SlideShare una empresa de Scribd logo
1 de 65
Descargar para leer sin conexión
Designing and Implementing a
Business Continuity Architecture

Breakout Session #2543
Christopher Janoch
Sr. Network Engineer / Architect, Powell Goldstein, LLP
September 18, 2008




                                                 Christopher.Janoch@pogolaw.com
Designing and Implementing a
Business Continuity Architecture

A Case Study of:
Powell Goldstein, LLP




                         Christopher.Janoch@pogolaw.com
Christopher Janoch

Senior Network Engineer / Infrastructure Architect
        VMware Certified Professional
        DoubleTake Certified Engineer
        Zantaz Certified Engineer
        ITIL Certified


Experience in designing DR and BCP infrastructure in
        Legal Industries
        Financial Industries
        Construction Industries




                                                 Christopher.Janoch@pogolaw.com
Powell Goldstein, LLP

Business View
     200 Lawyer Firm (600 Users)
     Offices in Atlanta, Washington DC,
                 Dallas, and Charlotte




Technical View
     Primarily Microsoft-based Technology
     200+ Servers




                                             Christopher.Janoch@pogolaw.com
High Availability (HA)

A system that can provide a continuous service by detecting
hardware, node or application failures and automatically
reconfiguring the system appropriately.

     Fault-Tolerant Disk Array
     Redundant Power Source / UPS
     Redundant Network Connections
     Multiple Endpoint Service Clusters
     Failover Clusters




                                           Christopher.Janoch@pogolaw.com
Disaster Recovery (DR)

A system to aid in the process of restoring operations critical
to the resumption of business (communications, data,
workspace) after a natural or man-made disaster.

     Backup / Restore
     4-Hr Replacement Service Contracts
     Alternate Staging Site for Servers & Workstations
     Rebuild and Reinstall Affected Systems




                                                   Christopher.Janoch@pogolaw.com
Business Continuity Process (BCP)




A system aimed at allowing an organization to continue
functioning after (and ideally, during) a disaster, rather than
simply being able to recover after a disaster.




                                               Christopher.Janoch@pogolaw.com
Why do you need a plan?




                Christopher.Janoch@pogolaw.com
Protection Strategies are Insurance


          “Fast, Best, or Cheap – Choose any two!”




        $$$ vs. SPEED vs. RISK – Choose any two!




      You get what you pay for, But don’t pay too much!



                                             Christopher.Janoch@pogolaw.com
YOU need to be the one with a complete PLAN




   No one solution or vendor will adequately cover all needs.




         No one methodology will cover all situations.




                                               Christopher.Janoch@pogolaw.com
How do you make a plan?




                Christopher.Janoch@pogolaw.com
A Team-Oriented Approach is Needed


    Too many people involved and nothing gets done.




                    Committee Effect




                                        Christopher.Janoch@pogolaw.com
A Team-Oriented Approach is Needed


  Not enough people and nothing gets done thoroughly.




             Limited Focus and Few Opportunities




                                              Christopher.Janoch@pogolaw.com
A Team-Oriented Approach is Needed

       Department Management


       Project Management


       System Engineers


       Support Teams


       Business Representatives


       Vendors / Consultants




                                   Christopher.Janoch@pogolaw.com
A Team-Oriented Approach is Needed

       Department Management


       Project Management

                                             BCP
       System Engineers                   DESIGN
                                            TEAM
       Support Teams


       Business Representatives


       Vendors / Consultants




                                   Christopher.Janoch@pogolaw.com
Ideas & Solutions are Directed to a Core Design Team



                                  Business Function                         Application
  Staff Users                      Representatives                          Engineers




                  User Support                        Application Manager




                                  BCP Design Team




                Contributions are added by users that know the
                Applications and Business Functions the best.



                                                            Christopher.Janoch@pogolaw.com
BCP Compass                             Where are We?

            Maintenance     Analysis




    Implementation              Solution Design




           Organizational    Vendor
            Acceptance      Selection




                                        Christopher.Janoch@pogolaw.com
BCP MAP                      Where Are We Going?
               User Access




                   Data


           Application Services


          Infrastructure Services


            Communications


               Environment




                                    Christopher.Janoch@pogolaw.com
BCP MAP                      Where Are We Going?
               User Access


                   Data

           Application Services

          Infrastructure Services

            Communications




              Environment




                                    Christopher.Janoch@pogolaw.com
BCP MAP                   Where Are We Going?




            User Access




          Technology Stuff




                               Christopher.Janoch@pogolaw.com
BCP MAP                               Where Are We Going?
                        User Access




                            Data


Most Design Work    Application Services


                   Infrastructure Services


Most                 Communications
Troublesome

                        Environment




                                             Christopher.Janoch@pogolaw.com
Determine your Recovery Objectives               Maintenance    Analysis




                                         Implementation            Solution Design




                                               Organizational    Vendor
                                                Acceptance      Selection




       In some cases, the SERVICE is top priority


           In others the DATA is more critical




            Don’t Rely on IT’s judgment alone!




