DR Planning. Presented by. Matt Stolk Associate Director Northwest Regional Data Center Florida State University

Size: px
Start display at page:

Download "DR Planning. Presented by. Matt Stolk Associate Director Northwest Regional Data Center Florida State University"

Transcription

1

2 DR Planning Presented by Matt Stolk Associate Director Northwest Regional Data Center Florida State University

3 Why are we here? Over the last couple of years, business continuity has become more of a priority for many organizations. Understanding the needs and requirements for building a successful DR plan are just some of the struggles on the road to implementation. Major challenges in developing this plan center on the identification and classification of applications and data, developing business requirements, determining the infrastructure and software needs, as well as weighing cost against these requirements. This session will go over NWRDC s experiences in building their DR plan and touch on lessons learned from doing this as well as working with our customers in building their plans.

4 Why are we really here?

5 Why is a DR Plan Important

6 So what do we need to plan for?

7 What does a DR Plan Consist of? According to National Institute for Standards and Technology (NIST) Special Publication , Contingency Planning for Information Technology Systems, the following summarizes the ideal structure for an IT disaster recovery plan: Develop the contingency planning policy statement. A formal policy provides the authority and guidance necessary to develop an effective contingency plan. Conduct the business impact analysis (BIA). The business impact analysis helps to identify and prioritize critical IT systems and components Identify preventive controls. These are measures that reduce the effects of system disruptions and can increase system availability and reduce contingency life cycle costs. Develop recovery strategies. Thorough recovery strategies ensure that the system can be recovered quickly and effectively following a disruption. Develop an IT contingency plan. The contingency plan should contain detailed guidance and procedures for restoring a damaged system. Plan testing, training and exercising. Testing the plan identifies planning gaps, whereas training prepares recovery personnel for plan activation; both activities improve plan effectiveness and overall agency preparedness. DR Plan maintenance. The plan should be a living document that is updated regularly to remain current with system enhancements.

8 DR Policy Statement Develop the contingency planning policy statement. A formal policy provides the authority and guidance necessary to develop an effective contingency plan. Example XXXX shall maintain a Disaster Recovery Plan that establishes procedures for business resumption in the event of an emergency. This plan shall be reviewed yearly and updated as necessary. A copy will be located HERE. XXX will conduct annual disaster recovery tests, at a minimum, to ensure services recoverability. The tests will be executed over a 24 hour period.

9 Business Impact Analysis Conduct the business impact analysis (BIA). The business impact analysis helps to identify and prioritize critical IT systems and components. Information needed from Business Units and Application Owners. Completed by both IT and the Business Units Identifies requirements for Recover Time Objective (RTO) as well as perceived impacts to the organization as a whole Identifies System and Application POCs

10 Identify Preventative Controls Identify preventive controls. These are measures that reduce the effects of system disruptions and can increase system availability and reduce contingency life cycle costs. OK so what does this mean? Examples: Server Clustering GEO Replication Offsite backups Backup Replication Hot/Warm/Cold DR Site Cloud

11 Develop Recovery Strategies Develop recovery strategies. Thorough recovery strategies ensure that the system can be recovered quickly and effectively following a disruption. How will things be recovered How will we meet the RTO defined in the BIA Will feed into the DR Runbook

12 Develop IT Contingency Plans Develop an IT contingency plan. The contingency plan should contain detailed guidance and procedures for restoring a damaged system. This is the DR Runbook Should have detailed instructions on how to recover Should be written in a way that anyone with Access could run through the recovery

13 Test the Plan Plan testing, training and exercising. Testing the plan identifies planning gaps, whereas training prepares recovery personnel for plan activation; both activities improve plan effectiveness and overall agency preparedness. If everything goes as planned you are not testing hard enough Depending on the situation the runbook may be modified or not completely followed Be sure to discuss the outcome of the test with the group Improve the plan, post testing is the best time to make changes

14 Review and Update the Plan Plan maintenance. The plan should be a living document that is updated regularly to remain current with system enhancements. Be sure to keep track of revisions Summary of changes is sometime helpful Ensure that staff and vendor contacts information is current Verify inventories, machine names, backup inventories

15 Resources to Assist FEMA Business Continuity Planning Suite Includes: Disaster Recovery Plan Generator for IT Recovery Business Impact Analysis (BIA) Forms Test Tools (Scenarios) Training Plan Maintenance Walk through

