SlideShare a Scribd company logo
1 of 12
Download to read offline
Insights on IT risk
   Business briefing
         August 2011




                       Business continuity
                       management
                       Current trends
Introduction
                              Floods, fires, hurricanes, explosions, earthquakes,
                              pandemics, cyber attacks and even terrorist attacks can
                              cause data to be lost, websites to go down, servers to fail
                              and employees to lose communication with one another.
                              Not being able to give or get necessary resources — data,
                              raw materials, personnel, finished products, and so much
                              more — for any length of time can be devastating. Such
                              inactivity and non-availability can handicap a company
                              for months, reducing income and affecting precious
                              market share. Margins for error in the current economic
                              environment have narrowed, leaving little or no room for
                              mistakes.

                              As organizations grow in size and complexity within the world of
                              the “extended enterprise,” the impact of non-availability of any
                              resources has magnified. High-profile events caused by natural
                              disasters and technology infrastructure failures have increased
                              awareness of the need to develop, maintain and sustain business
                              continuity programs. Although these large-scale events — such as
                              the Japanese earthquake and tsunami — dramatically challenge
                              the existence of some companies, there are smaller, less impactful
                              but more frequent disruptions that cause many executives to
                              question their organization’s ability to react and recover. These
                              big disasters, as well as the smaller disruptions, have prompted
                              leading executives to hope for the best but prepare for the worst
                              by investing in effective business continuity management (BCM).




Insights on IT risk | August 2011                                                                  1
Recognizing the importance of BCM

Effective BCM is rising in importance on the corporate agenda. Volatile            Ernst & Young’s 2010 Global Information Security Survey affirmed
global economies have shrunk margins for error. Companies that                     that BCM is viewed as the “most” important security risk, according
previously would have survived a significant disaster or disruption                 to 1,598 survey respondents.
may now find the same event pushing their corporate existence to
the brink. Executives are realizing that effective BCM may be the
only buffer between a small disruption and bankruptcy.




     Business continuity/disaster recovery plans and capabilities                                28%                                11%                9%        7%         7%

                       Compliance with regulatory requirements                     16%                           12%                9%         5%       4%

Data leakage/data loss prevention technologies and processes                10%                       12%                10%              7%      5%

                           Inf ormation security risk management            8%                  9%               10%               9%           9%

                             Compliance with corporate policies          7%                10%                 7%        6%        5%

    Identity and access management technologies and processes           7%                 10%                 8%             8%          7%

                                Implementing security standards        5%          5%           4%     4%        5%

                                Protecting personal inf ormation       4%        5%        6%          5%           5%

                                 Security awareness and training       3%     4%            7%              9%                11%

                             Protecting proprietary inf ormation      3% 4%           5%         5%       3%

          Vulnerability management technologies and processes 2% 3%                4%            5%            5%

                                                 Security testing 1% 3% 4%                 6%             7%

                                      Securing new technologies 2% 3% 3%                   6%             7%

                         Incident response plans and capabilities 1% 3% 4%                 5%        5%

                                 Secure development processes 12% 4%                  4%    3%

                                  Security metrics and reporting 11 3% 4%                  6%

                                  Outsourcing security f unctions 111 1 2%
                                        Forensics/f raud support 11 2 2 1
                                   Recruiting security resources 11111

                                                                        First priority           Second priority          Third priority       Fourth priority   Fifth priority




2                                                 Insights on IT risk | August 2011
Additionally, half of the respondents indicated that they were                A 2011 Forrester survey, “Global IT Budgets, Priorities, And Emerging
intending to increase their spending on business continuity. This is          Technology Tracking,” indicated that for 1,000 respondents, the
a further indication that most organizations are not as advanced as           average IT investment in business continuity and disaster recovery
they would like to be this arena.                                             was 6% of the annual budget. While this percentage was considerably
                                                                              lower than within other categories of IT spend, it nonetheless
                                                                              demonstrates that BCM is a significant element of an IT program.



