SlideShare a Scribd company logo
IT Disaster Recovery
& Business Continuity
For SME (small to medium
enterprise) in Service Industry
Approach for IT-DR & Business Continuity
Business Depends on Trust
Business Depends on Information Technology
Sales&Marketing
IT
CustomerSupport
IT
Accounts&Finance
IT
Admin&Legal
IT
HRdept
IT
Procurement
IT
RandD
IT
I.T.
I.T Touches whole Business Process of Client Joining & Leaving
Enterprise Business
Clients joining
Enterprise
Clients leaving
Enterprise
Business Depends on Information Technology
Business Depends on Information Technology
Innovation in I.T is a great way to
SUCCESS in this digital age. e.g.
Digital marketing, Social, Mobility,
Analytics, Cloud Computing, IoT
Communication etc.
But like everything, I.T has a downside,
IT Risks, if not managed properly
Can lead to Disaster which results in
Business & Customer loss.
In the event of IT disaster, if business
Is not able to resume within reasonable time frame, downtime may
translate into financial losses.
Types of Disaster
1) Natural Disasters: A natural disaster is the effect of a natural hazard
(e.g. earthquake or landslide, fire, sandstorm, flood, tornado, hurricane,
volcano). It leads to financial, environmental or human losses.
2) Man-made Disasters: Resulting from man-made hazards (threats
having an element of human intent, negligence or error or involving a
failure of a man-made system).e.g. system failures, all new headlines for
cyber attacks, Ransomware.
Recent Headlines---man made disasters
WannaCry ransomware infected nearly
300,000 computers in more than 150
countries within just 72 hours on 12th
May
British Airways IT failure: experts doubt
'power surge' claim on 30th May
Disaster Impact may include……..
•Loss of Sales & Income
•Delayed Sales or Income
•Increased Expenses
•Customer Dissatisfaction or Defection
•Delay of New Business Plans
•Out of business
1
IT DR/BCP: How to do it….
Howto preservecritical business functionsin the faceof a disaster?
• Based on following International/UAE standards we have customized
methodology for RAK FTZ business environment.
• ISO22301:2012 Business Continuity Management Systems
• ISO27001:2013 Information Security Management System
• AE/HSC/NCEMA 7000:2015 Business Continuity Management Standard
(NationalEmergencyCrisisandDisastersManagementAuthority–U.A.E)
Business
Impact
Analysis
Risk
Assessment
Develop
Mitigation
Strategy
Develop
BC/DR Plan
Training,
Testing
Auditing
BC/DR Plan
Maintenance
1
IT DISASTER MANAGEMENT
COORDI-
NATION
COMMAND
CONTROL
COORD.
COORDI-
NATION
BEFORE DURING AFTER
PREVENTION
MITIGATION
PREPAREDNESS EMERGENCY
RESPONSE
RECOVERY
1
What is need…Management commitment
Commitment for the Project IT DR/BCP
Visible Involvement in program from Top Management
Resources and Activity control
Reduced risk
Process improvements
Improved organizational maturity
Improved availability and reliability
Marketplace advantage
Business Resilience
1
Benefits of I.T. DR/BCP
THANK YOU
Abhijeet.Upadeo (abhijeet.au@gmail.com)
Information Risk Enthusiast

More Related Content

What's hot

Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
Kathy Pelletier
 
Information Technology Disaster Planning
Information Technology Disaster PlanningInformation Technology Disaster Planning
Information Technology Disaster Planning
guest340570
 
IT Disaster Recovery Readiness
IT Disaster Recovery ReadinessIT Disaster Recovery Readiness
IT Disaster Recovery Readiness
Bashar Alkhatib
 
Disaster Recovery Planning PowerPoint Presentation Slides
Disaster Recovery Planning PowerPoint Presentation SlidesDisaster Recovery Planning PowerPoint Presentation Slides
Disaster Recovery Planning PowerPoint Presentation Slides
SlideTeam
 
Introduction to Business Continuity Management
Introduction to Business Continuity ManagementIntroduction to Business Continuity Management
Introduction to Business Continuity Management
Prof. David E. Alexander (UCL)
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
Narudom Roongsiriwong, CISSP
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery
EC-Council
 
IT-Centric Disaster Recovery & Business Continuity
IT-Centric Disaster Recovery & Business ContinuityIT-Centric Disaster Recovery & Business Continuity
IT-Centric Disaster Recovery & Business Continuity
Steve Susina
 
Bcp drp
Bcp drpBcp drp
Bcp drp
aqel aqel
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
Indeevari Ramanayake
 
Business continuity management system
Business continuity management systemBusiness continuity management system
Business continuity management system
subbusai82
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
Adv Prashant Mali
 
Disaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanDisaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity Plan
Marcelo Silva
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and Testing
Axcient
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017
Atef Yassin
 
