SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Planning for Disaster anD everyDay threats:
How to protect business-critical functions, minimize downtime and mitigate risk
From downtime costs to regulatory compliance, the need for strategic business continuity and disaster recovery
(BCDR) planning is clear, but what does that mean for your organization? Mike Cybyske, a disaster preparedness
specialist and crisis manager for Qwest Communications, says business continuity management (BCM) requires the
ongoing assessment of risk to your organization. In this interview, he provides insights and advice for implementing
an effective plan.


         As a business continuity expert for a large business, what are your top
         recommendations for customers looking to implement a BCDR plan?
         Recognize that you can’t protect everything. It’s important to identify the business-critical functions and
         who is critical to supporting your business. Know what your critical functions, vendors and suppliers are
         and what you would stand to lose if they were unavailable for a few hours, a day or weeks. Then create
         continuity plans for those that you cannot afford to be without. And remember that it’s not just hurricanes,
         tornadoes, fire and other disasters that can cripple a company. There are far more common events like
         bad software, misconfigured networks, hardware failures such as a bad disk drive, or power outages.


         What are the common challenges businesses face when
         implementing BCDR solutions?
         One of the biggest challenges is getting leadership to spend money they don’t have to prepare for things
         they don’t think will happen. You have to educate leaders, build support and set realistic expectations.
         You have to educate them on the risk and how their operations will be impacted. And you need to focus
         on bringing together all the pieces of data—threats, impacts, risk tolerance, financial situation—and then
         synthesize them so that the solution is sustainable long-term. Trying to implement a corporate-wide
         program from the bottom up or individually within each business unit is difficult. An effective program
         requires a strategy that incorporates all departments and their participation from the top down, which
         can only be accomplished when corporate leadership understands and supports continuity planning.


         What are some of the primary elements of creating a BCDR plan?
         A good plan should address four key elements: building, systems, equipment and personnel, plus
         contingencies for the loss of any or all of them. This multi-hazard approach allows flexibility in responding
         to the disaster and reduces planning redundancy since it’s not event-specific planning (hurricane, tornado,
         winter storm, etc.).


         How have the risks a company may face evolved over time?
         One risk that every company faces is changing technology. As corporations adopt technology to increase
         productivity or reduce costs, its impact on business continuity is often an afterthought. This can create
         gaps in a business unit’s recovery and continuity strategy, requiring new processes to be developed and
         tested. This is especially true when different platforms are required—mainframe, virtual environments,
         cloud computing—since different skill sets are needed to manage and recover each.




                Copyright © 2011 Qwest. All Rights Reserved. Not to be distributed or reproduced by anyone other than Qwest entities. WP111438
                                                                                                                                                 02/11   1
Can you tell us about a time when you put a BCDR plan into action
and what the result was?
Hurricane Ike caused an estimated $38 billion in damages and a power outage that affected more than two
million people in three states. Network equipment was undamaged by the hurricane, thanks to the layers
of redundancy Qwest builds in to mitigate the impact of power outages on our equipment, and generator-
based power kept the equipment operational. The challenge to business continuity came after the event.
The power outage was prolonged and required us to secure fuel through multiple suppliers. Business
continuity was maintained and we strengthened the BC program by developing new supplier relationships,
which may be key to business continuity in the future.
And in early January 2009 Washington State experienced some of its worst flooding, mudslides and
avalanches on record. More than 30,000 people were urged to evacuate their homes. Our primary
concerns were the protection of infrastructure and the continuation of telecom services, including 911,
to hundreds of thousands of customers. Plans based on historical probability played a key role in
maintaining business continuity as flood prevention measures established to protect against prior
events were easily re-deployed. The 2009 floods helped to demonstrate the value of those previous
investments and get closer to the elusive ROI of BCM.


What is the most critical element of a BC plan?
The most critical element of a BC plan is making sure the failover procedures are accurate and contacts
up to date. This is accomplished by exercising it every year, or more often as changes in technology or
staff occur.


When there’s a natural disaster or outage, what is your role in the
BCDR program and what do you do first?
We ensure company-wide coordination and communication via our Crisis Management Team as each
impacted business unit utilizes their BC and/or DR plans to minimize the impact on employees and
our customers.




