SlideShare uma empresa Scribd logo
1 de 20
PROPRIETARY AND CONFIDENTIAL 1ACRONIS © 2017
WILL YOUR BUSINESS
STAND A RANSOMWARE?
Yulia Omelyanenko
Unit Manager of governance, risks and compliance
Positive Hack Days VII, Moscow
PROPRIETARY AND CONFIDENTIAL 2ACRONIS © 2017
Bio Overview
• 6 years in Information Security
• 3 years in GRC (before it became mainstream)
• GRC unit manager in Acronis
• Previously worked as GRC manager for multiple regions in
pharmaceuticals, security auditor and consultant
PROPRIETARY AND CONFIDENTIAL 3ACRONIS © 2017
Business continuity program purpose is to ensure that
business-critical assets are continuously available
PROPRIETARY AND CONFIDENTIAL 4ACRONIS © 2017
Classic way to implement
BCP
PROPRIETARY AND CONFIDENTIAL 5ACRONIS © 2017
Leadership Commitment of
BCP
ü Understand value and purpose
ü Establish Business Continuity
Program
#1
PROPRIETARY AND CONFIDENTIAL 6ACRONIS © 2017
Risk Assessment and
Threat Modelling
ü Define disruptive events
ü Assess impact and analyze
risks
ü Propose risk treatment
#2
Risk Assessment for
BCP may be
performed as part of
global Risk
Management initiative
Must contain all
threats that may cause
loss of availability
PROPRIETARY AND CONFIDENTIAL 7ACRONIS © 2017
Conduct a Business Impact Analysis (BIA)
ü Identify critical assets and processes
ü Define recovery time and recovery point
ü Identify other parties and resources for recovery
#3
PROPRIETARY AND CONFIDENTIAL 8ACRONIS © 2017
Deploy, maintain, test,
improve, get certified…
#4
PROPRIETARY AND CONFIDENTIAL 9ACRONIS © 2017
Deploy, maintain, test,
improve, get certified…
#4
PROPRIETARY AND CONFIDENTIAL 10ACRONIS © 2017
PROPRIETARY AND CONFIDENTIAL 11ACRONIS © 2017
Let’s get back to the
basics
PROPRIETARY AND CONFIDENTIAL 12ACRONIS © 2017
The main purpose of BCP is to to ensure that an organization can
continue to operate in case of serious incidents or disasters and is
able to recover to an operational state within a reasonably short
timeline
PROPRIETARY AND CONFIDENTIAL 13ACRONIS © 2017
Risk Assessment and
Threat Modelling
#2 Integrate BCP or its
part with InfoSec
activities
Threat
models
Operational risks
Risk
Assessment
Loss of asset availability?
BIA
Human made disasters
Natural disasters
Third party risks
How possible it is
we will catch
ransomware?
What assets might
be damaged?
PROPRIETARY AND CONFIDENTIAL 14ACRONIS © 2017
Ensure that
your threat
models
correlate
with reality
PROPRIETARY AND CONFIDENTIAL 15ACRONIS © 2017
Conduct a Business Impact
Analysis (BIA)
#3 BIA must include all
possible scenarios
Calculate:
● Cost of resources
for recovery
● Possible damage
caused by disaster
We have lost a number of
assets. What consequences
may this have?
PROPRIETARY AND CONFIDENTIAL 16ACRONIS © 2017
Disaster recovery plan#4
DRP for business
IT continuity plan
Incident
management
Backup and
recovery
Asset
management
Segregation
of duties
ITCP in SLA
PROPRIETARY AND CONFIDENTIAL 17ACRONIS © 2017
Ransomware recovery chain
Risk Assessment
and
Threat
Modelling
How ransomware can potentially appear in network;
How internal processes can be enhanced to minimize
this risk;
What assets might be damaged with ransomware;
Conduct a
Business Impact
Analysis (BIA)
How much can company lose if systems are encrypted;
How much downtime can the company accept;
What kind of remediation is possible and how much will
it cost
Disaster
recovery plan
Backup and restore plans;
Internal forensic lab
Equipment replacement;
Pay the hackers, etc.
PROPRIETARY AND CONFIDENTIAL 18ACRONIS © 2017
Hints for DRP implementation
1) You already might have enough necessary processes in place
to prepare a DRP
2) Delegate functionally on business associates (5% of daily
responsibilities)
3) Extract ITCP part if business doesn’t support solid BCP
4) Test your disaster recovery plans (e.g. perform periodic test
backup and restore)
PROPRIETARY AND CONFIDENTIAL 19ACRONIS © 2017
P.S. why not an option?
PROPRIETARY AND CONFIDENTIAL 20ACRONIS © 2017
Questions?
yulia.omelyanenko@acronis.com yulia.omelia /yomelia