       Data leakage/data loss prevention technologies and processes                              50%                       46%            4%

          Business continuity/disaster recovery plans and capabilities                           50%                      45%             5%
                                      Identity and access management
                                                                                                48%                      45%              7%
                                           technologies and processes
                                            Securing new technologies                        44%                         50%              6%

                                       Security awareness and training                      42%                          53%              5%

                             Compliance with regulatory requirements                        41%                          55%              4%

                                Information security risk management                        41%                          55%              4%

                                                          Security testing                 36%                      58%                   6%

                                       Protecting personal information                    34%                       61%                   5%

               Vulnerability management technologies and processes                        33%                       63%                   4%

                                    Protecting proprietary information                    32%                       64%                   4%

                                        Security metrics and reporting                    32%                       64%                   4%

                                      Implementing security standards                  30%                         61%                 9%

                                        Secure development processes                   30%                         63%                    7%

                                    Compliance with corporate policies                28%                          67%                    5%

                               Incident response plans and capabilities               26%                        68%                      6%

                                          Recruiting security resources              22%                     63%                     15%

                                               Forensics/fraud support              18%                       74%                         8%

                                        Outsourcing security functions              17%                    64%                      19%



                                                                                    Spend more         Same or constant          Spend less




                                                Insights on IT risk | August 2011                                                                 3
Business continuity: pressure to improve resilience

The increased focus on BCM is being driven by three main factors:


           Business continuity management continues to rise up the corporate agenda



    1. Strategic business reasons                                   Pressure to improve                      3. Current business landscape
    Competitive edge                                               performance, resiliency                   Increased complexity
    Resiliency of business and information technology                 and sustainability                     The increased adoption of new technologies such
    processes provides a competitive edge. Companies                   in the wake of a                      as mobile computing, cloud computing and social
    want to conduct their own internal capability                                                            media into regular business streams have also
    assessments, and also want to understand where                     disaster, loss of                     introduced new risks to the business operations,
    their competition might rank. In the event of a                  supplier or service                     which — paired with a service interruption or
    disaster, a well-prepared company can show                      delivery interruption                    disaster — would be signi cant.
    customers and the world it has prepared adequately,
    thereby strengthening its brand and marketplace
    credibility.
                                                                                                             Push for shorter recovery times
                                                                                                             Raised expectations on business performance and
                                                                                                             demand for availability of service has led to
    Systemic risk
                                                           2. Compliance- and                                pressure to shorten recovery time for critical
    Supply chain managers used to look only for low-
    cost suppliers. But that model is changing fast as
                                                              regulatory-related reasons                     processes, people, technology and data. These
                                                                                                             rising expectations are propelled by technology
    companies seek resiliency, disaster preparedness,      Increased regulation                              improvements that have reduced data storage
    and redundant multi-geographical suppliers.                                                              costs and improved simple data recovery strategies.
                                                           Widespread concern over the role of regulators
                                                           in the recent global downturn have prompted
    Economic conditions                                    legislators and regulators around the world to    Global impact of disasters
                                                           more actively seek new and more strident
    The challenging economic climate has increased a       regulations designed to help prevent similar      Increasing globalization means that a disaster in one
    general sense of vulnerability with a resulting        problems in the future. Countries have pursued    part of the world rarely occurs without impacting
    increase in business continuity budgets. With          more robust regulations such as consent           almost every other part. As understanding and
    margins thinner and markets shaky, companies feel      decrees, business continuity program audits,      acceptance of globalization spreads, so does the
    closer to peril, prompting them to believe that the    and even corporate “living wills” designed to     expectation that companies will make corresponding
    risk posed by a disaster could be more signi cant      limit the risk to surrounding industries should   efforts to prepare for any complications that might
    to the bottom line and ultimately their survival.      that company fail.                                arise from it.




These factors create pressure to improve performance, resiliency and sustainability after a disaster
or service delivery interruption.




4                                                         Insights on IT risk | August 2011
Japan and beyond: local disaster, global impact
                                            A total of 385 disasters killed more than 297,000 people worldwide in 2010, affected more than 217 million others and caused
                                            US$123.9 billion in direct economic damage, according to the Centre of Research on the Epidemiology of Disasters. These damage
                                            estimates do not include secondary damages or impacts caused by loss of revenue through lack of supplies or suppliers. So, while
                                            many disasters are local in nature, the operational impacts can be felt worldwide.