                                             Christopher.Janoch@pogolaw.com
BCP RULER




            Christopher.Janoch@pogolaw.com
BCP RULER




            Christopher.Janoch@pogolaw.com
BCP RULER




            Christopher.Janoch@pogolaw.com
BCP RULER              Recovery Solutions




                                 Backup/Restore
      Backup/Restore




                           Christopher.Janoch@pogolaw.com
Christopher.Janoch@pogolaw.com
Recovery Solutions




                     Server Rebuild
                     Backup/Restore
                     Continuous Backup
                     Continuous Backup
BCP RULER


                     Backup/Restore
Christopher.Janoch@pogolaw.com
Recovery Solutions




                     Server Rebuild
                     Backup/Restore
                     Continuous Backup
                     Cold Standby Server
                     Continuous Backup
BCP RULER


                     Backup/Restore
Christopher.Janoch@pogolaw.com
Recovery Solutions




                     Server Rebuild
                     Backup/Restore
                     Continuous Backup
                     Cold Standby Server
                     Asynchronous Replication
                     Synchronous Replication
                     Synchronous Replication
                     Asynchronous Replication
                     Continuous Backup
BCP RULER


                     Backup/Restore
Christopher.Janoch@pogolaw.com
Recovery Solutions




                     Server Rebuild
                     Backup/Restore
                     Continuous Backup
                     Cold Standby Server
                     Asynchronous Replication
                     Synchronous Replication
                     Redundant Systems
                     Synchronous Replication
                     Asynchronous Replication
                     Continuous Backup
BCP RULER


                     Backup/Restore
BCP RULER   Application Measurement




                     Christopher.Janoch@pogolaw.com
BCP RULER                       Application Measurement




            E-MAIL (Exchange)



                                 E-MAIL (Exchange)




                                                     Christopher.Janoch@pogolaw.com
BCP RULER                      Application Measurement




            Voicemail System




                               Voice Over IP




                                               Christopher.Janoch@pogolaw.com
BCP RULER                          Application Measurement




        Litigation Support Files




                                                  Litigation Support Files
                                            Christopher.Janoch@pogolaw.com
Christopher.Janoch@pogolaw.com
Application Measurement




                          Litigation Files (ARCHIVE)
                          Litigation Files (ACTIVE)
                          Litigation Files (ACTIVE)
                          Litigation Files (ARCHIVE)
BCP RULER
Protection Strategy Decisions                       Maintenance     Analysis




                                             Implementation            Solution Design




                                                   Organizational    Vendor
                                                    Acceptance      Selection



Centralized Services vs. Autonomous Offices
Centralizing proved to be more affordable, easier to design, and
  much easier to maintain


Automation vs. Manual Processes
Automation simplifies crisis management, but adds new risks




                                                  Christopher.Janoch@pogolaw.com
Costs must be Contained, Predicted, & Controlled




   Remember to account for Passive Infrastructure for *every*
                    Replicated System.




       Beware the cost of adding too much redundancy.




                                              Christopher.Janoch@pogolaw.com
The Solution MUST Survive in the Real World


“The more they over think the plumbing, the easier it is
       to stop up the sink” – Scotty (Star Trek)




                                         Christopher.Janoch@pogolaw.com
Understand Service & Application Interdependencies

     Test each system before declaring it PROTECTED




                                         Christopher.Janoch@pogolaw.com
Understand Service & Application Interdependencies

     Test each system before declaring it PROTECTED




                                         Christopher.Janoch@pogolaw.com
Understand Service & Application Interdependencies

     Test each system before declaring it PROTECTED




                                         Christopher.Janoch@pogolaw.com
Understand Service & Application Interdependencies

     Test each system before declaring it PROTECTED




                                         Christopher.Janoch@pogolaw.com
Understand Service & Application Interdependencies

     Test each system before declaring it PROTECTED




Document Dependencies for Future Growth and Design Changes


                                          Christopher.Janoch@pogolaw.com
BCP MAP                                Powell Goldstein’s Map
           User Access

                         Survivable Remote Access


               Data           Data Replication


       Application Services      Virtualization


      Infrastructure Services        Redundant Servers


                                          Alternate Service Providers with
          Communications
                                           Diverse Paths

                                                  Geographically Separate
           Environment
                                                   Datacenters




                                                       Christopher.Janoch@pogolaw.com
Case Study: Powell Goldstein




                               Christopher.Janoch@pogolaw.com
Case Study: Powell Goldstein




                               Christopher.Janoch@pogolaw.com
Case Study: Powell Goldstein




                               Christopher.Janoch@pogolaw.com
Case Study: Powell Goldstein




                               Christopher.Janoch@pogolaw.com
Case Study: Powell Goldstein




                               Christopher.Janoch@pogolaw.com
Case Study: Powell Goldstein




                               Christopher.Janoch@pogolaw.com
Case Study: Powell Goldstein




                               Christopher.Janoch@pogolaw.com
Case Study: Powell Goldstein




                               Christopher.Janoch@pogolaw.com
Case Study: Powell Goldstein




                               Christopher.Janoch@pogolaw.com
Testing & Vendor Selection                      Maintenance     Analysis




                                         Implementation            Solution Design




                                               Organizational    Vendor
                                                Acceptance      Selection




   Manufacturer designs may not apply in your environment


        “Your System” will *always* be an exception!




