SlideShare uma empresa Scribd logo
1 de 30
Baixar para ler offline
www.businessbeam.com
A business case for establishing
Business Continuity Plan (BCP)
Business Beam (Pvt.) Limited
Contents
2
What is Business Continuity?1
Business Benefits2
Implementation Roadmap3
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.
What is Business Continuity?
A business case for establishing a Business Continuity Plan
9/11 for Pakistan
4 Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.
Happened in Karachi (June 26, 09)
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.5
Suicide Attack in Lahore (May 27, 09)
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.6
Thanks to KESC
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.7
Berger Paints
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.8
Fire at Shahra-e-Faisal Building
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.9
The Reality of Business Continuity
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.10
 43% of US companies never reopen after a disaster and 29%
more close within 3 years.
 20% of small to medium size businesses suffer a major
disaster every 5 years.
 78% of organizations which lacked contingency plans but
suffered catastrophic loss were gone within 2 years…most
had insurance, and many had business interruption
coverage!
(Sources: U.S. National Fire Protection Agency, U.S. Bureau of Labor, Richmond House Group
and B2BContinuity.com)
11
IsThis An Effective Management Strategy In the Face of the
KNOWN Risks!
YES!
NO!
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.
Effects of Effective Business
Continuity
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.12
The impact on shareholder value
Source: “The Impact of Catastrophes on Shareholder Value,” Rory F. Knight & Deborah J. Pretty, Templeton College,
University of Oxford, p. 3.
Trading days after the event
25 50 75 100 125 150 175 200 225
Effective crisis response
Ineffective crisis responses
What is Business Continuity
Management?
13
 Business Continuity Management (BCM) is a holistic
management process that:
 Identifies potential impacts that threaten an organization,
 Provides a framework for building resilience and the capability
for an effective response,
 Safeguards the interests of key stakeholders, reputation, brand
and value creating activities.
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.
Success or Failure?
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.14
C No BCM –
usual outcome
B
No BCM – lucky
escape
Time
Levelofbusiness
Critical recovery
point
A
Fully tested
effective BCM
Business Benefits
A business case for establishing a Business Continuity Plan
Key Benefits (1)
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.16
 To Business
 Gain reputation as “Safe and Secure Organization”
 First mover advantage
 Cost effectiveness = Higher profitability
 Better compliance with laws and regulations
 Better continuity in case of any disaster
 To Operations
 Better risk management & risk reduction
 Better cost control
 Defined SOPs
 To IT
 Identification and control of information assets
 Better risk management
 Defined SOPs
 IT Disaster management
Key Benefits (2)
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.17
 Better policies, procedures and working templates
 Business continuity
 Information security
 Related roles and responsibilities
 Organization wide awareness
 SAP related and general IT infrastructure
 Use of network services
 Mobile computing
Key Benefits (3)
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.18
 Identification of Business Critical processes
 Process identification
 Process ranking according to business criticality
 Continuity strategies for critical processes
 Business Continuity planning
 Business Impact Analysis (BIA)
 BCP for all areas under scope
 BCP awareness, testing and exercises
Key Benefits (4)
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.19
 Information Asset Management
 Information Classification
 Information Asset Identification & Classification
 Employee Skill Management
 Risk Management
 Identification and Analysis of Risks
 Treatment of Risks
 Development of Risk Management Approach & Criteria
Key Benefits (5)
 Better Description of Roles & Responsibilities
 Job description related to information security
 Pre-hiring controls
 During employment personnel development
 Post-employment controls
 Physical Security
 Identification of Secure Areas
 Equipment Security
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.20
Key Benefits (6)
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.21
 Communications & Operations Management
 Documented SOPs
 Segregation of duties
 Third party service delivery management
 System planning & acceptance
 Data backup and recovery
 Network security
 Media handling
 e-Commerce
 Access Control
 Access control policy and procedures
 User, network and OS access control
 Application and mobile access control
Key Benefits (7)
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.22
 Regulatory compliance
 All applicable laws
 Intellectual property rights
 Framework for Continual Improvement
 Regular Internal Audits
 Corrective & preventive actions
Implementation Roadmap
A business case for establishing a Business Continuity Plan
23
Implementation Roadmap
24
Phase 1:
Scoping & Planning
Phase 2:
Understanding the Organization
Phase 3:
Risk Assessment and Control
Phase 4:
Implementation of Mitigation Strategies
Phase 5
Training for Audit and Internal Audit
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.
Phase 1: Scoping & Planning
25
Awareness
Awareness
Sessions
Implementer
Trainings
TeamFormation
Establishing
Management
Steering Group
Establishing
working groups
ProjectScoping
Identification of
geographical
scope
Identification of
functional scope
Documenting
and agreeing the
scope of the
assignment
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.
Phase 2: Understanding the
Organization
26
ProcessIdentification
Identification of
functions under
scope
Identification of
processes under
scope
BIA
Identification of
business impact if
process does not
work
Prioritizing
processes based
on time criticality
Presenting report
to the
management
AssetRegistration
Identification &
classification of
information assets
in the
organization
Asset value
assessment
Asset ownership
identification
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.
Phase 3: Risk Assessment and
Control
27
RiskAssessment
Identification of
application
threats, and risks
Analyzing
probability and
impact of risks
RiskThreshold
Calculating risk
threshold
Defining risk
acceptance
criteria
DevelopmentofSOA
Selection of right
controls to handle
the identified risks
Implementing risk
threshold and
acceptance
criteria
Developing and
presenting SOA
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.
Phase 4: Implementation of Mitigation
Strategies
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.28
SecurityControls
Developing
processes and
procedures for
information
security
controls
MitigationPlanning
Identifying right
mitigation
strategies
Planning for
implementation
BusinessContinuityPlan
Development of
Business
Continuity Plan
Desktop
exercise of BCP
Phase 5: Training for Internal Audit
and Internal Audit
Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.29
InternalAuditTraining
Hands-on
internal audit
trainings for
selected
individuals
Internal audit
trainings on
both standards
InternalAudit
Conducting first
internal audit
Developing
Internal Audit
report
AuditFindings
Detailed
assistance in
closure of audit
findings
Identification of
corrective and
preventive
actions
www.businessbeam.com
Thank You!
contact@businessbeam.com