Technology Considerations

What role does technology play in managing risk and your BCDR program?
Technology has helped a great deal with minimizing and sometime eliminating risks. For example, today’s
call center platforms can manage customer call volumes and redirect calls to different centers when one
office becomes overwhelmed. This technology can also be utilized should one site be impacted by a
disaster. Similar technologies are available that provide uninterrupted access to data, applications, and web
sites even in the event that access to the primary servers is lost. And many of today’s network technologies
are designed to automatically re-route voice and data traffic when necessary to prevent disruptions.




       Copyright © 2011 Qwest. All Rights Reserved. Not to be distributed or reproduced by anyone other than Qwest entities. WP111438
                                                                                                                                        2
How have social networking and mobile technology influenced your
crisis management role?
Mobile technology and social networking provide additional ways to communicate with employees
and customers, which is critical for disseminating critical information during a disaster.


What would you recommend to companies looking to invest in
new BCDR technologies?
Companies of any size should look for technologies that provide cost-effective redundancies to help
maintain business operations and provide a means to maintain communications with business-critical
employees and customers.




Evaluating BCDR Plans and Solutions

How do you know you have good BCDR plans and solutions in place?
You need to look at business continuity as a program. If you build a plan and simply file it under business
continuity until it’s needed, you really don’t know if it’s a good plan. And you may not discover its
weaknesses until disaster strikes and you are relying on the plan to keep the business up and running.
The only way to validate a plan is to test it. You should test your BC plan frequently and strengthen it
with the things you learn through testing.


What trends should companies be watching?
Of course, there’s a lot of buzz around cloud-based services right now—and for good reason. Cloud-based
services have the potential to change the way businesses use technology. They will allow businesses to
rapidly deploy technology solutions as needed and then scale them down when not needed. That model
is well aligned with the needs of a business continuity solution.


What standards or certifications do you require your
BCDR technology providers to have?
Several questions should be asked to evaluate a vendor’s or supplier’s program. First, do they have a
program, and if so, can they tell me about it or provide a plan I can review? Do they have any certified
staff managing the program? What events have impacted them in the past and how did they respond?
I also ask if their program follows any particular standard to complete my view of their program.




       Copyright © 2011 Qwest. All Rights Reserved. Not to be distributed or reproduced by anyone other than Qwest entities. WP111438
                                                                                                                                        3
Four Key Considerations for Your BCDR Plan

    1. Know your priorities. If you don’t focus (and plan accordingly) on what is most critical and
       prioritize, you’re wasting your time.


    2. Communicate. During a disaster, buildings are evacuated and people may scatter. It can be difficult
       to locate the people responsible for executing your BC or DR plans. Have in place a simple, effective
       way to communicate with all parties—one that will not be affected by the outage. Make sure
       department heads maintain up-to-date contact lists and have a centralized number that employees
       can call for information. Use new forms of communication technology such as text messaging or
       social media to disseminate critical information if needed.


    3. Remember your suppliers. The popular trend toward outsourcing provides most businesses with
       the option of offsetting workloads so you can still meet customer needs while you’re recovering.
       Make sure you know who the vendors and partners are that support your business. Consider your
       supply chain for daily business operations and have a back-up plan. Also, validate that your suppliers
       can do what they say they can do in case of a disaster.


    4. Keep planning. Keep an eye on your changing environment and stay informed about what types of
       applications you need to continue to plan. Make sure new employees familiarize themselves with the
       plan as they come on board. Being proactive is also essential. If there’s a large-scale disaster, it can
       be difficult to get staff back in the area to take care of the issues that occur, particularly if you’re working
       for an infrastructure provider or bank, where the pain is severe and immediate. Work with the
       state agencies now to determine necessary credentials and processes to get people back into
       damaged areas quickly.




Mike Cybyske
lead Disaster Preparedness Professional, Qwest Communications
A certified business continuity professional with 15 years of BCDR experience, Mike Cybyske oversees the Qwest
corporate crisis management team, which is responsible for minimizing or eliminating customer service disruptions.
Mike leads more than 80 team members in continuous training, planning and readiness exercises to ensure
coordinated response and recovery during disasters. As a Qwest crisis manager he also interacts with multiple
local and state emergency management offices.




                 Copyright © 2011 Qwest. All Rights Reserved. Not to be distributed or reproduced by anyone other than Qwest entities. WP111438
                                                                                                                                                  4

Weitere ähnliche Inhalte

Was ist angesagt?

