Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and...

29
Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader: Moderator and Q&A: Andrew Gansler, Senior Manager Lawrence Baye, Principal Management Consulting Services Management Consulting Services [email protected] [email protected]

Transcript of Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and...

Page 1: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough

Discussion Leader: Moderator and Q&A:Andrew Gansler, Senior Manager Lawrence Baye, PrincipalManagement Consulting Services Management Consulting [email protected] [email protected]

November 6, 2001

Page 2: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

2

What is Business Continuity Risk?

Grant Thornton LLP defines business continuity risk as . . .

…the threat of any incident that may cause an extended disruption of business functions or impact the ongoing integrity of the firm.

Page 3: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

3

What are the risks to business continuity?

• Traditional Concerns– Fire– Storm– Flood– Hurricane

• Less publicized but emerging trends– Intrusion (physical or logical)

– Control failures– Sabotage– Terrorist activity

– Earthquake– Power outage– Equipment failure

Page 4: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

4

Some statistics…

• 2 out of 5 businesses that experience a major disaster will cease to exist within 2-5 years (Gartner, 2001)

• Some believe that as many as 80% of businesses suffering a major disaster will cease to exist as a direct or indirect result (BCC, 2001)

• The average bank robbery yields $2,500; average computer crime nets $500,000 (CSI/FBI 2001 Survey)

• Less than 50% of existing business continuity plans meet their firms recovery objectives (KPMG)

Page 5: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

5

What's at stake for you?

• Assets "at risk"• Customer confidence• Fiduciary responsibility• Regulatory and other compliance• Insurance 'out' clauses• Trading partner relationships

Page 6: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

6

Key considerations for Professional Services firms

• Fractionalization of firm– Reduced cohesion for collaboration– Controls breakdown

• Paper morass– drawings, transcripts, contracts, discovery materials, etc.– replacement issues

• Intellectual capital• Confidence level of employees• Availability of mission-critical information• Insurance exclusions

Page 7: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

7

Key trends and challenges for real estate management companies

• Increased insurance premiums• Security costs

– Security/operation balance– Cost cutting environment/static budgets

• Loss of tenants • New service expectations

– Full backup power– Redundant/enhanced telecommunications

• Availability of investment capital • Tenant diversification • Prospective tenant's risk assessment

Page 8: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

8

How to manage and mitigate business continuity risk

• Risk Mitigation– Emphasis on safeguarding your assets

• Physical• Logical (information)

• Contingency Planning– Quickly returning your business to a functional state after

an unavoidable and significant incident

Page 9: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

9

Framework

Prevention Detection

Recovery

Page 10: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

10

The information security problem

• Securing the server and its data• Securing information while in transit• Securing the user’s computer

Page 11: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

11

Methods of intentional attack on information resources…

• Logical / Hacking– Passwords– Port/packet sniffing– Demon dialers– Spoofing– Home Users

• Virus threats– 89% of respondents reported a problem (IS Magazine) – Platform specific – Easy to engineer

Page 12: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

12

The neglected areas

• Physical restriction• Data backup

– Frequency– Completeness– Testing

Page 13: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

13

What can be done?

Page 14: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

14

Three Ds of security policy

Page 15: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

15

Tools, methodologies and best practices

• Control management– CPA WebTrust/Systrust– SAS 70

• Encryption and Authentication– Digital ID's - SSL– VeriSign® - PPTP

• Intrusion prevention, detection and monitoring– Configuration– Firewalls / Proxy servers– Detection/monitoring software – Intrusion testing

• TrueSecure• GrantGuard

Page 16: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

16

Tools, methodologies and best practices (cont.)

• Strict backup procedures– Full backups– Client backups– Documentation – Off-site rotation– Periodic recovery tests

• Virus updates– Footprints– Push to users

Page 17: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

17

Framework

Prevention Detection

Recovery

Page 18: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

18

An unavoidable threat to business continuity has occurred…..What’s at stake?

