SlideShare a Scribd company logo
1 of 24
Download to read offline
October 20, 2010
Presented By:
Susan Kastan
Penny Klein
Bio
 Susan Kastan has been in the information technology
field for 20+ years, and currently specializes in
Business Continuity. She has developed numerous
security policies, procedures and plans for various
government, association and private industry.
 Penny Klein brings 20+ years of information
assurance experience, specializing in IA policies. She
has developed a Business Contingency Program for a
major association, as well as policies, procedures and
plans for numerous government and private industries
October 20, 2010 2Kastan Consulting/PJKlein Consulting
Business Continuity
 Business Continuity – The smooth continuation of
business activity despite an interruption of service
 No size restrictions
 Tailored to environment
 Information technology as well as personnel and
processes
October 20, 2010 3Kastan Consulting/PJKlein Consulting
Business Continuity
 In the event a incident occurs:
 Operations are likely to be disrupted
 Offices are likely to be closed down or destroyed
 People may get hurt or killed
 People are likely to have their employment disrupted
October 20, 2010 4Kastan Consulting/PJKlein Consulting
Risk Assessment
 Risk Assessment – Activities that discover an
organization's vulnerabilities, threats and impact.
Additionally , it identifies the countermeasure to
mitigate the risk, the associated costs, and the risk
tolerance (risk the organization is willing to accept)
October 20, 2010 5Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Business Impact Assessment (BIA) - Analyzes
mission criticality of all enterprise functions, the
current threats, and consequences of losing some or all
of these functions.
 Also known as Business Impact Analysis
October 20, 2010 6Kastan Consulting/PJKlein Consulting
Steps in Business Continuity
 Conduct Risk Assessment
 Conduct BIA
 Develop and Document
 Train & Test
 Implement
 Maintain
October 20, 2010 7Kastan Consulting/PJKlein Consulting
Risk Assessment
 Purpose of a Risk Assessment
 Identifies current threats
 Identifies current vulnerabilities
 Identifies impact of the threats to the vulnerabilities
 Provides for Risk Management, that is, what risk is the
organization willing to accept, reduce/correct, or
transfer
October 20, 2010 8Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Identifies:
 Mission Critical and Mission Essential Requirements
 Recovery Phases
 Critical Factors
 Assumptions
 Evaluation Criteria
 Critical Dependencies
 Recommendations
October 20, 2010 9Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Benefits
 Raises senior management’s awareness of the state of
their business and helps to justify the need for a
business continuity plan
 Ensures that a suitable business continuity strategy and
effective business continuity plan will be developed
 Identifies and prioritizes recovery of mission critical
business functions and processes
October 20, 2010 10Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Benefits – cont’d
 Identifies requirements for recovery of critical IT
systems, applications, vital records, equipment and
resources
 Identifies extent of financial impact
 Identifies extent of operational impact
October 20, 2010 11Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Process
 Awareness
 Provide to Management and Team
 Ensure buy-in to the process
 Data Gathering
 Management’s vision
 Interviews and/or general surveys
 Threat Analysis and Requirements Analysis
 Reviews
 Department review
 Senior management review
 Evaluation and Recommendation
 Build recovery plans for “time sensitive”/mission critical plans
October 20, 2010 12Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Awareness
 Brief Senior Management and Stakeholders
 GET BUY-IN
 Provide a high level overview of the process
 Identify benefits
 Reference guide
 Useful and easy to follow presentation of the data collected
 Comprehensive view of all the requirements
 Requirements guide for developing and implementing risk
mitigation strategies
 Provides validation and justification for funding all BCP
requirements
October 20, 2010 13Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Gather data
 Business processes
 Resources
 Interdependencies
 Impacts over time
 Maximum Allowable Downtime (MAD)
 Recovery Time Objective (RTO)
 Recovery Point Objective (RPO)
October 20, 2010 14Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Determine the impact of scenarios on processes
 Loss of key people
 Loss of location
 Loss of power
 Loss of communications
 Loss of technology
 Loss of information
October 20, 2010 15Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Impact types/categories
 Financial
 Legal/regulatory
 Customer loss/dissatisfaction
 Reputation impact
 Time sensitive material
October 20, 2010 16Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Low - May result in the loss of some tangible
assets or resources or may noticeably affect an
organization’s mission, reputation, or interest.
 Medium - May result in the costly loss of tangible
assets or resources; may violate, harm, or impede
an organization’s mission, reputation, or interest;
or may result in human injury.
Based on NIST 800-30
October 20, 2010 17Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 High - May result in the highly costly loss of major
tangible assets or resources; may significantly
violate, harm, or impede an organization’s
mission, reputation, or interest; or may result in
human death or serious injury.
Based on NIST 800-30
October 20, 2010 18Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Department Review
 Changes
 Inaccuracies/ misinterpretation
 Verify timelines are correct
 RTO
 RPO
 MAD
October 20, 2010 19Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Senior Management Review
 Prioritize for entire company
 Determine path forward based on
 Cost
 Speed of Recovery
 Quality
 Impacts to business
October 20, 2010 20Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Follow On
 Take what you’ve learned and build out the Business
Continuity Plan
 BIA is the basis for the risk decisions
 Start with most critical or time sensitive
October 20, 2010 21Kastan Consulting/PJKlein Consulting
Exercise
 Santa attended a conference in January about business
continuity.
 He wants to put a business continuity plan in place.
 It’s a little later than he would like, but he would like to
start with the Business Impact Assessments.
 Our goal:
 Identify critical processes
 Create list of top 10
October 20, 2010 22Kastan Consulting/PJKlein Consulting
Exercise
 Santa delivers 2 toys (or coal) to all children around
the globe who believe in him
 24 hours to do it
 Santa is the President of Santa’s Workshop, Inc.
 151,000+ employees
 Week before (and Christmas day) is critical to him
 Everyone believes what they do is critical to operations
 A little bit of technology helps!
October 20, 2010 Kastan Consulting/PJKlein Consulting 23
Contact Information
Penny Klein
PJKlein Consulting, LLC
Penny.Klein@
pjkleinllc.com
www.pjkleinllc.com
703.901.1932
Susan Kastan
Kastan Consulting, LLC
Susan.Kastan@
kastanconsulting.com
www.kastanconsulting.com
585.724.0804
October 20, 2010 24Kastan Consulting/PJKlein Consulting