                                              Christopher.Janoch@pogolaw.com
Testing & Vendor Selection

    Products that look similar may not perform the same way.




                Don’t be afraid of the “little guy”


Support Statements to cover your implementation and environment
             are the Key to reducing future problems.




       Take the time to compare alternative solutions!




                                                  Christopher.Janoch@pogolaw.com
You can’t learn “Everything about Everything”


        Vendor implementation and “Health Checks”


                 Experienced Consultants




               Continuing Support Contracts




       Recognize when you need to hire assistance!



                                              Christopher.Janoch@pogolaw.com
Organizational Acceptance                            Maintenance     Analysis




                                              Implementation            Solution Design




                                                    Organizational    Vendor
                                                     Acceptance      Selection



A Business Continuity Plan is an Investment


A Business Continuity Plan is a Marketable Commodity


When Projects are embraced at the top of an organization,
 they are more easily accepted at the bottom.




                                                   Christopher.Janoch@pogolaw.com
The Slowest Adaptors may be those closest to you!!



                 The IT Department:

               Non BCP-Compliant Projects
               Hesitancy to trust the System
             “Reasonable” Conversion Delays
                 The “Local” Pilot Group
        The Blur between Development & Production




                                               Christopher.Janoch@pogolaw.com
Implementation                                     Maintenance     Analysis




                                            Implementation            Solution Design




                                                  Organizational    Vendor
                                                   Acceptance      Selection



Work your Map from both the Top and Bottom.


Starting with the Root Dependencies, protect each service
completely before moving to the next.


Your next Outage will not wait for you to be ready!




                                                 Christopher.Janoch@pogolaw.com
Take advantage of Redundant Systems


                          Buy New
          The new servers become your test lab and
    allow you to isolate the systems during implementation.




     Avoid the “Re-wiring the House Live” syndrome




                                              Christopher.Janoch@pogolaw.com
The System, Design, and Plan will continue to Change


         New services will be added to the system.


          Assumed RTO’s will be proved Incorrect.


               Technologies will be updated.


         Designed Solutions won’t work as Planned.


   Don’t upgrade BCP Key Components without Testing!




                                               Christopher.Janoch@pogolaw.com
Implement Change Management

    NOTHING changes without knowledge and approval
       EVERYTHING that changes gets documented


            Identify who will be responsible for the
        Implementation and Testing of which systems.


           Standardize Quality Control Checks and
                  Officially Scheduled Tests.


  Clear Processes for Updates, Changes, and Re-Builds must be
                 Documented and easily available.



                                                Christopher.Janoch@pogolaw.com
Ongoing Maintenance                             Maintenance     Analysis




                                         Implementation            Solution Design




                                               Organizational    Vendor
A New Mindset:                                  Acceptance      Selection


Business Continuity: Compliant or Not?




Regular Testing
Don’t just TEST….. USE!




                                              Christopher.Janoch@pogolaw.com
BCP Navigational Tools
                                                                                     User Access

         Maintenance       Analysis

                                                                                         Data


                                                                                 Application Services
  Implementation                Solution Design

                                                                                Infrastructure Services


                                                                                  Communications
        Organizational     Vendor
         Acceptance       Selection
                                                                                     Environment




                                                   !!!! OUTAGE !!!!

                                         RPO                          RTO

               MONTHS    DAYS    HOURS   MINUTES    SECONDS SECONDS   MINUTES   HOURS    DAYS MONTHS




                                                                                        Christopher.Janoch@pogolaw.com
Q&A

Breakout Session #2543
Christopher Janoch
Sr. Network Engineer / Architect, Powell Goldstein, LLP
September 18, 2008




                                                 Christopher.Janoch@pogolaw.com

Más contenido relacionado

La actualidad más candente

Making Problem Management Work for Your Organization
Making Problem Management Work for Your OrganizationMaking Problem Management Work for Your Organization
Making Problem Management Work for Your OrganizationAtlassian
 
A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5Gewurtz
 
Improve IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapImprove IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapInfo-Tech Research Group
 
Business Continuity - Business Risk & Management
Business Continuity - Business Risk & ManagementBusiness Continuity - Business Risk & Management
Business Continuity - Business Risk & ManagementAndrew Styles
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk ManagementGoutama Bachtiar
 
127017438_RMA_OperationalRiskAppetite_v1.0
127017438_RMA_OperationalRiskAppetite_v1.0127017438_RMA_OperationalRiskAppetite_v1.0
127017438_RMA_OperationalRiskAppetite_v1.0Rachael Phelan
 
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...Association for Project Management
 
Bridging enterprise-architecture and systems-thinking
Bridging enterprise-architecture and systems-thinkingBridging enterprise-architecture and systems-thinking
Bridging enterprise-architecture and systems-thinkingTetradian Consulting
 
Risk Management - Business Continuity Planning and Management
Risk Management  - Business Continuity Planning and ManagementRisk Management  - Business Continuity Planning and Management
Risk Management - Business Continuity Planning and ManagementCody Shive
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planningalanlund
 
