SlideShare una empresa de Scribd logo
1 de 14
23 March 2009 Rejuvenating BCM - Infrastructure Total of 5   pages Business Continuity Awareness Week 23 – 27 March 2009 Brigitte Theuma MBCI, CBCMMA, CBCMP, CBCITP, MIAEM
Table of Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
I. ICT Service Continuity Current State ,[object Object],[object Object],[object Object],[object Object]
a. Identifying Requirements and Weaknesses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: PAS 77: 2006
b. Risk Heat Map Key Adequate  mitigation in place Semi-adequate  mitigation in place Inadequate mitigation in place IT Security Data Centre Outage Supply  Chain Customer Billing Financial Systems Customer Data India Call Centre Failure of IT Outsource Extremely Remote 1 * 10-100 years Remote 1 * 2-10 years Possible in  Short to Medium Term 1 * 6-24 months Likely in Short Term 1 * 0-6 months Business Risks - IT Critical Significant Minimal Impact Likelihood
c. Business Criticality Heat Map Key Disaster Recovery in place RTO 24 hours Backup and restore procedures in place. RTO 36 hours No plan RTO unknown Data Centre Payroll Customer Billing Financial Systems Customer Data India Call Centre Telecoms & LAN Tactical Strategic Critical Mandatory Criticality of Systems vs. Availability Continuous Availability Disaster Recovery Backup & Restore Architecture Criticality email Internet Presence Online Ordering SRM Despatch Document Registry
II. Multi-Year Plan ,[object Object],[object Object],[object Object],[object Object]
a. Balancing DR/HA Design and Cost ,[object Object],[object Object],[object Object],[object Object],[object Object],Source: PAS77:2006
b. The Self-Funding IT Paradigm and Disaster Recovery ,[object Object],   Invest in “Breakthrough” Strategic Projects, include DR at project level.    Realise  Business Productivity Gains, find alternate uses for DR equipment ,[object Object],Core Infrastructure and Applications Business-Led Discretionary Projects Multi-year  Strategic Initiatives The Self-Funding Ideal Original concept: The CIO Executive Board If a cost per use model is used for DR when using SLA’s for IT Services, then the DR enablers can be self funded Charge out for DR to cover cost of infrastructure
FY2011 FY2012 FY2015 FY2014 FY2013 FY2010 FY2009 Strategy 3 Critical Assets Strategy 1 DR Enablers Strategy 2  Projects &  Lifecycle Data Centre Infrastructure c. Multi Year Infrastructure Disaster Recovery Roadmap SLA DR Policy Continuous Improvement via Self Funding DR Paradigm Project 6 DR Strategy DR Enabler Initiative 3 DR Enabler Initiative 4 Project 1 Project 2 Project 3 IT Lifecycle Project 5 Project 7 BIA & RA Multi Year DR Project for Top 5 Critical Assets Multi Year Project Critical Assets 2 Project 4 Multi Year Project 3
d. Business Continuity Maturity BCMM© Virtual Corporation
III. Appendices ,[object Object],[object Object],[object Object]
a. Related Papers and Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
b. Glossary of Terms Source: BS 25777:2008 Business Continuity Strategic and tactical capability of the organisation to plan for and respond to incidents and business disruptions in order to continue business operations at an acceptable predefined level. BCM Business Continuity Management BC Strategy Approach by an organisation that will ensure its recovery and continuity in the face of a disaster or other major incident or business disruption. Disruption Event, whether anticipated or unanticipated which causes an unplanned, negative deviation from the expected delivery of products and services according to the organisations objectives. ICT Continuity Capability of the organisation to plan for and respond to incidents and disruptions in order to continue ICT services at an acceptable predefined level. ICT Disaster Recovery Activities and programmes that are invoked in response to a disruption and are intended to restore an organisation’s ICT services. Impact Evaluated consequence of a particular outcome. Incident Situation that might be, or could lead to, a business disruption, loss, emergency or crisis. RPO Recovery Point Objective.  Point in time to which data has to be recovered in order to resume ICT services. RTO Recovery Time Objective.  Target time set for resumption of product, service or activity delivery after an incident. Resilience Ability of an ICT system to provide and maintain an acceptable level of service in the face of various disruptions and challenges to normal operation. Risk Something that might happen and its effect on the achievement of objectives. Testing Forced failure of all or part of an ICT system, under specific conditions, to verify that recovery is properly performed. Vulnerability Weakness within the ICT asset or activity that might, at some point, be exploited by threats.

