SlideShare ist ein Scribd-Unternehmen logo
1 von 23
10 Business Resilience
Questions Every Business
Should Be Asking Itself
About it’s Business
Resilience
About me
• Michael Bowers
• Sr Solutions Specialist
• CAM Business Solutions, Los Angeles
• Established in 2002
• IT consultant in the 1990s
• Director of IT for Nadel Architects in 2001
• Specialty
• Security
• Operations
• Backup and Recovery
• Networking
What is Business Resilience
• Business resilience is the ability to prepare for, respond to, and
recover from just about disaster it may face.
• It helps an organization protect against the countless threats that can
cripple it’s operations, and limit the severity of any incident, and
ensure its continued survival despite an event.
Business Resilience
• Cyber resilience has emerged over the past few years because
traditional cybersecurity measures are no longer enough.
• It is now commonly accepted that it’s no longer a matter of ‘if’ but
‘when’ an organization will suffer data loss or a cyber attack.
• This means that instead of focusing your efforts on keeping criminals
out of your network, it’s better to assume they will eventually break
through your defenses, and start working on a strategy to reduce the
impact.
What could possibly happen?
Question #1
How do you feel about your company’s current Risk Posture?
Question #2
WWYD – If there was a fire, flood, cyber attack, or a malicious attack at
your main office?
Question #3
Do we have an accurate inventory of all of our data locations?
Question #4
What’s our Cyber Security strategy and would it detect the threats I keep
hearing about?
Question #5
Where do we keep our incident response policies?
Question #6
Where do we keep our incident response policies?
Question #7
What solutions / vendors are needed to fulfill our responsibilities to our
clients?
Question #8
What’s the focus of our backups? Copies? Current data? Speed of being
back up?
Question #8
Question #9
Communications- WWYD
Question #10
Who is responsible for managing our threat exposure?
Summary
• While there is no way for a company to truly predict
every disaster it will face - having risk management
policies in place can help soften the blow of business
disruptions and sometimes prevent the problems
altogether.
• Risks are something businesses are exposed to daily.
Whether it is an internal failure or an external event,
there is a seemingly endless list of things that can
threaten business productivity at any given moment.
Some of these risks are even serious enough to
jeopardize an organization’s survival.
IMPROVING YOUR RISK MANAGEMENT
APPROACH
The benefits of good risk management combined
with the potential risk of neglecting these
practices makes an enticing case for improving
your approach immediately.
So, what should be your first steps?
Action steps
Assess and plan: The first step to good risk management is assessing your
current state. Where are you most susceptible to risk and how much work
needs to be done to prevent it? Deciding what state you are in currently
can help you better formulate the correct plan for your business. From
there, you should start laying out a concrete strategy.
Action steps
Communicate your plan: A plan is rendered useless when it's not
efficiently communicated to the necessary parties. Business leaders
should make sure these new processes and risk policies are readily
available to employees new and old. Upon the completion of your risk
management plan, hold a company wide meeting and open the field for
questions and clarifications.
Action steps
Improve internal processes: Improving internal management functions is
one of the best ways to tackle potential business risks immediately. From
improving your cyber protection to better tracking your data and assets,
leveraging the resources of your IT partner can help significantly lower
your chances of falling victim to common industry problems.
Thank you for your time
Michael Bowers
818-356-7187
Mbowers@CAMBusinessSolutions.com
10 Questions Every Company Should Be Asking Itself About its Business Resilience

Weitere ähnliche Inhalte

Was ist angesagt?

Risk management in simple terms with some humor
Risk management in simple terms with some humorRisk management in simple terms with some humor
Risk management in simple terms with some humorKumar Kolaganti
 
What people analytics can't capture
What people analytics can't captureWhat people analytics can't capture
What people analytics can't captureSanyamArora13
 
You will be breached
You will be breachedYou will be breached
You will be breachedMike Saunders
 
When You Should Use Analytics for Decisions
When You Should Use Analytics for DecisionsWhen You Should Use Analytics for Decisions
When You Should Use Analytics for DecisionsVessment
 
How Does Your Company Handle Distracted Driving?
How Does Your Company Handle Distracted Driving?How Does Your Company Handle Distracted Driving?
How Does Your Company Handle Distracted Driving?National Retail Federation
 
Continuity Mag Q3 2013
Continuity Mag Q3 2013Continuity Mag Q3 2013
Continuity Mag Q3 2013Thibaut Minguet
 
Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment Rick van der Kleij
 
10 Most Common Business Mistakes
10 Most Common Business Mistakes10 Most Common Business Mistakes
10 Most Common Business MistakesChristine Reason
 
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...Health IT Conference – iHT2
 
Analysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuff
Analysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuffAnalysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuff
Analysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuffMatt Hansen
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management IIzapp0
 
Smartcon 2015 – Automated Decisions in the Supply Chain
Smartcon 2015 – Automated Decisions in the Supply ChainSmartcon 2015 – Automated Decisions in the Supply Chain
Smartcon 2015 – Automated Decisions in the Supply ChainLars Trieloff
 
NAWBO/Travelers 2013 Survey results
NAWBO/Travelers 2013 Survey resultsNAWBO/Travelers 2013 Survey results
NAWBO/Travelers 2013 Survey resultsTinu Abayomi-Paul
 
Orientation and alignment in a vuca world
Orientation and alignment in a vuca worldOrientation and alignment in a vuca world
Orientation and alignment in a vuca worldBernhard Sterchi
 
React Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident ResponseReact Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident ResponseSilvioPappalardo
 
Kepner Tregoe (KT) - How did the chicken
Kepner Tregoe (KT) - How did the chicken Kepner Tregoe (KT) - How did the chicken
Kepner Tregoe (KT) - How did the chicken ilgor
 
011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rsRichard Smiraldi
 
Program delivery - that doesn't have a snowball's chance in hell!
Program delivery - that doesn't have a snowball's chance in hell!Program delivery - that doesn't have a snowball's chance in hell!
Program delivery - that doesn't have a snowball's chance in hell!Mentor
 

Was ist angesagt? (20)

Risk management in simple terms with some humor
Risk management in simple terms with some humorRisk management in simple terms with some humor
Risk management in simple terms with some humor
 
What people analytics can't capture
What people analytics can't captureWhat people analytics can't capture
What people analytics can't capture
 
You will be breached
You will be breachedYou will be breached
You will be breached
 
When You Should Use Analytics for Decisions
When You Should Use Analytics for DecisionsWhen You Should Use Analytics for Decisions
When You Should Use Analytics for Decisions
 
How Does Your Company Handle Distracted Driving?
How Does Your Company Handle Distracted Driving?How Does Your Company Handle Distracted Driving?
How Does Your Company Handle Distracted Driving?
 
Continuity Mag Q3 2013
Continuity Mag Q3 2013Continuity Mag Q3 2013
Continuity Mag Q3 2013
 
Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment Human factors in cybersecurity: Needs assessment
Human factors in cybersecurity: Needs assessment
 
10 Most Common Business Mistakes
10 Most Common Business Mistakes10 Most Common Business Mistakes
10 Most Common Business Mistakes
 
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information ...
 
Analysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuff
Analysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuffAnalysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuff
Analysis of Behavior & Cognition (ABC) Model with Matt Hansen at StatStuff
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Smartcon 2015 – Automated Decisions in the Supply Chain
Smartcon 2015 – Automated Decisions in the Supply ChainSmartcon 2015 – Automated Decisions in the Supply Chain
Smartcon 2015 – Automated Decisions in the Supply Chain
 
NAWBO/Travelers 2013 Survey results
NAWBO/Travelers 2013 Survey resultsNAWBO/Travelers 2013 Survey results
NAWBO/Travelers 2013 Survey results
 
Orientation and alignment in a vuca world
Orientation and alignment in a vuca worldOrientation and alignment in a vuca world
Orientation and alignment in a vuca world
 
React Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident ResponseReact Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident Response
 
10 Rules for Vendors - an Overview
10 Rules for Vendors - an Overview10 Rules for Vendors - an Overview
10 Rules for Vendors - an Overview
 
Kepner Tregoe (KT) - How did the chicken
Kepner Tregoe (KT) - How did the chicken Kepner Tregoe (KT) - How did the chicken
Kepner Tregoe (KT) - How did the chicken
 
011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs
 
Program delivery - that doesn't have a snowball's chance in hell!
Program delivery - that doesn't have a snowball's chance in hell!Program delivery - that doesn't have a snowball's chance in hell!
Program delivery - that doesn't have a snowball's chance in hell!
 
