SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Business Continuity for Information Systems State of Utah – October 2006
Business Continuity ,[object Object],[object Object]
Why is it important? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Continuity of Operations (COOP) ,[object Object]
Elements of a Viable COOP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A viable COOP needs to include:
Systems Assessment ,[object Object],[object Object],[object Object],[object Object],[object Object]
Key Infrastructure Capabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COOP Tiers ,[object Object],[object Object],[object Object]
Funding requirement To bring all systems  that have been identified  as having Tier 1 and Tier 2 COOP requirements up to that level of preparedness would require estimated funding of  $18.9 million . * see COOP systems report for detail
Business Continuity Needs ,[object Object],[object Object],Values are in millions of dollars
Key Functions for Business Continuity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Emergency Support Functions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tier 1 State of Utah Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk of not addressing Tier One ,[object Object],[object Object],[object Object],[object Object]
Tier 2 State of Utah Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk of not addressing Tier Two ,[object Object],[object Object],[object Object],[object Object]
Tier 3 Examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Richfield Alternate Data Center Capabilities: different earthquake zone from Wasatch Front, 4 microwave and 1 fiber path to core state network, backup mainframe, backup power (UPS and generator), alternate internet connection, staffed 24x7 Can be used to house all business resumption capabilities. *  Will need to be expanded if tier 1,2, and 3 COOP is implemented
Richfield Systems ,[object Object],[object Object],[object Object],These systems (outside the executive branch) are currently housed at the Richfield data center to provide business continuity services:
In Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Andere mochten auch

Safari 2012 [Final presentation Stadsschouwburg]
Safari 2012 [Final presentation Stadsschouwburg]Safari 2012 [Final presentation Stadsschouwburg]
Safari 2012 [Final presentation Stadsschouwburg]Kennisland
 
Beckett samuel-three-dialogues-samuel-beckett-and-georges-duthuit
Beckett samuel-three-dialogues-samuel-beckett-and-georges-duthuitBeckett samuel-three-dialogues-samuel-beckett-and-georges-duthuit
Beckett samuel-three-dialogues-samuel-beckett-and-georges-duthuitTeresa Levy
 
Dasein, red elephant
Dasein, red elephantDasein, red elephant
Dasein, red elephantTeresa Levy
 
Beaulieu concrete commentary
Beaulieu concrete commentaryBeaulieu concrete commentary
Beaulieu concrete commentaryTeresa Levy
 
Kowbalski conceptual
Kowbalski conceptualKowbalski conceptual
Kowbalski conceptualTeresa Levy
 
Derrida interviews-coleman 1997
Derrida interviews-coleman 1997Derrida interviews-coleman 1997
Derrida interviews-coleman 1997Teresa Levy
 
Sería estupendo...
Sería estupendo...Sería estupendo...
Sería estupendo...lolylago
 
Cloud Computing in Government
Cloud Computing in GovernmentCloud Computing in Government
Cloud Computing in GovernmentDavid Fletcher
 
Ta Review: Application Servers
Ta Review: Application ServersTa Review: Application Servers
Ta Review: Application ServersDavid Fletcher
 
Viettel chung thuc-so_ke_khai_qua_mang
Viettel chung thuc-so_ke_khai_qua_mangViettel chung thuc-so_ke_khai_qua_mang
Viettel chung thuc-so_ke_khai_qua_mangPham Ngoc Quang
 
Workshop netwerkdag NOB
Workshop netwerkdag NOBWorkshop netwerkdag NOB
Workshop netwerkdag NOBKennisland
 
Viral, Buzz & Influential marketing : How to adopt marketing 2.0
Viral, Buzz & Influential marketing : How to adopt marketing 2.0Viral, Buzz & Influential marketing : How to adopt marketing 2.0
Viral, Buzz & Influential marketing : How to adopt marketing 2.0Emmanuel Vivier
 

Andere mochten auch (20)

