Business Continuity Planning

Institute for Business Continuity Training
Institute for Business Continuity TrainingInstitute for Business Continuity Training
This continues the “DO: Operation” session
Institute for Business Continuity Training www.IBCT.com 1
Risk Assessments
In Business Continuity, we tend
to use the
Business Unit Risk
Assessment method.
2Institute for Business Continuity Training www.IBCT.com
Overlooking a serious risk
can be dangerous
Threats to Key Business Activities
Institute for Business Continuity Training www.IBCT.com 3
 If we are only going to look at the negative effects of risk
(threats), then we do not actually need to conduct a
traditional risk assessment at all. Instead, we need to
perform a more focused vulnerability/threat assessment.
This means that we focus only on those potentially
disruptive incidents that could have a negative impact on
our operations, and only as they apply to that subset of
business operations known as our key business activities.
There is a very short list of such threats and most of
them are common to all organizations.
Institute for Business Continuity Training www.IBCT.com 4
 Using an “all hazards” approach, we focus only on those
potentially disruptive incidents that could have a negative effect
on our business processes.
 And we look only as they apply to that subset of business
operations known as our key business activities (20/80 rule).
 Essentially, all such events will be caused by either a loss of
key property (e.g. buildings, equipment, etc.), a loss of key
people, a loss of key processes, or possibly two or three
simultaneously
All Hazards Approach to Risk Assessment
Threats to Key Business Activities
P
R
O
C
E
S
S
TECHNOLOGIES
Institute for Business Continuity Training www.IBCT.com 5
Threats to Key Business Activities
Loss of Key People
- Loss of key staff
(unable or unwilling
to work)
- Can be short-term,
long-term, or
permanent
P
R
O
C
E
S
S
Institute for Business Continuity Training www.IBCT.com 6
TECHNOLOGIES
Threats to Key Business Activities
P
R
O
C
E
S
S
Institute for Business Continuity Training www.IBCT.com 7
TECHNOLOGIES
Loss of Key
Process Resources
 Key vendor
services
 Financials
 Contractuals
 Can be triggered
by local, area, or
regional event
 Can be short-
term, long-term,
or permanent
Threats to Key Business Activities
P
R
O
C
E
S
S
Institute for Business Continuity Training www.IBCT.com 8
TECHNOLOGIES
Loss of Key
Property
 Technology
 Work Facilities
 Inventory
 Data Center
 Equipment
 Can be short-term,
long-term, or
permanent
 In the BIA, we identified the resources each key business
activity is dependent upon for normal operation
 Key resources may include:
 Trained staff
 Office facilities
 Plant facilities
 Workstations
 Computer systems
 Electronic data
 Hard copy data
 Voice communication
systems
 External network
connectivity
 Specialized equipment
 Materials and supplies
 Key suppliers, etc.
 We need to determine the vulnerability of these key resources (people,
process, or technology) – their risk exposure or residual risk - which
could result in disruption to key business activities
9Institute for Business Continuity Training www.IBCT.com
Conducting a Business Unit Risk Assessment
Threats to Key Business Activities
Institute for Business Continuity Training www.IBCT.com 10
An example of this approach to risk:
Hazard Risk to Service
Data stolen/lost
Data loss
Destruction of paper files
Failure of back up or failsafe
HHD Failure
Temporary loss of connection
Damage to internal telephone network
ICT Failure
Damage to the data network
Destruction of active directory
Localised hardware failure
Loss of major application
Loss of minor application
Loss of mobile/telephone phone networks
Loss of switchboard
Server failure
Threats to Key Business Activities
Institute for Business Continuity Training www.IBCT.com 11
An example of this approach to risk:
Hazard Risk to Service
Contamination
Loss of operating premises
Disruption to direct medical gas
Disruption to water supplies
Electric Supply Disruption
Failure of fixed equipment
Fire
Flooding
Introduction of cordon
Loss of heating/cooling
Structural defect/failure
Threats to Key Business Activities
Institute for Business Continuity Training www.IBCT.com 12
An example of this approach to risk:
Hazard Risk to Service
Mass layoff notices
Key Staffing Shortage
Epidemic illness
Industrial Action
Pandemic illness
School closures
Sudden onset demand
Transport disruption
Contamination/product quality
Supplier Failure
Contract Breach
Failure to fund/supply
Strike action by drivers
Strike action by key supplier
Key supplier goes out of business
Supply chain collapse
Protective measures may include:
 Cross-training of staff
 Building security
 Alternate work locations
 Backup computer systems
 Off-site data backups
 In-bound call redirection
 Redundant communication links
 Regular equipment maintenance
 Backup power systems
 Alternate suppliers, etc.
