SlideShare a Scribd company logo
Barbro Thöyrä
16-09-15 2
General information
- About me
- Content of this webinar
- Duration of the webinar
- Questions
16-09-15 3
Disaster Recovery Problem Statement
• An internal or external event interrupts one or more of our
business processes
• Time -- the length of the interruption -- causes the
situation to become a disaster
16-09-15 4
Disaster Recovery Assumptions
• Major catastrophes, Not Daily Operational Problems
• Will Not Produce a “Business as Usual” environment
• The organization will Still Lose time and money in a
disaster
16-09-15 5
• Move an operational department, with NO WARNING!
and
• Recover Time-Sensitive business operations
– Without notice
– At another (remote?) location/facility
– With less capacity & capability
– Using only data stored Off-Site
– Within a designated recovery time frame
– Without some key personnel
The Disaster Recovery Challenge
16-09-15 6
Disaster
Emergency response
- immediate recovery
Recovery - critical
functions
Return
Home
Business Relocation
long term recovery in
new or semi-
permanent location
Hours Days Weeks
16-09-15 7
- Identify recovery strategies for the mission critical operations
using the BIA and Risk Evaluation
- Recommend strategies to meet the recovery objectives
identified in the BIA
- Perform a cost benefit analysis on the recommended strategies
Risk Assessment
Resources
vul. to risks
1. Identifying risks
2. Risk analysis
3. Risk judgement
List of critical
resources
16-09-15
Risk Category Asset/Element VulnerabilityReal Probability Controls Category
Power outage Critical applications H H M 1
Power outage Information prov. by computers H H M 1
Power outage Critical information/data H H M 1
Power outage Computer facilities H H M 1
Power outage Terminals H H M 1
Power outage Internal links (LAN,WAN) H H M 1
Power outage Documents/conf. information H H M 1
Power outage Operating systems H H M 1
Power outage Gateways H H M 1
Fire Information prov. by computers H H M 1
Fire Critical information/data H H M 1
Fire Computer facilities H H M 1
Fire Terminals H H M 1
Fire Internal links (LAN,WAN) H H M 1
Fire Documents/conf. information H H M 1
Fire Operating systems H H M 1
Fire Gateways H H M 1
Fire Maintenance activities H H M 1
Software failure Daily operations H M M 1
Software failure Customer care H M M 1
Hacker Information prov. by computers H M M 1
Fire Failure indicators H L S 2
Fire Air condition H L S 2
Cable cut to switch Daily operation H L S 2
Cable cut to switch Customer care H L S 2
Major accidents Critical applications H L S 2
Major accidents Information prov. by computers H L S 2
Major accidents Critical information/data H L S 2
16-09-15 10
Operational Impacts of Outage
Customer Impacts of Outage
Financial Impacts of Outage
Legal/Regulatory Impacts of Outage
Other Impacts of Outage
Recovery Time Objectives
Business Unit Recovery Priorities
Recovery Requirements/Resources
Vital Records
Establish
Determine
Business Impact Analysis (BIA)
16-09-15 11
0
5,000,000
10,000,000
15,000,000
20,000,000
25,000,000
30,000,000
35,000,000
< Day
1
Day 1 Day 2 Day 3 Day 4 Day 5 Week 1 Week 2 Week 3 Week 4 > Week
4
USD
Cumulative financial impacts, example
Lost Sales
16-09-15 12
“.....is the time between the point of disruption and the
point at which most critical systems must be
operational AND updated to current status.”
time
Recovery
of
Operations
Critical
Systems
Operational
with Current &
Accurate Data
Recovery Time Frame
The time within which Business Processes must
be recovered at acceptable levels of operational
capability to minimize the impact of an outage
Point of
Disruption
Recovery Time Frame (RTO)
16-09-15 13