Más contenido relacionado

La actualidad más candente

Webinar: The Traveler's Guide to Video Conferencing
Webinar: The Traveler's Guide to Video ConferencingWebinar: The Traveler's Guide to Video Conferencing
Webinar: The Traveler's Guide to Video ConferencingAdam Kaiser
 
Webinar: The Traveler's Guide to Video Conferencing
Webinar: The Traveler's Guide to Video ConferencingWebinar: The Traveler's Guide to Video Conferencing
Webinar: The Traveler's Guide to Video ConferencingIVCi, LLC
 
Benefits and better business cases_Alan Brown and Stefan Sanchez
Benefits and better business cases_Alan Brown and Stefan SanchezBenefits and better business cases_Alan Brown and Stefan Sanchez
Benefits and better business cases_Alan Brown and Stefan SanchezAssociation for Project Management
 
Federal Grants Management Systems Landscape, April 30, 2009
Federal Grants Management Systems Landscape, April 30, 2009Federal Grants Management Systems Landscape, April 30, 2009
Federal Grants Management Systems Landscape, April 30, 2009David Cassidy
 
Cobit 5 used in an information security review
Cobit 5 used in an information security reviewCobit 5 used in an information security review
Cobit 5 used in an information security reviewJohnbarchie
 
BCM Regulations and Learnings from across the globe..
BCM Regulations and Learnings from across the globe..BCM Regulations and Learnings from across the globe..
BCM Regulations and Learnings from across the globe..Continuity and Resilience
 
Ehr implementation methodology
Ehr implementation methodologyEhr implementation methodology
Ehr implementation methodologyLinda Gebaroff
 
Workshop F, A healthy respect for benefits by David Waller and Hugo Minney
Workshop F, A healthy respect for benefits by David Waller and Hugo MinneyWorkshop F, A healthy respect for benefits by David Waller and Hugo Minney
Workshop F, A healthy respect for benefits by David Waller and Hugo MinneyAssociation for Project Management
 
In BFSI, MDM comparatively less mature; plans seem to be in place to transfor...
In BFSI, MDM comparatively less mature; plans seem to be in place to transfor...In BFSI, MDM comparatively less mature; plans seem to be in place to transfor...
In BFSI, MDM comparatively less mature; plans seem to be in place to transfor...Genpact Ltd
 

La actualidad más candente (13)

Webinar: The Traveler's Guide to Video Conferencing
Webinar: The Traveler's Guide to Video ConferencingWebinar: The Traveler's Guide to Video Conferencing
Webinar: The Traveler's Guide to Video Conferencing
 
Webinar: The Traveler's Guide to Video Conferencing
Webinar: The Traveler's Guide to Video ConferencingWebinar: The Traveler's Guide to Video Conferencing
Webinar: The Traveler's Guide to Video Conferencing
 
Benefits and better business cases_Alan Brown and Stefan Sanchez
Benefits and better business cases_Alan Brown and Stefan SanchezBenefits and better business cases_Alan Brown and Stefan Sanchez
Benefits and better business cases_Alan Brown and Stefan Sanchez
 
Federal Grants Management Systems Landscape, April 30, 2009
Federal Grants Management Systems Landscape, April 30, 2009Federal Grants Management Systems Landscape, April 30, 2009
Federal Grants Management Systems Landscape, April 30, 2009
 
General Insurance
General InsuranceGeneral Insurance
General Insurance
 
Cobit 5 used in an information security review
Cobit 5 used in an information security reviewCobit 5 used in an information security review
Cobit 5 used in an information security review
 
h6358-ictsi-cporellano
h6358-ictsi-cporellanoh6358-ictsi-cporellano
h6358-ictsi-cporellano
 
BCM Regulations and Learnings from across the globe..
BCM Regulations and Learnings from across the globe..BCM Regulations and Learnings from across the globe..
BCM Regulations and Learnings from across the globe..
 
