SlideShare a Scribd company logo
1 of 24
Download to read offline
October 20, 2010
Presented By:
Susan Kastan
Penny Klein
Bio
 Susan Kastan has been in the information technology
field for 20+ years, and currently specializes in
Business Continuity. She has developed numerous
security policies, procedures and plans for various
government, association and private industry.
 Penny Klein brings 20+ years of information
assurance experience, specializing in IA policies. She
has developed a Business Contingency Program for a
major association, as well as policies, procedures and
plans for numerous government and private industries
October 20, 2010 2Kastan Consulting/PJKlein Consulting
Business Continuity
 Business Continuity – The smooth continuation of
business activity despite an interruption of service
 No size restrictions
 Tailored to environment
 Information technology as well as personnel and
processes
October 20, 2010 3Kastan Consulting/PJKlein Consulting
Business Continuity
 In the event a incident occurs:
 Operations are likely to be disrupted
 Offices are likely to be closed down or destroyed
 People may get hurt or killed
 People are likely to have their employment disrupted
October 20, 2010 4Kastan Consulting/PJKlein Consulting
Risk Assessment
 Risk Assessment – Activities that discover an
organization's vulnerabilities, threats and impact.
Additionally , it identifies the countermeasure to
mitigate the risk, the associated costs, and the risk
tolerance (risk the organization is willing to accept)
October 20, 2010 5Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Business Impact Assessment (BIA) - Analyzes
mission criticality of all enterprise functions, the
current threats, and consequences of losing some or all
of these functions.
 Also known as Business Impact Analysis
October 20, 2010 6Kastan Consulting/PJKlein Consulting
Steps in Business Continuity
 Conduct Risk Assessment
 Conduct BIA
 Develop and Document
 Train & Test
 Implement
 Maintain
October 20, 2010 7Kastan Consulting/PJKlein Consulting
Risk Assessment
 Purpose of a Risk Assessment
 Identifies current threats
 Identifies current vulnerabilities
 Identifies impact of the threats to the vulnerabilities
 Provides for Risk Management, that is, what risk is the
organization willing to accept, reduce/correct, or
transfer
October 20, 2010 8Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Identifies:
 Mission Critical and Mission Essential Requirements
 Recovery Phases
 Critical Factors
 Assumptions
 Evaluation Criteria
 Critical Dependencies
 Recommendations
October 20, 2010 9Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Benefits
 Raises senior management’s awareness of the state of
their business and helps to justify the need for a
business continuity plan
 Ensures that a suitable business continuity strategy and
effective business continuity plan will be developed
 Identifies and prioritizes recovery of mission critical
business functions and processes
October 20, 2010 10Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Benefits – cont’d
 Identifies requirements for recovery of critical IT
systems, applications, vital records, equipment and
resources
 Identifies extent of financial impact
 Identifies extent of operational impact
October 20, 2010 11Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Process
 Awareness
 Provide to Management and Team
 Ensure buy-in to the process
 Data Gathering
 Management’s vision
 Interviews and/or general surveys
 Threat Analysis and Requirements Analysis
 Reviews
 Department review
 Senior management review
 Evaluation and Recommendation
 Build recovery plans for “time sensitive”/mission critical plans
October 20, 2010 12Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Awareness
 Brief Senior Management and Stakeholders
 GET BUY-IN
 Provide a high level overview of the process
 Identify benefits
 Reference guide
 Useful and easy to follow presentation of the data collected
 Comprehensive view of all the requirements
 Requirements guide for developing and implementing risk
mitigation strategies
 Provides validation and justification for funding all BCP
requirements
October 20, 2010 13Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Gather data
 Business processes
 Resources
 Interdependencies
 Impacts over time
 Maximum Allowable Downtime (MAD)
 Recovery Time Objective (RTO)
 Recovery Point Objective (RPO)
October 20, 2010 14Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Determine the impact of scenarios on processes
 Loss of key people
 Loss of location
 Loss of power
 Loss of communications
 Loss of technology
 Loss of information
October 20, 2010 15Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Impact types/categories
 Financial
 Legal/regulatory
 Customer loss/dissatisfaction
 Reputation impact
 Time sensitive material
October 20, 2010 16Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Low - May result in the loss of some tangible
assets or resources or may noticeably affect an
organization’s mission, reputation, or interest.
 Medium - May result in the costly loss of tangible
assets or resources; may violate, harm, or impede
an organization’s mission, reputation, or interest;
or may result in human injury.
Based on NIST 800-30
October 20, 2010 17Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 High - May result in the highly costly loss of major
tangible assets or resources; may significantly
violate, harm, or impede an organization’s
mission, reputation, or interest; or may result in
human death or serious injury.
Based on NIST 800-30
October 20, 2010 18Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Department Review
 Changes
 Inaccuracies/ misinterpretation
 Verify timelines are correct
 RTO
 RPO
 MAD
October 20, 2010 19Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Senior Management Review
 Prioritize for entire company
 Determine path forward based on
 Cost
 Speed of Recovery
 Quality
 Impacts to business
October 20, 2010 20Kastan Consulting/PJKlein Consulting
Business Impact Assessment
 Follow On
 Take what you’ve learned and build out the Business
Continuity Plan
 BIA is the basis for the risk decisions
 Start with most critical or time sensitive
October 20, 2010 21Kastan Consulting/PJKlein Consulting
Exercise
 Santa attended a conference in January about business
continuity.
 He wants to put a business continuity plan in place.
 It’s a little later than he would like, but he would like to
start with the Business Impact Assessments.
 Our goal:
 Identify critical processes
 Create list of top 10
October 20, 2010 22Kastan Consulting/PJKlein Consulting
Exercise
 Santa delivers 2 toys (or coal) to all children around
the globe who believe in him
 24 hours to do it
 Santa is the President of Santa’s Workshop, Inc.
 151,000+ employees
 Week before (and Christmas day) is critical to him
 Everyone believes what they do is critical to operations
 A little bit of technology helps!
October 20, 2010 Kastan Consulting/PJKlein Consulting 23
Contact Information
Penny Klein
PJKlein Consulting, LLC
Penny.Klein@
pjkleinllc.com
www.pjkleinllc.com
703.901.1932
Susan Kastan
Kastan Consulting, LLC
Susan.Kastan@
kastanconsulting.com
www.kastanconsulting.com
585.724.0804
October 20, 2010 24Kastan Consulting/PJKlein Consulting