16 DR Plan Generator

17 DR Plan Generator

18 DR Plan Generator*

19 DR Plan Generator

20 DR Plan Generator*

21 DR Plan Generator*

22 DR Plan Generator*

23 DR Plan Generator*

24 DR Plan Generator*

25 DR Plan Generator*

26 DR Plan Generator

27 DR Plan Generator*

28 DR Plan Generator*

29 DR Plan Generator

30 DR Plan Generator

31 DR Plan Generator

32 DR Plan Generator

33 DR Plan Generator

34 DR Plan Generator

35 DR Plan Generator

36 DR Plan Generator

37 DR Plan Generator

38 DR Plan Generator

39 DR Plan Generator

40 DR Plan Generator

41 DR Plan Generator

42 DR Plan Generator

43 DR Plan Generator

44 DR Plan Generator

45 DR Plan Generator

46 DR Plan Generator After completing the wizard in the tool, you can browse to the MS Word version of the file you created. It is stored in the directory listed below: InstallDirectory \Business_Continuity_Planning_Suite\Business_Continuity_Planning_Suite\media \Disaster_Recovery_Plan_Extract\temp.doc

47 What s Next? Actionable Items: Next Week Application and Server Inventories Identify key staff resources for planning Next 1 to 6 Months Meet with Business Process Owners (BIA) Get buy in! Determine the requirements and options Budget Next Year Implement Test! Test! Test! Update, Improve, Maintain

48 Resources FEMA Business Continuity Planning Suite NIST rev1_errata-nov pdf Gartner Northwest Regional Data Center Matt Stolk (850)

Florida State University

Florida State University Florida State University Disaster Recovery & Business Continuity Planning Overview October 24, 2017 1 Key Readiness Questions Has your department identified the business functions and infrastructure that

More information

10 Reasons Why Your DR Plan Won t Work

10 Reasons Why Your DR Plan Won t Work 10 Reasons Why Your DR Plan Won t Work Jim Damoulakis CTO, GlassHouse Technologies, Inc. Sept. 29, 2005 DR Vision Imagine Prepared to handle multiple categories of disaster Clearly documented policies

More information

IT CONTINUITY, BACKUP AND RECOVERY POLICY

IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption

More information

TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY

TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY JUNE 2017 TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY OVERVIEW The intent of this document is to provide external customers and auditors with a high-level overview of the Tufts Health Plan Corporate

More information

Data Recovery Policy

Data Recovery Policy Data Recovery Policy The Marketware, Inc. Contingency Plan establishes procedures to recover Marketware, Inc. following a disruption resulting from a disaster. This Disaster Recovery Policy is maintained

More information

Disaster Recovery Planning: Is Your Plan in Place? Presented by: Steve Shofner, CISA, CGEIT

Disaster Recovery Planning: Is Your Plan in Place? Presented by: Steve Shofner, CISA, CGEIT Disaster Recovery Planning: Is Your Plan in Place? Presented by: Steve Shofner, CISA, CGEIT 1 The material appearing in this presentation is for informational purposes only and is not legal or accounting

More information

Disaster recovery strategic planning: How achievable will it be?

Disaster recovery strategic planning: How achievable will it be? April 16 18, 2012 Talking Stick Resort Scottsdale, Arizona Disaster recovery strategic planning: How achievable will it be? Prudence Marasigan Ernst & Young Advisory Services, Senior Manager prudence.marasigan@ey.com

More information

CONTINGENCY PLANNING GUIDE

CONTINGENCY PLANNING GUIDE 2017 CONTINGENCY PLANNING GUIDE UTC IT0128-G UTC Information Technology Michael Dinkins, CISO 4/28/2017 CONTENTS 1. SCOPE... 2 2. PRINCIPLES... 2 3. REVISIONS... 2 4. OBJECTIVE... 2 5. POLICY... 2 6. APPLICABILITY...

