Organizational Resilience – How ISO 22316 Provides Guidance for Your Organiza...PECB
 
Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301PECB
 
La Gestión de Riesgos en las Tecnologías de la Información
La Gestión de Riesgos en las Tecnologías de la InformaciónLa Gestión de Riesgos en las Tecnologías de la Información
La Gestión de Riesgos en las Tecnologías de la InformaciónPECB
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032PECB
 
Managing the need for Laboratory Competence in the Food Supply Chain
Managing the need for Laboratory Competence in the Food Supply ChainManaging the need for Laboratory Competence in the Food Supply Chain
Managing the need for Laboratory Competence in the Food Supply ChainPECB
 
Contingency Planning Guide
Contingency Planning GuideContingency Planning Guide
Contingency Planning Guiderlynes
 
Crisis Management
Crisis Management Crisis Management
Crisis Management Brett Atwood
 

Viewers also liked (17)

Social Media Crisis Management - Flow Diagram
Social Media Crisis Management - Flow DiagramSocial Media Crisis Management - Flow Diagram
Social Media Crisis Management - Flow Diagram
 
Топ 10 причин критических несоответствий при сертификации по ISO 22000
Топ 10 причин критических несоответствий при сертификации по ISO 22000Топ 10 причин критических несоответствий при сертификации по ISO 22000
Топ 10 причин критических несоответствий при сертификации по ISO 22000
 
Cybersecurity on Business Resilience
Cybersecurity on Business ResilienceCybersecurity on Business Resilience
Cybersecurity on Business Resilience
 
How to select the best business continuity strategy and solution?
How to select the best business continuity strategy and solution?How to select the best business continuity strategy and solution?
How to select the best business continuity strategy and solution?
 
Key Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System ImplementationKey Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System Implementation
 
How to better understand the context and the scope of the BCMS?
How to better understand the context and the scope of the BCMS?How to better understand the context and the scope of the BCMS?
How to better understand the context and the scope of the BCMS?
 
Business Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationBusiness Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS Implementation
 
We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile Environments
 
Best Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 SimultaneouslyBest Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
 
Organizational Resilience – How ISO 22316 Provides Guidance for Your Organiza...
Organizational Resilience – How ISO 22316 Provides Guidance for Your Organiza...Organizational Resilience – How ISO 22316 Provides Guidance for Your Organiza...
Organizational Resilience – How ISO 22316 Provides Guidance for Your Organiza...
 
Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301
 
La Gestión de Riesgos en las Tecnologías de la Información
La Gestión de Riesgos en las Tecnologías de la InformaciónLa Gestión de Riesgos en las Tecnologías de la Información
La Gestión de Riesgos en las Tecnologías de la Información
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
Managing the need for Laboratory Competence in the Food Supply Chain
Managing the need for Laboratory Competence in the Food Supply ChainManaging the need for Laboratory Competence in the Food Supply Chain
Managing the need for Laboratory Competence in the Food Supply Chain
 
Contingency Planning Guide
Contingency Planning GuideContingency Planning Guide
Contingency Planning Guide
 
Crisis Management
Crisis Management Crisis Management
Crisis Management
 

Similar to Is it Necessary to Document the BCMS plan?

IT Business Continuity Planning 2004
IT Business Continuity Planning 2004IT Business Continuity Planning 2004
IT Business Continuity Planning 2004Donald E. Hester
 
TCG Svcs Pres 2011
TCG Svcs Pres 2011TCG Svcs Pres 2011
TCG Svcs Pres 2011mcourton
 
Business recovery with Smart Strategies
Business recovery with Smart StrategiesBusiness recovery with Smart Strategies
Business recovery with Smart StrategiesPECB
 
How to Create an Effective Business Continuity Program
How to Create an Effective Business Continuity ProgramHow to Create an Effective Business Continuity Program
How to Create an Effective Business Continuity ProgramAl Abbas, PMP, CISSP, MBA, MSc
 
Energy Consulting SDVOSB Organizational Assessment
Energy Consulting SDVOSB Organizational AssessmentEnergy Consulting SDVOSB Organizational Assessment
Energy Consulting SDVOSB Organizational Assessmentgasanden
 
Energy Consulting SDVOSB Organizational Assessment
Energy Consulting SDVOSB Organizational AssessmentEnergy Consulting SDVOSB Organizational Assessment
Energy Consulting SDVOSB Organizational AssessmentLink Resources
 