More Related Content

What's hot

Assess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAssess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAnand Subramaniam
 
Business continuity management system
Business continuity management systemBusiness continuity management system
Business continuity management systemsubbusai82
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planningalanlund
 
Business Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation SlidesBusiness Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation SlidesSlideTeam
 
Business continuity management www.reconglobal.in
Business continuity management   www.reconglobal.inBusiness continuity management   www.reconglobal.in
Business continuity management www.reconglobal.inSatya Yadav
 
Business Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBusiness Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBob Winkler
 
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)PECB
 
Business Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationBusiness Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationPECB
 
Exercising BCMS plan
Exercising BCMS planExercising BCMS plan
Exercising BCMS planPECB
 
PECB Webinar: The importance of business impact analysis
PECB Webinar: The importance of business impact analysisPECB Webinar: The importance of business impact analysis
PECB Webinar: The importance of business impact analysisPECB
 
BCMS Presentation1
BCMS Presentation1BCMS Presentation1
BCMS Presentation1barbytee
 
Target Operating Model Research
Target Operating Model ResearchTarget Operating Model Research
Target Operating Model ResearchGenpact Ltd
 
BUSINESS IMPACT ‎ANALYSIS- DRM
BUSINESS IMPACT ‎ANALYSIS- DRMBUSINESS IMPACT ‎ANALYSIS- DRM
BUSINESS IMPACT ‎ANALYSIS- DRMLibcorpio
 
BUSINESS CONTINUITY MANAGEMENT system
BUSINESS CONTINUITY MANAGEMENT systemBUSINESS CONTINUITY MANAGEMENT system
BUSINESS CONTINUITY MANAGEMENT systemKuroba Kaitou
 
ISO 22301 Business Continuity Management
ISO 22301 Business Continuity ManagementISO 22301 Business Continuity Management
ISO 22301 Business Continuity ManagementRamiro Cid
 

What's hot (20)

Assess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAssess Your Business Continuity Management Process
Assess Your Business Continuity Management Process
 
Business continuity management system
Business continuity management systemBusiness continuity management system
Business continuity management system
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Business Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation SlidesBusiness Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation Slides
 
Business continuity management www.reconglobal.in
Business continuity management   www.reconglobal.inBusiness continuity management   www.reconglobal.in
Business continuity management www.reconglobal.in
 
Business Continuity Planning Presentation Overview
Business Continuity Planning Presentation OverviewBusiness Continuity Planning Presentation Overview
Business Continuity Planning Presentation Overview
 
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
 
Business Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationBusiness Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS Implementation
 
Exercising BCMS plan
Exercising BCMS planExercising BCMS plan
Exercising BCMS plan
 