Step 1
Deliverables:
• Updated matrix with resource
protection ratings, and each key
activity’s ‘Risk Exposure’
• Ranking of Key Activities by
vulnerability, and ranking of
threats by overall extent of
potential business interruption
Conduct workshops with Business
Unit SME’s, IT, facilities, etc. to:
•Review measures in place to
protect key resources from loss
•Assess the level of protection
for each resource and assign a
percentage rating
13Institute for Business Continuity Training www.IBCT.com
Conducting a Business Unit Risk Assessment
POTENTIAL THREATS SEVERITY COVERAGE (measures in place) RISK
n/a L M H 0% 20% 40% 60% 80% 100% EXPOSURE
1. Loss of key staff 4 4 40
2. Loss of office facilities 4 4 100
3. Loss of AS/400 systems 4 4 60
4. Loss of AS/400 data 4 4 40
5. Loss of PC/LAN systems 4 4 20
6. Loss of PC/LAN data 4 4 2
7. Loss of hardcopy records 4 4 2
8.
Loss of phone system
(voice)
4 4 100
9. Loss of voicemail system 4 4 6
10.
Loss of external data/fax
links
4 4 80
11.
Loss of mail delivery
service
4 4 2
12.
Loss of other external
services
4 4 100
Severity Levels: High = 100,
Moderate = 50, Low = 10
Risk Exposure: Severity Level x
(100% - Coverage%)
Conducting a Business Unit Risk Assessment
Key Business Activity: Call Center
14Institute for Business Continuity Training www.IBCT.com
Conducting a Business Unit Risk Assessment
Potential Threat Scenarios
 A ‘Potential Threat Scenario’ is a specific situation, resulting from any internal
or external event, which may cause widespread interruption in the
organization’s operations for an extended period of time
 Such a scenario could be a catastrophic incident, such as destruction of a
building, or a relatively minor incident, such as failure of a single piece of key
equipment
Step 2
Deliverables:
• List of Potential Threat Scenarios
showing the Key Business
Resources that are at greatest
risk
Based on the results of the BIA/RA,
identify the ‘Threat Scenarios’ for
which business continuity
strategies should be developed
15Institute for Business Continuity Training www.IBCT.com
0 200 400 600 800 1000 1200 1400 1600
Loss of key personnel
Loss of office facility
Loss of AS/400 systems
Loss of AS/400 data
Loss of PC/LAN systems
Loss of PC/LAN data
Loss of hardcopy records
Loss of phone system (voice)
Loss of voicemail system
Loss of external data/fax links
Loss of mail delivery service
Loss of other external services
Exposureby Threat Scenario
Conducting a Business Unit Risk Assessment
16Institute for Business Continuity Training www.IBCT.com
 ‘Single points of failure’ may include:
 Key staff with specialized knowledge
 System components which cannot
readily be replaced
 Non-redundant communication links
 Critical data which is not backed up
 Telephony systems
 Specialized manufacturing
equipment
 ‘Sole source’ suppliers, etc.
