Contingency Planning and Disaster Recovery Plan

Size: px
Start display at page:

Download "Contingency Planning and Disaster Recovery Plan"

Transcription

1 Contingency Planning and Disaster Recovery Plan Introduction In response to Homeland Security concerns and following sound business practices, agencies were asked to develop a Continuity of Operations Plans (COOP) for review. In response to that directive, John Tyler Community College has developed a COOP as a comprehensive document to deal effectively with personnel safety issues and recovering critical business operations at an off site location. Companion documents to the COOP are the John Tyler Community College Campus Emergency Operations Plan (EOP), John Tyler Community College Information Technology Security Plan, Crisis Communication Plan (CCP), and the College Closing Policy The John Tyler Community College Information Technology Security Plan includes, but is not limited to, the College s Business Analysis and Risk Assessment, Risk Assessment for Information Technology Infrastructure, and the Contingency Management Plan (Contingency Planning and Disaster Recovery Plan). Disaster recovery planning involves identifying, preventing and preparing for events that may interrupt the College s business functions due to the effects of disasters or other failure. Please note that these business functions include essential business functions as well as dependent business functions. Risks may come from many sources and could damage the College s image or reputation, cause harm to College assets, subject the College to legal ramifications, or weaken the College s business controls. The business impact analysis process was completed to identify those business functions which must be maintained to provide College services to the greatest extent possible in the event of a disaster. The recovery time objective identified is the maximum acceptable down time for the IT systems associated with these critical tasks. The risk assessment process has been completed to identify risks which may expose the College to these damages and apply proactive, corrective measures to mitigate those risks. The Business Impact Analysis results are located at: G:\itsc\JTCC Security Planning - BIA_RA College management has ensured the necessary allocation of resources for the development and maintenance of a contingency plan for critical information technology systems for the support of essential functions. John Tyler Community College s Information Technology Security Plan has been written to reflect the College s current network infrastructure and environment. This plan applies to all functions, operations and resources at the all campus locations. Page 1

2 Small non-networked systems, such as those located in office environments, are the responsibility of the individual departments to develop a more abbreviated and less formal plan. All plans will be operationally tested at a frequency commensurate with the risk and magnitude of loss or harm that could result from disruption of information processing support. Definitions A disaster can be defined as a total or partial loss of any or all of the following: physical space, servers, workstations, network infrastructure equipment, personnel, software eradication, or hostile intrusion of the College s network resources resulting in an interruption of services. An incident need not be a disaster to warrant attention. There may be various levels of incidents and each should be handled according to the level of damage the incident may cause to the College s business functions. Types of disasters may include natural disasters (earthquakes, floods, tornados, hurricanes, thunderstorms, and fire for example), system malfunctions (any unavailability due to actual equipment failure or loss of electricity, gas, or water for example), or human causes (deliberate or non-deliberate). Purpose The purpose of the John Tyler Community College Information Technology Security Plan is to ensure compliance with the Information Technology Security Standard as stated in ISO/IEC 27002:2005(E). This document provides the required disaster recovery procedures as well as plans for the continuity of operations which support the College s business functions. Assumptions This contingency plan is based on the following assumptions: On-site College Disaster: 1. Emergency resources and staff can be made available. 2. Users will return to manual operations while ITSC is out of service and will retain source data for ITSC updates when operations are resumed. Page 2

3 3. All ITSC staff will have access to the plan(s), have been properly trained and can manage the recovery if required. 4. In the event of loss of all ITSC personnel, College administration will contact the Vice Chancellor for Information Technology Services, Virginia Community College System, to request assistance to JTCC management to procure trained operations and technical staff from state wide VCCS resources or elsewhere to carry out ITSC duties. 5. Any surviving ITSC staff members will be able to manage the execution of the disaster recovery plan. 6. Technical personnel can use ITSC's off-site system back-up media and documentation to restore the College's ITSC department. 7. System back-up media are secure at the primary off-site location at the JTCC Midlothian Campus. 8. The college utilizes five Barracuda backup servers to back up the college s data. Three servers are located at Chester and two servers are located at Midlothian. Chester data is backed up locally to one of the Chester BBS appliances and Midlothian data is backed up locally to one of the Midlothian BBS appliances. Twenty-four hours after a backup cycle completes, the data is then replicated. a. Documentation and software located at JTCC Chester or Midlothian Campuses will be available. b. College departments are responsible for inter-departmental hard copy manually processed data and documentation if disaster is wide spread. All electronic data and programs residing on network servers will be retrievable from back-up media. c. Use of the current server environment existing at the Midlothian Campus and acquisition of additional servers acquired at the time of a disaster would provide sufficient server resources to support the College if the Chester site is lost. Reallocation of server definitions and data and program restoration (if required) would bring all services back on line as soon as possible. Current server environment existing at the Chester Campus would provide sufficient server resources if the Midlothian site was lost. d. Reconstruction of the ITSC department may be in a leased mobile office space (double-wide trailer). Location on campus will be determined by the Management Team. Page 3

4 e. All members of the four disaster recovery teams have been issued a copy of the Contingency Management/Disaster Recovery Plan. Off-Site Non-College Disaster: This would include locations that contain critical applications and data essential to College automated operations via remote based systems (i.e., Oracle, PeopleSoft or PMIS and CARS via VITA). College Environment John Tyler Community College has two campuses, one in Chester and the other in Midlothian. We also have faculty and staff at the College s Nursing Program Site. Chester Campus Street and Mailing Address John Tyler Community College Jefferson Davis Highway Chester, Virginia Directions Map of Campus Midlothian Campus Street and Mailing Address John Tyler Community College 800 Charter Colony Parkway Midlothian, Virginia Directions Map of Campus Nursing Program at CJW Johnston-Willis Campus Street Address 1401 Johnston-Willis Drive Richmond, Virginia (please do not send mail to this address) Mailing Address John Tyler Community College Jefferson Davis Highway Chester, VA Directions Page 4

5 Infrastructure Environment All network drawings are housed at: G:\itsc\JTCC Security Planning - Configuration Management\Network\Diagrams Backup procedures are housed at: G:\itsc\JTCC Security Planning - Configuration Management\Barracuda\BBS Backup and Recovery\How to Recover Using Barracuda Backup Services - for Systems Engineers.docx Page 5