Mais conteúdo relacionado

Mais procurados

Fractal analytics ace solution
Fractal analytics ace solutionFractal analytics ace solution
Fractal analytics ace solutionFractal_Analytics
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5Gewurtz
 
Chapter 1 Enterprise Resource Planning Alexis Leon
Chapter 1 Enterprise Resource Planning   Alexis LeonChapter 1 Enterprise Resource Planning   Alexis Leon
Chapter 1 Enterprise Resource Planning Alexis LeonSonali Chauhan
 
business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929Andy Willams
 
Implementing a Business Continuity Management System in Telecoms
Implementing a Business Continuity Management System in TelecomsImplementing a Business Continuity Management System in Telecoms
Implementing a Business Continuity Management System in TelecomsGlobal Risk Forum GRFDavos
 
Executable UML and SysML Workshop
Executable UML and SysML WorkshopExecutable UML and SysML Workshop
Executable UML and SysML WorkshopEd Seidewitz
 
System Integration with Akka and Apache Camel
System Integration with Akka and Apache CamelSystem Integration with Akka and Apache Camel
System Integration with Akka and Apache Camelkrasserm
 
Competency based (19.07.2013)
Competency based (19.07.2013)Competency based (19.07.2013)
Competency based (19.07.2013)Theint Htun
 
Chap12 Developing Business/IT Solutions
Chap12 Developing Business/IT SolutionsChap12 Developing Business/IT Solutions
Chap12 Developing Business/IT SolutionsAqib Syed
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsUppala Anand
 
Structure system analysis and design method -SSADM
Structure system analysis and design method -SSADMStructure system analysis and design method -SSADM
Structure system analysis and design method -SSADMFLYMAN TECHNOLOGY LIMITED
 
Building a business impact analysis (bia) process a hands on blueprint
Building a business impact analysis (bia) process a hands on blueprintBuilding a business impact analysis (bia) process a hands on blueprint
Building a business impact analysis (bia) process a hands on blueprintluweinet
 
