SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
Contact us: info@alvinintegrated.com | +91 8802 505619, +91 8287509289
| www.alvinintegrated.com
Platinum Sponsor
OUR SPONSORS & PARTNERS
Event Partner
www.alvinintegrated.com
Knowledge Partners
27th FEB 2021
(SATURDAY)
09:00 AM - 17:30 PM IST
Speaker Introduction:
Rohit Verma
Mumbai, India
27 years of Industry experience/ CRP,
CBCP, CISA, CSP, CA, MBA, PGDFPS,
BS 25999 LA, OHSAS 18001 LA, ITDR,
BCM, Corporate Security, Health and
Safety, Operations Risk Management,
Compliance and Governance
Author of: The Emergency
Management Handbook
Mr Rohit has over 27 years of industry experience in Governance, Risk and Compliance in Business
Continuity Management, IT Disaster Recovery, Crisis Management, Operations Risk Management, Vendor
BCM Risk Management, Information Risk Management, Corporate Security and Health and Safety and
Auditing.
Rohit was Ex-General Manager in IBM, managing Global BCM Program. Prior to IBM, he was Vice President,
Country Head – Business Continuity Management, IT Disaster Recovery, Corporate Security, Health and
Safety in Barclays Bank Group, India. He was Assistant Vice President – Business Continuity Management
in Deutsche Bank Group, having a Regional role in South Asia.
Rohit has also worked with KPMG in their Information Risk Management Division, where he has conducted
IT Security audits for numerous national and MNC clients in India and UAE.
Rohit is a Certified Business Continuity Professional (CBCP) from Disaster Recovery International, USA. He
is also a Certified Information Systems Auditor (CISA) from ISACA (USA), Certified Risk Professional, BS
25999 Lead Auditor, Chartered Accountant, MBA, OHSAS 18001 Lead Auditor, Post Graduate Diploma in
Fire Protection and Safety (PGDFPS).
Rohit is a Guest Faculty with prominent Institutes / Bodies, on the subjects of Business Continuity
Management and Risk Management.
He is an author of a book on preparing and managing personal emergency situations.
His interests include Traveling, Teaching under-privileged children, Music, Reading, Writing poetry.
Connect at LinkedIn: https://www.linkedin.com/in/rohitvermabusinesscontinuity
Designing an effective Crisis
Management Framework
GIKS Summit | Online
Time: 09:55 am - 10:20 am
Date: 27th February 2021
By Mr Rohit Verma
Note for the participants:
Speaker will take
your questions
automatically.
If you have any
questions, please
comment in chat box.
Agenda
1. Crisis Management Framework
2. Command and Control Room
3. Crisis Communication Options
4. External Agencies
MURPHY’s LAWS
Q: Sir, how prepared are you for any Disasters ?
A: “Disaster ? What disaster ??....
I have not come across any disaster
in my 32 years of service”
Captain E.J. Smith
Titanic
14 Apr 1912
The risks we face today
Terrorism
Floods
Infrastructure failure
Riots, Violence
Fires
Earthquakes
Hazards / Risks
• Epidemic
• Pandemic
• Flood
• Tsunami
• Industrial incidents
• Social Engineering
• Cyber attacks
• Virus / IT Security threats
• Data Centre outage
• Cable Cut
• Power Outage
• UPS / DG Failure
• Short circuit
• Fire
• Earthquake
• Strikes
• Riots
• Lightning
• Bomb Threat
• Bomb Blast
• Fire
• Vehicle Crash
• Plane Crash
• Plane Hijack
• Train accidents
Internal
• Vandalism
• Key Person missing
• Hardware Error
• Software Error
• Network Failure
• Corrupted Data
• Lost Data
• Frauds
• Human Error
External
Page 15
Time and Impact relationship
Low
High
Crisis Management Framework
Crisis Management Framework
• Crisis Teams
• Command and Control
• Standing agenda
• Crisis Cards
• Notification Technology
• Crisis Communication Plan
• Crisis Simulation Exercises
• External Agencies
18
Command and Control Room
Location
−Physical or Virtual
Equipment
−2 landlines (with conference facility) from 2 different service providers
−Video conferencing
−Min 2 Desktops with Intranet and Internet connection
−Desktop LAN points
−Enough points for power connection / charging
−Display of emergency phone numbers
−Crisis Kit – Documents, all Call Trees
−Geographical maps for each location in the country
−White board, Flip Chart with stationery
−World Clocks
−TV and Radio with all news channels
19
Crisis Communication options
20
Communication Tools
1. Email – Outlook, Lotus Notes etc
2. Collaborative tools – MS Teams, Webex, Zoom, etc
3. Telephony
4. Emergency Notifications
What are these Tools dependent on ?
1. Third party ?
2. Internet ?
3. Active Directory?
4. DNS?
Functionality available
1. Email
2. Audio
3. Video
4. Chat / SMS
5. File sharing
What functionality will be lost of these Tools are down?
External Agencies
21
1. Floods, Heavy Rain
− Disaster Management Authority
− Meteorology Department
− Local Municipal Corporation
− Transport – Road, Railways, Air
2. Terrorist Attack
− Local Police
− Fire Brigade
− Nearest Hospital
3. IT Outage
− Network service providers
− Internet service providers
4. Fire
− Local Fire Brigade
− Nearest Hospital
5. Strikes / Bandhs / Riots
− Transport vendors
− Hotels
− Food vendors
6. Theft / Burglary
− Police
7. Epidemic / Pandemic
− World Health Organization
− International SOS
− Local Chemists
− Hospitals
8. Hacking / Cyber Attack
− IT Security Expert
− Forensic investigation
− Local Police
9. Building outage / Earthquake
− Alternate site vendors / WAR
− Real Estate Consultants
10. Supply Chain Outage
− Alternate Suppliers
Suggested Readings
• Business Continuity Management Handbook – Andrew Hiles
• www.continuitycentral.com - Jobs, Knowledge, News
• www.thebci.org - Knowledge, Events, News, Certifications
• www.drii.org - Knowledge, Events, Certifications
• www.bcm-institute.org – Courses, Certifications
Questions
are Welcome!
Please give your feedbacks in
the chat box about the webinar.
Thank You
Rohit Verma
M: 99 2093 2083
E: puremindbodysoul@gmail.com
The only thing harder than planning for an Emergency
is explaining why you didn’t !!

