B13: The Case for Integration Converting the BCM Silo into an Enterprise Risk Foundation

Size: px
Start display at page:

Download "B13: The Case for Integration Converting the BCM Silo into an Enterprise Risk Foundation"

Transcription

1 B13: The Case for Integration Converting the BCM Silo into an Enterprise Risk Foundation Doug Weldon, FBCI, CBRP, CBRA, CISM (Pending) Director, Business Continuity & Operational Risk Management - Ipreo

2 Agenda Evolution of the BCM Profession The Advantages and Challenges of BCM as a Risk Discipline and Profession The Choices Ahead of Us How do we Enhance our Influence For Our Companies/Customers For Ourselves Discuss our Challenges

3 Quick History of BCM Leading to a Uniform Business Continuity Management Process Evolved from a focus on mainframe disaster recovery in the late 1970 s Further expanded in the 1980 s to include mid-range/minicomputing environments 1990 s saw the inclusion of business operations continuity and related support technology Maturing life-cycle processes ranging from the BIA and risk assessment to regular maintenance marked the 2000 s And reaching a climax in 2012 with the publishing of the ISO 22301/22313 Standards.

4 Results of which We Can be Proud as BCM Professionals A mature profession and standardized process definition of the work we do and value we provide A global understanding of the problems we help to solve and the value we provide to prepare for and manage crises Overall, a well established and respected profession at a high level on the maturity curve. X 1970s 1980s 1990s 2000s 2010s

5 Potential Challenges on the Horizon for BCM Within your enterprise: Are we effectively and efficiently addressing the multiplying threat scenarios? Are the BCM Standard and process steps we are following to perform our work adapting to this wider range of threats? Is BCM properly represented among the other Operational Risk disciplines? Is BCM maturing to its full potential?

6 What are companies worried about? (BCI Horizon Scan 2017)

7 What is the global risk landscape? (WEF 2016)

8 BCM Needs to Do What it Does Best Across the Full Range of Operational Risks Example: Some of the Silos/Domains of Operational Risk Spanning the Silos with one BIA: BIA IT Disaster Recovery Business Operations Continuity Performance/ Capacity Management Information Security Physical Security Health & Safety Process Quality Management Incident Management Availability & Reliability Management

9 Business Value Chain Stakeholders, Dependencies & Supporting Assets

10 Risk & Control Self Assessment (RCSA) Lifecycle Driven by the BIA!

11 Examples of BCM Competencies Applicable Across all Operational Risk Domains (Reference ISO 22310) BIA All of the Operational Risk Silos/Domains require this type of analysis to assess stakeholder requirements and analyze operational dependencies to fulfill requirements Risk Assessment likewise, all Domains require a risk assessment as a precursor to business decisions on risk mitigations Strategy and Design similarly, each Domain requires a strategy design phase to embody requirements into solutions, cascaded through the BIAdefined dependencies Exercise each Domain requires a regular solution testing discipline to validate on-going compliance with requirements Maintenance each Domain requires a regular maintenance discipline to insure that solutions can satisfy requirements Incident Management and of course each Domain requires a scripted plan to manage through crisis scenarios unique to each Domain.

12 As BCM Expands its Role, the list of Potential Crises Expands a Short List:

13 BCM Needs to Do What it Does Best Across the Full Range of Operational Risks Foundational Example: Some of the Silos/Domains of Operational Risk Spanning the Silos with one Incident Management Structure and Plan: IT Disaster Recovery Business Operations Continuity Performance/ Capacity Management Information Security Physical Security Health & Safety Process Quality Management Incident Management Availability & Reliability Management Incident Management

14 The Challenges of Expanding the Role of BCM Must start thinking as a horizontal and foundational support function across all Operational Risk Domains Find ways of closing gaps between the Domain silos Also find ways to improve effectiveness and efficiencies across the Domains Develop improved BCM staff competencies within all of the risk Domains Overall, expand the role and relevance of your BCM Program.

15 Conclusion and Discussion Items Where is your BCM Program on the maturity curve? What is the scope of your Program? Is your Program prepared to integrate into other risk Domains in a more profound way? Culturally, how resistant to change are the various risk Domain silos? Is the current Organizational Structure a potential impediment?

