Greater awareness in recent years of the volatility of the risk environment, together with the regulatory impetus provided by
corporate governance requirements, has placed effective risk management high on the corporate agenda. Changing attitudes
to risk management have also resulted in the emergence of a more holistic and proactive approach to managing exposures.
The Cloud Computing offers various benefits for the businesses. Here are some of the key factors for SMB's must consider all these aspects before Cloud implementations.
How to leverage BCP/DR for your Info Sec ProgramMoey
In the beginning, every Information Security professional learns about the triad: Confidentiality, Integrity, and Availability. As you grew so did your skills; you learned about controls, frameworks, compliance, and how to test your systems/applications to ensure that all your bits and bytes were safe. But what happened to the Availability? It seems that in the journey of becoming an information security professional, we stopped focusing on a third of the basic principles of Information Security.
This presentation will discuss why Availability goes well beyond DoS. It will discuss how to leverage BCP/DR for the benefit of your information security program by:
• Learning in depth the critical portions of your organizations
• Bringing your risk approach to other highly visible initiatives
• Allowing you to collaborate with teams
• Exposing you to business Executives
Greater awareness in recent years of the volatility of the risk environment, together with the regulatory impetus provided by
corporate governance requirements, has placed effective risk management high on the corporate agenda. Changing attitudes
to risk management have also resulted in the emergence of a more holistic and proactive approach to managing exposures.
The Cloud Computing offers various benefits for the businesses. Here are some of the key factors for SMB's must consider all these aspects before Cloud implementations.
How to leverage BCP/DR for your Info Sec ProgramMoey
In the beginning, every Information Security professional learns about the triad: Confidentiality, Integrity, and Availability. As you grew so did your skills; you learned about controls, frameworks, compliance, and how to test your systems/applications to ensure that all your bits and bytes were safe. But what happened to the Availability? It seems that in the journey of becoming an information security professional, we stopped focusing on a third of the basic principles of Information Security.
This presentation will discuss why Availability goes well beyond DoS. It will discuss how to leverage BCP/DR for the benefit of your information security program by:
• Learning in depth the critical portions of your organizations
• Bringing your risk approach to other highly visible initiatives
• Allowing you to collaborate with teams
• Exposing you to business Executives
Building business continuity through risk management
Presented by Kimberley Hart
Monday 10th October 2016
APM North West branch and Risk SIG conference
Alderley Park, Macclesfield
Jason Teo Supply Chain Business Continuity Management Case Study in Infineon ...BCM Institute
Jason Teo, Senior Director Business Continuity Asia & Japan region share his experiences through supply chain resiliency awareness training and Infineon employees are aware of the potential disruption risks associated with transport and logistics operations and the steps necessary to minimize these risks during the World Continuity Congress (WCC) Singapore 22 April 2014 at Carlton Hotel. Copyright 2014 @ World Continuity Congress www.worldcontinuitycongress.com BCM Institute www.bcm-institute.org Read more of Jason Teo @ http://www.bcmpedia.org/wiki/Jason_Teo
Risk Management - Business Continuity Planning and ManagementCody Shive
This presentation outlines the basics behind Business Continuity planning and management. Targeted to CEO's, CFO's and CIO's, this presentation emphasizes the processes and the need to make BCP/M part of the Enterprise's fabric.
Business Continuity Management (BCM) is a capability to identify potential impacts that threaten objectives to effective response and safeguard the interests of its key stakeholders and customers. The implemention of a BCM programme requires the establishment of building blocks to ensure a sustained and executable response plans.
Building blocks to implement an effective BCM programme:
Block 1 – Governance and Accountability
Block 2 – Defining BCM strategies
Block 3 – Constitute team for a disruptive event
Block 4 – Assurance / Compliance and Integration
Block 5 – Embedding and continuous improvement
This presentation introduced blocking buildings to effectively and efficient implement your BCM programme. It highlighted key lessons learnt and that may assist you the development of your BCM programme.
This file was presented by me during the study circle meeting at the Mangalore Branch of Southern India Regional Council of the Institute of Chartered Accountants of India.
A short presentation of the essentials of business continuity planning. Often put on the back burner because it's seems too complex. Whereas the principles are quite straightforward.
A flagship CTO event, this has grown into a platform for knowledge-sharing among peer groups steering ICT projects in e-delivery of health care, education and governance. This Forum echoes the Commonwealth's 2013 theme: The Road Ahead for Africa.