6 When an IT Disaster is recognized In the event of a disaster, the disaster planning coordinator, Michael Smith, College Technology Officer (CTO), will initiate disaster recovery procedures. If the disaster planning coordinator is unavailable or incapacitated, the order of responsibility for coordinating the recovery will be as follows: Disaster Planning Coordinator Smith, Michael College Technology Officer (CTO) ITSC Staff in order of succession Michael Russell Chief Information Officer Assistant Vice Chancellor for Enterprise Services Operations Information Technology Services Blackwell, Scott W. Greene, Jeffrey Scott MacPherson, Dennis Programmer Analyst Williams, Patricia Abu-Saleh, Emad Painter, Jill Mitchell, Lincoln Audio Visual/Multi-Media Specialist Chester-B133b; Midlothian-B216 (804) (804) msmith01@jtcc.edu System Office (804) mrussell@vccs.edu Chester-B133 (804) (804) sblackwell@jtcc.edu Midlothian-B212 (804) (804) FAX jgreene@jtcc.edu Chester-B130 (804) (804) FAX dmacpherson@jtcc.edu Chester-B133 (804) pwilliams@jtcc.edu Chester - B133 (804) (804) FAX eabu-saleh@jtcc.edu Chester - B133 (804) (804) FAX jpainter@jtcc.edu Chester-B131 (804) Page 6

7 The first task of the coordinator is to secure a current copy of the JTCC Contingency Management/Disaster Recovery Plan. A current copy resides at Chester, B133B, and Midlothian Campus, B216. Additional copies can also be retrieved from: the Vice President of Financial and Administrative Services located at the Chester Campus. First Activity to be performed The disaster planning coordinator, or individual acting as the same, will: Perform a quick analysis of the situation and determine if the disaster recovery plan needs to be implemented. Notify: 1. The College Vice President of Administration 2. The College President 3. The ITSC staff 4. The VCCS Client Services Center, Chancellor and Vice Chancellor of Information Technology Services 5. Notify computer customers (staff, faculty, administrators, students, etc.) Call and place into service the Emergency Management Team. At this point in time, the disaster recovery teams will begin performing their appointed duties. IT Disaster Recovery Teams Disaster recovery teams will be utilized to restore automated computer/technology services. Four recovery teams lead by a disaster planning coordinator will participate in recovery activities based on the level of severity of the loss, recovery deemed necessary, and restoration order as deemed in the Business Impact Analysis and Risk Assessment processes. Team members may serve in multiple roles and be assigned to multiple teams. Page 7

8 The coordinator and four teams are: Disaster Planning Coordinator: Smith, Michael College Technology Officer (CTO) Chester-B133b; Midlothian-B216 (804) (804) Responsibilities of the Disaster Planning Coordinator are: Manage and coordinate all disaster plan activities. Contact all disaster recovery team members involved in the recovery effort. Ensure all recovery team members have a copy of the plan. Appoint replacement staff if necessary. Contact the College President, College Vice-President of Financial and Administrative Services. Initiate tasks as delegated by disaster recovery team responsibilities. Provide disaster recovery status via communication with College administrators. If necessary, assist planning for returning to normal conditions (renovations, new construction, etc.). Page 8

9 Emergency Management Team The team consists of the following personnel: Smith, Michael College Technology Officer (CTO) Michael Russell Chief Information Officer Assistant Vice Chancellor for Enterprise Services Operations Information Technology Services MacPherson, Dennis Programmer Analyst Blackwell, Scott W. Greene, Jeffrey Scott Williams, Patricia Abu-Saleh, Emad Painter, Jill Mitchell, Lincoln Audio Visual/Multi-Media Specialist Chester-B133b; Midlothian-B216 (804) (804) System Office (804) Chester-B130 (804) (804) FAX Chester-B133 (804) (804) Midlothian-B212 (804) (804) FAX Chester-B133 (804) Chester - B133 (804) (804) FAX eabu-saleh@jtcc.edu Chester - B133 (804) (804) FAX jpainter@jtcc.edu Chester-B131 (804) lmitchell@jtcc.edu Responsibilities of the Emergency Management Team are: Conduct on-site assessment of the damaged areas. Page 9

10 Provide a detailed status of the disaster to the disaster planning coordinator as soon as possible. Contact necessary vendors to meet at the ITSC site to assess the damage and determine resources necessary to restore services to the damaged areas. Determine the priorities and the minimum time frame the college will function with degraded operations before the backup plan is implemented. Ensure other support staff is contacted to provide assistance as needed. Determine a time frame for when all services will be restored. Provide the College president and administration a briefing within 12 hours of the damage inflicted on the information technology environment, particularly in ITSC. This briefing may include: o What is affected o Can ITSC be restored at current location o What is salvageable in ITSC o What is probable length of time frame involved for restoration of services o Anticipated vendor support o If a security officer is required in the IT area o Can ITSC s operation be transferred and headquartered at Midlothian Campus (If Midlothian Campus is impacted, can Midlothian operations be transferred to Chester Campus) o Recommend priorities Notify the following individuals/vendors: VCCS Chancellor s Office Verizon Cisco Systems Current Cisco Certified Contract Vendor Cable Contractor Electrical Contractor Dell Computers Mobile office (trailer) vendor Miscellaneous vendors as needed Page 10

11 Technical Support Team The team consists of the following personnel: Smith, Michael College Technology Officer (CTO) Michael Russell Chief Information Officer Assistant Vice Chancellor for Enterprise Services Operations Information Technology Services MacPherson, Dennis Programmer Analyst Blackwell, Scott W. Greene, Jeffrey Scott Williams, Patricia Abu-Saleh, Emad Painter, Jill Mitchell, Lincoln Audio Visual/Multi-Media Specialist Chester-B133b; Midlothian-B216 (804) (804) System Office (804) Chester-B130 (804) (804) FAX Chester-B133 (804) (804) Midlothian-B212 (804) (804) FAX Chester-B133 (804) Chester - B133 (804) (804) FAX eabu-saleh@jtcc.edu Chester - B133 (804) (804) FAX jpainter@jtcc.edu Chester-B131 (804) lmitchell@jtcc.edu The responsibilities of the Technical Support Team are: Page 11

