SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Risk Analysis In Business Continuity Management Jeremy WongSenior Vice President GMH Continuity Architects
GMH Continuity Architects A leading consultancy focusing on business continuity, disaster recovery and crisis management in Asia Pacific since 1999. Our core business is in safeguarding our clients’ businesses through the sound application of proven, business-oriented business continuity methodologies. * GMH is an accredited partner of BCM Institute.
Jeremy Wong Prior Appointments ,[object Object],Head of BCM, South Asia ,[object Object],Head of BCM ,[object Object]
J P Morgan
Andersen Consultinghttp://www.bcmpedia.org/wiki/Jeremy_Wong
BCM Planning Methodology Source: 	 Goh, Moh Heng (2008): Managing Your Business Continuity Planning Project 2nd Edition ISBN: 978-981-05-9767-2
Risk Analysis & Review
Identify Assets & Threats ,[object Object]
Identify Threats,[object Object]
Identify Threats Man-Made Toxic and radioactive contamination Sabotage (both external and internal) Riot, civil disorder and coup Fraud and embezzlement Accidental explosion (on and offsite) Water leak and plumbing failure Workplace violence Terrorism Aircraft crash Vandalism Arson Physical asset theft Misuse of resources Building and physical security weakness Fire Natural Tornado (wind storm) Thunderstorm and hail storm Lightning and electrical storm Snow and winter ice storm Typhoon and hurricane Flood and other water-based incident Earthquake Mudslide Volcanic eruption and ash fallout Tsunami Large natural fire Epidemic and pandemic
Identify Threats Business Power outage Labor dispute Employee turnover and single point of failure Unavailability of key personnel Human error Gas outage Water outage Loss of transportation Single source suppliers Information Technology  Voice and data telecommunication failure IT equipment failure Human error from programmers and users Security vulnerability Data and software sabotage In-house developed application failure HVAC failure Defective software
Analyse Risks Identify impact or consequence of the threat materializing Estimate the likelihood of occurrence Determine risk level
Risk Analysis Process Controls What is cost for the Controls to be implemented? What Controls are in place? Risk What is the potential loss exposures to business? How does the threat affect business operations? Potential for Loss What is the likelihood that the threat will adversely affect business operations? Threats Likelihood What is the effects on people, infrastructure, facilities, and systems? Impact What are the adverse events that can occur?
Risk Level Matrix Fire Pandemic
Risk Evaluation Assess risk rating and prioritized for further treatment
Evaluation Criteria Criteria Examples: People Processes Infrastructure Weighting for different criteria
15 04-
Risk Evaluation Fire Pandemic
Risk Treatment Explore Treatment Strategies for risks deemed unacceptable Document reasons for selection of strategy for each risk treatment
Risk Treatment Strategies Risk Avoidance Risk Reduction Risk Transfer Risk Acceptance
Risk Treatment Strategies Avoid Transfer Reduce /  Active Control Reduce (if Cost  Justifiable) Accept
Risk Reduction Fire Pandemic Business Continuity Plan (BCP)
Risk Analysis and Business Continuity Planning Process Risk Treatment Strategies Treatment for risks that could potentially interrupt business operations
Implement & Monitor Present Recommendations to management for approval  Implement recommendations Monitor results Adjust as necessary

Weitere ähnliche Inhalte

Was ist angesagt?

Risk assessment and management
Risk assessment and managementRisk assessment and management
Risk assessment and managementTaekHyeun Kim
 
Risk Management Plan In Business PowerPoint Presentation Slides
Risk Management Plan In Business PowerPoint Presentation Slides Risk Management Plan In Business PowerPoint Presentation Slides
Risk Management Plan In Business PowerPoint Presentation Slides SlideTeam
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...Eneni Oduwole
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Goutama Bachtiar
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Planmhdpaknejad
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcpAdv Prashant Mali
 
Recognizing unsafe conditions
Recognizing unsafe conditionsRecognizing unsafe conditions
Recognizing unsafe conditionsSaeed Hassan
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Narudom Roongsiriwong, CISSP
 