More information

SharePoint Cincy 2011

SharePoint Cincy 2011 March 18, 2011 SharePoint Cincy 2011 Please turn off all electronic devices or set them to vibrate. If you must take a phone call, please do so in the hall so as not to disturb others. Open wireless access

More information

Saving SharePoint Admin 100 (Sponsor) Sean McDonough Idera

Saving SharePoint Admin 100 (Sponsor) Sean McDonough Idera Saving SharePoint Admin 100 (Sponsor) Sean McDonough Idera Thank you for being a part of the first SharePoint Saturday conference Please turn off all electronic devices or set them to vibrate. If you must

More information

Keys To Disaster Preparedness

Keys To Disaster Preparedness Keys To Disaster Preparedness Presented By: Rob Robbins 2012 Setting up your Chess Board Identify your Queen Decide who s going to be King How many assets to protect and in what order (moving your pieces)

More information

TSC Business Continuity & Disaster Recovery Session

TSC Business Continuity & Disaster Recovery Session TSC Business Continuity & Disaster Recovery Session Mohamed Ashmawy Infrastructure Consulting Pursuit Hewlett-Packard Enterprise Saudi Arabia Mohamed.ashmawy@hpe.com Session Objectives and Outcomes Objectives

More information

Continuity of Business

Continuity of Business White Paper Continuity of Business SAS Continuity of Business initiative reflects our commitment to our employees, to our customers, and to all of the stakeholders in our global business community to be

More information

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government Florida Government Finance Officers Association Staying Secure when Transforming to a Digital Government Agenda Plante Moran Introductions Technology Pressures and Challenges Facing Government Technology

More information

Please indicate below the principle nature of your department s operations (check all that apply): Student life support.

Please indicate below the principle nature of your department s operations (check all that apply): Student life support. BUSINESS 2016 A. BUSINESS CONTINUITY PLAN (BCP) To be better prepared, UH personnel and its programs may use this form to complete a Business Continuity Plan (BCP) checklist to describe how your program

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

Table of Contents. Sample

Table of Contents. Sample TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...

More information

ON CALL, ALL THE TIME DISASTER RECOVERY AS A SERVICE FROM WINDSTREAM

ON CALL, ALL THE TIME DISASTER RECOVERY AS A SERVICE FROM WINDSTREAM ON CALL, ALL THE TIME DISASTER RECOVERY AS A SERVICE FROM WINDSTREAM DATA IS THE LIFEBLOOD OF MODERN BUSINESS 74% of organizations are backing up more than 11 terabytes of data according to Enterprise

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

Disaster Recovery and Mitigation: Is your business prepared when disaster hits?

Disaster Recovery and Mitigation: Is your business prepared when disaster hits? 1 Disaster Recovery and Mitigation: Is your business prepared when disaster hits? 2 Our speaker today: Catherine Roy, Director of PMO at Hosting 15 years Project Management experience At HOSTING since

More information

COOP and Disaster Recovery with Symantec

COOP and Disaster Recovery with Symantec COOP and Disaster Recovery with Symantec Agenda 1 Setting the Stage 2 Evolving Continuity Landscape 3 Proven Approach to Succeed 4 Symantec Solution Overview 5 Conclusions and Recommendations 2007 Symantec

More information

Are Traditional Disaster Recovery Plans Still Relevant? Bobby Williams, MBCP, MBCI Director, IT Resiliency Planning Fidelity Investments

Are Traditional Disaster Recovery Plans Still Relevant? Bobby Williams, MBCP, MBCI Director, IT Resiliency Planning Fidelity Investments Are Traditional Disaster Recovery Plans Still Relevant? Bobby Williams, MBCP, MBCI Director, IT Resiliency Planning Fidelity Investments Who am I? Bobby Williams is the Director of IT Resiliency Planning

More information

INFORMATION SECURITY- DISASTER RECOVERY

INFORMATION SECURITY- DISASTER RECOVERY Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy

More information

Cyber Resilience. Think18. Felicity March IBM Corporation

Cyber Resilience. Think18. Felicity March IBM Corporation Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack

More information

Audit & Advisory Services. IT Disaster Recovery Audit 2015 Report Date January 28, 2015

Audit & Advisory Services. IT Disaster Recovery Audit 2015 Report Date January 28, 2015 Audit & Advisory Services IT Disaster Recovery Audit 2015 Report Date January 28, 2015 Audit & Advisory Services Mission and Function The JCCC Audit & Advisory Services department provides an independent

More information

Introduction to Business continuity Planning

Introduction to Business continuity Planning Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources

More information

Contents. Chapter 3: Chapter 4: Critical Server Ranking Classifying Systems for Recovery Priority Mission-Critical Only, Please...