12 Work with Emergency Management Team to conduct on-site assessment of the damaged areas to determine condition of network infrastructure equipment/servers, etc., and determine what computer hardware and software has been damaged. Responsible for making decisions based on information received from the Emergency Management Team. Inform Campus Security Force of their role in the disaster plan. Inform Application Owners of their role in the disaster plan and recovery process. Notify staff and vendors using "Emergency Notification Telephone List" o See the Emergency Contact List Determine via JTCC Information Technology Security Plan, Business Impact Analysis and Risk Assessment Executive Summary, which applications are mission critical and need to be on-line immediately and who is responsible for each application. o See BIA System Results. Schedule, coordinate, and communicate as needed with: o All College managers o Emergency Management Team o Special Projects Team o Customer Support Team o Vendors o Users o VCCS Review pre-disaster environment Network Infrastructure Schematics, VCCS and VITA Resources via Connectivity. Prepare the temporary mobile office trailer at the JTCC Chester or Midlothian Campus if required. Reconstruct pre-disaster environment or new environment in accordance with Emergency Management Team's proposal. This will include scheduling repair, replacement, and movement of equipment: 1. Salvage usable equipment 2. Document arrival of equipment 3. Prepare charts with expected installation dates, personnel responsible for duties, etc. 4. Document events as they occur 5. Configuration and moving of equipment Page 12

13 Reconstruct pre-disaster environment or new environment in accordance with Emergency Management Team's proposal. This will include installation of software: Salvage usable software: 1. Document re-installation of software 2. Prepare charts with expected installation dates, personnel responsible for duties, etc. Document events as they occur: Work with VCCS Customer Support Center to reestablish terminal dependent IMS access privileges. Work with VCCS Security Officer to reestablish terminal dependent VITA access privileges. Prepare a list of the essential items for use in the temporary mobile office (trailer). Special Projects Team The team consists of the following personnel: ITSC Staff College Lab Assistants Institutional Effectiveness College Web Master Associate Vice President of F&A Procurement Staff Accounting Staff Fixed Assets Staff Facilities Staff Executive Secretary, Financial and Administrative Services Responsibilities of the Special Projects Team are: Help with transportation needs, order state cars, trucks, etc. Assist managers in making phone calls as requested. Order supplies as requested. Borrow or purchase boxes for moving. Page 13

14 Coordinate the preparation of any needed paper work. Acquiring emergency purchasing means (charge card, delegated purchasing, contract information, etc.). Provide assistance to any support teams as needed. Customer Support Team The team consists of the following personnel: Smith, Michael College Technology Officer (CTO) Michael Russell Chief Information Officer Assistant Vice Chancellor for Enterprise Services Operations Information Technology Services MacPherson, Dennis Programmer Analyst Blackwell, Scott W. Greene, Jeffrey Scott Williams, Patricia Abu-Saleh, Emad Painter, Jill Mitchell, Lincoln Audio Visual/Multi-Media Specialist Chester-B133b; Midlothian-B216 (804) (804) System Office (804) Chester-B130 (804) (804) FAX Chester-B133 (804) (804) Midlothian-B212 (804) (804) FAX Chester-B133 (804) Chester - B133 (804) (804) FAX eabu-saleh@jtcc.edu Chester - B133 (804) (804) FAX jpainter@jtcc.edu Chester-B131 (804) Page 14

15 Responsibilities of the Customer Support Team: Assist users in recovery of non-network supported automated systems. Assist users in implementing manual procedures to accomplish mission critical application processing if immediate automated solutions will not be forthcoming. Assist users with hardware and software restoration, or relocation to new office site. Keep users knowledgeable of the restoration schedule, particularly as to the impact of there particular areas and services need for them to be productive. Page 15

16 Emergency Response Procedures John Tyler Community College (JTCC) Information Technology services are split between the two primary campus locations: Chester and Midlothian Campus. The foundation of the College s disaster recovery plan is to take advantage of JTCC s multicampus environment. If one site were to suffer a major disruption, the other location would become the College s disaster recovery site. The ITSC network administrator and staff would perform steps to establish the Midlothian Campus Hot Site as the College s primary WAN/LAN infrastructure domain. If the Midlothian Campus ITSC environment was to suffer a disaster the technology services would be established at the Chester Campus to support Midlothian technical activities. If equipment replacement is required due to the College suffering a debilitating disaster at both campuses, the normal emergency order procedures should produce the needed equipment within a reasonable time to support recovery activities. Page 16

17 Emergency Telephone List For security purposes, personal telephone information is not housed in this main document. Appropriate employees will have access to the document noted below. o See the EOP Emergency Contact List Smith, Michael College Technology Officer (CTO) College Contacts Michael Russell Chief Information Officer Assistant Vice Chancellor for Enterprise Services Operations Information Technology Services MacPherson, Dennis Programmer Analyst Blackwell, Scott W. Greene, Jeffrey Scott Williams, Patricia Abu-Saleh, Emad Chester-B133b; Midlothian-B216 (804) (804) msmith01@jtcc.edu System Office (804) mrussell@vccs.edu Chester-B130 (804) (804) FAX dmacpherson@jtcc.edu Chester-B133 (804) (804) sblackwell@jtcc.edu Midlothian-B212 (804) (804) FAX jgreene@jtcc.edu Chester-B133 (804) pwilliams@jtcc.edu Chester - B133 Page 17

18 Painter, Jill Raspiller, Dr. Ted President President's Office Susan Grinnan Vice President, Finance & Administration Finance and Administration Fiege, Dr. Bill Vice President, Learning & Student Success Dunaway, Gregory Director, Facilities Operations and Safety Facilities Operations Horning, Jerad Web Developer Creative Services Jimison, Nancy Procurement Manager Business Office Tanya Brown Assistant Director of College Safety and Security (804) (804) FAX Chester - B133 (804) (804) FAX jpainter@jtcc.edu Midlothian-B206c; Chester- A105b (804) (804) (804) FAX traspiller@jtcc.edu Chester-A102c;Midlothian-B206e (804) (804) (804) FAX ftaylor@jtcc.edu Chester-N113; Midlothian B206f (804) (804) wfiege@jtcc.edu Midlothian-P101 (804) (804) (804) FAX llaclair@jtcc.edu Midlothian-E124G (804) (804) FAX jhorning@jtcc.edu Chester-A102a (804) (804) FAX njimison@jtcc.edu Chester-N111b (804) Page 18

