By Jeff Fetherolf. Business Impact Analysis (BIA) A process of having the business process owners, business subject matter experts, etc. identify the.

Slides:



Advertisements
Similar presentations
1 The Basics of Business Continuity Presented by Mary F. Sandy, CBCP Business Continuity/Disaster Recovery Class DePaul University ©Mary F. Sandy, 2006.
Advertisements

Flood Loss Assessment APFM methodology
Information Technology Disaster Recovery Awareness Program.
Disaster Recovery Planning. Questions to the Audience.
BCM and Security ROGSI/DMS Präsentation ROGSI/DMS Suite for Corporate Survival ROGSI/Business Impact Analysis TOP 7 Best Practices for Business Continuity.
Reliability of the electrical service Business Continuity Management Business Impact Analysis (BIA) Critical ITC Services Minimum Business Continuity Objective.
Oregon Department of Education Business Continuity / Disaster Recovery Program Implementation Mark Tyler Nigel Crowhurst.
Building Upgrade Tool City of Melbourne Ed Brown June 2013.
1 The process of analyzing all core business functions and establishing an optimized timetable for recovery. Provides baseline for:  Justification for.
Chapter 5: Asset Classification
Daylight Savings Time Transition Planning. The Daylight Savings Operational Risks Affect on transaction cash flow? Affect on service delivery? Affect.
© 2009 EMC Corporation. All rights reserved. Introduction to Business Continuity Module 3.1.
1 Disk Based Disaster Recovery & Data Replication Solutions Gavin Cole Storage Consultant SEE.
Mainframe Replication and Disaster Recovery Services.
Planning for Contingencies
Principles of Information Security, 2nd Edition1 Risk Management.
3rd Party Risk Categorization Process
Gulf Coast Energy International Business Continuity / Disaster Recovery Planning and Design Proposal Prepared by Andrew Rolf, Felipe Torres, Pranay Jaiswal.
Business Continuity and You! The Ohio State University Business & Finance Enterprise Continuity Program Quarterly Update October 2008Business and Finance.
IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer.
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
Business Continuity & Disaster Recovery Daniel Griggs Solutions Architect Ohio Valley September 30, 2008.
Investment Portfolio Methodologies Pertemuan Matakuliah: A Strategi Investasi IT Tahun: 2009.
DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection.
David N. Wozei Systems Administrator, IT Auditor.
Business Continuity & Disaster recovery
2010 Virginia RIMS and PRIMA Conference October 5, 2010 Business Impact Analysis: The Road Map to Managing Risks.
IT Disaster Recovery CAUBO 2008 Information Systems and Technology.
STORAGE MANAGEMENT/MASTER: The Storage Control Center SRM, Performance Monitoring and Operations Jenney Fields Senior Consultant GlassHouse Technologies,
Business Continuity and Disaster Recovery Chapter 8 Part 1 Pages 897 to 914.
Consolidation And The Enterprise. Ohio Digital Government Summit: Consolidation And The Enterprise Mark Stevanovich EMC Federal Client Services 5 October.
Service Level Agreements Service Level Statements NO YES The process of negotiating and defining the levels of user service (service levels) required.
Risk Management CS5493. Risk Management The process of ● identifying, ● assessing, ● prioritizing, and ● mitigating risks.
Business Continuity Management Rikus Matthyser Executive: Telkom Business Integration Services.
Key Terms Business Continuity Plan (BCP) – A comprehensive written plan to maintain or resume business in the event of a disruption Critical Process –
Disaster Recovery Sudath Wijeratne 15-Sep-06. Information Services 2 Agenda Background Methodology Our DR Strategy Learning Management system (Blackboard)
9 juni 2009 Alex van Os de Man BCI Forum 2009 Business Impact Analysis Process.
Business Impact Analysis Alma College, Ontario Massachusetts RIMS March 2012 Supply Chain Risk Management: Developing the Roadmap.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
Urban Infrastructure and Its Protection Responding to the Unexpected Interest Group Report.
Chapter 3: Business Continuity Planning. Planning for Business Continuity Assess risks to business processes Minimize impact from disruptions Maintain.
Business Continuity Planning Operations. Bank Composite’s Continuity Quandry  What Business Operations Are Truly Critical Requiring Redundancy?  What.
Business Continuity Management 101. KeepItSafe Professional Services The portfolio of business continuity management is to ensure we assist our clients.
3 STUDENT ASSESSMENT DEPARTMENT
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
SWIFT Business Continuity & Connectivity
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-VI)
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
S7-1 © 2001 Carnegie Mellon University OCTAVE SM Process 7 Conduct Risk Analysis Software Engineering Institute Carnegie Mellon University Pittsburgh,
Planning for Application Recovery
Utilizing Your Business Continuity Plan.
Providing Application High Availability
Server Upgrade HA/DR Integration
Value Analysis and Benefit/Risk Methodologies Pertemuan 25-26
BUSINESS CONTINUITY BY HUI ZHENG.
Business Continuity / Recovery
IS4550 Security Policies and Implementation Unit 7 Risk Management
Business Continuity Plan Training
Planning for a Plan: Disaster Recovery Preparation
Fundamentals of a Business Impact Analysis
The "Who, What, When, Where, Why, and How" of a
Business Impact Analysis 101
بعض النقاط التي تؤخذ في الحسبان عند تقييم الاستثمارات الزراعية
Dennis Reid Senior Consultant Elliot Consulting, LLC
Mark Tyler Nigel Crowhurst
Managed Content Services
Information Security Risks; All-in-One Terminology
Risk Analysis Objectives Discuss the importance of Risk Analysis
Conducting a Business Impact Analysis (BIA)
Presentation transcript:

