SlideShare uma empresa Scribd logo
1 de 20
Business Continuity for Information Systems State of Utah – October 2006
Business Continuity ,[object Object],[object Object]
Why is it important? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Continuity of Operations (COOP) ,[object Object]
Elements of a Viable COOP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A viable COOP needs to include:
Systems Assessment ,[object Object],[object Object],[object Object],[object Object],[object Object]
Key Infrastructure Capabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COOP Tiers ,[object Object],[object Object],[object Object]
Funding requirement To bring all systems  that have been identified  as having Tier 1 and Tier 2 COOP requirements up to that level of preparedness would require estimated funding of  $18.9 million . * see COOP systems report for detail
Business Continuity Needs ,[object Object],[object Object],Values are in millions of dollars
Key Functions for Business Continuity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Emergency Support Functions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tier 1 State of Utah Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk of not addressing Tier One ,[object Object],[object Object],[object Object],[object Object]
Tier 2 State of Utah Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk of not addressing Tier Two ,[object Object],[object Object],[object Object],[object Object]
Tier 3 Examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Richfield Alternate Data Center Capabilities: different earthquake zone from Wasatch Front, 4 microwave and 1 fiber path to core state network, backup mainframe, backup power (UPS and generator), alternate internet connection, staffed 24x7 Can be used to house all business resumption capabilities. *  Will need to be expanded if tier 1,2, and 3 COOP is implemented
Richfield Systems ,[object Object],[object Object],[object Object],These systems (outside the executive branch) are currently housed at the Richfield data center to provide business continuity services:
In Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Destaque

Chevrolet Corvair
Chevrolet CorvairChevrolet Corvair
Chevrolet CorvairHatinnicwhy
 
4. Luat quan ly thue.12.10 CCT
4. Luat quan ly thue.12.10 CCT4. Luat quan ly thue.12.10 CCT
4. Luat quan ly thue.12.10 CCTPham Ngoc Quang
 
Summit keynote Alan Crabbe
Summit keynote Alan CrabbeSummit keynote Alan Crabbe
Summit keynote Alan CrabbeKennisland
 
Presentation to CCAE - November 28/08
Presentation to CCAE - November 28/08Presentation to CCAE - November 28/08
Presentation to CCAE - November 28/08Ken Hudson
 
Creative sofa
Creative sofa Creative sofa
Creative sofa Kennisland
 
From MySpace to MySociety to MyDemocracy
From MySpace to MySociety to MyDemocracyFrom MySpace to MySociety to MyDemocracy
From MySpace to MySociety to MyDemocracyKennisland
 
Virtual Worlds - Presentation to Ontario University Technologists
Virtual Worlds - Presentation to Ontario University TechnologistsVirtual Worlds - Presentation to Ontario University Technologists
Virtual Worlds - Presentation to Ontario University TechnologistsKen Hudson
 
Beckett samuel-three-dialogues-samuel-beckett-and-georges-duthuit
Beckett samuel-three-dialogues-samuel-beckett-and-georges-duthuitBeckett samuel-three-dialogues-samuel-beckett-and-georges-duthuit
Beckett samuel-three-dialogues-samuel-beckett-and-georges-duthuitTeresa Levy
 
He tuan hoan tham khao 2
He tuan hoan tham khao 2He tuan hoan tham khao 2
He tuan hoan tham khao 2Pham Ngoc Quang
 
Droidcon Android, Open Source & Brands
Droidcon Android, Open Source & BrandsDroidcon Android, Open Source & Brands
Droidcon Android, Open Source & BrandsVolker Hirsch
 
Mau va bach huyet (anh) 2
Mau va bach huyet (anh) 2Mau va bach huyet (anh) 2
Mau va bach huyet (anh) 2Pham Ngoc Quang
 

Destaque (20)

Chevrolet Corvair
Chevrolet CorvairChevrolet Corvair
Chevrolet Corvair
 
4. Luat quan ly thue.12.10 CCT
4. Luat quan ly thue.12.10 CCT4. Luat quan ly thue.12.10 CCT
4. Luat quan ly thue.12.10 CCT
 
Tem2
Tem2Tem2
Tem2
 
A Picture of Me...
A Picture of Me...A Picture of Me...
A Picture of Me...
 