Energy Consulting SDVOSB Organizational Assessment
Energy Consulting SDVOSB Organizational AssessmentEnergy Consulting SDVOSB Organizational Assessment
Energy Consulting SDVOSB Organizational Assessmentnatalyabelmont
 
SAP Organizational Change Management
SAP Organizational Change Management SAP Organizational Change Management
SAP Organizational Change Management Christophe Lastennet
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Goutama Bachtiar
 
BCP – How to develop BCP strategies and Plans 2016.pptx
BCP – How to develop BCP strategies and Plans 2016.pptxBCP – How to develop BCP strategies and Plans 2016.pptx
BCP – How to develop BCP strategies and Plans 2016.pptxFerriFatra1
 
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...360 BSI
 
Recovery and Compliance Services provided by Tom Bronack
Recovery and Compliance Services provided by Tom BronackRecovery and Compliance Services provided by Tom Bronack
Recovery and Compliance Services provided by Tom BronackThomas Bronack
 
BSBMGT517Manage operational plan1Housekeepin
BSBMGT517Manage operational plan1HousekeepinBSBMGT517Manage operational plan1Housekeepin
BSBMGT517Manage operational plan1HousekeepinVannaSchrader3
 
Optimizing the IT and Business Environment
Optimizing the IT and Business EnvironmentOptimizing the IT and Business Environment
Optimizing the IT and Business EnvironmentThomas Bronack
 
Dcag service optimization offering01
Dcag service optimization offering01Dcag service optimization offering01
Dcag service optimization offering01Thomas Bronack
 
BCM Roadmap
BCM RoadmapBCM Roadmap
BCM Roadmapbtrmuray
 
5. project activity and risk planning
5. project activity and risk planning5. project activity and risk planning
5. project activity and risk planningJeanette C. Patindol
 

Similar to Is it Necessary to Document the BCMS plan? (20)

IT Business Continuity Planning 2004
IT Business Continuity Planning 2004IT Business Continuity Planning 2004
IT Business Continuity Planning 2004
 
TCG Svcs Pres 2011
TCG Svcs Pres 2011TCG Svcs Pres 2011
TCG Svcs Pres 2011
 
Business recovery with Smart Strategies
Business recovery with Smart StrategiesBusiness recovery with Smart Strategies
Business recovery with Smart Strategies
 
How to Create an Effective Business Continuity Program
How to Create an Effective Business Continuity ProgramHow to Create an Effective Business Continuity Program
How to Create an Effective Business Continuity Program
 
Energy Consulting SDVOSB Organizational Assessment
Energy Consulting SDVOSB Organizational AssessmentEnergy Consulting SDVOSB Organizational Assessment
Energy Consulting SDVOSB Organizational Assessment
 
Energy Consulting SDVOSB Organizational Assessment
Energy Consulting SDVOSB Organizational AssessmentEnergy Consulting SDVOSB Organizational Assessment
Energy Consulting SDVOSB Organizational Assessment
 
Energy Consulting SDVOSB Organizational Assessment
Energy Consulting SDVOSB Organizational AssessmentEnergy Consulting SDVOSB Organizational Assessment
Energy Consulting SDVOSB Organizational Assessment
 
BiznetGio Presentation Business Continuity
BiznetGio Presentation Business ContinuityBiznetGio Presentation Business Continuity
BiznetGio Presentation Business Continuity
 
SAP Organizational Change Management
SAP Organizational Change Management SAP Organizational Change Management
SAP Organizational Change Management
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)
 
BCP – How to develop BCP strategies and Plans 2016.pptx
BCP – How to develop BCP strategies and Plans 2016.pptxBCP – How to develop BCP strategies and Plans 2016.pptx
BCP – How to develop BCP strategies and Plans 2016.pptx
 
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
 
Recovery and Compliance Services provided by Tom Bronack
Recovery and Compliance Services provided by Tom BronackRecovery and Compliance Services provided by Tom Bronack
Recovery and Compliance Services provided by Tom Bronack
 
BSBMGT517Manage operational plan1Housekeepin
BSBMGT517Manage operational plan1HousekeepinBSBMGT517Manage operational plan1Housekeepin
BSBMGT517Manage operational plan1Housekeepin
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
ATCO-BaasKaar Roadmap to SAP Quality Award 2014
ATCO-BaasKaar Roadmap to SAP Quality Award 2014ATCO-BaasKaar Roadmap to SAP Quality Award 2014
ATCO-BaasKaar Roadmap to SAP Quality Award 2014
 