Mais conteúdo relacionado

Mais procurados

Mais procurados (14)

2017 Cybersecurity Report
2017 Cybersecurity Report 2017 Cybersecurity Report
2017 Cybersecurity Report
 
Web hacking using Cyber range
Web hacking using Cyber rangeWeb hacking using Cyber range
Web hacking using Cyber range
 
Blue Coat Infographic: Proactive Incident response
Blue Coat Infographic: Proactive Incident response Blue Coat Infographic: Proactive Incident response
Blue Coat Infographic: Proactive Incident response
 
Incident response
Incident responseIncident response
Incident response
 
Infosec Europe 2017 Highlights | Lastline, Inc.
Infosec Europe 2017 Highlights |  Lastline, Inc.Infosec Europe 2017 Highlights |  Lastline, Inc.
Infosec Europe 2017 Highlights | Lastline, Inc.
 
Managing Indicator Deprecation in ThreatConnect
Managing Indicator Deprecation in ThreatConnectManaging Indicator Deprecation in ThreatConnect
Managing Indicator Deprecation in ThreatConnect
 
Defining A Cyber Moonshot: Getting Safer in Five Years
Defining A Cyber Moonshot: Getting Safer in Five YearsDefining A Cyber Moonshot: Getting Safer in Five Years
Defining A Cyber Moonshot: Getting Safer in Five Years
 
Erkan kahraman Security, Trust, Assurance - 20131106 - nordic it security s...
Erkan kahraman   Security, Trust, Assurance - 20131106 - nordic it security s...Erkan kahraman   Security, Trust, Assurance - 20131106 - nordic it security s...
Erkan kahraman Security, Trust, Assurance - 20131106 - nordic it security s...
 
10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident Detection10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident Detection
 
Innovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityInnovating at speed and scale with implicit security
Innovating at speed and scale with implicit security
 
DWS16 - Plenary Privacy Paradox - Stephane Geyres, Accenture
DWS16 - Plenary Privacy Paradox - Stephane Geyres, AccentureDWS16 - Plenary Privacy Paradox - Stephane Geyres, Accenture
DWS16 - Plenary Privacy Paradox - Stephane Geyres, Accenture
 
DWS16 - Plenary - Privacy Paradox - Yannick Sadowy, Accenture
DWS16 - Plenary - Privacy Paradox - Yannick Sadowy, AccentureDWS16 - Plenary - Privacy Paradox - Yannick Sadowy, Accenture
DWS16 - Plenary - Privacy Paradox - Yannick Sadowy, Accenture
 
HPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly InnovateHPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly Innovate
 
Cybersecurity in Acquisition - Kristen J. Baldwin
Cybersecurity in Acquisition - Kristen J. BaldwinCybersecurity in Acquisition - Kristen J. Baldwin
Cybersecurity in Acquisition - Kristen J. Baldwin
 

Semelhante a Выдержит ли ваш бизнес натиск ransomware?