The public sector, comprising various levels of
ministries and agencies, is involved in modernising
and transforming their existing business structure
and service delivery. The need to invest and develop
infrastructures, including unifi ed communications,
embedded systems and network enablement tools,
is growing and becoming more important than ever.
As a result of this sudden technological movement
and initiative, the public sector is scrambling to plan
and execute them to ensure the highest level of
citizen satisfaction.
E-Government and E-Health Strategies by Mrs. Veronica Boateng,Director, Application Systems Ghana Information and Communications Technology Directorate (GICTeD)
Building business continuity through risk management
Presented by Kimberley Hart
Monday 10th October 2016
APM North West branch and Risk SIG conference
Alderley Park, Macclesfield
Jason Teo Supply Chain Business Continuity Management Case Study in Infineon ...BCM Institute
Jason Teo, Senior Director Business Continuity Asia & Japan region share his experiences through supply chain resiliency awareness training and Infineon employees are aware of the potential disruption risks associated with transport and logistics operations and the steps necessary to minimize these risks during the World Continuity Congress (WCC) Singapore 22 April 2014 at Carlton Hotel. Copyright 2014 @ World Continuity Congress www.worldcontinuitycongress.com BCM Institute www.bcm-institute.org Read more of Jason Teo @ http://www.bcmpedia.org/wiki/Jason_Teo
Risk Management - Business Continuity Planning and ManagementCody Shive
This presentation outlines the basics behind Business Continuity planning and management. Targeted to CEO's, CFO's and CIO's, this presentation emphasizes the processes and the need to make BCP/M part of the Enterprise's fabric.
Business Continuity Management (BCM) is a capability to identify potential impacts that threaten objectives to effective response and safeguard the interests of its key stakeholders and customers. The implemention of a BCM programme requires the establishment of building blocks to ensure a sustained and executable response plans.
Building blocks to implement an effective BCM programme:
Block 1 – Governance and Accountability
Block 2 – Defining BCM strategies
Block 3 – Constitute team for a disruptive event
Block 4 – Assurance / Compliance and Integration
Block 5 – Embedding and continuous improvement
This presentation introduced blocking buildings to effectively and efficient implement your BCM programme. It highlighted key lessons learnt and that may assist you the development of your BCM programme.
This file was presented by me during the study circle meeting at the Mangalore Branch of Southern India Regional Council of the Institute of Chartered Accountants of India.
A short presentation of the essentials of business continuity planning. Often put on the back burner because it's seems too complex. Whereas the principles are quite straightforward.
A flagship CTO event, this has grown into a platform for knowledge-sharing among peer groups steering ICT projects in e-delivery of health care, education and governance. This Forum echoes the Commonwealth's 2013 theme: The Road Ahead for Africa.
The public sector, comprising various levels of
ministries and agencies, is involved in modernising
and transforming their existing business structure
and service delivery. The need to invest and develop
infrastructures, including unifi ed communications,
embedded systems and network enablement tools,
is growing and becoming more important than ever.
As a result of this sudden technological movement
and initiative, the public sector is scrambling to plan
and execute them to ensure the highest level of
citizen satisfaction.
E-Government and E-Health Strategies by Mrs. Veronica Boateng,Director, Application Systems Ghana Information and Communications Technology Directorate (GICTeD)
Connecting UNDP through ICT is a newsletter highlighting enterprise ICT initiatives at the United Nations Development Programme to share with our strategic partners, stakeholders and clients.
2016 Moldova ICT Summit_ICT driven innovation for PS ModernizationCornelia_Amihalachioae
eGovernment Center's presentation at the 2016 Moldova ICT Summit. Council of Europe-organizd event. Summit Day 2. SESSION I. Internet Public Service Value in the Republic of Moldova
HSD presents a white paper discussing the digital transformation imperative faced by Australian government organisations and how agencies can respond using a 'lego approach' to enterprise technology and business applications.
Presentation on e-Kranti-25_03_2015_v8_1.pptxawadheishkumar
e-Kranti has been initiated with the vision of “Transforming e-Governance for Transforming Governance”. Its mission is “To ensure a Government-wide transformation by delivering Government services electronically to the citizens through integrated and interoperable systems via multiple modes, while ensuring efficiency, transparency and reliability of such services at affordable costs.”
