SlideShare une entreprise Scribd logo
1  sur  18
Certitude
TECHNOLOGY RISK SERVICES




      2012
         IT
  DISASTER
RECOVERY
   SURVEY
DEMOGRAPHICS


               Organisations
                operating in Australia
               12 of the 19 ANZSIC
                Industries
                Representation of all
                employee sizes
                All annual IT
                spend, except for
                $0.5m to $1m




                        Certitu
BUDGET
                                 Respondents spend around
         DR Budget (% of IT)     3% of their IT budget on
                                 disaster recovery. However
                                 money doesn’t necessarily
                                 buy fewer IT outages.



                                  Most outages reported
                                   by those who spent 1%
                                   of their IT budget on DR

           Outages vs DR Spend    Respondents who spent
                                   > 10%, incurred 12% of
                                   all outages reported
                                   Those with IT budgets
                                   <=$100k, spent nearly
                                   nothing on DR




                                             Certitu
RECOVERY LOCATION
                                 Small and / or
                                 geographically non-
            Location             dispersed organisations
                                 Have difficulty finding
                                 suitable recovery locations.


                                  Most respondents
                                   (55.88%) recover to the
                                   same city
                                  Size & geographical
        Recovery Site Location     presence have a
                                   significant influence on
                                   recovery location
                                  Respondents who have
                                   a regional presence are
                                   taking full advantage of
                                   their geographical
                                   diversity

                                              Certitu
MATURITY
                                 Higher levels of disaster
                Maturity         recovery maturity can
                                 reduce system disruption.




                                  Most describe their DR
                                   maturity as
                                   ‘repeatable, but
                                   intuitive’, or ‘defined’

           Outages vs Maturity    Size does not influence
                                   maturity.
                                  The higher the
                                   maturity, the lower the
                                   number of outages and
                                   harm (e.g. average and
                                   longest duration)


                                              Certitu
STANDARDS & REGULATIONS
                                  Disaster recovery
      Standards / Guidelines      standards and guides do
                                  not significantly influence
                                  most organisations’
                                  disaster recovery.


                                   Standards have no
                                    significant influence on
                                    disaster recovery
                                   Broader standards have
                                    greater influence than
       Regulation / Legislation     DR specific ones
                                   There are changes to
                                    APRAs Practice
                                    Standards that affect DR




                                                Certitu
PROCESS INTEGRATION
                             Disaster recovery is poorly
      Where DR is Embedded   embedded into project and
                             service level management,
                             As well as service desk
                             processes.


                              Most have DR
                               embedded into IT
                               Service Continuity, ICT
                               Infrastructure, Availabili
                               ty, Change, Incident, Sec
                               urity & Financial
                               Management
                              Few have DR embedded
                               into
                               Release, Management,
                               Service Desk and
                               Service Level
                               Management!
                                          Certitu
THREATS
                                        Trends learned from
                                        incident & problem
                                        management are not often
      Where DR Threats are Identified   used to identify DR threats
                                        & opportunities to prevent
                                        future system disruption.


                                         Most use various forms
                                          of risk assessment to
                                          identify threats
                                         Few (<30%) use
                                          information recorded by
                                          incident and problem
                                          management processes
                                          to identify threats




                                                     Certitu
KEY CONTROLS
                                          The management of service
                                          levels and 3rd-party service
                                          providers is being missed to
                                          control disaster recovery
   Manage Changes      Manage Physical    risk.
                        Environment

                                           Few evaluate important
                                            DR controls such as
                                            managing
                                            performance, capacity
  Manage Performance   Manage Problems
                                            and problems
      & Capacity
                                           Even fewer recognise
                                            the importance of
                                            managing service
                                            levels, and third-party
                                            providers.
   Define & Manage      Manage Third-
    Service Levels      Party Providers
                                                              Identifie
                                                               d, but…
                                                       Certitu
                                                      Identifie
                                                                     Not
                                                                  Identifi…
                                                       d and…
DISRUPTIONS


    Outages


                                              Nearly half experienced
                                               unplanned outages in
                              Average (hrs)    the past 2 years
                                              Direct correlation
                                               between maturity, and
                                               outage frequency and
                                               duration




              Longest (hrs)

                                                         Certitu
DISRUPTIONS
                            Many system disruptions
              Root Causes   are essentially self-inflicted..