CobiT Foundation Free Training
CobiT Foundation Free TrainingCobiT Foundation Free Training
CobiT Foundation Free Training
 
Ehr implementation methodology
Ehr implementation methodologyEhr implementation methodology
Ehr implementation methodology
 
Corporate Profile
Corporate ProfileCorporate Profile
Corporate Profile
 
Workshop F, A healthy respect for benefits by David Waller and Hugo Minney
Workshop F, A healthy respect for benefits by David Waller and Hugo MinneyWorkshop F, A healthy respect for benefits by David Waller and Hugo Minney
Workshop F, A healthy respect for benefits by David Waller and Hugo Minney
 
In BFSI, MDM comparatively less mature; plans seem to be in place to transfor...
In BFSI, MDM comparatively less mature; plans seem to be in place to transfor...In BFSI, MDM comparatively less mature; plans seem to be in place to transfor...
In BFSI, MDM comparatively less mature; plans seem to be in place to transfor...
 

Similar a Business Continuity Awareness Week 2009

Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd Iaetsd
 
Drp For Menora
Drp For MenoraDrp For Menora
Drp For MenoraPini Cohen
 
Business Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesBusiness Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesAlan McSweeney
 
IT infra, emerging technology and governance
IT infra, emerging technology and governance IT infra, emerging technology and governance
IT infra, emerging technology and governance Azra'ee Mamat
 
An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...
An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...
An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...Cisco Canada
 
How to select the best business continuity strategy and solution?
How to select the best business continuity strategy and solution?How to select the best business continuity strategy and solution?
How to select the best business continuity strategy and solution?PECB
 
Risk Based Approach To Recovery And Continuity Management John P Morency
Risk Based Approach To Recovery And Continuity Management   John P  MorencyRisk Based Approach To Recovery And Continuity Management   John P  Morency
Risk Based Approach To Recovery And Continuity Management John P Morencyjmorency1952
 
Future-Proofing Asset Failures with Cognitive Predictive Maintenance
Future-Proofing Asset Failures with Cognitive Predictive MaintenanceFuture-Proofing Asset Failures with Cognitive Predictive Maintenance
Future-Proofing Asset Failures with Cognitive Predictive MaintenanceAnita Raj
 
Doug Mader Us Eng Overview Public
Doug Mader Us Eng Overview  PublicDoug Mader Us Eng Overview  Public
Doug Mader Us Eng Overview Publicdmader
 
Future of IIoT Predictive Maintenance Study
Future of IIoT Predictive Maintenance StudyFuture of IIoT Predictive Maintenance Study
Future of IIoT Predictive Maintenance StudyPresenso
 
Asset Management Strategy to Manage and Improve Customer satisfaction for Tel...
Asset Management Strategy to Manage and Improve Customer satisfaction for Tel...Asset Management Strategy to Manage and Improve Customer satisfaction for Tel...
Asset Management Strategy to Manage and Improve Customer satisfaction for Tel...NetConnect2
 
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive AnalysisThe Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive AnalysisIRJET Journal
 
Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Duane Bodle
 
Network barometer report 2014
Network barometer report 2014Network barometer report 2014
Network barometer report 2014Mūniū Karanja
 
How MTCS & COIR Could Impact You
How MTCS & COIR Could Impact YouHow MTCS & COIR Could Impact You
How MTCS & COIR Could Impact YouNUS-ISS
 
Predictive Analytics: Extending asset management framework for multi-industry...
Predictive Analytics: Extending asset management framework for multi-industry...Predictive Analytics: Extending asset management framework for multi-industry...
Predictive Analytics: Extending asset management framework for multi-industry...Capgemini
 
Cognitivo - Tackling the enterprise data quality challenge
Cognitivo - Tackling the enterprise data quality challengeCognitivo - Tackling the enterprise data quality challenge
Cognitivo - Tackling the enterprise data quality challengeAlan Hsiao
 

Similar a Business Continuity Awareness Week 2009 (20)

Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems using
 
Drp For Menora
Drp For MenoraDrp For Menora
Drp For Menora
 
Business Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesBusiness Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery Notes
 
IT infra, emerging technology and governance
IT infra, emerging technology and governance IT infra, emerging technology and governance
IT infra, emerging technology and governance
 
An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...
An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...
An Oversight or a New Customer Phenomenon, Getting the Most of your Contact C...
 
