GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.

Slides:



Advertisements
Similar presentations
IT Service Continuity Management
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Information Technology Disaster Recovery Awareness Program.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Business Continuity Training & Awareness by Sulia Toutai (ANZ)
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
DISASTER CENTER Study Case DEMIRBANK ROMANIA “Piata Financiara” ConferenceJanuary 29, 2002 C 2002.
1 Disaster Recovery “Protecting City Data” Ron Bergman First Deputy Commissioner Gregory Neuhaus Assistant Commissioner THE CITY OF NEW YORK.
An Introduction to System Administration Chapter 1.
9 - 1 Computer-Based Information Systems Control.
Security Controls – What Works
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Computer Security: Principles and Practice
Maintaining and Updating Windows Server 2008
Saving Your Business from a Data Loss Randy Clark.
Session 3 – Information Security Policies
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
New Data Regulation Law 201 CMR TJX Video.
November 2009 Network Disaster Recovery October 2014.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
DEVELOPING A RISK ANALYSIS. What is a risk analysis? A Risk analysis is concerned with identifying the risks that an organisation is exposed to, identifying.
1.1 System Performance Security Module 1 Version 5.
ISA 562 Internet Security Theory & Practice
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
2015 Risky Business Week Welcome to the 2015 Risky Business Week presentation regarding disaster recovery Risky Business Week.
David N. Wozei Systems Administrator, IT Auditor.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Co-location Sites for Business Continuity and Disaster Recovery Peter Lesser (212) Peter Lesser (212) Kraft.
Important points and activities.  The objective is to secure life, property, information in the event of a disaster and to facilitate business continuity.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Information Systems Security Operational Control for Information Security.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
The Handover Process P6.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
Business Continuity. Business continuity... “Drive thy business or it will drive thee.” —Benjamin Franklin ( ), American entrepreneur, statesman,
The Importance of Proper Controls. 5 Network Controls Developing a secure network means developing mechanisms that reduce or eliminate the threats.
Disaster Recovery: Can Your Business Survive Data Loss? DR Strategies for Today and Tomorrow.
Backup Exec System Recovery. 2 Outline Introduction Challenges Solution Implementation Results Recommendations Q & A.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Information Security Crisis Management Daryl Goodwin.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Welcome to the ICT Department Unit 3_5 Security Policies.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Technology and Business Continuity
CompTIA Security+ Study Guide (SY0-401)
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
I have many checklists: how do I get started with cyber security?
Disaster Recovery at UNC
An Introduction to System Administration
Presentation transcript:

GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack

GLOBRIN Business Continuity Workshop An IT perspective on the Business Continuity Plan Business Continuity v Disaster Recovery Availability, Reliability and Recoverability Technology Identifying the technology used Risks and impact Information Types of information held within an organisation Threats to that information Pulling together an integrated business continuity plan Plan for failure Preventative action Create resources Test / review / update

GLOBRIN Business Continuity Workshop Business Continuity in relation to IT IT is only part of the overall Business Continuity Plan Covers the technology and information used by / generated by the business Involves taking proactive steps to allow the business to operate to a defined service level during incidents. Takes ongoing time and effort

GLOBRIN Business Continuity Workshop Disaster Recover (DR) “The strategies and plans for recovering and restoring the organizations infrastructure and capabilities after an interruption.” Business Continuity (BC) “The strategic and tactical capability of the organization to plan for and respond to incidents and business disruptions in order to continue business operations at an acceptable predefined level.” Example A fire in your building. The DR plan will deal with the clean up, repair of the building, re-instating IT and data etc. The BC plan deals with how you keep you business running while you implement the DR plan.

GLOBRIN Business Continuity Workshop Business Continuity and IT: Core issues to consider BUSINESS CONTINUITY PLAN IssueAvailabilityReliabilityRecoverability ObjectiveMaintain the chosen availability level of the businesses IT infrastructure Manage and control the IT infrastructure to improve overall reliability Effective plan to minimize downtime in event of disruption. EmphasisTechnologyProcessPeople FocusProactive and preventiveResponse and recovery

Business continuity planning lifecycle Analysis Design Implement Test / Accept Maintain GLOBRIN Business Continuity Workshop Getting started Assign responsibilities / ownership. Understand your business and what the minimum service levels the business requires in order to continue to operate. Review best practice (use ISO22301 Business Continuity Management as a guide) Business Continuity Plans are business lead, not IT lead.

