SlideShare a Scribd company logo
1 of 4
Download to read offline
BUSINESS
                                                    CONTINUITY,
                                                    DISASTER
                                                    RECOVERY
                                                    PLANNING &
                                                    LEADERSHIP

                                                    08 - 11 APRIL 2013
                                                                                                                                        TAKEAWAY
                                                                                                                             EXCLUSIVEgs before 22-FEB-2013
                                                    FOUR SEASONS HOTEL                                                               in
                                                                                                                                   book
                                                                                                                    For early bird                         th £75)
IT                                                  JAKARTA                                                                                  bership (wor te
                                                                                                                                Affiliate mem        Institu
                                                                                                                     EE 1 Yeare Business Continuitydetails)
SERIES                                              INDONESIA                                                      FR
                                                                                                                       with th to page 3 for further
                                                                                                                           (** refer




  COURSE OVERVIEW                                                                                             YOUR INTERNATIONAL
  Disasters could cripple your organization, suspending mission-critical processes and
  disrupting service to your customers. These disasters could be man-made or natural
                                                                                                              COURSE FACILITATOR
  in nature.

  The Business Continuity Plan addresses an organization’s ability to continue
                                                                                                                                Dr Mark T. Edmead
  functioning when normal operations are disrupted.                                                                             MBA, CISSP, CISA, CompTIA Security+

  A Disaster Recovery Plan is used to define the resources, action, tasks, and data                                             IT Security
  required to manage the business recovery process in the event of a disaster. In this                                          Consultant & Trainer
  workshop you learn to identify vulnerabilities and implement appropriate                                                      MTE Advisors
  countermeasures to prevent and mitigate threats to your mission-critical processes.
                                                                                                             Mark T. Edmead is a successful technology entrepreneur
  You will learn techniques for creating a business continuity plan (BCP) and the                            with over 28 years of practical experience in computer
                                                                                                             systems architecture, information security, and project
  methodology for building an infrastructure that supports its effective                                     management.
  implementation.
                                                                                                             Mark excels in managing the tight-deadlines and ever
                                                                                                             changing tasks related to mission-critical project
  BENEFITS OF ATTENDING                                                                                      schedules. He has extensive knowledge in IT security, IT
      Using a carefully selected case study, course participants will:                                       and application audits, Internal Audit, IT governance,
                                                                                                             including Sarbanes-Oxley, FDIC/FFIEC, and GLBA
      • Create, document and test continuity arrangements for an organization                                compliance auditing.
      • Perform a risk assessment and Business Impact Assessment (BIA) to identify                           Mr. Edmead understands all aspects of information
       vulnerabilities                                                                                       security and protection including access controls,
                                                                                                             cryptography, security management practices, network
      • Select and deploy an alternate site for continuity of mission-critical activities                    and Internet security, computer security law and
      • Identify appropriate strategies to recover the infrastructure and processes                          investigations, and physical security.
      • Organize and manage recovery teams                                                                   He has trained Fortune 500 and Fortune 1000 companies
                                                                                                             in the areas of information, system, and Internet security.
      • Test and maintain an effective recovery plan in a rapidly changing technology                        He has worked with many international firms, and has the
       environment                                                                                           unique ability to explain very technical concepts in
                                                                                                             simple-to-understand terms. Mr. Edmead is a sought after
  Sample Case Studies:                                                                                       author and lecturer for information security and
                                                                                                             information technology topics.
 • A major Middle Eastern bank has been experiencing tremendous growth and management feels that             Mark works as an information security and regulatory
  their current BCP and DRP plans outdated. In this case study the delegates with perform a business
                                                                                                             compliance consultant. He has:
  impact analysis, based on interviews with key company stakeholders and subject matter experts, and
  outline which business areas are the most critical and in need of improved continuity and recovery         • Conducted internal IT audits in the areas of critical
  plans.                                                                                                     infrastructure/ systems and applications,

 • A manufacturing company is considering implementing a disaster recovery plan but does not know            • Assessed and tested internal controls of critical
  which disaster recovery approach they should implement. In this case study the delegates with study        infrastructure platform systems (Windows, UNIX, IIS, SQL,
                                                                                                             Oracle)
  the business enterprise, perform a risk analysis, and determine if a hot site, cold site, warm site, or
  another disaster recovery method is the best approach.                                                     • Assessed and tested internal controls of various critical
                                                                                                             financial applications.

