SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
Analyzing and Managing Risk

Taking the plunge into Business Continuity Management
Dawn Simpson, CBCP
VP of Market Development
January 23, 2014
Objectives
•
•

Defining the Business Impact Analysis
Examining risk:
o

Data supporting business risks and the
role of IT

o

Financial and other impacts of risk

o

Examining “Reputational Risk”

o

Making the IT and Reputational Risk
connection

o

•

Steps to take to strengthen your position

Resources and References
What is a BIA
(Business Impact Analysis)
The BIA helps you document and define the critical business functions, determine
your unique threats, how and what IT supports your critical business functions so
that you can prioritize and plan to mitigate the greatest risks first.
The BIA should provide data to assess the organization's ability to:

•

Eliminate or reduce the potential for injuries or the loss of human life.

•
•
•

Create awareness of unique business threats.
Develop a continuity action plan to bring the firm to “New Normalcy.”
Upon completion of the initial BCP, immediately deliver real benefits to
the organization.
IBM surveyed 2,316 business continuity and IT security
professionals on the following list of common cost categories
and threats for respondents to evaluate
Cost Categories

Threats

Reputation and brand
damage

Human error

Lost revenue due to system
availability problems

IT system failure

Lost productivity from downtime or
system performance

Cyber security or data
breach/data theft

Compliance and regulatory
failure costs

Third-party failure of
continuity or IT security

Forensics to determine root
causes

Data loss from backup or
restore failure

Technical support to
restore systems

Natural or manmade
disaster
Results
Respondents apportioned total cost across the six cost
categories, using a 100-point scale
Lost productivity from downtime or
system performance

28

Technical support to restore
systems

Lost revenue due to system
availability problems
Compliance and regulatory
failure costs
Minor ($1M)
100 points

20

25

Forensics to determine root
causes

Reputation and brand
damage

36

35

2

4

5 4

17

11

15

9

7

Event-related
impact

37

12

22

Durationrelated impact

10

Moderate ($4.3M)
100 points

Substantial ($14.3M)
100 points
Examining a Common Threat:
Reputational Risk
The Mitigation of reputational risk has a definable value

-29%

•

The economic value of a company’s
reputation declines 29% as a result of an
IT breach of customer data*

Can IT functionality (i.e., loss of email or data) or a security breach
affect your brand value?

•
•

How do you protect your brand reputation?
Have you established strong integrated risk management (Business
Continuity and Security) programs?
*Reputation Impact of a Data Breach: US Study of Executives & Managers, *Sponsored by Experian® Data
Breach Resolution Ponemon Institute, November 2011.
Here’s what the BIG guys are saying…
IBM 2011 Annual Report – Item 1A “Risk Factors”
Cybersecurity and Privacy Considerations could impact the Company's
Business:
The company's products, services, and systems may affect critical third party operations or
involve the storage, processing and transmission of proprietary and sensitive or confidential
data, including personal information of employees, customers and others.
Breaches of security could expose the company, its customers or others to risk of loss…
resulting in litigation and potential liability for the company, as well as the loss of existing or
potential customers and damage to the company's brand and reputation.
IBM has one of the strongest brand names in the world, and its brand and overall reputation
could be negatively impacted by many factors… If the company's brand image is tarnished by
negative perceptions, our ability to attract and retain customers could be impacted.

Source: http://www.ibm.com/annualreport/2011/bin/assets/2011_ibm_sec10k.pdf
Making the reputation and IT risk connection
Incidents over the past 24 months that affected
reputation and brand value
Percentage of “yes” responses

IT system failure

67%
58%

Human error
Cyber security or data
breach/data theft

47%

Data loss from backup
or restore failure
Natural or manmade
disaster
Third-party continuity
or IT security failure

42%
23%
19%
“IT risk management is reputation
management.”
– IT security supervisor, US telecom company
Relating it to the BIA
1

Example: IBM identified a trend that has become a threat to a critical
business function – i.e. Brand Reputation

2

The financial and reputational impact of the threat was determined
and deemed a priority

3

Funding to protect reputation is required for success

4

IT is a key safeguard to protecting against reputational harm

5

Upon identifying the functional priorities and the IT support in place,
the company can determine if there are gaps to be mitigated based
on financial and risk based data and organizational goals
Reputation Recovery
In your estimation, how long on average has it taken for your organization’s reputation to recover
from damage caused by the following IT risk factors?
12+ months