Testing 2.0
Testing 2.0Testing 2.0
Testing 2.0
 

Ähnlich wie 10 Questions Every Company Should Be Asking Itself About its Business Resilience

Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small BusinessBrendanRose
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and responseZyrellLalaguna
 
Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...
Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...
Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...LDM Global
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourYasser Mohammed
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesJack Nichelson
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsBrooke Bordelon
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...Booz Allen Hamilton
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistMorrison & Foerster
 
CISO Interview Question.pdf
CISO Interview Question.pdfCISO Interview Question.pdf
CISO Interview Question.pdfinfosec train
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
 
10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber RiskMark Gibson
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...SurfWatch Labs
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesJohn Rapa
 

Ähnlich wie 10 Questions Every Company Should Be Asking Itself About its Business Resilience (20)

Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small Business
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and response
 
Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...
Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...
Cyber Data Breach Review_ Key Steps to Protect Your Business in the Digital A...
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business Problems
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach Checklist
 
CISO Interview Question.pdf
CISO Interview Question.pdfCISO Interview Question.pdf
CISO Interview Question.pdf
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
 
Marathon overview
Marathon overviewMarathon overview
Marathon overview
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
 

KĂźrzlich hochgeladen

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

KĂźrzlich hochgeladen (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

10 Questions Every Company Should Be Asking Itself About its Business Resilience

  • 1. 10 Business Resilience Questions Every Business Should Be Asking Itself About it’s Business Resilience
  • 2. About me • Michael Bowers • Sr Solutions Specialist • CAM Business Solutions, Los Angeles • Established in 2002 • IT consultant in the 1990s • Director of IT for Nadel Architects in 2001 • Specialty • Security • Operations • Backup and Recovery • Networking
  • 3. What is Business Resilience • Business resilience is the ability to prepare for, respond to, and recover from just about disaster it may face. • It helps an organization protect against the countless threats that can cripple it’s operations, and limit the severity of any incident, and ensure its continued survival despite an event.
  • 4. Business Resilience • Cyber resilience has emerged over the past few years because traditional cybersecurity measures are no longer enough. • It is now commonly accepted that it’s no longer a matter of ‘if’ but ‘when’ an organization will suffer data loss or a cyber attack. • This means that instead of focusing your efforts on keeping criminals out of your network, it’s better to assume they will eventually break through your defenses, and start working on a strategy to reduce the impact.
  • 6. Question #1 How do you feel about your company’s current Risk Posture?
  • 7. Question #2 WWYD – If there was a fire, flood, cyber attack, or a malicious attack at your main office?
  • 8. Question #3 Do we have an accurate inventory of all of our data locations?
  • 9. Question #4 What’s our Cyber Security strategy and would it detect the threats I keep hearing about?
  • 10. Question #5 Where do we keep our incident response policies?
  • 11. Question #6 Where do we keep our incident response policies?
  • 12. Question #7 What solutions / vendors are needed to fulfill our responsibilities to our clients?
  • 13. Question #8 What’s the focus of our backups? Copies? Current data? Speed of being back up?
  • 16. Question #10 Who is responsible for managing our threat exposure?
  • 17. Summary • While there is no way for a company to truly predict every disaster it will face - having risk management policies in place can help soften the blow of business disruptions and sometimes prevent the problems altogether. • Risks are something businesses are exposed to daily. Whether it is an internal failure or an external event, there is a seemingly endless list of things that can threaten business productivity at any given moment. Some of these risks are even serious enough to jeopardize an organization’s survival.
  • 18. IMPROVING YOUR RISK MANAGEMENT APPROACH The benefits of good risk management combined with the potential risk of neglecting these practices makes an enticing case for improving your approach immediately. So, what should be your first steps?
  • 19. Action steps Assess and plan: The first step to good risk management is assessing your current state. Where are you most susceptible to risk and how much work needs to be done to prevent it? Deciding what state you are in currently can help you better formulate the correct plan for your business. From there, you should start laying out a concrete strategy.
  • 20. Action steps Communicate your plan: A plan is rendered useless when it's not efficiently communicated to the necessary parties. Business leaders should make sure these new processes and risk policies are readily available to employees new and old. Upon the completion of your risk management plan, hold a company wide meeting and open the field for questions and clarifications.
  • 21. Action steps Improve internal processes: Improving internal management functions is one of the best ways to tackle potential business risks immediately. From improving your cyber protection to better tracking your data and assets, leveraging the resources of your IT partner can help significantly lower your chances of falling victim to common industry problems.
  • 22. Thank you for your time Michael Bowers 818-356-7187 Mbowers@CAMBusinessSolutions.com