Mais conteúdo relacionado

Mais procurados

Snapshot Vested Gang Resistance for Students
Snapshot Vested Gang Resistance for StudentsSnapshot Vested Gang Resistance for Students
Snapshot Vested Gang Resistance for StudentsJeff Angermeyer
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceResolver Inc.
 
The Influence of Public Awareness and Transparency on Corporate Governance an...
The Influence of Public Awareness and Transparency on Corporate Governance an...The Influence of Public Awareness and Transparency on Corporate Governance an...
The Influence of Public Awareness and Transparency on Corporate Governance an...Global Risk Forum GRFDavos
 
Denial Of Service Attacks (1)
Denial Of Service Attacks (1)Denial Of Service Attacks (1)
Denial Of Service Attacks (1)Waheb Samaraie
 
Situational Awareness-Your BEST Security Tool
Situational Awareness-Your BEST Security ToolSituational Awareness-Your BEST Security Tool
Situational Awareness-Your BEST Security ToolDavid Santiago
 
Human Risk Management
Human Risk ManagementHuman Risk Management
Human Risk ManagementJohn Grennan
 
Cian Blackwell - Risk management and mitigation 2011
Cian Blackwell - Risk management and mitigation 2011Cian Blackwell - Risk management and mitigation 2011
Cian Blackwell - Risk management and mitigation 2011Irish Future Internet Forum
 