The I Word: Moving Innovation from Research and Development (R&D) to Ideation...
The I Word: Moving Innovation from Research and Development (R&D) to Ideation...The I Word: Moving Innovation from Research and Development (R&D) to Ideation...
The I Word: Moving Innovation from Research and Development (R&D) to Ideation...Alan McSweeney
 
How to develop and govern a Technology Strategy in 10 weeks
How to develop and govern a Technology Strategy in 10 weeksHow to develop and govern a Technology Strategy in 10 weeks
How to develop and govern a Technology Strategy in 10 weeksLeo Barella
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity ManagementDiane Christina
 
A tailored enterprise architecture maturity model
A tailored enterprise architecture maturity modelA tailored enterprise architecture maturity model
A tailored enterprise architecture maturity modelPaul Sullivan
 
IT Governance – The missing compass in a technology changing world
 IT Governance – The missing compass in a technology changing world IT Governance – The missing compass in a technology changing world
IT Governance – The missing compass in a technology changing worldPECB
 
Governance Culture & Incentives- Fundamentals of Operational Risk
Governance Culture & Incentives- Fundamentals of Operational RiskGovernance Culture & Incentives- Fundamentals of Operational Risk
Governance Culture & Incentives- Fundamentals of Operational RiskAndrew Smart
 
Business continuity management system
Business continuity management systemBusiness continuity management system
Business continuity management systemsubbusai82
 

La actualidad más candente (20)

Making Problem Management Work for Your Organization
Making Problem Management Work for Your OrganizationMaking Problem Management Work for Your Organization
Making Problem Management Work for Your Organization
 
A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5
 
Gestion des incidents ITIL
Gestion des incidents ITILGestion des incidents ITIL
Gestion des incidents ITIL
 
Improve IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapImprove IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure Roadmap
 
Business Continuity - Business Risk & Management
Business Continuity - Business Risk & ManagementBusiness Continuity - Business Risk & Management
Business Continuity - Business Risk & Management
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
127017438_RMA_OperationalRiskAppetite_v1.0
127017438_RMA_OperationalRiskAppetite_v1.0127017438_RMA_OperationalRiskAppetite_v1.0
127017438_RMA_OperationalRiskAppetite_v1.0
 
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
 
Bridging enterprise-architecture and systems-thinking
Bridging enterprise-architecture and systems-thinkingBridging enterprise-architecture and systems-thinking
Bridging enterprise-architecture and systems-thinking
 
Risk Management - Business Continuity Planning and Management
Risk Management  - Business Continuity Planning and ManagementRisk Management  - Business Continuity Planning and Management
Risk Management - Business Continuity Planning and Management
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
The I Word: Moving Innovation from Research and Development (R&D) to Ideation...
The I Word: Moving Innovation from Research and Development (R&D) to Ideation...The I Word: Moving Innovation from Research and Development (R&D) to Ideation...
The I Word: Moving Innovation from Research and Development (R&D) to Ideation...
 
How to develop and govern a Technology Strategy in 10 weeks
How to develop and govern a Technology Strategy in 10 weeksHow to develop and govern a Technology Strategy in 10 weeks
How to develop and govern a Technology Strategy in 10 weeks
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
Problem Management
Problem ManagementProblem Management
Problem Management
 
A tailored enterprise architecture maturity model
A tailored enterprise architecture maturity modelA tailored enterprise architecture maturity model
A tailored enterprise architecture maturity model
 
La gestion des actifs, ISACA Québec Multiforce
La gestion des actifs, ISACA Québec MultiforceLa gestion des actifs, ISACA Québec Multiforce
La gestion des actifs, ISACA Québec Multiforce
 
IT Governance – The missing compass in a technology changing world
 IT Governance – The missing compass in a technology changing world IT Governance – The missing compass in a technology changing world
IT Governance – The missing compass in a technology changing world
 
Governance Culture & Incentives- Fundamentals of Operational Risk
Governance Culture & Incentives- Fundamentals of Operational RiskGovernance Culture & Incentives- Fundamentals of Operational Risk
Governance Culture & Incentives- Fundamentals of Operational Risk
 
Business continuity management system
Business continuity management systemBusiness continuity management system
Business continuity management system
 

Similar a Implementing A Business Continuity Architecture

When UX (guy) Meets Operations
When UX (guy) Meets OperationsWhen UX (guy) Meets Operations
When UX (guy) Meets OperationsTim Sheiner
 
Architecture vs. Design vs. Agile: What’s the Answer?
Architecture vs. Design vs. Agile: What’s the Answer?Architecture vs. Design vs. Agile: What’s the Answer?
Architecture vs. Design vs. Agile: What’s the Answer?TechWell
 
Keeping Your DevOps Transformation From Crushing Your Ops Capacity
Keeping Your DevOps Transformation From Crushing Your Ops Capacity Keeping Your DevOps Transformation From Crushing Your Ops Capacity
Keeping Your DevOps Transformation From Crushing Your Ops Capacity Rundeck
 