Some parameters for estimation of RTO:
• Complexity of recovery
• Impacts on customers
• Financial impacts
• Impacts on operations, how long can a site/node be idle
• Any recovery strategies in place?
• Any work around procedures?
• The amount of back-logg in case of an outage (RPO)
Recovery Time Frame (RTO)
16-09-15 14
Major points to consider :
• Recovery of critical business functions
• Business recovery requirement priorities
• Minimization of losses
• Time frame for the recovery – RTO
• Service level desired within the RTO (100% not realistic)
• Stepwise recovery
• Recovery resources
• Cost/Benefit of Recovery solution
• Requirements of the Recovery solution(s)
16-09-15 15
Recovery
time
Recovery
investment
$
Recovery
cost
$
Continuous
process
Hot site
Mobile
site
Cold site
Manual
procedures
Do nothing
Disaster Recovery strategies
Redundant
Hot Site
Mobile Site
Cold Site
Withdraw service
Do nothing
16-09-15 16
Recovery Strategies
Service degradation:
• No recovery strategy
• Manual procedures – work around
• Reduce service response
• Withdrawal of service
• Staff working from home
16-09-15 17
Recovery strategies
Internal/extrenal strategies:
1. Internal back-up facilities
2. Hot site
3. Warm site
4. Mobil site
5. Cold/shell site
6. Reciprocal agreements
7. Third party service vendor
8. Cloud
9. Investigate usage of other internal facilities
16-09-15 18
Develop vital record and work in
progress recovery strategies
16-09-15 19
Considerations when choosing recovery location:
 Threats
 Access control
 Facility security
 Dedicated areas
 Environmental control
 CC (EOC)
 Restricted facilities
 Others
16-09-15 20
 Natural hazards
 Weather changes
 Industrial and commercial hazards
 Accessibility
 Alternate routes
 Shared premises
 Public utilities
 Cabling infrastructure
 Risk mitigation
Threats
16-09-15 21
Access control:
- Selective restriction of entry and exit of users into or out of the area
- Personal security categoies
- Security zones
Facility security :
- Physical building
- Exterior/interior
- Alarm system
Dedicated areas:
- Recovery room
- Assambly areas
16-09-15 22
Environmental control:
- Temperature
- Ventilation
- Humidity
- Vibration and noise
EOC:
Restricted facilities:
- Authorized access for designated
purposes
Others:
• Telecommunication
• Power supply
• Fire protction
• Cabling
• Rest areas
• Parking areas
• Medical care
• Food and drink
• Testing
• Life Cycle
• Vendors
• Outsoursing
16-09-15 23
Compare internal/external solutions
a. Advantages
b. Disadvantages
c. Costs (startup, maintenance
and execution)
e. Mitigation capability and control options
f. Ability to meet defined RTO and RPO
16-09-15 24
Prerequisites for mobile sites:
• Transmission connection points at each site
• Possible parking places are at the IT center
• Power supply (generators)
• Off-site storage and suitable back-up regime
16-09-15 25
100%
West
Middle
East
North
10 %
18 %
27 %
36 %
Transport
4 hours
West&East
Transport
10 hours
Mid&North
• Part 1,2,3,4 of transmission up
• SDH backbone
• Far end transmission up
• Start the switches
• RBS reloaded,
• Switches loaded, HLR loaded
• Test, 8hours
Activate teams
2 hours
12,12,12,12
hours
6 hours
32 44 50 62 Hours
‘Cold Site’
For 5 HLR and 5 SCPs
HLR-redundancy (0 hours)
or
‘Warm site’ HLR (3 hours)
or
Mobile HLR (6 hours at site)
Enough capacity in
other GMSCs in the network
16-09-15 26
Activation and Deactivation
Response plan
Recovery plan
Restoration plan
16-09-15 27
Exercise/test
If you do not exercise your plan you do not
have any…..
Only 30% of the companies exercise their
plans…...
Plan for the worst,
exercise for the rest!
16-09-15 28
...in case of
a disaster?