  EXCLUSIVE:
           :                  TEMPLATES & TAKEAWAYS                                                          • Prepared risk assessments and determined risks to
                                                                                                             critical financial data systems and infrastructure
                                                                                                             c
                                                                                                             components.
                                                                                                             c
  1. Bring your Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) for
     Bring your Busines Continuity Plan/Disaster Recov
     Bring your Busines Continuity Plan/Disaster Recovery
                       ss
     private consultation review
                       on review                                                                             • Created test plans & processes and executed test plans.
  2. BCP/DRP Step-by-step Guide                                                                              • Conducted reviews of existing systems and
  3. BCP/DRP templates and worksheets to aid you in applying and putting into                                applications, ensuring appropriate security, management
                                                                                                             a
     practice what you have learned from this workshop                                                       and data integrity via control processes.
                                                                                                             a
  4. FREE copy of the course material, case studies, and other related items of the                          • Prepared written reports to all levels of management
     training workshop
                                                                                                             • Participated in audit review panel sessions to address
                                                                                                             results, conclusions and follow-up actions required.
                                                                                                             r

  ©   360 BSI (M) Sdn Bhd (833835-X), Level 8 Pavilion KL 168 Jalan Bukit Bintang 55100 Kuala Lumpur Malaysia
                          (833835 X)                   KL,                Bintang,            Lumpur, Malaysia.                                                        1
COURSE
     CONTENT
DAY1 BUSINESS CONTINUITY
     LEADERSHIP WORKSHOP                                                          WHY THIS EVENT
     IT Leadership Workshop is a special one-day course designed to cover         The aim of this interactive workshop is to provide
     the challenges faced with managing the business continuity efforts in an     you with the skills critical to business continuity,
     organization. Implementing a full business continuity plan and disaster      disaster recovery & risk management.
     recovery plan is a major effort. This requires coordination with all         After attending this workshop, you will leave
     departments. It requires interfacing with individuals at all levels from     fully armed with the knowledge needed to
     technicians and programmers to managers, directors, and C-level              create a business continuity plan (BCP) and the
     executives.                                                                  methodology for building an infrastructure that
                                                                                  supports its effective implementation.
     In this workshop you will learn how perform a stakeholder analysis,          The combination of interactive presentations,
     outline the stakeholders required to accomplish your job, and how to         hands-on exercises and open discussion groups
     effectively navigate the possible roadblocks preventing you from             along with real case studies, ensures you will
     accomplishing your tasks. In addition, you will learn tips and techniques    obtain maximum value from attending.
     that will increase your competence and confidence when influencing
     and implementing information technology in your organization.

     Managing the Business Continuity Process
     - Creating a BCP/DRP framework
     - Determining your critical success factors (CSF)
     - Determining your key performance indicators (KPI)
     - Business continuity management strategies

     Understanding your Corporate Culture
     - Understanding your organization’s trends, strategy and environment
     - Tips, tricks, and trouble spots
     - Developing a business continuity management culture
     - Exercising, maintenance, and audit

     Understanding your Stakeholders
     - How to identify your key stakeholders
     - Performing a stakeholder analysis
     - Creating a stakeholder engagement communication plan
     - Getting stakeholder engagement and support