The Salesforce Playbook- 6 Steps to Better Deployments
The Salesforce Playbook- 6 Steps to Better DeploymentsThe Salesforce Playbook- 6 Steps to Better Deployments
The Salesforce Playbook- 6 Steps to Better DeploymentsAlex Cowan
 
Defining and Aligning Requirements using System Architect and DOORS
Defining and Aligning Requirements using System Architect and DOORSDefining and Aligning Requirements using System Architect and DOORS
Defining and Aligning Requirements using System Architect and DOORSPaul W. Johnson
 
Using Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
Using Lean Thinking to Identify and Address Delivery Pipeline BottlenecksUsing Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
Using Lean Thinking to Identify and Address Delivery Pipeline BottlenecksIBM UrbanCode Products
 
IT Outsourcing: Business Continuity by Design by OneNeck IT Services
IT Outsourcing: Business Continuity by Design by OneNeck IT ServicesIT Outsourcing: Business Continuity by Design by OneNeck IT Services
IT Outsourcing: Business Continuity by Design by OneNeck IT Servicesoneneckitservices
 
Dops 1033 dev-ops_review_final
Dops 1033 dev-ops_review_finalDops 1033 dev-ops_review_final
Dops 1033 dev-ops_review_finalDaniel Berg
 
Continuous Deployment at Etsy — TimesOpen NYC
Continuous Deployment at Etsy — TimesOpen NYCContinuous Deployment at Etsy — TimesOpen NYC
Continuous Deployment at Etsy — TimesOpen NYCMike Brittain
 
Server refresh program
Server refresh programServer refresh program
Server refresh programTal Aviv
 
Improving Throughput - Server Refresh Program
Improving Throughput - Server Refresh ProgramImproving Throughput - Server Refresh Program
Improving Throughput - Server Refresh ProgramTal Aviv
 
DevOps Transformation at Dynatrace and with Dynatrace
DevOps Transformation at Dynatrace and with DynatraceDevOps Transformation at Dynatrace and with Dynatrace
DevOps Transformation at Dynatrace and with DynatraceAndreas Grabner
 
Moving from Document Management to BOM Management
Moving from Document Management to BOM ManagementMoving from Document Management to BOM Management
Moving from Document Management to BOM ManagementRazorleaf Corporation
 
Dimensional planning (Devoxx 2009)
Dimensional planning (Devoxx 2009)Dimensional planning (Devoxx 2009)
Dimensional planning (Devoxx 2009)inxin
 
Modernizing Traditional Applications with Docker EE: From PoC to Production
Modernizing Traditional Applications with Docker EE: From PoC to ProductionModernizing Traditional Applications with Docker EE: From PoC to Production
Modernizing Traditional Applications with Docker EE: From PoC to ProductionDocker, Inc.
 
Project Recovery
Project RecoveryProject Recovery
Project Recoverytrethard
 
A Modern Finance Case Study – Cloud or On-Premise
A Modern Finance Case Study – Cloud or On-PremiseA Modern Finance Case Study – Cloud or On-Premise
A Modern Finance Case Study – Cloud or On-PremiseProphix Software
 
MongoDB World 2018: How an Idea Becomes a MongoDB Feature
MongoDB World 2018: How an Idea Becomes a MongoDB FeatureMongoDB World 2018: How an Idea Becomes a MongoDB Feature
MongoDB World 2018: How an Idea Becomes a MongoDB FeatureMongoDB
 
Combining Speed of Delivery and Quality in Complex Systems
Combining Speed of Delivery and Quality in Complex SystemsCombining Speed of Delivery and Quality in Complex Systems
Combining Speed of Delivery and Quality in Complex SystemsManuel Pais
 

Similar a Implementing A Business Continuity Architecture (20)

When UX (guy) Meets Operations
When UX (guy) Meets OperationsWhen UX (guy) Meets Operations
When UX (guy) Meets Operations
 
Architecture vs. Design vs. Agile: What’s the Answer?
Architecture vs. Design vs. Agile: What’s the Answer?Architecture vs. Design vs. Agile: What’s the Answer?
Architecture vs. Design vs. Agile: What’s the Answer?
 
Keeping Your DevOps Transformation From Crushing Your Ops Capacity
Keeping Your DevOps Transformation From Crushing Your Ops Capacity Keeping Your DevOps Transformation From Crushing Your Ops Capacity
Keeping Your DevOps Transformation From Crushing Your Ops Capacity
 
The Salesforce Playbook- 6 Steps to Better Deployments
The Salesforce Playbook- 6 Steps to Better DeploymentsThe Salesforce Playbook- 6 Steps to Better Deployments
The Salesforce Playbook- 6 Steps to Better Deployments
 
Defining and Aligning Requirements using System Architect and DOORS
Defining and Aligning Requirements using System Architect and DOORSDefining and Aligning Requirements using System Architect and DOORS
Defining and Aligning Requirements using System Architect and DOORS
 
Using Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
Using Lean Thinking to Identify and Address Delivery Pipeline BottlenecksUsing Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
Using Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
 