16 About Ipreo Ipreo is a global leader in providing market intelligence, data, and technology solutions to all participants in the global capital markets, including sell-side banks, publicly traded companies, and buy-side institutions - we power the networks that connect capital to ideas! Please Note: The positions and opinions expressed in this presentation do not necessarily represent the opinions or policies of Ipreo, its owners, customers, or suppliers.

Driving Global Resilience

Driving Global Resilience Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute

More information

What Does the Future Look Like for Business Continuity Professionals?

What Does the Future Look Like for Business Continuity Professionals? What Does the Future Look Like for Business Continuity Professionals? October 26, 2016 Brian Zawada, FBCI President, US Chapter of the Business Continuity Institute Agenda and Objectives Change Standards

More information

ISO 22301: An Overview of BCM Implementation Process. Presenter: Dejan Kosutic

ISO 22301: An Overview of BCM Implementation Process. Presenter: Dejan Kosutic ISO 22301: An Overview of BCM Implementation Process Presenter: Dejan Kosutic GoToWebinar Control Panel Open and close your Panel View, Select, and Test your audio Submit text questions they will be addressed

More information

Promoting the Art and Science of Business Continuity Management Worldwide. Partner of the DRJ

Promoting the Art and Science of Business Continuity Management Worldwide. Partner of the DRJ Promoting the Art and Science of Business Continuity Management Worldwide Official Certification and Education Partner of the DRJ Doug Weldon President, BCI-USA Chapter douglas.weldon@thomsonreuters.com

More information

Building a BC/DR Control Library and Regulatory Response Program

Building a BC/DR Control Library and Regulatory Response Program Building a BC/DR Control Library and Regulatory Response Program David Garland, Senior Director, Disaster Recovery & Regulatory Compliance, Business Continuity Management CME Group Regulatory Compliance

More information

BCM s Role in Effective Risk Management: A Risk Manager s Point of View

BCM s Role in Effective Risk Management: A Risk Manager s Point of View BCM s Role in Effective Risk Management: A Risk Manager s Point of View Date: March 24, 2015 Presenter: Randall Davis, MBA, IBD, CPCU, ERM, ARM, ARM E, ABCP Agenda for this session Explore the case for

More information

Using International Standards to Implement a Business Continuity Management System (BCMS)

Using International Standards to Implement a Business Continuity Management System (BCMS) Using International Standards to Implement a Business Continuity Management System (BCMS) Dr. Abdulrahman AlEnezi Dr. Fawaz AlEnezi Eng. Maryam AlRadhwan Dr. Sultan AlEnezi Agenda Introduction Business

More information

Business continuity management and cyber resiliency

Business continuity management and cyber resiliency Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,

More information

HENRY EE, FBCI, CBCP

HENRY EE, FBCI, CBCP 10 Things You Should Know When Reimagine Your ERM With BCM Program 27 July 2016 Presented by : Henry Ee, FBCI, CBCP, ISO22301 LA, Fellow of Business Continuity Institute (FBCI) Certified Business Continuity

More information

Explore Resilience and Risk Management Around the World

Explore Resilience and Risk Management Around the World Organizational Resilience: Security, Preparedness and Continuity Management Systems - Requirements with Guidance for Use Explore Resilience and Risk Management Around the World ANSI/ASIS SPC.1-2009 Dr.

More information

TDWI Data Governance Fundamentals: Managing Data as an Asset

TDWI Data Governance Fundamentals: Managing Data as an Asset TDWI Data Governance Fundamentals: Managing Data as an Asset Training Details Training Time : 1 Day Capacity : 10 Prerequisites : There are no prerequisites for this course. About Training About Training

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

SAMPLE REPORT. Business Continuity Gap Analysis Report. Prepared for XYZ Business by CSC Business Continuity Services Date: xx/xx/xxxx

SAMPLE REPORT. Business Continuity Gap Analysis Report. Prepared for XYZ Business by CSC Business Continuity Services Date: xx/xx/xxxx SAMPLE REPORT Business Continuity Gap Analysis Report Prepared for XYZ Business by CSC Business Continuity Services Date: xx/xx/xxxx COMMERCIAL-IN-CONFIDENCE PAGE 1 OF 11 Contact Details CSC Contacts CSC

More information

ISO 22301: An Overview of BCM Implementation Process. Presenter: Dejan Kosutic

ISO 22301: An Overview of BCM Implementation Process. Presenter: Dejan Kosutic ISO 22301: An Overview of BCM Implementation Process Presenter: Dejan Kosutic GoToWebinar Control Panel Open and close your Panel View, Select, and Test your audio Submit text questions they will be addressed