Mitigate Risk with Better Plan Execution and Organizational Alignment
Mitigate Risk with Better Plan Execution and Organizational AlignmentMitigate Risk with Better Plan Execution and Organizational Alignment
Mitigate Risk with Better Plan Execution and Organizational Alignment
Paige Pulaski
 

Semelhante a Выдержит ли ваш бизнес натиск ransomware? (20)

Alignment: Office of the Chief Data Officer & BCBS 239
Alignment: Office of the Chief Data Officer & BCBS 239Alignment: Office of the Chief Data Officer & BCBS 239
Alignment: Office of the Chief Data Officer & BCBS 239
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
CWIN17 london - how digital identity is fundamentaly enabling business tranfo...
CWIN17 london - how digital identity is fundamentaly enabling business tranfo...CWIN17 london - how digital identity is fundamentaly enabling business tranfo...
CWIN17 london - how digital identity is fundamentaly enabling business tranfo...
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
 
How security analytics helps UCAS protect 700,000 student applications
How security analytics helps UCAS protect 700,000 student applicationsHow security analytics helps UCAS protect 700,000 student applications
How security analytics helps UCAS protect 700,000 student applications
 
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
 
Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Using Metrics to Drive Your Software Security Initiative Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Using Metrics to Drive Your Software Security Initiative
 
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the Cloud
 
The 2018 Threatscape
The 2018 ThreatscapeThe 2018 Threatscape
The 2018 Threatscape
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
SplunkLive! London 2017 - Getting Started with Splunk IT Service Intelligence
SplunkLive! London 2017 - Getting Started with Splunk IT Service IntelligenceSplunkLive! London 2017 - Getting Started with Splunk IT Service Intelligence
SplunkLive! London 2017 - Getting Started with Splunk IT Service Intelligence
 
Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018
Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018
Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware Disaster
 
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity DefenseDo You Manage Software? Understanding Your Role in Cybersecurity Defense
Do You Manage Software? Understanding Your Role in Cybersecurity Defense
 
Mitigate Risk with Better Plan Execution and Organizational Alignment
Mitigate Risk with Better Plan Execution and Organizational AlignmentMitigate Risk with Better Plan Execution and Organizational Alignment
Mitigate Risk with Better Plan Execution and Organizational Alignment
 
The digital shakeout in quality assurance and testing by Shiva Agolla and Sat...
The digital shakeout in quality assurance and testing by Shiva Agolla and Sat...The digital shakeout in quality assurance and testing by Shiva Agolla and Sat...
The digital shakeout in quality assurance and testing by Shiva Agolla and Sat...
 
How to Build Security and Risk Management into Agile Environments
How to Build Security and Risk Management into Agile EnvironmentsHow to Build Security and Risk Management into Agile Environments
How to Build Security and Risk Management into Agile Environments
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
Atlassian Tools in Practice: A Customer Success Story – Xpand IT & Atlassian ...
Atlassian Tools in Practice: A Customer Success Story – Xpand IT & Atlassian ...Atlassian Tools in Practice: A Customer Success Story – Xpand IT & Atlassian ...
Atlassian Tools in Practice: A Customer Success Story – Xpand IT & Atlassian ...
 

Mais de Positive Hack Days

Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
Positive Hack Days
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
Positive Hack Days
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Positive Hack Days
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
Positive Hack Days
 

Mais de Positive Hack Days (20)

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQube
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для Approof
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложений
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application Security
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке Си
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Выдержит ли ваш бизнес натиск ransomware?