19 Facilities Operation (804) (804) FAX Patteson, Beki Fixed Asset Control Specialist Finance and Administration Mitchell, Lincoln Audio Visual/Multi-Media Specialist Chester-G118 (804) (804) (804) FAX Chester-B131 (804) Page 19

20 Maintaining and Testing the Plan The Disaster Planning Coordinator is responsible for maintaining the VCCS Information Technology Disaster Prevention and Recovery Program. The College Coordinator has developed a plan to minimize disruptions of critical functions and the capability to recover operations expediently and successfully. The Coordinator performs the following activities to maintain the plan: Develop a time table to test the College plan as required. ITSC staff will support the Coordinator to ensure the plan is continuously updated with the most recent information so as not to render the plan outdated and useless. Update the position description of the employee assigned to be the Disaster Planning Coordinator and include the responsibilities in the employee annual Performance Evaluation. Coordinator conducts annual planning meetings with each team prior to annual testing. The purpose of testing the plan is to ensure the plan will work when needed. Goals are to identify the weaknesses and incorporate the information obtained to improve the plan. The testing will assess the following: Verify that the plan is complete and accurate. Evaluate that all participants know their roles and responsibilities. Measure the overall performance of the plan. ITSC will participate in all college-wide testing. Information or documentation obtained from all testing will be used for detailed analysis and improvement of the plan. Training will be held at various ITSC staff meetings and informally periodically to ensure IT staff is aware of their individual roles and responsibilities, notification and warning procedures, location and use of emergency equipment, and emergency shutdown procedures. Input from staff at these meetings may be used to update the plan accordingly. Updates will be made periodically as recovery strategies or technology environments change. Page 20

21 Technology Team information from the current COOP. The College Management Team guides and directs all phases of the COOP process and evaluates the transition between the Responses, Recover, Resume, and Restore phases. The College Management Team will also monitor and evaluate the Continuity Teams and determine when specific teams can either be disbanded or restructured. The Director of Information Technology is part of the College Management Team and will: Contact the IT staff and provide a status report of the current situation. Call the Business Recovery Center contacts and provide a status report of the current situation. Assign Incident Command Post contacts the tasks of preparing the Recovery sites for use. Recommend establishing a Call Center with appropriate personnel. Announce fax numbers and contact numbers on the agency web site and TV/radio. Technology Team The Technology Team provides the essential technical and telecommunications support functions during the recovery and resume processes. The Technology Team is activated by a call from the College Management Team. The Technology Team reestablishes technology services. The Technology Team consists of individuals who are knowledgeable about information systems and infrastructure, telecommunications and database technologies. This group is responsible for the recovery and resumption of automated systems, networks, and telephony for John Tyler Community College. In accordance with the active Security Plan, the following will be recovered: Telephones: Determine what systems are intact and what needs to be recovered, if possible. Data Communications: Determine which networks are functioning and which are not. Take necessary steps to reestablish communications in coordination with the Special Projects Team. Information Services: Restore critical applications at Business Recovery Center site, as needed in the order of priority established by JTCC. Page 21

22 Step Activity 1 Respond to the Special Projects Team call in response to an event. Get as much information as you can on the nature and the circumstances of the emergency. 2 Phone the other Technology Team members, as required. Convey to them what you know about the event. 3 Identify Client Services personnel who will work with Public Information Office on all communications associated with the disaster event. 4 Call the contact at the Business Recovery Center and schedule the restoration. 5 Contact Critical Vendors to provide assistance at the Business Recovery Center. 6 Determine the extent of the Technology and Data procedures that must be followed as identified in the current John Tyler Community College Information Technology Security Plan. 7 Re-establish critical data center services through hardware reconfiguration, ordering of hardware, or use of other state facility computing resources as specified in the in the John Tyler Community College Information Technology Security Plan. 8 Report recovery progress to Special Projects Team for the Business Recovery Center. John Tyler Community College is not required to establish any Memorandums of Agreement for Business Recovery locations. All Business Recovery Center sites are John Tyler Community College locations. These consist of the following locations to be used in the event any one or two of the other John Tyler Community College locations experience an emergency. Recovery Team Info (Note: ITSC employees may serve on more than one team) Page 22

23 College Management Team Disaster Site Business Recovery Center(s) Technology Recovery Site Coordination & Recovery Team Special Projects Team Technology Team Administrative Support Team Technology Team Division Teams Page 23

INFORMATION SECURITY- DISASTER RECOVERY

INFORMATION SECURITY- DISASTER RECOVERY Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy

More information

University Information Systems. Administrative Computing Services. Contingency Plan. Overview

University Information Systems. Administrative Computing Services. Contingency Plan. Overview University Information Systems Administrative Computing Services Contingency Plan Overview Last updated 01/11/2005 University Information Systems Administrative Computing Services Contingency Plan Overview

More information

Making YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning

Making YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning 2017 California Higher Education Collaborative Conference Making YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning Introductions Rick Blackburn,

More information

NUIT Tech Talk. Emergency Preparedness. March 1, Sharlene Mielke. Jay Bagley. Disaster Recovery / Business Continuity Coordinator

NUIT Tech Talk. Emergency Preparedness. March 1, Sharlene Mielke. Jay Bagley. Disaster Recovery / Business Continuity Coordinator NUIT Tech Talk Emergency Preparedness March 1, 2011 Sharlene Mielke Disaster Recovery / Business Continuity Coordinator Jay Bagley Distributed Support Specialist Information and Systems Security/Compliance

More information

Introduction to Business continuity Planning

Introduction to Business continuity Planning Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources

More information

Business Continuity: How to Keep City Departments in Business after a Disaster

Business Continuity: How to Keep City Departments in Business after a Disaster Business Continuity: How to Keep City Departments in Business after a Disaster Shannon Spence, PE Red Oak Consulting, an ARCADIS group Agenda Security, Resilience and All Hazards The Hazards Cycle and

More information

Number: USF System Emergency Management Responsible Office: Administrative Services

Number: USF System Emergency Management Responsible Office: Administrative Services POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last

More information

Subject: Audit Report 18-84, IT Disaster Recovery, California State University, Sacramento

Subject: Audit Report 18-84, IT Disaster Recovery, California State University, Sacramento Larry Mandel Vice Chancellor and Chief Audit Officer Audit and Advisory Services 401 Golden Shore, 4th Floor Long Beach, CA 90802-4210 562-951-4430 562-951-4955 (Fax) lmandel@calstate.edu October 23, 2018

More information

Florida State University

Florida State University Florida State University Disaster Recovery & Business Continuity Planning Overview October 24, 2017 1 Key Readiness Questions Has your department identified the business functions and infrastructure that

More information

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up.

