1 / 13

Business Continuity Planning

Business Continuity Planning. The evolution of Disaster Recovery Planning. A dose of Reality…. . 4 out of 5 Businesses affected by the 1993 WTC bombings did not survive past 6 months The range of Risks has expanded since September 11.

harmon
Download Presentation

Business Continuity Planning

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Business Continuity Planning The evolution of Disaster Recovery Planning

  2. A dose of Reality…. • 4 out of 5 Businesses affected by the 1993 WTC bombings did not survive past 6 months • The range of Risks has expanded since September 11. • The Global climate for doing business has changed permanently

  3. Keys to Success • A successful plan must have Executive sponsorship • Departments must be realistic about relative importance to the overall business • Any plan must be periodically tested, results reviewed, and modifications made, if required

  4. External Risk Factors • Extreme Weather • Blizzards, Flooding, Tornadoes, Hurricanes, Ice Storms • Earthquakes • Long duration Power or Communications failure • Area Evacuation due to chemical spill, etc. • Terrorist Attacks, Criminal actions

  5. Internal Risk Factors • Structural Damage • Roof collapse (Sears Hickory Hill) • Fire, Water Pipe Burst • HVAC • IT concerns • Equipment Spares • Backup / Mirroring process • Personnel

  6. Step 1: Risk Analysis • Identify and weigh most probable risks • Identify and weigh business functions • Correlate risks with business functions Make a List!

  7. Step 2: Prioritization Threat x Impact =Priority

  8. Step 3: Evaluation • Identify key components to prioritized list • Facilities (Building, furniture, fixtures) • Utilities (Electricity, Water, Gas) • Network (Voice, Data, IP) • Hardware (Servers, Workstations) • Weigh components against alternate sites, if applicable (Natural hot-site)

  9. Step 4: Plan • Facilities • Alternate site • Intra-company or “Buddy system” • Hot or Cold backup • Fire Suppression system • Utilities (Electricity, Water, Gas) • Dual Entrance facilities • UPS with suitable battery life • Backup Generator

  10. Step 4: Plan • Software • Virus protection, Firewall revision • User-loaded software • Common platform and partitions • Disk backup and/or mirroring • Hardware • Spares • Maintenance routines • Virus scans, disk utilities • Duplication for recovery

  11. Step 4: Plan • Network Resiliency • Legacy platform designed with alternate mirror site, either in-house or 3rd party. Network provisioned or automated dial backup • Backup tapes/disks verified, storage off-site • IP/ATM/FR platform with alternate hot site. Semi- to full mesh design

  12. Step 5: Prevention • Password protect all remote access capabilities • Firewalls for IP connections • Maintain latest Virus protection and Firewall software • Corrective software controls • Intrusion (hacker) detection

  13. “Sometimes the best way to facilitate effective Business Continuity Planning is to use an outside expert without any bias towards any one department, group, or function.” The Gartner Group CompetitiveNetworkSolutions.com 901-757-0379 “Your Chief Technology Officer on Call”

More Related