More Related Content

What's hot

PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain timesPECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain timesPECB
 
Strategic Risk Management in the Face of Uncertainty and Unexpected Risks
Strategic Risk Management in the Face of Uncertainty and Unexpected RisksStrategic Risk Management in the Face of Uncertainty and Unexpected Risks
Strategic Risk Management in the Face of Uncertainty and Unexpected RisksInternational Federation of Accountants
 
Enterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceEnterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceResolver Inc.
 
Business impact assessment (bia)
Business impact assessment (bia)Business impact assessment (bia)
Business impact assessment (bia)Shashwat Shankar
 
Business continuity management www.reconglobal.in
Business continuity management   www.reconglobal.inBusiness continuity management   www.reconglobal.in
Business continuity management www.reconglobal.inSatya Yadav
 
Business continuity management system
Business continuity management systemBusiness continuity management system
Business continuity management systemsubbusai82
 
operations risk management power point presentation.
operations risk management power point presentation.operations risk management power point presentation.
operations risk management power point presentation.Miyelani Shibambo
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity ManagementECC International
 
Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides SlideTeam
 
Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020 Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020 Richard Swartzbaugh
 
Enterprise-wide Risk Assessment Presentation, dated 03-08-11
Enterprise-wide Risk Assessment Presentation, dated  03-08-11Enterprise-wide Risk Assessment Presentation, dated  03-08-11
Enterprise-wide Risk Assessment Presentation, dated 03-08-11wcooling
 
ISO 31000 risk management process
ISO 31000 risk management processISO 31000 risk management process
ISO 31000 risk management processMuizz Anibire
 
Operational risk management and measurement
Operational risk management and measurementOperational risk management and measurement
Operational risk management and measurementRahmat Mulyana
 
