SlideShare une entreprise Scribd logo
1  sur  23
10 Business Resilience
Questions Every Business
Should Be Asking Itself
About it’s Business
Resilience
About me
• Michael Bowers
• Sr Solutions Specialist
• CAM Business Solutions, Los Angeles
• Established in 2002
• IT consultant in the 1990s
• Director of IT for Nadel Architects in 2001
• Specialty
• Security
• Operations
• Backup and Recovery
• Networking
What is Business Resilience
• Business resilience is the ability to prepare for, respond to, and
recover from just about disaster it may face.
• It helps an organization protect against the countless threats that can
cripple it’s operations, and limit the severity of any incident, and
ensure its continued survival despite an event.
Business Resilience
• Cyber resilience has emerged over the past few years because
traditional cybersecurity measures are no longer enough.
• It is now commonly accepted that it’s no longer a matter of ‘if’ but
‘when’ an organization will suffer data loss or a cyber attack.
• This means that instead of focusing your efforts on keeping criminals
out of your network, it’s better to assume they will eventually break
through your defenses, and start working on a strategy to reduce the
impact.
What could possibly happen?
Question #1
How do you feel about your company’s current Risk Posture?
Question #2
WWYD – If there was a fire, flood, cyber attack, or a malicious attack at
your main office?
Question #3
Do we have an accurate inventory of all of our data locations?
Question #4
What’s our Cyber Security strategy and would it detect the threats I keep
hearing about?
Question #5
Where do we keep our incident response policies?
Question #6
Where do we keep our incident response policies?
Question #7
What solutions / vendors are needed to fulfill our responsibilities to our
clients?
Question #8
What’s the focus of our backups? Copies? Current data? Speed of being
back up?
Question #8
Question #9
Communications- WWYD
Question #10
Who is responsible for managing our threat exposure?
Summary
• While there is no way for a company to truly predict
every disaster it will face - having risk management
policies in place can help soften the blow of business
disruptions and sometimes prevent the problems
altogether.
• Risks are something businesses are exposed to daily.
Whether it is an internal failure or an external event,
there is a seemingly endless list of things that can
threaten business productivity at any given moment.
Some of these risks are even serious enough to
jeopardize an organization’s survival.
IMPROVING YOUR RISK MANAGEMENT
APPROACH
The benefits of good risk management combined
with the potential risk of neglecting these
practices makes an enticing case for improving
your approach immediately.
So, what should be your first steps?
Action steps
Assess and plan: The first step to good risk management is assessing your
current state. Where are you most susceptible to risk and how much work
needs to be done to prevent it? Deciding what state you are in currently
can help you better formulate the correct plan for your business. From
there, you should start laying out a concrete strategy.
Action steps
Communicate your plan: A plan is rendered useless when it's not
efficiently communicated to the necessary parties. Business leaders
should make sure these new processes and risk policies are readily
available to employees new and old. Upon the completion of your risk
management plan, hold a company wide meeting and open the field for
questions and clarifications.
Action steps
Improve internal processes: Improving internal management functions is
one of the best ways to tackle potential business risks immediately. From
improving your cyber protection to better tracking your data and assets,
leveraging the resources of your IT partner can help significantly lower
your chances of falling victim to common industry problems.
Thank you for your time
Michael Bowers
818-356-7187
Mbowers@CAMBusinessSolutions.com
10 Questions Every Company Should Be Asking Itself About its Business Resilience

Contenu connexe

Tendances

Risk management in simple terms with some humor
Risk management in simple terms with some humorRisk management in simple terms with some humor
Risk management in simple terms with some humorKumar Kolaganti
 
What people analytics can't capture
What people analytics can't captureWhat people analytics can't capture
What people analytics can't captureSanyamArora13
 
You will be breached
You will be breachedYou will be breached
You will be breachedMike Saunders
 
When You Should Use Analytics for Decisions
When You Should Use Analytics for DecisionsWhen You Should Use Analytics for Decisions
When You Should Use Analytics for DecisionsVessment
 
How Does Your Company Handle Distracted Driving?
How Does Your Company Handle Distracted Driving?How Does Your Company Handle Distracted Driving?
How Does Your Company Handle Distracted Driving?National Retail Federation
 
Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment Rick van der Kleij
 
10 Most Common Business Mistakes
10 Most Common Business Mistakes10 Most Common Business Mistakes
10 Most Common Business MistakesChristine Reason
 
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...Health IT Conference – iHT2
 
Analysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuff
Analysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuffAnalysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuff
Analysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuffMatt Hansen
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management IIzapp0
 
Smartcon 2015 – Automated Decisions in the Supply Chain
Smartcon 2015 – Automated Decisions in the Supply ChainSmartcon 2015 – Automated Decisions in the Supply Chain
Smartcon 2015 – Automated Decisions in the Supply ChainLars Trieloff
 
NAWBO/Travelers 2013 Survey results
NAWBO/Travelers 2013 Survey resultsNAWBO/Travelers 2013 Survey results
NAWBO/Travelers 2013 Survey resultsTinu Abayomi-Paul
 
Orientation and alignment in a vuca world
Orientation and alignment in a vuca worldOrientation and alignment in a vuca world
Orientation and alignment in a vuca worldBernhard Sterchi
 
React Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident ResponseReact Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident ResponseSilvioPappalardo
 
Kepner Tregoe (KT) - How did the chicken
Kepner Tregoe (KT) - How did the chicken Kepner Tregoe (KT) - How did the chicken
Kepner Tregoe (KT) - How did the chicken ilgor
 
011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rsRichard Smiraldi
 
Program delivery - that doesn't have a snowball's chance in hell!
Program delivery - that doesn't have a snowball's chance in hell!Program delivery - that doesn't have a snowball's chance in hell!
Program delivery - that doesn't have a snowball's chance in hell!Mentor
 

Tendances (20)

Risk management in simple terms with some humor
Risk management in simple terms with some humorRisk management in simple terms with some humor
Risk management in simple terms with some humor
 
What people analytics can't capture
What people analytics can't captureWhat people analytics can't capture
What people analytics can't capture
 
You will be breached
You will be breachedYou will be breached
You will be breached
 
When You Should Use Analytics for Decisions
When You Should Use Analytics for DecisionsWhen You Should Use Analytics for Decisions
When You Should Use Analytics for Decisions
 
How Does Your Company Handle Distracted Driving?
How Does Your Company Handle Distracted Driving?How Does Your Company Handle Distracted Driving?
How Does Your Company Handle Distracted Driving?
 
Continuity Mag Q3 2013
Continuity Mag Q3 2013Continuity Mag Q3 2013
Continuity Mag Q3 2013
 
Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment
 
10 Most Common Business Mistakes
10 Most Common Business Mistakes10 Most Common Business Mistakes
10 Most Common Business Mistakes
 
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...
 
Analysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuff
Analysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuffAnalysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuff
Analysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuff
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Smartcon 2015 – Automated Decisions in the Supply Chain
Smartcon 2015 – Automated Decisions in the Supply ChainSmartcon 2015 – Automated Decisions in the Supply Chain
Smartcon 2015 – Automated Decisions in the Supply Chain
 
NAWBO/Travelers 2013 Survey results
NAWBO/Travelers 2013 Survey resultsNAWBO/Travelers 2013 Survey results
NAWBO/Travelers 2013 Survey results
 
Orientation and alignment in a vuca world
Orientation and alignment in a vuca worldOrientation and alignment in a vuca world
Orientation and alignment in a vuca world
 
React Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident ResponseReact Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident Response
 
10 Rules for Vendors - an Overview
10 Rules for Vendors - an Overview10 Rules for Vendors - an Overview
10 Rules for Vendors - an Overview
 
Kepner Tregoe (KT) - How did the chicken
Kepner Tregoe (KT) - How did the chicken Kepner Tregoe (KT) - How did the chicken
Kepner Tregoe (KT) - How did the chicken
 
011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs
 
Program delivery - that doesn't have a snowball's chance in hell!
Program delivery - that doesn't have a snowball's chance in hell!Program delivery - that doesn't have a snowball's chance in hell!
Program delivery - that doesn't have a snowball's chance in hell!
 