PECB Webinar: The importance of business impact analysis
PECB Webinar: The importance of business impact analysisPECB Webinar: The importance of business impact analysis
PECB Webinar: The importance of business impact analysis
 
Bcp drp
Bcp drpBcp drp
Bcp drp
 
BCMS Presentation1
BCMS Presentation1BCMS Presentation1
BCMS Presentation1
 
Target Operating Model Research
Target Operating Model ResearchTarget Operating Model Research
Target Operating Model Research
 
BUSINESS IMPACT ‎ANALYSIS- DRM
BUSINESS IMPACT ‎ANALYSIS- DRMBUSINESS IMPACT ‎ANALYSIS- DRM
BUSINESS IMPACT ‎ANALYSIS- DRM
 
BUSINESS CONTINUITY MANAGEMENT system
BUSINESS CONTINUITY MANAGEMENT systemBUSINESS CONTINUITY MANAGEMENT system
BUSINESS CONTINUITY MANAGEMENT system
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Awareness iso 22301 danang suryo
Awareness iso 22301 danang suryoAwareness iso 22301 danang suryo
Awareness iso 22301 danang suryo
 
ISO 22301 Business Continuity Management
ISO 22301 Business Continuity ManagementISO 22301 Business Continuity Management
ISO 22301 Business Continuity Management
 
IT Governance
IT GovernanceIT Governance
IT Governance
 
GRC Fundamentals
GRC FundamentalsGRC Fundamentals
GRC Fundamentals
 

Viewers also liked

BSidesSF 2014 Fix What Matters:Why CVSS Sucks
BSidesSF 2014 Fix What Matters:Why CVSS SucksBSidesSF 2014 Fix What Matters:Why CVSS Sucks
BSidesSF 2014 Fix What Matters:Why CVSS SucksEd Bellis
 
[Risk] Risk Manager for IRAM2 Application
[Risk] Risk Manager for IRAM2 Application[Risk] Risk Manager for IRAM2 Application
[Risk] Risk Manager for IRAM2 ApplicationAffy Morris MSc, ACIM
 
Cdc up business_impact_analysis_template
Cdc up business_impact_analysis_templateCdc up business_impact_analysis_template
Cdc up business_impact_analysis_templatedimakarmi
 
Disaster Recovery Presentation
Disaster Recovery PresentationDisaster Recovery Presentation
Disaster Recovery PresentationTimSchaefer
 
An Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery PlanningAn Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery PlanningNEBizRecovery
 
The A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster RecoveryThe A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster RecoverySirius
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat ModelingCigital
 
Threat modeling with architectural risk patterns
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patternsStephen de Vries
 
OHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentOHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentTechnoSysCon
 

Viewers also liked (10)

BSidesSF 2014 Fix What Matters:Why CVSS Sucks
BSidesSF 2014 Fix What Matters:Why CVSS SucksBSidesSF 2014 Fix What Matters:Why CVSS Sucks
BSidesSF 2014 Fix What Matters:Why CVSS Sucks
 
[Risk] Risk Manager for IRAM2 Application
[Risk] Risk Manager for IRAM2 Application[Risk] Risk Manager for IRAM2 Application
[Risk] Risk Manager for IRAM2 Application
 
Cdc up business_impact_analysis_template
Cdc up business_impact_analysis_templateCdc up business_impact_analysis_template
Cdc up business_impact_analysis_template
 
Disaster Recovery Presentation
Disaster Recovery PresentationDisaster Recovery Presentation
Disaster Recovery Presentation
 
An Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery PlanningAn Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery Planning
 
The A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster RecoveryThe A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster Recovery
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 
Threat modeling with architectural risk patterns
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patterns
 
ISO 31000
ISO 31000ISO 31000
ISO 31000
 
OHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentOHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessment
 

Similar to Business Impact and Risk Assessments in Business Continuity and Disaster Recovery

Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010
Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010
Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010UNSW Canberra
 
Legal Services Act Seminar 3rd March 2010
Legal Services Act Seminar 3rd March 2010Legal Services Act Seminar 3rd March 2010
Legal Services Act Seminar 3rd March 2010Gateway Media
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Jim Kaplan CIA CFE
 
Consultancy Report Final
Consultancy Report FinalConsultancy Report Final
Consultancy Report FinalBilal Ahmed
 
Prospectus vcssgoc
Prospectus  vcssgocProspectus  vcssgoc
Prospectus vcssgocvinay verma
 