Risk Assessments Best Practice and Practical Approaches Webinar
Risk Assessments Best Practice and Practical Approaches WebinarRisk Assessments Best Practice and Practical Approaches Webinar
Risk Assessments Best Practice and Practical Approaches WebinarAviva Spectrum™
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxvasidharta
 
Bcm Framework PowerPoint Presentation Slides
Bcm Framework PowerPoint Presentation SlidesBcm Framework PowerPoint Presentation Slides
Bcm Framework PowerPoint Presentation SlidesSlideTeam
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recoverySameeu Imad
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementNada G.Youssef
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop FinalBill Lisse
 

Was ist angesagt? (20)

Risk assessment and management
Risk assessment and managementRisk assessment and management
Risk assessment and management
 
Risk Management Plan In Business PowerPoint Presentation Slides
Risk Management Plan In Business PowerPoint Presentation Slides Risk Management Plan In Business PowerPoint Presentation Slides
Risk Management Plan In Business PowerPoint Presentation Slides
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Risk Assessment and Management
Risk Assessment and ManagementRisk Assessment and Management
Risk Assessment and Management
 
BUSINESS CONTINUITY PLANNING
BUSINESS CONTINUITY PLANNINGBUSINESS CONTINUITY PLANNING
BUSINESS CONTINUITY PLANNING
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
Recognizing unsafe conditions
Recognizing unsafe conditionsRecognizing unsafe conditions
Recognizing unsafe conditions
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
 
Risk Assessments Best Practice and Practical Approaches Webinar
Risk Assessments Best Practice and Practical Approaches WebinarRisk Assessments Best Practice and Practical Approaches Webinar
Risk Assessments Best Practice and Practical Approaches Webinar
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Bcm Framework PowerPoint Presentation Slides
Bcm Framework PowerPoint Presentation SlidesBcm Framework PowerPoint Presentation Slides
Bcm Framework PowerPoint Presentation Slides
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recovery
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop Final
 

Andere mochten auch

Mba 1 me u 4 profit management & risk analysis
Mba 1 me u 4  profit management & risk analysisMba 1 me u 4  profit management & risk analysis
Mba 1 me u 4 profit management & risk analysisRai University
 
Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...
Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...
Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...BCM Institute
 
Business continuity management and risk -The role of standards
Business continuity management  and risk -The role of standardsBusiness continuity management  and risk -The role of standards
Business continuity management and risk -The role of standardsBSI British Standards Institution
 
Understanding risk analysis and risk management with net zealous llc services...
Understanding risk analysis and risk management with net zealous llc services...Understanding risk analysis and risk management with net zealous llc services...
Understanding risk analysis and risk management with net zealous llc services...NetZealous LLC
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceJTLeekley
 
Risk Analysis & Risk Management
Risk Analysis & Risk ManagementRisk Analysis & Risk Management
Risk Analysis & Risk ManagementGrafic.guru
 
Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...
Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...
Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...BCM Institute
 
Building business continuity through risk management, presented by Kimberley ...
Building business continuity through risk management, presented by Kimberley ...Building business continuity through risk management, presented by Kimberley ...
Building business continuity through risk management, presented by Kimberley ...Association for Project Management
 
Risk Management - Business Continuity Planning and Management
Risk Management  - Business Continuity Planning and ManagementRisk Management  - Business Continuity Planning and Management
Risk Management - Business Continuity Planning and ManagementCody Shive
 
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011Pedram Danesh-Mand
 
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...Marco Morana
 
Business analysis sample report, Business Impact Analysis Report ,Business An...
Business analysis sample report, Business Impact Analysis Report ,Business An...Business analysis sample report, Business Impact Analysis Report ,Business An...
Business analysis sample report, Business Impact Analysis Report ,Business An...Sukumar Jena
 