Earlier Uttarakhand was thought as Cyber state but it is very far from being. The steps towards cyber state are week. People's awareness, participation and investment for infrastructure are poor. There is a great scope of ICT for agricultural development in the state.
Certified Crisis Management Professional Programme Brochure BCM Institute
Crisis Management (CM) is no longer only for those assigned to the task; it is for each and every person. Every experience of a disaster has shown how ordinary people have to rise to the challenges of a crisis, from securing the site of the incident and appraising the ground, to handling the media’s demands. The simplified version of the programme can be found here.
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...BCM Institute
Dr Goh shares his presentation on Building Your Organization Business Continuity Management Competency during the recent World Continuity Congress Malaysia 9 September 2014
Recent civil unrest in Thailand has attracted the attention of the global community. Kun Bhakorn will share his experiences with the recent civil unrest in Bangkok, Thailand and how financial institutions like Bangkok Bank are coping with resulting disruptions.
Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...BCM Institute
Implementing a group-wide BCM programme is always challenging. Stelios Aronis will share how Alpha Bank implemented BCMS for its subsidiaries in various countries. His presentation explains the methodology employed and critical points an organization should pay attention to when implementing a BCMS.
Paul Cheng Resilience and Emergency Management (HKIA)BCM Institute
Operations are paramount to function as an airport and resilience is considered fundamentally critical. Airport operation is always vulnerable to unforeseen or unplanned events, be it a major system failure, adverse weather or an aircraft incident. All these events can impede or bring any operation to a halt with very little or even without warning. Learn how Paul Cheng manages resilience and emergencies in a large international airport.
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
f you offer a service on the web, odds are that someone will abuse it. Be it an API, a SaaS, a PaaS, or even a static website, someone somewhere will try to figure out a way to use it to their own needs. In this talk we'll compare measures that are effective against static attackers and how to battle a dynamic attacker who adapts to your counter-measures.
About the Speaker
===============
Diogo Sousa, Engineering Manager @ Canonical
An opinionated individual with an interest in cryptography and its intersection with secure software development.
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Orkestra
UIIN Conference, Madrid, 27-29 May 2024
James Wilson, Orkestra and Deusto Business School
Emily Wise, Lund University
Madeline Smith, The Glasgow School of Art
Have you ever wondered how search works while visiting an e-commerce site, internal website, or searching through other types of online resources? Look no further than this informative session on the ways that taxonomies help end-users navigate the internet! Hear from taxonomists and other information professionals who have first-hand experience creating and working with taxonomies that aid in navigation, search, and discovery across a range of disciplines.
Acorn Recovery: Restore IT infra within minutesIP ServerOne
Introducing Acorn Recovery as a Service, a simple, fast, and secure managed disaster recovery (DRaaS) by IP ServerOne. A DR solution that helps restore your IT infra within minutes.
This presentation by Morris Kleiner (University of Minnesota), was made during the discussion “Competition and Regulation in Professions and Occupations” held at the Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found out at oe.cd/crps.
This presentation was uploaded with the author’s consent.
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Director General, MAMPU
1.
