Business Continuity An Integral Part of Risk Management At Constellation Energy
|
|
- Rhoda Owens
- 5 years ago
- Views:
Transcription
1 Business Continuity An Integral Part of Risk Management At Constellation Energy World Disaster Management Conference Toronto, Canada June 19, 2006 Robert W. Cornelius Director Business Continuity
2 Operating in all areas of the Energy Value Chain Baltimore Gas and Electric Transportation and distribution utility for 1.2 million electricity customers and 620,000 gas customers in Central Maryland Constellation Generation Owns 11,856 Megawatts of primarily base load coal and nuclear generation capacity Constellation Commodities Group Wholesale competitive supply business acting as an intermediary between producers and consumers of electricity, coal and natural gas Manages the sale of our fleet s output and the fleet s fuel inputs Constellation NewEnergy Nation s largest supplier of electricity to commercial and industrial customers Constellation Energy I The way energy works.tm 2
3 Industry Recognition Constellation Energy named 2004 Energy Company of the Year EEI Emergency Response Award Hurricane Isabel EEI Emergency Assistance Award Response to Florida 3
4 Industry Recognition Continued Named to the Dow Jones Sustainability North America Index - tracks the financial performance of companies that demonstrate excellence in economic, environmental and social leadership Named to FORTUNE magazine's list of the 100 fastest-growing companies in America. Named the most admired energy company for its prestigious 2005 list of "America's Most Admired Companies." Advances to No. 167 on Fortune 500 list Received the electric power industry's highest honor, the prestigious 2005 Edison Award in recognition of its leadership in the competitive energy marketplace 4
5 CE s Business Continuity Program Enterprise program across all lines of business Business Continuity Program (BCP) Office comprised of: 7 full-time employees 225 part-time Business Continuity coordinators in the business areas 450 Building Wardens 30 Enterprise Risk Management System (ERMS) Coordinators Strong Program Support from all management levels Corporate policy and standard methodology all business units will have recovery plans that will be drilled and maintained Emergency events (response & recovery) are coordinated from a central organization Management of risk under the guidance of the Chief Risk Officer Business Continuity Tools Strohl Systems Products 5
6 What are the Industry Trends for Risk? Move toward an Integrated Risk Management Process coordinate at all operating levels with executive-level oversight Continuous Process become a culture, constantly looking at processes with risk identification in mind Broader Focus encompasses all aspects of business, operations and finance Embedding Risk Discipline into Existing Processes risk identification and assessment into forecasting, planning and capital budgeting Prioritization of Risks focus on most important and greatest impact exposures first Improving Risk Communications both internally and externally More Focus on Internal Controls and Identifying Potential Vulnerabilities Sarbanes-Oxley compliance 6
7 CE s Risk Division Structure Pre-2003, the Risk Division focused: Credit Risk Market Risk Financial Risk Post 2003, the division grew to include: Operational Risk Security Business Continuity Credit Risk Market Risk Financial Risk Management Operational Risk Security Business Continuity I/T Disaster Recovery 7
8 CE s Approach to Risk Management Inventory the major risks that could impact the company s financial and operational performance Establish the risk tolerance in coordination with business plan objectives Develop plans to manage and mitigate material risks Chief Risk Officer oversees all corporate risks. Throughout the company risk is taken seriously. Weekly Risk Management Committee Meetings Board of Directors - Audit Committee Internal/ External Auditors Monthly Operating Risk Committees 8
9 Risk Management Committees Oversight and Controls Audit Committee of the Board of Directors CE Chief Risk Officer LOB President and Executive Leadership Team LOB Risk Management Committee Strong risk management culture and network enables CE to identify and proactively manage key risks to meet business objectives 9
10 Business Continuity Risk Considerations Threat >> Probability/ robability/impact >> Risk Strategy Cost vs Risk Compliance vs Customer Service The above are considered when vulnerabilities and the associated risk mitigation activities are identified. 10
11 Business Continuity Objective Facilitate enterprise-wide vulnerability documentation and risk strategy development to provide for an acceptable level of risk and to facilitate completion of mitigation projects 11
12 CE s Risk Management Tool In 2003, Business Continuity selected Mitirisk, a Strohl Systems tool to manage the vulnerabilities and risk. To meet our company s needs, Business Continuity: customized to fit CE s risk terminology and philosophies renamed Mitirisk to Enterprise Risk Management System (ERMS) created risk categories for - BCP (e.g. vital records), Environmental, Physical Security, I/T Disaster Recovery, I/T Security, Safety / Fire Protection, Facilities expanded ERMs to Operational Risks Committees such as Electric, Gas, and Generation expanded to Staff Risk Committees: I/T, Facilities, and Supply Chain 12