IT Outsourcing: Business Continuity by Design by OneNeck IT Services
IT Outsourcing: Business Continuity by Design by OneNeck IT ServicesIT Outsourcing: Business Continuity by Design by OneNeck IT Services
IT Outsourcing: Business Continuity by Design by OneNeck IT Services
 
Dops 1033 dev-ops_review_final
Dops 1033 dev-ops_review_finalDops 1033 dev-ops_review_final
Dops 1033 dev-ops_review_final
 
Continuous Deployment at Etsy — TimesOpen NYC
Continuous Deployment at Etsy — TimesOpen NYCContinuous Deployment at Etsy — TimesOpen NYC
Continuous Deployment at Etsy — TimesOpen NYC
 
Server refresh program
Server refresh programServer refresh program
Server refresh program
 
Improving Throughput - Server Refresh Program
Improving Throughput - Server Refresh ProgramImproving Throughput - Server Refresh Program
Improving Throughput - Server Refresh Program
 
DevOps Transformation at Dynatrace and with Dynatrace
DevOps Transformation at Dynatrace and with DynatraceDevOps Transformation at Dynatrace and with Dynatrace
DevOps Transformation at Dynatrace and with Dynatrace
 
Simplified BCP methodology
Simplified BCP methodologySimplified BCP methodology
Simplified BCP methodology
 
Moving from Document Management to BOM Management
Moving from Document Management to BOM ManagementMoving from Document Management to BOM Management
Moving from Document Management to BOM Management
 
Dimensional planning (Devoxx 2009)
Dimensional planning (Devoxx 2009)Dimensional planning (Devoxx 2009)
Dimensional planning (Devoxx 2009)
 
Modernizing Traditional Applications with Docker EE: From PoC to Production
Modernizing Traditional Applications with Docker EE: From PoC to ProductionModernizing Traditional Applications with Docker EE: From PoC to Production
Modernizing Traditional Applications with Docker EE: From PoC to Production
 
Project Recovery
Project RecoveryProject Recovery
Project Recovery
 
A Modern Finance Case Study – Cloud or On-Premise
A Modern Finance Case Study – Cloud or On-PremiseA Modern Finance Case Study – Cloud or On-Premise
A Modern Finance Case Study – Cloud or On-Premise
 
MongoDB World 2018: How an Idea Becomes a MongoDB Feature
MongoDB World 2018: How an Idea Becomes a MongoDB FeatureMongoDB World 2018: How an Idea Becomes a MongoDB Feature
MongoDB World 2018: How an Idea Becomes a MongoDB Feature
 
Combining Speed of Delivery and Quality in Complex Systems
Combining Speed of Delivery and Quality in Complex SystemsCombining Speed of Delivery and Quality in Complex Systems
Combining Speed of Delivery and Quality in Complex Systems
 

Último

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Último (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Implementing A Business Continuity Architecture

