Business Continuity Management System. Presented by: Amir Iqbal.
2. Dilbert: By Scott rfdams OUR OISASTER RECOVERY PLAN GOES SOMETHING LIKE THIS.. 8 SOMEDAY WE HOPE TO HAVE A PLAN 8 8.
3. ew STOP. Disaster Scenarios.
4. Disaster SCENARIOS. Ail'.. Seismic Hazard Map.
5. Impact on a company. Financial Loss. Reputational Impact.
6. BCMS Framework. [image] INTERNATIONAL STANDARD ISO 22301 Socktd secwity — Business contintnty SVSt«nS —.
7. Benefits of BCMS. Identification of threats applicable to the organization.
8. The BCMS Program and activities are supported by relevant Policy and Governance Framework. BCMS documentation framework is based on ISO 22301 standard, relevant guidelines and industry best practices..
[Audio] This page is optional Layout Instructions For Cover Letter Page: Do not change title text font, size and position; two lines maximum, 24pt. Use “Reset” button if necessary Body text can be adjusted to fit the text – 14-8pt.
10. Governance and Roles & Responsibilities.
[Audio] This page is optional Layout Instructions For Cover Letter Page: Do not change title text font, size and position; two lines maximum, 24pt. Use “Reset” button if necessary Body text can be adjusted to fit the text – 14-8pt.
12. During Crisis Declare Crisis/emergency Activate/ Deactivate BCP Authorize Crisis Communication Prioritize recovery activities Monitor recovery of process/operations.
13. During Crisis Inform BCMS Committee about disaster situation Damage Assessment in coordination with BCMS Champions Coordinate with Head of Relation Management for crisis communication Liaise with civil defense authorities in emergency Monitor process recovery.
14. During Crisis Assess Impact of incident Contact all employees and ensure their safety Inform BCMS Manager and BCMS Committee regarding the disaster Wait for BCMS Committee’s instructions for invoking BCP Follow procedures in BCP to meet RTOs.
[image]. 15. BCMS Implementation Activities.
[Audio] This page is optional Layout Instructions For Cover Letter Page: Do not change title text font, size and position; two lines maximum, 24pt. Use “Reset” button if necessary Body text can be adjusted to fit the text – 14-8pt.
17. Threat Assessment - Result. Threat Likelihood External Electrical power supply failure Regulatory / Governmental Actions Internal power failure Cyber crime Hardware failure Software failure Disclosure of sensitive information Heat waves Fog/Smog Absence of Physical Security and Access Control Utilities and Services Other Emergency Situations Utilities and Services Information Security Incidents Equipment or System Failure Equipment or System Failure Information Security Incidents Natural Disasters Natural Disasters Information Security Incidents 0.86428571428571443 0.65 0.77142857142857146 0.77142857142857135 0.75714285714285712 0.75714285714285701 0.69285714285714273 0.47857142857142848 0.7 0.3571428571428571 Potential Impact External Electrical power supply failure Regulatory / Governmental Actions Internal power failure Cyber crime Hardware failure Software failure Disclosure of sensitive information Heat waves Fog/Smog Absence of Physical Security and Access Control Utilities and Services Other Emergency Situations Utilities and Services Information Security Incidents Equipment or System Failure Equipment or System Failure Information Security Incidents Natural Disasters Natural Disasters Information Security Incidents 5 6 5 5 5 5 5 6 4 7 Threat Value External Electrical power supply failure Regulatory / Governmental Actions Internal power failure Cyber crime Hardware failure Software failure Disclosure of sensitive information Heat waves Fog/Smog Absence of Physical Security and Access Control Utilities and Services Other Emergency Situations Utilities and Services Information Security Incidents Equipment or System Failure Equipment or System Failure Information Security Incidents Natural Disasters Natural Disasters Information Security Incidents 4.3214285714285721 3.9000000000000004 3.8571428571428572 3.8571428571428568 3.7857142857142856 3.7857142857142851 3.4642857142857135 2.871428571428571 2.8 2.4999999999999996.
18. BC Strategies. Cross Train teams Work Load swapping Shadowing of key resources Succession Planning.
19. Business continuity Plan. Business Continuity Plan document.
20. Start. BCP is required to be invoked?. BCMS Committee in coordination with the department head to take a call if the disaster is controlled and the critical process can be restored to normal.
21. 'ULU. Floor not available. Incident reported by staff.
22. Critical Application Failure. Await recovery of application.
23. [image]. Employees’ Responsibilities.
24. Employees must be aware of: BCMS Policy, Manual & procedures BCMS Objectives BCMS Roles.
25. EVACUATION Follow the exit directions Only use the staircase Evacuate silently, to ensure important announcements are not missed Do not rush back inside.
26. Do’s Be aware of the employee safety measures Know whom to call in an emergency Keep a note of the emergency contact details Participate in evacuation procedures/fire drills During crisis, give priority to personnel safety & evacuate building Update your emergency contact information regularly Read safety related emails and guidelines. Be vigilant and report incidents, else it could result in a potential disaster.
27. Participate in all BCMS Activities performed There is no bUsiness continUity without U.
28. Testing & Exercising. Initiation Test Requirements Test Planning & Schedule Test Design Test Execution Test Observation Test Report.