13 Enterprise Risk Management System (ERMS) Document vulnerabilities Assign executive owner Assign risk severity rating (1-5) Document risk strategies (mitigate/accept/avoid/transfer) Document mitigation projects Assign manager owner Assign effectiveness rating (1-5) Track progress 13
14 Sources for Vulnerabilities Vulnerabilities are discovered during assessments for Facilities BCP plan development/maintenance BCP drills/exercises Operational risk committees Security I/T disaster recovery Specific scenarios (e.g. pandemic, workplace violence, bio-terrorism, data center loss, loss of executives) Audits 14
15 Risk Migration Strategy 15
16 Sample of Mitigation Projects Alternate and Hot Site Construction Energy Supplies 2 MW Portable Generation and Building Connections PC and Mobile Office Retainers Geographically dispersed primary and backup I/T Servers Life Cycle replacement of Critical Systems Data Backups 16
17 ERMS Metrics Metric produced for each category of risk or owner of risks Simple pie chart showing profile of risks by severity Reports showing vulnerabilities ordered by risk severity Show monthly trending for various categories of risk Average starting risk Average targeted risk Current risk level Quarterly reports for CRO and Senior Executives 17
18 Sample Metric Report 18
19 Benefits Inventory of vulnerabilities Documentation of vulnerabilities, risk strategies, and discussions Legal review of risks and the documentation wording Proper management of risk (material / significant) Accountability is high all risks are assigned an owner Risk profiles reviewed by senior management Improved risk disclosures Focused capital budget planning on corporate risk profile 19
DHS Overview of Sustainability and Environmental Programs. Dr. Teresa R. Pohlman Executive Director, Sustainability and Environmental Programs
DHS Overview of Sustainability and Environmental Programs Dr. Teresa R. Pohlman Executive Director, Sustainability and Environmental Programs DHS Mission DHS Organization Getting to Know DHS Mission: Secure
More informationExploring the Maturity of Risk Management Process in Government: An Integrated ERM Model at the U.S. Department of Education
Exploring the Maturity of Risk Management Process in Government: An Integrated ERM Model at the U.S. Department of Education FEDERAL STUDENT AID ENTERPRISE RISK MANAGEMENT GROUP Cynthia Vitters 1. ERM
More informationMassMutual Business Continuity Disclosure Statement
MassMutual Business Continuity Disclosure Statement Overview Resiliency is a high priority at Massachusetts Mutual Life Insurance Company ( MassMutual or the Company ). To that end, significant investments
More informationNERC Staff Organization Chart Budget 2018
NERC Staff Organization Chart Budget 2018 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationINTELLIGENCE DRIVEN GRC FOR SECURITY
INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to
More informationInstitute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI
Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee
More information354 & Index Board of Directors Responsibilities Audit Committee and Risk Committee Coordination, 244 Audit Committee Functions and Responsibilities, 2
Index Accounts Payable Process Review Procedures Assessments, 191 Actions to Resolve Risks COSO ERM Control Activities, 97 Activity Management COSO ERM Control Activities, 81 AICPA SAS No. 1 Internal Controls
More informationIntroduction to Business continuity Planning
Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources
More informationConvergence of BCM and Information Security at Direct Energy
Convergence of BCM and Information Security at Direct Energy Karen Kemp Direct Energy Session ID: GRC-403 Session Classification: Advanced About Direct Energy Direct Energy was acquired by Centrica Plc
More informationOrganizational Structure of the Toronto Environment Office
STAFF REPORT INFORMATION ONLY Organizational Structure of the Toronto Environment Office Date: April 20, 2007 To: From: Wards: Reference Number: Parks and Environment Committee Richard Butts, Deputy City
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationSecurity Program Design:
Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident
More informationNERC Staff Organization Chart Budget
NERC Staff Organization Chart 2013 2014 President and CEO (Dept. 2100) Executive Assistant (Dept. 2100) Senior Vice President and Chief Operating Officer (Dept. 2100) Senior Vice President General Counsel
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate
More informationLeveraging ITIL to improve Business Continuity and Availability. itsmf Conference 2009
Leveraging ITIL to improve Business Continuity and Availability Samuel Lo MBA, MSc, CDCP, PMP, CISSP, CISA Data Centre Services Manager COL Limited Strictly Business itsmf Conference 2009 25 February 2009
More informationBUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW
BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business
More informationIntegration of Business Continuity, Emergency Preparedness, and Emergency Response
Integration of Business Continuity, Emergency Preparedness, and Emergency Response Continuity Insights Conference 2014 Julia Halsne Manager of Business Continuity East Bay Municipal Utility District Contents
More informationNERC Staff Organization Chart Budget 2017
NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel
More informationService Plan for Infrastructure Engineering
Service Plan for Infrastructure 2016-2019 Capital Regional District Date submitted: Revised: August 14, 2017 Table of Contents 1 Overview... 1 1.1 Division & Service Summary... 1 1.2 Organization Chart...