DAY2 BCP/DRP - CONCEPTS & PRINCIPLES
     Introduction to Business Continuity and Disaster Recovery Planning
     - The difference between business continuity and disaster recovery           WHO SHOULD ATTEND
     - Why a recovery plan is an integral part of an organization’s operational
                                                                                    Vice Presidents, Directors, General Managers
     strategy
     Understanding where the threats come from                                      Chief Information Officers
     - Understanding codes of practice and legal/regulatory compliance              Chief Information Security Officers
     requirements                                                                   Chief Technology Officers
     - The step-by-step process for BCP/DRP                                         Business Continuity Officers
                                                                                    Heads of Departments in Information Security
     Protecting our assets                                                          Management Information Systems, IT
     - What are we protecting?                                                      Infrastructure, IT Architecture, Network
     - What are our mission-critical processes?                                     Operations, IT Operations, IT Data Center,
     - How to prioritize what is important to protect                               DataBase Management, IT Deployment
                                                                                    IT Business Enterprise, IT Risk Management,
     What is risk and how do we deal with it?
     - Understanding risk assessment methodologies                                  IT Quality Assurance, IT Audit, Risk Management,
     - Matching the response to the threat based on the risk                        Internal Audit, Disaster Recovery
     - Enterprise vs. local risk management
     - Top business continuity planning mistakes

     The need for business continuation – a case study
     - Introduction of fictitious business case
     - Understand business continuity/disaster recovery needs
     - Documenting the continuity requirements




                                                                                                                                   2
COURSE
             CONTENT
 DAY3 RISK ASSESSMENT & RECOVERY
             The Business Impact Assessment (BIA)
             - What is a Business Impact Assessment?
             - Assessing the risk to the enterprise                                          Latest TESTIMONIALS
             - How to identify business critical activities
             - Impact versus likelihood of occurrence                                        1   “Session well organized The trainer is ver
                                                                                                               organized.               very
             Establishing the Recovery Options                                                   conversant with the subject matter. Well delivered
             - Choosing a recovery site                                                          and would definitely recommend to anyone else.”
                                                                                                 - Habil Mutende, Manager Information Security & Change
             - Specifying equipment                                                              Management, Central Bank of Kenya
             - Choosing suppliers
             - How to select backup and restore strategies                                   2   “Excellent presentation, excellent attitude to
                                                                                                 answer our questions & to share his experience.”
             Where is the data?                                                                  - Senior Manager, IT Department, Deloitte
             - Why you need to classify levels of information
             - Managing data at rest and in transit                                          3   “I have used Mark in key roles with high visibility
             - Understanding data access controls                                                clients. Without hesitation I would highly
             - The value of knowing where your data resides                                      recommend Mark for any and all IT audit
                                                                                                 engagements. His professionalism, deep
             Maintaining user connectivity                                                       knowledge, and results oriented work style are
             - How to communicate the disaster and recovery efforts to users                     deeply valued by not only myself, but more
             - How to identify and eliminate single points of failure                            importantly by the all those who are lucky enough
             - Communicating with the media                                                      to use his services.” - Russ Aebig, Director at Artesient

                                                                                             4   “We have used Mark Edmead on several projects in
                                                                                                 the past few years including SOX readiness for
 DAY4 PROJECT MANAGEMENT & REVIEW                                                                publicly traded companies and IT vulnerability
             BCP/DRP Project Management                                                          assessments for major financial institutions. He
             - Identifying stakeholders                                                          always delivers professional and detail-oriented
             - Analyzing stakeholder needs                                                       workpapers on-time and within budget. Mark is
             - Obtaining commitment from upper management                                        highly recommended and we will continue to use
                                                                                                 him on other projects.” - Brenda Piazza, Director at CBIZ MHM
             Review of the BCP/DRP Process
             - Project initiation
             - Risk analysis
             - Business Impact analysis
             - Develop/choose strategies
             - Test and validate the plan
             - Modify/update the plan
             - Approve and implement the plan

             Analysis of fictitious business case

             Applying lessons learned




**Affiliate membership to Business Continuity Institute                                      COURSE SCHEDULE
 Affiliate members Business Continuity Institute
 Affiliate members Business Continuity Institute get access the following membership
 Affiliate members to Business Continuity Institute get access to the following membership
                                                        access        following membership   8.00                              Registration & Coffee/Tea
 benefits:                                                                                   8.30                              Workshop commences
 - Continuity magazine – 4 per year (digital version)                                        10.10 - 10.30                     Morning coffee/tea
 - Monthly BCI ENewsletter                                                                   12.00 - 13.00                     Lunch
 - Access to ‘member only’ section of BCI website
                                                                                             14.40 - 15.00                     Afternoon coffee/tea
 - Access to copies of BCI Workshop Reports
 - Member rates on BCI products and services                                                 16.00                             End of day
 - Networking opportunities at BCI organised events
 - Access to BCI mentoring programme
 - Access to discounted events