Conducting a Business Unit Risk Assessment
 SINGLE POINTS OF FAILURE (SPOFs)
 It is exceptionally important to identify any potential ‘single points
of failure’ within the resources supporting the various business
activities
 Loss of a ‘SPOF’ can lead to the failure of a key business activity
17Institute for Business Continuity Training www.IBCT.com
Conducting a Business Unit Risk Assessment
Step 3
Presenting BIA/RA results to Management
 Getting management’s endorsement of the BIA/RA results and
recommendations is crucial
 When presenting the results to Senior Management, do not present reams of
statistics and technical details
 Present the results in a straightforward fashion that they can relate to
Deliverables:
• BIA/RA report
• Executive presentation
Prepare a report summarizing the
results and your recommendations,
and present to:
•Business Unit management (for
validation)
•Senior Management (for action)
18Institute for Business Continuity Training www.IBCT.com
Risk Assessment Summary
 One of the primary goals of a BCMS is to prevent avoidable
interruptions in the company’s operations
 Hence, it is essential to understand the threats to continued
operation, and the company’s vulnerability to those threats
 Identifying the KBAs’ resource dependencies and the risks facing
those resources (residual risk/risk exposure) will help in the
development of strategies and plans
 Ranking of the key business activities’ risk exposure (threat
scenarios) helps determine which activities require continuity
strategies
19Institute for Business Continuity Training www.IBCT.com
The Keys to Success
 Conducting a BIA/RA is not rocket science, but …
 every department must follow a consistent methodology to
ensure the results will be meaningful
 standard data collection formats and terminology must be
used to avoid misinterpretation, and facilitate analysis and
reporting
 participants must be guided through the process, not just left
to fend for themselves
 The use of templates or software tools alone will not ensure these
goals are met – you have to know what you are trying to
accomplish, and how to do it!
20Institute for Business Continuity Training www.IBCT.com
Institute for Business Continuity Training www.IBCT.com 21
Activity
The Steering Committee has decided to proceed with a
Risk Assessment pilot project. Using the ‘Threat
Assessment’ template:
1. For each Business Activity in your Business Unit (or
organization), list the Potential Risks that could affect this
Activity.
2. Risks should be expressed in terms of the loss of essential
resources (e.g. loss of facilities, loss of computer equipment,
loss of specialized equipment, loss of key personnel, etc.).
Threat Assessment Worksheet
ISO 22301 Risk Assessment Company: ABC Global
27-Aug-14 Activity: Department: XYZ
POTENTIAL RISKS SEVERITY COVERAGE EXPOSURE COMMENTS
n/a L M H 0-19% 20-39% 40-59% 60-79% 80-99% 100% SCORE
Institute for Business Continuity Training www.IBCT.com 22
Institute for Business Continuity Training www.IBCT.com 23
Activity
The Steering Committee has decided to proceed with a
Risk Assessment pilot project. Using the ‘Threat
Assessment’ template:
1. For each Activity, rank the severity of each Risk based on how
disruptive it would be to normal operations. The severity levels
are:
 H = highly disruptive (the Activity could not be performed at
an acceptable level) = 100 points;
 M = moderately disruptive (the Activity could still be
performed but at a significantly degraded level) = 50 points;
 L = low disruption (the Activity could still be performed with
only minor degradation) = 10 points;
 N/A = not applicable (the Risk would not affect this Activity).
Threat Assessment Worksheet
ISO 22301 Risk Assessment Company: ABC Global
27-Aug-14 Activity: Department: XYZ
POTENTIAL RISKS SEVERITY COVERAGE EXPOSURE COMMENTS
n/a L M H 0-19% 20-39% 40-59% 60-79% 80-99% 100% SCORE
Institute for Business Continuity Training www.IBCT.com 24
Institute for Business Continuity Training www.IBCT.com 25
Activity
The Steering Committee has decided to proceed with a
Risk Assessment pilot project. Using the ‘Threat
Assessment’ template:
1. For each Risk (except any that are 'not applicable'), estimate the
degree of coverage (0 - 19%, 20 - 39%, 40 - 59 %, 60 - 79%, 80 -
99%, or 100%) by checking off (x) the appropriate box.
2. This estimate should be based on the extent to which measures
are in place to deter the Risk or to ‘work around’ the loss of the
specific resource.