Risk Appetite & Risk Tolerance: Improving their application from Abstract to ...
Risk Appetite & Risk Tolerance: Improving their application from Abstract to ...Risk Appetite & Risk Tolerance: Improving their application from Abstract to ...
Risk Appetite & Risk Tolerance: Improving their application from Abstract to ...Eric Campbell
 
Business Continuity - Business Risk & Management
Business Continuity - Business Risk & ManagementBusiness Continuity - Business Risk & Management
Business Continuity - Business Risk & ManagementAndrew Styles
 
Operational Risk Management
Operational Risk ManagementOperational Risk Management
Operational Risk ManagementAsad Hameed
 

What's hot (20)

PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain timesPECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
 
Strategic Risk Management in the Face of Uncertainty and Unexpected Risks
Strategic Risk Management in the Face of Uncertainty and Unexpected RisksStrategic Risk Management in the Face of Uncertainty and Unexpected Risks
Strategic Risk Management in the Face of Uncertainty and Unexpected Risks
 
Enterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceEnterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and Performance
 
Business impact assessment (bia)
Business impact assessment (bia)Business impact assessment (bia)
Business impact assessment (bia)
 
ERM-Enterprise Risk Management
ERM-Enterprise Risk ManagementERM-Enterprise Risk Management
ERM-Enterprise Risk Management
 
Business continuity management www.reconglobal.in
Business continuity management   www.reconglobal.inBusiness continuity management   www.reconglobal.in
Business continuity management www.reconglobal.in
 
Business continuity management system
Business continuity management systemBusiness continuity management system
Business continuity management system
 
operations risk management power point presentation.
operations risk management power point presentation.operations risk management power point presentation.
operations risk management power point presentation.
 
Introduction to Business Continuity Management
Introduction to Business Continuity ManagementIntroduction to Business Continuity Management
Introduction to Business Continuity Management
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides
 
Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020 Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020
 
BCP Awareness
BCP Awareness BCP Awareness
BCP Awareness
 
Enterprise-wide Risk Assessment Presentation, dated 03-08-11
Enterprise-wide Risk Assessment Presentation, dated  03-08-11Enterprise-wide Risk Assessment Presentation, dated  03-08-11
Enterprise-wide Risk Assessment Presentation, dated 03-08-11
 
ISO 31000 risk management process
ISO 31000 risk management processISO 31000 risk management process
ISO 31000 risk management process
 
Operational risk management and measurement
Operational risk management and measurementOperational risk management and measurement
Operational risk management and measurement
 
Business Continuity Planning Presentation
Business Continuity Planning PresentationBusiness Continuity Planning Presentation
Business Continuity Planning Presentation
 
Risk Appetite & Risk Tolerance: Improving their application from Abstract to ...
Risk Appetite & Risk Tolerance: Improving their application from Abstract to ...Risk Appetite & Risk Tolerance: Improving their application from Abstract to ...
Risk Appetite & Risk Tolerance: Improving their application from Abstract to ...
 
Business Continuity - Business Risk & Management
Business Continuity - Business Risk & ManagementBusiness Continuity - Business Risk & Management
Business Continuity - Business Risk & Management
 
Operational Risk Management
Operational Risk ManagementOperational Risk Management
Operational Risk Management
 

Viewers also liked

BSidesSF 2014 Fix What Matters:Why CVSS Sucks
BSidesSF 2014 Fix What Matters:Why CVSS SucksBSidesSF 2014 Fix What Matters:Why CVSS Sucks
BSidesSF 2014 Fix What Matters:Why CVSS SucksEd Bellis
 
[Risk] Risk Manager for IRAM2 Application
[Risk] Risk Manager for IRAM2 Application[Risk] Risk Manager for IRAM2 Application
[Risk] Risk Manager for IRAM2 ApplicationAffy Morris MSc, ACIM
 
Cdc up business_impact_analysis_template
Cdc up business_impact_analysis_templateCdc up business_impact_analysis_template
Cdc up business_impact_analysis_templatedimakarmi
 