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Citrix Online
 
Pitch Short Deck KEA_Reboost.pdf
Pitch Short Deck KEA_Reboost.pdfPitch Short Deck KEA_Reboost.pdf
Pitch Short Deck KEA_Reboost.pdfAugustoCaceres6
 
bipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docx
bipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docxbipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docx
bipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docxAASTHA76
 
Financials and Human Resource Planning MGT465 Version 2
Financials and Human Resource Planning MGT465 Version 2Financials and Human Resource Planning MGT465 Version 2
Financials and Human Resource Planning MGT465 Version 2ShainaBoling829
 
Financials and human resource planning mgt465 version 2
Financials and human resource planning mgt465 version 2Financials and human resource planning mgt465 version 2
Financials and human resource planning mgt465 version 2RAHUL126667
 
Finance in Cornwall - 10 May 2016 (Segment 2b)
Finance in Cornwall - 10 May 2016 (Segment 2b)Finance in Cornwall - 10 May 2016 (Segment 2b)
Finance in Cornwall - 10 May 2016 (Segment 2b)PKF Francis Clark
 
Fractal analytics ace solution
Fractal analytics ace solutionFractal analytics ace solution
Fractal analytics ace solutionFractal_Analytics
 
Business Valuation Tips and Traps
Business Valuation Tips and TrapsBusiness Valuation Tips and Traps
Business Valuation Tips and TrapsCraig West
 
Optimise Learning Impact August 2010
Optimise Learning Impact August 2010Optimise Learning Impact August 2010
Optimise Learning Impact August 2010AndrewFletcher
 
Optimise Learning Impact August 2010
Optimise Learning Impact August 2010Optimise Learning Impact August 2010
Optimise Learning Impact August 2010AndrewFletcher
 
P4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdf
P4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdfP4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdf
P4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdfKnowledgeDevourer
 
Keeping up with Accounting - Business & Industry edition
Keeping up with Accounting - Business & Industry editionKeeping up with Accounting - Business & Industry edition
Keeping up with Accounting - Business & Industry editionTom Hood, CPA,CITP,CGMA
 

Similar to Business Impact and Risk Assessments in Business Continuity and Disaster Recovery (20)

Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010
Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010
Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010
 
Legal Services Act Seminar 3rd March 2010
Legal Services Act Seminar 3rd March 2010Legal Services Act Seminar 3rd March 2010
Legal Services Act Seminar 3rd March 2010
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
 
Consultancy Report Final
Consultancy Report FinalConsultancy Report Final
Consultancy Report Final
 
Prospectus vcssgoc
Prospectus  vcssgocProspectus  vcssgoc
Prospectus vcssgoc
 
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
 
Pitch Short Deck KEA_Reboost.pdf
Pitch Short Deck KEA_Reboost.pdfPitch Short Deck KEA_Reboost.pdf
Pitch Short Deck KEA_Reboost.pdf
 
bipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docx
bipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docxbipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docx
bipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docx
 
Financials and Human Resource Planning MGT465 Version 2
Financials and Human Resource Planning MGT465 Version 2Financials and Human Resource Planning MGT465 Version 2
Financials and Human Resource Planning MGT465 Version 2
 
Financials and human resource planning mgt465 version 2
Financials and human resource planning mgt465 version 2Financials and human resource planning mgt465 version 2
Financials and human resource planning mgt465 version 2
 
Centers of Change
Centers of ChangeCenters of Change
Centers of Change
 
Finance in Cornwall - 10 May 2016 (Segment 2b)
Finance in Cornwall - 10 May 2016 (Segment 2b)Finance in Cornwall - 10 May 2016 (Segment 2b)
Finance in Cornwall - 10 May 2016 (Segment 2b)
 
Fractal analytics ace solution
Fractal analytics ace solutionFractal analytics ace solution
Fractal analytics ace solution
 
Business Valuation Tips and Traps
Business Valuation Tips and TrapsBusiness Valuation Tips and Traps
Business Valuation Tips and Traps
 
Optimise Learning Impact August 2010
Optimise Learning Impact August 2010Optimise Learning Impact August 2010
Optimise Learning Impact August 2010
 
Optimise Learning Impact August 2010
Optimise Learning Impact August 2010Optimise Learning Impact August 2010
Optimise Learning Impact August 2010
 
P4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdf
P4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdfP4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdf
P4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdf
 
Keeping up with Accounting - Business & Industry edition
Keeping up with Accounting - Business & Industry editionKeeping up with Accounting - Business & Industry edition
Keeping up with Accounting - Business & Industry edition
 