                              Many causes of
                               disruption can be
                               controlled by processes
                               that affect outages are
                               in the direct control of
                               the organisation
                              Processes that help
                               manage 3rd-parties are
                               neglected even though
                               many outages are
                               caused by third-parties



                                           Certitu
RECOVERY REQUIREMENTS
                             Users are involved in
        RTO Considerations   determining disaster
                             recovery requirements.




                              Work-arounds, and
                               system dependencies
                               are well considered
                              The re-entry and
       RPO Considerations      processing of lost
                               data, and the clearing of
                               any work backlog is not
                               well considered




                                          Certitu
EXPECTATIONS & IMPACT
                                  The most difficult area of
         Expectation Management   harm to quantify,
                                  reputation, is of
                                  the greatest concern.



                                   Users are involved but
                                    expectations are not well
                                    managed
                                   Reputational damage
        Areas of Harm               was of high concern, and
                                    is the most difficult to
                                    actually measure, and
                                    quantify
                                   Operational and
                                    financial impacts also
                                    ranked highly


                                               Certitu
DESIGN & TECHNOLOGY
                                     Technologies in production
          Use of DR Architecture     are well utilised for recovery
                                     capability. However, use of
                                     DR architecture is not wide
                                     spread.



                                       Only 75% of respondents
                                        make good use of the DR
                                        architecture
    Use of Production Technologies
                                       12% have no DR
                                        architecture at all
                                       Most make good use of
                                        existing technologies in
                                        their production
                                        environment
                                       Cloud-based services not
                                        popular

                                                   Certitu
DOCUMENTATION
                             Plans are often out of date,
                             and supporting
      Documentation Status   documentation is often
                             unidentified or unavailable.



                              38% review or update
                               their documentation at
                               least once every year.
                              94% use generic word
                               processing tools to
       Documentation Tools     document their disaster
                               recovery plans
                              Supporting
                               documentation is often
                               neglected




                                          Certitu
TRAINING
                                Many respondents use
                                disaster recovery testing as
           Training Frequency   the primary method of
                                training.



                                 47% have never
                                  conducted disaster
                                  recovery training
                                 Some considered regular
           Training Methods       disaster recovery testing
                                  to be the best form of
                                  training




                                             Certitu
TESTING
                               Few (34%) of respondents
           Testing Frequency   have their recovery test
                               independently
                               evaluated and reported.



                                Most test at least once
                                 every year (note
          Testing Methods        APRA)
                                8% do no testing at all
                                A wide range of
                                 testing methods are
                                 used, with failover to
                                 DR site the most
                                 popular




                                            Certitu
2012
IT Disaster Recovery Survey
    @ www.certitude.au.com

Contenu connexe

Dernier

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Dernier (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