                                            For example, an analysis by Dun & Bradstreet showed that the catastrophic Japanese earthquake and tsunami has the potential
                                            to impact 86,418 businesses, 311,934 employees and $209 billion in sales volume. Based on the Japanese suppliers that the
                                            business and credit information firm monitors for its US customers, the top 10 Japanese supplier industry categories that can
                                            potentially be impacted include manufacturing durable, services, computer services, wholesale durable and manufacturing non-
                                            durable. The industries most likely to be impacted include electronics (Japan produces 40% of the global electronic component
                                            supply), automotive and certain textiles.

                                            As a result, thousands of businesses and industries — many of which are located around the world and were not directly impacted
                                            by the catastrophe but rely on suppliers and buyers that were — will be severely affected. Many of them were left desperately
                                            scrambling to find new suppliers, ensure IT system integrity and get data back up and online.

                                            Several automakers and their suppliers impacted by the earthquake and tsunami suffered lower earnings as a result of the
                                            catastrophe.




A high cost: disasters in 2010
                                            700                                                                                                                    450
                                                                                                                       421                 432
                                                                Victims (in millions)*
                                                                                                             413                                 414
                                                                No. of reported disasters                                                                    385   400
                                            600

                                                                                                                                                                   350
Number of reported victims (in millions)*




                                                                                                                                     354
                                                                                                                                                       343
                                            500
                                                                                                                                                                         Number of reported disasters




                                                                                                                                                                   350
                                                      278
                                                                      259
                                            400
                                                                                                                                                                   250

                                                                                        227
                                                                                                                                                                   200
                                            300


                                                                                                                                                                   150
                                            200

                                                                                                                                                                   100

                                            100
                                                                                                                                                                   50


                                               0                                                                                                                   0
                                                   1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010

                                                   * Victims: sum of killed and total affected

Source: Centre of Research on the Epidemiology of Disasters

                                                                                                 Insights on IT risk | August 2011                                                                      5
Leading trends: making good from bad
Disasters do not have to be large in scale to capture world attention               Background
or cause severe business damage. A flood at a key overseas                           In recent years, both the enterprise risk environment and
distribution center may hardly make headlines back home, but it                     enterprise BCM measures have evolved considerably. As all risks
might cripple critical supply chains if no quick alternative exists.                are converging, enterprise risk management (ERM) consolidates
A now-common denial-of-service attack can bring down a popular,                     previously siloed risk management efforts within a single,
high-volume website, frustrating consumers, potentially jeopardizing                centralized governance structure. BCM, which has evolved from
data security and quickly eroding an otherwise strong brand. The                    backup and disaster recovery efforts, now incorporates a wide
collapse of a regional stock exchange can panic investors, shrink                   variety of risk areas within the business and IT. Bringing BCM
capital availability for months and put construction and expansion                  under ERM is becoming increasingly important as the business
plans on hold for years.                                                            and regulatory compliance environment forces the development
                                                                                    of a consolidated view of risk. The emerging trends suggest that
In today’s environment, companies want to secure a level of confidence
                                                                                    the global BCM executive leader should report to ERM under the
such that they can effectively manage an emergency situation
                                                                                    chief risk officer (CRO).
to both protect life and prevent an escalation of the situation.
Management seeks confirmation that it has the ability to detect and                  Companies lacking centralized direction often develop BCM
swiftly address issues as an effort to change the course of a crisis,               processes, protocols and plans that are fragmented in nature,
or at least minimize its overall impact.                                            do not synchronize with each other, and do not share a common
                                                                                    taxonomy or event classification. This type of fragmentation is
Leading companies want to invest in BCM programs by moving their                    very disruptive in a global disaster, and divisions that developed
approach from reactive and tactical to proactive and strategic. They                their processes in a silo may have difficulties getting what they
want the ability to prepare for events before adverse effects occur.                need from corporate in a disaster. A consistent framework
Many of these leading companies have deployed leading practices                     spanning different geographical BCPs allows them to be better
to maximize the chances of success in the wake of a disaster or                     synchronized with each other if there is an actual event that
disruption including:                                                               forces them to be activated.