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up. Larry Mandel Vice Chancellor and Chief Audit Officer Audit and Advisory Services 401 Golden Shore, 4th Floor Long Beach, CA 90802-4210 562-951-4430 562-951-4955 (Fax) lmandel@calstate.edu October 10, 2018

More information

Appendix 3 Disaster Recovery Plan

Appendix 3 Disaster Recovery Plan Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision

More information

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up.

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up. Larry Mandel Vice Chancellor and Chief Audit Officer Audit and Advisory Services 401 Golden Shore, 4th Floor Long Beach, CA 90802-4210 562-951-4430 562-951-4955 (Fax) lmandel@calstate.edu June 5, 2018

More information

Table of Contents. Sample

Table of Contents. Sample TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...

More information

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110 Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including

More information

Template. IT Disaster Recovery Planning: A Template

Template. IT Disaster Recovery Planning: A Template Template IT Disaster Recovery Planning: A Template When disaster strikes, business suffers. A goal of business planning is to mitigate disruption of product and services delivery to the greatest degree

More information

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA STATE OF NORTH CAROLINA AUDIT OF THE INFORMATION SYSTEMS GENERAL CONTROLS ELIZABETH CITY STATE UNIVERSITY JULY 2006 OFFICE OF THE STATE AUDITOR LESLIE MERRITT, JR., CPA, CFP STATE AUDITOR AUDIT OF THE

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Contingency Planning Jan 22, 2008 Introduction Planning for the unexpected event, when the use of technology is disrupted and business operations come close to a standstill

More information

Keys To Disaster Preparedness

Keys To Disaster Preparedness Keys To Disaster Preparedness Presented By: Rob Robbins 2012 Setting up your Chess Board Identify your Queen Decide who s going to be King How many assets to protect and in what order (moving your pieces)

More information

CONTINGENCY PLANNING GUIDE

CONTINGENCY PLANNING GUIDE 2017 CONTINGENCY PLANNING GUIDE UTC IT0128-G UTC Information Technology Michael Dinkins, CISO 4/28/2017 CONTENTS 1. SCOPE... 2 2. PRINCIPLES... 2 3. REVISIONS... 2 4. OBJECTIVE... 2 5. POLICY... 2 6. APPLICABILITY...

More information

IT CONTINUITY, BACKUP AND RECOVERY POLICY

IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption

More information

Data Recovery Policy

Data Recovery Policy Data Recovery Policy The Marketware, Inc. Contingency Plan establishes procedures to recover Marketware, Inc. following a disruption resulting from a disaster. This Disaster Recovery Policy is maintained

More information

TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY

TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY JUNE 2017 TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY OVERVIEW The intent of this document is to provide external customers and auditors with a high-level overview of the Tufts Health Plan Corporate

More information

Disaster Recovery Planning: Is Your Plan in Place? Presented by: Steve Shofner, CISA, CGEIT

Disaster Recovery Planning: Is Your Plan in Place? Presented by: Steve Shofner, CISA, CGEIT Disaster Recovery Planning: Is Your Plan in Place? Presented by: Steve Shofner, CISA, CGEIT 1 The material appearing in this presentation is for informational purposes only and is not legal or accounting

More information

INFORMATION TECHNOLOGY SERVICES DISASTER RECOVERY PLAN

INFORMATION TECHNOLOGY SERVICES DISASTER RECOVERY PLAN INFORMATION TECHNOLOGY SERVICES DISASTER RECOVERY PLAN Revision History Revision Change Date 1.0 DRAFT Disaster Recovery Plan 8/8/2006 1.1 FINAL Disaster Recovery Plan 10/12/2009 2.0 Reviewed 10/15/2009

More information

Business Continuity Plan Executive Overview

Business Continuity Plan Executive Overview Business Continuity Plan Executive Overview In terms of business continuity and disaster recovery planning, Harland Clarke s mission is to ensure the availability of critical business functions and Information

More information

BUSINESS CONTINUITY. Topics covered in this checklist include: General Planning

BUSINESS CONTINUITY. Topics covered in this checklist include: General Planning BUSINESS CONTINUITY Natural and manmade disasters are happening with alarming regularity. If your organization doesn t have a great business continuity plan the repercussions will range from guaranteed

More information

DISASTER RECOVERY PRIMER

DISASTER RECOVERY PRIMER DISASTER RECOVERY PRIMER 1 Site Faliure Occurs Power Faliure / Virus Outbreak / ISP / Ransomware / Multiple Servers Sample Disaster Recovery Process Site Faliure Data Centre 1: Primary Data Centre Data

More information

Contingency Planning

Contingency Planning Contingency Planning Introduction Planning for the unexpected event, when the use of technology is disrupted and business operations come close to a standstill Procedures are required that will permit

More information

Please indicate below the principle nature of your department s operations (check all that apply): Student life support.