Business Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsBusiness Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsDataCore Software
 
BS11200 and the Communications Manager v1
BS11200 and the Communications Manager v1BS11200 and the Communications Manager v1
BS11200 and the Communications Manager v1Ian Ross
 
Crisis Mgt Presentation
Crisis Mgt PresentationCrisis Mgt Presentation
Crisis Mgt Presentationwbesse
 
Assess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAssess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAnand Subramaniam
 
How to mitigate risk in the age of the cloud
How to mitigate risk in the age of the cloudHow to mitigate risk in the age of the cloud
How to mitigate risk in the age of the cloudJames Sankar
 
The use of risk management systems can asist with ERM implementations
The use of risk management systems can asist with ERM implementationsThe use of risk management systems can asist with ERM implementations
The use of risk management systems can asist with ERM implementationsKarl Davey
 
Business Continuation The Basics
Business Continuation   The BasicsBusiness Continuation   The Basics
Business Continuation The Basicsguest13df88e8
 
Business continuity at_northrop_grumman
Business continuity at_northrop_grummanBusiness continuity at_northrop_grumman
Business continuity at_northrop_grummanAnshuman Jaiswal
 
TE CONNECTIVITY WEBINAR DECK 121015
TE CONNECTIVITY WEBINAR DECK 121015TE CONNECTIVITY WEBINAR DECK 121015
TE CONNECTIVITY WEBINAR DECK 121015Brian Risser
 
Risk management 4th in a series
Risk management 4th in a seriesRisk management 4th in a series
Risk management 4th in a seriesGlen Alleman
 
IT Risk managment combined
IT Risk managment combinedIT Risk managment combined
IT Risk managment combinedGlen Alleman
 
Leadership in a crisis responding to the coronavirus outbreak
Leadership in a crisis responding to the coronavirus outbreakLeadership in a crisis responding to the coronavirus outbreak
Leadership in a crisis responding to the coronavirus outbreakGraham Watson
 
The human factor
The human factorThe human factor
The human factorKoen Maris
 
Communications management
Communications managementCommunications management
Communications managementabelwinston
 
Managing in the presence of uncertainty
Managing in the presence of uncertaintyManaging in the presence of uncertainty
Managing in the presence of uncertaintyGlen Alleman
 
IT_Crisis_Problem_Management_Whitepaper
IT_Crisis_Problem_Management_WhitepaperIT_Crisis_Problem_Management_Whitepaper
IT_Crisis_Problem_Management_WhitepaperChuck Boutcher
 
12.0 risk management agile+evm (v10.2)
12.0 risk management agile+evm (v10.2)12.0 risk management agile+evm (v10.2)
12.0 risk management agile+evm (v10.2)Glen Alleman
 

Was ist angesagt? (20)

The Ultimate Guide To Business Continuity
The Ultimate Guide To Business ContinuityThe Ultimate Guide To Business Continuity
The Ultimate Guide To Business Continuity
 
Business Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsBusiness Continuity for Mission Critical Applications
Business Continuity for Mission Critical Applications
 
BS11200 and the Communications Manager v1
BS11200 and the Communications Manager v1BS11200 and the Communications Manager v1
BS11200 and the Communications Manager v1
 
Crisis Mgt Presentation
Crisis Mgt PresentationCrisis Mgt Presentation
Crisis Mgt Presentation
 
Assess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAssess Your Business Continuity Management Process
Assess Your Business Continuity Management Process
 
Cio software testing_survey
Cio software testing_surveyCio software testing_survey
Cio software testing_survey
 
How to mitigate risk in the age of the cloud
How to mitigate risk in the age of the cloudHow to mitigate risk in the age of the cloud
How to mitigate risk in the age of the cloud
 
The use of risk management systems can asist with ERM implementations
The use of risk management systems can asist with ERM implementationsThe use of risk management systems can asist with ERM implementations
The use of risk management systems can asist with ERM implementations
 
Business Continuation The Basics
Business Continuation   The BasicsBusiness Continuation   The Basics
Business Continuation The Basics
 
MTW03011USEN.PDF
MTW03011USEN.PDFMTW03011USEN.PDF
MTW03011USEN.PDF
 
Business continuity at_northrop_grumman
Business continuity at_northrop_grummanBusiness continuity at_northrop_grumman
Business continuity at_northrop_grumman
 
TE CONNECTIVITY WEBINAR DECK 121015
TE CONNECTIVITY WEBINAR DECK 121015TE CONNECTIVITY WEBINAR DECK 121015
TE CONNECTIVITY WEBINAR DECK 121015
 