Contents. Chapter 3: Chapter 4: Critical Server Ranking Classifying Systems for Recovery Priority Mission-Critical Only, Please... Chapter 1: Building a Disaster Recovery Plan The Need...... 1 The Need............................ 3 Plan for All Types of Disasters................ 11 Reasons for Planning.................... 13 Let s

More information

Disaster Recovery Planning

Disaster Recovery Planning Disaster Recovery Planning How to Ensure your IT systems are protected and your business keeps running should disaster strike. Benefits of Using Disaster Recovery as a Service DRaaS over Traditional Disaster

More information

Data Storage, Recovery and Backup Checklists for Public Health Laboratories

Data Storage, Recovery and Backup Checklists for Public Health Laboratories Data Storage, Recovery and Backup Checklists for Public Health Laboratories DECEMBER 2018 Introduction Data play a critical role in the operation of a laboratory information management system (LIMS) and

More information

3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007

3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 Fault tolerance refers to the capability of a computer or network to continue to function when some component fails. Disk fault tolerance refers

More information

DISASTER RECOVERY: SOMETHING EVERYBODY NEEDS, BUT NEVER WANTS TO USE

DISASTER RECOVERY: SOMETHING EVERYBODY NEEDS, BUT NEVER WANTS TO USE DISASTER RECOVERY: SOMETHING EVERYBODY NEEDS, BUT NEVER WANTS TO USE What Do We Mean By Disaster? Saying disaster often invokes visions of twisters and floods Disasters (and recovery strategies that address

More information

Disaster Unpreparedness June 3, 2013

Disaster Unpreparedness June 3, 2013 Disaster Unpreparedness June 3, 2013 Underwritten by: Introduction Government relies on data and information to deliver mission success. Data loss means more than files simply missing from a database it

More information

Business Continuity Planning

Business Continuity Planning Information Systems Audit and Control Association www.isaca.org Business Continuity Planning AUDIT PROGRAM & INTERNAL CONTROL QUESTIONNAIRE The Information Systems Audit and Control Association With more

More information

Module 4 STORAGE NETWORK BACKUP & RECOVERY

Module 4 STORAGE NETWORK BACKUP & RECOVERY Module 4 STORAGE NETWORK BACKUP & RECOVERY BC Terminology, BC Planning Lifecycle General Conditions for Backup, Recovery Considerations Network Backup, Services Performance Bottlenecks of Network Backup,

More information

Disaster Preparedness + Cloud Computing. Jack Newton CEO + Founder Clio

Disaster Preparedness + Cloud Computing. Jack Newton CEO + Founder Clio Disaster Preparedness + Cloud Computing Jack Newton CEO + Founder Clio WHAT IS A DISASTER? Disasters Disruption of business functions and processes. Disasters to Others Clients undergo disasters for which

More information

Technical Recovery Planning

Technical Recovery Planning Technical Recovery Planning Statistics NEDRIX 2006 Annual Conference Business Continuity 52 offices in 26 countries 258 Business Continuity Plans 260 Business Continuity Manager (BCM) / Alt BCM / Team

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

Continuity of Operations During Disasters: Electronic Systems and Medical Records

Continuity of Operations During Disasters: Electronic Systems and Medical Records Idaho Health Care Association Continuity of Operations During Disasters: Electronic Systems and Medical Records Philip Niemer, MBA, MS, HEM Director Operational Continuity & Emergency Management Children

More information

Template. IT Disaster Recovery Planning: A Template

Template. IT Disaster Recovery Planning: A Template Template IT Disaster Recovery Planning: A Template When disaster strikes, business suffers. A goal of business planning is to mitigate disruption of product and services delivery to the greatest degree

More information

SAMPLE REPORT. Business Continuity Gap Analysis Report. Prepared for XYZ Business by CSC Business Continuity Services Date: xx/xx/xxxx

SAMPLE REPORT. Business Continuity Gap Analysis Report. Prepared for XYZ Business by CSC Business Continuity Services Date: xx/xx/xxxx SAMPLE REPORT Business Continuity Gap Analysis Report Prepared for XYZ Business by CSC Business Continuity Services Date: xx/xx/xxxx COMMERCIAL-IN-CONFIDENCE PAGE 1 OF 11 Contact Details CSC Contacts CSC

More information

CIP Cyber Security Recovery Plans for BES Cyber Systems

CIP Cyber Security Recovery Plans for BES Cyber Systems A. Introduction 1. Title: Cyber Security Recovery Plans for BES Cyber Systems 2. Number: CIP-009-6 3. Purpose: To recover reliability functions performed by BES Cyber Systems by specifying recovery plan