More informationNERC Staff Organization Chart Budget 2017
NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting
More informationEHS Steering Team Meting, 2008
EHS Steering Team Meting t, 2008 Duke Energy Fast Facts Duke Energy Corporation is an energy company headquartered in Charlotte, N.C. Its Regulated Utilities business unit serves 7.3 million retail electric
More informationROLE DESCRIPTION IT SPECIALIST
ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationCCISO Blueprint v1. EC-Council
CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance
More informationQuickBooks Online Security White Paper July 2017
QuickBooks Online Security White Paper July 2017 Page 1 of 6 Introduction At Intuit QuickBooks Online (QBO), we consider the security of your information as well as your customers and employees data a
More informationBringing Cybersecurity to the Boardroom Bret Arsenault
SESSION ID: CXO-T11 Bringing Cybersecurity to the Boardroom Bret Arsenault Corporate Vice President & CISO Microsoft Security has Transcended from to a an 3 How Microsoft Approaches Security Reinventproductivity
More informationGlobal Security Consulting Services, compliancy and risk asessment services
Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment
More informationDepartment of Management Services REQUEST FOR INFORMATION
RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President
More informationTurning Risk into Advantage
Turning Risk into Advantage How Enterprise Wide Risk Management is helping customers succeed in turbulent times and increase their competitiveness Glenn Tjon Partner KPMG Advisory Presentation Overview
More informationCompliance Program Design Lessons learned from a COSO framework
Compliance Program Design Lessons learned from a COSO framework Joseph Walsh President, Legacy Detroit Medical Center Christina DuVall Corporate Compliance Director CMS Overview Electric Gas Combination
More informationExhibit to Agenda Item #2
Exhibit to Agenda Item #2 Special SMUD Board of Directors Meeting Wednesday,, Immediately following the Energy Resources & Customer Services Committee Meeting Scheduled to begin at 5:30 p.m. Customer Service
More informationBusiness continuity management and cyber resiliency
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,
More informationTable of Contents. Sample
TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...
More informationExhibit to Agenda Item #3
Exhibit to Agenda Item #3 Special SMUD Board of Directors Meeting Tuesday, scheduled to begin at 5:30 p.m. Customer Service Center, Rubicon Room Powering forward. Together. Physical Security Audit observations
More informationBusiness Continuity Management Program Overview
Business Continuity Management Program Overview Improving the lives of our customers by connecting them to the power of the digital world CenturyLink Key Objective CenturyLink may modify or terminate this
More informationNERC Staff Organization Chart
NERC Staff Organization Chart President and CEO Administrative Associate Director to the Office of the CEO Associate Director, Member Relations and MRC Secretary Senior Vice President and Chief Reliability
More informationBCP At Bangkok Bank, Thailand
BCP At Bangkok Bank, Thailand Bhakorn Vanuptikul, BCCE Executive Vice President Bangkok Bank Public Company Limited 10 May 2012 1 Agenda Business Continuity Management at Bangkok Bank Success Factors in
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More informationGreen Governance Growth
G3 Data Centers Green Governance Growth DELIVER MORE WITH LESS The economic downturn changed the dynamics of the business world. It shifted the measure of success, driving companies to rethink how they
More informationImpact of Enterprise Security Risk Assessments on Integrators & Manufacturers. J. Kelly Stewart Steve Oplinger James Marcella
Impact of Enterprise Security Risk Assessments on Integrators & Manufacturers J. Kelly Stewart Steve Oplinger James Marcella 1 Session Description What exactly does a risk assessment mean to the integrator
More informationIntroduction to the NYISO
Introduction to the NYISO Power Control Center Guilderland, NY July 21, 2011 1 Today s Topics NYISO History NYISO Roles & Governance NYISO Markets Building Reliability Emerging Trends 2 Evolution of the
More informationDisaster Recovery and Business Continuity Planning (Mile2)
Disaster Recovery and Business Continuity Planning (Mile2) Course Number: DRBCP Length: 4 Day(s) Certification Exam This course will help you prepare for the following exams: ABCP: Associate Business Continuity
More informationNovember 14, Emergency Management and Hurricane Irma. Florida Human Resources People and Strategy (FLHRPS)
November 14, 2017 Emergency Management and Hurricane Irma Florida Human Resources People and Strategy (FLHRPS) 1 Agenda Hurricane Irma recap Dianne Merrill Emergency Management Process Susan Mueller Lessons
More informationMaintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery
Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery Dave Komendat Chief Security Officer The Boeing Company What We Do Today Design, assemble and support
More informationCYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017
CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 Sponsored by: Kansas Municipal Utilities Kansas Municipal Energy Agency Kansas Power Pool CYBERSECURITY TRAINING EXERCISE DATE November
More informationInformation Technology General Control Review
Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor
More informationInternet of Things Toolkit for Small and Medium Businesses
Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors
More informationSTRATEGIC PLAN
STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology
More informationBusiness Continuity Management Standards A Side-by-Side Comparison
Business Continuity Standards A Side-by-Side Comparison By Brian Zawada (CBCP) & Jared Schwartz (CBCP) Whether your organization has begun a grassroots initiative to develop a business continuity plan
More informationBPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.
BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...
More informationRisk Advisory Academy Training Brochure
Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty
More informationL18: Integrate Control Disciplines to Increase Control and Save Money
L18: Integrate Control Disciplines to Increase Control and Save Money Kathleen Lucey, FBCI Montague Risk kalucey@montaguetm.com tel: 1.516.676.9234 Connections Information Security (computer security,
More informationCanada Life Cyber Security Statement 2018
Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability
More informationICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)
ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary
More informationDisaster Recovery Planning
Disaster Recovery Planning Glenn Lytle, Vice President Sales, Lumos Networks July 28, 2014 Our Technology Comes with People 1 Todays Objectives: Introduction to LUMOS Networks Get you thinking about your
More informationExam4Tests. Latest exam questions & answers help you to pass IT exam test easily
Exam4Tests http://www.exam4tests.com Latest exam questions & answers help you to pass IT exam test easily Exam : CISM Title : Certified Information Security Manager Vendor : ISACA Version : DEMO 1 / 10
More informationInformation Technology Branch Organization of Cyber Security Technical Standard
Information Technology Branch Organization of Cyber Security Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 1 November 20, 2014 Approved:
More informationTexas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13
Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13 I. Vision A highly reliable and secure bulk power system in the Electric Reliability Council of Texas
More informationContinuity of Business
White Paper Continuity of Business SAS Continuity of Business initiative reflects our commitment to our employees, to our customers, and to all of the stakeholders in our global business community to be
More informationIT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)
DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE
More informationRIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015
www.pwc.com RIMS Perk Session 2015 - Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 Los Angeles RIMS Agenda Introductions What is Cybersecurity? Crown jewels The bad
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More informationEMERGENCY MANAGEMENT
CSU The California State University Office of Audit and Advisory Services EMERGENCY MANAGEMENT California State University, Dominguez Hills Audit Report 16-43 August 30, 2016 EXECUTIVE SUMMARY OBJECTIVE
More informationTable of Contents. Preface xiii PART I: IT GOVERNANCE CONCEPTS. Chapter 1: Importance of IT Governance for All Enterprises 3
Table of Contents Preface xiii PART I: IT GOVERNANCE CONCEPTS Chapter 1: Importance of IT Governance for All Enterprises 3 Chapter 2: Fundamental Governance Concepts and Sarbanes Oxley Rules 9 Sarbanes
More informationBusiness Continuity: How to Keep City Departments in Business after a Disaster
Business Continuity: How to Keep City Departments in Business after a Disaster Shannon Spence, PE Red Oak Consulting, an ARCADIS group Agenda Security, Resilience and All Hazards The Hazards Cycle and
More informationNERC Staff Organization Chart 2015 Budget
NERC Staff Organization Chart President and CEO (Dept. 2100) Executive Assistant (Dept. 2100) Associate Director, Member Relations and MRC Secretary (Dept. 2100) Senior Vice President and Chief Reliability
More informationFDIC InTREx What Documentation Are You Expected to Have?