Ep023246
Ep023246Ep023246
Ep023246
 
Safari 2012 [Final presentation Stadsschouwburg]
Safari 2012 [Final presentation Stadsschouwburg]Safari 2012 [Final presentation Stadsschouwburg]
Safari 2012 [Final presentation Stadsschouwburg]
 
Beckett samuel-three-dialogues-samuel-beckett-and-georges-duthuit
Beckett samuel-three-dialogues-samuel-beckett-and-georges-duthuitBeckett samuel-three-dialogues-samuel-beckett-and-georges-duthuit
Beckett samuel-three-dialogues-samuel-beckett-and-georges-duthuit
 
Dasein, red elephant
Dasein, red elephantDasein, red elephant
Dasein, red elephant
 
Beaulieu concrete commentary
Beaulieu concrete commentaryBeaulieu concrete commentary
Beaulieu concrete commentary
 
Kowbalski conceptual
Kowbalski conceptualKowbalski conceptual
Kowbalski conceptual
 
Chuong 7 tieu hoa
Chuong 7 tieu hoaChuong 7 tieu hoa
Chuong 7 tieu hoa
 
Derrida interviews-coleman 1997
Derrida interviews-coleman 1997Derrida interviews-coleman 1997
Derrida interviews-coleman 1997
 
изабелла козлова+
изабелла козлова+изабелла козлова+
изабелла козлова+
 
Mitraco Securities
Mitraco SecuritiesMitraco Securities
Mitraco Securities
 
Sería estupendo...
Sería estupendo...Sería estupendo...
Sería estupendo...
 
Cloud Computing in Government
Cloud Computing in GovernmentCloud Computing in Government
Cloud Computing in Government
 
Ta Review: Application Servers
Ta Review: Application ServersTa Review: Application Servers
Ta Review: Application Servers
 
Gay science
Gay scienceGay science
Gay science
 
ITMS Orientation
ITMS OrientationITMS Orientation
ITMS Orientation
 
Viettel chung thuc-so_ke_khai_qua_mang
Viettel chung thuc-so_ke_khai_qua_mangViettel chung thuc-so_ke_khai_qua_mang
Viettel chung thuc-so_ke_khai_qua_mang
 
Workshop netwerkdag NOB
Workshop netwerkdag NOBWorkshop netwerkdag NOB
Workshop netwerkdag NOB
 
Barnes mallarme
Barnes mallarmeBarnes mallarme
Barnes mallarme
 
Viral, Buzz & Influential marketing : How to adopt marketing 2.0
Viral, Buzz & Influential marketing : How to adopt marketing 2.0Viral, Buzz & Influential marketing : How to adopt marketing 2.0
Viral, Buzz & Influential marketing : How to adopt marketing 2.0
 
Nhap mon sinh hoc 4
Nhap mon sinh hoc 4Nhap mon sinh hoc 4
Nhap mon sinh hoc 4
 

Ähnlich wie Business continuity for information systems

Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanTripwire
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxbagotjesusa
 
ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"
ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"  ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"
ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise" ESEI
 
Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security Adhar kashyap
 
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...IRJET Journal
 
An analysis of the supply chain risk
An analysis of the supply chain risk An analysis of the supply chain risk
An analysis of the supply chain risk Steve Mahnke
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsDoubleHorn
 
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit ClinicsRoad Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit ClinicsIOSR Journals
 
Understanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsUnderstanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsEMMAIntl
 
Effective Date August 25, 2014Chapter Information Manag.docx
Effective Date  August 25, 2014Chapter Information Manag.docxEffective Date  August 25, 2014Chapter Information Manag.docx
Effective Date August 25, 2014Chapter Information Manag.docxLinaCovington707
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?Brian K. Dickard
 
It seminar isr
It seminar isrIt seminar isr
It seminar isrASNA p.a
 
Accessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsAccessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsIJARIIT
 
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskAssessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskTrustArc
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxstilliegeorgiana
 
Capstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid SecurityCapstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid Securityreuben_mathew
 
archenaa2015-survey-big-data-government.pdf
archenaa2015-survey-big-data-government.pdfarchenaa2015-survey-big-data-government.pdf
archenaa2015-survey-big-data-government.pdfAkuhuruf
 

Ähnlich wie Business continuity for information systems (20)

Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
 
ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"
ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"  ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"
ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"
 
Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security
 
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
 
An analysis of the supply chain risk
An analysis of the supply chain risk An analysis of the supply chain risk
An analysis of the supply chain risk
 
N018138696
N018138696N018138696
N018138696
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
 
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit ClinicsRoad Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
 
Understanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsUnderstanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and Applications
 
Effective Date August 25, 2014Chapter Information Manag.docx
Effective Date  August 25, 2014Chapter Information Manag.docxEffective Date  August 25, 2014Chapter Information Manag.docx
Effective Date August 25, 2014Chapter Information Manag.docx
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
 
Mike Alagna
Mike AlagnaMike Alagna
Mike Alagna
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
Accessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsAccessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of Things
 
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskAssessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
 
Capstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid SecurityCapstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid Security
 
archenaa2015-survey-big-data-government.pdf
archenaa2015-survey-big-data-government.pdfarchenaa2015-survey-big-data-government.pdf
archenaa2015-survey-big-data-government.pdf
 

Mehr von David Fletcher

Business continuity for Information Systems
Business continuity for Information SystemsBusiness continuity for Information Systems
Business continuity for Information SystemsDavid Fletcher
 
Going Mobile In Government
Going Mobile In GovernmentGoing Mobile In Government
Going Mobile In GovernmentDavid Fletcher
 
Building A Better Website Governing 2008
Building A Better Website Governing 2008Building A Better Website Governing 2008
Building A Better Website Governing 2008David Fletcher
 
Utah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-OnUtah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-OnDavid Fletcher
 
Ta Review Application Servers
Ta Review Application ServersTa Review Application Servers
Ta Review Application ServersDavid Fletcher
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange ModelDavid Fletcher
 
Tackling the Talent Challenge
Tackling the Talent ChallengeTackling the Talent Challenge
Tackling the Talent ChallengeDavid Fletcher
 

Mehr von David Fletcher (13)

Business continuity for Information Systems
Business continuity for Information SystemsBusiness continuity for Information Systems
Business continuity for Information Systems
 
Going Mobile In Government
Going Mobile In GovernmentGoing Mobile In Government
Going Mobile In Government
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Going Mobile
Going MobileGoing Mobile
Going Mobile
 
Gobierno Digital
Gobierno DigitalGobierno Digital
Gobierno Digital
 
Building A Better Website Governing 2008
Building A Better Website Governing 2008Building A Better Website Governing 2008
Building A Better Website Governing 2008
 
Web 2.0 in Government
Web 2.0 in GovernmentWeb 2.0 in Government
Web 2.0 in Government
 
Utah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-OnUtah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-On
 
Ta Review Logging
Ta Review LoggingTa Review Logging
Ta Review Logging
 
Ta Review Application Servers
Ta Review Application ServersTa Review Application Servers
Ta Review Application Servers
 
Ta Review OES
Ta Review OESTa Review OES
Ta Review OES
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange Model
 
Tackling the Talent Challenge
Tackling the Talent ChallengeTackling the Talent Challenge
Tackling the Talent Challenge
 

Business continuity for information systems

  • 1. Business Continuity for Information Systems State of Utah – October 2006
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Funding requirement To bring all systems that have been identified as having Tier 1 and Tier 2 COOP requirements up to that level of preparedness would require estimated funding of $18.9 million . * see COOP systems report for detail
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Richfield Alternate Data Center Capabilities: different earthquake zone from Wasatch Front, 4 microwave and 1 fiber path to core state network, backup mainframe, backup power (UPS and generator), alternate internet connection, staffed 24x7 Can be used to house all business resumption capabilities. * Will need to be expanded if tier 1,2, and 3 COOP is implemented
  • 19.
  • 20.