En vedette

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 

En vedette (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

Certitude - Disaster Recovery Survey presentation - 08 nov2012

  • 1. Certitude TECHNOLOGY RISK SERVICES 2012 IT DISASTER RECOVERY SURVEY
  • 2. DEMOGRAPHICS Organisations operating in Australia 12 of the 19 ANZSIC Industries  Representation of all employee sizes  All annual IT spend, except for $0.5m to $1m Certitu
  • 3. BUDGET Respondents spend around DR Budget (% of IT) 3% of their IT budget on disaster recovery. However money doesn’t necessarily buy fewer IT outages. Most outages reported by those who spent 1% of their IT budget on DR Outages vs DR Spend Respondents who spent > 10%, incurred 12% of all outages reported  Those with IT budgets <=$100k, spent nearly nothing on DR Certitu
  • 4. RECOVERY LOCATION Small and / or geographically non- Location dispersed organisations Have difficulty finding suitable recovery locations. Most respondents (55.88%) recover to the same city Size & geographical Recovery Site Location presence have a significant influence on recovery location Respondents who have a regional presence are taking full advantage of their geographical diversity Certitu
  • 5. MATURITY Higher levels of disaster Maturity recovery maturity can reduce system disruption. Most describe their DR maturity as ‘repeatable, but intuitive’, or ‘defined’ Outages vs Maturity Size does not influence maturity. The higher the maturity, the lower the number of outages and harm (e.g. average and longest duration) Certitu
  • 6. STANDARDS & REGULATIONS Disaster recovery Standards / Guidelines standards and guides do not significantly influence most organisations’ disaster recovery. Standards have no significant influence on disaster recovery Broader standards have greater influence than Regulation / Legislation DR specific ones There are changes to APRAs Practice Standards that affect DR Certitu
  • 7. PROCESS INTEGRATION Disaster recovery is poorly Where DR is Embedded embedded into project and service level management, As well as service desk processes. Most have DR embedded into IT Service Continuity, ICT Infrastructure, Availabili ty, Change, Incident, Sec urity & Financial Management Few have DR embedded into Release, Management, Service Desk and Service Level Management! Certitu
  • 8. THREATS Trends learned from incident & problem management are not often Where DR Threats are Identified used to identify DR threats & opportunities to prevent future system disruption. Most use various forms of risk assessment to identify threats Few (<30%) use information recorded by incident and problem management processes to identify threats Certitu
  • 9. KEY CONTROLS The management of service levels and 3rd-party service providers is being missed to control disaster recovery Manage Changes Manage Physical risk. Environment Few evaluate important DR controls such as managing performance, capacity Manage Performance Manage Problems and problems & Capacity Even fewer recognise the importance of managing service levels, and third-party providers. Define & Manage Manage Third- Service Levels Party Providers Identifie d, but… Certitu Identifie Not Identifi… d and…
  • 10. DISRUPTIONS Outages Nearly half experienced unplanned outages in Average (hrs) the past 2 years Direct correlation between maturity, and outage frequency and duration Longest (hrs) Certitu
  • 11. DISRUPTIONS Many system disruptions Root Causes are essentially self-inflicted.. Many causes of disruption can be controlled by processes that affect outages are in the direct control of the organisation Processes that help manage 3rd-parties are neglected even though many outages are caused by third-parties Certitu
  • 12. RECOVERY REQUIREMENTS Users are involved in RTO Considerations determining disaster recovery requirements. Work-arounds, and system dependencies are well considered The re-entry and RPO Considerations processing of lost data, and the clearing of any work backlog is not well considered Certitu
  • 13. EXPECTATIONS & IMPACT The most difficult area of Expectation Management harm to quantify, reputation, is of the greatest concern. Users are involved but expectations are not well managed Reputational damage Areas of Harm was of high concern, and is the most difficult to actually measure, and quantify Operational and financial impacts also ranked highly Certitu
  • 14. DESIGN & TECHNOLOGY Technologies in production Use of DR Architecture are well utilised for recovery capability. However, use of DR architecture is not wide spread. Only 75% of respondents make good use of the DR architecture Use of Production Technologies 12% have no DR architecture at all Most make good use of existing technologies in their production environment Cloud-based services not popular Certitu
  • 15. DOCUMENTATION Plans are often out of date, and supporting Documentation Status documentation is often unidentified or unavailable. 38% review or update their documentation at least once every year. 94% use generic word processing tools to Documentation Tools document their disaster recovery plans Supporting documentation is often neglected Certitu
  • 16. TRAINING Many respondents use disaster recovery testing as Training Frequency the primary method of training. 47% have never conducted disaster recovery training Some considered regular Training Methods disaster recovery testing to be the best form of training Certitu
  • 17. TESTING Few (34%) of respondents Testing Frequency have their recovery test independently evaluated and reported. Most test at least once every year (note Testing Methods APRA) 8% do no testing at all A wide range of testing methods are used, with failover to DR site the most popular Certitu
  • 18. 2012 IT Disaster Recovery Survey @ www.certitude.au.com

