SlideShare una empresa de Scribd logo
1 de 15
Disaster
Preparedness
Program Management
The preparedness plan is built on a foundation of management
leadership, commitment and financial support. Without
management commitment and financial support, it will be
difficult to build the program, maintain resources and keep the
plan up-to-date.
• DR Coordinator – leads the preparedness program for
organization
• DR Committee – includes employees that have knowledge
of all aspects of the business
Preparedness Policy
A preparedness policy should be consistent with the mission and
vision of the business. The policy should define roles and
responsibilities of the committee and designate employees to
keep the program current. The policy should also define the goals
and objectives of the program.
Preparedness Goals
Short term goals
• Establish committee
• Conduct Risk Assessment
• Improve RTO/RPO times
• Take inventory of assets
Long term goals
• Upgrade building protection
• Implement Data Backup
Solution
• Transition operations to the
cloud
• Establish Preparedness Program
Crisis Communications
Effective and timely communication is critical following a
hazardous event. Identify an emergency response procedure in
the event of a disaster.
Depending on the type of crisis, identify the lines of authority,
succession of management, and delegation of authority.
Include key vendors and contractors that need to be involved
during response and recovery efforts.
Determine Your
Risks
Risk Assessment
When developing a Disaster Preparedness Plan, it’s important to take
an “all hazards” approach.
Consider the three types of hazards, natural, human, and technology.
Determine how they could affect your business differently. There are
many possible scenarios that could unfold depending on variables
such as timing and magnitude of the event.
Assess the risk of your business by look for vulnerabilities that would
make an asset more susceptible to damage or loss
Risk Assessment
ProbabilityandMagnitude
Vulnerability
Hazards
• Fire
• Explosion
• Natural Hazard
• Hazardous Material Spill
• Terrorism
• Workplace Violence
• Pandemic disease
• Utility outage
• Mechanical failure
• Supplier failure
• Cyber attack
Impacts
• Casualties
• Property Damage
• System Failure
• Equipment Damage
• Interruption to Supply Chain
• Financial Loss
• Restricted Access
• Data Corruption
• Environmental Contamination
• Loss of Customers and/or Trust
• Fines and Penalties
• Lawsuits
Assets at Risk
• People
• Property (building, critical
infrastructure)
• Supply Chain
• Systems/Equipment
• Information Technology
• Business Operations
• Reputation of Entity
• Confidence in Entity
• Regulatory and contractual
obligations
• Environment
Source: Ready.gov
Business Impact Analysis
The Business Impact Analysis looks at operational and financial impacts
resulting from a disruption in business functions and processes.
Consider potential impacts resulting from a hazardous event. How would
your business be impacted if any of these disruptions occurred?
• Property or equipment damage
• Restricted access (data or property)
• Interruption of supply chain
• Utility/Power outage
Mitigating Risks and Recovery Strategies
Businesses can reduce potential impact by investing in hazard insurance and
disaster recovery solutions.
A disaster recovery strategy should be developed for information technology (IT)
systems, applications, and data. It should anticipate the loss of one or more of the
key components of a technology system, including networks, servers, desktops
and laptops, wireless devices, data and connectivity.
Having a disaster recovery strategy in place will help your business recover
more quickly and efficiently than it would without one.
Data Impact Analysis
The Data Impact Analysis looks at operational and financial impacts
resulting from a disruption in business systems and applications.
To determine the impact a hazardous event has on business data, you
need to consider how long your business can afford to be offline. This is
often referred to as your Recovery Time Objective (RTO) or Recovery
Point Objective (RPO).
Planning for
Disaster
Disaster Preparedness Plan
A Disaster Preparedness Plan should identify resources, strategies and plans
to effectively respond to, manage, and recover from a hazardous event.
Plans should include:
• Resource Management and
Maintenance
• Emergency Response Plan
• Crisis Communications Plan
• Business Continuity Plan
• Data Recovery Plan
• Manual Workarounds
• Employee Assistance Guidelines
• Incident Management Process
• Training Program
Determine Plan Triggers
When do you plan to implement the Disaster Preparedness Plan?
• When there is property damage?
• If network resources are unavailable?
• During a power outage?
• If there is a hostile intruder?
• Or during a specific combination of events?
Disaster Preparedness Regulations
Federal, state, and local laws and regulations may define minimum
requirements for emergency management and business continuity.
Based on your industry, determine if any of these regulations apply and then
identify the requirements that need to be incorporated into your
preparedness plan.
Regulations may apply to hazard prevention, risk mitigation, emergency
response and business continuity.
Visit: www.ready.gov/laws-authorities for information on regulations for
Employee Safety and Health, Environment, Life Safety and Fire Codes.

