Disaster Recovery and Business Continuity Planning (Mile2)

Similar documents
BCM Program Development

Business continuity management and cyber resiliency

Introduction to Business continuity Planning

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

7 th BICSI Southeast Asia Conference 2009 Building the Next Generation Broadband Network

TSC Business Continuity & Disaster Recovery Session

Facilities Management and Business Continuity. 10 May 2017

Cyber Resilience. Think18. Felicity March IBM Corporation

Business Continuity Planning

Practitioner Certificate in Business Continuity Management (PCBCM) Course Description. 10 th December, 2015 Version 2.0

NUIT Tech Talk. Emergency Preparedness. March 1, Sharlene Mielke. Jay Bagley. Disaster Recovery / Business Continuity Coordinator

Table of Contents. Sample

Certified Information Security Manager (CISM) Course Overview

Business Continuity Management Standards A Side-by-Side Comparison

Certified Information Systems Auditor (CISA)

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

Appendix 3 Disaster Recovery Plan

MassMutual Business Continuity Disclosure Statement

SAMPLE REPORT. Business Continuity Gap Analysis Report. Prepared for XYZ Business by CSC Business Continuity Services Date: xx/xx/xxxx

Enterprise GRC Implementation

November 14, Emergency Management and Hurricane Irma. Florida Human Resources People and Strategy (FLHRPS)

Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise

Infocomm Professional Development Forum 2011

TAN Jenny Partner PwC Singapore

Business Continuity and Disaster Recovery

INFORMATION SECURITY- DISASTER RECOVERY

EXAM PREPARATION GUIDE

Business Continuity Planning Keeping Pace with New Technology

Florida State University

Business Continuity Management

Certification Program for Business Continuity Professionals. DRI International. Certification Program for Business Continuity Planners

How to Derive Value from Business Continuity Planning

Keeping it Simple Driving BCM Program Adoption Through Simplification

3.4 DISASTER RECOVERY (L , M.3.9, comp_req_id 806)

ISO 22301: An Overview of BCM Implementation Process. Presenter: Dejan Kosutic

CCISO Blueprint v1. EC-Council

Core Solutions of Microsoft Exchange Server 2013

Canada Life Cyber Security Statement 2018

The Problem. Business Continuity/ Disaster Recovery. Course Outline and Structure. The Problem The Coverage. Sean Gunasekera

IT DISASTER RECOVEry IMPLEMENTER

When Recognition Matters WHITEPAPER ISO SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS.

BC vs. DR vs. HA vs. EM vs. RM vs. CM: is the difference only terminology?

CompTIA Advanced Security Practitioner (CASP) (Exam CAS-001)

INFORMATION TECHNOLOGY ( IT ) GOVERNANCE FRAMEWORK

Promoting the Art and Science of Business Continuity Management Worldwide. Partner of the DRJ

Using International Standards to Implement a Business Continuity Management System (BCMS)

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

Chapter 1. Chapter 2. Chapter 3

Effective Cyber Incident Response in Insurance Companies

CompTIA Mobility+ Certification

Building the Business Case for Emergency Notification

Business Continuity Planning

Rejuvenating BCM - Infrastructure. Business Continuity Awareness Week March 2009

NW NATURAL CYBER SECURITY 2016.JUNE.16

TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY

Critical Cyber Asset Identification Security Management Controls

MHA Consulting BCM Metrics Resiliency Through Measurement

Parkroyalon Kitchener Road 5th December 2007

Business Continuity - An Inside Perspective

Why you should adopt the NIST Cybersecurity Framework

PECB Change Log Form

BCM s Role in Effective Risk Management: A Risk Manager s Point of View

Industrial Control System Cyber Security

Implementing a Global Business

Position Title: IT Security Specialist

CAPM & PMP Exam Preparation Boot Camp

CISA Training.

