Call us
{+62 21} 7191612
02
Nov
Online
Online
09:00 - 15:00
Rp. 1.000.000,-

Business Continuity and Disaster Recovery Plan

 

Speaker: Fauzi Hasan, DR, Ir. MM, MBA, PMP, CISA, CISSP, SSCP, CISM, CMPP, CSCP, CGeIT, APICS, ITIL, CE-PM, APICS, Prince2


 

Seminar/Conference Description :


Disaster Recovery and Business Continuity, a strategic imperative and a competitive advantage in an environment where you must plan for the unexpected, maintain operations, and meet regulatory demands.

Course also covers recovery time and recovery point objectives (RTO and RPO). Built upon the concepts ofical risk analysis and business impact planning, this course is designed to provide a foundation and guide to coordinated organizational emergency response and event management during and after a disruptive occurrence.

The course contains a number of practical sessions, designed to build on the comprehensive components of the module, and to encourage inquisitive debate and the sharing of knowledge and practical experience among the participants.

The qualification promotes a hands-on approach to Crisis Management by applying effective standards, enabling participants to make immediate use of the module on their return to their organizations that demand for rapid and practical crisis management solution.

Objective

  • Identify the core pieces and functions of an integrated, effective, corporate business continuity program
  • Describe key Business Continuity terms and concepts, such as: determining critical business functions, the "MARC" (Minimum Acceptable Recovery Configuration), Recovery Time Objectives, Recovery Point Objectives, Recovery Time Capabilities, information technology disaster recovery technical solution designs standards and practices
  • Understand how to effectively determine business unit business resumption requirements for loss of workspace, loss of information technology, and loss of personnel.
  • Understand how to approach crafting effective information technology recovery time capabilities for key systems that will meet business units' stated needs, and how to address "the gap" which may be discovered between business units' information technology recovery requirements and available money or capabilities .
  • Understand the core quality control concepts surrounding the development and use of scorecards in evaluating business resumption and disaster recovery plans, and standardized objective metrics in information technology testing

Who should attend

  • Technical practitioners who may be required to operate under or help implement a Crisis Management program.
  • Process analysts who may be required to design or monitor implementation of BCP and DRP program.
  • Managers who may be charged with determining a path for process improvement in their crisis management solution
  • Those wishing to learn more about how BCP and DRP can augment process improvement in the crisis management efforts.

Speaker :
Fauzi Hasan, DR, Ir. MM, MBA, PMP, CISA, CISSP, SSCP, CISM, CMPP, CSCP, CGeIT, APICS, ITIL, CE-PM, APICS, Prince2

  • An experienced professional with over 25 years invaluable experience of risk management along with implementing Disaster Recovery Plan (DRP) and Business Continuity Plan (BCP) within the agreed risk manegement methodologies and procedures
  • Professor Fauzi Hasan is world-class academecian and obtained his professorship in project management and risk management from the American Academy – International Board of Standards (IBS), Colorado Springs, Colorado USA. He has strong and real drive, also willingness to succeed and a positive, proactive approach. Proficient in banking and lending operations and knowledgeable with all governent l services. Excellent research skills in preparing fraudulant investigation reports.
  • The industrial exposures and coverage resides within the mid level-intensive-technology based enterprises till high level-intensive-technology based industries with extensive project management spectrum of requirements. The industries at where Prof. Fauzi Hasan has got practical hands on and delivered direct contributions to the completion and success of the projects, and encompasses areas of industries such as: banking, Information Technology and Telecommunications, manufacturing, Oil and Gas industries; and other service industries.


Outline :

  • Course Intro and Asset Identification
    1. Course Intro and Review
    2. Critical Asset Identification
      1. Tangible/Physical Assets
      2. Intangible/Logical Assets
      3. Supplier development dll
    3. Asset Valuation
    4. Baseline Creation
    5. Understanding Asset Ranking in Incident Response vs. Disaster Recovery
  • Introduction to Risk Management
    1. Overview of the Risk Management Process
    2. Risk
    3. Risk Assessment Process
    4. Risk Management
    5. Residual Risk
    6. Residual Risk
    7. Risk Control and Acceptance
  • Threat
    1. Environmental/Natural Threat
    2. Human Threats
      1. Error
      2. The Insider
      3. Sabotage
      4. Social Engineering
    3. Hardware/Software Failure
    4. Attack
      1. Software Attacks
      2. Viruses
      3. Worms
      4. Backdoors and Trapdoors
      5. Denial of Service
    5. Theft
    6. Threat Analysis
    7. Threat Assessment
  • Vulnerabilities
    1. Vulnerabilities
    2. Vulnerability Analysis
    3. Vulnerability Management
    4. Network Vulnerabilities
    5. Technical Vulnerabilities
  • Planning for Organizational Readiness
    1. Contingency Planning Process
    2. Beginning the CP Process
    3. Elements to Begin Contingency Planning
    4. Contingency Planning Policy
    5. Business Impact Analysis
    6. Business Impact Analysis Data Collection
    7. Budget Planning for BIA
      1. Incident Response Budgeting
      2. Disaster Recovery Budgeting
      3. Business Continuity Budgeting
      4. Crisis Management Budgeting
  • Incident Response
    1. Preparing for Incident Response
    2. Incident Response Policy
    3. Building the Security Incident Response Team
      1. Incident Response Planning
      2. During the Incident
      3. After the Incident
      4. Before the Incident
    4. Assembling and Maintaining the Final Incident Response Plan
    5. Detecting Incidents
    6. Intrusion Detection Systems
    7. Incident Decision Making
    8. Reaction
    9. Recovery from Incidents
    10. Maintenance
    11. Intrusion Forensics
    12. Chain of Custody
    13. Managing Evidentiary Data in an Electronic Environment
    14. Chain of Custody
  • Contingency Strategies for Business Resumption Planning
    1. Data and Application Resumption
    2. Site Resumption Strategies
      1. Exclusive Site Resumption Strategies
      2. Shared Site Resumption Strategies
      3. Service Agreements
  • Disaster Recovery
    1. Disaster Classifications
    2. Forming the Disaster Recovery Team
    3. Disaster Planning Functions
    4. Technical Contingency Planning Considerations
    5. Resumption Phase
    6. Restoration Phase
    7. Facing Key Challenges
    8. Preparation: Training the DR Team and the Users
    9. Disaster Response Phase
    10. Recovery Phase
    11. Resumption Phase
    12. Restoration Phase
    13. Simulation Exercise-Sample Disaster Recovery Plans
  • Business Continuity
    1. Elements of Business Continuity
    2. The Business Continuity Team
    3. Business Continuity Policy and Plan Functions
    4. Creating an Effective BC Plan/Policy
    5. Implementing the BC Plan
    6. Continuous Improvement of the BC Process
    7. Maintaining the BC Plan
    8. Simulation Exercise-Sample Business Continuity Plan
  • Crisis Management
    1. Crisis Management in the Organization
    2. Preparing for Crisis Management
    3. Post-Crisis Trauma
    4. Getting People Back to Work
    5. Law Enforcement Involvement
    6. Managing Crisis Communications
    7. Succession Planning

 


Contact Us at
{+62 21} 7191612
Send Email
reg@aspriseminar.com
Or go to our Contact Page