Más contenido relacionado

La actualidad más candente

Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesIISPEastMids
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentationEthan S. Burger
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsNicholas Van Exan
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability PresentationSean Graham
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationEric Reehl
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityPECB
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesTripwire
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionShawn Tuma
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance TempRohan Sehgal
 
New York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services CompaniesNew York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services CompaniesCitrin Cooperman
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseCGTI
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSScott Suhy
 

La actualidad más candente (20)

Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
 
New York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services CompaniesNew York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services Companies
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 

Destacado

October AST Training
October AST TrainingOctober AST Training
October AST TrainingJared Rodgers
 
Earthquake 1
Earthquake 1Earthquake 1
Earthquake 1efahyusof
 
PDEA Lecturematerial
PDEA LecturematerialPDEA Lecturematerial
PDEA Lecturemateriallous127
 
Disaster Risk Reduction and Management
Disaster Risk Reduction and ManagementDisaster Risk Reduction and Management
Disaster Risk Reduction and ManagementSamie Cabural
 
Disaster management-ppt
Disaster management-pptDisaster management-ppt
Disaster management-pptVinod Kumari
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpointguested929b
 

Destacado (7)

October AST Training
October AST TrainingOctober AST Training
October AST Training
 
Earthquake 1
Earthquake 1Earthquake 1
Earthquake 1
 
Disaster preparedness
Disaster preparednessDisaster preparedness
Disaster preparedness
 
PDEA Lecturematerial
PDEA LecturematerialPDEA Lecturematerial
PDEA Lecturematerial
 
Disaster Risk Reduction and Management
Disaster Risk Reduction and ManagementDisaster Risk Reduction and Management
Disaster Risk Reduction and Management
 
Disaster management-ppt
Disaster management-pptDisaster management-ppt
Disaster management-ppt
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpoint
 

Similar a A Guide to Disaster Preparedness for Businesses

Cyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated DisciplineCyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated DisciplineGraeme Parker
 
IT Business Continuity Planning 2004
IT Business Continuity Planning 2004IT Business Continuity Planning 2004
IT Business Continuity Planning 2004Donald E. Hester
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery PlanningKathy Pelletier
 
A Guide for Businesses.pdf
A Guide for Businesses.pdfA Guide for Businesses.pdf
A Guide for Businesses.pdfDaviesParker
 
Strategic Essentials for Effective Incident Response Planning.pptx
Strategic Essentials for Effective Incident Response Planning.pptxStrategic Essentials for Effective Incident Response Planning.pptx
Strategic Essentials for Effective Incident Response Planning.pptxshortarmssolution
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity CapabilityRod Davis
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryEC-Council
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response PlanResilient Systems
 
Vulnerability Management Whitepaper PowerPoint Presentation Slides
Vulnerability Management Whitepaper PowerPoint Presentation SlidesVulnerability Management Whitepaper PowerPoint Presentation Slides
Vulnerability Management Whitepaper PowerPoint Presentation SlidesSlideTeam
 
The Surprising Truth About Your Disaster Recovery Maturity Level
The Surprising Truth About Your Disaster Recovery Maturity LevelThe Surprising Truth About Your Disaster Recovery Maturity Level
The Surprising Truth About Your Disaster Recovery Maturity LevelAxcient
 