Reputation Risk: Why Companies Need to Care
Reputation Risk: Why Companies Need to CareReputation Risk: Why Companies Need to Care
Reputation Risk: Why Companies Need to CareEthisphere
 
Risk 101 – Know the Unknown by Nehru Nagappan
Risk 101 – Know the Unknown by Nehru NagappanRisk 101 – Know the Unknown by Nehru Nagappan
Risk 101 – Know the Unknown by Nehru NagappanBCM Institute
 

Mais procurados (16)

Snapshot Vested Gang Resistance for Students
Snapshot Vested Gang Resistance for StudentsSnapshot Vested Gang Resistance for Students
Snapshot Vested Gang Resistance for Students
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business Resilience
 
What cybersecurity risk management entails
What cybersecurity risk management entailsWhat cybersecurity risk management entails
What cybersecurity risk management entails
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Countering Cyber Threats
Countering Cyber ThreatsCountering Cyber Threats
Countering Cyber Threats
 
The Influence of Public Awareness and Transparency on Corporate Governance an...
The Influence of Public Awareness and Transparency on Corporate Governance an...The Influence of Public Awareness and Transparency on Corporate Governance an...
The Influence of Public Awareness and Transparency on Corporate Governance an...
 
Denial Of Service Attacks (1)
Denial Of Service Attacks (1)Denial Of Service Attacks (1)
Denial Of Service Attacks (1)
 
Situational Awareness-Your BEST Security Tool
Situational Awareness-Your BEST Security ToolSituational Awareness-Your BEST Security Tool
Situational Awareness-Your BEST Security Tool
 
CM FAll 2015
CM FAll 2015CM FAll 2015
CM FAll 2015
 
Human Risk Management
Human Risk ManagementHuman Risk Management
Human Risk Management
 
Cian Blackwell - Risk management and mitigation 2011
Cian Blackwell - Risk management and mitigation 2011Cian Blackwell - Risk management and mitigation 2011
Cian Blackwell - Risk management and mitigation 2011
 
Reputation Risk: Why Companies Need to Care
Reputation Risk: Why Companies Need to CareReputation Risk: Why Companies Need to Care
Reputation Risk: Why Companies Need to Care
 
Lesson 3 cmice
Lesson 3 cmiceLesson 3 cmice
Lesson 3 cmice
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Lloyds arup future cities 2017 energy
Lloyds arup future cities 2017 energyLloyds arup future cities 2017 energy
Lloyds arup future cities 2017 energy
 
Risk 101 – Know the Unknown by Nehru Nagappan
Risk 101 – Know the Unknown by Nehru NagappanRisk 101 – Know the Unknown by Nehru Nagappan
Risk 101 – Know the Unknown by Nehru Nagappan
 

Semelhante a Contact us: info@alvinintegrated.com | +91 8802 505619, +91 8287509289 | www.alvinintegrated.com

Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldJohn Palfreyman
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
Communications in a Disaster
Communications in a DisasterCommunications in a Disaster
Communications in a Disasterauthorsemporium
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of EngagementJohn Palfreyman
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoTMONICA-Project
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)Rohana K Amarakoon
 
Input on threat images against information society
Input on threat images against information societyInput on threat images against information society
Input on threat images against information societySomerco Research
 
Cyber Security Action Plan of RVNL
Cyber Security Action Plan of RVNLCyber Security Action Plan of RVNL
Cyber Security Action Plan of RVNLRajesh Prasad
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 febmharbpavia
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsFidelis Cybersecurity
 
BIFM Risk Management Event 8th September 2016
BIFM Risk Management Event 8th September 2016BIFM Risk Management Event 8th September 2016
BIFM Risk Management Event 8th September 2016Whitbags
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 

Semelhante a Contact us: info@alvinintegrated.com | +91 8802 505619, +91 8287509289 | www.alvinintegrated.com (20)