• Customers move to "more reliable" competitors• Idle time of non-productive employees• Loss of customer service satisfaction• Cost of rebuilding lost data (errors/rework)• Additional staff needed to resolve problems• Fines and penalties imposed by regulatory agencies• Fines and penalties associated with existing contracts• Breakdown of internal controls

Page 19: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

19

Emergency Procedures vs. Disaster Recovery vs. Business Continuity

• Emergency Procedures– Focus on tactical steps to be performed by operations staff on an event-by-

event basis– Heavy emphasis on minutes/hours following onset of an emergency– Facility schematics (HVAC, plumbing, etc), service providers

• Disaster Recovery – Focus on technology resumption (or, traditional Disaster Recovery)– Restoration of ‘mission-critical’ technology, communications infrastructure,

centralized applications– Contact lists, notification schedules, 're-start' procedures

• Business Continuity– Focus on restoring critical business processes and ‘normal’ operations

…inventory and prioritize– Technology is critical, but so are 'essential' business processes

……e.g., rent receipt processing

Page 20: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

20

Some recent examples

• Global Investment Bank– On a Saturday in August, a steam pipe ruptured in NYC. Areas

affected: equity trading, equity sales, equity research, equity capital markets, private wealth management and legal departments; 1,100 staff

– Result: Initiated business continuity plan; relocated staff to six alternative locations. Resumed trading operations Monday morning

• Major Financial Publisher– September 11, Staff were displaced by tragic events. Publishing

capability was at risk.– Result: After the 1990 power blackouts in lower Manhattan,

company had developed an elaborate business continuity plan. They executed this plan, which included activation of a hot-site in NJ, which was ready for use by the time staff arrived there.

Page 21: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

21

Some recent examples

• Key Processing / Clearing Bank– September 11, Bank executes its disaster recovery plan in response

to terrorist attack. Trade processing and other core functions are re-routed to backup systems. As a result of prioritization, continuity was restored for some systems and processes (e.g., trade processing, clearing, settlement), while areas deemed non-essential (e.g., ATM network) were not restored.

– Result: Many of the backup systems worked. But some did not (e.g., government bond processing). Bank believes they were successful in implementation of their plan. Some of their customers may disagree.

• Major Law Firm– September 11, relocated WTC staff to 7 other NYC law firms using

borrowed space– Result: Scattered people, fragmented operations,

collaboration/coordination issues

Page 22: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

22

The Cost of Business Continuity

• Cost components– Consultants– Internal resources– Service Providers (recurring)– Time

• Who pays? – Company-wide project with an IT component

But consider the cost of doing nothing…

Page 23: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

23

What you should be doing now

Review your plan…

Do you have a comprehensive plan?• 80% of NY-based companies are lacking, missing, or obsolete

If YES:• Review it

– Changes since last review: new systems, infrastructure changes– Are responsible individuals still with your firm?– Does it provide for restoration of core business functions? – Are your critical resources centralized?– Service contracts

• Get a 3rd party perspective – Will your plan work in today's environment?

• Test it • Maintain it

* Source: GT

Page 24: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

24

What you should be doing now

Develop a plan…

Do you have a comprehensive plan?

If NO:• Get management buy-in – expensive, time consuming, no immediate ROI

• Form a team• Define your approach • Perform a business impact analysis • Cover the essentials • Develop the plan• Train your employees• Test the plan• Maintain and update the plan

Page 25: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

25

What you should be doing now

Consider remote site operation…

Do you have an alternate location available for technology and people?

Hot SiteCold Site Mobile-Site or Hybrid• If YES:

– Review the terms of your agreement. Does the contracted service still meet your current needs?

• If NO: – Consider an outsourcing services provider (SunGard, IBM, etc.) as

one part of a comprehensive solution.• Considerations

– Exclusion zones -- Competitive bidding– Service guarantees -- Complex pricing structures– Duration -- Termination clauses– Test Time

Page 26: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

26

What you should be doing now

Review your insurance coverage…

Do you have all the necessary insurance?

General commercial coverage (e.g., liability, property, etc.)

Business interruption insurance

OEM insurance /quick ship• If YES:

– Review your policies.• E&O, terrorism and other exclusions

• If NO:– Get some!

Page 27: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

27

What you should be doing now

Review important processes…

Are your critical processes paper intensive?• Next to people, paper records are the most difficult component of any

business to replace– What are my vital records? What are the retention requirements?– What would happen if my vital paper records were destroyed?

• Consider document imaging and workflow automation– Re-think current processes – Automate paper-intensive processes– Provide an electronic record of important documents

• Confirm legal admissibility– ROI very high - usually pays for itself

Page 28: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

28

What else can I do?

• Review your outsourced services– Does your service provider have a disaster recovery plan?– Are they viable over the long term? Many recent ASP, ISP, and

carrier failures– What controls are in place to prevent unauthorized access to your

data? Have these controls been tested by an independent third party?

• Form alliances– Is there a business partner, or even competitor that I would be

willing to team with?– Is there a company that has similar equipment to mine, whose

technology resources (e.g. data center) can be made available to me if necessary?

Page 29: Business Continuity Risk: Mitigation and Contingency Planning An ounce of prevention…… ….and what to do when that's not enough Discussion Leader:Moderator.

Questions and Answers