Disasters could cripple your organization, suspending mission-critical processes and disrupting service to your customers. These disasters could be man-made or natural in nature.
The Business Continuity Plan addresses an organization’s ability to continue functioning when normal operations are disrupted. A Disaster Recovery Plan is used to define the resources, action, tasks, and data required to manage the business recovery process in the event of a disaster.
In this workshop you learn to identify vulnerabilities and implement appropriate countermeasures to prevent and mitigate threats to your mission-critical processes. You will learn techniques for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation.
Benefits of Attending:
Using a carefully selected case study, course participants will:
Create, document and test continuity arrangements for an organization
Perform a risk assessment and Business Impact Assessment (BIA) to identify vulnerabilities
Select and deploy an alternate site for continuity of mission-critical activities
Identify appropriate strategies to recover the infrastructure and processes
Organize and manage recovery teams
Test and maintain an effective recovery plan in a rapidly changing technology environment
.
Contact Kris at kris@360bsi.com to register.
2. COURSE
CONTENT
DAY1 BUSINESS CONTINUITY
LEADERSHIP WORKSHOP WHY THIS EVENT
IT Leadership Workshop is a special one-day course designed to cover The aim of this interactive workshop is to provide
the challenges faced with managing the business continuity efforts in an you with the skills critical to business continuity,
organization. Implementing a full business continuity plan and disaster disaster recovery & risk management.
recovery plan is a major effort. This requires coordination with all After attending this workshop, you will leave
departments. It requires interfacing with individuals at all levels from fully armed with the knowledge needed to
technicians and programmers to managers, directors, and C-level create a business continuity plan (BCP) and the
executives. methodology for building an infrastructure that
supports its effective implementation.
In this workshop you will learn how perform a stakeholder analysis, The combination of interactive presentations,
outline the stakeholders required to accomplish your job, and how to hands-on exercises and open discussion groups
effectively navigate the possible roadblocks preventing you from along with real case studies, ensures you will
accomplishing your tasks. In addition, you will learn tips and techniques obtain maximum value from attending.
that will increase your competence and confidence when influencing
and implementing information technology in your organization.
Managing the Business Continuity Process
- Creating a BCP/DRP framework
- Determining your critical success factors (CSF)
- Determining your key performance indicators (KPI)
- Business continuity management strategies
Understanding your Corporate Culture
- Understanding your organization’s trends, strategy and environment
- Tips, tricks, and trouble spots
- Developing a business continuity management culture
- Exercising, maintenance, and audit
Understanding your Stakeholders
- How to identify your key stakeholders
- Performing a stakeholder analysis
- Creating a stakeholder engagement communication plan
- Getting stakeholder engagement and support
DAY2 BCP/DRP - CONCEPTS & PRINCIPLES
Introduction to Business Continuity and Disaster Recovery Planning
- The difference between business continuity and disaster recovery WHO SHOULD ATTEND
- Why a recovery plan is an integral part of an organization’s operational
Vice Presidents, Directors, General Managers
strategy
Understanding where the threats come from Chief Information Officers
- Understanding codes of practice and legal/regulatory compliance Chief Information Security Officers
requirements Chief Technology Officers
- The step-by-step process for BCP/DRP Business Continuity Officers
Heads of Departments in Information Security
Protecting our assets Management Information Systems, IT
- What are we protecting? Infrastructure, IT Architecture, Network
- What are our mission-critical processes? Operations, IT Operations, IT Data Center,
- How to prioritize what is important to protect DataBase Management, IT Deployment
IT Business Enterprise, IT Risk Management,
What is risk and how do we deal with it?
- Understanding risk assessment methodologies IT Quality Assurance, IT Audit, Risk Management,
- Matching the response to the threat based on the risk Internal Audit, Disaster Recovery
- Enterprise vs. local risk management
- Top business continuity planning mistakes
The need for business continuation – a case study
- Introduction of fictitious business case
- Understand business continuity/disaster recovery needs
- Documenting the continuity requirements
2
3. COURSE
CONTENT
DAY3 RISK ASSESSMENT & RECOVERY
The Business Impact Assessment (BIA)
- What is a Business Impact Assessment?
- Assessing the risk to the enterprise Latest TESTIMONIALS
- How to identify business critical activities
- Impact versus likelihood of occurrence 1 “Session well organized The trainer is ver
organized. very
Establishing the Recovery Options conversant with the subject matter. Well delivered
- Choosing a recovery site and would definitely recommend to anyone else.”
- Habil Mutende, Manager Information Security & Change
- Specifying equipment Management, Central Bank of Kenya
- Choosing suppliers
- How to select backup and restore strategies 2 “Excellent presentation, excellent attitude to
answer our questions & to share his experience.”
Where is the data? - Senior Manager, IT Department, Deloitte
- Why you need to classify levels of information
- Managing data at rest and in transit 3 “I have used Mark in key roles with high visibility
- Understanding data access controls clients. Without hesitation I would highly
- The value of knowing where your data resides recommend Mark for any and all IT audit
engagements. His professionalism, deep
Maintaining user connectivity knowledge, and results oriented work style are
- How to communicate the disaster and recovery efforts to users deeply valued by not only myself, but more
- How to identify and eliminate single points of failure importantly by the all those who are lucky enough
- Communicating with the media to use his services.” - Russ Aebig, Director at Artesient
4 “We have used Mark Edmead on several projects in
the past few years including SOX readiness for
DAY4 PROJECT MANAGEMENT & REVIEW publicly traded companies and IT vulnerability
BCP/DRP Project Management assessments for major financial institutions. He
- Identifying stakeholders always delivers professional and detail-oriented
- Analyzing stakeholder needs workpapers on-time and within budget. Mark is
- Obtaining commitment from upper management highly recommended and we will continue to use
him on other projects.” - Brenda Piazza, Director at CBIZ MHM
Review of the BCP/DRP Process
- Project initiation
- Risk analysis
- Business Impact analysis
- Develop/choose strategies
- Test and validate the plan
- Modify/update the plan
- Approve and implement the plan
Analysis of fictitious business case
Applying lessons learned
**Affiliate membership to Business Continuity Institute COURSE SCHEDULE
Affiliate members Business Continuity Institute
Affiliate members Business Continuity Institute get access the following membership
Affiliate members to Business Continuity Institute get access to the following membership
access following membership 8.00 Registration & Coffee/Tea
benefits: 8.30 Workshop commences
- Continuity magazine – 4 per year (digital version) 10.10 - 10.30 Morning coffee/tea
- Monthly BCI ENewsletter 12.00 - 13.00 Lunch
- Access to ‘member only’ section of BCI website
14.40 - 15.00 Afternoon coffee/tea
- Access to copies of BCI Workshop Reports
- Member rates on BCI products and services 16.00 End of day
- Networking opportunities at BCI organised events
- Access to BCI mentoring programme
- Access to discounted events
3