Threat Assessment Worksheet
ISO 22301 Risk Assessment Company: ABC Global
27-Aug-14 Activity: Department: XYZ
POTENTIAL RISKS SEVERITY COVERAGE EXPOSURE COMMENTS
n/a L M H 0-19% 20-39% 40-59% 60-79% 80-99% 100% SCORE
Institute for Business Continuity Training www.IBCT.com 26
Institute for Business Continuity Training www.IBCT.com 27
Activity
The Steering Committee has decided to proceed with a
Risk Assessment pilot project. Using the ‘Threat
Assessment’ template:
1. For each Risk, calculate the Exposure Score
Severity - (Severity x degree of coverage) = Exposure Score.
L = 10
M = 50
H = 100
Threat Assessment Worksheet
ISO 22301 Risk Assessment Company: ABC Global
27-Aug-14 Activity: Department: XYZ
POTENTIAL RISKS SEVERITY COVERAGE EXPOSURE COMMENTS
n/a L M H 0-19% 20-39% 40-59% 60-79% 80-99% 100% SCORE
Institute for Business Continuity Training www.IBCT.com 28
 New terms:
 MTPD/MAO
 MBCO
 RTO
 RPO
 SPOFs
 A BIA/Risk Assessment enables you to:
 Identify all company business activities
 Determine the consequences of interrupting these activities
 Prioritize the time-sensitivity of these consequences
 Identify the most time-sensitive business activities (80/20 rule)
 Determine minimum resources necessary to maintain the most
time-sensitive business activities
 Identify those key business activities that are most exposed to
interruption – and need strong protective measures (strategies)
Points to Remember
29Institute for Business Continuity Training www.IBCT.com
The “DO: Operation” session continues in the next section.
Institute for Business Continuity Training www.IBCT.com 30
1 de 30

Recomendados

Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planningalanlund
9.4K visualizações18 slides
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop FinalBill Lisse
3.7K visualizações51 slides
Business Continuity ManagementBusiness Continuity Management
Business Continuity ManagementECC International
3.7K visualizações16 slides
Business continuityBusiness continuity
Business continuityAlka Mehar
106 visualizações39 slides

Mais conteúdo relacionado

Mais procurados(20)

Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
Narudom Roongsiriwong, CISSP51.5K visualizações
BCP Awareness BCP Awareness
BCP Awareness
Imad Almurib7.3K visualizações
Business Continuity Planning Presentation OverviewBusiness Continuity Planning Presentation Overview
Business Continuity Planning Presentation Overview
Bob Winkler7.3K visualizações
Introduction to Business Continuity ManagementIntroduction to Business Continuity Management
Introduction to Business Continuity Management
Prof. David E. Alexander (UCL)4.4K visualizações
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
Adv Prashant Mali5.5K visualizações
ISO 22301 Business Continuity ManagementISO 22301 Business Continuity Management
ISO 22301 Business Continuity Management
Ramiro Cid21.9K visualizações
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
Dipankar Ghosh2.2K visualizações
A Top Down Business Impact Analyses Method V5A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5
Gewurtz3.1K visualizações
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
John Wilson2.3K visualizações
BcpBcp
Bcp
madunix2K visualizações
Business Continuity PlanBusiness Continuity Plan
Business Continuity Plan
Plash Chowdhary6.6K visualizações
2015-01- BCP Assessment QA.pdf2015-01- BCP Assessment QA.pdf
2015-01- BCP Assessment QA.pdf
Hamisi Mohamedi115 visualizações
Risk Management ERM PresentationRisk Management ERM Presentation
Risk Management ERM Presentation
alygale10.5K visualizações
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
gcleary2K visualizações
Business continuity overview slideshareBusiness continuity overview slideshare
Business continuity overview slideshare
Chris Greenhill26.9K visualizações
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recovery
KrutiShah114481 visualizações

Similar a Business Continuity Planning

Qatar ProposalQatar Proposal
Qatar ProposalAbsar Husain
349 visualizações14 slides
2009_NYC_OpRiskUSA_Conf2009_NYC_OpRiskUSA_Conf
2009_NYC_OpRiskUSA_ConfPeter Poulos
235 visualizações13 slides
Security & Risk ManagementSecurity & Risk Management
Security & Risk ManagementAhmed Sayed-
224 visualizações31 slides

Similar a Business Continuity Planning(20)

operations risk management power point presentation.operations risk management power point presentation.
operations risk management power point presentation.