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)PECB
 
Disaster Recovery Presentation
Disaster Recovery PresentationDisaster Recovery Presentation
Disaster Recovery PresentationTimSchaefer
 
An Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery PlanningAn Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery PlanningNEBizRecovery
 
The A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster RecoveryThe A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster RecoverySirius
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat ModelingCigital
 
Threat modeling with architectural risk patterns
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patternsStephen de Vries
 
OHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentOHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentTechnoSysCon
 

Viewers also liked (11)

BSidesSF 2014 Fix What Matters:Why CVSS Sucks
BSidesSF 2014 Fix What Matters:Why CVSS SucksBSidesSF 2014 Fix What Matters:Why CVSS Sucks
BSidesSF 2014 Fix What Matters:Why CVSS Sucks
 
[Risk] Risk Manager for IRAM2 Application
[Risk] Risk Manager for IRAM2 Application[Risk] Risk Manager for IRAM2 Application
[Risk] Risk Manager for IRAM2 Application
 
Cdc up business_impact_analysis_template
Cdc up business_impact_analysis_templateCdc up business_impact_analysis_template
Cdc up business_impact_analysis_template
 
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
PECB Webinar: Introduction to ISO 22317 – Business Impact Analysis (BIA)
 
Disaster Recovery Presentation
Disaster Recovery PresentationDisaster Recovery Presentation
Disaster Recovery Presentation
 
An Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery PlanningAn Introduction to Disaster Recovery Planning
An Introduction to Disaster Recovery Planning
 
The A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster RecoveryThe A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster Recovery
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 
Threat modeling with architectural risk patterns
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patterns
 
ISO 31000
ISO 31000ISO 31000
ISO 31000
 
OHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentOHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessment
 

Similar to Business Impact and Risk Assessments in Business Continuity and Disaster Recovery

Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010
Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010
Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010UNSW Canberra
 
BUSINESS IMPACT ‎ANALYSIS- DRM
BUSINESS IMPACT ‎ANALYSIS- DRMBUSINESS IMPACT ‎ANALYSIS- DRM
BUSINESS IMPACT ‎ANALYSIS- DRMLibcorpio
 
Legal Services Act Seminar 3rd March 2010
Legal Services Act Seminar 3rd March 2010Legal Services Act Seminar 3rd March 2010
Legal Services Act Seminar 3rd March 2010Gateway Media
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Jim Kaplan CIA CFE
 
Consultancy Report Final
Consultancy Report FinalConsultancy Report Final
Consultancy Report FinalBilal Ahmed
 
Prospectus vcssgoc
Prospectus  vcssgocProspectus  vcssgoc
Prospectus vcssgocvinay verma
 
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Citrix Online
 
Pitch Short Deck KEA_Reboost.pdf
Pitch Short Deck KEA_Reboost.pdfPitch Short Deck KEA_Reboost.pdf
Pitch Short Deck KEA_Reboost.pdfAugustoCaceres6
 
bipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docx
bipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docxbipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docx
bipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docxAASTHA76
 
Financials and Human Resource Planning MGT465 Version 2
Financials and Human Resource Planning MGT465 Version 2Financials and Human Resource Planning MGT465 Version 2
Financials and Human Resource Planning MGT465 Version 2ShainaBoling829
 
Financials and human resource planning mgt465 version 2
Financials and human resource planning mgt465 version 2Financials and human resource planning mgt465 version 2
Financials and human resource planning mgt465 version 2RAHUL126667
 
Finance in Cornwall - 10 May 2016 (Segment 2b)
Finance in Cornwall - 10 May 2016 (Segment 2b)Finance in Cornwall - 10 May 2016 (Segment 2b)
Finance in Cornwall - 10 May 2016 (Segment 2b)PKF Francis Clark
 
Fractal analytics ace solution
Fractal analytics ace solutionFractal analytics ace solution
Fractal analytics ace solutionFractal_Analytics
 
Business Valuation Tips and Traps
Business Valuation Tips and TrapsBusiness Valuation Tips and Traps
Business Valuation Tips and TrapsCraig West
 
Optimise Learning Impact August 2010
Optimise Learning Impact August 2010Optimise Learning Impact August 2010
Optimise Learning Impact August 2010AndrewFletcher
 