2. 1
CRISISANDDISASTER LEADERSHIP:
NAVIGATING THEPATHTOBUSINESS
CONTINUITY MANAGEMENT EXCELLENCE
Pullman Putrajaya Lakeside
7 October 2015
WORLD CONTINUITY CONGRESS
MALAYSIA 2015
DR. SUHAZIMAH BINTI DZAZALI
Deputy Director General (ICT)
Malaysian Administrative Modernisation And Management
Planning Unit (MAMPU), Prime Minister’s Department
3. 2
ONLINE SERVICES AS AN IMPROVEMENT TO
PUBLIC SECTOR SERVICE DELIVERY
MAMPU AGENCY
1Gov*Net
Online Services
Mobile
Services &
Apps
Digitisation
of Documents
Paperless
Government
Integrated
Services
Shared
Services
MTSA
my1Login
PUBLIC SECTOR INITIATIVES
Government
Agency Portal
Bank Portal Mobile Kiosk
Agency
Counter
1MOCC
MULTI-CHANNEL SERVICE
4. 3
GOVERNMENT ICT FOCUS AREA
Strengthening ICT
Governance
Strengthening
Service Delivery
System
Strengthening
Infrastructure &
Infostructure
Collaborative
Strategic
Increased
Capability, Capacity
& Competence
Compliance &
Reliability
Open Innovation &
Engagement
5. 4
CURRENT GOVERNMENT INITIATIVES TO COMBAT
SECURITY THREATS
Malaysia Government Security Operation Center (MyGSOC)
Government Computer Emergency Response Team (GCERT)
Government Public Key Infrastructure (GPKI)
Data Leakage Protection (DLP)
Malaysian Trustmark Public Sector Services (MTSA)
Business Continuity Management (BCM) Public Sector Agencies
Certification of Information Security Management System MS
ISO/IEC 27001:2007 and ISO/IEC 27001:2013
6. 5
COLLABORATIVE EFFORTS
• Effective internetworking between various government agencies in
the wake of modern APTs and Internet of Things (IoT)
Government
Agencies Industries
• PIKOM
• Open Gov Asia
International
Bodies
• United
Nations (UN)
• Open Data
Institute UK
Higher
Education
Institutions
• IPTA
• IPTS
Government
Link
Companies
• MDeC
• CyberSecurity
Malaysia
• MIMOS
• MCMC
• SIRIM
• MKN
• CGSO
7. 6
NEXT STEPS - GOVERNMENT INITIATIVES
OF CYBER SECURITY
Compliance
&
Relaibility
Digital ID
Comprehensive Framework
for Cyber Security Public
Sector
Strengthening the
monitoring & control of
cyber security incidents
through synergies MyGSOC
& GCERT
Strengthen and expand the
Data Leakage Protection
ISMS, BCM & DRP
acculturation
Extended Malaysian
Trustmark Public Sector
Services
Empower ICTSO
Extended implementation
of Information Security
Governance, Risk and
Compliance (ISGRC
8. 7
GOVERNMENT PROACTIVE INITIATIVES – BCM
Implementation Directive on
business continuity management in
Malaysian Public Sector
Directive from Director General
MAMPU Prime Minister’s
Department dated 22 January 2010
9. 8
GOVERNMENT IMPLEMENTATION – BCM
What MAMPU has done
Activities Year of Implementation
A BCM Planning 2010 2011 2012 2013 2014 2015
1 Establish a management structure
MAMPU
&
frontline agencies
“Critical service” agencies in public
sector
2 Management awareness session
3 Preparation of terms of reference
B Determining strategic business continuity management
1 Risk assessment
2 Business impact analysis
3 BCM strategy
C Plan Development
1 Preparation of Crisis Management Plan, Emergency
Response Plan, Disaster Recovery Plan & Communication
Plan
2 Establish alternative site
D Implementation of BCM
1 Awareness & training program
2 Testing & simulation program
3 Maintenance program
4 Audit
Statistics of BCM implemention
- 134 Govt. agencies
10. 9
RECENT FLOOD DISASTER
(20 – 31 December 2014)
Force majeure - flood hit in East Coast of Peninsular
Malaysia
The worst flood in decades
Hospital Kota Bharu badly affected The destruction of a school computer center
in Pahang
11. 10
IMPACT OF FLOOD DISASTER
Number of agency
affected
• Federal Govt.
agency - 246
• State agency - 36
Cost of Damage
(RM)
• Federal Govt.
agency - RM11.68
mil.
• State agency –
RM0.97 mil.
Cost of Recovery
(RM)
• Federal Govt.
agency -12.2 mil
• State agency – 1.3
mil.
DENIAL OF SHARED SERVICES
Government Network (1Gov*Net) – 439 Govt. agency offices
12. 11
Collaborative efforts:
Data recovery for servers, PC and laptops
Government network recovery, 1Gov@Net
BCM and DRP advisories
DISASTER RECOVERY STRATEGY
26 February 2015 (92.48%) 1Gov*Net recovery in
406 Govt. agency offices
13. 12
GOVERNMENT MONITORING INITIATIVES – BCM
- Government agencies to
review, test, simulate and
update BCP regularly
- BCM acculturation throughout
the Public Sector
14. 13
CONCLUSION
Government direction for Public Sector agencies
– Consolidation of Data Centre (DC) and Disaster
Recovery Centre (DRC) services
– BCP Audit Implementation
– ISO 22301 Certification
Disaster Recovery Center
services
Data center