Miyelani Shibambo2.7K visualizações
Business continuity planning guideBusiness continuity planning guide
Business continuity planning guide
CenapSerdarolu27 visualizações
Business continuity planning guideBusiness continuity planning guide
Business continuity planning guide
AstalapulosListestos72 visualizações
Qatar ProposalQatar Proposal
Qatar Proposal
Absar Husain349 visualizações
2009_NYC_OpRiskUSA_Conf2009_NYC_OpRiskUSA_Conf
2009_NYC_OpRiskUSA_Conf
Peter Poulos235 visualizações
Security & Risk ManagementSecurity & Risk Management
Security & Risk Management
Ahmed Sayed-224 visualizações
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
Pandiya Rajan2 visualizações
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
Continuity and Resilience1.2K visualizações
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery
EC-Council748 visualizações
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
Invensis Learning7.7K visualizações
Pay Me Now or Pay Me A Lot More LaterPay Me Now or Pay Me A Lot More Later
Pay Me Now or Pay Me A Lot More Later
RLE Technologies871 visualizações
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
Miriam O'Brien430 visualizações
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
Miriam O'Brien1.5K visualizações
Risk Assessment vs. Risk Management in ManufacturingRisk Assessment vs. Risk Management in Manufacturing
Risk Assessment vs. Risk Management in Manufacturing
ContentAssets428 visualizações
BCI Counting The CostBCI Counting The Cost
BCI Counting The Cost
haemmerle-consulting711 visualizações
Analyzing and managing reputational riskAnalyzing and managing reputational risk
Analyzing and managing reputational risk
Dawn Simpson2K visualizações

Último(9)

Don't play the Blame GameDon't play the Blame Game
Don't play the Blame Game
schlimbachmichael44 visualizações
What Is Psychological Safety?What Is Psychological Safety?
What Is Psychological Safety?
Alex Clapson9 visualizações
The Wheel of Life - Coaching WheelThe Wheel of Life - Coaching Wheel
The Wheel of Life - Coaching Wheel
Alex Clapson10 visualizações
balixa.io Plan.pdfbalixa.io Plan.pdf
balixa.io Plan.pdf
tycoonone9110 visualizações
TITAN SUBMARINETITAN SUBMARINE
TITAN SUBMARINE
supiriyakithuva13 visualizações

Business Continuity Planning

  • 1. This continues the “DO: Operation” session Institute for Business Continuity Training www.IBCT.com 1
  • 2. Risk Assessments In Business Continuity, we tend to use the Business Unit Risk Assessment method. 2Institute for Business Continuity Training www.IBCT.com Overlooking a serious risk can be dangerous
  • 3. Threats to Key Business Activities Institute for Business Continuity Training www.IBCT.com 3  If we are only going to look at the negative effects of risk (threats), then we do not actually need to conduct a traditional risk assessment at all. Instead, we need to perform a more focused vulnerability/threat assessment. This means that we focus only on those potentially disruptive incidents that could have a negative impact on our operations, and only as they apply to that subset of business operations known as our key business activities. There is a very short list of such threats and most of them are common to all organizations.