Optimise Learning Impact August 2010
Optimise Learning Impact August 2010Optimise Learning Impact August 2010
Optimise Learning Impact August 2010AndrewFletcher
 
P4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdf
P4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdfP4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdf
P4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdfKnowledgeDevourer
 
Keeping up with Accounting - Business & Industry edition
Keeping up with Accounting - Business & Industry editionKeeping up with Accounting - Business & Industry edition
Keeping up with Accounting - Business & Industry editionTom Hood, CPA,CITP,CGMA
 

Similar to Business Impact and Risk Assessments in Business Continuity and Disaster Recovery (20)

Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010
Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010
Chartered Secretaries Risk & Compliance Module 8 - Project Governance - May 2010
 
BUSINESS IMPACT ‎ANALYSIS- DRM
BUSINESS IMPACT ‎ANALYSIS- DRMBUSINESS IMPACT ‎ANALYSIS- DRM
BUSINESS IMPACT ‎ANALYSIS- DRM
 
Legal Services Act Seminar 3rd March 2010
Legal Services Act Seminar 3rd March 2010Legal Services Act Seminar 3rd March 2010
Legal Services Act Seminar 3rd March 2010
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
 
Consultancy Report Final
Consultancy Report FinalConsultancy Report Final
Consultancy Report Final
 
Prospectus vcssgoc
Prospectus  vcssgocProspectus  vcssgoc
Prospectus vcssgoc
 
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
 
Pitch Short Deck KEA_Reboost.pdf
Pitch Short Deck KEA_Reboost.pdfPitch Short Deck KEA_Reboost.pdf
Pitch Short Deck KEA_Reboost.pdf
 
bipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docx
bipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docxbipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docx
bipolar disorderReferencesDuarte, W., Becerra, R., & Cruise, K.docx
 
Financials and Human Resource Planning MGT465 Version 2
Financials and Human Resource Planning MGT465 Version 2Financials and Human Resource Planning MGT465 Version 2
Financials and Human Resource Planning MGT465 Version 2
 
Financials and human resource planning mgt465 version 2
Financials and human resource planning mgt465 version 2Financials and human resource planning mgt465 version 2
Financials and human resource planning mgt465 version 2
 
Centers of Change
Centers of ChangeCenters of Change
Centers of Change
 
Finance in Cornwall - 10 May 2016 (Segment 2b)
Finance in Cornwall - 10 May 2016 (Segment 2b)Finance in Cornwall - 10 May 2016 (Segment 2b)
Finance in Cornwall - 10 May 2016 (Segment 2b)
 
Fractal analytics ace solution
Fractal analytics ace solutionFractal analytics ace solution
Fractal analytics ace solution
 
Business Valuation Tips and Traps
Business Valuation Tips and TrapsBusiness Valuation Tips and Traps
Business Valuation Tips and Traps
 
Optimise Learning Impact August 2010
Optimise Learning Impact August 2010Optimise Learning Impact August 2010
Optimise Learning Impact August 2010
 
Optimise Learning Impact August 2010
Optimise Learning Impact August 2010Optimise Learning Impact August 2010
Optimise Learning Impact August 2010
 
P4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdf
P4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdfP4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdf
P4I_Capacity Building Workshop 4_Deep Dive into TCFD_v1.0.pdf
 
Keeping up with Accounting - Business & Industry edition
Keeping up with Accounting - Business & Industry editionKeeping up with Accounting - Business & Industry edition
Keeping up with Accounting - Business & Industry edition
 

More from Rochester Security Summit

Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleRochester Security Summit
 
Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Rochester Security Summit
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudRochester Security Summit
 
State Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltState Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltRochester Security Summit
 
You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…Rochester Security Summit
 
A Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetA Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetRochester Security Summit
 

More from Rochester Security Summit (16)

IPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be IgnoredIPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be Ignored
 
Radio Reconnaissance in Penetration Testing
Radio Reconnaissance in Penetration TestingRadio Reconnaissance in Penetration Testing
Radio Reconnaissance in Penetration Testing
 