Approach to Data Management v0.2
Approach to Data Management v0.2Approach to Data Management v0.2
Approach to Data Management v0.2
 
How to select the best business continuity strategy and solution?
How to select the best business continuity strategy and solution?How to select the best business continuity strategy and solution?
How to select the best business continuity strategy and solution?
 
Risk Based Approach To Recovery And Continuity Management John P Morency
Risk Based Approach To Recovery And Continuity Management   John P  MorencyRisk Based Approach To Recovery And Continuity Management   John P  Morency
Risk Based Approach To Recovery And Continuity Management John P Morency
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
Future-Proofing Asset Failures with Cognitive Predictive Maintenance
Future-Proofing Asset Failures with Cognitive Predictive MaintenanceFuture-Proofing Asset Failures with Cognitive Predictive Maintenance
Future-Proofing Asset Failures with Cognitive Predictive Maintenance
 
Doug Mader Us Eng Overview Public
Doug Mader Us Eng Overview  PublicDoug Mader Us Eng Overview  Public
Doug Mader Us Eng Overview Public
 
Future of IIoT Predictive Maintenance Study
Future of IIoT Predictive Maintenance StudyFuture of IIoT Predictive Maintenance Study
Future of IIoT Predictive Maintenance Study
 
Asset Management Strategy to Manage and Improve Customer satisfaction for Tel...
Asset Management Strategy to Manage and Improve Customer satisfaction for Tel...Asset Management Strategy to Manage and Improve Customer satisfaction for Tel...
Asset Management Strategy to Manage and Improve Customer satisfaction for Tel...
 
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive AnalysisThe Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
 
Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...
 
Network barometer report 2014
Network barometer report 2014Network barometer report 2014
Network barometer report 2014
 
How MTCS & COIR Could Impact You
How MTCS & COIR Could Impact YouHow MTCS & COIR Could Impact You
How MTCS & COIR Could Impact You
 
Predictive Analytics: Extending asset management framework for multi-industry...
Predictive Analytics: Extending asset management framework for multi-industry...Predictive Analytics: Extending asset management framework for multi-industry...
Predictive Analytics: Extending asset management framework for multi-industry...
 
Cognitivo - Tackling the enterprise data quality challenge
Cognitivo - Tackling the enterprise data quality challengeCognitivo - Tackling the enterprise data quality challenge
Cognitivo - Tackling the enterprise data quality challenge
 