More information

Using ITIL to Measure Your BCP

Using ITIL to Measure Your BCP Using ITIL to Measure Your BCP 1 Agenda ITIL v3 Overview Why Use ITIL ITIL Continual Improvement Process Critical Success Factors and Key Performance Indicators Creating Metrics Scoring System Sample BCP

More information

Heavy Vehicle Cyber Security Bulletin

Heavy Vehicle Cyber Security Bulletin Heavy Vehicle Cyber Security Update National Motor Freight Traffic Association, Inc. 1001 North Fairfax Street, Suite 600 Alexandria, VA 22314 (703) 838-1810 Heavy Vehicle Cyber Security Bulletin Bulletin

More information

EA-ISP Business Continuity Management and Planning Policy

EA-ISP Business Continuity Management and Planning Policy Technology & Information Services EA-ISP-002 - Business Continuity Management and Planning Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 06/03/2017 Document Security Level: PUBLIC Document

More information

Disaster recovery planning for health care data and HIPAA compliance regulations

Disaster recovery planning for health care data and HIPAA compliance regulations Disaster recovery care data and HIPAA compliance regulations Disaster recovery care Disaster recovery planning takes on special importance in health care organizations dealing with patients and care delivery.

More information

Rejuvenating BCM - Infrastructure. Business Continuity Awareness Week March 2009

Rejuvenating BCM - Infrastructure. Business Continuity Awareness Week March 2009 Rejuvenating BCM - Infrastructure Business Continuity Awareness Week 23 27 March 2009 Brigitte Theuma MBCI, CBCMMA, CBCMP, CBCITP, MIAEM 23 March 2009 Total of 5 pages Table of Contents I. ICT Service

More information

WHITE PAPER- Managed Services Security Practices

WHITE PAPER- Managed Services Security Practices WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to

More information

Disaster Recovery Webinar August 11, 2015

Disaster Recovery Webinar August 11, 2015 Disaster Recovery Webinar August 11, 2015 SPEAKERS Marcelo Oliveira, Product Director, Cable & Wireless Marcelo has several years of experience in Information Technology, having worked with organizations

More information

Long-Term Power Outage Response and Recovery Tabletop Exercise

Long-Term Power Outage Response and Recovery Tabletop Exercise 1 Long-Term Power Outage Response and Recovery Tabletop Exercise After Action Report [Template] The After-Action Report/Improvement Plan (AAR/IP) aligns exercise objectives with preparedness doctrine to

More information

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010 Standard CIP 011 1 Cyber Security Protection Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes

More information

Principles of Protection: Cybersecurity Data Protection. 11/01/2017 Julia Breaux William Sellers

Principles of Protection: Cybersecurity Data Protection. 11/01/2017 Julia Breaux William Sellers Principles of Protection: Cybersecurity Data Protection 11/01/2017 Julia Breaux William Sellers Introductions Julia Breaux Internal Controls and Compliance Manager (225) 214-3898 Julia.Breaux@eatel.com

More information

Appendix 3 Disaster Recovery Plan

Appendix 3 Disaster Recovery Plan Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision

More information

Business Continuity Management Standards A Side-by-Side Comparison

Business Continuity Management Standards A Side-by-Side Comparison Business Continuity Standards A Side-by-Side Comparison By Brian Zawada (CBCP) & Jared Schwartz (CBCP) Whether your organization has begun a grassroots initiative to develop a business continuity plan

More information

Disaster Recovery and Business Continuity Planning (Mile2)

Disaster Recovery and Business Continuity Planning (Mile2) Disaster Recovery and Business Continuity Planning (Mile2) Course Number: DRBCP Length: 4 Day(s) Certification Exam This course will help you prepare for the following exams: ABCP: Associate Business Continuity

More information

BUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4

BUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4 BUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4 2016 DR Committee 1 Table of Contents REVISION HISTORY... 3 PURPOSE... 3 POLICY... 3 DR COMMITTEE... 3 POLICY MANAGEMENT... 3 EMPLOYEE TRAINING AND

More information

Backup and Restore System

Backup and Restore System Disaster Backup and Recovery, page 1 Short-Term Backup and Recovery, page 4 Disaster Backup and Recovery To minimize the effects of a disaster, you must create a disaster recovery plan to minimize downtime

More information

Hot Topics in IT Disaster Recovery

Hot Topics in IT Disaster Recovery Risk Masters International LLC Hot Topics in IT Disaster Recovery Steven J. Ross Executive Principal A Presentation for the Middle Tennessee Chapter of ISACA The Popular View of IT Disaster Recovery Today