Please indicate below the principle nature of your department s operations (check all that apply): Student life support. BUSINESS 2016 A. BUSINESS CONTINUITY PLAN (BCP) To be better prepared, UH personnel and its programs may use this form to complete a Business Continuity Plan (BCP) checklist to describe how your program

More information

Hurricane and Storm Commercial Damage Assessment

Hurricane and Storm Commercial Damage Assessment Hurricane and Storm Commercial Continue to follow all evacuation orders. Stay up-to-date on current hurricane and storm information by visiting the U.S. National Hurricane Center. How to Conduct s:. PREPARE

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

TSA/FTA Security and Emergency Management Action Items for Transit Agencies TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:

More information

DISASTER RESPONSE & RECOVERY PLANNING. Information Technology Services

DISASTER RESPONSE & RECOVERY PLANNING. Information Technology Services DISASTER RESPONSE & RECOVERY PLANNING Information Technology Services Review Frequency: Annual Review Schedule: March 2016 ADDITIONAL DETAILS Vendor list details redacted from this version. Effective:

More information

MassMutual Business Continuity Disclosure Statement

MassMutual Business Continuity Disclosure Statement MassMutual Business Continuity Disclosure Statement Overview Resiliency is a high priority at Massachusetts Mutual Life Insurance Company ( MassMutual or the Company ). To that end, significant investments

More information

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA STATE OF NORTH CAROLINA AUDIT OF THE INFORMATION SYSTEMS GENERAL CONTROLS FAYETTEVILLE STATE UNIVERSITY MAY 2007 OFFICE OF THE STATE AUDITOR LESLIE MERRITT, JR., CPA, CFP STATE AUDITOR AUDIT OF THE INFORMATION

More information

Subject: Audit Report 16-50, IT Disaster Recovery, California State University, Fresno

Subject: Audit Report 16-50, IT Disaster Recovery, California State University, Fresno Larry Mandel Vice Chancellor and Chief Audit Officer Office of Audit and Advisory Services 401 Golden Shore, 4th Floor Long Beach, CA 90802-4210 562-951-4430 562-951-4955 (Fax) lmandel@calstate.edu February

More information

Applications/Data To Include in Survey (include applications that meet one or more of the following criteria)

Applications/Data To Include in Survey (include applications that meet one or more of the following criteria) Objective of Survey The purpose of this survey is to identify and understand 1) the nature of critical and sensitive campus-wide applications and/or data, 2) where the data is located, 3) how the data

More information

DATA CENTER OPERATIONS CALIFORNIA STATE UNIVERSITY, DOMINGUEZ HILLS. Audit Report June 15, 2012

DATA CENTER OPERATIONS CALIFORNIA STATE UNIVERSITY, DOMINGUEZ HILLS. Audit Report June 15, 2012 DATA CENTER OPERATIONS CALIFORNIA STATE UNIVERSITY, DOMINGUEZ HILLS Audit Report 12-31 June 15, 2012 Henry Mendoza, Chair William Hauck Steven M. Glazer Glen O. Toney Members, Committee on Audit University

More information

Public and Private Interdependencies Filling a Gap in Most Continuity Plans

Public and Private Interdependencies Filling a Gap in Most Continuity Plans Public and Private Interdependencies Filling a Gap in Most Continuity Plans John A Jackson Executive Vice President Fusion Risk Management, Inc. The evolution of the continuity industrytechnology advancement

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

I. PURPOSE III. PROCEDURE

I. PURPOSE III. PROCEDURE A.R. Number: 2.11 Effective Date: 2/1/2009 Page: 1 of 5 I. PURPOSE This policy outlines the procedures that third party organizations must follow when connecting to the City of Richmond (COR) networks

More information

L18: Integrate Control Disciplines to Increase Control and Save Money

L18: Integrate Control Disciplines to Increase Control and Save Money L18: Integrate Control Disciplines to Increase Control and Save Money Kathleen Lucey, FBCI Montague Risk kalucey@montaguetm.com tel: 1.516.676.9234 Connections Information Security (computer security,

More information

Information Security Incident Response and Reporting

Information Security Incident Response and Reporting Information Security Incident Response and Reporting Original Implementation: July 24, 2018 Last Revision: None This policy governs the actions required for reporting or responding to information security

More information

UF CEMP Support Group Annex: IT Group

UF CEMP Support Group Annex: IT Group UF CEMP Support Group Annex: IT Group Lead Representatives Office of Vice President and Chief Information Officer (CIO) Supporting Departments External Partners Academic Technology Computing and Networking

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Policies and Procedures Date: February 28, 2012

Policies and Procedures Date: February 28, 2012 No. 5200 Rev.: 1 Policies and Procedures Date: February 28, 2012 Subject: Information Technology Security Program 1. Purpose... 1 2. Policy... 1 2.1. Program Elements... 1 2.2. Applicability and Scope...

More information

2 ESF 2 Communications

2 ESF 2 Communications 2 ESF 2 Communications THIS PAGE LEFT BLANK INTENTIONALLY Table of Contents 1 Introduction... 1 1.1 Purpose and Scope... 1 1.2 Relationship to Other ESF Annexes... 1 1.3 Policies and Agreements... 1 2

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

PHYSICAL & ENVIRONMENTAL PROTECTION GUIDE

PHYSICAL & ENVIRONMENTAL PROTECTION GUIDE 2017 PHYSICAL & ENVIRONMENTAL PROTECTION GUIDE UTC IT0129-G UTC Information Technology Michael Dinkins, CISO 4/28/2017 CONTENTS 1. SCOPE... 2 2. PRINCIPLES... 2 3. REVISIONS... 2 4. OBJECTIVE... 2 5. POLICY...

More information

Leveraging ITIL to improve Business Continuity and Availability. itsmf Conference 2009

Leveraging ITIL to improve Business Continuity and Availability. itsmf Conference 2009 Leveraging ITIL to improve Business Continuity and Availability Samuel Lo MBA, MSc, CDCP, PMP, CISSP, CISA Data Centre Services Manager COL Limited Strictly Business itsmf Conference 2009 25 February 2009

More information

RESUME. David Lynwood Deal

RESUME. David Lynwood Deal Resume David Lynwood Deal 1 RESUME 1608 Meadowview Lane Martinsville, Virginia 24112 (276) 252-8820 (Home) (276) 656-0258 (Work) email: ddeal@patrickhenry.edu David Lynwood Deal Education: June 1978 April

More information

Disaster Recovery Committee. Learning Resource Center Specialist

Disaster Recovery Committee. Learning Resource Center Specialist This document is intended to provide operational procedures and serve as a reference for the Key Information Technology Personnel at Community Higher Ed Disaster Recovery Community Higher Ed Disaster Recovery