  • 1. Designing and Implementing a Business Continuity Architecture Breakout Session #2543 Christopher Janoch Sr. Network Engineer / Architect, Powell Goldstein, LLP September 18, 2008 Christopher.Janoch@pogolaw.com
  • 2. Designing and Implementing a Business Continuity Architecture A Case Study of: Powell Goldstein, LLP Christopher.Janoch@pogolaw.com
  • 3. Christopher Janoch Senior Network Engineer / Infrastructure Architect  VMware Certified Professional  DoubleTake Certified Engineer  Zantaz Certified Engineer  ITIL Certified Experience in designing DR and BCP infrastructure in  Legal Industries  Financial Industries  Construction Industries Christopher.Janoch@pogolaw.com
  • 4. Powell Goldstein, LLP Business View  200 Lawyer Firm (600 Users)  Offices in Atlanta, Washington DC, Dallas, and Charlotte Technical View  Primarily Microsoft-based Technology  200+ Servers Christopher.Janoch@pogolaw.com
  • 5. High Availability (HA) A system that can provide a continuous service by detecting hardware, node or application failures and automatically reconfiguring the system appropriately.  Fault-Tolerant Disk Array  Redundant Power Source / UPS  Redundant Network Connections  Multiple Endpoint Service Clusters  Failover Clusters Christopher.Janoch@pogolaw.com
  • 6. Disaster Recovery (DR) A system to aid in the process of restoring operations critical to the resumption of business (communications, data, workspace) after a natural or man-made disaster.  Backup / Restore  4-Hr Replacement Service Contracts  Alternate Staging Site for Servers & Workstations  Rebuild and Reinstall Affected Systems Christopher.Janoch@pogolaw.com
  • 7. Business Continuity Process (BCP) A system aimed at allowing an organization to continue functioning after (and ideally, during) a disaster, rather than simply being able to recover after a disaster. Christopher.Janoch@pogolaw.com
  • 8. Why do you need a plan? Christopher.Janoch@pogolaw.com
  • 9. Protection Strategies are Insurance “Fast, Best, or Cheap – Choose any two!” $$$ vs. SPEED vs. RISK – Choose any two! You get what you pay for, But don’t pay too much! Christopher.Janoch@pogolaw.com
  • 10. YOU need to be the one with a complete PLAN No one solution or vendor will adequately cover all needs. No one methodology will cover all situations. Christopher.Janoch@pogolaw.com
  • 11. How do you make a plan? Christopher.Janoch@pogolaw.com
  • 12. A Team-Oriented Approach is Needed Too many people involved and nothing gets done. Committee Effect Christopher.Janoch@pogolaw.com
  • 13. A Team-Oriented Approach is Needed Not enough people and nothing gets done thoroughly. Limited Focus and Few Opportunities Christopher.Janoch@pogolaw.com
  • 14. A Team-Oriented Approach is Needed  Department Management  Project Management  System Engineers  Support Teams  Business Representatives  Vendors / Consultants Christopher.Janoch@pogolaw.com
  • 15. A Team-Oriented Approach is Needed  Department Management  Project Management BCP  System Engineers DESIGN TEAM  Support Teams  Business Representatives  Vendors / Consultants Christopher.Janoch@pogolaw.com
  • 16. Ideas & Solutions are Directed to a Core Design Team Business Function Application Staff Users Representatives Engineers User Support Application Manager BCP Design Team Contributions are added by users that know the Applications and Business Functions the best. Christopher.Janoch@pogolaw.com
  • 17. BCP Compass Where are We? Maintenance Analysis Implementation Solution Design Organizational Vendor Acceptance Selection Christopher.Janoch@pogolaw.com
  • 18. BCP MAP Where Are We Going? User Access Data Application Services Infrastructure Services Communications Environment Christopher.Janoch@pogolaw.com
  • 19. BCP MAP Where Are We Going? User Access Data Application Services Infrastructure Services Communications Environment Christopher.Janoch@pogolaw.com
  • 20. BCP MAP Where Are We Going? User Access Technology Stuff Christopher.Janoch@pogolaw.com
  • 21. BCP MAP Where Are We Going? User Access Data Most Design Work Application Services Infrastructure Services Most Communications Troublesome Environment Christopher.Janoch@pogolaw.com
  • 22. Determine your Recovery Objectives Maintenance Analysis Implementation Solution Design Organizational Vendor Acceptance Selection In some cases, the SERVICE is top priority In others the DATA is more critical Don’t Rely on IT’s judgment alone! Christopher.Janoch@pogolaw.com
  • 23. BCP RULER Christopher.Janoch@pogolaw.com
  • 24. BCP RULER Christopher.Janoch@pogolaw.com
  • 25. BCP RULER Christopher.Janoch@pogolaw.com
  • 26. BCP RULER Recovery Solutions Backup/Restore Backup/Restore Christopher.Janoch@pogolaw.com
  • 27. Christopher.Janoch@pogolaw.com Recovery Solutions Server Rebuild Backup/Restore Continuous Backup Continuous Backup BCP RULER Backup/Restore
  • 28. Christopher.Janoch@pogolaw.com Recovery Solutions Server Rebuild Backup/Restore Continuous Backup Cold Standby Server Continuous Backup BCP RULER Backup/Restore
  • 29. Christopher.Janoch@pogolaw.com Recovery Solutions Server Rebuild Backup/Restore Continuous Backup Cold Standby Server Asynchronous Replication Synchronous Replication Synchronous Replication Asynchronous Replication Continuous Backup BCP RULER Backup/Restore
  • 30. Christopher.Janoch@pogolaw.com Recovery Solutions Server Rebuild Backup/Restore Continuous Backup Cold Standby Server Asynchronous Replication Synchronous Replication Redundant Systems Synchronous Replication Asynchronous Replication Continuous Backup BCP RULER Backup/Restore
  • 31. BCP RULER Application Measurement Christopher.Janoch@pogolaw.com
  • 32. BCP RULER Application Measurement E-MAIL (Exchange) E-MAIL (Exchange) Christopher.Janoch@pogolaw.com
  • 33. BCP RULER Application Measurement Voicemail System Voice Over IP Christopher.Janoch@pogolaw.com
  • 34. BCP RULER Application Measurement Litigation Support Files Litigation Support Files Christopher.Janoch@pogolaw.com