  • 4. Institute for Business Continuity Training www.IBCT.com 4  Using an “all hazards” approach, we focus only on those potentially disruptive incidents that could have a negative effect on our business processes.  And we look only as they apply to that subset of business operations known as our key business activities (20/80 rule).  Essentially, all such events will be caused by either a loss of key property (e.g. buildings, equipment, etc.), a loss of key people, a loss of key processes, or possibly two or three simultaneously All Hazards Approach to Risk Assessment
  • 5. Threats to Key Business Activities P R O C E S S TECHNOLOGIES Institute for Business Continuity Training www.IBCT.com 5
  • 6. Threats to Key Business Activities Loss of Key People - Loss of key staff (unable or unwilling to work) - Can be short-term, long-term, or permanent P R O C E S S Institute for Business Continuity Training www.IBCT.com 6 TECHNOLOGIES
  • 7. Threats to Key Business Activities P R O C E S S Institute for Business Continuity Training www.IBCT.com 7 TECHNOLOGIES Loss of Key Process Resources  Key vendor services  Financials  Contractuals  Can be triggered by local, area, or regional event  Can be short- term, long-term, or permanent
  • 8. Threats to Key Business Activities P R O C E S S Institute for Business Continuity Training www.IBCT.com 8 TECHNOLOGIES Loss of Key Property  Technology  Work Facilities  Inventory  Data Center  Equipment  Can be short-term, long-term, or permanent
  • 9.  In the BIA, we identified the resources each key business activity is dependent upon for normal operation  Key resources may include:  Trained staff  Office facilities  Plant facilities  Workstations  Computer systems  Electronic data  Hard copy data  Voice communication systems  External network connectivity  Specialized equipment  Materials and supplies  Key suppliers, etc.  We need to determine the vulnerability of these key resources (people, process, or technology) – their risk exposure or residual risk - which could result in disruption to key business activities 9Institute for Business Continuity Training www.IBCT.com Conducting a Business Unit Risk Assessment
  • 10. Threats to Key Business Activities Institute for Business Continuity Training www.IBCT.com 10 An example of this approach to risk: Hazard Risk to Service Data stolen/lost Data loss Destruction of paper files Failure of back up or failsafe HHD Failure Temporary loss of connection Damage to internal telephone network ICT Failure Damage to the data network Destruction of active directory Localised hardware failure Loss of major application Loss of minor application Loss of mobile/telephone phone networks Loss of switchboard Server failure
  • 11. Threats to Key Business Activities Institute for Business Continuity Training www.IBCT.com 11 An example of this approach to risk: Hazard Risk to Service Contamination Loss of operating premises Disruption to direct medical gas Disruption to water supplies Electric Supply Disruption Failure of fixed equipment Fire Flooding Introduction of cordon Loss of heating/cooling Structural defect/failure
  • 12. Threats to Key Business Activities Institute for Business Continuity Training www.IBCT.com 12 An example of this approach to risk: Hazard Risk to Service Mass layoff notices Key Staffing Shortage Epidemic illness Industrial Action Pandemic illness School closures Sudden onset demand Transport disruption Contamination/product quality Supplier Failure Contract Breach Failure to fund/supply Strike action by drivers Strike action by key supplier Key supplier goes out of business Supply chain collapse
  • 13. Protective measures may include:  Cross-training of staff  Building security  Alternate work locations  Backup computer systems  Off-site data backups  In-bound call redirection  Redundant communication links  Regular equipment maintenance  Backup power systems  Alternate suppliers, etc. Step 1 Deliverables: • Updated matrix with resource protection ratings, and each key activity’s ‘Risk Exposure’ • Ranking of Key Activities by vulnerability, and ranking of threats by overall extent of potential business interruption Conduct workshops with Business Unit SME’s, IT, facilities, etc. to: •Review measures in place to protect key resources from loss •Assess the level of protection for each resource and assign a percentage rating 13Institute for Business Continuity Training www.IBCT.com Conducting a Business Unit Risk Assessment