More information

EMERGENCY MANAGEMENT

EMERGENCY MANAGEMENT CSU The California State University Office of Audit and Advisory Services EMERGENCY MANAGEMENT California State University, Dominguez Hills Audit Report 16-43 August 30, 2016 EXECUTIVE SUMMARY OBJECTIVE

More information

Marshall University Information Technology Council. Procedure ITP-16 IT INFRASTRUCTURE AUTHORIZATION PROCEDURE

Marshall University Information Technology Council. Procedure ITP-16 IT INFRASTRUCTURE AUTHORIZATION PROCEDURE Marshall University Information Technology Council Procedure ITP-16 IT INFRASTRUCTURE AUTHORIZATION PROCEDURE General Information: 1.1 Scope: This procedure applies to all University employees, including

More information

Hurricane Florence Response and Recovery. October 18, 2018 Miles Lackey, Vice Chancellor of Business Affairs & CFO

Hurricane Florence Response and Recovery. October 18, 2018 Miles Lackey, Vice Chancellor of Business Affairs & CFO Hurricane Florence Response and Recovery October 18, 2018 Miles Lackey, Vice Chancellor of Business Affairs & CFO Event Impact Campus Grounds Approximately 400 downed trees Light poles Power lines Page

More information

Continuity of Business

Continuity of Business White Paper Continuity of Business SAS Continuity of Business initiative reflects our commitment to our employees, to our customers, and to all of the stakeholders in our global business community to be

More information

EXHIBIT A. - HIPAA Security Assessment Template -

EXHIBIT A. - HIPAA Security Assessment Template - Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,

More information

Security Guideline for the Electricity Sector: Business Processes and Operations Continuity

Security Guideline for the Electricity Sector: Business Processes and Operations Continuity Security Guideline for the Electricity Sector: Business Processes and Operations Continuity Preamble: It is in the public interest for NERC to develop guidelines that are useful for improving the reliability

More information

Disaster Recovery Plan. Serving Community Care College Clary Sage College Oklahoma Technical College

Disaster Recovery Plan. Serving Community Care College Clary Sage College Oklahoma Technical College 2018 Disaster Recovery Plan Serving Community Care College Clary Sage College Oklahoma Technical College 1 Introduction Information Technology Statement of Intent Policy Statement Objectives Key Personnel

More information

Module 4 STORAGE NETWORK BACKUP & RECOVERY

Module 4 STORAGE NETWORK BACKUP & RECOVERY Module 4 STORAGE NETWORK BACKUP & RECOVERY BC Terminology, BC Planning Lifecycle General Conditions for Backup, Recovery Considerations Network Backup, Services Performance Bottlenecks of Network Backup,

More information

MHCC Emergency Notification System (ENS) Protocols

MHCC Emergency Notification System (ENS) Protocols MHCC Emergency Notification System (ENS) Protocols Introduction MHCC has an Emergency Notification System (ENS) with multi communication capabilities. MHCC s ENS is intended to rapidly disseminate emergency

More information

COMMUNICATIONS EMERGENCY SUPPORT FUNCTION (ESF #2) FORMERLLY COMMUNICATIONS AND WARNING

COMMUNICATIONS EMERGENCY SUPPORT FUNCTION (ESF #2) FORMERLLY COMMUNICATIONS AND WARNING ICS Category: Operations ESF # 2 Responsible for the EOC message center, providing working radio & telephone equipment, and providing warning to vulnerable facilities Reports to the emergency management

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO

Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO Effective: 12/31/17 Last Revised: 8/28/17 Responsible University Administrator: Vice Chancellor for Information Services & CIO Responsible University Office: Information Technology Services Policy Contact:

More information

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information

More information

Metropolitan Washington Airports Authority PROCUREMENT AND CONTRACTS DEPT. AMENDMENT OF SOLICITATION

Metropolitan Washington Airports Authority PROCUREMENT AND CONTRACTS DEPT. AMENDMENT OF SOLICITATION Metropolitan Washington Airports Authority PROCUREMENT AND CONTRACTS DEPT. AMENDMENT OF SOLICITATION Metropolitan Washington Airports Authority Procurement and Contracts Dept., MA-29 2733 Crystal Drive

More information

CITY OF MONTEBELLO SYSTEMS MANAGER

CITY OF MONTEBELLO SYSTEMS MANAGER CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

CANVAS DISASTER RECOVERY PLAN AND PROCEDURES

CANVAS DISASTER RECOVERY PLAN AND PROCEDURES CANVAS DISASTER RECOVERY PLAN AND PROCEDURES Instructure Security, Engineering, and Operations INSTRUCTURE, INC. 6330 South 3000 East Salt Lake City, Utah 84121 Table of Contents Disaster Plan and Procedures...

More information

Business Continuity Planning

Business Continuity Planning Information Systems Audit and Control Association www.isaca.org Business Continuity Planning AUDIT PROGRAM & INTERNAL CONTROL QUESTIONNAIRE The Information Systems Audit and Control Association With more

More information

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE Information Technology Services Administrative Regulation ITS-AR-1506 INFORMATION SECURITY-SECURITY INCIDENT RESPONSE 1.0 Purpose and Scope The purpose of the Security Response Administrative Regulation

More information

UCLA AUDIT & ADVISORY SERVICES

UCLA AUDIT & ADVISORY SERVICES UCLA AUDIT & ADVISORY SERVICES Edwin D. Pierce, CPA, CFE Director September 4, 2015 10920 Wilshire Boulevard, Suite 700 Los Angeles, California 90024-1366 310 794-6110 Fax: 310 794-8536 SENIOR VICE PRESIDENT/CHIEF

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Emergency Management & Disaster Planning

Emergency Management & Disaster Planning Emergency Management & Disaster Planning What we re going to talk about What is Emergency Management and Disaster Planning? What are the key elements of an EM Plan? Where does the University Architect

More information

Local Government Disaster Planning and what can be learned from it.