1. Implement a BCM governance model and an                                    2. Integrate business impact analysis (BIA) and
   enterprise BCM framework                                                      risk assessment
    BCM programs should be based upon a clearly defined                              BIAs and risk assessments are two long-standing components
    governance model, supported by a single, common framework                       of any business continuity standard and methodology. They
    that defines a methodology, a set of policies and roles. The                     remain two of the most critical inputs toward any BCM program,
    overall BCM governance focuses on: how the BCM program                          as major strategy and funding decisions will be made based on
    should be operationalized within the business and IT by setting                 their results and how critical they are to the enterprise.
    well-defined policies and principles; who makes what decisions
    by defining roles and responsibilities for clear accountability;                 Background
    and what mechanisms are in place to ensure that decisions                       More than just an understanding of threats and risks, a risk
    are made, acted upon and complied with in relation to the                       assessment also includes determining whether mitigation
    company’s overall direction. The BCM governance should                          measures can cost-effectively be implemented to lower the
    steer and respond to decision requests that emerge from                         probability of the risk’s occurrence or lessen its impact. By
    the business continuity assessment process whereby senior                       looking at the BIA results and risk assessment results in a single
    management can make informed decisions in order to reduce                       view, management can gain a firmer understanding of where
    enterprise risk.                                                                the most critical business functions reside and can apply a
                                                                                    comparative risk rating to a particular site. By integrating the BIA
                                                                                    and risk assessment results in this way, management will be able
                                                                                    to make more informed business decisions on how to better
                                                                                    allocate funds to reduce risks and determine which risks it is
                                                                                    willing to assume.


6                                               Insights on IT risk | August 2011
3. Leverage emerging technologies such as cloud                                       distributed (geographical or regional-based), but capable of being
   computing and virtualization                                                       managed as if it were a single consolidated entity. In this case,
                                                                                      service resiliency must become a key component of system design
   Disaster recovery as a service (DRaaS) provides several levels                     (applications and infrastructure) to support disaster recovery
   of protection to help companies recover from downtime in a                         based on geographical intelligence and automatic distribution.
   potentially more cost-effective and timely manner. Workload
   can be replicated from virtual or physical environments to
                                                                                5. Understand the true application dependency for
   high-availability cloud infrastructure and then hosted in standby
                                                                                   recovery assurance
   mode. Also, the cloud approach can provide companies the
   ability to replicate across multiple storage platforms to a cloud                  It is essential to completely understand cross-application,
   infrastructure or elsewhere. Systems (e.g., VMware) can be                         data and underlying infrastructure dependency relationships
   registered on the cloud in standby mode — ready to activate                        for both disaster recovery planning and as a quality assurance
   and keep the business up and running should the need arise.                        validation that dependent parts have been identified for
                                                                                      recovery. This becomes especially critical if an operation is
   Background
                                                                                      planning to implement (or has already implemented) one or
   Although disaster recovery outsourcing and managed services
                                                                                      more application services based on service-oriented architecture
   are to some extent mature, the cloud adoption trends are
                                                                                      (SOA), or whose application services are multisourced.
   clearly amplified by the recent financial crisis, relying upon key
   elements such as elastic and scalable capabilities, self-service                   Background
   and ease of provisioning; consumption-based pricing; shared                        There is a perception that a few selective applications in recovery
   and optimized infrastructure; and the ability to be virtualized                    and testing are needed to ensure that the right applications are
   and dynamic. Many of our global clients are monitoring the                         recovered at the right time and in the right order. Many enterprises
   cloud market and approaching cloud services with caution                           and service provider operations have found this simplistic view
   while adopting a mix of in-house and managed disaster                              to be inadequate. Many applications and services have complex,
   recovery services with some well-proven DRaaS based on the                         meshed relationships and dependencies on other applications,
   application’s criticality, recovery objectives, suitability and cost               infrastructure services (e.g., network, active directory) and data,
   of service. This trend is known as a hybrid disaster recovery                      some of which may be currently defined as being part of a lower
   sourcing approach.                                                                 recovery tier or assumed to be highly available and recoverable
                                                                                      (e.g., network).
4. Build for a resilient environment vs. a reactive recovery
                                                                                6. Increase the complexity of testing
   Most companies are looking to enhance their ability to rapidly
   adapt and respond to business disruptions and to maintain                          Leading practice organizations are including more complex
   continuous business operations, be a more trusted partner and                      integrated exercises in their annual test plan. While most do
   enable growth. However, many companies have delayed                                not advocate a “pull the plug” scenario yet, integrated testing
   investing in or updating their disaster recovery infrastructure                    between business units and IT is the right way to truly develop
   and plans due to the lack of funding for disaster recovery over                    confidence in an organization’s capability to recover. In these
   the past five years. Companies should focus 70% to 80% of                           scenarios, the business units may actually deploy to their
   their disaster recovery spending on supporting the realization                     alternate site and use their IT workaround procedures during
   of the recovery time objective (RTO) and recovery point                            the period that the IT systems are being recovered. This type
   objective (RPO) targets for the top 20% to 30% mission-critical                    of testing will prove the viability of the alternate site, the
   applications.                                                                      viability of the workaround procedures and that the IT systems
                                                                                      that the business unit needs can be recovered within its stated
   Background
                                                                                      RTO. All of these measures will start to establish a validated
   For these companies, infrastructure diversification is one key to
                                                                                      recovery time capability (RTC) for an organization, while
   enhance their business resiliency without the cost and complexity
                                                                                      the best tabletop testing can only provide a recovery time
   associated with traditional high-availability clusters and fault-
                                                                                      estimate (RTE).
   tolerant systems. This approach is achievable by creating an
   operational infrastructure beyond active/standby that is physically