Optimizing the IT and Business Environment
Optimizing the IT and Business EnvironmentOptimizing the IT and Business Environment
Optimizing the IT and Business Environment
 
Dcag service optimization offering01
Dcag service optimization offering01Dcag service optimization offering01
Dcag service optimization offering01
 
BCM Roadmap
BCM RoadmapBCM Roadmap
BCM Roadmap
 
5. project activity and risk planning
5. project activity and risk planning5. project activity and risk planning
5. project activity and risk planning
 

More from PECB

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemPECB
 

More from PECB (20)

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management system
 

Recently uploaded

AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 

Recently uploaded (20)

AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 

Is it Necessary to Document the BCMS plan?

  • 1.
  • 2. Barbo Thöyrä Owner of CeBeLOT Barbro Thöyrä, MBA, holds certificates in ISO 22301 Master and Lead Auditor, ICT Disaster Recovery Manager, ISO 28000 Provisional Implementer, PECB Certified Outsourcing Manager and DRI Risk Management. She is an approved PECB and DRI trainer and BCI Instructor. She has several years of experience as an IT manager, product manager and subject matter expert in BCMS. She has worked as senior consultant, project management, IT architect, wrote manuals and developed services within BCMS and CRM. Furthermore, she is a trainer in IT and BCMS and carried out several international BCMS and IT projects as an expert and project manager. Contact Information +46 (0)708794652 info@cebelot.se www.cebelot.se https://se.linkedin.com/in/barbro-thöyrä-119b0427
  • 3. General information - About me - Content of this webinar - Duration of the webinar - Questions
  • 4. Content of this webinar • Why do we need to document • What is included in the documentation • How is the documentation used
  • 5. Why do we need to document
  • 6. Because: A plan highlights the dependencies to : a) Internal support functions b) External vendors c) Information that the critical operations depend on Support at critical decision making Support response and recovery Reduce the risks of serious financial, operational and other impacts
  • 7. When dealing with a disruptive incident, there are number of actions that may need to be considered. These should be included in documented procedures and include: a) responding to and assessing the incident: b) evaluating the incident assessment against activation criteria for each of the procedures; c)declaring an incident and activating the procedures when activation criteria have been met; c) stabilization, continuity, resumption and recovery activities; d) establishing and running the incident management location; e) prioritizing issues and activities to be undertaken in managing the incident and its impacts; f) controlling and coordinating all activated procedures; g) activating or establishing alternate sites for the restoration of IT or other infrastructure capability and for the temporary operation of the activities; h) monitoring the incident as it progresses; i) reviewing and adapting plans in response to changing circumstances; j) standing down of plans and return to routine management as sustainable capability is re-established; k) conducting a debrief and identifying learning opportunities; and l) ensuring good governance and collation and security of documentation generated during the management and recovery from the incident.
  • 8. What is included in the documentation
  • 9. Major plan components  Reduction and Prevention  Response  Recovery  Restoration and Return – Risk Analysis – Controls – Vulnerability Corrections – Business Impact Analysis – Testing/exercise and training – Initial Shock and Personnel Evacuation/Safety – Damage Assessment and Security – Notification and Disaster Declaration – Assembly & movement to holding areas – Vital Records and Critical Functions Recovery – Transportation of essential personnel – Resumption of critical business functions – Recovery of essential support systems/technology – Grow to full operational capacities – Salvage operations and damage assessment – Facilities restoration or reconstruction – Restoration of all support functions/systems/technology – Return to “business-as-usual” EVENT TIME
  • 10. BCMS should at least contain: 1. Incident response plan; 2. Emergency response plan; 3. Crisis management plan; 4. Recovery plan; 5. Restoration plan; 6. Communication plan; 7. Training and awareness plan. 8. The business continuity organization 9. Escalation procedures 10. Notification Groups 11. Command Centers The different plans should follow the same guidelines on the plan development process, format, structure, etc.
  • 11. Other documented plans could be: Incident plan Interruption plan Disaster Recovery plan Evacuation plan Media response plan Supplier service plan