6-12 months

0-6 months

Data breach

13%

16%

New technology

13%

15%

12%

19%

56%

Insufficient DR measures

11%

20%

56%

Poor IT skills / tech support

11%

Inadequate continuity plans

10%

Data loss

10%

Compliance failure

Mobility (BYOD)
System failure
Website outage

59%
58%

18%

59%

22%

54%

14%

64%

10% 14%

68%

8%

15%

6% 12%

68%
71%

Source: 2013 IBM Reputational Risk and IT Study, IBM and Economist Intelligence Unit
Barriers to achieving highly effective business
continuity and IT security management programs
Three key issues for organizational leadership to address

Lack of
strategy

30%

of respondents say their organizations do not
have a strategy for business continuity or IT
security management

Inadequate
funding

37%

say lack of funding is the leading barrier to
success, followed by disruptive technologies
and lack of expert or knowledgeable staff

No clear
ownership

28%

say the CIO has overall responsibility for
ensuring that IT operations are not disrupted,
followed by business unit leader (20%) and
“no one person”(11%)
What can you do now to address IT
and reputational risk?

Be proactive — and be prepared to invest in
IT controls
Create a collaborative environment —
encourage executives, risk management
specialists, and IT managers to work
together
Use reputational risk as a justification for
IT investment — and build a business case
Assess risk across the supply chain and
confirm partners’ compliance with your
standards
Consider outside help for an unbiased view
of perception versus the reality of your risk
exposure
6 Simple Steps
Resources and references used in this
presentation

Read the IBM point
of view

Read the study
findings report

ibm.com/services/riskstudy

ibm.com/services/riskstudy

Your
score

129
out of
200

How well are you doing?
Find out with the
IBM Reputational Risk Index
Scan the code or go to www.ibmriskindex.com

Engage with a
consultant to
discuss your risk
exposures

Visit these websites:
www.DRII.org
www.drj.com
Dawn Simpson, CBCP

Thank
you

VP of Market Development
Trivalent Group
3145 Prairie St. | Grandville, MI 49418
616.301.6406 | dsimpson@trivalentgroup.com

Weitere ähnliche Inhalte

Was ist angesagt?

Understanding and Managing Reputation Risk
Understanding and Managing Reputation RiskUnderstanding and Managing Reputation Risk
Understanding and Managing Reputation RiskSteve Leigh
 
Reputation risk and resiliency_3rd Annual Reputation Management Conference, I...
Reputation risk and resiliency_3rd Annual Reputation Management Conference, I...Reputation risk and resiliency_3rd Annual Reputation Management Conference, I...
Reputation risk and resiliency_3rd Annual Reputation Management Conference, I...Linda Locke Reputation Strategist
 
Reputation Management Essentials
Reputation Management EssentialsReputation Management Essentials
Reputation Management Essentialsntthanhhang
 
Reputation_The Missing Piece in Resiliency Planning, Part 1, by Linda Locke 2015
Reputation_The Missing Piece in Resiliency Planning, Part 1, by Linda Locke 2015Reputation_The Missing Piece in Resiliency Planning, Part 1, by Linda Locke 2015
Reputation_The Missing Piece in Resiliency Planning, Part 1, by Linda Locke 2015Linda Locke Reputation Strategist
 
Risk Management ERM Presentation
Risk Management ERM PresentationRisk Management ERM Presentation
Risk Management ERM Presentationalygale
 
Deloitte es grc_sostenibilidad-reputation-survey
Deloitte es grc_sostenibilidad-reputation-surveyDeloitte es grc_sostenibilidad-reputation-survey
Deloitte es grc_sostenibilidad-reputation-surveyBluemap Consulting Group
 
The Role of the Chief Risk Officer Why You are the Most Important Person in Y...
The Role of the Chief Risk Officer Why You are the Most Important Person in Y...The Role of the Chief Risk Officer Why You are the Most Important Person in Y...
The Role of the Chief Risk Officer Why You are the Most Important Person in Y...WolfPAC - Integrated Risk Management
 
Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...Marc S. Sokol
 
Emergence of the Chief Risk Officer function
Emergence of the Chief Risk Officer functionEmergence of the Chief Risk Officer function
Emergence of the Chief Risk Officer functionMichel Rochette
 
2007 CPM West Keynote Presentation
2007 CPM West Keynote Presentation2007 CPM West Keynote Presentation
2007 CPM West Keynote Presentationsirjem
 
Risk Management Consulting Mkt Summary Rs
Risk Management Consulting Mkt   Summary RsRisk Management Consulting Mkt   Summary Rs
Risk Management Consulting Mkt Summary Rsbartonp
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20Marc S. Sokol
 