More Related Content

Similar to PECB Webinar: Implementing Effective Disaster Recovery Strategies – ISO/IEC 24762

Disaster Recovery vs. Business Continuity
Disaster Recovery vs. Business ContinuityDisaster Recovery vs. Business Continuity
Disaster Recovery vs. Business Continuity
RapidScale
 
Engineering plant facilities 12 mechanics building preventive maintenance and...
Engineering plant facilities 12 mechanics building preventive maintenance and...Engineering plant facilities 12 mechanics building preventive maintenance and...
Engineering plant facilities 12 mechanics building preventive maintenance and...
Luis Cabrera
 
Bcp
BcpBcp
Bcp
madunix
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR Presentation
Andrew Miller
 
Lessons Learned from AMI Deployments and Asset Management Readiness
Lessons Learned from AMI Deployments and Asset Management ReadinessLessons Learned from AMI Deployments and Asset Management Readiness
Lessons Learned from AMI Deployments and Asset Management Readiness
TESCO - The Eastern Specialty Company
 
European Data Centre Standards
European Data Centre StandardsEuropean Data Centre Standards
European Data Centre Standards
ICT FOOTPRINT .eu
 
Stork Presentation on Migration (Willem Hazenberg)
Stork Presentation on Migration (Willem Hazenberg)Stork Presentation on Migration (Willem Hazenberg)
Stork Presentation on Migration (Willem Hazenberg)
ARC Advisory Group
 
Business Continuity Planning and Disaster Recovery Plannin.docx
Business Continuity Planning and Disaster Recovery Plannin.docxBusiness Continuity Planning and Disaster Recovery Plannin.docx
Business Continuity Planning and Disaster Recovery Plannin.docx
felicidaddinwoodie
 
SI_050212_Olsen_Alknecht_PGE_CBMproject
SI_050212_Olsen_Alknecht_PGE_CBMprojectSI_050212_Olsen_Alknecht_PGE_CBMproject
SI_050212_Olsen_Alknecht_PGE_CBMprojectJerry Olson
 
Introduction to energy audit part 3
Introduction to energy audit part 3Introduction to energy audit part 3
Introduction to energy audit part 3
ZAINI ABDUL WAHAB
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
Miriam O'Brien
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
Miriam O'Brien
 
Business Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesBusiness Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesAlan McSweeney
 
Delta Telecom O&amp;m presentation
Delta Telecom O&amp;m presentationDelta Telecom O&amp;m presentation
Delta Telecom O&amp;m presentation
engramjadislam78
 
The Connected Building Transformation
The Connected Building TransformationThe Connected Building Transformation
The Connected Building Transformation
Trane Commercial
 
Transition to online AMS reduces maintenance costs and improves operations
Transition to online AMS reduces maintenance costs and improves operationsTransition to online AMS reduces maintenance costs and improves operations
Transition to online AMS reduces maintenance costs and improves operations
Emerson Exchange
 
M-Reporting introduction and faq pharma 20140316
M-Reporting introduction and faq pharma 20140316M-Reporting introduction and faq pharma 20140316
M-Reporting introduction and faq pharma 20140316
sabbir456
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery Environment
Eagle Technologies
 

Similar to PECB Webinar: Implementing Effective Disaster Recovery Strategies – ISO/IEC 24762 (20)

Disaster Recovery vs. Business Continuity
Disaster Recovery vs. Business ContinuityDisaster Recovery vs. Business Continuity
Disaster Recovery vs. Business Continuity
 
Engineering plant facilities 12 mechanics building preventive maintenance and...
Engineering plant facilities 12 mechanics building preventive maintenance and...Engineering plant facilities 12 mechanics building preventive maintenance and...
Engineering plant facilities 12 mechanics building preventive maintenance and...
 
Bcp
BcpBcp
Bcp
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR Presentation
 
Lessons Learned from AMI Deployments and Asset Management Readiness
Lessons Learned from AMI Deployments and Asset Management ReadinessLessons Learned from AMI Deployments and Asset Management Readiness
Lessons Learned from AMI Deployments and Asset Management Readiness
 
European Data Centre Standards
European Data Centre StandardsEuropean Data Centre Standards
European Data Centre Standards
 
Stork Presentation on Migration (Willem Hazenberg)
Stork Presentation on Migration (Willem Hazenberg)Stork Presentation on Migration (Willem Hazenberg)
Stork Presentation on Migration (Willem Hazenberg)
 
Business Continuity Planning and Disaster Recovery Plannin.docx
Business Continuity Planning and Disaster Recovery Plannin.docxBusiness Continuity Planning and Disaster Recovery Plannin.docx
Business Continuity Planning and Disaster Recovery Plannin.docx
 
SI_050212_Olsen_Alknecht_PGE_CBMproject
SI_050212_Olsen_Alknecht_PGE_CBMprojectSI_050212_Olsen_Alknecht_PGE_CBMproject
SI_050212_Olsen_Alknecht_PGE_CBMproject
 
Introduction to energy audit part 3
Introduction to energy audit part 3Introduction to energy audit part 3
Introduction to energy audit part 3
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
Business Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesBusiness Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery Notes
 