Risk management 4th in a series
Risk management 4th in a seriesRisk management 4th in a series
Risk management 4th in a series
 
IT Risk managment combined
IT Risk managment combinedIT Risk managment combined
IT Risk managment combined
 
Leadership in a crisis responding to the coronavirus outbreak
Leadership in a crisis responding to the coronavirus outbreakLeadership in a crisis responding to the coronavirus outbreak
Leadership in a crisis responding to the coronavirus outbreak
 
The human factor
The human factorThe human factor
The human factor
 
Communications management
Communications managementCommunications management
Communications management
 
Managing in the presence of uncertainty
Managing in the presence of uncertaintyManaging in the presence of uncertainty
Managing in the presence of uncertainty
 
IT_Crisis_Problem_Management_Whitepaper
IT_Crisis_Problem_Management_WhitepaperIT_Crisis_Problem_Management_Whitepaper
IT_Crisis_Problem_Management_Whitepaper
 
12.0 risk management agile+evm (v10.2)
12.0 risk management agile+evm (v10.2)12.0 risk management agile+evm (v10.2)
12.0 risk management agile+evm (v10.2)
 

Andere mochten auch

Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194Erik Ginalick
 
Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861Erik Ginalick
 
Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862Erik Ginalick
 
Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005Erik Ginalick
 
Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860Erik Ginalick
 
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Erik Ginalick
 
Finding The Right Cloud Solution Wp111455
Finding The Right Cloud Solution Wp111455Finding The Right Cloud Solution Wp111455
Finding The Right Cloud Solution Wp111455Erik Ginalick
 
Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Erik Ginalick
 
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207Erik Ginalick
 
Why CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud LeaderWhy CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud LeaderErik Ginalick
 

Andere mochten auch (11)

Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
 
Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861
 
Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862
 
Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005
 
Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860
 
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
 
Acronyms
AcronymsAcronyms
Acronyms
 
Finding The Right Cloud Solution Wp111455
Finding The Right Cloud Solution Wp111455Finding The Right Cloud Solution Wp111455
Finding The Right Cloud Solution Wp111455
 
Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504
 
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
 
Why CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud LeaderWhy CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud Leader
 

Ähnlich wie Planning For Disaster And Everyday Threats Wp111438

CRM and National Security: Five Essential Software Capabilities
CRM and National Security: Five Essential Software CapabilitiesCRM and National Security: Five Essential Software Capabilities
CRM and National Security: Five Essential Software CapabilitiesRightNow Technologies
 
Disaster Recovery Deep Dive
Disaster Recovery Deep DiveDisaster Recovery Deep Dive
Disaster Recovery Deep DiveLiberteks
 
Planning for any disaster
Planning for any disasterPlanning for any disaster
Planning for any disasterNorm Brien
 
Business Continuity
Business ContinuityBusiness Continuity
Business ContinuityNorm Brien
 
Business continuity & disaster recovery
Business continuity & disaster recoveryBusiness continuity & disaster recovery
Business continuity & disaster recoveryGeorge Coutsoumbidis
 
RUNNING HEADER Disaster Recovery Plan Information and Documentat.docx
RUNNING HEADER Disaster Recovery Plan Information and Documentat.docxRUNNING HEADER Disaster Recovery Plan Information and Documentat.docx
RUNNING HEADER Disaster Recovery Plan Information and Documentat.docxanhlodge
 
Best Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business ContinuityBest Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business ContinuityReadWrite
 
Business Continuity and Disaster Recover Week3Part4-ISr.docx
Business Continuity and Disaster Recover  Week3Part4-ISr.docxBusiness Continuity and Disaster Recover  Week3Part4-ISr.docx
Business Continuity and Disaster Recover Week3Part4-ISr.docxhumphrieskalyn
 
Disaster recovery white_paper
Disaster recovery white_paperDisaster recovery white_paper
Disaster recovery white_paperCMR WORLD TECH
 
Six Myths of Disaster Planning
Six Myths of Disaster PlanningSix Myths of Disaster Planning
Six Myths of Disaster PlanningDavid Mistick
 
Contingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMContingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMWajahat Ali Khan
 
COM-CON Session Topics, Audiences, and Presentation Types
COM-CON Session Topics, Audiences, and Presentation Types COM-CON Session Topics, Audiences, and Presentation Types
COM-CON Session Topics, Audiences, and Presentation Types LynellBull52
 