  • 14. POTENTIAL THREATS SEVERITY COVERAGE (measures in place) RISK n/a L M H 0% 20% 40% 60% 80% 100% EXPOSURE 1. Loss of key staff 4 4 40 2. Loss of office facilities 4 4 100 3. Loss of AS/400 systems 4 4 60 4. Loss of AS/400 data 4 4 40 5. Loss of PC/LAN systems 4 4 20 6. Loss of PC/LAN data 4 4 2 7. Loss of hardcopy records 4 4 2 8. Loss of phone system (voice) 4 4 100 9. Loss of voicemail system 4 4 6 10. Loss of external data/fax links 4 4 80 11. Loss of mail delivery service 4 4 2 12. Loss of other external services 4 4 100 Severity Levels: High = 100, Moderate = 50, Low = 10 Risk Exposure: Severity Level x (100% - Coverage%) Conducting a Business Unit Risk Assessment Key Business Activity: Call Center 14Institute for Business Continuity Training www.IBCT.com
  • 15. Conducting a Business Unit Risk Assessment Potential Threat Scenarios  A ‘Potential Threat Scenario’ is a specific situation, resulting from any internal or external event, which may cause widespread interruption in the organization’s operations for an extended period of time  Such a scenario could be a catastrophic incident, such as destruction of a building, or a relatively minor incident, such as failure of a single piece of key equipment Step 2 Deliverables: • List of Potential Threat Scenarios showing the Key Business Resources that are at greatest risk Based on the results of the BIA/RA, identify the ‘Threat Scenarios’ for which business continuity strategies should be developed 15Institute for Business Continuity Training www.IBCT.com
  • 16. 0 200 400 600 800 1000 1200 1400 1600 Loss of key personnel Loss of office facility Loss of AS/400 systems Loss of AS/400 data Loss of PC/LAN systems Loss of PC/LAN data Loss of hardcopy records Loss of phone system (voice) Loss of voicemail system Loss of external data/fax links Loss of mail delivery service Loss of other external services Exposureby Threat Scenario Conducting a Business Unit Risk Assessment 16Institute for Business Continuity Training www.IBCT.com
  • 17.  ‘Single points of failure’ may include:  Key staff with specialized knowledge  System components which cannot readily be replaced  Non-redundant communication links  Critical data which is not backed up  Telephony systems  Specialized manufacturing equipment  ‘Sole source’ suppliers, etc. Conducting a Business Unit Risk Assessment  SINGLE POINTS OF FAILURE (SPOFs)  It is exceptionally important to identify any potential ‘single points of failure’ within the resources supporting the various business activities  Loss of a ‘SPOF’ can lead to the failure of a key business activity 17Institute for Business Continuity Training www.IBCT.com
  • 18. Conducting a Business Unit Risk Assessment Step 3 Presenting BIA/RA results to Management  Getting management’s endorsement of the BIA/RA results and recommendations is crucial  When presenting the results to Senior Management, do not present reams of statistics and technical details  Present the results in a straightforward fashion that they can relate to Deliverables: • BIA/RA report • Executive presentation Prepare a report summarizing the results and your recommendations, and present to: •Business Unit management (for validation) •Senior Management (for action) 18Institute for Business Continuity Training www.IBCT.com
  • 19. Risk Assessment Summary  One of the primary goals of a BCMS is to prevent avoidable interruptions in the company’s operations  Hence, it is essential to understand the threats to continued operation, and the company’s vulnerability to those threats  Identifying the KBAs’ resource dependencies and the risks facing those resources (residual risk/risk exposure) will help in the development of strategies and plans  Ranking of the key business activities’ risk exposure (threat scenarios) helps determine which activities require continuity strategies 19Institute for Business Continuity Training www.IBCT.com
  • 20. The Keys to Success  Conducting a BIA/RA is not rocket science, but …  every department must follow a consistent methodology to ensure the results will be meaningful  standard data collection formats and terminology must be used to avoid misinterpretation, and facilitate analysis and reporting  participants must be guided through the process, not just left to fend for themselves  The use of templates or software tools alone will not ensure these goals are met – you have to know what you are trying to accomplish, and how to do it! 20Institute for Business Continuity Training www.IBCT.com
  • 21. Institute for Business Continuity Training www.IBCT.com 21 Activity The Steering Committee has decided to proceed with a Risk Assessment pilot project. Using the ‘Threat Assessment’ template: 1. For each Business Activity in your Business Unit (or organization), list the Potential Risks that could affect this Activity. 2. Risks should be expressed in terms of the loss of essential resources (e.g. loss of facilities, loss of computer equipment, loss of specialized equipment, loss of key personnel, etc.).