                                                  Insights on IT risk | August 2011                                                                     7
Background                                                                   8. Exercise an integrated ERM program
    Recent Gartner studies from the past three years indicate
                                                                                       Leading companies have implemented integrated ERM
    that increasingly fewer live tests involve testing all production
                                                                                       programs that bring all types of organizational risk under a
    applications and data. Instead, these tests are specific to an
                                                                                       single “risk universe,” regardless of whether a particular
    individual recovery tier (typically Recovery Tier 1 and/or
                                                                                       risk is classified as a security risk, a health and safety risk,
    Recovery Tier 2), or they include a ”blend“ of a subset of
                                                                                       an insurance risk, an environmental management risk or a
    production applications that have related software and data
                                                                                       business continuity risk.
    dependencies. Most companies that have developed business
    continuity programs do perform testing of their business                           Background:
    continuity plans. The majority of these types of tests are simple                  ERM programs have brought key risk issues to the forefront of
    tabletop exercises as it is often deemed unrealistic to do functional              executive awareness. Executive risk
    testing for all the applications and data from a time and resource                 committees come together to review and make business decisions
    perspective. While tabletop exercises are an excellent method                      on all kinds of organizational risk, allowing risks to be better
    to evaluate the completeness of a newly developed business                         prioritized from an enterprise perspective and managed according
    continuity plan, they generally do not provide a high level of                     to their level of impact. In most cases, business continuity is always
    confidence that an organization could actually recover from                         a top-10 risk within those companies that have implemented such
    a real disaster. No actual capability is demonstrated through                      programs and has attained better visibility in the organization.
    tabletop exercises.
                                                                                 9. Solicit support from the Board of Directors and the
7. Adapt crisis management and communications                                       Audit Committee
   strategies
                                                                                       It is much more common for companies to develop and implement
    The premise regarding communication during a crisis is                             company-wide business continuity management programs
    still the same: it is important for companies to be proactive                      when there is pressure from the Board or Audit Committee.
    and transparent with their communications. And likewise,
                                                                                       Background
    customers’ and stakeholders’ expectations remain the same:
                                                                                       Members of both the Board and the Audit Committee want to
    they want to know that the companies are taking ownership
                                                                                       make sure that their organization has thought through the risks
    and accountability and that there is a resolution plan to get
                                                                                       and impacts of the operations and has made sound business
    the services stabilized and restored. What has changed is
                                                                                       decisions on the type of strategies they have in place to protect
    the approach to disseminating this information, which can
                                                                                       the critical processes and assets.
    reduce the negative impacts to brand image and customer
    satisfaction during a disaster. As companies begin to
    understand the evolution of mass communication, they adapt                   10. Seek certification and achieve regulatory compliance
    their crisis communication strategies to leverage the various                      The variety of certifications and regulatory compliance
    media outlets to their advantage. This way, they are able                          approvals related to business continuity does two things:
    to manage their messaging in a timely manner and prevent                           allows companies to better market their business continuity
    incorrect information from spreading.                                              prowess and maturity to customers and prospects; and allows
    Background                                                                         them to better differentiate themselves in a competitive
    The media landscape is evolving. With a growing internet user                      market.
    base combined with advances in connected devices, compounded                       Background
    by the viral nature of social media, information is more easily                    In addition to the business continuity certification process using
    accessible to broader audiences now than ever before. From a                       the BS25999 standard, there is also a Service Organization
    crisis management perspective, these technological advances                        Controls standard from the American Institute of Certified
    present new and complex challenges for managing the flow of                         Public Accountants (AICPA) that will replace the SAS 70 report —
    information during a crisis. Corporate public relations strategies                 now called the ISAE 3402 — for third-party servicers. These reports
    once considered “rule of thumb” for responding to crises may                       are intended to meet the needs of a broad range of users that
    now potentially do more harm than good.                                            need to understand internal controls at a service organization.
                                                                                       With respect to management’s need to understand security,
                                                                                       availability, processing integrity, confidentiality and privacy at
                                                                                       a service organization, the new “SOC 2 report” would contain
                                                                                       detailed security and business continuity assessment findings
                                                                                       for the use of clients of third-party servicers. These findings
                                                                                       may not have appeared within an issued ISAE 3402 report.