Gioi Thieu TaNet
Gioi Thieu TaNetGioi Thieu TaNet
Gioi Thieu TaNet
 
Trao doi chat va q p3
Trao doi chat va q  p3Trao doi chat va q  p3
Trao doi chat va q p3
 
Picasso 4f
Picasso 4fPicasso 4f
Picasso 4f
 
Voordekunst
VoordekunstVoordekunst
Voordekunst
 
Summit keynote Alan Crabbe
Summit keynote Alan CrabbeSummit keynote Alan Crabbe
Summit keynote Alan Crabbe
 
Presentation to CCAE - November 28/08
Presentation to CCAE - November 28/08Presentation to CCAE - November 28/08
Presentation to CCAE - November 28/08
 
Creative sofa
Creative sofa Creative sofa
Creative sofa
 
Case Sara Zoekt Werk
Case Sara Zoekt WerkCase Sara Zoekt Werk
Case Sara Zoekt Werk
 
From MySpace to MySociety to MyDemocracy
From MySpace to MySociety to MyDemocracyFrom MySpace to MySociety to MyDemocracy
From MySpace to MySociety to MyDemocracy
 
Gay science
Gay scienceGay science
Gay science
 
Virtual Worlds - Presentation to Ontario University Technologists
Virtual Worlds - Presentation to Ontario University TechnologistsVirtual Worlds - Presentation to Ontario University Technologists
Virtual Worlds - Presentation to Ontario University Technologists
 
Beckett samuel-three-dialogues-samuel-beckett-and-georges-duthuit
Beckett samuel-three-dialogues-samuel-beckett-and-georges-duthuitBeckett samuel-three-dialogues-samuel-beckett-and-georges-duthuit
Beckett samuel-three-dialogues-samuel-beckett-and-georges-duthuit
 
He tuan hoan tham khao 2
He tuan hoan tham khao 2He tuan hoan tham khao 2
He tuan hoan tham khao 2
 
Droidcon Android, Open Source & Brands
Droidcon Android, Open Source & BrandsDroidcon Android, Open Source & Brands
Droidcon Android, Open Source & Brands
 
Mau va bach huyet (anh) 2
Mau va bach huyet (anh) 2Mau va bach huyet (anh) 2
Mau va bach huyet (anh) 2
 
Migros Magazine
Migros MagazineMigros Magazine
Migros Magazine
 

Semelhante a Business continuity for Information Systems

Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanTripwire
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxbagotjesusa
 
ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"
ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"  ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"
ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise" ESEI
 
Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security Adhar kashyap
 
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...IRJET Journal
 
An analysis of the supply chain risk
An analysis of the supply chain risk An analysis of the supply chain risk
An analysis of the supply chain risk Steve Mahnke
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsDoubleHorn
 
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit ClinicsRoad Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit ClinicsIOSR Journals
 
Understanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsUnderstanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsEMMAIntl
 
Effective Date August 25, 2014Chapter Information Manag.docx
Effective Date  August 25, 2014Chapter Information Manag.docxEffective Date  August 25, 2014Chapter Information Manag.docx
Effective Date August 25, 2014Chapter Information Manag.docxLinaCovington707
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?Brian K. Dickard
 
It seminar isr
It seminar isrIt seminar isr
It seminar isrASNA p.a
 
Accessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsAccessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsIJARIIT
 
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskAssessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskTrustArc
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxstilliegeorgiana
 
Capstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid SecurityCapstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid Securityreuben_mathew
 
archenaa2015-survey-big-data-government.pdf
archenaa2015-survey-big-data-government.pdfarchenaa2015-survey-big-data-government.pdf
archenaa2015-survey-big-data-government.pdfAkuhuruf
 

Semelhante a Business continuity for Information Systems (20)

Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
 
ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"
ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"  ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"
ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"
 
Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security
 
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
 
An analysis of the supply chain risk
An analysis of the supply chain risk An analysis of the supply chain risk
An analysis of the supply chain risk
 
N018138696
N018138696N018138696
N018138696
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
 
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit ClinicsRoad Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
 
Understanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsUnderstanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and Applications
 
Effective Date August 25, 2014Chapter Information Manag.docx
Effective Date  August 25, 2014Chapter Information Manag.docxEffective Date  August 25, 2014Chapter Information Manag.docx
Effective Date August 25, 2014Chapter Information Manag.docx
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
 
Mike Alagna
Mike AlagnaMike Alagna
Mike Alagna
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
Accessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsAccessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of Things
 
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskAssessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
 
Capstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid SecurityCapstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid Security
 
archenaa2015-survey-big-data-government.pdf
archenaa2015-survey-big-data-government.pdfarchenaa2015-survey-big-data-government.pdf
archenaa2015-survey-big-data-government.pdf
 

Mais de David Fletcher

Business continuity for information systems
Business continuity for information systemsBusiness continuity for information systems
Business continuity for information systemsDavid Fletcher
 
Going Mobile In Government
Going Mobile In GovernmentGoing Mobile In Government
Going Mobile In GovernmentDavid Fletcher
 
Building A Better Website Governing 2008
Building A Better Website Governing 2008Building A Better Website Governing 2008
Building A Better Website Governing 2008David Fletcher
 
Utah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-OnUtah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-OnDavid Fletcher
 
Ta Review Application Servers
Ta Review Application ServersTa Review Application Servers
Ta Review Application ServersDavid Fletcher
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange ModelDavid Fletcher
 
Tackling the Talent Challenge
Tackling the Talent ChallengeTackling the Talent Challenge
Tackling the Talent ChallengeDavid Fletcher
 

Mais de David Fletcher (13)

Business continuity for information systems
Business continuity for information systemsBusiness continuity for information systems
Business continuity for information systems
 
Going Mobile In Government
Going Mobile In GovernmentGoing Mobile In Government
Going Mobile In Government
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Going Mobile
Going MobileGoing Mobile
Going Mobile
 
Gobierno Digital
Gobierno DigitalGobierno Digital
Gobierno Digital
 
Building A Better Website Governing 2008
Building A Better Website Governing 2008Building A Better Website Governing 2008
Building A Better Website Governing 2008
 
Web 2.0 in Government
Web 2.0 in GovernmentWeb 2.0 in Government
Web 2.0 in Government
 
Utah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-OnUtah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-On
 
Ta Review Logging
Ta Review LoggingTa Review Logging
Ta Review Logging
 
Ta Review Application Servers
Ta Review Application ServersTa Review Application Servers
Ta Review Application Servers
 
Ta Review OES
Ta Review OESTa Review OES
Ta Review OES
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange Model
 
Tackling the Talent Challenge
Tackling the Talent ChallengeTackling the Talent Challenge
Tackling the Talent Challenge
 

Business continuity for Information Systems

  • 1. Business Continuity for Information Systems State of Utah – October 2006
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Funding requirement To bring all systems that have been identified as having Tier 1 and Tier 2 COOP requirements up to that level of preparedness would require estimated funding of $18.9 million . * see COOP systems report for detail
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Richfield Alternate Data Center Capabilities: different earthquake zone from Wasatch Front, 4 microwave and 1 fiber path to core state network, backup mainframe, backup power (UPS and generator), alternate internet connection, staffed 24x7 Can be used to house all business resumption capabilities. * Will need to be expanded if tier 1,2, and 3 COOP is implemented
  • 19.
  • 20.