Testing 2.0
Testing 2.0Testing 2.0
Testing 2.0
 

Similaire à 10 Questions Every Company Should Be Asking Itself About its Business Resilience

Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small BusinessBrendanRose
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and responseZyrellLalaguna
 
Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...
Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...
Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...LDM Global
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourYasser Mohammed
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesJack Nichelson
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsBrooke Bordelon
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...Booz Allen Hamilton
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistMorrison & Foerster
 
CISO Interview Question.pdf
CISO Interview Question.pdfCISO Interview Question.pdf
CISO Interview Question.pdfinfosec train
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
 
10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber RiskMark Gibson
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...SurfWatch Labs
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesJohn Rapa
 

Similaire à 10 Questions Every Company Should Be Asking Itself About its Business Resilience (20)

Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small Business
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and response
 
Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...
Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...
Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business Problems
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach Checklist
 
CISO Interview Question.pdf
CISO Interview Question.pdfCISO Interview Question.pdf
CISO Interview Question.pdf
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
 
Marathon overview
Marathon overviewMarathon overview
Marathon overview
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

10 Questions Every Company Should Be Asking Itself About its Business Resilience

  • 1. 10 Business Resilience Questions Every Business Should Be Asking Itself About it’s Business Resilience
  • 2. About me • Michael Bowers • Sr Solutions Specialist • CAM Business Solutions, Los Angeles • Established in 2002 • IT consultant in the 1990s • Director of IT for Nadel Architects in 2001 • Specialty • Security • Operations • Backup and Recovery • Networking
  • 3. What is Business Resilience • Business resilience is the ability to prepare for, respond to, and recover from just about disaster it may face. • It helps an organization protect against the countless threats that can cripple it’s operations, and limit the severity of any incident, and ensure its continued survival despite an event.
  • 4. Business Resilience • Cyber resilience has emerged over the past few years because traditional cybersecurity measures are no longer enough. • It is now commonly accepted that it’s no longer a matter of ‘if’ but ‘when’ an organization will suffer data loss or a cyber attack. • This means that instead of focusing your efforts on keeping criminals out of your network, it’s better to assume they will eventually break through your defenses, and start working on a strategy to reduce the impact.
  • 6. Question #1 How do you feel about your company’s current Risk Posture?
  • 7. Question #2 WWYD – If there was a fire, flood, cyber attack, or a malicious attack at your main office?
  • 8. Question #3 Do we have an accurate inventory of all of our data locations?
  • 9. Question #4 What’s our Cyber Security strategy and would it detect the threats I keep hearing about?
  • 10. Question #5 Where do we keep our incident response policies?
  • 11. Question #6 Where do we keep our incident response policies?
  • 12. Question #7 What solutions / vendors are needed to fulfill our responsibilities to our clients?
  • 13. Question #8 What’s the focus of our backups? Copies? Current data? Speed of being back up?
  • 16. Question #10 Who is responsible for managing our threat exposure?
  • 17. Summary • While there is no way for a company to truly predict every disaster it will face - having risk management policies in place can help soften the blow of business disruptions and sometimes prevent the problems altogether. • Risks are something businesses are exposed to daily. Whether it is an internal failure or an external event, there is a seemingly endless list of things that can threaten business productivity at any given moment. Some of these risks are even serious enough to jeopardize an organization’s survival.
  • 18. IMPROVING YOUR RISK MANAGEMENT APPROACH The benefits of good risk management combined with the potential risk of neglecting these practices makes an enticing case for improving your approach immediately. So, what should be your first steps?
  • 19. Action steps Assess and plan: The first step to good risk management is assessing your current state. Where are you most susceptible to risk and how much work needs to be done to prevent it? Deciding what state you are in currently can help you better formulate the correct plan for your business. From there, you should start laying out a concrete strategy.
  • 20. Action steps Communicate your plan: A plan is rendered useless when it's not efficiently communicated to the necessary parties. Business leaders should make sure these new processes and risk policies are readily available to employees new and old. Upon the completion of your risk management plan, hold a company wide meeting and open the field for questions and clarifications.
  • 21. Action steps Improve internal processes: Improving internal management functions is one of the best ways to tackle potential business risks immediately. From improving your cyber protection to better tracking your data and assets, leveraging the resources of your IT partner can help significantly lower your chances of falling victim to common industry problems.
  • 22. Thank you for your time Michael Bowers 818-356-7187 Mbowers@CAMBusinessSolutions.com