FDIC InTREx What Documentation Are You Expected to Have? Written by: Jon Waldman, CISA, CRISC Co-founder and Executive Vice President, IS Consulting - SBS CyberSecurity, LLC Since the FDIC rolled-out the
More informationEmergency Management & Disaster Planning
Emergency Management & Disaster Planning What we re going to talk about What is Emergency Management and Disaster Planning? What are the key elements of an EM Plan? Where does the University Architect
More informationUnderstanding IT Audit and Risk Management
Understanding IT Audit and Risk Management Presentation overview Understanding different types of Assessments Risk Assessments IT Audits Security Assessments Key Areas of Focus Steps to Mitigation We need
More informationAn Introduction to the ISO Security Standards
An Introduction to the ISO Security Standards Agenda Security vs Privacy Who or What is the ISO? ISO 27001:2013 ISO 27001/27002 domains Building Blocks of Security AVAILABILITY INTEGRITY CONFIDENTIALITY
More informationThe Business Value of including Cybersecurity and Vendor Risk in ERM
The Business Value of including Cybersecurity and Vendor Risk in ERM Yo Delmar, Vice President, Customer Engagement, MetricStream RMA GCOR XI April 4 5, 2017 Hyatt Regency, Cambridge, MA Tuesday 2:30 pm
More informationGeneral Information Technology Controls Follow-up Review
Office of Internal Audit General Information Technology Controls Follow-up Review May 19, 2015 Internal Audit Team Shannon B. Henry Chief Audit Executive Stacy Sneed Audit Manager Rod Isom Auditor Winston-Salem
More informationOverview of the Federal Interagency Operational Plans
Overview of the Federal Interagency Operational Plans July 2014 Table of Contents Introduction... 1 Federal Interagency Operational Plan Overviews... 2 Prevention Federal Interagency Operational Plan...2
More informationRECENT HURRICANE CASE STUDIES: IMPACT OF BUSINESS RECOVERY PLANNING AND TESTING. Dan Perrin, Regus Stephanie Samuels, Voya
RECENT HURRICANE CASE STUDIES: IMPACT OF BUSINESS RECOVERY PLANNING AND TESTING Dan Perrin, Regus Stephanie Samuels, Voya 1 Dan Perrin Regus Dan runs the Workplace Recovery Group within Regus, an International
More informationAppendix 2.2 November 30, 2018 CORPORATE ORGANIZATIONAL STRUCTURE
CENTRA GAS MANITOBA INC. 0/0 GENERAL RATE APPLICATION CORPORATE ORGANIZATIONAL STRUCTURE Appendix. November 0, 0 0 0 0 Centra is integrated within the organizational structure of Manitoba Hydro. Manitoba
More informationTRANSCANADA S AUDIT FOUNDATION FOR THE EXPANSION OF BUSINESS OPERATIONS
October 2014 TRANSCANADA S AUDIT FOUNDATION FOR THE EXPANSION OF BUSINESS OPERATIONS How TransCanada Achieved Value in Audit Management CASE STUDY Governance, Risk Management & Compliance Insight 2014
More informationBusiness Continuity Planning
Business Continuity Planning The Unexpected Happens Be Ready Copyright -Business Survival Partners, llc. 2011 - All Rights Reserved www.survivalpartners.biz RISK 2 Risks to National Security A secure and
More informationINTERNAL AUDIT DIVISION REPORT 2017/138
INTERNAL AUDIT DIVISION REPORT 2017/138 Audit of business continuity in the United Nations Organization Stabilization Mission in the Democratic Republic of the Congo There was a need to implement the business
More informationREVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009
APPENDIX 1 REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto
More informationSTAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:
STAFF REPORT January 26, 2001 To: From: Subject: Audit Committee City Auditor Information Security Framework Purpose: To review the adequacy of the Information Security Framework governing the security
More informationIBM Corporation. Global Energy Management System Implementation: Case Study. Global
Energy Management System Implementation: Case Study IBM Corporation ISO 50001 Registration: Results and Benefits It takes a global team to drive real success. Business case for energy management IBM is
More informationErvia Risk Management. Elaine O Donoghue IPA Governance Forum Briefing 10 th November 2017
Ervia Risk Management Elaine O Donoghue IPA Governance Forum Briefing 10 th November 2017 Ervia Overview - Our Structure Our customer facing businesses, Gas Networks Ireland and Irish Water, are supported
More informationCompTIA Advanced Security Practitioner (CASP) (Exam CAS-001)
CompTIA Advanced Security Practitioner (CASP) (Exam CAS-001) Course Outline Course Introduction Course Introduction Lesson 01 - The Enterprise Security Architecture Topic A: The Basics of Enterprise Security
More informationInformation Security Risk Strategies. By
Information Security Risk Strategies By Larry.Boettger@Berbee.com Meeting Agenda Challenges Faced By IT Importance of ISO-17799 & NIST The Security Pyramid Benefits of Identifying Risks Dealing or Not
More informationIn 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets.