Risk management for law firms chapter 1 ark 2009 by dave cunningham
Risk management for law firms   chapter 1 ark 2009 by dave cunninghamRisk management for law firms   chapter 1 ark 2009 by dave cunningham
Risk management for law firms chapter 1 ark 2009 by dave cunninghamDavid Cunningham
 
Third-party Governance and Risk Management - 2018
Third-party Governance and Risk Management - 2018Third-party Governance and Risk Management - 2018
Third-party Governance and Risk Management - 2018Deloitte UK
 
CCAR & DFAST: How to incorporate stress testing into banking operations + str...
CCAR & DFAST: How to incorporate stress testing into banking operations + str...CCAR & DFAST: How to incorporate stress testing into banking operations + str...
CCAR & DFAST: How to incorporate stress testing into banking operations + str...Grant Thornton LLP
 
How Modernized Training Is Influencing the Banking Industry
How Modernized Training Is Influencing the Banking IndustryHow Modernized Training Is Influencing the Banking Industry
How Modernized Training Is Influencing the Banking IndustryColleen Beck-Domanico
 
Managing Risk in Perilous Times- Practical Steps to Accelerate Recovery
Managing Risk in Perilous Times- Practical Steps to Accelerate RecoveryManaging Risk in Perilous Times- Practical Steps to Accelerate Recovery
Managing Risk in Perilous Times- Practical Steps to Accelerate RecoveryFindWhitePapers
 
Risk assessment facilitation guide
Risk assessment facilitation guideRisk assessment facilitation guide
Risk assessment facilitation guideAstalapulosListestos
 

Was ist angesagt? (20)

Understanding and Managing Reputation Risk
Understanding and Managing Reputation RiskUnderstanding and Managing Reputation Risk
Understanding and Managing Reputation Risk
 
Reputation risk and resiliency_3rd Annual Reputation Management Conference, I...
Reputation risk and resiliency_3rd Annual Reputation Management Conference, I...Reputation risk and resiliency_3rd Annual Reputation Management Conference, I...
Reputation risk and resiliency_3rd Annual Reputation Management Conference, I...
 
Reputation Management Essentials
Reputation Management EssentialsReputation Management Essentials
Reputation Management Essentials
 
Reputation_The Missing Piece in Resiliency Planning, Part 1, by Linda Locke 2015
Reputation_The Missing Piece in Resiliency Planning, Part 1, by Linda Locke 2015Reputation_The Missing Piece in Resiliency Planning, Part 1, by Linda Locke 2015
Reputation_The Missing Piece in Resiliency Planning, Part 1, by Linda Locke 2015
 
Risk Management ERM Presentation
Risk Management ERM PresentationRisk Management ERM Presentation
Risk Management ERM Presentation
 
Risk Dashboard
Risk Dashboard Risk Dashboard
Risk Dashboard
 
Deloitte es grc_sostenibilidad-reputation-survey
Deloitte es grc_sostenibilidad-reputation-surveyDeloitte es grc_sostenibilidad-reputation-survey
Deloitte es grc_sostenibilidad-reputation-survey
 
The Role of the Chief Risk Officer Why You are the Most Important Person in Y...
The Role of the Chief Risk Officer Why You are the Most Important Person in Y...The Role of the Chief Risk Officer Why You are the Most Important Person in Y...
The Role of the Chief Risk Officer Why You are the Most Important Person in Y...
 
Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...
 
Emergence of the Chief Risk Officer function
Emergence of the Chief Risk Officer functionEmergence of the Chief Risk Officer function
Emergence of the Chief Risk Officer function
 
Managing risk
Managing riskManaging risk
Managing risk
 
2007 CPM West Keynote Presentation
2007 CPM West Keynote Presentation2007 CPM West Keynote Presentation
2007 CPM West Keynote Presentation
 
Risk Management Consulting Mkt Summary Rs
Risk Management Consulting Mkt   Summary RsRisk Management Consulting Mkt   Summary Rs
Risk Management Consulting Mkt Summary Rs
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
 
Risk management for law firms chapter 1 ark 2009 by dave cunningham
Risk management for law firms   chapter 1 ark 2009 by dave cunninghamRisk management for law firms   chapter 1 ark 2009 by dave cunningham
Risk management for law firms chapter 1 ark 2009 by dave cunningham
 
Third-party Governance and Risk Management - 2018
Third-party Governance and Risk Management - 2018Third-party Governance and Risk Management - 2018
Third-party Governance and Risk Management - 2018
 
CCAR & DFAST: How to incorporate stress testing into banking operations + str...
CCAR & DFAST: How to incorporate stress testing into banking operations + str...CCAR & DFAST: How to incorporate stress testing into banking operations + str...
CCAR & DFAST: How to incorporate stress testing into banking operations + str...
 