More information

Session 5: Business Continuity, with Business Impact Analysis

Session 5: Business Continuity, with Business Impact Analysis Session 5: Business Continuity, with Business Impact Analysis By: Tuncay Efendioglu, Acting Director Internal Oversight Division, WIPO Pierre-François Gadpaille, Audit Specialist (Information Systems),

More information

Business Continuity Management: How to get started. Presented by: Tony Drewitt, Managing Director IT Governance Ltd 19 April 2018

Business Continuity Management: How to get started. Presented by: Tony Drewitt, Managing Director IT Governance Ltd 19 April 2018 Business Continuity Management: How to get started Presented by: Tony Drewitt, Managing Director IT Governance Ltd 19 April 2018 Introduction Tony Drewitt - Managing Director: IT Governance UK and EU One

More information

BCM Program Development

BCM Program Development BCM Program Development Course Description: The BCM Program Development course provides you with knowledge to develop an auditable and actionable business continuity program for your organization. This

More information

Enterprise resilience and the role of Standards

Enterprise resilience and the role of Standards www.pwc.co.uk Enterprise resilience and the role of Standards Why do we have Standards? Globalisation Consistency Quality Supply chain and outsourcing Marketing value Slide 2 Stakeholder value Ultimately,

More information

PECB Change Log Form

PECB Change Log Form GENERAL INFORMATION Owner / Department* Approver / Department * Training Development Department Quality Assurance Department Date of Approval* 2019-01-09 Course name: Language: New Version: Previous Version:

More information

Parkroyalon Kitchener Road 5th December 2007

Parkroyalon Kitchener Road 5th December 2007 Parkroyalon Kitchener Road 5th December 2007 Appointments President Business Continuity Management Institute moh_heng@bcm-institute.org Managing Director GMH Continuity Architects moh_heng@gmhasia.com

More information

Best-in-Class Crisis Preparation: Maximize Readiness with the Four T s. Business Continuity Readiness Overview

Best-in-Class Crisis Preparation: Maximize Readiness with the Four T s. Business Continuity Readiness Overview Best-in-Class Crisis Preparation: Maximize Readiness with the Four T s Robert Edson Vice President, Global Sales and Marketing Business Continuity Readiness Overview Business Continuity Management (BCM)

More information

Risk Management. Continuity Management

Risk Management. Continuity Management Risk Management vs Continuity Management Marie Hélène Primeau, CA, MBCI President Premier Continuum DRJ Fall World September 12, 2011 Marie-Hélène Primeau, CA, MBCI Chartered Accountant and Member of the

More information

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com Better together KPMG LLP s GRC Advisory Services for IBM OpenPages implementations kpmg.com KPMG A leader in GRC services KPMG LLP (KPMG) is the U.S. member firm of the KPMG global network of professional

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

SOLUTION BRIEF RSA ARCHER BUSINESS RESILIENCY

SOLUTION BRIEF RSA ARCHER BUSINESS RESILIENCY RSA ARCHER BUSINESS RESILIENCY INTRODUCTION Organizations are becoming a complex tapestry of products and services, processes, technologies, third parties, employees and more. Each element adds another

More information

Disaster recovery strategic planning: How achievable will it be?

Disaster recovery strategic planning: How achievable will it be? April 16 18, 2012 Talking Stick Resort Scottsdale, Arizona Disaster recovery strategic planning: How achievable will it be? Prudence Marasigan Ernst & Young Advisory Services, Senior Manager prudence.marasigan@ey.com

More information

Facilities Management and Business Continuity. 10 May 2017

Facilities Management and Business Continuity. 10 May 2017 Facilities Management and Business Continuity 10 May 2017 1 Introductions Business Continuity Institute BCI SADC Chapter The Caridon Group 2 The BCI 3 The Caridon Group Consulting Group of select experienced

More information

How to get the Enterprise to Understand the Value of Security

How to get the Enterprise to Understand the Value of Security PART 1 of 2 Insight into Security Leader Success How to get the Enterprise to Understand the Value of Security A SEC Research Finding Intended Audience This presentation is intended for security leaders

More information

Global Statement of Business Continuity

Global Statement of Business Continuity Business Continuity Management Version 1.0-2017 Date January 25, 2017 Status Author Business Continuity Management (BCM) Table of Contents 1. Credit Suisse Business Continuity Statement 3 2. BCM Program

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

Conference Overview. w w w. s p a t i a l c o. e v e n t s / b c m. Who should attend? Conference Topics. Officially Sponsored by.