Resus Advisory Profile - Resilience services Nov 15
Resus Advisory Profile - Resilience services Nov 15Resus Advisory Profile - Resilience services Nov 15
Resus Advisory Profile - Resilience services Nov 15David John Bollaert
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by FirstMutualHoldings
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksResilient Systems
 
Getting Started with Business Continuity
Getting Started with Business ContinuityGetting Started with Business Continuity
Getting Started with Business ContinuityStephen Cobb
 
Business Continuity as a Career
Business Continuity as a CareerBusiness Continuity as a Career
Business Continuity as a CareerBonnie Canal
 
Module 9 - External Crisis – What to do!.pptx
Module 9 - External Crisis – What to do!.pptxModule 9 - External Crisis – What to do!.pptx
Module 9 - External Crisis – What to do!.pptxcaniceconsulting
 

Similar a A Guide to Disaster Preparedness for Businesses (20)

BiznetGio Presentation Business Continuity
BiznetGio Presentation Business ContinuityBiznetGio Presentation Business Continuity
BiznetGio Presentation Business Continuity
 
Cyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated DisciplineCyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated Discipline
 
IT Business Continuity Planning 2004
IT Business Continuity Planning 2004IT Business Continuity Planning 2004
IT Business Continuity Planning 2004
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
 
A Guide for Businesses.pdf
A Guide for Businesses.pdfA Guide for Businesses.pdf
A Guide for Businesses.pdf
 
Strategic Essentials for Effective Incident Response Planning.pptx
Strategic Essentials for Effective Incident Response Planning.pptxStrategic Essentials for Effective Incident Response Planning.pptx
Strategic Essentials for Effective Incident Response Planning.pptx
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
 
Apdip disaster mgmt
Apdip disaster mgmtApdip disaster mgmt
Apdip disaster mgmt
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 
DDHI Board Report.ppsx
DDHI Board Report.ppsxDDHI Board Report.ppsx
DDHI Board Report.ppsx
 
Vulnerability Management Whitepaper PowerPoint Presentation Slides
Vulnerability Management Whitepaper PowerPoint Presentation SlidesVulnerability Management Whitepaper PowerPoint Presentation Slides
Vulnerability Management Whitepaper PowerPoint Presentation Slides
 
The Surprising Truth About Your Disaster Recovery Maturity Level
The Surprising Truth About Your Disaster Recovery Maturity LevelThe Surprising Truth About Your Disaster Recovery Maturity Level
The Surprising Truth About Your Disaster Recovery Maturity Level
 
Resus Advisory Profile - Resilience services Nov 15
Resus Advisory Profile - Resilience services Nov 15Resus Advisory Profile - Resilience services Nov 15
Resus Advisory Profile - Resilience services Nov 15
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber Attacks
 
Getting Started with Business Continuity
Getting Started with Business ContinuityGetting Started with Business Continuity
Getting Started with Business Continuity
 
Qatar Proposal
Qatar ProposalQatar Proposal
Qatar Proposal
 
Business Continuity as a Career
Business Continuity as a CareerBusiness Continuity as a Career
Business Continuity as a Career
 
Module 9 - External Crisis – What to do!.pptx
Module 9 - External Crisis – What to do!.pptxModule 9 - External Crisis – What to do!.pptx
Module 9 - External Crisis – What to do!.pptx
 

Último

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docxRodelinaLaud
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 

Último (20)

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docx
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 