Risk Analysis of Geological Hazards and Disaster Management
Risk Analysis of Geological Hazards and Disaster ManagementRisk Analysis of Geological Hazards and Disaster Management
Risk Analysis of Geological Hazards and Disaster ManagementClaudio Ferreira
 
PETROLEUM RISK ANALYSIS & PORTFOLIO MANAGEMENT
PETROLEUM RISK ANALYSIS & PORTFOLIO MANAGEMENT PETROLEUM RISK ANALYSIS & PORTFOLIO MANAGEMENT
PETROLEUM RISK ANALYSIS & PORTFOLIO MANAGEMENT petroEDGE
 
Risk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk ManagementRisk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk ManagementSaket Bansal
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity ManagementDiane Christina
 

Andere mochten auch (20)

Mba 1 me u 4 profit management & risk analysis
Mba 1 me u 4  profit management & risk analysisMba 1 me u 4  profit management & risk analysis
Mba 1 me u 4 profit management & risk analysis
 
Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...
Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...
Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...
 
Business continuity management and risk -The role of standards
Business continuity management  and risk -The role of standardsBusiness continuity management  and risk -The role of standards
Business continuity management and risk -The role of standards
 
Understanding risk analysis and risk management with net zealous llc services...
Understanding risk analysis and risk management with net zealous llc services...Understanding risk analysis and risk management with net zealous llc services...
Understanding risk analysis and risk management with net zealous llc services...
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC Complaince
 
Risk Analysis & Risk Management
Risk Analysis & Risk ManagementRisk Analysis & Risk Management
Risk Analysis & Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...
Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...
Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...
 
Building business continuity through risk management, presented by Kimberley ...
Building business continuity through risk management, presented by Kimberley ...Building business continuity through risk management, presented by Kimberley ...
Building business continuity through risk management, presented by Kimberley ...
 
Risk Management - Business Continuity Planning and Management
Risk Management  - Business Continuity Planning and ManagementRisk Management  - Business Continuity Planning and Management
Risk Management - Business Continuity Planning and Management
 
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
Schedule Risk Analysis (SRA) by Pedram Daneshmand 14-Jan-2011
 
Introduction to Business Continuity Management
Introduction to Business Continuity ManagementIntroduction to Business Continuity Management
Introduction to Business Continuity Management
 
Pert master risk analysis tool
Pert master   risk analysis toolPert master   risk analysis tool
Pert master risk analysis tool
 
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
 
Business analysis sample report, Business Impact Analysis Report ,Business An...
Business analysis sample report, Business Impact Analysis Report ,Business An...Business analysis sample report, Business Impact Analysis Report ,Business An...
Business analysis sample report, Business Impact Analysis Report ,Business An...
 
Risk Analysis of Geological Hazards and Disaster Management
Risk Analysis of Geological Hazards and Disaster ManagementRisk Analysis of Geological Hazards and Disaster Management
Risk Analysis of Geological Hazards and Disaster Management
 
PETROLEUM RISK ANALYSIS & PORTFOLIO MANAGEMENT
PETROLEUM RISK ANALYSIS & PORTFOLIO MANAGEMENT PETROLEUM RISK ANALYSIS & PORTFOLIO MANAGEMENT
PETROLEUM RISK ANALYSIS & PORTFOLIO MANAGEMENT
 
Risk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk ManagementRisk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk Management
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
Pmp risk management
Pmp risk managementPmp risk management
Pmp risk management
 

Ähnlich wie Risk Analysis In Business Continuity Management - Jeremy Wong

Business Continuity Management or Risk Management? Aligning Expectations for ...
Business Continuity Management or Risk Management? Aligning Expectations for ...Business Continuity Management or Risk Management? Aligning Expectations for ...
Business Continuity Management or Risk Management? Aligning Expectations for ...BCM Institute
 
ERM Presentation
ERM PresentationERM Presentation
ERM PresentationH Contrex
 
Ilta09 Law Firm Risk Management D Cunningham
Ilta09 Law Firm Risk Management  D CunninghamIlta09 Law Firm Risk Management  D Cunningham
Ilta09 Law Firm Risk Management D CunninghamBaker Robbins & Company
 