Business continuity
Business continuityBusiness continuity
Business continuityAlka Mehar
 
Risk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation SlidesRisk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation SlidesSlideTeam
 

Mais procurados (20)

ISO 22301, The first ever ISO for BCM - Presented at BCI Qatar Forum
ISO 22301, The first ever ISO for BCM - Presented at BCI Qatar ForumISO 22301, The first ever ISO for BCM - Presented at BCI Qatar Forum
ISO 22301, The first ever ISO for BCM - Presented at BCI Qatar Forum
 
Fractal analytics ace solution
Fractal analytics ace solutionFractal analytics ace solution
Fractal analytics ace solution
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5
 
Chapter 1 Enterprise Resource Planning Alexis Leon
Chapter 1 Enterprise Resource Planning   Alexis LeonChapter 1 Enterprise Resource Planning   Alexis Leon
Chapter 1 Enterprise Resource Planning Alexis Leon
 
TOGAF Complete Slide Deck
TOGAF Complete Slide DeckTOGAF Complete Slide Deck
TOGAF Complete Slide Deck
 
business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929
 
Implementing a Business Continuity Management System in Telecoms
Implementing a Business Continuity Management System in TelecomsImplementing a Business Continuity Management System in Telecoms
Implementing a Business Continuity Management System in Telecoms
 
Archimate Meta Model
Archimate   Meta ModelArchimate   Meta Model
Archimate Meta Model
 
Executable UML and SysML Workshop
Executable UML and SysML WorkshopExecutable UML and SysML Workshop
Executable UML and SysML Workshop
 
System Integration with Akka and Apache Camel
System Integration with Akka and Apache CamelSystem Integration with Akka and Apache Camel
System Integration with Akka and Apache Camel
 
Competency based (19.07.2013)
Competency based (19.07.2013)Competency based (19.07.2013)
Competency based (19.07.2013)
 
Chap12 Developing Business/IT Solutions
Chap12 Developing Business/IT SolutionsChap12 Developing Business/IT Solutions
Chap12 Developing Business/IT Solutions
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
 
GRC Fundamentals
GRC FundamentalsGRC Fundamentals
GRC Fundamentals
 
Structure system analysis and design method -SSADM
Structure system analysis and design method -SSADMStructure system analysis and design method -SSADM
Structure system analysis and design method -SSADM
 
Sap- An Overview
Sap- An OverviewSap- An Overview
Sap- An Overview
 
Building a business impact analysis (bia) process a hands on blueprint
Building a business impact analysis (bia) process a hands on blueprintBuilding a business impact analysis (bia) process a hands on blueprint
Building a business impact analysis (bia) process a hands on blueprint
 
Business continuity
Business continuityBusiness continuity
Business continuity
 
Risk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation SlidesRisk Assessment And Mitigation Plan PowerPoint Presentation Slides
Risk Assessment And Mitigation Plan PowerPoint Presentation Slides
 

Semelhante a A Business Case for Establishing BCP

An introduction to lean six sigma
An introduction to lean six sigmaAn introduction to lean six sigma
An introduction to lean six sigmaBusiness Beam
 
Applying risk management_to_your_business_continuity_management_efforts
Applying risk management_to_your_business_continuity_management_effortsApplying risk management_to_your_business_continuity_management_efforts
Applying risk management_to_your_business_continuity_management_effortsSubhajit Bhuiya
 
Operation Management Chapter One.pptx
Operation Management Chapter One.pptxOperation Management Chapter One.pptx
Operation Management Chapter One.pptxzelalemdagne3
 
Operation Management Chapter One.pptx
Operation Management Chapter One.pptxOperation Management Chapter One.pptx
Operation Management Chapter One.pptxzelalemdagne3
 
Are You Selling Safety? Anyone Buying? November 2009
Are You Selling Safety?  Anyone Buying? November 2009Are You Selling Safety?  Anyone Buying? November 2009
Are You Selling Safety? Anyone Buying? November 2009FayFeeney
 
Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!Continuity and Resilience
 
CEO / CXO Architecture - The missing piece in your BI&A architecture
CEO / CXO Architecture - The missing piece in your BI&A architectureCEO / CXO Architecture - The missing piece in your BI&A architecture
CEO / CXO Architecture - The missing piece in your BI&A architectureCorporater
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?PECB
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13subramanian K
 