Core Solutions of Microsoft Exchange Server 2013

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe

Introduction to Business Continuity Management

Business Continuity Policy

Business Continuity Management Program Overview

HENRY EE, FBCI, CBCP

COURSE OUTLINE. COURSE OBJECTIVES After completing this course, students will be able to: 1 - INSTALLING & CONFIGURING DCS

IT-BCP Survey 2014 Report

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning

DRI Professional Practices: What Has Changed and What It Means For You THE WEBINAR WILL BEGIN IN SHORTLY. PLEASE STAND BY.

Sample Exam Privacy & Data Protection Foundation

E-guide Getting your CISSP Certification

Implementation Strategy for Cybersecurity Workshop ITU 2016

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

Managing and Preparing for Cyber Incidents

CompTIA Cybersecurity Analyst+

UL and Business Continuity

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up.

Back to the Future Cyber Security

ISO 22301: An Overview of BCM Implementation Process. Presenter: Dejan Kosutic

Department of Management Services REQUEST FOR INFORMATION

RFD. for ICERT ( ) RESULTS-FRAMEWORK DOCUMENT. Department of Information Technology. Results-Framework Document (RFD) for CERT-In ( )

Whitepaper. Contents. Foreword. Introduction. Business ContinuITy

COURSE BROCHURE CISA TRAINING

NFPA Edition

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.

Addressing Vulnerabilities By Integrating Your Incident Response Plans. Brian Coates Enaxis Consulting

Session 5: Business Continuity, with Business Impact Analysis

Business Continuity: How to Keep City Departments in Business after a Disaster

Resume: Joseph T. Healy 301 Shadow Ridge Drive Little Rock, Arkansas Phone:

Exam4Tests. Latest exam questions & answers help you to pass IT exam test easily

Transcription:

Disaster Recovery and Business Continuity Planning (Mile2) Course Number: DRBCP Length: 4 Day(s) Certification Exam This course will help you prepare for the following exams: ABCP: Associate Business Continuity Planner (DRII USA) CBCP: Certified Business Continuity Planner (DRII USA) Course Overview This introductory course has been built upon proven Disaster Recovery Planning and business continuity planning BCP methodologies. The course presents information on the latest risks and responses. The class also enhances the business skills needed to identify protection opportunities, justify budget requests to optimize DR processes. Our course is developed on the generally accepted principals and uses the same methods and best practices. Its focus is professional DRBCP Disaster Recovery & Business Continuity Planning for protection of assets and human life. Prerequisites Students taking this course should have: A minimum of 12 months experience in risk management, security or facilities management. Sound knowledge of business assessment and writing skills. Audience This course is intended for Risk Management professionals, Security and Facilities professionals and Project Managers. Course Outline Module 1 Initiation and Project Management Initiation and Project Management Disaster Recovery Business Continuity What is a Disaster? Disaster Recovery Goals Who is responsible for BC/DR? Purpose of DR/BC Program

Resistance to Change DR/BC Project Management DR/BC Planning Model Project Initiation Phase Functional Requirements Phase Change Control Recommended Structure Team Overview in Project Plan Typical functional areas to consider Module 2 Risk Evaluation & Control Risk Evaluation & Control Risk Analysis Activities Threats to Business Process Disaster Categories Technical Disaster Scenarios Human Disaster Scenarios Other Human Disaster Scenarios Threats Downtime Risk Analysis Terminology Risk management Risk Analysis Activities Exposure Inventory Business Process Inventory Business Process Documentation Important Areas to Watch Potential Impact on Operations Statement of Risk ALE Annualized Loss Expenditure or Expectancy Annualized Loss Exposure Statement of Risk Risk Control Definition Identifying Existing Controls Physical Controls Risk Analysis Risk Assessment Report Compiling a Risk Assessment Report Module 3 Business Impact Analysis BIA Business Impact Analysis BIA Business Impact Analysis Terminology Objectives of Business Impact Analysis Recovery Time Objective RTO BIA Phases BIA Project Planning