  • 1. PROPRIETARY AND CONFIDENTIAL 1ACRONIS © 2017 WILL YOUR BUSINESS STAND A RANSOMWARE? Yulia Omelyanenko Unit Manager of governance, risks and compliance Positive Hack Days VII, Moscow
  • 2. PROPRIETARY AND CONFIDENTIAL 2ACRONIS © 2017 Bio Overview • 6 years in Information Security • 3 years in GRC (before it became mainstream) • GRC unit manager in Acronis • Previously worked as GRC manager for multiple regions in pharmaceuticals, security auditor and consultant
  • 3. PROPRIETARY AND CONFIDENTIAL 3ACRONIS © 2017 Business continuity program purpose is to ensure that business-critical assets are continuously available
  • 4. PROPRIETARY AND CONFIDENTIAL 4ACRONIS © 2017 Classic way to implement BCP
  • 5. PROPRIETARY AND CONFIDENTIAL 5ACRONIS © 2017 Leadership Commitment of BCP ü Understand value and purpose ü Establish Business Continuity Program #1
  • 6. PROPRIETARY AND CONFIDENTIAL 6ACRONIS © 2017 Risk Assessment and Threat Modelling ü Define disruptive events ü Assess impact and analyze risks ü Propose risk treatment #2 Risk Assessment for BCP may be performed as part of global Risk Management initiative Must contain all threats that may cause loss of availability
  • 7. PROPRIETARY AND CONFIDENTIAL 7ACRONIS © 2017 Conduct a Business Impact Analysis (BIA) ü Identify critical assets and processes ü Define recovery time and recovery point ü Identify other parties and resources for recovery #3
  • 8. PROPRIETARY AND CONFIDENTIAL 8ACRONIS © 2017 Deploy, maintain, test, improve, get certified… #4
  • 9. PROPRIETARY AND CONFIDENTIAL 9ACRONIS © 2017 Deploy, maintain, test, improve, get certified… #4
  • 10. PROPRIETARY AND CONFIDENTIAL 10ACRONIS © 2017
  • 11. PROPRIETARY AND CONFIDENTIAL 11ACRONIS © 2017 Let’s get back to the basics
  • 12. PROPRIETARY AND CONFIDENTIAL 12ACRONIS © 2017 The main purpose of BCP is to to ensure that an organization can continue to operate in case of serious incidents or disasters and is able to recover to an operational state within a reasonably short timeline
  • 13. PROPRIETARY AND CONFIDENTIAL 13ACRONIS © 2017 Risk Assessment and Threat Modelling #2 Integrate BCP or its part with InfoSec activities Threat models Operational risks Risk Assessment Loss of asset availability? BIA Human made disasters Natural disasters Third party risks How possible it is we will catch ransomware? What assets might be damaged?
  • 14. PROPRIETARY AND CONFIDENTIAL 14ACRONIS © 2017 Ensure that your threat models correlate with reality
  • 15. PROPRIETARY AND CONFIDENTIAL 15ACRONIS © 2017 Conduct a Business Impact Analysis (BIA) #3 BIA must include all possible scenarios Calculate: ● Cost of resources for recovery ● Possible damage caused by disaster We have lost a number of assets. What consequences may this have?
  • 16. PROPRIETARY AND CONFIDENTIAL 16ACRONIS © 2017 Disaster recovery plan#4 DRP for business IT continuity plan Incident management Backup and recovery Asset management Segregation of duties ITCP in SLA
  • 17. PROPRIETARY AND CONFIDENTIAL 17ACRONIS © 2017 Ransomware recovery chain Risk Assessment and Threat Modelling How ransomware can potentially appear in network; How internal processes can be enhanced to minimize this risk; What assets might be damaged with ransomware; Conduct a Business Impact Analysis (BIA) How much can company lose if systems are encrypted; How much downtime can the company accept; What kind of remediation is possible and how much will it cost Disaster recovery plan Backup and restore plans; Internal forensic lab Equipment replacement; Pay the hackers, etc.
  • 18. PROPRIETARY AND CONFIDENTIAL 18ACRONIS © 2017 Hints for DRP implementation 1) You already might have enough necessary processes in place to prepare a DRP 2) Delegate functionally on business associates (5% of daily responsibilities) 3) Extract ITCP part if business doesn’t support solid BCP 4) Test your disaster recovery plans (e.g. perform periodic test backup and restore)
  • 19. PROPRIETARY AND CONFIDENTIAL 19ACRONIS © 2017 P.S. why not an option?
  • 20. PROPRIETARY AND CONFIDENTIAL 20ACRONIS © 2017 Questions? yulia.omelyanenko@acronis.com yulia.omelia /yomelia