How Modernized Training Is Influencing the Banking Industry
How Modernized Training Is Influencing the Banking IndustryHow Modernized Training Is Influencing the Banking Industry
How Modernized Training Is Influencing the Banking Industry
 
Managing Risk in Perilous Times- Practical Steps to Accelerate Recovery
Managing Risk in Perilous Times- Practical Steps to Accelerate RecoveryManaging Risk in Perilous Times- Practical Steps to Accelerate Recovery
Managing Risk in Perilous Times- Practical Steps to Accelerate Recovery
 
Risk assessment facilitation guide
Risk assessment facilitation guideRisk assessment facilitation guide
Risk assessment facilitation guide
 

Ă„hnlich wie Analyzing Business Continuity and Reputational Risk

The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationIBM Security
 
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptxjamiejohngianna
 
Build a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramBuild a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramInfo-Tech Research Group
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachPECB
 
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015Leon Kappelman
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAPPECB
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management WorkshopStacy Willis
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 
State of the CSO 2015
State of the CSO 2015State of the CSO 2015
State of the CSO 2015IDG
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown JewelsIBM Security
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarLumension
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
Forrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardForrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardSecurityScorecard
 
IT Governances
IT GovernancesIT Governances
IT GovernancesJerald Burget
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesSlideTeam
 
Cybersecurity Incident Management PowerPoint Presentation Slides
Cybersecurity Incident Management PowerPoint Presentation SlidesCybersecurity Incident Management PowerPoint Presentation Slides
Cybersecurity Incident Management PowerPoint Presentation SlidesSlideTeam
 

Ă„hnlich wie Analyzing Business Continuity and Reputational Risk (20)

The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and Reputation
 
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
 
Build a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramBuild a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management Program
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approach
 
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
Requirements Capabilities, Alignment, and Software Success - Kappelman ASEE 2015
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
Risk Product.pptx
Risk Product.pptxRisk Product.pptx
Risk Product.pptx
 
State of the CSO 2015
State of the CSO 2015State of the CSO 2015
State of the CSO 2015
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Forrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardForrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the Standard
 
IT Governances
IT GovernancesIT Governances
IT Governances
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
 
Cybersecurity Incident Management PowerPoint Presentation Slides
Cybersecurity Incident Management PowerPoint Presentation SlidesCybersecurity Incident Management PowerPoint Presentation Slides
Cybersecurity Incident Management PowerPoint Presentation Slides
 

KĂĽrzlich hochgeladen

Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxgeorgebrinton95
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCRsoniya singh
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...lizamodels9
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 

KĂĽrzlich hochgeladen (20)

Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 

Analyzing Business Continuity and Reputational Risk

  • 1. Analyzing and Managing Risk Taking the plunge into Business Continuity Management Dawn Simpson, CBCP VP of Market Development January 23, 2014
  • 2. Objectives • • Defining the Business Impact Analysis Examining risk: o Data supporting business risks and the role of IT o Financial and other impacts of risk o Examining “Reputational Risk” o Making the IT and Reputational Risk connection o • Steps to take to strengthen your position Resources and References
  • 3. What is a BIA (Business Impact Analysis) The BIA helps you document and define the critical business functions, determine your unique threats, how and what IT supports your critical business functions so that you can prioritize and plan to mitigate the greatest risks first. The BIA should provide data to assess the organization's ability to: • Eliminate or reduce the potential for injuries or the loss of human life. • • • Create awareness of unique business threats. Develop a continuity action plan to bring the firm to “New Normalcy.” Upon completion of the initial BCP, immediately deliver real benefits to the organization.
  • 4. IBM surveyed 2,316 business continuity and IT security professionals on the following list of common cost categories and threats for respondents to evaluate Cost Categories Threats Reputation and brand damage Human error Lost revenue due to system availability problems IT system failure Lost productivity from downtime or system performance Cyber security or data breach/data theft Compliance and regulatory failure costs Third-party failure of continuity or IT security Forensics to determine root causes Data loss from backup or restore failure Technical support to restore systems Natural or manmade disaster
  • 6.
  • 7. Respondents apportioned total cost across the six cost categories, using a 100-point scale Lost productivity from downtime or system performance 28 Technical support to restore systems Lost revenue due to system availability problems Compliance and regulatory failure costs Minor ($1M) 100 points 20 25 Forensics to determine root causes Reputation and brand damage 36 35 2 4 5 4 17 11 15 9 7 Event-related impact 37 12 22 Durationrelated impact 10 Moderate ($4.3M) 100 points Substantial ($14.3M) 100 points
  • 8. Examining a Common Threat: Reputational Risk The Mitigation of reputational risk has a definable value -29% • The economic value of a company’s reputation declines 29% as a result of an IT breach of customer data* Can IT functionality (i.e., loss of email or data) or a security breach affect your brand value? • • How do you protect your brand reputation? Have you established strong integrated risk management (Business Continuity and Security) programs? *Reputation Impact of a Data Breach: US Study of Executives & Managers, *Sponsored by Experian® Data Breach Resolution Ponemon Institute, November 2011.
  • 9. Here’s what the BIG guys are saying… IBM 2011 Annual Report – Item 1A “Risk Factors” Cybersecurity and Privacy Considerations could impact the Company's Business: The company's products, services, and systems may affect critical third party operations or involve the storage, processing and transmission of proprietary and sensitive or confidential data, including personal information of employees, customers and others. Breaches of security could expose the company, its customers or others to risk of loss… resulting in litigation and potential liability for the company, as well as the loss of existing or potential customers and damage to the company's brand and reputation. IBM has one of the strongest brand names in the world, and its brand and overall reputation could be negatively impacted by many factors… If the company's brand image is tarnished by negative perceptions, our ability to attract and retain customers could be impacted. Source: http://www.ibm.com/annualreport/2011/bin/assets/2011_ibm_sec10k.pdf
  • 10. Making the reputation and IT risk connection Incidents over the past 24 months that affected reputation and brand value Percentage of “yes” responses IT system failure 67% 58% Human error Cyber security or data breach/data theft 47% Data loss from backup or restore failure Natural or manmade disaster Third-party continuity or IT security failure 42% 23% 19% “IT risk management is reputation management.” – IT security supervisor, US telecom company
  • 11. Relating it to the BIA 1 Example: IBM identified a trend that has become a threat to a critical business function – i.e. Brand Reputation 2 The financial and reputational impact of the threat was determined and deemed a priority 3 Funding to protect reputation is required for success 4 IT is a key safeguard to protecting against reputational harm 5 Upon identifying the functional priorities and the IT support in place, the company can determine if there are gaps to be mitigated based on financial and risk based data and organizational goals
  • 12. Reputation Recovery In your estimation, how long on average has it taken for your organization’s reputation to recover from damage caused by the following IT risk factors? 12+ months 6-12 months 0-6 months Data breach 13% 16% New technology 13% 15% 12% 19% 56% Insufficient DR measures 11% 20% 56% Poor IT skills / tech support 11% Inadequate continuity plans 10% Data loss 10% Compliance failure Mobility (BYOD) System failure Website outage 59% 58% 18% 59% 22% 54% 14% 64% 10% 14% 68% 8% 15% 6% 12% 68% 71% Source: 2013 IBM Reputational Risk and IT Study, IBM and Economist Intelligence Unit
  • 13. Barriers to achieving highly effective business continuity and IT security management programs Three key issues for organizational leadership to address Lack of strategy 30% of respondents say their organizations do not have a strategy for business continuity or IT security management Inadequate funding 37% say lack of funding is the leading barrier to success, followed by disruptive technologies and lack of expert or knowledgeable staff No clear ownership 28% say the CIO has overall responsibility for ensuring that IT operations are not disrupted, followed by business unit leader (20%) and “no one person”(11%)
  • 14. What can you do now to address IT and reputational risk? Be proactive — and be prepared to invest in IT controls Create a collaborative environment — encourage executives, risk management specialists, and IT managers to work together Use reputational risk as a justification for IT investment — and build a business case Assess risk across the supply chain and confirm partners’ compliance with your standards Consider outside help for an unbiased view of perception versus the reality of your risk exposure
  • 16. Resources and references used in this presentation Read the IBM point of view Read the study findings report ibm.com/services/riskstudy ibm.com/services/riskstudy Your score 129 out of 200 How well are you doing? Find out with the IBM Reputational Risk Index Scan the code or go to www.ibmriskindex.com Engage with a consultant to discuss your risk exposures Visit these websites: www.DRII.org www.drj.com
  • 17. Dawn Simpson, CBCP Thank you VP of Market Development Trivalent Group 3145 Prairie St. | Grandville, MI 49418 616.301.6406 | dsimpson@trivalentgroup.com