Abso lutely!
Abso lutely!Abso lutely!
Abso lutely!
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
Communications in a Disaster
Communications in a DisasterCommunications in a Disaster
Communications in a Disaster
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of Engagement
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoT
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Input on threat images against information society
Input on threat images against information societyInput on threat images against information society
Input on threat images against information society
 
Cyber Security Action Plan of RVNL
Cyber Security Action Plan of RVNLCyber Security Action Plan of RVNL
Cyber Security Action Plan of RVNL
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
BIFM Risk Management Event 8th September 2016
BIFM Risk Management Event 8th September 2016BIFM Risk Management Event 8th September 2016
BIFM Risk Management Event 8th September 2016
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
Cyber Threat Landscape
Cyber Threat LandscapeCyber Threat Landscape
Cyber Threat Landscape
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Crisis management 2013
Crisis management 2013Crisis management 2013
Crisis management 2013
 
Security in a Mobile World
Security in a Mobile WorldSecurity in a Mobile World
Security in a Mobile World
 

Mais de Alvin Integrated Services [AIS]

Pandemic: Crisis or Opportunity? ISO 22301 best practice Implementation tips ...
Pandemic: Crisis or Opportunity? ISO 22301 best practice Implementation tips ...Pandemic: Crisis or Opportunity? ISO 22301 best practice Implementation tips ...
Pandemic: Crisis or Opportunity? ISO 22301 best practice Implementation tips ...Alvin Integrated Services [AIS]
 
ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?Alvin Integrated Services [AIS]
 
Digital Maturity – Business as Usual & Integration of multiple ISO Management...
Digital Maturity – Business as Usual & Integration of multiple ISO Management...Digital Maturity – Business as Usual & Integration of multiple ISO Management...
Digital Maturity – Business as Usual & Integration of multiple ISO Management...Alvin Integrated Services [AIS]
 
Thinking beyond “Conventional” Crisis Communication.
Thinking beyond “Conventional” Crisis Communication.Thinking beyond “Conventional” Crisis Communication.
Thinking beyond “Conventional” Crisis Communication.Alvin Integrated Services [AIS]
 
Effective Leadership – The Cornerstone – applied study on ISO 22000:2018 Food...
Effective Leadership – The Cornerstone – applied study on ISO 22000:2018 Food...Effective Leadership – The Cornerstone – applied study on ISO 22000:2018 Food...
Effective Leadership – The Cornerstone – applied study on ISO 22000:2018 Food...Alvin Integrated Services [AIS]
 
COVID – 19 and Resilience: Has ISO 22316 standard been responsive?
COVID – 19 and Resilience: Has ISO 22316 standard been responsive?COVID – 19 and Resilience: Has ISO 22316 standard been responsive?
COVID – 19 and Resilience: Has ISO 22316 standard been responsive?Alvin Integrated Services [AIS]
 
Business Continuity Management System: How, Why and for What?
Business Continuity Management System: How, Why and for What?Business Continuity Management System: How, Why and for What?
Business Continuity Management System: How, Why and for What?Alvin Integrated Services [AIS]
 
ISO 31000:2018 Risk Management System, Framework and Implementation
ISO 31000:2018 Risk Management System, Framework and ImplementationISO 31000:2018 Risk Management System, Framework and Implementation
ISO 31000:2018 Risk Management System, Framework and ImplementationAlvin Integrated Services [AIS]
 

Mais de Alvin Integrated Services [AIS] (8)

Pandemic: Crisis or Opportunity? ISO 22301 best practice Implementation tips ...
Pandemic: Crisis or Opportunity? ISO 22301 best practice Implementation tips ...Pandemic: Crisis or Opportunity? ISO 22301 best practice Implementation tips ...
Pandemic: Crisis or Opportunity? ISO 22301 best practice Implementation tips ...
 
ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?
 