A Guide to Disaster Preparedness for Businesses

  • 2. Program Management The preparedness plan is built on a foundation of management leadership, commitment and financial support. Without management commitment and financial support, it will be difficult to build the program, maintain resources and keep the plan up-to-date. • DR Coordinator – leads the preparedness program for organization • DR Committee – includes employees that have knowledge of all aspects of the business
  • 3. Preparedness Policy A preparedness policy should be consistent with the mission and vision of the business. The policy should define roles and responsibilities of the committee and designate employees to keep the program current. The policy should also define the goals and objectives of the program.
  • 4. Preparedness Goals Short term goals • Establish committee • Conduct Risk Assessment • Improve RTO/RPO times • Take inventory of assets Long term goals • Upgrade building protection • Implement Data Backup Solution • Transition operations to the cloud • Establish Preparedness Program
  • 5. Crisis Communications Effective and timely communication is critical following a hazardous event. Identify an emergency response procedure in the event of a disaster. Depending on the type of crisis, identify the lines of authority, succession of management, and delegation of authority. Include key vendors and contractors that need to be involved during response and recovery efforts.
  • 7. Risk Assessment When developing a Disaster Preparedness Plan, it’s important to take an “all hazards” approach. Consider the three types of hazards, natural, human, and technology. Determine how they could affect your business differently. There are many possible scenarios that could unfold depending on variables such as timing and magnitude of the event. Assess the risk of your business by look for vulnerabilities that would make an asset more susceptible to damage or loss
  • 8. Risk Assessment ProbabilityandMagnitude Vulnerability Hazards • Fire • Explosion • Natural Hazard • Hazardous Material Spill • Terrorism • Workplace Violence • Pandemic disease • Utility outage • Mechanical failure • Supplier failure • Cyber attack Impacts • Casualties • Property Damage • System Failure • Equipment Damage • Interruption to Supply Chain • Financial Loss • Restricted Access • Data Corruption • Environmental Contamination • Loss of Customers and/or Trust • Fines and Penalties • Lawsuits Assets at Risk • People • Property (building, critical infrastructure) • Supply Chain • Systems/Equipment • Information Technology • Business Operations • Reputation of Entity • Confidence in Entity • Regulatory and contractual obligations • Environment Source: Ready.gov
  • 9. Business Impact Analysis The Business Impact Analysis looks at operational and financial impacts resulting from a disruption in business functions and processes. Consider potential impacts resulting from a hazardous event. How would your business be impacted if any of these disruptions occurred? • Property or equipment damage • Restricted access (data or property) • Interruption of supply chain • Utility/Power outage
  • 10. Mitigating Risks and Recovery Strategies Businesses can reduce potential impact by investing in hazard insurance and disaster recovery solutions. A disaster recovery strategy should be developed for information technology (IT) systems, applications, and data. It should anticipate the loss of one or more of the key components of a technology system, including networks, servers, desktops and laptops, wireless devices, data and connectivity. Having a disaster recovery strategy in place will help your business recover more quickly and efficiently than it would without one.
  • 11. Data Impact Analysis The Data Impact Analysis looks at operational and financial impacts resulting from a disruption in business systems and applications. To determine the impact a hazardous event has on business data, you need to consider how long your business can afford to be offline. This is often referred to as your Recovery Time Objective (RTO) or Recovery Point Objective (RPO).
  • 13. Disaster Preparedness Plan A Disaster Preparedness Plan should identify resources, strategies and plans to effectively respond to, manage, and recover from a hazardous event. Plans should include: • Resource Management and Maintenance • Emergency Response Plan • Crisis Communications Plan • Business Continuity Plan • Data Recovery Plan • Manual Workarounds • Employee Assistance Guidelines • Incident Management Process • Training Program
  • 14. Determine Plan Triggers When do you plan to implement the Disaster Preparedness Plan? • When there is property damage? • If network resources are unavailable? • During a power outage? • If there is a hostile intruder? • Or during a specific combination of events?
  • 15. Disaster Preparedness Regulations Federal, state, and local laws and regulations may define minimum requirements for emergency management and business continuity. Based on your industry, determine if any of these regulations apply and then identify the requirements that need to be incorporated into your preparedness plan. Regulations may apply to hazard prevention, risk mitigation, emergency response and business continuity. Visit: www.ready.gov/laws-authorities for information on regulations for Employee Safety and Health, Environment, Life Safety and Fire Codes.