More information

DISASTER RECOVERY TESTING, YOUR EXCUSES, AND HOW TO WIN

DISASTER RECOVERY TESTING, YOUR EXCUSES, AND HOW TO WIN DISASTER RECOVERY TESTING, YOUR EXCUSES, AND HOW TO WIN INTRODUCTION You can plan, look at diagrams, listen to consultants, but you still won t know that all your recovery capabilities will actually work

More information

CIO Guide: Disaster recovery solutions that work. Making it happen with Azure in the public cloud

CIO Guide: Disaster recovery solutions that work. Making it happen with Azure in the public cloud CIO Guide: Disaster recovery solutions that work Making it happen with Azure in the public cloud Consult Build Transform Support When you re considering a shift to Disaster Recovery as a service (DRaaS),

More information

ISO 22301: An Overview of BCM Implementation Process. Presenter: Dejan Kosutic

ISO 22301: An Overview of BCM Implementation Process. Presenter: Dejan Kosutic ISO 22301: An Overview of BCM Implementation Process Presenter: Dejan Kosutic GoToWebinar Control Panel Open and close your Panel View, Select, and Test your audio Submit text questions they will be addressed

More information

Business Continuity and Disaster Recovery

Business Continuity and Disaster Recovery Business Continuity and Disaster Recovery Index Section Title 1. Executive Summary 2. Policy Statement 3. Strategy 4. Governance 5. Key Documentation 6. Testing 1 Executive Summary Business Continuity

More information

3.4 DISASTER RECOVERY (L , M.3.9, comp_req_id 806)

3.4 DISASTER RECOVERY (L , M.3.9, comp_req_id 806) 3.4 DISASTER RECOVERY (L.34.2.3.4, M.3.9, comp_req_id 806) Three key objectives that GSA has as part of the award of the Networx contract are to ensure service continuity, high-quality service, and operations

More information

ISO 22301: An Overview of BCM Implementation Process. Presenter: Dejan Kosutic

ISO 22301: An Overview of BCM Implementation Process. Presenter: Dejan Kosutic ISO 22301: An Overview of BCM Implementation Process Presenter: Dejan Kosutic GoToWebinar Control Panel Open and close your Panel View, Select, and Test your audio Submit text questions they will be addressed

More information

National Preparedness System. Update for EMForum June 11, 2014

National Preparedness System. Update for EMForum June 11, 2014 National Preparedness System Update for EMForum June 11, 2014 Approach to National Preparedness Whole community integration Risk-driven Capability-based DRAFT 2 Presidential Policy Directive 8 (PPD) 8

More information

Public and Private Interdependencies Filling a Gap in Most Continuity Plans

Public and Private Interdependencies Filling a Gap in Most Continuity Plans Public and Private Interdependencies Filling a Gap in Most Continuity Plans John A Jackson Executive Vice President Fusion Risk Management, Inc. The evolution of the continuity industrytechnology advancement

More information

Technical Vulnerability and Patch Management Policy Document Number: OIL-IS-POL-TVPM

Technical Vulnerability and Patch Management Policy Document Number: OIL-IS-POL-TVPM Technical Vulnerability and Patch Management Policy Document Number: OIL-IS-POL-TVPM Document Details Title Description Version 1.1 Author Classification Technical Vulnerability and Patch Management Policy

More information

End User Enterprise File Services Guide

End User Enterprise File Services Guide End User Enterprise File Services Guide This guide has been developed for the purpose of providing insight to users on how to best leverage the Enterprise File Service offerings and to maximize data protection

More information

The Key to Disaster Recovery

The Key to Disaster Recovery The Key to Disaster Recovery The key to a high-performing IT disaster recovery plan is having the right mix of solutions to achieve your organization s need for speedy recovery and maximum value. Bluelock

More information

Disaster Recovery Planning Blackout. Katrina

Disaster Recovery Planning Blackout. Katrina Disaster Recovery 2003 Blackout Before: After: Katrina 1 Sandy Mentor, Ohio Flood Disaster Map 2 It is believed that some of the companies spend up to 25% of their budgets on disaster recovery planning;

More information

The next generation of knowledge and expertise

The next generation of knowledge and expertise The next generation of knowledge and expertise UNDERSTANDING FISMA REPORTING REQUIREMENTS 1 HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404