                                                                                                                                                           3
BUSINESS
CONTINUITY,                                                                                           REGISTRATION FORM
DISASTER
RECOVERY                                                                                              Fax: +603 9205 7788
PLANNING &
LEADERSHIP                                                                                            Tel: +603 9205 7772
                                                                                                      Mobile: +6016 3326 360
08 - 11 APRIL 2013
FOUR SEASONS HOTEL
JAKARTA                                                                                               Email: kris@360bsi.com
INDONESIA

 DELEGATES                                                                                                IN-HOUSE TRAINING
 1   Name         :                                                                                       360 BSI is passionate about providing strategic IT programs
                                                                                                          and high potential training solutions across the region to build
     Name on tag :                                                                                        personal competencies and organizational capability.
     Job Title :                                                                                          You will receive practical training from a professionally
                                                                                                          qualified educator with over twenty years of teaching and
     Email        :                                                                                       training experience.
     Mobile       :                                                                                       Please feel free to mix-and-match topics from the areas listed
                                                                                                          below to get the right training content for your staff. Other
 2   Name         :                                                                                       topics may be available upon request.
     Name on tag :
                                                                                                          OTHER RELATED PUBLIC COURSES
     Job Title :
                                                                                                                  IT Strategic Planning
     Email        :                                                                                               Service Oriented Architecture (SOA)
                                                                                                                  Business Continuity and Disaster Recovery
     Mobile       :                                                                                               Preparing for the CISSP exam
                                                                                                                  Cybercrime & Fraud Investigation
 3   Name         :
                                                                                                                  IT Change Management
     Name on tag :                                                                                                IT Project Management
     Job Title :
                                                                                                      Hotel Contact Details:
     Email        :                                                                                   For Room Reservation, please contact Reservation Desk.
                                                                                                      Tel. +62 (21) 252-3456 or Fax. +62 (21) 252-4480
     Mobile       :
                                                                                                      Four Seasons Hotel Jakarta
     AUTHORIZATION                                                                                    Jalan H.R. Rasuna Said, Jakarta 12920, Indonesia
     (This form is invalid without a signature)                                                       General Information:
     Name             :                                                                               1    Closing date for registration is 1st April 2013.
                                                                                                      2    The fees cover lunch, tea breaks, materials and certificate.
     Job Title        :                                                                               3    Official confirmation will be sent, once registration has
     Email            :                                                                                    been received.
                                                                                                      4    Participants will need to arrange their own accommodation.
                                                                                                      5    Attire: Smart Casual
     Tel :            (      )
                                                                                                      Cancellations/Substitutions
     Organization :
                                                                                                      Substitutions are welcome at any time. Please notify us at
     Address :                                                                                        least 2 working days prior to the event. All cancellations will
                                                                                                      carry a 10% cancellation fee, once a registration form is
                                                                                                      received. All cancellations must be in writing by fax or email
                                                                                                      at least 2 weeks before the event date. Cancellations with
                                                                                                      less than 2 weeks prior to the event date carry a 100% liability.
                                                                                                      However, course materials will still be couriered to you.
     Signature :                                              Date:              /         /
                                                                                                      Thank you for your registration!
 FEES                                                                                                 PAYMENT DETAILS
                                                                                                      Payment is required within 5 days upon receipt of
      USD 2,995 per delegate                                                                          the invoice.