Conference Overview. w w w. s p a t i a l c o. e v e n t s / b c m. Who should attend? Conference Topics. Officially Sponsored by. Officially Sponsored by Supported by Sponsored by Knowledge Partner Conference Overview Business Continuity Management and Disaster Recovery BCM & DR are fundamental to the wellbeing of an organization.

More information

How Organizations Are Effectively Leveraging BCM Benchmarking Data. October 7, 2014

How Organizations Are Effectively Leveraging BCM Benchmarking Data. October 7, 2014 How Organizations Are Effectively Leveraging BCM Benchmarking Data October 7, 2014 Study Methodology Respondents for the study were obtained from the Continuity Insights subscriber base by way of its publications,

More information

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe Think Oslo 2018 Where Technology Meets Humanity Oslo Felicity March Cyber Resilience - Europe Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity

More information

Certified Information Security Manager (CISM) Course Overview

Certified Information Security Manager (CISM) Course Overview Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,

More information

Whitepaper. Contents. Foreword. Introduction. Business ContinuITy

Whitepaper. Contents. Foreword. Introduction. Business ContinuITy Whitepaper Contents Business ContinuITy 1 Foreword 1 Introduction 1 What is Business Continuity Management? 2 Components of IT Business Continuity Management 2 Role of Vendors in BCM 5 Bringing BCM to

More information

Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise

Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise February 11 14, 2018 Gaylord Opryland Resort and Convention Center, Nashville #DRI2018 Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise Tejas Katwala CEO

More information

Business Continuity Management

Business Continuity Management Business Continuity Management Cyber Security importance by Ashraf Hasanov Business Continuity Expert BCMS BS25999 Lead Auditor Regional Disaster Response Team Member of IFRC What could stop your business?

More information

Moving Beyond the Heat Map: Making Better Decisions with Cyber Risk Quantification

Moving Beyond the Heat Map: Making Better Decisions with Cyber Risk Quantification A CLOSER LOOK Moving Beyond the Heat Map: Making Better Decisions with Cyber Risk Quantification A major cybersecurity event can dissolve millions of dollars in assets and tarnish even the strongest company

More information

Table of Contents. Sample

Table of Contents. Sample TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...

More information

CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS

CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS WILLIAM (THE GONZ) FLINN M.S. INFORMATION SYSTEMS SECURITY MANAGEMENT; COMPTIA SECURITY+, I-NET+, NETWORK+; CERTIFIED

More information

Cyber Resilience. Think18. Felicity March IBM Corporation

Cyber Resilience. Think18. Felicity March IBM Corporation Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack

More information

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS Can You Answer These Questions? 1 What s my company s exposure to the latest industrial cyber threat? Are my plants

More information

Developing a Holistic Strategy To Achieve Community Health Resilience

Developing a Holistic Strategy To Achieve Community Health Resilience Developing a Holistic Strategy To Achieve Community Health Resilience Paula Scalingi, Director Pacific Northwest Center for Regional Disaster Resilience Pacific Northwest Border Health Alliance Seventh

More information

Business Continuity Risk Management IT Service Continuity

Business Continuity Risk Management IT Service Continuity Business Continuity Risk Management IT Service Continuity The Three Musketeers All for one, one for all Author: Athol Culpan, Isaacs George and Ray Botardo Agenda Introductions Athol Culpan Case Study

More information

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity Understanding Cyber Insurance & Regulatory Drivers for Business Continuity Lily Yeoh, CISSP, CBCP lily@cb1security.com https://www.cb1security.com Agenda BC/DR Business Drivers Recent Regulatory & Cyber

More information

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard Certification Exam Outline Effective Date: April 2013 About CISSP-ISSMP The Information Systems Security Management Professional (ISSMP) is a CISSP who specializes in establishing, presenting, and governing

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

EQUINIX BUSINESS CONTINUITY ADVANCED SERVICES KEEP YOUR BUSINESS UP AND RUNNING

EQUINIX BUSINESS CONTINUITY ADVANCED SERVICES KEEP YOUR BUSINESS UP AND RUNNING EQUINIX BUSINESS CONTINUITY ADVANCED SERVICES KEEP YOUR BUSINESS UP AND RUNNING BUSINESS CONTINUITY EQUINIX BUSINESS CONTINUITY ADVANCED SERVICES The key to every successful Business Continuity Solution