GLOBRIN Business Continuity Workshop Analysis: Know what technology you need Document what IT is required in order for your business to carry out critical activities? Computers and related hardware Software Networking and connectivity 3 rd party services (cloud) Telephony Fax/ photocopiers / printers etc

GLOBRIN Business Continuity Workshop Analysis: Know what information you have Document what information your business needs in order to carry out critical activities? Digital (database and file systems) Hard copy (paper) Off site / 3 rd party (held in the cloud etc) Staff etc

GLOBRIN Business Continuity Workshop Analysis: Determine the risks Look at the likelihood and impact of risks that could cause business interruption. Fire / Flood / Storm Damage Key item hardware failure (Server etc) General hardware failure (Fax/ photocopiers / printers / user PC etc) Physical security (hardware / hard copy documents) Security breach / data loss Inadvertent change (software update going wrong etc) Deprecation (obsolete software / hardware) Loss of 3 rd party service (internet connection, hosting, cloud service etc) Loss of utilities (power, telephony, internet connection etc) Loss of Staff Theft / fraud Computer viruses / malware etc

GLOBRIN Business Continuity Workshop Analysis: Risk / Impact analysis Determine the likelihood of the risk occurring What is the impact to the business of each event

GLOBRIN Business Continuity Workshop Solution Design: Plan for the risks (options) Treat Put in place an action plan to reduce disruption to a minimum acceptable level: Implement high availability / hot standby systems Maintain duplicate infrastructure / information at different location Maintain pool of spares (desktops / monitors / mice / keyboards etc) Tolerate It may be decided that the cost of mitigating the risk is such that it outweighs the benefits.

GLOBRIN Business Continuity Workshop Solution Design: Plan for the risks (options) Transfer Transfer the risk to another external party. Hardware support / infrastructure management to an agreed SLA Insurance Terminate Update / modify the technology used to remove the risk: Remove old / outdated hardware Unsupported software Old data formats

GLOBRIN Business Continuity Workshop Solution Design: Technology For critical technology, use the results of the risk / impact analysis to build and document a plan for maintaining a minimum service level. This may involve a mix of: Implementing high availability systems with automatic rollover. Dual site Keeping spares Support contracts Security measures (locked server room etc) Change management processes to ensure software updates & patches are properly tested before going live.

GLOBRIN Business Continuity Workshop Solution Design: Information For critical information, use the results of the risk / impact analysis to build and document a plan for maintaining a minimum service level. This may involve a mix of: Policy for storing critical hard copy data (clean desk policy / fire safe) Backup policy with offsite storage Security (assign minimum required permissions, data encryption, prevention of data transfer to transfer media such as CD or USB drives, etc) Training / documentation to remove reliance on individual staff members

GLOBRIN Business Continuity Workshop Implementation: Technology and Information Document the plan. Include: The trigger events Responsibilities Contact details Actions to be taken for the identified risk events Communication plan (internal and external) Create support resources (battle box). Typical resources include Copy of the Business Continuity Plan Supporting technical documentation (server builds, network topology etc) Software installation packs to allow rebuilds of hardware including software licence details. 3 rd party contacts, support agreements, contact details, reference numbers etc Default communication templates ( , web pages, twitter messages, FaceBook updates) 2 copies of the Battle Box – at least 1 held off site

GLOBRIN Business Continuity Workshop Test and Review: Technology and Information Different levels of testing: Discussion based testing Table top exercise Live exercise After testing, document and review results and feed these back into the plan. Perform a review after all incidents – learn from what worked and what didn’t.

GLOBRIN Business Continuity Workshop Training: Technology and Information Ensure that all staff with business continuity responsibilities are appropriately trained and have the technical skills to undertake their roles.

GLOBRIN Business Continuity Workshop Change Management: Technology and Information IT infrastructure tends to be dynamic New hardware / software updates can affect the resilience of infrastructure and actions to be taken to restore service in case of given event. Prior to implementing change understand how the effects on the Business Continuity Plan. Ensure processes are in place to capture and document change. Undertake periodic reviews as appropriate to review any implemented changes against the Business Continuity Plan to ensure that it remains effective.

GLOBRIN Business Continuity Workshop Documentation and Evidence As part of any tender process you need to be able to provide evidence. Document the Business Continuity plan testing, reviews and updates to create and audit trail. Consider getting a 3 rd party to review / certify against ISO22301 Business Continuity Management.

GLOBRIN Contact Details Globrin webwww.globrin.com m