It risk assessment in uae
It risk assessment in uaeIt risk assessment in uae
It risk assessment in uaeRishalHalid1
 
HLM Associates Brochure 2016
HLM Associates Brochure 2016HLM Associates Brochure 2016
HLM Associates Brochure 2016Michael Laverdure
 
Enterprise risk & risk management - I
Enterprise risk & risk management - IEnterprise risk & risk management - I
Enterprise risk & risk management - IDr. Shiv S Tripathi
 
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
Satori Whitepaper: Threat Intelligence  - a path to taming digital threatsSatori Whitepaper: Threat Intelligence  - a path to taming digital threats
Satori Whitepaper: Threat Intelligence - a path to taming digital threatsDean Evans
 
Risk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxRisk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxSUBHI7
 
Ilta 2009 law firm risk management can it grow profitability - panel member...
Ilta 2009 law firm risk management   can it grow profitability - panel member...Ilta 2009 law firm risk management   can it grow profitability - panel member...
Ilta 2009 law firm risk management can it grow profitability - panel member...David Cunningham
 
Risk Analysis In IT Projects - TNS09
Risk Analysis In IT Projects - TNS09Risk Analysis In IT Projects - TNS09
Risk Analysis In IT Projects - TNS09Thomas Danford
 
Risk Management in Supply chain management
Risk Management in Supply chain managementRisk Management in Supply chain management
Risk Management in Supply chain managementNishikant Rajeshirke
 
Running Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNER
Running Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNERRunning Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNER
Running Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNERMalikPinckney86
 
Human Factors - Driver for Safety Management, Engineering and Risk Governance
Human Factors - Driver for Safety Management, Engineering and Risk GovernanceHuman Factors - Driver for Safety Management, Engineering and Risk Governance
Human Factors - Driver for Safety Management, Engineering and Risk GovernanceThe Windsdor Consulting Group, Inc.
 
Enterprise Risk Management for the Digital Transformation Age
Enterprise Risk Management for the Digital Transformation AgeEnterprise Risk Management for the Digital Transformation Age
Enterprise Risk Management for the Digital Transformation AgeCareer Communications Group
 
Information Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT RisksInformation Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT RisksHernan Huwyler, MBA CPA
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachPECB
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 

Ähnlich wie Risk Analysis In Business Continuity Management - Jeremy Wong (20)

Business Continuity Management or Risk Management? Aligning Expectations for ...
Business Continuity Management or Risk Management? Aligning Expectations for ...Business Continuity Management or Risk Management? Aligning Expectations for ...
Business Continuity Management or Risk Management? Aligning Expectations for ...
 
ERM Presentation
ERM PresentationERM Presentation
ERM Presentation
 
Ilta09 Law Firm Risk Management D Cunningham
Ilta09 Law Firm Risk Management  D CunninghamIlta09 Law Firm Risk Management  D Cunningham
Ilta09 Law Firm Risk Management D Cunningham
 
It risk assessment in uae
It risk assessment in uaeIt risk assessment in uae
It risk assessment in uae
 
HLM Associates Brochure 2016
HLM Associates Brochure 2016HLM Associates Brochure 2016
HLM Associates Brochure 2016
 
Enterprise risk & risk management - I
Enterprise risk & risk management - IEnterprise risk & risk management - I
Enterprise risk & risk management - I
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
Satori Whitepaper: Threat Intelligence  - a path to taming digital threatsSatori Whitepaper: Threat Intelligence  - a path to taming digital threats
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
 
Risk management of supply chain
Risk management of supply chainRisk management of supply chain
Risk management of supply chain
 
Risk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxRisk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docx
 
Risk Management 1 (2)
Risk Management 1 (2)Risk Management 1 (2)
Risk Management 1 (2)
 
Ilta 2009 law firm risk management can it grow profitability - panel member...
Ilta 2009 law firm risk management   can it grow profitability - panel member...Ilta 2009 law firm risk management   can it grow profitability - panel member...
Ilta 2009 law firm risk management can it grow profitability - panel member...
 