      USD 2,795 per delegate - register before 22-FEB-2013                                            Bank transfer:

      USD 8,085 - Special for Group of 3                                                              360 BSI (M) Sdn Bhd
 The fee does not include any taxes (withholding or otherwise). In case of any taxes applicable
                                                                                                      HSBC Bank Malaysia Berhad
 the client has to ensure that the taxes are paid on top of the investment fee paid for the course.   Bukit Bintang Branch, Kuala Lumpur, Malaysia
 Compliance with the local tax laws is the responsibility of the client.
                                                                                                      Account No: 203-371059-725
                                                                                                      Swift No: HBMBMYKL
 * Save up to 50% for In-house Training program
                                                                                                      All payments must be received prior to the event date

 ©      360 BSI (M) Sdn Bhd (833835-X), Level 8 Pavilion KL, 168 Jalan Bukit Bintang, 55100 Kuala Lumpur, Malaysia.               www.360bsi.com/IT                        4

More Related Content

Viewers also liked

Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IThhuihhui
 
Overview Of Corporate Governance
Overview Of Corporate GovernanceOverview Of Corporate Governance
Overview Of Corporate GovernanceElijah Ezendu
 
Corporate governance of INFORMATION TECHNOLOGY (IT)
Corporate governance of INFORMATION TECHNOLOGY (IT)Corporate governance of INFORMATION TECHNOLOGY (IT)
Corporate governance of INFORMATION TECHNOLOGY (IT)Osman Hasan
 
Corporate governance
Corporate governanceCorporate governance
Corporate governanceIqra Afsar
 
Corporate governance ppt mba
Corporate governance ppt mbaCorporate governance ppt mba
Corporate governance ppt mbaBabasab Patil
 
Business ethics and Corporate Governance
Business ethics and Corporate GovernanceBusiness ethics and Corporate Governance
Business ethics and Corporate Governancesaadiakh
 
Corporate Governance
Corporate GovernanceCorporate Governance
Corporate GovernanceAliza Racelis
 

Viewers also liked (7)

Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IT
 
Overview Of Corporate Governance
Overview Of Corporate GovernanceOverview Of Corporate Governance
Overview Of Corporate Governance
 
Corporate governance of INFORMATION TECHNOLOGY (IT)
Corporate governance of INFORMATION TECHNOLOGY (IT)Corporate governance of INFORMATION TECHNOLOGY (IT)
Corporate governance of INFORMATION TECHNOLOGY (IT)
 
Corporate governance
Corporate governanceCorporate governance
Corporate governance
 
Corporate governance ppt mba
Corporate governance ppt mbaCorporate governance ppt mba
Corporate governance ppt mba
 
Business ethics and Corporate Governance
Business ethics and Corporate GovernanceBusiness ethics and Corporate Governance
Business ethics and Corporate Governance
 
Corporate Governance
Corporate GovernanceCorporate Governance
Corporate Governance
 

More from 360 BSI

Information Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big DataInformation Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big Data360 BSI
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE360 BSI
 
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAEEffective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE360 BSI
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
 
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAEEffective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE360 BSI
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
 
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...360 BSI
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
 
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...360 BSI
 
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAEAdvanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE360 BSI
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia360 BSI
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...360 BSI
 
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...360 BSI
 
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia360 BSI
 
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAEEffective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE360 BSI
 
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...360 BSI
 
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...360 BSI
 

More from 360 BSI (20)

Information Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big DataInformation Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big Data
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
 
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAEEffective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
 
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAEEffective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
 
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
 
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAEAdvanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
 
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
 
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
 
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAEEffective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
 
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
 
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Business Continuity, Disaster Recovery Planning & Leadership 08 - 11 April 2013 Jakarta Indonesia