Disaster recovery solution
Disaster recovery solutionDisaster recovery solution
Disaster recovery solution
Anton An
 
Disaster Recovery Plan
Disaster Recovery Plan Disaster Recovery Plan
Disaster Recovery Plan
Emilie Gray
 
Security posture: Dashboard Implementation through Wireframe
Security posture: Dashboard Implementation through WireframeSecurity posture: Dashboard Implementation through Wireframe
Security posture: Dashboard Implementation through Wireframe
Shriya Rai
 
Assess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAssess Your Business Continuity Management Process
Assess Your Business Continuity Management Process
Anand Subramaniam
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
mhdpaknejad
 

What's hot (20)

Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
 
Information Technology Disaster Planning
Information Technology Disaster PlanningInformation Technology Disaster Planning
Information Technology Disaster Planning
 
IT Disaster Recovery Readiness
IT Disaster Recovery ReadinessIT Disaster Recovery Readiness
IT Disaster Recovery Readiness
 
Disaster Recovery Planning PowerPoint Presentation Slides
Disaster Recovery Planning PowerPoint Presentation SlidesDisaster Recovery Planning PowerPoint Presentation Slides
Disaster Recovery Planning PowerPoint Presentation Slides
 
Introduction to Business Continuity Management
Introduction to Business Continuity ManagementIntroduction to Business Continuity Management
Introduction to Business Continuity Management
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery
 
IT-Centric Disaster Recovery & Business Continuity
IT-Centric Disaster Recovery & Business ContinuityIT-Centric Disaster Recovery & Business Continuity
IT-Centric Disaster Recovery & Business Continuity
 
Bcp drp
Bcp drpBcp drp
Bcp drp
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
Business continuity management system
Business continuity management systemBusiness continuity management system
Business continuity management system
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
Disaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanDisaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity Plan
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and Testing
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017
 
Disaster recovery solution
Disaster recovery solutionDisaster recovery solution
Disaster recovery solution
 
Disaster Recovery Plan
Disaster Recovery Plan Disaster Recovery Plan
Disaster Recovery Plan
 
Security posture: Dashboard Implementation through Wireframe
Security posture: Dashboard Implementation through WireframeSecurity posture: Dashboard Implementation through Wireframe
Security posture: Dashboard Implementation through Wireframe
 
Assess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAssess Your Business Continuity Management Process
Assess Your Business Continuity Management Process
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 

Similar to IT Disaster Recovery & Business Continuity

Understanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacksUnderstanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacks
Marie Wilcox
 
2009_NYC_OpRiskUSA_Conf
2009_NYC_OpRiskUSA_Conf2009_NYC_OpRiskUSA_Conf
2009_NYC_OpRiskUSA_Conf
Peter Poulos
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
Soetam Rizky
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
Tudor Damian
 
Dit yvol3iss20
Dit yvol3iss20Dit yvol3iss20
Dit yvol3iss20
Rick Lemieux
 
Cyber-attacks
Cyber-attacksCyber-attacks
Emerging Risks, BCP & DRP
Emerging Risks, BCP & DRPEmerging Risks, BCP & DRP
Emerging Risks, BCP & DRP
Jorge Sebastiao
 
Fm computer roomcleaningguide
Fm computer roomcleaningguideFm computer roomcleaningguide
Fm computer roomcleaningguide
server computer room cleaning
 
How IT Support In Connecticut Can Help.docx
How IT Support In Connecticut Can Help.docxHow IT Support In Connecticut Can Help.docx
How IT Support In Connecticut Can Help.docx
TheWalkerGroup1
 
JobCutsPresentation.pptx the is about Job cuts in IT Firm
JobCutsPresentation.pptx the is about Job cuts in IT FirmJobCutsPresentation.pptx the is about Job cuts in IT Firm
JobCutsPresentation.pptx the is about Job cuts in IT Firm
MohdAeliyaHaider
 
Mike Donoghue - NXD Ltd
Mike Donoghue - NXD LtdMike Donoghue - NXD Ltd
Mike Donoghue - NXD Ltd
NXD Ltd
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
CMR WORLD TECH
 
1. After a cyber attack, the organizational decision making and re.docx
1. After a cyber attack, the organizational decision making and re.docx1. After a cyber attack, the organizational decision making and re.docx
1. After a cyber attack, the organizational decision making and re.docx
jackiewalcutt
 
Business Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your BusinessBusiness Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your Business
at MicroFocus Italy ❖✔
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
Morgan Jones
 
The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses
First American Payment Systems
 
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
Digital transformation and the role of cloud computing   Capgemini Mark Skilt...Digital transformation and the role of cloud computing   Capgemini Mark Skilt...
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
Mark Skilton
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
PECB
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
SlideTeam
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
SlideTeam
 

Similar to IT Disaster Recovery & Business Continuity (20)

Understanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacksUnderstanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacks
 