Risk Analysis In IT Projects - TNS09
Risk Analysis In IT Projects - TNS09Risk Analysis In IT Projects - TNS09
Risk Analysis In IT Projects - TNS09
 
Risk Management in Supply chain management
Risk Management in Supply chain managementRisk Management in Supply chain management
Risk Management in Supply chain management
 
Running Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNER
Running Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNERRunning Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNER
Running Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNER
 
Human Factors - Driver for Safety Management, Engineering and Risk Governance
Human Factors - Driver for Safety Management, Engineering and Risk GovernanceHuman Factors - Driver for Safety Management, Engineering and Risk Governance
Human Factors - Driver for Safety Management, Engineering and Risk Governance
 
Enterprise Risk Management for the Digital Transformation Age
Enterprise Risk Management for the Digital Transformation AgeEnterprise Risk Management for the Digital Transformation Age
Enterprise Risk Management for the Digital Transformation Age
 
Information Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT RisksInformation Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT Risks
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approach
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 

Mehr von BCM Institute

Business Continuity and Resilience: What Lies in the Future and What Steps Ca...
Business Continuity and Resilience: What Lies in the Future and What Steps Ca...Business Continuity and Resilience: What Lies in the Future and What Steps Ca...
Business Continuity and Resilience: What Lies in the Future and What Steps Ca...BCM Institute
 
Enterprise Risk Management and Business Continuity: How Can They Work Togethe...
Enterprise Risk Management and Business Continuity: How Can They Work Togethe...Enterprise Risk Management and Business Continuity: How Can They Work Togethe...
Enterprise Risk Management and Business Continuity: How Can They Work Togethe...BCM Institute
 
Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...
Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...
Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...BCM Institute
 
Operational and Business Continuity Management Strategy for Multi-type Nation...
Operational and Business Continuity Management Strategy for Multi-type Nation...Operational and Business Continuity Management Strategy for Multi-type Nation...
Operational and Business Continuity Management Strategy for Multi-type Nation...BCM Institute
 
Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...
Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...
Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...BCM Institute
 
Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...
Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...
Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...BCM Institute
 
The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...
The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...
The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...BCM Institute
 
Experience Sharing - Risk Management, Crisis Management & BCM In An Education...
Experience Sharing - Risk Management, Crisis Management & BCM In An Education...Experience Sharing - Risk Management, Crisis Management & BCM In An Education...
Experience Sharing - Risk Management, Crisis Management & BCM In An Education...BCM Institute
 
Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...
Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...
Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...BCM Institute
 
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...BCM Institute
 
BCM Institute Course Schedule 2016
BCM Institute Course Schedule 2016BCM Institute Course Schedule 2016
BCM Institute Course Schedule 2016BCM Institute
 
Deploying A Crisis Management and Business Continuity Approach to Product Tam...
Deploying A Crisis Management and Business Continuity Approach to Product Tam...Deploying A Crisis Management and Business Continuity Approach to Product Tam...
Deploying A Crisis Management and Business Continuity Approach to Product Tam...BCM Institute
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...BCM Institute
 
Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...
Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...
Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...BCM Institute
 
Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...
Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...
Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...BCM Institute
 
Certified Crisis Management Professional Programme Brochure
Certified Crisis Management Professional Programme Brochure Certified Crisis Management Professional Programme Brochure
Certified Crisis Management Professional Programme Brochure BCM Institute
 
BCM Institute Malaysia Course Schedule 2015
BCM Institute Malaysia Course Schedule 2015 BCM Institute Malaysia Course Schedule 2015
BCM Institute Malaysia Course Schedule 2015 BCM Institute
 
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...BCM Institute
 
Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...
Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...
Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...BCM Institute
 

Mehr von BCM Institute (20)

Business Continuity and Resilience: What Lies in the Future and What Steps Ca...
Business Continuity and Resilience: What Lies in the Future and What Steps Ca...Business Continuity and Resilience: What Lies in the Future and What Steps Ca...
Business Continuity and Resilience: What Lies in the Future and What Steps Ca...
 