  • 22. Threat Assessment Worksheet ISO 22301 Risk Assessment Company: ABC Global 27-Aug-14 Activity: Department: XYZ POTENTIAL RISKS SEVERITY COVERAGE EXPOSURE COMMENTS n/a L M H 0-19% 20-39% 40-59% 60-79% 80-99% 100% SCORE Institute for Business Continuity Training www.IBCT.com 22
  • 23. Institute for Business Continuity Training www.IBCT.com 23 Activity The Steering Committee has decided to proceed with a Risk Assessment pilot project. Using the ‘Threat Assessment’ template: 1. For each Activity, rank the severity of each Risk based on how disruptive it would be to normal operations. The severity levels are:  H = highly disruptive (the Activity could not be performed at an acceptable level) = 100 points;  M = moderately disruptive (the Activity could still be performed but at a significantly degraded level) = 50 points;  L = low disruption (the Activity could still be performed with only minor degradation) = 10 points;  N/A = not applicable (the Risk would not affect this Activity).
  • 24. Threat Assessment Worksheet ISO 22301 Risk Assessment Company: ABC Global 27-Aug-14 Activity: Department: XYZ POTENTIAL RISKS SEVERITY COVERAGE EXPOSURE COMMENTS n/a L M H 0-19% 20-39% 40-59% 60-79% 80-99% 100% SCORE Institute for Business Continuity Training www.IBCT.com 24
  • 25. Institute for Business Continuity Training www.IBCT.com 25 Activity The Steering Committee has decided to proceed with a Risk Assessment pilot project. Using the ‘Threat Assessment’ template: 1. For each Risk (except any that are 'not applicable'), estimate the degree of coverage (0 - 19%, 20 - 39%, 40 - 59 %, 60 - 79%, 80 - 99%, or 100%) by checking off (x) the appropriate box. 2. This estimate should be based on the extent to which measures are in place to deter the Risk or to ‘work around’ the loss of the specific resource.
  • 26. Threat Assessment Worksheet ISO 22301 Risk Assessment Company: ABC Global 27-Aug-14 Activity: Department: XYZ POTENTIAL RISKS SEVERITY COVERAGE EXPOSURE COMMENTS n/a L M H 0-19% 20-39% 40-59% 60-79% 80-99% 100% SCORE Institute for Business Continuity Training www.IBCT.com 26
  • 27. Institute for Business Continuity Training www.IBCT.com 27 Activity The Steering Committee has decided to proceed with a Risk Assessment pilot project. Using the ‘Threat Assessment’ template: 1. For each Risk, calculate the Exposure Score Severity - (Severity x degree of coverage) = Exposure Score. L = 10 M = 50 H = 100
  • 28. Threat Assessment Worksheet ISO 22301 Risk Assessment Company: ABC Global 27-Aug-14 Activity: Department: XYZ POTENTIAL RISKS SEVERITY COVERAGE EXPOSURE COMMENTS n/a L M H 0-19% 20-39% 40-59% 60-79% 80-99% 100% SCORE Institute for Business Continuity Training www.IBCT.com 28
  • 29.  New terms:  MTPD/MAO  MBCO  RTO  RPO  SPOFs  A BIA/Risk Assessment enables you to:  Identify all company business activities  Determine the consequences of interrupting these activities  Prioritize the time-sensitivity of these consequences  Identify the most time-sensitive business activities (80/20 rule)  Determine minimum resources necessary to maintain the most time-sensitive business activities  Identify those key business activities that are most exposed to interruption – and need strong protective measures (strategies) Points to Remember 29Institute for Business Continuity Training www.IBCT.com
  • 30. The “DO: Operation” session continues in the next section. Institute for Business Continuity Training www.IBCT.com 30