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Citrix Online
 
Whitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructureWhitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructureJake Weaver
 
An Introduction To ICT Continuity Based On BS 25777
An Introduction To ICT Continuity Based On BS 25777An Introduction To ICT Continuity Based On BS 25777
An Introduction To ICT Continuity Based On BS 25777Yasmine Anino
 
Incident managment plan
Incident managment planIncident managment plan
Incident managment planSafwan Hashmi
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd Iaetsd
 
Business Continuity Detailed Plan
Business Continuity Detailed PlanBusiness Continuity Detailed Plan
Business Continuity Detailed PlanWissam Abdel Baki
 

Ähnlich wie Planning For Disaster And Everyday Threats Wp111438 (20)

CRM and National Security: Five Essential Software Capabilities
CRM and National Security: Five Essential Software CapabilitiesCRM and National Security: Five Essential Software Capabilities
CRM and National Security: Five Essential Software Capabilities
 
Disaster Recovery Deep Dive
Disaster Recovery Deep DiveDisaster Recovery Deep Dive
Disaster Recovery Deep Dive
 
Disaster Recovery - Deep Dive
Disaster Recovery - Deep DiveDisaster Recovery - Deep Dive
Disaster Recovery - Deep Dive
 
Planning for any disaster
Planning for any disasterPlanning for any disaster
Planning for any disaster
 
Business Continuity
Business ContinuityBusiness Continuity
Business Continuity
 
Business continuity & disaster recovery
Business continuity & disaster recoveryBusiness continuity & disaster recovery
Business continuity & disaster recovery
 
RUNNING HEADER Disaster Recovery Plan Information and Documentat.docx
RUNNING HEADER Disaster Recovery Plan Information and Documentat.docxRUNNING HEADER Disaster Recovery Plan Information and Documentat.docx
RUNNING HEADER Disaster Recovery Plan Information and Documentat.docx
 
Best Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business ContinuityBest Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business Continuity
 
Business Continuity and Disaster Recover Week3Part4-ISr.docx
Business Continuity and Disaster Recover  Week3Part4-ISr.docxBusiness Continuity and Disaster Recover  Week3Part4-ISr.docx
Business Continuity and Disaster Recover Week3Part4-ISr.docx
 
Disaster recovery white_paper
Disaster recovery white_paperDisaster recovery white_paper
Disaster recovery white_paper
 
Six Myths of Disaster Planning
Six Myths of Disaster PlanningSix Myths of Disaster Planning
Six Myths of Disaster Planning
 
Contingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMContingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATM
 
COM-CON Session Topics, Audiences, and Presentation Types
COM-CON Session Topics, Audiences, and Presentation Types COM-CON Session Topics, Audiences, and Presentation Types
COM-CON Session Topics, Audiences, and Presentation Types
 
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
 
Whitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructureWhitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructure
 
An Introduction To ICT Continuity Based On BS 25777
An Introduction To ICT Continuity Based On BS 25777An Introduction To ICT Continuity Based On BS 25777
An Introduction To ICT Continuity Based On BS 25777
 
CloudSource-white paper
CloudSource-white paperCloudSource-white paper
CloudSource-white paper
 
Incident managment plan
Incident managment planIncident managment plan
Incident managment plan
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems using
 
Business Continuity Detailed Plan
Business Continuity Detailed PlanBusiness Continuity Detailed Plan
Business Continuity Detailed Plan
 

Mehr von Erik Ginalick

Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047Erik Ginalick
 
Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Erik Ginalick
 
Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Erik Ginalick
 
The Worry Free Network Wp091050
The Worry Free Network Wp091050The Worry Free Network Wp091050
The Worry Free Network Wp091050Erik Ginalick
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Erik Ginalick
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 
Plan For Success White Paper
Plan For Success White PaperPlan For Success White Paper
Plan For Success White PaperErik Ginalick
 
Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993Erik Ginalick
 
Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305Erik Ginalick
 
Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Erik Ginalick
 
Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974Erik Ginalick
 
Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Erik Ginalick
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243Erik Ginalick
 
Closing The Clinical It Chasm Wp101198
Closing The Clinical It Chasm Wp101198Closing The Clinical It Chasm Wp101198
Closing The Clinical It Chasm Wp101198Erik Ginalick
 
Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305Erik Ginalick
 

Mehr von Erik Ginalick (16)

Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047
 
Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366
 
Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863
 
The Worry Free Network Wp091050
The Worry Free Network Wp091050The Worry Free Network Wp091050
The Worry Free Network Wp091050
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
Plan For Success White Paper
Plan For Success White PaperPlan For Success White Paper
Plan For Success White Paper
 
Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993
 
Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305
 
Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504
 
Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974
 
Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243
 
Closing The Clinical It Chasm Wp101198
Closing The Clinical It Chasm Wp101198Closing The Clinical It Chasm Wp101198
Closing The Clinical It Chasm Wp101198
 
Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305
 

Planning For Disaster And Everyday Threats Wp111438

  • 1. Planning for Disaster anD everyDay threats: How to protect business-critical functions, minimize downtime and mitigate risk From downtime costs to regulatory compliance, the need for strategic business continuity and disaster recovery (BCDR) planning is clear, but what does that mean for your organization? Mike Cybyske, a disaster preparedness specialist and crisis manager for Qwest Communications, says business continuity management (BCM) requires the ongoing assessment of risk to your organization. In this interview, he provides insights and advice for implementing an effective plan. As a business continuity expert for a large business, what are your top recommendations for customers looking to implement a BCDR plan? Recognize that you can’t protect everything. It’s important to identify the business-critical functions and who is critical to supporting your business. Know what your critical functions, vendors and suppliers are and what you would stand to lose if they were unavailable for a few hours, a day or weeks. Then create continuity plans for those that you cannot afford to be without. And remember that it’s not just hurricanes, tornadoes, fire and other disasters that can cripple a company. There are far more common events like bad software, misconfigured networks, hardware failures such as a bad disk drive, or power outages. What are the common challenges businesses face when implementing BCDR solutions? One of the biggest challenges is getting leadership to spend money they don’t have to prepare for things they don’t think will happen. You have to educate leaders, build support and set realistic expectations. You have to educate them on the risk and how their operations will be impacted. And you need to focus on bringing together all the pieces of data—threats, impacts, risk tolerance, financial situation—and then synthesize them so that the solution is sustainable long-term. Trying to implement a corporate-wide program from the bottom up or individually within each business unit is difficult. An effective program requires a strategy that incorporates all departments and their participation from the top down, which can only be accomplished when corporate leadership understands and supports continuity planning. What are some of the primary elements of creating a BCDR plan? A good plan should address four key elements: building, systems, equipment and personnel, plus contingencies for the loss of any or all of them. This multi-hazard approach allows flexibility in responding to the disaster and reduces planning redundancy since it’s not event-specific planning (hurricane, tornado, winter storm, etc.). How have the risks a company may face evolved over time? One risk that every company faces is changing technology. As corporations adopt technology to increase productivity or reduce costs, its impact on business continuity is often an afterthought. This can create gaps in a business unit’s recovery and continuity strategy, requiring new processes to be developed and tested. This is especially true when different platforms are required—mainframe, virtual environments, cloud computing—since different skill sets are needed to manage and recover each. Copyright © 2011 Qwest. All Rights Reserved. Not to be distributed or reproduced by anyone other than Qwest entities. WP111438 02/11 1
  • 2. Can you tell us about a time when you put a BCDR plan into action and what the result was? Hurricane Ike caused an estimated $38 billion in damages and a power outage that affected more than two million people in three states. Network equipment was undamaged by the hurricane, thanks to the layers of redundancy Qwest builds in to mitigate the impact of power outages on our equipment, and generator- based power kept the equipment operational. The challenge to business continuity came after the event. The power outage was prolonged and required us to secure fuel through multiple suppliers. Business continuity was maintained and we strengthened the BC program by developing new supplier relationships, which may be key to business continuity in the future. And in early January 2009 Washington State experienced some of its worst flooding, mudslides and avalanches on record. More than 30,000 people were urged to evacuate their homes. Our primary concerns were the protection of infrastructure and the continuation of telecom services, including 911, to hundreds of thousands of customers. Plans based on historical probability played a key role in maintaining business continuity as flood prevention measures established to protect against prior events were easily re-deployed. The 2009 floods helped to demonstrate the value of those previous investments and get closer to the elusive ROI of BCM. What is the most critical element of a BC plan? The most critical element of a BC plan is making sure the failover procedures are accurate and contacts