Delta Telecom O&amp;m presentation
Delta Telecom O&amp;m presentationDelta Telecom O&amp;m presentation
Delta Telecom O&amp;m presentation
 
Planning for Substation Maintenance and Reliability
Planning for Substation Maintenance and ReliabilityPlanning for Substation Maintenance and Reliability
Planning for Substation Maintenance and Reliability
 
The Connected Building Transformation
The Connected Building TransformationThe Connected Building Transformation
The Connected Building Transformation
 
IoT
IoTIoT
IoT
 
Transition to online AMS reduces maintenance costs and improves operations
Transition to online AMS reduces maintenance costs and improves operationsTransition to online AMS reduces maintenance costs and improves operations
Transition to online AMS reduces maintenance costs and improves operations
 
M-Reporting introduction and faq pharma 20140316
M-Reporting introduction and faq pharma 20140316M-Reporting introduction and faq pharma 20140316
M-Reporting introduction and faq pharma 20140316
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery Environment
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 

Recently uploaded (20)

RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 

PECB Webinar: Implementing Effective Disaster Recovery Strategies – ISO/IEC 24762

  • 2. 16-09-15 2 General information - About me - Content of this webinar - Duration of the webinar - Questions
  • 3. 16-09-15 3 Disaster Recovery Problem Statement • An internal or external event interrupts one or more of our business processes • Time -- the length of the interruption -- causes the situation to become a disaster
  • 4. 16-09-15 4 Disaster Recovery Assumptions • Major catastrophes, Not Daily Operational Problems • Will Not Produce a “Business as Usual” environment • The organization will Still Lose time and money in a disaster
  • 5. 16-09-15 5 • Move an operational department, with NO WARNING! and • Recover Time-Sensitive business operations – Without notice – At another (remote?) location/facility – With less capacity & capability – Using only data stored Off-Site – Within a designated recovery time frame – Without some key personnel The Disaster Recovery Challenge
  • 6. 16-09-15 6 Disaster Emergency response - immediate recovery Recovery - critical functions Return Home Business Relocation long term recovery in new or semi- permanent location Hours Days Weeks
  • 7. 16-09-15 7 - Identify recovery strategies for the mission critical operations using the BIA and Risk Evaluation - Recommend strategies to meet the recovery objectives identified in the BIA - Perform a cost benefit analysis on the recommended strategies
  • 8. Risk Assessment Resources vul. to risks 1. Identifying risks 2. Risk analysis 3. Risk judgement List of critical resources 16-09-15
  • 9. Risk Category Asset/Element VulnerabilityReal Probability Controls Category Power outage Critical applications H H M 1 Power outage Information prov. by computers H H M 1 Power outage Critical information/data H H M 1 Power outage Computer facilities H H M 1 Power outage Terminals H H M 1 Power outage Internal links (LAN,WAN) H H M 1 Power outage Documents/conf. information H H M 1 Power outage Operating systems H H M 1 Power outage Gateways H H M 1 Fire Information prov. by computers H H M 1 Fire Critical information/data H H M 1 Fire Computer facilities H H M 1 Fire Terminals H H M 1 Fire Internal links (LAN,WAN) H H M 1 Fire Documents/conf. information H H M 1 Fire Operating systems H H M 1 Fire Gateways H H M 1 Fire Maintenance activities H H M 1 Software failure Daily operations H M M 1 Software failure Customer care H M M 1 Hacker Information prov. by computers H M M 1 Fire Failure indicators H L S 2 Fire Air condition H L S 2 Cable cut to switch Daily operation H L S 2 Cable cut to switch Customer care H L S 2 Major accidents Critical applications H L S 2 Major accidents Information prov. by computers H L S 2 Major accidents Critical information/data H L S 2
  • 10. 16-09-15 10 Operational Impacts of Outage Customer Impacts of Outage Financial Impacts of Outage Legal/Regulatory Impacts of Outage Other Impacts of Outage Recovery Time Objectives Business Unit Recovery Priorities Recovery Requirements/Resources Vital Records Establish Determine Business Impact Analysis (BIA)