Company Directors Update 2016
Company Directors Update 2016Company Directors Update 2016
Company Directors Update 2016
 
Medc Breakfast 2010
Medc Breakfast 2010Medc Breakfast 2010
Medc Breakfast 2010
 

More from Rochester Security Summit

Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleRochester Security Summit
 
Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Rochester Security Summit
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudRochester Security Summit
 
State Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltState Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltRochester Security Summit
 
You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…Rochester Security Summit
 
A Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetA Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetRochester Security Summit
 

More from Rochester Security Summit (16)

IPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be IgnoredIPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be Ignored
 
Radio Reconnaissance in Penetration Testing
Radio Reconnaissance in Penetration TestingRadio Reconnaissance in Penetration Testing
Radio Reconnaissance in Penetration Testing
 
Real Business Threats!
Real Business Threats!Real Business Threats!
Real Business Threats!
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)
 
Dissecting the Hack: Malware Analysis 101
Dissecting the Hack: Malware Analysis 101 Dissecting the Hack: Malware Analysis 101
Dissecting the Hack: Malware Analysis 101
 
GRC– The Way Forward
GRC– The Way ForwardGRC– The Way Forward
GRC– The Way Forward
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public Cloud
 
Finding Patterns in Data Breaches
Finding Patterns in Data BreachesFinding Patterns in Data Breaches
Finding Patterns in Data Breaches
 
State Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltState Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork Quilt
 
It's All About the Data!
It's All About the Data!It's All About the Data!
It's All About the Data!
 
You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…
 
A Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetA Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT Budget
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
Firewall Defense against Covert Channels
Firewall Defense against Covert Channels Firewall Defense against Covert Channels
Firewall Defense against Covert Channels
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Business Impact and Risk Assessments in Business Continuity and Disaster Recovery