Notas del editor

  1. TELL STORY ABOUT GIBSON GAS LEAK The preparedness program is built on a foundation of management leadership, commitment and financial support. Without management commitment and financial support, it will be difficult to build the program, maintain resources and keep the plan up-to-date. The program coordinator leads the disaster preparedness program and assists with its development, implementation, evaluation and maintenance. Disaster Recovery Committee should have knowledge in these areas of the business: Legal Human Resources Public Relations Insurance and Risk Management Environmental Health and Safety (EHS) Finance Labor Relations Operations Facilities or Property Management Engineering Security Medical Information Technology Purchasing, Supply Chain and Distribution Quality Control Employees
  2. A preparedness policy should be consistent with the mission and vision of the business. The policy should define roles and responsibilities of the committee and designate employees to keep the program current. The policy should also define the goals and objectives of the program. Basic policy outline: Plan Scope: A general statement regarding the Disaster Preparedness Program Plan Committee: Define the coordinator and committee members Plan Distribution Access: Where are copies of the plan stored? Who has access to the plan? Plan Objectives: What goals of the Disaster Preparedness Program Plan Audit and Maintenance: How often will the program be reviewed
  3. Consider goals and objectives for managing risk, investing in resources, establishing capabilities through training and exercising and complying with regulations. Consider both short-term objectives for the development of the program and long-term objectives that may require more significant planning or investment. Goals should be tangible and measureable. ASK CROWD TO NAME GOALS OUT LOUD. WRITE DOWN IF POSSIBLE.
  4. Effective and timely communication is critical following a hazardous event. Identify a emergency response procedure in the event of a disaster. Depending on the type of crisis, identify the lines of authority, succession of management, and delegation of authority. Include key vendors and contractors that need to be involved during response and recovery efforts GIVE CROWD TIME TO ADD VENDORS AND CONTRACTORS THAT THEY CAN THINK OF.
  5. TALK ABOUT RISKS AND WHAT CONSTITUTES A DISASTER.
  6. When developing a Disaster Preparedness Plan, it’s important to take an “all hazards” approach. Consider the three types of hazards, natural, human, and technology. Determine how they could affect your business differently. There are many possible scenarios that could unfold depending on variables such as timing and magnitude of the event. Assess the risk of your business by look for vulnerabilities that would make an asset more susceptible to damage or loss
  7. GIVE CROWD TIME TO COMPLETE RISK ASSESSMENT TABLE Column 1: List assets types (people, facilities, machinery, equipment, information technology, etc.) Column 2: List hazard and hazard type (natural, human, technology) that would impact asset. There may be more than one per asset. Column 3: For each hazard, consider the impact it would have on the asset. (high or low) Column 4: Identify asset vulnerabilities or weaknesses that would make it susceptible to loss. Determine opportunities for prevention or risk mitigation. Column 5: Estimate the probability that the hazards from column 2 will occur (Low, Medium, or High) Column 6 – 10: Rate the level of impact each hazard from column 2 will have on core business assets (people, property, operations*, environment, entity**) from Low, Medium, or High *use business impact analysis for operations, **use potential financial, regulatory, contractual, and brand/image/reputation impacts Column 11: The Overall Hazard Rating is a two-letter combination of the rating in column 5 and the highest rating in columns 6-10. Review scenarios with moderate (MM) to high (HH) impacts. Consider what actions can be taken to mitigate risks or reduce potential impacts.
  8. The business impact analysis looks at operational and financial impacts resulting from a disruption in business functions and processes. Consider potential impacts resulting from a hazardous event. How would your business be impacted if any of these disruptions occurred? Property or equipment damage Restricted access (data or property) Interruption of supply chain Utility/Power outage CONDUCT BIA ASSESSMENT: ASK CROWD TO IDENTIFY POTENTIAL IMPACTS OF DISRUPTION TO A BUSINESS FUNCTION OR PROCESS THEY ARE RESPONSIBLE FOR. First column: Identify a point-in-time when the interruption would have greater impact (e.g., season, end of month, end of quarter). Second column: Consider the potential duration of the interruption (e.g., 1 hour, 1 day, 1 week). Third column: Determine the operational impact of the interruption (e.g., lost sales, negative cash flow, increased expenses, fines or penalties, customer dissatisfaction, etc.). Fourth column: Determine the financial impact of the interruption considering the point-in-time, duration, and operational impact. How much will this disruption cost you?