Real Business Threats!
Real Business Threats!Real Business Threats!
Real Business Threats!
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)
 
Dissecting the Hack: Malware Analysis 101
Dissecting the Hack: Malware Analysis 101 Dissecting the Hack: Malware Analysis 101
Dissecting the Hack: Malware Analysis 101
 
GRC– The Way Forward
GRC– The Way ForwardGRC– The Way Forward
GRC– The Way Forward
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public Cloud
 
Finding Patterns in Data Breaches
Finding Patterns in Data BreachesFinding Patterns in Data Breaches
Finding Patterns in Data Breaches
 
State Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltState Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork Quilt
 
It's All About the Data!
It's All About the Data!It's All About the Data!
It's All About the Data!
 
You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…
 
A Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetA Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT Budget
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
Firewall Defense against Covert Channels
Firewall Defense against Covert Channels Firewall Defense against Covert Channels
Firewall Defense against Covert Channels
 

Recently uploaded

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Recently uploaded (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Business Impact and Risk Assessments in Business Continuity and Disaster Recovery

  • 1. October 20, 2010 Presented By: Susan Kastan Penny Klein
  • 2. Bio  Susan Kastan has been in the information technology field for 20+ years, and currently specializes in Business Continuity. She has developed numerous security policies, procedures and plans for various government, association and private industry.  Penny Klein brings 20+ years of information assurance experience, specializing in IA policies. She has developed a Business Contingency Program for a major association, as well as policies, procedures and plans for numerous government and private industries October 20, 2010 2Kastan Consulting/PJKlein Consulting
  • 3. Business Continuity  Business Continuity – The smooth continuation of business activity despite an interruption of service  No size restrictions  Tailored to environment  Information technology as well as personnel and processes October 20, 2010 3Kastan Consulting/PJKlein Consulting
  • 4. Business Continuity  In the event a incident occurs:  Operations are likely to be disrupted  Offices are likely to be closed down or destroyed  People may get hurt or killed  People are likely to have their employment disrupted October 20, 2010 4Kastan Consulting/PJKlein Consulting
  • 5. Risk Assessment  Risk Assessment – Activities that discover an organization's vulnerabilities, threats and impact. Additionally , it identifies the countermeasure to mitigate the risk, the associated costs, and the risk tolerance (risk the organization is willing to accept) October 20, 2010 5Kastan Consulting/PJKlein Consulting
  • 6. Business Impact Assessment  Business Impact Assessment (BIA) - Analyzes mission criticality of all enterprise functions, the current threats, and consequences of losing some or all of these functions.  Also known as Business Impact Analysis October 20, 2010 6Kastan Consulting/PJKlein Consulting
  • 7. Steps in Business Continuity  Conduct Risk Assessment  Conduct BIA  Develop and Document  Train & Test  Implement  Maintain October 20, 2010 7Kastan Consulting/PJKlein Consulting
  • 8. Risk Assessment  Purpose of a Risk Assessment  Identifies current threats  Identifies current vulnerabilities  Identifies impact of the threats to the vulnerabilities  Provides for Risk Management, that is, what risk is the organization willing to accept, reduce/correct, or transfer October 20, 2010 8Kastan Consulting/PJKlein Consulting
  • 9. Business Impact Assessment  Identifies:  Mission Critical and Mission Essential Requirements  Recovery Phases  Critical Factors  Assumptions  Evaluation Criteria  Critical Dependencies  Recommendations October 20, 2010 9Kastan Consulting/PJKlein Consulting
  • 10. Business Impact Assessment  Benefits  Raises senior management’s awareness of the state of their business and helps to justify the need for a business continuity plan  Ensures that a suitable business continuity strategy and effective business continuity plan will be developed  Identifies and prioritizes recovery of mission critical business functions and processes October 20, 2010 10Kastan Consulting/PJKlein Consulting