  • 11. 16-09-15 11 0 5,000,000 10,000,000 15,000,000 20,000,000 25,000,000 30,000,000 35,000,000 < Day 1 Day 1 Day 2 Day 3 Day 4 Day 5 Week 1 Week 2 Week 3 Week 4 > Week 4 USD Cumulative financial impacts, example Lost Sales
  • 12. 16-09-15 12 “.....is the time between the point of disruption and the point at which most critical systems must be operational AND updated to current status.” time Recovery of Operations Critical Systems Operational with Current & Accurate Data Recovery Time Frame The time within which Business Processes must be recovered at acceptable levels of operational capability to minimize the impact of an outage Point of Disruption Recovery Time Frame (RTO)
  • 13. 16-09-15 13 Some parameters for estimation of RTO: • Complexity of recovery • Impacts on customers • Financial impacts • Impacts on operations, how long can a site/node be idle • Any recovery strategies in place? • Any work around procedures? • The amount of back-logg in case of an outage (RPO) Recovery Time Frame (RTO)
  • 14. 16-09-15 14 Major points to consider : • Recovery of critical business functions • Business recovery requirement priorities • Minimization of losses • Time frame for the recovery – RTO • Service level desired within the RTO (100% not realistic) • Stepwise recovery • Recovery resources • Cost/Benefit of Recovery solution • Requirements of the Recovery solution(s)
  • 15. 16-09-15 15 Recovery time Recovery investment $ Recovery cost $ Continuous process Hot site Mobile site Cold site Manual procedures Do nothing Disaster Recovery strategies Redundant Hot Site Mobile Site Cold Site Withdraw service Do nothing
  • 16. 16-09-15 16 Recovery Strategies Service degradation: • No recovery strategy • Manual procedures – work around • Reduce service response • Withdrawal of service • Staff working from home
  • 17. 16-09-15 17 Recovery strategies Internal/extrenal strategies: 1. Internal back-up facilities 2. Hot site 3. Warm site 4. Mobil site 5. Cold/shell site 6. Reciprocal agreements 7. Third party service vendor 8. Cloud 9. Investigate usage of other internal facilities
  • 18. 16-09-15 18 Develop vital record and work in progress recovery strategies
  • 19. 16-09-15 19 Considerations when choosing recovery location:  Threats  Access control  Facility security  Dedicated areas  Environmental control  CC (EOC)  Restricted facilities  Others
  • 20. 16-09-15 20  Natural hazards  Weather changes  Industrial and commercial hazards  Accessibility  Alternate routes  Shared premises  Public utilities  Cabling infrastructure  Risk mitigation Threats
  • 21. 16-09-15 21 Access control: - Selective restriction of entry and exit of users into or out of the area - Personal security categoies - Security zones Facility security : - Physical building - Exterior/interior - Alarm system Dedicated areas: - Recovery room - Assambly areas
  • 22. 16-09-15 22 Environmental control: - Temperature - Ventilation - Humidity - Vibration and noise EOC: Restricted facilities: - Authorized access for designated purposes Others: • Telecommunication • Power supply • Fire protction • Cabling • Rest areas • Parking areas • Medical care • Food and drink • Testing • Life Cycle • Vendors • Outsoursing
  • 23. 16-09-15 23 Compare internal/external solutions a. Advantages b. Disadvantages c. Costs (startup, maintenance and execution) e. Mitigation capability and control options f. Ability to meet defined RTO and RPO
  • 24. 16-09-15 24 Prerequisites for mobile sites: • Transmission connection points at each site • Possible parking places are at the IT center • Power supply (generators) • Off-site storage and suitable back-up regime
  • 25. 16-09-15 25 100% West Middle East North 10 % 18 % 27 % 36 % Transport 4 hours West&East Transport 10 hours Mid&North • Part 1,2,3,4 of transmission up • SDH backbone • Far end transmission up • Start the switches • RBS reloaded, • Switches loaded, HLR loaded • Test, 8hours Activate teams 2 hours 12,12,12,12 hours 6 hours 32 44 50 62 Hours ‘Cold Site’ For 5 HLR and 5 SCPs HLR-redundancy (0 hours) or ‘Warm site’ HLR (3 hours) or Mobile HLR (6 hours at site) Enough capacity in other GMSCs in the network
  • 26. 16-09-15 26 Activation and Deactivation Response plan Recovery plan Restoration plan
  • 27. 16-09-15 27 Exercise/test If you do not exercise your plan you do not have any….. Only 30% of the companies exercise their plans…... Plan for the worst, exercise for the rest!
  • 28. 16-09-15 28 ...in case of a disaster?