  • 1. BUSINESS CONTINUITY, DISASTER RECOVERY PLANNING & LEADERSHIP 08 - 11 APRIL 2013 TAKEAWAY EXCLUSIVEgs before 22-FEB-2013 FOUR SEASONS HOTEL in book For early bird th £75) IT JAKARTA bership (wor te Affiliate mem Institu EE 1 Yeare Business Continuitydetails) SERIES INDONESIA FR with th to page 3 for further (** refer COURSE OVERVIEW YOUR INTERNATIONAL Disasters could cripple your organization, suspending mission-critical processes and disrupting service to your customers. These disasters could be man-made or natural COURSE FACILITATOR in nature. The Business Continuity Plan addresses an organization’s ability to continue Dr Mark T. Edmead functioning when normal operations are disrupted. MBA, CISSP, CISA, CompTIA Security+ A Disaster Recovery Plan is used to define the resources, action, tasks, and data IT Security required to manage the business recovery process in the event of a disaster. In this Consultant & Trainer workshop you learn to identify vulnerabilities and implement appropriate MTE Advisors countermeasures to prevent and mitigate threats to your mission-critical processes. Mark T. Edmead is a successful technology entrepreneur You will learn techniques for creating a business continuity plan (BCP) and the with over 28 years of practical experience in computer systems architecture, information security, and project methodology for building an infrastructure that supports its effective management. implementation. Mark excels in managing the tight-deadlines and ever changing tasks related to mission-critical project BENEFITS OF ATTENDING schedules. He has extensive knowledge in IT security, IT Using a carefully selected case study, course participants will: and application audits, Internal Audit, IT governance, including Sarbanes-Oxley, FDIC/FFIEC, and GLBA • Create, document and test continuity arrangements for an organization compliance auditing. • Perform a risk assessment and Business Impact Assessment (BIA) to identify Mr. Edmead understands all aspects of information vulnerabilities security and protection including access controls, cryptography, security management practices, network • Select and deploy an alternate site for continuity of mission-critical activities and Internet security, computer security law and • Identify appropriate strategies to recover the infrastructure and processes investigations, and physical security. • Organize and manage recovery teams He has trained Fortune 500 and Fortune 1000 companies in the areas of information, system, and Internet security. • Test and maintain an effective recovery plan in a rapidly changing technology He has worked with many international firms, and has the environment unique ability to explain very technical concepts in simple-to-understand terms. Mr. Edmead is a sought after Sample Case Studies: author and lecturer for information security and information technology topics. • A major Middle Eastern bank has been experiencing tremendous growth and management feels that Mark works as an information security and regulatory their current BCP and DRP plans outdated. In this case study the delegates with perform a business compliance consultant. He has: impact analysis, based on interviews with key company stakeholders and subject matter experts, and outline which business areas are the most critical and in need of improved continuity and recovery • Conducted internal IT audits in the areas of critical plans. infrastructure/ systems and applications, • A manufacturing company is considering implementing a disaster recovery plan but does not know • Assessed and tested internal controls of critical which disaster recovery approach they should implement. In this case study the delegates with study infrastructure platform systems (Windows, UNIX, IIS, SQL, Oracle) the business enterprise, perform a risk analysis, and determine if a hot site, cold site, warm site, or another disaster recovery method is the best approach. • Assessed and tested internal controls of various critical financial applications. EXCLUSIVE: : TEMPLATES & TAKEAWAYS • Prepared risk assessments and determined risks to critical financial data systems and infrastructure c components. c 1. Bring your Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) for Bring your Busines Continuity Plan/Disaster Recov Bring your Busines Continuity Plan/Disaster Recovery ss private consultation review on review • Created test plans & processes and executed test plans. 2. BCP/DRP Step-by-step Guide • Conducted reviews of existing systems and 3. BCP/DRP templates and worksheets to aid you in applying and putting into applications, ensuring appropriate security, management a practice what you have learned from this workshop and data integrity via control processes. a 4. FREE copy of the course material, case studies, and other related items of the • Prepared written reports to all levels of management training workshop • Participated in audit review panel sessions to address results, conclusions and follow-up actions required. r © 360 BSI (M) Sdn Bhd (833835-X), Level 8 Pavilion KL 168 Jalan Bukit Bintang 55100 Kuala Lumpur Malaysia (833835 X) KL, Bintang, Lumpur, Malaysia. 1