Business Continuity Awareness Week 2009

  • 1. 23 March 2009 Rejuvenating BCM - Infrastructure Total of 5 pages Business Continuity Awareness Week 23 – 27 March 2009 Brigitte Theuma MBCI, CBCMMA, CBCMP, CBCITP, MIAEM
  • 2.
  • 3.
  • 4.
  • 5. b. Risk Heat Map Key Adequate mitigation in place Semi-adequate mitigation in place Inadequate mitigation in place IT Security Data Centre Outage Supply Chain Customer Billing Financial Systems Customer Data India Call Centre Failure of IT Outsource Extremely Remote 1 * 10-100 years Remote 1 * 2-10 years Possible in Short to Medium Term 1 * 6-24 months Likely in Short Term 1 * 0-6 months Business Risks - IT Critical Significant Minimal Impact Likelihood
  • 6. c. Business Criticality Heat Map Key Disaster Recovery in place RTO 24 hours Backup and restore procedures in place. RTO 36 hours No plan RTO unknown Data Centre Payroll Customer Billing Financial Systems Customer Data India Call Centre Telecoms & LAN Tactical Strategic Critical Mandatory Criticality of Systems vs. Availability Continuous Availability Disaster Recovery Backup & Restore Architecture Criticality email Internet Presence Online Ordering SRM Despatch Document Registry
  • 7.
  • 8.
  • 9.
  • 10. FY2011 FY2012 FY2015 FY2014 FY2013 FY2010 FY2009 Strategy 3 Critical Assets Strategy 1 DR Enablers Strategy 2 Projects & Lifecycle Data Centre Infrastructure c. Multi Year Infrastructure Disaster Recovery Roadmap SLA DR Policy Continuous Improvement via Self Funding DR Paradigm Project 6 DR Strategy DR Enabler Initiative 3 DR Enabler Initiative 4 Project 1 Project 2 Project 3 IT Lifecycle Project 5 Project 7 BIA & RA Multi Year DR Project for Top 5 Critical Assets Multi Year Project Critical Assets 2 Project 4 Multi Year Project 3
  • 11. d. Business Continuity Maturity BCMM© Virtual Corporation
  • 12.
  • 13.
  • 14. b. Glossary of Terms Source: BS 25777:2008 Business Continuity Strategic and tactical capability of the organisation to plan for and respond to incidents and business disruptions in order to continue business operations at an acceptable predefined level. BCM Business Continuity Management BC Strategy Approach by an organisation that will ensure its recovery and continuity in the face of a disaster or other major incident or business disruption. Disruption Event, whether anticipated or unanticipated which causes an unplanned, negative deviation from the expected delivery of products and services according to the organisations objectives. ICT Continuity Capability of the organisation to plan for and respond to incidents and disruptions in order to continue ICT services at an acceptable predefined level. ICT Disaster Recovery Activities and programmes that are invoked in response to a disruption and are intended to restore an organisation’s ICT services. Impact Evaluated consequence of a particular outcome. Incident Situation that might be, or could lead to, a business disruption, loss, emergency or crisis. RPO Recovery Point Objective. Point in time to which data has to be recovered in order to resume ICT services. RTO Recovery Time Objective. Target time set for resumption of product, service or activity delivery after an incident. Resilience Ability of an ICT system to provide and maintain an acceptable level of service in the face of various disruptions and challenges to normal operation. Risk Something that might happen and its effect on the achievement of objectives. Testing Forced failure of all or part of an ICT system, under specific conditions, to verify that recovery is properly performed. Vulnerability Weakness within the ICT asset or activity that might, at some point, be exploited by threats.

Notas del editor

  1. Discussion: I have 10 minutes to discuss with you the subject of Rejeuvenating BCM – infrastructure. Not a lot of time, but it is something I am passionate about, and have some ideas which I would like to share with you.
  2. Discussion: At the highest level the following tasks should be carried out to identify the requirements and weaknesses inherent in the infrastructure and it’s associated systems. There are other ways to carry out this work, this is just one of them. I would recommend being pragmatic and letting go of some of your passion, in order to achieve a result that is at least possible in your company in the time allotted. No big bang projects in times of economic uncertainty.
  3. Discussion: This risk summary grid outlines the high-level risks that IT poses to the business. The goal in presenting this is not to frighten senior executives, but to build awareness of three things: IT risk is much more than just the risk of a hacker security breach The stakes of these risks are very high. Every major risk identified has (or should have) a mitigation strategy underway. See Companion Document, page 13
  4. Guidance: I made up this heat map, but you can use it, or some other way of giving information to the executive about the current state of criticality vs availability. See Companion Document, page 13
  5. Discussion: This conceptual slide is meant to illustrate how IT’s strategic initiatives can be funded by IT’s own efficiency improvements. As IT-led programs improve operational and business process efficiency, and hardware constantly improves per Moore’s Law, these benefits should be reinvested into the IT Pyramid in the form of Multi-Year Strategic Initiatives. IT’s continual improvement efforts thus effectively fund its own growth. Ideas for improving the infrastructure availability include standardisation of servers, standardisation of software, effective change control,
  6. Discussion: Let management know that you have thought about how the solution might be delivered, how long it might take, how you intend to look at current projects, what you do about current assets which are critical but have no DR, and how the company might want to manage this.