Notes de l'éditeur

  1. This is the first information technology disaster recovery survey (the Survey) that Certitude has conducted. Certitude surveyed numerous organisations in Australia from a wide range of industries. The Survey specifically focused on the disaster recovery practices of Australian organisations, and therefore presents findings that are most relevant to the Australian market. In August and September 2012, respondents completed the online Survey which asked a number of questions concerning Information Technology Disaster Recovery (DR) in their organisation.The results of the Survey indicate that, broadly, disaster recovery in Australian organisations is well managed. However, with many organisations currently focused on cost reduction, opportunities exist that could enable organisations to achieve their disaster recovery objectives more economically. Some of these opportunities are illustrated in the key findings of the Survey.
  2. The majority of the total IT outages reported inthe past two years were experienced byrespondents who spent around 1% of their ITbudget on disaster recovery. However, asubstantial number (around 12%) of the totaloutages reported were experienced byrespondents who spent a relatively largeproportion of their IT budget (more than 10%) ondisaster recovery.Of the respondents with an annual IT budgetof less than or equal to $100,000, close to 0% ofthe annual IT budget was spent on disasterrecovery. In comparison, respondents withan annual IT budget of more than $500m spentover 10% of their annual IT budget on disaster recovery.On average, the percentage of annual IT budgetspent on disaster recovery is around 3%
  3. The majority of respondents (55.88%) recovertheir systems to a location within the same city.Organisational size (i.e. by number of employees)and geographical presence appear to have asignificant influence on recovery location. Smallorganisations typically recover locally or withinthe same city. This illustrates a problem thatsmall and/or geographically non-dispersedorganisations encounter. They do not own, andtherefore have no easy access to, other suitablerecovery locations, and the cost to subscribe tothird-party recovery facilities may be prohibitivefor these organisations.In contrast, respondents who have a regionalpresence appear to be taking full advantage oftheir geographical diversity by recovering tofacilities they own in other locations.
  4. The majority of respondents described thematurity of their disaster recovery as ‘repeatable,but intuitive’, or ‘defined’. Around 2.5% of respondents described the maturity of theirdisaster recovery as ‘optimised’. The size of anorganisation does not appear to influence maturity.However, there were notable differences inmaturity across different respondent industries.Respondents from mining, manufacturing,transport and storage, and communicationservices, on average, described their maturityas ‘repeatable, but intuitive’ or lower. Thefinancial services, education, health andcommunity services, and professional servicesindustries, on average, described their maturityas ‘defined’ or higher.In the past two years, the following percentage ofrespondents, by maturity, experienced an outage:- ‘Optimised’ = 0%- ‘Managed and Measurable’ or ‘Defined’ = 33.3%- ‘Repeatable, but Intuitive’ = 50%- ‘Initial/Adhoc’ = 100%.In appears that improving the maturity of anorganisation&apos;s disaster recovery is likely to reducesystem disruption.
  5. For the most part, it appears that existing disasterrecovery relevant standards, guidelines, regulation,and legislation have no real influence on organisations’ disaster recovery.Particularly interesting, is that broader standards andguidelines such as ISO 27001 and ISO 22320 appear tobe of greater influence than disaster recovery andBusiness Continuity Management (BCM) specificstandards and guidelines such as AS/NZS 5050 and theAustralian National Audit Office’s (ANAO’s) BCM PracticeGuide.Note: APRA&apos;s APS / LPS 232 and GPS 222, have all been supersededby CPS 232 as at 1 July 2012. Some of the changes to be awareof include:a) A regulated institution cannot just perform a BIA for critical business operations. It must perform the analysis for all operations in order to determine which are critical.b) Clarifications concerning the role and obligations of the board (or equivalent) in complying with the standards.c) An extension to the standard to include registered life Non Operating Holding Companies (NOHCs). d) A greater clarity around the application of the standard to foreign branches.e) A new requirements for life companies to conduct periodic reviews of their business continuity plans using internal auditors or external experts.f) Under CPS 232, new powers for APRA to request that an external expert undertakes an assessment of BCM arrangement for ADIs and general insurers.g) A new requirements for Level 2 insurance groups to comply with the Prudential Standard GPS 222 Risk Management: Level 2 Insurance Group BCM requirements.
  6. Most respondents (over 50%) have disasterrecovery mostly or completely embedded into their IT Service Continuity, ICT Infrastructure,Availability, Change, Incident, Security andFinancial Management processes.Few (around 44%) have disaster recovery embeddedinto their Project Management processes. Fewerstill (less than 40%) have embedded disasterrecovery into other important processes such asRelease, Management, Service Desk and ServiceLevel Management processes.Embedding disaster recovery activities intoeveryday IT processes, can help achieve disasterrecovery objectives in a very cost efficient manner, and improve disaster recovery awareness acrossthe organisation.Embedding disaster recovery into existing ITprocesses, may negate the need to maintain astandalone disaster recovery process that maybecome neglected over time. For example, embedding disaster recovery considerationsand sign-off in change requests, may reduce thepossibility that a production change will reducethe disaster recovery capability. Doing this mayalso prevent a new system being commissionedwithout an established disaster recovery solution.
  7. The majority of respondents identify threatsto IT service continuity by using disasterrecovery specific risk assessments, broaderIT risk assessments, or enterprise-wide riskassessments.Few (less than 30%) used information recordedby their incident and problem managementprocesses to identify threats. This represents a missed opportunity to analysepast threats and then to improve risk mitigationactivities in order to prevent future reoccurrence.