  • 35. Christopher.Janoch@pogolaw.com Application Measurement Litigation Files (ARCHIVE) Litigation Files (ACTIVE) Litigation Files (ACTIVE) Litigation Files (ARCHIVE) BCP RULER
  • 36. Protection Strategy Decisions Maintenance Analysis Implementation Solution Design Organizational Vendor Acceptance Selection Centralized Services vs. Autonomous Offices Centralizing proved to be more affordable, easier to design, and much easier to maintain Automation vs. Manual Processes Automation simplifies crisis management, but adds new risks Christopher.Janoch@pogolaw.com
  • 37. Costs must be Contained, Predicted, & Controlled Remember to account for Passive Infrastructure for *every* Replicated System. Beware the cost of adding too much redundancy. Christopher.Janoch@pogolaw.com
  • 38. The Solution MUST Survive in the Real World “The more they over think the plumbing, the easier it is to stop up the sink” – Scotty (Star Trek) Christopher.Janoch@pogolaw.com
  • 39. Understand Service & Application Interdependencies Test each system before declaring it PROTECTED Christopher.Janoch@pogolaw.com
  • 40. Understand Service & Application Interdependencies Test each system before declaring it PROTECTED Christopher.Janoch@pogolaw.com
  • 41. Understand Service & Application Interdependencies Test each system before declaring it PROTECTED Christopher.Janoch@pogolaw.com
  • 42. Understand Service & Application Interdependencies Test each system before declaring it PROTECTED Christopher.Janoch@pogolaw.com
  • 43. Understand Service & Application Interdependencies Test each system before declaring it PROTECTED Document Dependencies for Future Growth and Design Changes Christopher.Janoch@pogolaw.com
  • 44. BCP MAP Powell Goldstein’s Map User Access Survivable Remote Access Data Data Replication Application Services Virtualization Infrastructure Services Redundant Servers Alternate Service Providers with Communications Diverse Paths Geographically Separate Environment Datacenters Christopher.Janoch@pogolaw.com
  • 45. Case Study: Powell Goldstein Christopher.Janoch@pogolaw.com
  • 46. Case Study: Powell Goldstein Christopher.Janoch@pogolaw.com
  • 47. Case Study: Powell Goldstein Christopher.Janoch@pogolaw.com
  • 48. Case Study: Powell Goldstein Christopher.Janoch@pogolaw.com
  • 49. Case Study: Powell Goldstein Christopher.Janoch@pogolaw.com
  • 50. Case Study: Powell Goldstein Christopher.Janoch@pogolaw.com
  • 51. Case Study: Powell Goldstein Christopher.Janoch@pogolaw.com
  • 52. Case Study: Powell Goldstein Christopher.Janoch@pogolaw.com
  • 53. Case Study: Powell Goldstein Christopher.Janoch@pogolaw.com
  • 54. Testing & Vendor Selection Maintenance Analysis Implementation Solution Design Organizational Vendor Acceptance Selection Manufacturer designs may not apply in your environment “Your System” will *always* be an exception! Christopher.Janoch@pogolaw.com
  • 55. Testing & Vendor Selection Products that look similar may not perform the same way. Don’t be afraid of the “little guy” Support Statements to cover your implementation and environment are the Key to reducing future problems. Take the time to compare alternative solutions! Christopher.Janoch@pogolaw.com
  • 56. You can’t learn “Everything about Everything” Vendor implementation and “Health Checks” Experienced Consultants Continuing Support Contracts Recognize when you need to hire assistance! Christopher.Janoch@pogolaw.com
  • 57. Organizational Acceptance Maintenance Analysis Implementation Solution Design Organizational Vendor Acceptance Selection A Business Continuity Plan is an Investment A Business Continuity Plan is a Marketable Commodity When Projects are embraced at the top of an organization, they are more easily accepted at the bottom. Christopher.Janoch@pogolaw.com
  • 58. The Slowest Adaptors may be those closest to you!! The IT Department: Non BCP-Compliant Projects Hesitancy to trust the System “Reasonable” Conversion Delays The “Local” Pilot Group The Blur between Development & Production Christopher.Janoch@pogolaw.com
  • 59. Implementation Maintenance Analysis Implementation Solution Design Organizational Vendor Acceptance Selection Work your Map from both the Top and Bottom. Starting with the Root Dependencies, protect each service completely before moving to the next. Your next Outage will not wait for you to be ready! Christopher.Janoch@pogolaw.com
  • 60. Take advantage of Redundant Systems Buy New The new servers become your test lab and allow you to isolate the systems during implementation. Avoid the “Re-wiring the House Live” syndrome Christopher.Janoch@pogolaw.com
  • 61. The System, Design, and Plan will continue to Change New services will be added to the system. Assumed RTO’s will be proved Incorrect. Technologies will be updated. Designed Solutions won’t work as Planned. Don’t upgrade BCP Key Components without Testing! Christopher.Janoch@pogolaw.com
  • 62. Implement Change Management NOTHING changes without knowledge and approval EVERYTHING that changes gets documented Identify who will be responsible for the Implementation and Testing of which systems. Standardize Quality Control Checks and Officially Scheduled Tests. Clear Processes for Updates, Changes, and Re-Builds must be Documented and easily available. Christopher.Janoch@pogolaw.com
  • 63. Ongoing Maintenance Maintenance Analysis Implementation Solution Design Organizational Vendor A New Mindset: Acceptance Selection Business Continuity: Compliant or Not? Regular Testing Don’t just TEST….. USE! Christopher.Janoch@pogolaw.com
  • 64. BCP Navigational Tools User Access Maintenance Analysis Data Application Services Implementation Solution Design Infrastructure Services Communications Organizational Vendor Acceptance Selection Environment !!!! OUTAGE !!!! RPO RTO MONTHS DAYS HOURS MINUTES SECONDS SECONDS MINUTES HOURS DAYS MONTHS Christopher.Janoch@pogolaw.com
  • 65. Q&A Breakout Session #2543 Christopher Janoch Sr. Network Engineer / Architect, Powell Goldstein, LLP September 18, 2008 Christopher.Janoch@pogolaw.com