Digital Maturity – Business as Usual & Integration of multiple ISO Management...
Digital Maturity – Business as Usual & Integration of multiple ISO Management...Digital Maturity – Business as Usual & Integration of multiple ISO Management...
Digital Maturity – Business as Usual & Integration of multiple ISO Management...
 
Thinking beyond “Conventional” Crisis Communication.
Thinking beyond “Conventional” Crisis Communication.Thinking beyond “Conventional” Crisis Communication.
Thinking beyond “Conventional” Crisis Communication.
 
Effective Leadership – The Cornerstone – applied study on ISO 22000:2018 Food...
Effective Leadership – The Cornerstone – applied study on ISO 22000:2018 Food...Effective Leadership – The Cornerstone – applied study on ISO 22000:2018 Food...
Effective Leadership – The Cornerstone – applied study on ISO 22000:2018 Food...
 
COVID – 19 and Resilience: Has ISO 22316 standard been responsive?
COVID – 19 and Resilience: Has ISO 22316 standard been responsive?COVID – 19 and Resilience: Has ISO 22316 standard been responsive?
COVID – 19 and Resilience: Has ISO 22316 standard been responsive?
 
Business Continuity Management System: How, Why and for What?
Business Continuity Management System: How, Why and for What?Business Continuity Management System: How, Why and for What?
Business Continuity Management System: How, Why and for What?
 
ISO 31000:2018 Risk Management System, Framework and Implementation
ISO 31000:2018 Risk Management System, Framework and ImplementationISO 31000:2018 Risk Management System, Framework and Implementation
ISO 31000:2018 Risk Management System, Framework and Implementation
 

Último

Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 

Último (20)

Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 

Contact us: info@alvinintegrated.com | +91 8802 505619, +91 8287509289 | www.alvinintegrated.com