Enterprise Risk Management and Business Continuity: How Can They Work Togethe...
Enterprise Risk Management and Business Continuity: How Can They Work Togethe...Enterprise Risk Management and Business Continuity: How Can They Work Togethe...
Enterprise Risk Management and Business Continuity: How Can They Work Togethe...
 
Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...
Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...
Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...
 
Operational and Business Continuity Management Strategy for Multi-type Nation...
Operational and Business Continuity Management Strategy for Multi-type Nation...Operational and Business Continuity Management Strategy for Multi-type Nation...
Operational and Business Continuity Management Strategy for Multi-type Nation...
 
Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...
Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...
Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...
 
Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...
Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...
Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...
 
The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...
The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...
The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...
 
Experience Sharing - Risk Management, Crisis Management & BCM In An Education...
Experience Sharing - Risk Management, Crisis Management & BCM In An Education...Experience Sharing - Risk Management, Crisis Management & BCM In An Education...
Experience Sharing - Risk Management, Crisis Management & BCM In An Education...
 
Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...
Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...
Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...
 
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
 
BCM Institute Course Schedule 2016
BCM Institute Course Schedule 2016BCM Institute Course Schedule 2016
BCM Institute Course Schedule 2016
 
Deploying A Crisis Management and Business Continuity Approach to Product Tam...
Deploying A Crisis Management and Business Continuity Approach to Product Tam...Deploying A Crisis Management and Business Continuity Approach to Product Tam...
Deploying A Crisis Management and Business Continuity Approach to Product Tam...
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...
Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...
Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...
 
Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...
Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...
Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...
 
Certified Crisis Management Professional Programme Brochure
Certified Crisis Management Professional Programme Brochure Certified Crisis Management Professional Programme Brochure
Certified Crisis Management Professional Programme Brochure
 
BCM Institute Malaysia Course Schedule 2015
BCM Institute Malaysia Course Schedule 2015 BCM Institute Malaysia Course Schedule 2015
BCM Institute Malaysia Course Schedule 2015
 
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
 
Bhakorn Vanuptikul
Bhakorn Vanuptikul Bhakorn Vanuptikul
Bhakorn Vanuptikul
 
Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...
Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...
Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...
 