  • 12. The planning process should minimally intent to: 1. Appoint a responsible for the plan; 2. Define the strategy, approach, scope and the objectives of the plan; 3. Decide the structure, format and components of the plan; 4. Gather information to populate the plan; 5. Draft the plan and circulate the draft of the plan for consultation, review and challenge; 6. Gather feedback and review from consultation of the stakeholders; 7. Publish the plan after formal approbation; 8. Use the plan in the operations; 9. Ongoing exercising, review, testing and maintenance of the plan to keep it effective, update plan as appropriate.
  • 13. 4.Gather information to populate the plan; a) objectives and measures of success in terms of prioritized activities; b) activation criteria and procedures; c) implementation procedures; d) roles, responsibilities, and authorities; e) communication requirements and procedures; f) internal and external interdependencies and interactions; g) resource requirements; and h) information flow and documentation processes.
  • 14. » Plan scope and objectives » Major plan components - format and structure 1. BCMS Organisation 2. The BCMS Plan Structure 3. Planning assumptions 4. Scenario to execute plan, Disaster Definition 5. Escalation/Notification Procedures 6. Command Centers » Crisis Management plan elements » Emergency response plan element » Business recovery organisation and responsibilities (Recovery Team Concept) » Business recovery plan elements Design and develop the BCMS plan:
  • 15. Not included in the plan: • Results of risk analysis • Result of BIA • Result of strategy analysis • Result of exercises
  • 16. • Business Continuity Planning considerations • Each organisation is unique • Tailored plan • Design flexibility • Business Continuity Planning concerns • Minimised dependency on specific individuals • Ensure establishment of critical decisions • Minimised dependency on outside entities • Ensure completeness Design and develop the BCMS plans:
  • 17. Design and develop the BCMS plan: Plan Elements - Required Preparations  People: Assignments, Responsibilities, & Training  Sites: Selection and environmental preparation  Data and Master Files: Inventory & Backup  Software Systems: Inventory & Backup  Application Systems: Inventory & Backup  Hardware: inventory, agreements, documentation  Communications: current, backup, & planned
  • 18. Design and develop the BCMS plan: Plan Elements - Required Preparations  Transportation: emergency requirements  Supplies: critical items - vendors  Documentation: inventory & off-site backup  Other equipment  Vendor contracts, etc...  Test plans  ........  ........
  • 19. Design and develop the BCMS plan : The teams concept - Crisis Management - Emergency Management Team - Emergency Response Teams o Damage assessment o Real estate - Recovery teams for critical business functions o Facilities recovery teams o Business functions recovery teams o Supporting teams - Teams formed by members from: o Management o Business unit personnel most familiar with critical business functions to ensure effective recovery
  • 20. The BCMS Plan CLASSIC: WHO - WHAT - WHEN - WHERE - HOW
  • 21. Who will execute recovery actions • Crisis Management Team - Senior Management - Plan Manager - Public/Finance • Emergency Management Team • Response/Recovery teams - Network operation teams - Service operation teams - Information system support teams - Other teams Recoveryteam,switch Recoveryteam,NMC Recoveryteam,IT RecovryTeam,CallCenter RecoveryTeam,NewServices EmergencyManagement CrisisManagement
  • 22. What is needed to respond, recover business functions
  • 23. “.....is the time between the point of disruption and the point at which most critical functions must be operational AND updated to current status.” time Recovery of Operations Critical Systems Operational with Current & Accurate Data Recovery Time Frame The time within which Business Processes must be restored at acceptable levels of operational capability to minimize the impact of an outage Point of Disruption When business functions and operations must recover
  • 24. Where to go to recover business & operational functions
  • 25. Detailed procedures for response and recovery - how
  • 27. Crisis Management plan Respons plan Recovery plan Supporting plan Emergency Management plan Plan structure
  • 28. How is the documentation used
  • 30. Implementing BCMS plans : Disaster operations time line Advance Warning Crisis Occurs Emergency Response Recovery Effort Restoration Effort Resumption - Critical Functions Return home
  • 31. Personnel-oriented programs (evacuation and safety programs) Escalation, notification, and plan activation Vital records and off-site storage program Data/information loss limitations At response, recovery, Exercising Evidence of management preparedness for internal/external parties Compliance with legal regulatory and governance requirements How is the documentation used
  • 32. Review Organization changes Major business process change Changes of personal IT services changes Plan administration