BIA Tools More on BIA BIA Analysis Details BIA Notes on Data Collection Notes on Data Analysis Data Analysis Where does BIA fit into the Process Module 4 Developing Strategies Developing Strategies Business Continuity Program Strategy Process Developing DR/BC Strategies DR/BC Specifics Selecting Off Site Storage and Alternate Recovery Site(s) Off Site Storage Selecting Vendors for DR/BC Services Evaluating Vendors of DR/BC Resources Identifying Recovery Strategies for Functional Areas More on Recovery Strategies Telecommunications Strategies Assessing Strategies from BIA Cost/Benefit Analysis More Continuity Strategies Consolidating Continuity Strategies Across the Enterprise Consolidating Continuity and Recovery Strategies Across the Enterprise Hardware Backup Alternatives Continuity Strategy Hardware Backup Alternatives Critical Factors Continuity Strategy Continuity Strategy Software Backup Alternatives Software Backup Alternatives Data Backup Alternatives Telecom & Network Alternatives Business Continuity Continuity Strategy Insurance Evaluate Insurance Terms Module 5 Emergency Preparedness and Response Emergency Preparedness and Response Purpose of Emergency Response Procedures Emergency Response Emergency Response Components Develop ER Procedures Command and Control

ER Sources for Assistance Module 6 BC Plan Development and Implementation BC Plan Development and Implementation DR/BC Involves Planning Considerations Planning Methodology Scope of Project Plan Planning Assumptions Planning Responsibilities Plan Should Include Key Disaster Scenarios Work Plans & Schedules Requirements for Plan Elements Build Team Recovery Restoration Teams Steps : Execution Strategy Plan Development Phase Design & Development Phase Organizational Tools Organizational Tasks Media Control Personnel Mobilization General Employee Information Business Continuity Designates Implementation of Planning Process Responsibility for Developing Procedures Procedures Automating DR/BC Documentation Process DR/BC Plan Sample Outline Up Front Information Module 7 Awareness and Training Programs Awareness and Training Programs Elements of Awareness & Training Programs Audience Types Awareness Awareness Programs Training Programs Why Plan Exercises are Important Testing & Drills Testing Types Establishing Exercise Programs Review Various Types of Tests Plan Testing Guidelines Evaluation Exercises Audit your Plan

Module 8 Maintenance Policies Maintenance Policies Maintenance Maintenance & Schedule Budgets Software Tools for Maintenance Input Criteria for Plan Maintenance Plan Distribution & Security Module 9 Crisis Communications Crisis Communications Escalation Procedures Escalation & Activation Procedures Disaster Declaration Procedures Public Relations/Spokesperson Role Typical Audiences Audience Messages Sources of Information Incident Command Centre (ICC) ICC Chain of Command ICC Organisation Be Prepared to Work with Public Authorities Executing the Plan Module 10 Cyber Attacks Cyber Attacks Computer Crime & Cyberattacks Cyberattack Scenarios Northeast Cyberattack Scenario Economic Impact of Malicious Code Attacks Including Cyberattacks in Definitions of Terrorism Domestic and International Terrorism Department of Homeland Security Key Assets Cyberspace Security Strategies Expectations of Cyberattacks Information Warfare Considerations for Developing Information Warfare Procedures Protection Against Cyberattacks How Computer Systems are Attacked Types of Computer Attacks Developing Procedure in the wake of a Security Breach Procedures to Follow After an Attack Developing Procedures to Determine economic Losses Developing Procedures to Ease IT Recovery Types of Systems and Networks Recovery of Small Computer Systems

Recovery of Large Computer Systems Network Recovery Establishing a Computer Incident Response Team Important Points Module 11 Pandemics Pandemics Quick Facts Pandemics Planning Issues per Stage Stage 4 Communications HR Policies Stage 3 HR Travel Policies Stage 3 Government Relations Stage 3 Physical Resources Pandemics Course Closure