  8. Most respondents identify and evaluate severalkey controls that can protect against unplannedsystem outages. These include; Manage Changes,Ensure System Security, Enterprise-wide BusinessContinuity Planning, Manage the PhysicalEnvironment, and Manage Operations. However, many respondents had only identified, but notevaluated, other important key controls such asmanaging performance, capacity and problems.Significantly, many respondents did not appearto recognise the importance of having andensuring the operational effectiveness of keycontrols related to managing service levels, andthird-party providers.In addition, some respondents do not identify problem management as an important disasterrecovery control. These respondents mayexperience unnecessary harm, due to not identifying potential causes of disruption, or not escalating minor issues appropriately before theycause a disruption.The identification and validation of key controlscan often significantly, and cost effectively, reducethe likelihood and consequences of systemdisruption.
  9. Nearly half of the respondents (47.06%) hadexperienced a major and unplanned systemdisruption in the past two years. Of these,most experienced an average outage of one tofive hours, and a longest outage of less than12 hours (half a day). 6.25% of the respondentsexperienced one or more outages of greater than72 hours.While service providers and vendor hardwarefailures caused a significant number of thereported disruptions, areas that arepredominately in the direct control of anorganisation caused a notable number. These could fairly be regarded as ‘self-inflicted’ as theyrelate to failures in change management, capacityplanning, and IT environmental management (see red coloured root causes on the chart below).
  10. Encouragingly, most respondents determinetheir disaster recovery requirements withrepresentation from users through a BusinessImpact Analysis (BIA). Also, most respondentsconsider important factors, such as work-arounds,and system dependencies, when determiningRecovery Time Objectives and Recovery PointObjectives. However, nearly half the respondents had notadequately considered the re-entry and processingof lost data, and the clearing of any work backlog. This may indicate that while users were involved inthe determination of requirements, theirengagement may have been inadequate. This maylead to:a) A gap between disaster recovery capability and business expectations, and over or under investment in capability;b) Inaccurate or incomplete MAOs, RTOs and RPOs;c) Noncompliance with relevant regulations and law.
  11. Despite a high participation of users in thedetermination of disaster recovery requirements,overall user expectations appear to be poorlymanaged. Over half the respondents thoughtthat they partially managed unrealistic recoveryexpectations, if at all.Failing to manage unrealistic expectations maylead to dissatisfied users, and unnecessaryexpenditure on disaster recovery implementationand maintenance. It can also diminish theimportance of user responsibilities in minimisingthe harm caused by system disruption (e.g. through the deployment of work-arounds).Of all the potential areas of damage caused byunplanned system outages, reputationaldamage was of high concern for the greatestnumber of respondents. Approximately 72%stated that their organisation’s reputationwould be either completely or mostly harmedif an unplanned system disruption occurred.The recognition that reputational damage issignificant to many organisations presents a smallproblem in building a business case for disasterrecovery. Unlike other typical areas of harm,reputational damage is the most difficult to actually measure, and quantify.Reputational harm was closely followed by theoperational and financial impacts that couldcause the most harm to the respondents’organisations.
  12. Most respondents (approximately 70%) havesome form of disaster recovery architecture,however only around 75% of these make goodgood use of it. Around 12% of respondents eitherhad no disaster recovery architecture, or were intending to develop one.Despite the availability of cloud services,most respondents do not use cloud-basedbackup services. Automation tools specific to disaster recovery are also not widely used.. Leveraging technologies that already exist in anorganisation’s production environment canprovide improved and cost effective recoverycapability. Of all the technologies presented inthe survey, the majority of respondents (80% ormore) have made use of technologies that alreadyexist in their production environments. Theseinclude: database replication, off-site tape backup,and virtualisation. Other technologies widely usedto aid recovery include; disk/host-based backup, host failover clustering, in built applicationrecovery tools (e.g. Exchange2010, SharePoint), load-balancing, and SANreplication.
  13. Around 6% of respondents said that they havenever reviewed or updated their disasterrecovery documentation. In contrast, about 38%of respondents review or update theirdocumentation at least once every year. Somerespondents also review or update their disasterrecovery documentation as a continuous part oftheir change management process, either bi-monthly, or when specified by their customers.The majority of respondents (around 94%) use generic word processing tools to document theirdisaster recovery plans and associateddocumentation. Around half of the respondentsalso use generic systems such as their intranetsand document management systems to publishand maintain their documentation.Cloud based services have not gained popularity,with no respondent reporting using services tostore and disseminate disaster recoverydocumentation . About 6% of respondents use other tools such as their CMDB and ServiceManagement Software.
  14. Surprisingly, about 47% of respondents said thatthey have never conducted disaster recovery training. This may be because some respondentsconsidered regular disaster recovery testing tobe the best form of training.In contrast to the above, one respondent said thatthey conducted training bi-monthly.Some respondents conducted on-the-jobtraining.