By Jeff Fetherolf

Business Impact Analysis (BIA) A process of having the business process owners, business subject matter experts, etc. identify the criticality of a business’ processes by assessing its Financial and operational / Intangible impacts as a result of unavailability. While completing a BIA for each business process these individuals will also identify the Applications and that support each business process. Application Impact Analysis (AIA) A process of having the an Information Technology (IT) individual assess the criticality, priority, etc. of an Application. Cost Benefit Analysis (CBA) The process of evaluating the Total Cost of Ownership (TCO) against the amount of Risk Reduction.

60 Min 05 Min15 Min 30 Min 45 Min 04 Hours 08 Hours 24 Hours 02 Days03 Days04 Days 07 Days 30 Days 02 Hours Recovery Time Recovery Time Objective (RTO): Organization’s Acceptable Amount of IT Absence Recovery Time Achievable (RTA): Based on Resources, Processes, etc., the true / realistic recovery time of the organization Time of Disaster

02 Hours 05 Min15 Min30 Min 45 Min 60 Min 04 Hours08 Hours24 Hours 02 Days03 Days04 Days 07 Days 30 Days Recovery Point Objective Time of Disaster Recovery Point Objective (RPO): Organization’s Acceptable Amount of Data Loss Recovery Point Achievable (RPA): Based on Resources, Processes, etc., the true / realistic recovery point of the organization

Business Impact Analysis Process Mapping Asset Mapping Storage Mapping Data Mapping

Identify each Department’s Business Processes Identify the criticality of each Business Process Identify the interdependencies between Business Processes and Departments

Identify the Data Elements (Variables) for each Application Identify how the Data Elements are utilized with each Business Process Identify how each Department utilizes the Data Elements Identify the Criticality & Sensitivity of the Data Elements

Identify the required Storage to support the Recovery Time Objective requirements of the Business Identify the location of the Critical and Sensitive Data Identify, using Cost Benefit Analysis, the need to segregate Data by Tier

Identify the Hardware and Software (HW/SW) for each Application Identify HW/SW utilized by each Business Process Identify the criticality of HW/SW

Business Impact Analyses provide Business Processes’ and Applications’ Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) Business Impact Analyses can also create a bridge between Business Processes, Data Elements, Storage, and Assets