2009_NYC_OpRiskUSA_Conf
2009_NYC_OpRiskUSA_Conf2009_NYC_OpRiskUSA_Conf
2009_NYC_OpRiskUSA_Conf
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
Dit yvol3iss20
Dit yvol3iss20Dit yvol3iss20
Dit yvol3iss20
 
Cyber-attacks
Cyber-attacksCyber-attacks
Cyber-attacks
 
Emerging Risks, BCP & DRP
Emerging Risks, BCP & DRPEmerging Risks, BCP & DRP
Emerging Risks, BCP & DRP
 
Fm computer roomcleaningguide
Fm computer roomcleaningguideFm computer roomcleaningguide
Fm computer roomcleaningguide
 
How IT Support In Connecticut Can Help.docx
How IT Support In Connecticut Can Help.docxHow IT Support In Connecticut Can Help.docx
How IT Support In Connecticut Can Help.docx
 
JobCutsPresentation.pptx the is about Job cuts in IT Firm
JobCutsPresentation.pptx the is about Job cuts in IT FirmJobCutsPresentation.pptx the is about Job cuts in IT Firm
JobCutsPresentation.pptx the is about Job cuts in IT Firm
 
Mike Donoghue - NXD Ltd
Mike Donoghue - NXD LtdMike Donoghue - NXD Ltd
Mike Donoghue - NXD Ltd
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
1. After a cyber attack, the organizational decision making and re.docx
1. After a cyber attack, the organizational decision making and re.docx1. After a cyber attack, the organizational decision making and re.docx
1. After a cyber attack, the organizational decision making and re.docx
 
Business Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your BusinessBusiness Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your Business
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
 
The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses
 
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
Digital transformation and the role of cloud computing   Capgemini Mark Skilt...Digital transformation and the role of cloud computing   Capgemini Mark Skilt...
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 

Recently uploaded

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 

Recently uploaded (20)

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 

IT Disaster Recovery & Business Continuity

  • 1. IT Disaster Recovery & Business Continuity For SME (small to medium enterprise) in Service Industry
  • 2. Approach for IT-DR & Business Continuity
  • 4. Business Depends on Information Technology
  • 5. Sales&Marketing IT CustomerSupport IT Accounts&Finance IT Admin&Legal IT HRdept IT Procurement IT RandD IT I.T. I.T Touches whole Business Process of Client Joining & Leaving Enterprise Business Clients joining Enterprise Clients leaving Enterprise Business Depends on Information Technology
  • 6. Business Depends on Information Technology Innovation in I.T is a great way to SUCCESS in this digital age. e.g. Digital marketing, Social, Mobility, Analytics, Cloud Computing, IoT Communication etc. But like everything, I.T has a downside, IT Risks, if not managed properly Can lead to Disaster which results in Business & Customer loss. In the event of IT disaster, if business Is not able to resume within reasonable time frame, downtime may translate into financial losses.
  • 7. Types of Disaster 1) Natural Disasters: A natural disaster is the effect of a natural hazard (e.g. earthquake or landslide, fire, sandstorm, flood, tornado, hurricane, volcano). It leads to financial, environmental or human losses. 2) Man-made Disasters: Resulting from man-made hazards (threats having an element of human intent, negligence or error or involving a failure of a man-made system).e.g. system failures, all new headlines for cyber attacks, Ransomware.
  • 8. Recent Headlines---man made disasters WannaCry ransomware infected nearly 300,000 computers in more than 150 countries within just 72 hours on 12th May British Airways IT failure: experts doubt 'power surge' claim on 30th May
  • 9. Disaster Impact may include…….. •Loss of Sales & Income •Delayed Sales or Income •Increased Expenses •Customer Dissatisfaction or Defection •Delay of New Business Plans •Out of business
  • 10. 1 IT DR/BCP: How to do it…. Howto preservecritical business functionsin the faceof a disaster? • Based on following International/UAE standards we have customized methodology for RAK FTZ business environment. • ISO22301:2012 Business Continuity Management Systems • ISO27001:2013 Information Security Management System • AE/HSC/NCEMA 7000:2015 Business Continuity Management Standard (NationalEmergencyCrisisandDisastersManagementAuthority–U.A.E) Business Impact Analysis Risk Assessment Develop Mitigation Strategy Develop BC/DR Plan Training, Testing Auditing BC/DR Plan Maintenance
  • 11. 1 IT DISASTER MANAGEMENT COORDI- NATION COMMAND CONTROL COORD. COORDI- NATION BEFORE DURING AFTER PREVENTION MITIGATION PREPAREDNESS EMERGENCY RESPONSE RECOVERY
  • 12. 1 What is need…Management commitment Commitment for the Project IT DR/BCP Visible Involvement in program from Top Management Resources and Activity control
  • 13. Reduced risk Process improvements Improved organizational maturity Improved availability and reliability Marketplace advantage Business Resilience 1 Benefits of I.T. DR/BCP