Multi Model Performance Improvement
Multi Model Performance ImprovementMulti Model Performance Improvement
Multi Model Performance ImprovementGeorge Brotbeck
 
Gilard Application Programmers - OSM Features.pdf
Gilard Application Programmers - OSM Features.pdfGilard Application Programmers - OSM Features.pdf
Gilard Application Programmers - OSM Features.pdfManjiv Singh
 
How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk SureCloud
 
The linchpin between Corporate Governance and IT Governance
The linchpin between Corporate Governance and IT GovernanceThe linchpin between Corporate Governance and IT Governance
The linchpin between Corporate Governance and IT GovernanceThe Open Group SA
 
The linchpin between Corporate Governance and IT Governance
The linchpin between Corporate Governance and IT GovernanceThe linchpin between Corporate Governance and IT Governance
The linchpin between Corporate Governance and IT GovernanceMagdalena Bezuidenhout
 
Eacbpm 2015 operational agility v5 final_may 18
Eacbpm 2015 operational agility v5 final_may 18Eacbpm 2015 operational agility v5 final_may 18
Eacbpm 2015 operational agility v5 final_may 18Okayed
 
Risk and Regulatory Change Management - 360factors EUEC 2015 Presentation
Risk and Regulatory Change Management - 360factors EUEC 2015 PresentationRisk and Regulatory Change Management - 360factors EUEC 2015 Presentation
Risk and Regulatory Change Management - 360factors EUEC 2015 Presentation360factors
 

Semelhante a A Business Case for Establishing BCP (20)

An introduction to lean six sigma
An introduction to lean six sigmaAn introduction to lean six sigma
An introduction to lean six sigma
 
Applying risk management_to_your_business_continuity_management_efforts
Applying risk management_to_your_business_continuity_management_effortsApplying risk management_to_your_business_continuity_management_efforts
Applying risk management_to_your_business_continuity_management_efforts
 
Operation Management Chapter One.pptx
Operation Management Chapter One.pptxOperation Management Chapter One.pptx
Operation Management Chapter One.pptx
 
Operation Management Chapter One.pptx
Operation Management Chapter One.pptxOperation Management Chapter One.pptx
Operation Management Chapter One.pptx
 
Are You Selling Safety? Anyone Buying? November 2009
Are You Selling Safety?  Anyone Buying? November 2009Are You Selling Safety?  Anyone Buying? November 2009
Are You Selling Safety? Anyone Buying? November 2009
 
Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!
 
CEO / CXO Architecture - The missing piece in your BI&A architecture
CEO / CXO Architecture - The missing piece in your BI&A architectureCEO / CXO Architecture - The missing piece in your BI&A architecture
CEO / CXO Architecture - The missing piece in your BI&A architecture
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
 
Multi Model Performance Improvement
Multi Model Performance ImprovementMulti Model Performance Improvement
Multi Model Performance Improvement
 
SAP GRC
SAP GRC SAP GRC
SAP GRC
 
Gilard Application Programmers - OSM Features.pdf
Gilard Application Programmers - OSM Features.pdfGilard Application Programmers - OSM Features.pdf
Gilard Application Programmers - OSM Features.pdf
 
CobiT Foundation Free Training
CobiT Foundation Free TrainingCobiT Foundation Free Training
CobiT Foundation Free Training
 
How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk
 
Cobit5 and-grc
Cobit5 and-grcCobit5 and-grc
Cobit5 and-grc
 
The linchpin between Corporate Governance and IT Governance
The linchpin between Corporate Governance and IT GovernanceThe linchpin between Corporate Governance and IT Governance
The linchpin between Corporate Governance and IT Governance
 
The linchpin between Corporate Governance and IT Governance
The linchpin between Corporate Governance and IT GovernanceThe linchpin between Corporate Governance and IT Governance
The linchpin between Corporate Governance and IT Governance
 
Eacbpm 2015 operational agility v5 final_may 18
Eacbpm 2015 operational agility v5 final_may 18Eacbpm 2015 operational agility v5 final_may 18
Eacbpm 2015 operational agility v5 final_may 18
 