Risk Analysis In Business Continuity Management - Jeremy Wong

  • 1. Risk Analysis In Business Continuity Management Jeremy WongSenior Vice President GMH Continuity Architects
  • 2. GMH Continuity Architects A leading consultancy focusing on business continuity, disaster recovery and crisis management in Asia Pacific since 1999. Our core business is in safeguarding our clients’ businesses through the sound application of proven, business-oriented business continuity methodologies. * GMH is an accredited partner of BCM Institute.
  • 3.
  • 6. BCM Planning Methodology Source: Goh, Moh Heng (2008): Managing Your Business Continuity Planning Project 2nd Edition ISBN: 978-981-05-9767-2
  • 8.
  • 9.
  • 10. Identify Threats Man-Made Toxic and radioactive contamination Sabotage (both external and internal) Riot, civil disorder and coup Fraud and embezzlement Accidental explosion (on and offsite) Water leak and plumbing failure Workplace violence Terrorism Aircraft crash Vandalism Arson Physical asset theft Misuse of resources Building and physical security weakness Fire Natural Tornado (wind storm) Thunderstorm and hail storm Lightning and electrical storm Snow and winter ice storm Typhoon and hurricane Flood and other water-based incident Earthquake Mudslide Volcanic eruption and ash fallout Tsunami Large natural fire Epidemic and pandemic
  • 11. Identify Threats Business Power outage Labor dispute Employee turnover and single point of failure Unavailability of key personnel Human error Gas outage Water outage Loss of transportation Single source suppliers Information Technology Voice and data telecommunication failure IT equipment failure Human error from programmers and users Security vulnerability Data and software sabotage In-house developed application failure HVAC failure Defective software
  • 12. Analyse Risks Identify impact or consequence of the threat materializing Estimate the likelihood of occurrence Determine risk level
  • 13. Risk Analysis Process Controls What is cost for the Controls to be implemented? What Controls are in place? Risk What is the potential loss exposures to business? How does the threat affect business operations? Potential for Loss What is the likelihood that the threat will adversely affect business operations? Threats Likelihood What is the effects on people, infrastructure, facilities, and systems? Impact What are the adverse events that can occur?
  • 14. Risk Level Matrix Fire Pandemic
  • 15. Risk Evaluation Assess risk rating and prioritized for further treatment
  • 16. Evaluation Criteria Criteria Examples: People Processes Infrastructure Weighting for different criteria
  • 19. Risk Treatment Explore Treatment Strategies for risks deemed unacceptable Document reasons for selection of strategy for each risk treatment
  • 20. Risk Treatment Strategies Risk Avoidance Risk Reduction Risk Transfer Risk Acceptance
  • 21. Risk Treatment Strategies Avoid Transfer Reduce / Active Control Reduce (if Cost Justifiable) Accept
  • 22. Risk Reduction Fire Pandemic Business Continuity Plan (BCP)
  • 23. Risk Analysis and Business Continuity Planning Process Risk Treatment Strategies Treatment for risks that could potentially interrupt business operations
  • 24. Implement & Monitor Present Recommendations to management for approval Implement recommendations Monitor results Adjust as necessary