Local Government Disaster Planning and what can be learned from it. Local Government Disaster Planning and what can be learned from it. Emergency Operations Plans Emergency Support Functi0ns: ESF-1 ESF-2 ESF-3 ESF-4 ESF-5 ESF-6 ESF-7 Transportation Communications Public

More information

Lifeguard Station. Emergency Management

Lifeguard Station. Emergency Management Lifeguard Station Emergency Management Developing Campus Emergency Response Plans and Business Continuity Plans Lennette Dease and Barbara Andersen James Lee Witt Associates Part of Global Options Group,

More information

BME CLEARING s Business Continuity Policy

BME CLEARING s Business Continuity Policy BME CLEARING s Business Continuity Policy Contents 1. Introduction 1 2. General goals of the Continuity Policy 1 3. Scope of BME CLEARING s Business Continuity Policy 1 4. Recovery strategies 2 5. Distribution

More information

Seven Requirements for Successfully Implementing Information Security Policies and Standards

Seven Requirements for Successfully Implementing Information Security Policies and Standards Seven Requirements for Successfully Implementing and Standards A guide for executives Stan Stahl, Ph.D., President, Citadel Information Group Kimberly A. Pease, CISSP, Vice President, Citadel Information

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved. FlyntGroup.

Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved. FlyntGroup. Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved FlyntGroup.com Flynt Group White Paper Bundling Arrows: Making a Business

More information

Our key considerations include:

Our key considerations include: October 2017 We recognize that our ability to continue to function as an organization is critical to our clients, who rely heavily on our firm and our people to keep their own real estate functioning properly.

More information

securivy INFORMATION SYSTEMS MANAGEMENT ILLINOIS INSTITUTE OF TECHNOLOGY A New Model for Business Contingency Operations Ray Trygstad

securivy INFORMATION SYSTEMS MANAGEMENT ILLINOIS INSTITUTE OF TECHNOLOGY A New Model for Business Contingency Operations Ray Trygstad information technology & management INFORMATION SYSTEMS securivy t MANAGEMENT ILLINOIS INSTITUTE OF TECHNOLOGY A New Model for Business Contingency Operations Ray Trygstad 2008 Ray Trygstad Director of

More information

DISASTER RESPONSE & RECOVERY PLANNING. Information Technology Services

DISASTER RESPONSE & RECOVERY PLANNING. Information Technology Services DISASTER RESPONSE & RECOVERY PLANNING Information Technology Services Table of Contents Introduction... 1 Primary Focus... 1 Objectives... 1 Scope... 2 Assumptions... 2 Prevention... 3 Employee Contact

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

BCP At Bangkok Bank, Thailand

BCP At Bangkok Bank, Thailand BCP At Bangkok Bank, Thailand Bhakorn Vanuptikul, BCCE Executive Vice President Bangkok Bank Public Company Limited 10 May 2012 1 Agenda Business Continuity Management at Bangkok Bank Success Factors in

More information

Continuity of Operations During Disasters: Electronic Systems and Medical Records

Continuity of Operations During Disasters: Electronic Systems and Medical Records Idaho Health Care Association Continuity of Operations During Disasters: Electronic Systems and Medical Records Philip Niemer, MBA, MS, HEM Director Operational Continuity & Emergency Management Children

More information

Piton Investment Management. Business Continuity Plan

Piton Investment Management. Business Continuity Plan Date: May 2018 Table of Contents 1. Introduction... 3 2. Firm Policy... 3 2.1 Plan Location & Access... 3 3. Office Locations... 3 4. Evacuation Plan... 4 5. Alternate Physical Location of Employees...

More information

Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery

Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery Dave Komendat Chief Security Officer The Boeing Company What We Do Today Design, assemble and support

More information

Emergence of Business Continuity to Ensure Business and IT Operations. Solutions to successfully meet the requirements of business continuity.

Emergence of Business Continuity to Ensure Business and IT Operations. Solutions to successfully meet the requirements of business continuity. Emergence of Business Continuity to Ensure Business and IT Operations Solutions to successfully meet the requirements of business continuity. 2 3 4 5 Introduction Use of Virtualization Technology as a

More information

Build a viable plan for disaster recovery and crisis management.

Build a viable plan for disaster recovery and crisis management. Disaster recovery and crisis management solutions To support your IT objectives Build a viable plan for disaster recovery and crisis management. Highlights Build a plan to help respond to and recover from

More information

STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season

STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season IBERIA PARISH STATE OF LOUISIANA STANDARD OPERATING PROCEDURE Critical Infrastructure Owners/Operators

More information

Standard for Security of Information Technology Resources

Standard for Security of Information Technology Resources MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information

More information

Frontiers of Risk. Don t Be Afraid: Business Continuity Plan Development Only Hurts A Little!

Frontiers of Risk. Don t Be Afraid: Business Continuity Plan Development Only Hurts A Little! Don t Be Afraid: Business Only Hurts A Little! Frontiers of Risk Community College Risk Management Consortium July 20-21, 2017 JILL MCEWEN - FOX VALLEY TECHNICAL COLLEGE JOE DESPLAINES DISTRICTS MUTUAL

More information

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification University of California UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification UCOP Implementation Plan for Compliance with Business and Finance Bulletin

More information

WHITE PAPER OCTOBER 2017 VMWARE ENTERPRISE RESILIENCY. Integrating Resiliency into Our Culture and DNA

WHITE PAPER OCTOBER 2017 VMWARE ENTERPRISE RESILIENCY. Integrating Resiliency into Our Culture and DNA WHITE PAPER OCTOBER 2017 VMWARE ENTERPRISE RESILIENCY Integrating Resiliency into Our Culture and DNA Table of Contents Executive Summary.... 3 Background.... 4 Charter.................................................................4

More information

CLOUD COMPUTING READINESS CHECKLIST

CLOUD COMPUTING READINESS CHECKLIST CLOUD COMPUTING READINESS DAVE WILLIS STEPHEN GOLDSMITH SUBJECT MATTER EXPERTS, CLOUD COMPUTING DENOVO DAVE WILLIS STEPHEN GOLDSMITH SUBJECT MATTER EXPERTS, CLOUD COMPUTING DENOVO 1 CONTENTS INTRODUCTION

More information

Technical Vulnerability and Patch Management Policy Document Number: OIL-IS-POL-TVPM

Technical Vulnerability and Patch Management Policy Document Number: OIL-IS-POL-TVPM Technical Vulnerability and Patch Management Policy Document Number: OIL-IS-POL-TVPM Document Details Title Description Version 1.1 Author Classification Technical Vulnerability and Patch Management Policy

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information