Risk and Regulatory Change Management - 360factors EUEC 2015 Presentation
Risk and Regulatory Change Management - 360factors EUEC 2015 PresentationRisk and Regulatory Change Management - 360factors EUEC 2015 Presentation
Risk and Regulatory Change Management - 360factors EUEC 2015 Presentation
 
Chris Gould - BCM case
Chris Gould - BCM caseChris Gould - BCM case
Chris Gould - BCM case
 

Mais de Business Beam

What is iso 9001 qms
What is iso 9001 qmsWhat is iso 9001 qms
What is iso 9001 qmsBusiness Beam
 
How to write itil examinations
How to write itil examinationsHow to write itil examinations
How to write itil examinationsBusiness Beam
 
An introduction to prince2
An introduction to prince2An introduction to prince2
An introduction to prince2Business Beam
 
How to write pmp examinations
How to write pmp examinationsHow to write pmp examinations
How to write pmp examinationsBusiness Beam
 
How to write cbap examinations
How to write cbap examinationsHow to write cbap examinations
How to write cbap examinationsBusiness Beam
 
Establishing an Effective PMO
Establishing an Effective PMOEstablishing an Effective PMO
Establishing an Effective PMOBusiness Beam
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMSBusiness Beam
 
Myths and Realities About ITIL
Myths and Realities About ITILMyths and Realities About ITIL
Myths and Realities About ITILBusiness Beam
 

Mais de Business Beam (8)

What is iso 9001 qms
What is iso 9001 qmsWhat is iso 9001 qms
What is iso 9001 qms
 
How to write itil examinations
How to write itil examinationsHow to write itil examinations
How to write itil examinations
 
An introduction to prince2
An introduction to prince2An introduction to prince2
An introduction to prince2
 
How to write pmp examinations
How to write pmp examinationsHow to write pmp examinations
How to write pmp examinations
 
How to write cbap examinations
How to write cbap examinationsHow to write cbap examinations
How to write cbap examinations
 
Establishing an Effective PMO
Establishing an Effective PMOEstablishing an Effective PMO
Establishing an Effective PMO
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
Myths and Realities About ITIL
Myths and Realities About ITILMyths and Realities About ITIL
Myths and Realities About ITIL
 

Último

Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 

Último (20)

Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 

A Business Case for Establishing BCP

  • 1. www.businessbeam.com A business case for establishing Business Continuity Plan (BCP) Business Beam (Pvt.) Limited
  • 2. Contents 2 What is Business Continuity?1 Business Benefits2 Implementation Roadmap3 Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.
  • 3. What is Business Continuity? A business case for establishing a Business Continuity Plan
  • 4. 9/11 for Pakistan 4 Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.
  • 5. Happened in Karachi (June 26, 09) Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.5
  • 6. Suicide Attack in Lahore (May 27, 09) Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.6
  • 7. Thanks to KESC Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.7
  • 8. Berger Paints Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.8
  • 9. Fire at Shahra-e-Faisal Building Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.9
  • 10. The Reality of Business Continuity Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.10  43% of US companies never reopen after a disaster and 29% more close within 3 years.  20% of small to medium size businesses suffer a major disaster every 5 years.  78% of organizations which lacked contingency plans but suffered catastrophic loss were gone within 2 years…most had insurance, and many had business interruption coverage! (Sources: U.S. National Fire Protection Agency, U.S. Bureau of Labor, Richmond House Group and B2BContinuity.com)
  • 11. 11 IsThis An Effective Management Strategy In the Face of the KNOWN Risks! YES! NO! Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.
  • 12. Effects of Effective Business Continuity Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.12 The impact on shareholder value Source: “The Impact of Catastrophes on Shareholder Value,” Rory F. Knight & Deborah J. Pretty, Templeton College, University of Oxford, p. 3. Trading days after the event 25 50 75 100 125 150 175 200 225 Effective crisis response Ineffective crisis responses
  • 13. What is Business Continuity Management? 13  Business Continuity Management (BCM) is a holistic management process that:  Identifies potential impacts that threaten an organization,  Provides a framework for building resilience and the capability for an effective response,  Safeguards the interests of key stakeholders, reputation, brand and value creating activities. Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.
  • 14. Success or Failure? Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.14 C No BCM – usual outcome B No BCM – lucky escape Time Levelofbusiness Critical recovery point A Fully tested effective BCM
  • 15. Business Benefits A business case for establishing a Business Continuity Plan
  • 16. Key Benefits (1) Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.16  To Business  Gain reputation as “Safe and Secure Organization”  First mover advantage  Cost effectiveness = Higher profitability  Better compliance with laws and regulations  Better continuity in case of any disaster  To Operations  Better risk management & risk reduction  Better cost control  Defined SOPs  To IT  Identification and control of information assets  Better risk management  Defined SOPs  IT Disaster management
  • 17. Key Benefits (2) Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.17  Better policies, procedures and working templates  Business continuity  Information security  Related roles and responsibilities  Organization wide awareness  SAP related and general IT infrastructure  Use of network services  Mobile computing
  • 18. Key Benefits (3) Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.18  Identification of Business Critical processes  Process identification  Process ranking according to business criticality  Continuity strategies for critical processes  Business Continuity planning  Business Impact Analysis (BIA)  BCP for all areas under scope  BCP awareness, testing and exercises
  • 19. Key Benefits (4) Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.19  Information Asset Management  Information Classification  Information Asset Identification & Classification  Employee Skill Management  Risk Management  Identification and Analysis of Risks  Treatment of Risks  Development of Risk Management Approach & Criteria
  • 20. Key Benefits (5)  Better Description of Roles & Responsibilities  Job description related to information security  Pre-hiring controls  During employment personnel development  Post-employment controls  Physical Security  Identification of Secure Areas  Equipment Security Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.20
  • 21. Key Benefits (6) Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.21  Communications & Operations Management  Documented SOPs  Segregation of duties  Third party service delivery management  System planning & acceptance  Data backup and recovery  Network security  Media handling  e-Commerce  Access Control  Access control policy and procedures  User, network and OS access control  Application and mobile access control
  • 22. Key Benefits (7) Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.22  Regulatory compliance  All applicable laws  Intellectual property rights  Framework for Continual Improvement  Regular Internal Audits  Corrective & preventive actions
  • 23. Implementation Roadmap A business case for establishing a Business Continuity Plan 23
  • 24. Implementation Roadmap 24 Phase 1: Scoping & Planning Phase 2: Understanding the Organization Phase 3: Risk Assessment and Control Phase 4: Implementation of Mitigation Strategies Phase 5 Training for Audit and Internal Audit Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.
  • 25. Phase 1: Scoping & Planning 25 Awareness Awareness Sessions Implementer Trainings TeamFormation Establishing Management Steering Group Establishing working groups ProjectScoping Identification of geographical scope Identification of functional scope Documenting and agreeing the scope of the assignment Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.
  • 26. Phase 2: Understanding the Organization 26 ProcessIdentification Identification of functions under scope Identification of processes under scope BIA Identification of business impact if process does not work Prioritizing processes based on time criticality Presenting report to the management AssetRegistration Identification & classification of information assets in the organization Asset value assessment Asset ownership identification Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.
  • 27. Phase 3: Risk Assessment and Control 27 RiskAssessment Identification of application threats, and risks Analyzing probability and impact of risks RiskThreshold Calculating risk threshold Defining risk acceptance criteria DevelopmentofSOA Selection of right controls to handle the identified risks Implementing risk threshold and acceptance criteria Developing and presenting SOA Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.
  • 28. Phase 4: Implementation of Mitigation Strategies Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.28 SecurityControls Developing processes and procedures for information security controls MitigationPlanning Identifying right mitigation strategies Planning for implementation BusinessContinuityPlan Development of Business Continuity Plan Desktop exercise of BCP
  • 29. Phase 5: Training for Internal Audit and Internal Audit Copyrights (C) 2004-2013 Business Beam (Pvt.) Limited. All rights reserved.29 InternalAuditTraining Hands-on internal audit trainings for selected individuals Internal audit trainings on both standards InternalAudit Conducting first internal audit Developing Internal Audit report AuditFindings Detailed assistance in closure of audit findings Identification of corrective and preventive actions