More information

DISASTER RECOVERY (DR): SOMETHING EVERYBODY NEEDS, BUT NEVER WANTS TO USE

DISASTER RECOVERY (DR): SOMETHING EVERYBODY NEEDS, BUT NEVER WANTS TO USE DISASTER RECOVERY (DR): SOMETHING EVERYBODY NEEDS, BUT NEVER WANTS TO USE What Do I Mean By Disaster? 1 Natural (hurricane, tornado, flood, fire ) Human (operator error, sabotage, implant of malicious

More information

PECB Change Log Form

PECB Change Log Form GENERAL INFORMATION Owner / Department* Approver / Department * Training Development Department Quality Assurance Department Date of Approval* 2019-01-09 Course name: Language: New Version: Previous Version:

More information

CIP Cyber Security Recovery Plans for BES Cyber Systems

CIP Cyber Security Recovery Plans for BES Cyber Systems Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

OpenDrives storage solutions facilitate smart business continuity strategies.

OpenDrives storage solutions facilitate smart business continuity strategies. Business Continuity Learn about smart strategies for planning for the unexpected events with an ironclad strategy to resume your business as quickly as possible with OpenDrives. Disaster Recovery is a

More information

Statewide Information Technology Contingency Planning

Statewide Information Technology Contingency Planning New Jersey State Legislature Office of Legislative Services Office of the State Auditor Statewide Information Technology Contingency Planning March 9, 2015 to June 10, 2016 Stephen M. Eells State Auditor

More information

The Importance of Data Protection

The Importance of Data Protection The Importance of Data Protection Frank Mandarino Regional Sales Manager, Axcient Risk Mitigation and Preparedness Responsible Thing to Do 2009 US Average: Cost of Car: $28,400 Spent on Insurance: ~$150

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity Security+ Guide to Network Security Fundamentals, Third Edition Chapter 13 Business Continuity Objectives Define business continuity Describe the components of redundancy planning List disaster recovery

More information

DISASTER RECOVERY PRIMER

DISASTER RECOVERY PRIMER DISASTER RECOVERY PRIMER 1 Site Faliure Occurs Power Faliure / Virus Outbreak / ISP / Ransomware / Multiple Servers Sample Disaster Recovery Process Site Faliure Data Centre 1: Primary Data Centre Data

More information

Report. Diemer Plant Improvements Program Audit Report. Internal Audit Report for January 2011

Report. Diemer Plant Improvements Program Audit Report. Internal Audit Report for January 2011 Report Office of the General Auditor January 31, 2011 Internal Audit Report for January 2011 Summary Three reports were issued during the month: Diemer Plant Improvements Program Audit Report Business

More information

VMware BCDR Accelerator Service

VMware BCDR Accelerator Service AT A GLANCE The rapidly deploys a business continuity and disaster recovery (BCDR) solution with a limited, pre-defined scope in a non-production environment. The goal of this service is to prove the solution

More information

Contingency Planning

Contingency Planning Contingency Planning Introduction Planning for the unexpected event, when the use of technology is disrupted and business operations come close to a standstill Procedures are required that will permit

More information

Business Continuity Management Program Overview

Business Continuity Management Program Overview Business Continuity Management Program Overview Improving the lives of our customers by connecting them to the power of the digital world CenturyLink Key Objective CenturyLink may modify or terminate this

More information

Copyright 2012 EMC Corporation. All rights reserved.

Copyright 2012 EMC Corporation. All rights reserved. 1 TRANSFORM IT+BUSINESS+YOURSELF DISASTER RECOVERY FOR MISSION CRITICAL APPLICATIONS EMC FORUM 2012 SKOPJE Dejan Živanović Presales Manager Dejan.Zivanovic@emc.com 2 Cloud A New Architecture Old World

More information

CLOUD DISASTER RECOVERY. A Panel Discussion

CLOUD DISASTER RECOVERY. A Panel Discussion CLOUD DISASTER RECOVERY A Panel Discussion SPEAKERS Michael Kemps Founder & CEO Innovative Computing Systems, Inc. Mike Paul CTO Innovative Computing Systems, Inc. Sonny Sheth Senior Systems Engineer Innovative

More information

Why the Cloud is Changing the Face of DR

Why the Cloud is Changing the Face of DR Why the Cloud is Changing the Face of DR Janson Hoambrecker Director of World Wide Cloud Incubation Services EVault, Inc., a Seagate Company 2012 EVault, Inc. All Rights 1 Upgrading DR Capability Seen