  • 2. COURSE CONTENT DAY1 BUSINESS CONTINUITY LEADERSHIP WORKSHOP WHY THIS EVENT IT Leadership Workshop is a special one-day course designed to cover The aim of this interactive workshop is to provide the challenges faced with managing the business continuity efforts in an you with the skills critical to business continuity, organization. Implementing a full business continuity plan and disaster disaster recovery & risk management. recovery plan is a major effort. This requires coordination with all After attending this workshop, you will leave departments. It requires interfacing with individuals at all levels from fully armed with the knowledge needed to technicians and programmers to managers, directors, and C-level create a business continuity plan (BCP) and the executives. methodology for building an infrastructure that supports its effective implementation. In this workshop you will learn how perform a stakeholder analysis, The combination of interactive presentations, outline the stakeholders required to accomplish your job, and how to hands-on exercises and open discussion groups effectively navigate the possible roadblocks preventing you from along with real case studies, ensures you will accomplishing your tasks. In addition, you will learn tips and techniques obtain maximum value from attending. that will increase your competence and confidence when influencing and implementing information technology in your organization. Managing the Business Continuity Process - Creating a BCP/DRP framework - Determining your critical success factors (CSF) - Determining your key performance indicators (KPI) - Business continuity management strategies Understanding your Corporate Culture - Understanding your organization’s trends, strategy and environment - Tips, tricks, and trouble spots - Developing a business continuity management culture - Exercising, maintenance, and audit Understanding your Stakeholders - How to identify your key stakeholders - Performing a stakeholder analysis - Creating a stakeholder engagement communication plan - Getting stakeholder engagement and support DAY2 BCP/DRP - CONCEPTS & PRINCIPLES Introduction to Business Continuity and Disaster Recovery Planning - The difference between business continuity and disaster recovery WHO SHOULD ATTEND - Why a recovery plan is an integral part of an organization’s operational Vice Presidents, Directors, General Managers strategy Understanding where the threats come from Chief Information Officers - Understanding codes of practice and legal/regulatory compliance Chief Information Security Officers requirements Chief Technology Officers - The step-by-step process for BCP/DRP Business Continuity Officers Heads of Departments in Information Security Protecting our assets Management Information Systems, IT - What are we protecting? Infrastructure, IT Architecture, Network - What are our mission-critical processes? Operations, IT Operations, IT Data Center, - How to prioritize what is important to protect DataBase Management, IT Deployment IT Business Enterprise, IT Risk Management, What is risk and how do we deal with it? - Understanding risk assessment methodologies IT Quality Assurance, IT Audit, Risk Management, - Matching the response to the threat based on the risk Internal Audit, Disaster Recovery - Enterprise vs. local risk management - Top business continuity planning mistakes The need for business continuation – a case study - Introduction of fictitious business case - Understand business continuity/disaster recovery needs - Documenting the continuity requirements 2
  • 3. COURSE CONTENT DAY3 RISK ASSESSMENT & RECOVERY The Business Impact Assessment (BIA) - What is a Business Impact Assessment? - Assessing the risk to the enterprise Latest TESTIMONIALS - How to identify business critical activities - Impact versus likelihood of occurrence 1 “Session well organized The trainer is ver organized. very Establishing the Recovery Options conversant with the subject matter. Well delivered - Choosing a recovery site and would definitely recommend to anyone else.” - Habil Mutende, Manager Information Security & Change - Specifying equipment Management, Central Bank of Kenya - Choosing suppliers - How to select backup and restore strategies 2 “Excellent presentation, excellent attitude to answer our questions & to share his experience.” Where is the data? - Senior Manager, IT Department, Deloitte - Why you need to classify levels of information - Managing data at rest and in transit 3 “I have used Mark in key roles with high visibility - Understanding data access controls clients. Without hesitation I would highly - The value of knowing where your data resides recommend Mark for any and all IT audit engagements. His professionalism, deep Maintaining user connectivity knowledge, and results oriented work style are - How to communicate