Hinweis der Redaktion

  1. Good afternoon Ladies and Gentlemen, I’m Jeremy Wong, and I am very pleased to be here this afternoon to share with you on how Risk Analysis can be conducted for BCM.
  2. First, a quick introduction. I am currently the Senior Vice President of GMH Continuity Architects. GMH is a consulting firm focusing on Business Continuity Management, Disaster Recovery and Crisis Management. Our core business is to help organisations plan and execute their business continuity plans, and I am happy to say that so far we have been very successful in doing just that. We have implemented BCP for organisations, not only in Singapore, but also around the region, in Malaysia, Brunei, Thailand and Philippines. As part of our consulting approach, we help equip clients with the knowledge and skills to continue the BC programme even after we leave. That is why we partner with BCM Institute on education and certification programmes.
  3. Before the break, Dr Goh presented you with a short but concise description of each phase in the BCM Planning Methodology. In the short time we have together this afternoon, I would like to focus on just one particular phase of the BCM Lifecycle – what many of you know as Risk Analysis or Risk Assessment. At this point, we are concerned with gathering and analysing information, and not into drawing up BC plans yet. That comes later in the recovery strategy and plan development phases.In Risk Analysis and Review, we examine the external environment for threats that can negatively impact the organisation. We then look for cost-effective ways to mitigate the risks posed by those threats.
  4. To simplify, we can breakdown the risk analysis and review process into 5 stages– Identify, Analyse, Evaluate, Treat, and Implement & Monitor. Let’s look at each of these stages...
  5. First, Identify. Before anything can be done about the risks, we first must be able to identify – the assets we have that we want to protect, and the potentials threats that could severely affect those assets.
  6. Examples of organisational assets would be facilities, people, data, software, applications and equipment. The outcome is an inventory list of assets.In addition to physical assets, the list may also contain intangible assets like reputation, business relationships.
  7. We will also need to identify the various threats that might affect our organisations. Here I have listed down 4 categories of threats that you might want to consider. For Natural Threats we have typhoons, floods, earthquakes and pandemics. One of these threats could cause major problems, a combination could be quite devastating. If you recall, in Indonesia last year we had a volcanic eruption and earthquake occuring very close to each other, and that caused huge problems for Indonesia. Natural Threat is a threat resulting from the effect of nature that may cause a disruptive impact to an organization. Man-made Threats are threats resulting from human interventions.
  8. Business and Information Technology related threats may overlap with “man-made” threats.Information Technology related threats, specifically relate to the failure in IT and infrastructure components.And there could also combinations of threats from 2 or more categories. For example, most of you will remember the Icelandic vulcanic eruption in March last year. Iceland is right across the globe, but because of ash clouds halted hundreds of flights, the effects were felt even in Singapore. Supply chains were disrupted and businesses from many parts of the world were affected.There are many ways you can carry out threat identification. They are : through “walkaround observation”, checklists, research into historical records, brainstorming. At the threat identification stage, you would have narrowed the list down to about 10-15 threats that are most relevant to the organisation.Audits or physical inspections.Accident / Incident reports.Brainstorming.Decision trees.History.Interview / focus groups.Personal or organisational experience.Scenario analysis.Strengths, weaknesses, opportunities and threats (SWOT) analysis.Survey or questionnaires.The purpose of this stage is so that the project team is able to narrow down the list of threats to the relevant handful that is more manageable.
  9. Once we have listed down the most probable threats, we would then be able to dissect each threat and examine the Impact and likelihood of occurrence.
  10. We first determine the existing controls and with these controls in mind, we estimate the impact and likelihood of the threats occurring and arrive at a risk level for each threat. For easy reference, we can map the risk level into a matrix. Risk Analysis is the process to identify the risks to an organization; to define the controls in place so as to reduce organization exposure; and to evaluate the cost for the controls to be implemented. Identify the threats.Identify the likelihood of the threat occurring.Estimate the impact on people (both the staff & the customers), assets and information.Identify the threat, likelihood and impact.Identify the controls to be implemented.
  11. Here I have put in Fire and Pandemic for illustration. Remember that we have already taken into account the existing controls when developing this risk level matrix, so what you see here represents the residual risk after the existing controls have been applied.Some organisations prefer more detail and go for a 5 x 5 matrix rather than the 3 x 3 matrix shown here. That’s fine so long as the organisation is comfortable with the level of complexity.
  12. Once we are able to locate each threat, we move into the Evaluation stage which is A Screening Process – risks are reviewed against a pre-defined set of criteria and adjusted. Categories of risk may arise which require different responses. You may find that many of the more minor risks are filtered out after due consideration. This screening process helps the organisation focus on the most important risks to tackle. In other words, the Evaluation stage helps us prioritize our risks.This stage may be relatively simple for companies that have just a few threats, but may be more involved for companies that are big, and have more at stake should a major operational disruption occur.
  13. To do a proper evaluation or prioritization of risk, we need a set of evaluation criteria. The list shows several examples of criteria that can be used to assess and further refine the risk level. To differentiate the significance or importance of criteria, some companies may want to introduce a weighting system, although often this does not contribute much in producing a more accurate analysis.
  14. In practice, we use a template to collect the information to do this mapping. What you see on the screen is a sample template used to collect risk information.
  15. So in our illustration, we have 3 risk rating zones – the high risk zone in Red, the low risk zone in green, and the medium risk zone in amber. Not surprisingly, companies would want to tackle the red high risk zone first. Only after that do they work on the medium risk zone.
  16. Once we have identified and prioritized our risks, we now need to find suitable ways of dealing with these risks.
  17. There are generally 4 strategies that can be used to treat risk – acceptance, avoidance, transfer and reduction.
  18. Some reasons why a risk may be acceptable include: The level of RISK IS SO LOW that specific treatment in not suitable given the available resources.There is NO TREATMENT AVAILABLE.The COST OF TREATMENT SO HIGH outweighs the benefit.OPPORTUNITIES PRESENTED OUTWEIGH the threats to such an extent that the risk is acceptable.
  19. Looking at Risk Reduction in greater detail, we see that there are actually 2 ways to go – we could either reduce the likelihood of a risk occurring (like putting in preventive controls) , or we could reduce the impact of the risk. This is where having a BCP plays an important part in limiting the downside of a disaster and implementing recovery.