  • 1. Contact us: info@alvinintegrated.com | +91 8802 505619, +91 8287509289 | www.alvinintegrated.com Platinum Sponsor OUR SPONSORS & PARTNERS Event Partner www.alvinintegrated.com Knowledge Partners 27th FEB 2021 (SATURDAY) 09:00 AM - 17:30 PM IST
  • 2. Speaker Introduction: Rohit Verma Mumbai, India 27 years of Industry experience/ CRP, CBCP, CISA, CSP, CA, MBA, PGDFPS, BS 25999 LA, OHSAS 18001 LA, ITDR, BCM, Corporate Security, Health and Safety, Operations Risk Management, Compliance and Governance Author of: The Emergency Management Handbook Mr Rohit has over 27 years of industry experience in Governance, Risk and Compliance in Business Continuity Management, IT Disaster Recovery, Crisis Management, Operations Risk Management, Vendor BCM Risk Management, Information Risk Management, Corporate Security and Health and Safety and Auditing. Rohit was Ex-General Manager in IBM, managing Global BCM Program. Prior to IBM, he was Vice President, Country Head – Business Continuity Management, IT Disaster Recovery, Corporate Security, Health and Safety in Barclays Bank Group, India. He was Assistant Vice President – Business Continuity Management in Deutsche Bank Group, having a Regional role in South Asia. Rohit has also worked with KPMG in their Information Risk Management Division, where he has conducted IT Security audits for numerous national and MNC clients in India and UAE. Rohit is a Certified Business Continuity Professional (CBCP) from Disaster Recovery International, USA. He is also a Certified Information Systems Auditor (CISA) from ISACA (USA), Certified Risk Professional, BS 25999 Lead Auditor, Chartered Accountant, MBA, OHSAS 18001 Lead Auditor, Post Graduate Diploma in Fire Protection and Safety (PGDFPS). Rohit is a Guest Faculty with prominent Institutes / Bodies, on the subjects of Business Continuity Management and Risk Management. He is an author of a book on preparing and managing personal emergency situations. His interests include Traveling, Teaching under-privileged children, Music, Reading, Writing poetry. Connect at LinkedIn: https://www.linkedin.com/in/rohitvermabusinesscontinuity
  • 3. Designing an effective Crisis Management Framework GIKS Summit | Online Time: 09:55 am - 10:20 am Date: 27th February 2021 By Mr Rohit Verma
  • 4. Note for the participants: Speaker will take your questions automatically. If you have any questions, please comment in chat box.
  • 5. Agenda 1. Crisis Management Framework 2. Command and Control Room 3. Crisis Communication Options 4. External Agencies
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Q: Sir, how prepared are you for any Disasters ? A: “Disaster ? What disaster ??.... I have not come across any disaster in my 32 years of service” Captain E.J. Smith Titanic 14 Apr 1912
  • 14. The risks we face today Terrorism Floods Infrastructure failure Riots, Violence Fires Earthquakes
  • 15. Hazards / Risks • Epidemic • Pandemic • Flood • Tsunami • Industrial incidents • Social Engineering • Cyber attacks • Virus / IT Security threats • Data Centre outage • Cable Cut • Power Outage • UPS / DG Failure • Short circuit • Fire • Earthquake • Strikes • Riots • Lightning • Bomb Threat • Bomb Blast • Fire • Vehicle Crash • Plane Crash • Plane Hijack • Train accidents Internal • Vandalism • Key Person missing • Hardware Error • Software Error • Network Failure • Corrupted Data • Lost Data • Frauds • Human Error External Page 15
  • 16. Time and Impact relationship Low High
  • 18. Crisis Management Framework • Crisis Teams • Command and Control • Standing agenda • Crisis Cards • Notification Technology • Crisis Communication Plan • Crisis Simulation Exercises • External Agencies 18
  • 19. Command and Control Room Location −Physical or Virtual Equipment −2 landlines (with conference facility) from 2 different service providers −Video conferencing −Min 2 Desktops with Intranet and Internet connection −Desktop LAN points −Enough points for power connection / charging −Display of emergency phone numbers −Crisis Kit – Documents, all Call Trees −Geographical maps for each location in the country −White board, Flip Chart with stationery −World Clocks −TV and Radio with all news channels 19
  • 20. Crisis Communication options 20 Communication Tools 1. Email – Outlook, Lotus Notes etc 2. Collaborative tools – MS Teams, Webex, Zoom, etc 3. Telephony 4. Emergency Notifications What are these Tools dependent on ? 1. Third party ? 2. Internet ? 3. Active Directory? 4. DNS? Functionality available 1. Email 2. Audio 3. Video 4. Chat / SMS 5. File sharing What functionality will be lost of these Tools are down?
  • 21. External Agencies 21 1. Floods, Heavy Rain − Disaster Management Authority − Meteorology Department − Local Municipal Corporation − Transport – Road, Railways, Air 2. Terrorist Attack − Local Police − Fire Brigade − Nearest Hospital 3. IT Outage − Network service providers − Internet service providers 4. Fire − Local Fire Brigade − Nearest Hospital 5. Strikes / Bandhs / Riots − Transport vendors − Hotels − Food vendors 6. Theft / Burglary − Police 7. Epidemic / Pandemic − World Health Organization − International SOS − Local Chemists − Hospitals 8. Hacking / Cyber Attack − IT Security Expert − Forensic investigation − Local Police 9. Building outage / Earthquake − Alternate site vendors / WAR − Real Estate Consultants 10. Supply Chain Outage − Alternate Suppliers
  • 22. Suggested Readings • Business Continuity Management Handbook – Andrew Hiles • www.continuitycentral.com - Jobs, Knowledge, News • www.thebci.org - Knowledge, Events, News, Certifications • www.drii.org - Knowledge, Events, Certifications • www.bcm-institute.org – Courses, Certifications
  • 24. Please give your feedbacks in the chat box about the webinar. Thank You Rohit Verma M: 99 2093 2083 E: puremindbodysoul@gmail.com The only thing harder than planning for an Emergency is explaining why you didn’t !!