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Contingency Planning Jan 22, 2008 Introduction Planning for the unexpected event, when the use of technology is disrupted and business operations come close to a standstill

More information

CITY OF MONTEBELLO SYSTEMS MANAGER

CITY OF MONTEBELLO SYSTEMS MANAGER CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

Infocomm Professional Development Forum 2011

Infocomm Professional Development Forum 2011 Infocomm Professional Development Forum 2011 1 Agenda Brief Introduction to CITBCM Certification Business & Technology Impact Analysis (BTIA) Workshop 2 Integrated end-to-end approach in increasing resilience

More information

For ACP-South Texas chapter program meeting in October 2012 only. Do not cite, copy or distribute without the author's consent. 1

For ACP-South Texas chapter program meeting in October 2012 only. Do not cite, copy or distribute without the author's consent. 1 Agenda Company and Program Overview The 4Ps of DR Planning People Property Process Performance Application Lifecycle Management Angela Mestre, MPH, MBA, CBCP, CISA, PMP Education Director, ACP - South

More information

Complete Data Protection & Disaster Recovery Solution

Complete Data Protection & Disaster Recovery Solution Complete Data Protection & Disaster Recovery Solution Quadric Software 2015 We were looking at other solutions. Alike was the best with XenServer, and none of them had Alike s compression abilities. After

More information

Update on the Key Initiatives Recommended by NTT Data regarding the Agency Cyber Security Framework

Update on the Key Initiatives Recommended by NTT Data regarding the Agency Cyber Security Framework Update on the Key Initiatives Recommended by NTT Data regarding the Agency Cyber Security Framework Texas Higher Education Coordinating Board Zhenzhen Sun Assistant Commissioner Information Solutions and

More information

Aras Innovator 11. Backup and Recovery Procedures

Aras Innovator 11. Backup and Recovery Procedures Document #: 11.0.02015040601 Last Modified: 1/4/2018 Copyright Information Copyright 2018 Aras Corporation. All Rights Reserved. Aras Corporation 300 Brickstone Square Suite 700 Andover, MA 01810 Phone:

More information

Cloud Computing. Presentation to AGA April 20, Mike Teller Steve Wilson

Cloud Computing. Presentation to AGA April 20, Mike Teller Steve Wilson Presentation to AGA April 20, 2017 Mike Teller Steve Wilson Agenda: What is cloud computing? What are the potential benefits of cloud computing? What are some of the important issues agencies need to consider

More information

MHA Consulting BCM Metrics Resiliency Through Measurement

MHA Consulting BCM Metrics Resiliency Through Measurement 0 MHA Consulting BCM Metrics Resiliency Through Measurement Presented by: Michael Herrera, CBCP March, 2013 2009 2013 MHA MHA Consulting All All Rights Rights Reserved. Reserved. Agenda 1 Overview A Menu

More information

Real-time Protection for Microsoft Hyper-V

Real-time Protection for Microsoft Hyper-V Real-time Protection for Microsoft Hyper-V Introduction Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate of customer adoption. Moving resources to

More information

Going Paperless & Remote File Sharing

Going Paperless & Remote File Sharing Going Paperless & Remote File Sharing Mary Twitty Family Services Director Earnest L. Hunt-Director of Sub-recipient Monitoring Tammy Smith Program Director Introduction Define the subject matter Move

More information

PUT DATA PROTECTION WHERE YOU NEED IT

PUT DATA PROTECTION WHERE YOU NEED IT from Carbonite PUT DATA PROTECTION WHERE YOU NEED IT Flexibility is your best friend when it comes to choosing a backup plan. For a backup solution to be considered flexible, it needs to satisfy several

More information

JD Edwards Private Cloud Session 30011

JD Edwards Private Cloud Session 30011 JD Edwards Private Cloud Session 30011 David Brunetta, CPA, CMA Director of Finance and Information Technology North American Construction Group Patricia Dahmer, PMP, PMI-RMP Practice Owner, Project Management

More information

HIPAA Compliance and OBS Online Backup

HIPAA Compliance and OBS Online Backup WHITE PAPER HIPAA Compliance and OBS Online Backup Table of Contents Table of Contents 2 HIPAA Compliance and the Office Backup Solutions 3 Introduction 3 More about the HIPAA Security Rule 3 HIPAA Security

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 3, March-2016 322 Disaster Recovery and Business Continuity Meshal Alabdulwahab Abstract : Disaster recovery is a policy which

More information