  9. Businesses can reduce potential impact by investing in hazard insurance and disaster recovery solutions. Recovery strategies should be developed for Information technology (IT) systems, applications and data, and anticipate the loss of one or more of it’s key components, including networks, servers, desktops, laptops, wireless devices, data and connectivity. Having a recovery strategy in place will help your business recover more quickly and efficiently than it would without one.
  10. The Data Impact Analysis looks at operational and financial impacts resulting from a disruption in business systems and applications. To determine the impact a hazardous event has on business data, you need to decide how long your business can afford to be offline. TAKE CROWD THROUGH DATA IMPACT ANALYSIS PROVIDED BY DATTO. Ask crowd to fill in worksheet: Recovery Process How much data is on your critical business systems? How often do you currently backup these systems? How long does it take to initiate your recovery process? Are you recovering data from a local network or the cloud? Downtime Costs 5. How many employees would be affected if the critical systems fail? 6. What is the average wage of an employee using these systems? 7. What is the overhead cost of these employees? 8. What is the revenue generated per hour of these employees? Calculations Number 3 + (Number 1/10gbps*) =Downtime *Local speed is the default local restore speed based on a typical gigabyte connection. Local speed in South Bend is typically 10 gbps.    Downtime Costs (Number 5 x Number 6) + (Number 7 + Number 8) = Cost of Downtime per hour    Financial Impact to Business Downtime x Cost of Downtime = Total Financial Impact   
  11. Now that we have determined the areas of vulnerability, you are ready to begin developing a disaster preparedness plan. OUTLINED IN WORBOOK: Resource Management and Maintenance: Resources needed for responding to emergencies, continuing business operations and communicating during and after an incident should be identified and assessed. Resources and Maintenance procedures should include: Program administration and lines of authority Vendor and Response Teams contact List Policies and Organizational Statements Plan goals and objectives  Plan review schedule and assignments Corrective action measures to address deficiencies Emergency Response Plan: A plan to protect people, property and the environment should be developed. Plans should include evacuation, sheltering in place and lockdown as well as plans for other types of threats identified during the risk assessment. Crisis Communications Plan: A plan to communicate with employees, client management, the news media and stakeholder. Business Continuity Plan: A business continuity plan that includes short-term recovery strategies to overcome the disruption of business should be developed. Operations Plan – equipment & supplies, HR – How will people get paid? Data Recovery Plan: A plan to recover computer hardware, connectivity and electronic data to support critical business processes should be developed. Manual Workarounds: Document all forms and resource requirements for manual workarounds Employee Assistance Guidelines: The business preparedness plan should encourage employees and their families to develop family preparedness plans. Plans should also be developed to support the needs of employees following an incident. Incident Management Process: An incident management system is needed to define procedures and responsibilities to coordinate and manage activities before, during and following an incident. Procedures should include: Incident detection and reporting Alerting and notifications Business continuity plan activation Emergency operations center activation Damage assessment and situation analysis Incident action plan   Training: Persons with a defined role in the preparedness program should be trained to do their assigned tasks. All employees should be trained so they can take appropriate protective actions during an emergency. Training, testing and exercise plans to include: Training curriculum Testing schedule and procedures Fillable forms for business recovery and data recovery strategies Orientation, tabletop, and full-scale exercises
  12. In addition to the information provided in the last slide, some businesses may be required to adhere to federal, state, or local regulations. Included in your workbook is a link you can visit for more information on regulations for employee safety and health, environment, life safety and fire codes.
  13. In addition to the information provided in the last slide, some businesses may be required to adhere to federal, state, or local regulations. Included in your workbook is a link you can visit for more information on regulations for employee safety and health, environment, life safety and fire codes.