  • 1. October 20, 2010 Presented By: Susan Kastan Penny Klein
  • 2. Bio  Susan Kastan has been in the information technology field for 20+ years, and currently specializes in Business Continuity. She has developed numerous security policies, procedures and plans for various government, association and private industry.  Penny Klein brings 20+ years of information assurance experience, specializing in IA policies. She has developed a Business Contingency Program for a major association, as well as policies, procedures and plans for numerous government and private industries October 20, 2010 2Kastan Consulting/PJKlein Consulting
  • 3. Business Continuity  Business Continuity – The smooth continuation of business activity despite an interruption of service  No size restrictions  Tailored to environment  Information technology as well as personnel and processes October 20, 2010 3Kastan Consulting/PJKlein Consulting
  • 4. Business Continuity  In the event a incident occurs:  Operations are likely to be disrupted  Offices are likely to be closed down or destroyed  People may get hurt or killed  People are likely to have their employment disrupted October 20, 2010 4Kastan Consulting/PJKlein Consulting
  • 5. Risk Assessment  Risk Assessment – Activities that discover an organization's vulnerabilities, threats and impact. Additionally , it identifies the countermeasure to mitigate the risk, the associated costs, and the risk tolerance (risk the organization is willing to accept) October 20, 2010 5Kastan Consulting/PJKlein Consulting
  • 6. Business Impact Assessment  Business Impact Assessment (BIA) - Analyzes mission criticality of all enterprise functions, the current threats, and consequences of losing some or all of these functions.  Also known as Business Impact Analysis October 20, 2010 6Kastan Consulting/PJKlein Consulting
  • 7. Steps in Business Continuity  Conduct Risk Assessment  Conduct BIA  Develop and Document  Train & Test  Implement  Maintain October 20, 2010 7Kastan Consulting/PJKlein Consulting
  • 8. Risk Assessment  Purpose of a Risk Assessment  Identifies current threats  Identifies current vulnerabilities  Identifies impact of the threats to the vulnerabilities  Provides for Risk Management, that is, what risk is the organization willing to accept, reduce/correct, or transfer October 20, 2010 8Kastan Consulting/PJKlein Consulting
  • 9. Business Impact Assessment  Identifies:  Mission Critical and Mission Essential Requirements  Recovery Phases  Critical Factors  Assumptions  Evaluation Criteria  Critical Dependencies  Recommendations October 20, 2010 9Kastan Consulting/PJKlein Consulting
  • 10. Business Impact Assessment  Benefits  Raises senior management’s awareness of the state of their business and helps to justify the need for a business continuity plan  Ensures that a suitable business continuity strategy and effective business continuity plan will be developed  Identifies and prioritizes recovery of mission critical business functions and processes October 20, 2010 10Kastan Consulting/PJKlein Consulting
  • 11. Business Impact Assessment  Benefits – cont’d  Identifies requirements for recovery of critical IT systems, applications, vital records, equipment and resources  Identifies extent of financial impact  Identifies extent of operational impact October 20, 2010 11Kastan Consulting/PJKlein Consulting
  • 12. Business Impact Assessment  Process  Awareness  Provide to Management and Team  Ensure buy-in to the process  Data Gathering  Management’s vision  Interviews and/or general surveys  Threat Analysis and Requirements Analysis  Reviews  Department review  Senior management review  Evaluation and Recommendation  Build recovery plans for “time sensitive”/mission critical plans October 20, 2010 12Kastan Consulting/PJKlein Consulting
  • 13. Business Impact Assessment  Awareness  Brief Senior Management and Stakeholders  GET BUY-IN  Provide a high level overview of the process  Identify benefits  Reference guide  Useful and easy to follow presentation of the data collected  Comprehensive view of all the requirements  Requirements guide for developing and implementing risk mitigation strategies  Provides validation and justification for funding all BCP requirements October 20, 2010 13Kastan Consulting/PJKlein Consulting
  • 14. Business Impact Assessment  Gather data  Business processes  Resources  Interdependencies  Impacts over time  Maximum Allowable Downtime (MAD)  Recovery Time Objective (RTO)  Recovery Point Objective (RPO) October 20, 2010 14Kastan Consulting/PJKlein Consulting
  • 15. Business Impact Assessment  Determine the impact of scenarios on processes  Loss of key people  Loss of location  Loss of power  Loss of communications  Loss of technology  Loss of information October 20, 2010 15Kastan Consulting/PJKlein Consulting
  • 16. Business Impact Assessment  Impact types/categories  Financial  Legal/regulatory  Customer loss/dissatisfaction  Reputation impact  Time sensitive material October 20, 2010 16Kastan Consulting/PJKlein Consulting
  • 17. Business Impact Assessment  Low - May result in the loss of some tangible assets or resources or may noticeably affect an organization’s mission, reputation, or interest.  Medium - May result in the costly loss of tangible assets or resources; may violate, harm, or impede an organization’s mission, reputation, or interest; or may result in human injury. Based on NIST 800-30 October 20, 2010 17Kastan Consulting/PJKlein Consulting
  • 18. Business Impact Assessment  High - May result in the highly costly loss of major tangible assets or resources; may significantly violate, harm, or impede an organization’s mission, reputation, or interest; or may result in human death or serious injury. Based on NIST 800-30 October 20, 2010 18Kastan Consulting/PJKlein Consulting
  • 19. Business Impact Assessment  Department Review  Changes  Inaccuracies/ misinterpretation  Verify timelines are correct  RTO  RPO  MAD October 20, 2010 19Kastan Consulting/PJKlein Consulting
  • 20. Business Impact Assessment  Senior Management Review  Prioritize for entire company  Determine path forward based on  Cost  Speed of Recovery  Quality  Impacts to business October 20, 2010 20Kastan Consulting/PJKlein Consulting
  • 21. Business Impact Assessment  Follow On  Take what you’ve learned and build out the Business Continuity Plan  BIA is the basis for the risk decisions  Start with most critical or time sensitive October 20, 2010 21Kastan Consulting/PJKlein Consulting
  • 22. Exercise  Santa attended a conference in January about business continuity.  He wants to put a business continuity plan in place.  It’s a little later than he would like, but he would like to start with the Business Impact Assessments.  Our goal:  Identify critical processes  Create list of top 10 October 20, 2010 22Kastan Consulting/PJKlein Consulting
  • 23. Exercise  Santa delivers 2 toys (or coal) to all children around the globe who believe in him  24 hours to do it  Santa is the President of Santa’s Workshop, Inc.  151,000+ employees  Week before (and Christmas day) is critical to him  Everyone believes what they do is critical to operations  A little bit of technology helps! October 20, 2010 Kastan Consulting/PJKlein Consulting 23
  • 24. Contact Information Penny Klein PJKlein Consulting, LLC Penny.Klein@ pjkleinllc.com www.pjkleinllc.com 703.901.1932 Susan Kastan Kastan Consulting, LLC Susan.Kastan@ kastanconsulting.com www.kastanconsulting.com 585.724.0804 October 20, 2010 24Kastan Consulting/PJKlein Consulting