the disaster and recovery efforts to users deeply valued by not only myself, but more - How to identify and eliminate single points of failure importantly by the all those who are lucky enough - Communicating with the media to use his services.” - Russ Aebig, Director at Artesient 4 “We have used Mark Edmead on several projects in the past few years including SOX readiness for DAY4 PROJECT MANAGEMENT & REVIEW publicly traded companies and IT vulnerability BCP/DRP Project Management assessments for major financial institutions. He - Identifying stakeholders always delivers professional and detail-oriented - Analyzing stakeholder needs workpapers on-time and within budget. Mark is - Obtaining commitment from upper management highly recommended and we will continue to use him on other projects.” - Brenda Piazza, Director at CBIZ MHM Review of the BCP/DRP Process - Project initiation - Risk analysis - Business Impact analysis - Develop/choose strategies - Test and validate the plan - Modify/update the plan - Approve and implement the plan Analysis of fictitious business case Applying lessons learned **Affiliate membership to Business Continuity Institute COURSE SCHEDULE Affiliate members Business Continuity Institute Affiliate members Business Continuity Institute get access the following membership Affiliate members to Business Continuity Institute get access to the following membership access following membership 8.00 Registration & Coffee/Tea benefits: 8.30 Workshop commences - Continuity magazine – 4 per year (digital version) 10.10 - 10.30 Morning coffee/tea - Monthly BCI ENewsletter 12.00 - 13.00 Lunch - Access to ‘member only’ section of BCI website 14.40 - 15.00 Afternoon coffee/tea - Access to copies of BCI Workshop Reports - Member rates on BCI products and services 16.00 End of day - Networking opportunities at BCI organised events - Access to BCI mentoring programme - Access to discounted events 3
  • 4. BUSINESS CONTINUITY, REGISTRATION FORM DISASTER RECOVERY Fax: +603 9205 7788 PLANNING & LEADERSHIP Tel: +603 9205 7772 Mobile: +6016 3326 360 08 - 11 APRIL 2013 FOUR SEASONS HOTEL JAKARTA Email: kris@360bsi.com INDONESIA DELEGATES IN-HOUSE TRAINING 1 Name : 360 BSI is passionate about providing strategic IT programs and high potential training solutions across the region to build Name on tag : personal competencies and organizational capability. Job Title : You will receive practical training from a professionally qualified educator with over twenty years of teaching and Email : training experience. Mobile : Please feel free to mix-and-match topics from the areas listed below to get the right training content for your staff. Other 2 Name : topics may be available upon request. Name on tag : OTHER RELATED PUBLIC COURSES Job Title : IT Strategic Planning Email : Service Oriented Architecture (SOA) Business Continuity and Disaster Recovery Mobile : Preparing for the CISSP exam Cybercrime & Fraud Investigation 3 Name : IT Change Management Name on tag : IT Project Management Job Title : Hotel Contact Details: Email : For Room Reservation, please contact Reservation Desk. Tel. +62 (21) 252-3456 or Fax. +62 (21) 252-4480 Mobile : Four Seasons Hotel Jakarta AUTHORIZATION Jalan H.R. Rasuna Said, Jakarta 12920, Indonesia (This form is invalid without a signature) General Information: Name : 1 Closing date for registration is 1st April 2013. 2 The fees cover lunch, tea breaks, materials and certificate. Job Title : 3 Official confirmation will be sent, once registration has Email : been received. 4 Participants will need to arrange their own accommodation. 5 Attire: Smart Casual Tel : ( ) Cancellations/Substitutions Organization : Substitutions are welcome at any time. Please notify us at Address : least 2 working days prior to the event. All cancellations will carry a 10% cancellation fee, once a registration form is received. All cancellations must be in writing by fax or email at least 2 weeks before the event date. Cancellations with less than 2 weeks prior to the event date carry a 100% liability. However, course materials will still be couriered to you. Signature : Date: / / Thank you for your registration! FEES PAYMENT DETAILS Payment is required within 5 days upon receipt of USD 2,995 per delegate the invoice. USD 2,795 per delegate - register before 22-FEB-2013 Bank transfer: USD 8,085 - Special for Group of 3 360 BSI (M) Sdn Bhd The fee does not include any taxes (withholding or otherwise). In case of any taxes applicable HSBC Bank Malaysia Berhad the client has to ensure that the taxes are paid on top of the investment fee paid for the course. Bukit Bintang Branch, Kuala Lumpur, Malaysia Compliance with the local tax laws is the responsibility of the client. Account No: 203-371059-725 Swift No: HBMBMYKL * Save up to 50% for In-house Training program All payments must be received prior to the event date © 360 BSI (M) Sdn Bhd (833835-X), Level 8 Pavilion KL, 168 Jalan Bukit Bintang, 55100 Kuala Lumpur, Malaysia. www.360bsi.com/IT 4