More information

Preparing your C-Suite for a Cyber Crisis

Preparing your C-Suite for a Cyber Crisis Preparing your C-Suite for a Cyber Crisis Andrew Sheves Regester Larkin Orlando, September 12, 2016 3 Introduction Aim and objectives 4 Aim:» To help your business reduce its exposure to strategic cyber

More information

Digital Service Management (DSM)

Digital Service Management (DSM) Digital Service Management (DSM) A Proactive, Collaborative and Balanced Approach for Managing, Improving and Securing an Enterprise Digital Service Portfolio itsm003 v.3.0 Agenda and Objectives What is

More information

ITIL 2011 Foundation Course

ITIL 2011 Foundation Course IT SERVICE MANAGEMENT ITIL 2011 Foundation Course CERTIFICATE: DURATION: COURSE DELIVERY: LANGUAGE: ITIL 2011 Foundation 2 or 3 Days Classroom, Live Virtual Classroom English Course Description: This course

More information

Digital Service Management (DSM)

Digital Service Management (DSM) Digital Service Management (DSM) A Proactive, Collaborative and Balanced Approach for Securing, Managing and Improving the Online Services that Drive the Digital Enterprise itsm003 v.3.0 Agenda and Objectives

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

Business Continuity and Disaster Recovery

Business Continuity and Disaster Recovery Business Continuity and Disaster Recovery Index Section Title 1. Executive Summary 2. Policy Statement 3. Strategy 4. Governance 5. Key Documentation 6. Testing 1 Executive Summary Business Continuity

More information

Convergence of BCM and Information Security at Direct Energy

Convergence of BCM and Information Security at Direct Energy Convergence of BCM and Information Security at Direct Energy Karen Kemp Direct Energy Session ID: GRC-403 Session Classification: Advanced About Direct Energy Direct Energy was acquired by Centrica Plc

More information

San Francisco Chapter. Cassius Downs Network Edge LLC

San Francisco Chapter. Cassius Downs Network Edge LLC Cassius Downs Network Edge LLC ITIL History ITIL Books V3 Objectives Business Benefits of V3 V3 Changes Training & Certification V2 or V3? Summary 2 Version 1 31 books developed in the 1980 s Focus: Technology

More information

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience

More information

TSC Business Continuity & Disaster Recovery Session

TSC Business Continuity & Disaster Recovery Session TSC Business Continuity & Disaster Recovery Session Mohamed Ashmawy Infrastructure Consulting Pursuit Hewlett-Packard Enterprise Saudi Arabia Mohamed.ashmawy@hpe.com Session Objectives and Outcomes Objectives

More information

CISM Certified Information Security Manager

CISM Certified Information Security Manager CISM Certified Information Security Manager Firebrand Custom Designed Courseware Logistics Start Time Breaks End Time Fire escapes Instructor Introductions Introduction to Information Security Management

More information

Implementing a Global Business

Implementing a Global Business GLOBAL OPERATIONS Implementing a Global Business Continuity Management Program Disaster Recovery Journal Spring World 2010 Conference Pfizer Inc. Managing Business Continuity on a Global Scale This presentation

More information

ServiceNow knowledge 2016

ServiceNow knowledge 2016 ServiceNow knowledge 2016 Resiliency Navigator: an integrated approach to resiliency point of view May 2016 Agenda Introduction to resiliency Integrated solution to resiliency Aligning the business from

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

Operational Risk Management: Major Processes and Assignments

Operational Risk Management: Major Processes and Assignments Operational Risk Management: Major Processes and Assignments Gabriel Andrade Deputy-Head of the Risk Management Department 19 September 2017 Cambridge Agenda 1. ORM Framework Operational Risk Operational

More information

COBIT 5 Assessor Certification Course

COBIT 5 Assessor Certification Course COBIT 5 Assessor Certification Course About COBIT 5.0 Information is created, used, retained, disclosed and destroyed. Technology plays a key role in these actions and technology is becoming pervasive

More information

Security Director - VisionFund International

Security Director - VisionFund International Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone

More information

BUSINESS CONTINUITY MANAGEMENT. A short guide 2017

BUSINESS CONTINUITY MANAGEMENT. A short guide 2017 BUSINESS CONTINUITY MANAGEMENT A short guide 2017 Acknowledgements Business Continuity Institute Founded in 1994, the BCI defined a set of practices for individuals to be able to demonstrate their individual

More information

Position Description IT Auditor

Position Description IT Auditor Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership

More information

ITIL 2011 Intermediate Capability Operational Support and Analysis (OSA) Course Outline

ITIL 2011 Intermediate Capability Operational Support and Analysis (OSA) Course Outline ITIL 2011 Intermediate Capability Operational Support and Analysis (OSA) Course Outline 1 Operational Support and Analysis (OSA) Program Overview The ITIL Intermediate Qualification: Operational Support

More information

Business Continuity Planning

Business Continuity Planning Business Continuity Planning The Unexpected Happens Be Ready Copyright -Business Survival Partners, llc. 2011 - All Rights Reserved www.survivalpartners.biz RISK 2 Risks to National Security A secure and

More information

Sample Exam Privacy & Data Protection Foundation

Sample Exam Privacy & Data Protection Foundation Sample Exam Sample Exam Privacy & Data Protection Foundation SECO-Institute issues the official Business Continuity courseware to accredited training centres where students are trained by accredited instructors.

More information

ITIL Service Operation Lifecycle Classroom

ITIL Service Operation Lifecycle Classroom ITIL Service Lifecycle Classroom Certificate: ITIL Service Lifecycle Duration: 3 days Course Delivery: (Virtual) Classroom, Exam, ebook Course ID: ITL9338 Language: English Credits: 3 Credits to ITIL Expert

More information

Practitioner Certificate in Business Continuity Management (PCBCM) Course Description. 10 th December, 2015 Version 2.0

Practitioner Certificate in Business Continuity Management (PCBCM) Course Description. 10 th December, 2015 Version 2.0 Practitioner Certificate in Business Continuity Management (PCBCM) Course Description 10 th December, 2015 Version 2.0 Course The Practitioner Certificate in Business Continuity Management (PCBCM) course

More information

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide

More information

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY : THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY 18 2017: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) MAY 15 AND 16 o INFORMATION

More information

The BCI Certification and Solutions

The BCI Certification and Solutions The BCI Certification and Solutions Presented by: Brian Zawada (FBCI) US Chapter Board President 1 What is the BCI? Founded in 1994, a Member Owned, Not for Profit Professional Association of Business

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. Course Outline CISM - Certified Information Security Manager 20 Nov 2017 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Implementation of Business Continuity Management System (BCMS) based on ISO 22301:2012 requirements

Implementation of Business Continuity Management System (BCMS) based on ISO 22301:2012 requirements Implementation of Business Continuity Management System (BCMS) based on ISO 22301:2012 requirements Summary This five-day intensive training course enables participants to develop the necessary expertise

More information

Global Security Advisor

Global Security Advisor Global Security Advisor Location: [North America] [United States] Category: Security *Preferred location: USA. Other locations will be considered globally where WVI is registered to operate. PURPOSE OF

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations May 14, 2018 1:30PM to 2:30PM CST In Plain English: Cybersecurity and IT Exam Expectations Options to Join Webinar and audio Click on the link: https://www.webcaster4.com/webcast/page/584/24606 Choose

More information

Determining Best Fit for ITIL Implementation

Determining Best Fit for ITIL Implementation Determining Best Fit for ITIL Implementation Presentation to the DC SPIN October 4, 2006 www.davidconsultinggroup.com Agenda Introduction to ITIL Preparing for ITIL Best Fit Analysis Relationship of ITIL

More information

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework.

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework. Learning Objectives and Course Descriptions: FOUNDATION IN IT SERVICE MANAGEMENT This official ITIL Foundation certification course provides you with a general overview of the IT Service Management Lifecycle

More information

Disaster Recovery and Business Continuity Planning (Mile2)

Disaster Recovery and Business Continuity Planning (Mile2) Disaster Recovery and Business Continuity Planning (Mile2) Course Number: DRBCP Length: 4 Day(s) Certification Exam This course will help you prepare for the following exams: ABCP: Associate Business Continuity