  • 11. Business Impact Assessment  Benefits – cont’d  Identifies requirements for recovery of critical IT systems, applications, vital records, equipment and resources  Identifies extent of financial impact  Identifies extent of operational impact October 20, 2010 11Kastan Consulting/PJKlein Consulting
  • 12. Business Impact Assessment  Process  Awareness  Provide to Management and Team  Ensure buy-in to the process  Data Gathering  Management’s vision  Interviews and/or general surveys  Threat Analysis and Requirements Analysis  Reviews  Department review  Senior management review  Evaluation and Recommendation  Build recovery plans for “time sensitive”/mission critical plans October 20, 2010 12Kastan Consulting/PJKlein Consulting
  • 13. Business Impact Assessment  Awareness  Brief Senior Management and Stakeholders  GET BUY-IN  Provide a high level overview of the process  Identify benefits  Reference guide  Useful and easy to follow presentation of the data collected  Comprehensive view of all the requirements  Requirements guide for developing and implementing risk mitigation strategies  Provides validation and justification for funding all BCP requirements October 20, 2010 13Kastan Consulting/PJKlein Consulting
  • 14. Business Impact Assessment  Gather data  Business processes  Resources  Interdependencies  Impacts over time  Maximum Allowable Downtime (MAD)  Recovery Time Objective (RTO)  Recovery Point Objective (RPO) October 20, 2010 14Kastan Consulting/PJKlein Consulting
  • 15. Business Impact Assessment  Determine the impact of scenarios on processes  Loss of key people  Loss of location  Loss of power  Loss of communications  Loss of technology  Loss of information October 20, 2010 15Kastan Consulting/PJKlein Consulting
  • 16. Business Impact Assessment  Impact types/categories  Financial  Legal/regulatory  Customer loss/dissatisfaction  Reputation impact  Time sensitive material October 20, 2010 16Kastan Consulting/PJKlein Consulting
  • 17. Business Impact Assessment  Low - May result in the loss of some tangible assets or resources or may noticeably affect an organization’s mission, reputation, or interest.  Medium - May result in the costly loss of tangible assets or resources; may violate, harm, or impede an organization’s mission, reputation, or interest; or may result in human injury. Based on NIST 800-30 October 20, 2010 17Kastan Consulting/PJKlein Consulting
  • 18. Business Impact Assessment  High - May result in the highly costly loss of major tangible assets or resources; may significantly violate, harm, or impede an organization’s mission, reputation, or interest; or may result in human death or serious injury. Based on NIST 800-30 October 20, 2010 18Kastan Consulting/PJKlein Consulting
  • 19. Business Impact Assessment  Department Review  Changes  Inaccuracies/ misinterpretation  Verify timelines are correct  RTO  RPO  MAD October 20, 2010 19Kastan Consulting/PJKlein Consulting
  • 20. Business Impact Assessment  Senior Management Review  Prioritize for entire company  Determine path forward based on  Cost  Speed of Recovery  Quality  Impacts to business October 20, 2010 20Kastan Consulting/PJKlein Consulting
  • 21. Business Impact Assessment  Follow On  Take what you’ve learned and build out the Business Continuity Plan  BIA is the basis for the risk decisions  Start with most critical or time sensitive October 20, 2010 21Kastan Consulting/PJKlein Consulting
  • 22. Exercise  Santa attended a conference in January about business continuity.  He wants to put a business continuity plan in place.  It’s a little later than he would like, but he would like to start with the Business Impact Assessments.  Our goal:  Identify critical processes  Create list of top 10 October 20, 2010 22Kastan Consulting/PJKlein Consulting
  • 23. Exercise  Santa delivers 2 toys (or coal) to all children around the globe who believe in him  24 hours to do it  Santa is the President of Santa’s Workshop, Inc.  151,000+ employees  Week before (and Christmas day) is critical to him  Everyone believes what they do is critical to operations  A little bit of technology helps! October 20, 2010 Kastan Consulting/PJKlein Consulting 23
  • 24. Contact Information Penny Klein PJKlein Consulting, LLC Penny.Klein@ pjkleinllc.com www.pjkleinllc.com 703.901.1932 Susan Kastan Kastan Consulting, LLC Susan.Kastan@ kastanconsulting.com www.kastanconsulting.com 585.724.0804 October 20, 2010 24Kastan Consulting/PJKlein Consulting