REPORT FOR ACTION IT Infrastructure and IT Asset Management Review: Phase 1: Establishing an Information Technology Roadmap to Guide the Way Forward for Infrastructure and Asset Management Date: January
More informationInfosec Europe 2009 Business Strategy Theatre. Giving Executives the Security Management Information that they Really Need
Infosec Europe 2009 Business Strategy Theatre Giving Executives the Security Management Information that they Really Need Simon Marvell Managing Director simon.marvell@acuityrm.com Agenda 1. What financial
More informationMNsure Privacy Program Strategic Plan FY
MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term
More informationBusiness Continuity Policy
Business Continuity Policy Version Number: 3.6 Page 1 of 14 Business Continuity Policy First published: 07-01-2014 Amendment record Version Date Reviewer Comment 1.0 07/01/2014 Debbie Campbell 2.0 11/07/2014
More informationOVERVIEW BROCHURE GRC. When you have to be right
OVERVIEW BROCHURE GRC When you have to be right WoltersKluwerFS.com In response to today s demanding economic and regulatory climate, many financial services firms are transforming operations to enhance
More informationMANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative
More informationKENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)
KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for
More informationTHE LINK BETWEEN ENTERPRISE RISK MANAGEMENT AND DISASTER MANAGEMENT
THE LINK BETWEEN ENTERPRISE RISK MANAGEMENT AND DISASTER MANAGEMENT International Recovery Forum 2014 ~ The Role of Private Sector in Disaster Recovery ~ 21 January 2014 Kobe, Japan Dr Janet L. Asherson
More informationCyber Management for Ports Results of Small Port Cyber Security Workshops
AAPA Port Governing Boards Cyber Management for Ports Results of Small Port Cyber Security Workshops MARAD and the CHCP June 2018 1200 New Jersey Ave., SE Washington DC 20590 w w w. d o t. g o v Recent
More informationStatement for the Record
Statement for the Record of Seán P. McGurk Director, Control Systems Security Program National Cyber Security Division National Protection and Programs Directorate Department of Homeland Security Before
More informationRockwell Automation ODVA Annual Meeting
Rockwell Automation ODVA Annual Meeting Copyright 2011 Rockwell Automation, Inc. All rights reserved. Topics Industrial Energy Management: Industrial GreenPrint Business Drivers Enabling Solutions Copyright
More informationIT Audits at Penn. IT Orientation
IT Audits at Penn IT Orientation Dan Hill December 12, 2012 Agenda Organization Chart Mission Statement OACP Internal Audit Overview Risk Management Process Strategic IT Auditing What to Expect when Audited
More informationCISM Certified Information Security Manager
CISM Certified Information Security Manager Firebrand Custom Designed Courseware Logistics Start Time Breaks End Time Fire escapes Instructor Introductions Introduction to Information Security Management
More informationA Practical Guide to Avoiding Disasters in Mission-Critical Facilities. What is a Disaster? Associated Business Issues.
A Practical Guide to Avoiding Disasters in Mission-Critical Facilities Todd Bermont What is a Disaster? An event that can unexpectedly impact the continuity of your business Anything that injures or has
More informationAppendix 3 Disaster Recovery Plan
Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision
More information