More information

Predstavenie štandardu ISO/IEC 27005

Predstavenie štandardu ISO/IEC 27005 PERFORMANCE & TECHNOLOGY - IT ADVISORY Predstavenie štandardu ISO/IEC 27005 ISMS Risk Management 16.02.2011 ADVISORY KPMG details KPMG is a global network of professional services firms providing audit,

More information

Verso ilnuovostandard ISO (BS25999) sullabusiness Continuity Scenari e opportunità

Verso ilnuovostandard ISO (BS25999) sullabusiness Continuity Scenari e opportunità Verso ilnuovostandard ISO 22301 (BS25999) sullabusiness Continuity Scenari e opportunità Massimo Cacciotti Business Services Manager BSI Group Italia Agenda BSI: Introduction 1. Why we need BCM? 2. Benefits

More information

Appendix 3 Disaster Recovery Plan

Appendix 3 Disaster Recovery Plan Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision

More information

ISA99 - Industrial Automation and Controls Systems Security

ISA99 - Industrial Automation and Controls Systems Security ISA99 - Industrial Automation and Controls Systems Security Committee Summary and Activity Update Standards Certification Education & Training Publishing Conferences & Exhibits September 2016 Copyright

More information

,000+ What is the BCI Corporate Partnership? What are the benefits of becoming a Corporate Partner? Levels of Partnership

,000+ What is the BCI Corporate Partnership? What are the benefits of becoming a Corporate Partner? Levels of Partnership www.thebci.org 1 What is the? The enables organizations to work more closely with the BCI to help raise the profile of the discipline, and to promote the highest standards of professional competence in

More information

Bradford J. Willke. 19 September 2007

Bradford J. Willke. 19 September 2007 A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure

More information

ITIL Service Transition Lifecycle

ITIL Service Transition Lifecycle ITIL Service Transition Lifecycle Certificate: ITIL Service Transition Lifecycle Duration: 3 days Course Delivery: Classroom, Virtual Classroom, Exam, ebook Course ID: ITL9337 Language: English Credits:

More information

ITIL - Lifecycle Service Transition Course

ITIL - Lifecycle Service Transition Course ITIL - Lifecycle Service Transition Course Code: ITSM005CL Certification Exam: ITIL Service Transition Lifecycle Duration: 3 Days Certification Track: N/A Format: Classroom Course Credits: 3 Credits to

More information

L18: Integrate Control Disciplines to Increase Control and Save Money

L18: Integrate Control Disciplines to Increase Control and Save Money L18: Integrate Control Disciplines to Increase Control and Save Money Kathleen Lucey, FBCI Montague Risk kalucey@montaguetm.com tel: 1.516.676.9234 Connections Information Security (computer security,

More information

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Technology Risk Management in Banking Industry Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Change in Threat Landscape 2 Problem & Threats faced by Banking Industry

More information

Business Continuity Management Program Overview

Business Continuity Management Program Overview Business Continuity Management Program Overview Improving the lives of our customers by connecting them to the power of the digital world CenturyLink Key Objective CenturyLink may modify or terminate this

More information

ITIL Service Operation Lifecycle Classroom

ITIL Service Operation Lifecycle Classroom ITIL Service Operation Lifecycle Classroom Certificate: ITIL Service Operation Lifecycle Duration: 3 days Course Delivery: (Virtual) Classroom, Exam, ebook Course ID: ITL9338 Language: English Credits:

More information

Importance of the Data Management process in setting up the GDPR within a company CREOBIS

Importance of the Data Management process in setting up the GDPR within a company CREOBIS Importance of the Data Management process in setting up the GDPR within a company CREOBIS 1 Alain Cieslik Personal Data is the oil of the digital world 2 Alain Cieslik Personal information comes in different

More information

BCI Global Research Summary Key Trends, Influences and Conclusions Affecting the Profession

BCI Global Research Summary Key Trends, Influences and Conclusions Affecting the Profession BCI Global Research Summary Key Trends, Influences and Conclusions Affecting the Profession Prepared for: John Jackson BCI US Chapter Vice President Presented by: Sandra Rennard, MBCI, MBCP Consultant,

More information

Business Continuity Planning. PDI January 14 th, 2018

Business Continuity Planning. PDI January 14 th, 2018 Business Continuity Planning PDI January 14 th, 2018 Presenters Sally Alexander, Director & CRO Office of Risk Management & Insurance Tel: 970 491 7726 Email sally.alexander@colostate.edu Angela Gray,

More information