up to date. This is accomplished by exercising it every year, or more often as changes in technology or staff occur. When there’s a natural disaster or outage, what is your role in the BCDR program and what do you do first? We ensure company-wide coordination and communication via our Crisis Management Team as each impacted business unit utilizes their BC and/or DR plans to minimize the impact on employees and our customers. Technology Considerations What role does technology play in managing risk and your BCDR program? Technology has helped a great deal with minimizing and sometime eliminating risks. For example, today’s call center platforms can manage customer call volumes and redirect calls to different centers when one office becomes overwhelmed. This technology can also be utilized should one site be impacted by a disaster. Similar technologies are available that provide uninterrupted access to data, applications, and web sites even in the event that access to the primary servers is lost. And many of today’s network technologies are designed to automatically re-route voice and data traffic when necessary to prevent disruptions. Copyright © 2011 Qwest. All Rights Reserved. Not to be distributed or reproduced by anyone other than Qwest entities. WP111438 2
  • 3. How have social networking and mobile technology influenced your crisis management role? Mobile technology and social networking provide additional ways to communicate with employees and customers, which is critical for disseminating critical information during a disaster. What would you recommend to companies looking to invest in new BCDR technologies? Companies of any size should look for technologies that provide cost-effective redundancies to help maintain business operations and provide a means to maintain communications with business-critical employees and customers. Evaluating BCDR Plans and Solutions How do you know you have good BCDR plans and solutions in place? You need to look at business continuity as a program. If you build a plan and simply file it under business continuity until it’s needed, you really don’t know if it’s a good plan. And you may not discover its weaknesses until disaster strikes and you are relying on the plan to keep the business up and running. The only way to validate a plan is to test it. You should test your BC plan frequently and strengthen it with the things you learn through testing. What trends should companies be watching? Of course, there’s a lot of buzz around cloud-based services right now—and for good reason. Cloud-based services have the potential to change the way businesses use technology. They will allow businesses to rapidly deploy technology solutions as needed and then scale them down when not needed. That model is well aligned with the needs of a business continuity solution. What standards or certifications do you require your BCDR technology providers to have? Several questions should be asked to evaluate a vendor’s or supplier’s program. First, do they have a program, and if so, can they tell me about it or provide a plan I can review? Do they have any certified staff managing the program? What events have impacted them in the past and how did they respond? I also ask if their program follows any particular standard to complete my view of their program. Copyright © 2011 Qwest. All Rights Reserved. Not to be distributed or reproduced by anyone other than Qwest entities. WP111438 3
  • 4. Four Key Considerations for Your BCDR Plan 1. Know your priorities. If you don’t focus (and plan accordingly) on what is most critical and prioritize, you’re wasting your time. 2. Communicate. During a disaster, buildings are evacuated and people may scatter. It can be difficult to locate the people responsible for executing your BC or DR plans. Have in place a simple, effective way to communicate with all parties—one that will not be affected by the outage. Make sure department heads maintain up-to-date contact lists and have a centralized number that employees can call for information. Use new forms of communication technology such as text messaging or social media to disseminate critical information if needed. 3. Remember your suppliers. The popular trend toward outsourcing provides most businesses with the option of offsetting workloads so you can still meet customer needs while you’re recovering. Make sure you know who the vendors and partners are that support your business. Consider your supply chain for daily business operations and have a back-up plan. Also, validate that your suppliers can do what they say they can do in case of a disaster. 4. Keep planning. Keep an eye on your changing environment and stay informed about what types of applications you need to continue to plan. Make sure new employees familiarize themselves with the plan as they come on board. Being proactive is also essential. If there’s a large-scale disaster, it can be difficult to get staff back in the area to take care of the issues that occur, particularly if you’re working for an infrastructure provider or bank, where the pain is severe and immediate. Work with the state agencies now to determine necessary credentials and processes to get people back into damaged areas quickly. Mike Cybyske lead Disaster Preparedness Professional, Qwest Communications A certified business continuity professional with 15 years of BCDR experience, Mike Cybyske oversees the Qwest corporate crisis management team, which is responsible for minimizing or eliminating customer service disruptions. Mike leads more than 80 team members in continuous training, planning and readiness exercises to ensure coordinated response and recovery during disasters. As a Qwest crisis manager he also interacts with multiple local and state emergency management offices. Copyright © 2011 Qwest. All Rights Reserved. Not to be distributed or reproduced by anyone other than Qwest entities. WP111438 4