Академический Документы
Профессиональный Документы
Культура Документы
3
Typical BCM Implementation Methodology
Quite easy..correct?
4
So where do where do we start?
5
Getting started
6
Based on diverse Case Studies from.
Customer 1 Manufacturing
Customer 2 Central Bank
Customer 3 Insurance
Customer 4 Banking
Customer 5 Aviation
Customer 6 Govt. Sector
Customer 7 Outsourcing
Customer 8 Facilities Management
7
Effective BCM means that you MUST..,
Have reasonable assurance
R of recovery
IT
Emergency Crisis Business
Disaster Business IT
Response Management Continuity
Recovery
8
Effective BCM means that you MUST.....
Recover within reasonable timelines
INCIDENT
Overall performance
Normal
Operations
Organisation
Effective
B BCM
Program
Minimum Level of
Operations
A No BCM
Program
Time
9
Starting it right
Clear Understanding of Why BCMdont start if Management
is not convinced
Strong mandate from the Top, via the BCM Policy..Each unit is
responsible for their own BCM, central BCM Team to help
10
Starting it right
Regular Top Management interest and involvementnot just a
one-time, but review and follow up till the very end
12
Starting it right
Train your people just in time not too early, not too late. Ideally a few days
before the activity is to be performed
Training is needed
for EACH activity:
Policy writing
BIA,
Risk Assessment
BCM
Recovery Strategy creation
Plan Writing
Plan implementation,
Testing and exercising
etc etc
16
15
About CORE
Our Range of Specializations in Consultancy & Training cover:
Crisis Management
Sustainability
Crisis Communications Information Security
Business Continuity IT Service Management
Disaster Recovery Project Management
Cyber Security
Quality
18 Continual Improvement
How are we different?
1 2 3
5 6 7
CSIRT as a Service
SOC (remote, BOMT/O&M)
Predictive Security through Threat Hunting & Counter Threat Intelligence
Managed
Security Forensics & Investigation Services
Services
21
Consulting
The salient points that will be covered by CORE BCM consulting are illustrated below :
Benefits
Initial Assessment &
Documentation Review
Initial Industry Benchmarking
Implementation Review
Assessment
Assessment Report Maturity Assessment
Testing
Operationalize the
Continual Improvement
21 22
Trainings
23
Some of our Trainings
Cyber Attack Simulation Exercise
ISO27001 on the ground implementation workshop
Crisis and Disaster Management Simulation Exercise
Senior Management Awareness workshops
ISMS and BCMS coordinators training workshops
BCI-UK certified GPG workshops (leading to CBCI)
Certification aspirants workshops for CISSP, CISA, CISM
and CRISC
ISO 27001 and ISO22301 Lead Auditor training
ISO 31000 Risk Management and IT Disaster Recovery
Certification
24
Tools Support
CORE acts as a conduit between the partner & client by providing support for:
Gather requirements
Shortlist Vendors
Subject matter expertise for tool selection
Perform Vendor Demos
Tool installation & implementation
support for BC, ITDR & Notification
Assistance during tool testing
Benefits
25
E-learning Support
Benefits of E-Learning for our clients:
Higher coverage
Consistency in communication
Higher learning retention
Management
Learn at your own pace,
IT Service
Continuity
Business
anytime and anywhere
Latest and most updated
course ware always available 6
2
Cost effective as against
class room based training Crisis
1 7 Sustainability
Saves paper reduces carbon Management
foot print
26
Some of Our Consulting and Training Clients
27
Our 2017 Summits
28
End of presentation
Thank you!
Dhiraj Lal - +971 52 9263933
Executive Director
29
15
28