8                                                  Insights on IT risk | August 2011
Conclusion
The current business continuity industry landscape dictates that
senior executives address business continuity planning with
renewed vigor. Whether this is fueled by the prevention of high-
profile events; the desire to remain competitive within the business
landscape; or the natural course of the program as it matures, the
C-suite requires that the legacy BCM principles be adapted to align
with the increasing complexity of today’s environment.

The growth in interest around BCM has yielded insight for those
looking to justify investment in it. This is a way of both safeguarding
a company’s future and providing critical success factors in helping
companies secure the output they desire.


         Why invest in effective BCM                   Critical BCM success factors



  Increased pressure to perform and the           Gain executive sponsorship to drive
  global economic uncertainty are pushing         the policies and framework, and secure
  pragmatic business requirements that            certification and compliance
  increasingly require more complex
  business continuity strategies and
  processes
  Globalization is requiring that business        Establish a consistent process to conduct
  continuity programs be holistic in              BIAs, risk assessments and other
  implementation and encompass all                resiliency assessments — both strategic
  aspects of the global organization              and operational — to help build the
  within a single consistent enterprise-          business case for investments around
  wide framework                                  business continuity and disaster recovery
                                                  options

  Increasingly, maximum support from top          Conduct more comprehensive testing
  executives and members of the C-suite           activities that integrate the dependencies
  requires the business continuity program’s      to validate the recovery strategies and
  strategy to be aligned with the company’s       increase awareness within the
  objectives                                      recovery teams


  The needs of a variety of stakeholders —        Leverage new technologies (e.g., cloud
  customers, regulators, suppliers and            computing, virtualization, tools, as well as
  employees — need to be considered when          social media tools) in designing business
  developing a business continuity plan           continuity/disaster recovery strategies
                                                  and response procedures




Insights on IT risk | August 2011                                                                9
Ernst & Young

Assurance | Tax | Transactions | Advisory


About Ernst & Young
Ernst & Young is a global leader in assurance, tax,
transaction and advisory services. Worldwide,                        IT Risk Management at Ernst & Young
our 141,000 people are united by our shared
values and an unwavering commitment to quality.                      At Ernst & Young, our services focus on our individual clients’ specific business needs
We make a difference by helping our people,                          and issues because we recognize that each is unique to that business.
our clients and our wider communities achieve
their potential.                                                     IT is a key to allowing modern organizations to compete. It offers the opportunity to become closer
                                                                     to customers and more focused and faster in responses, and can redefine both the effectiveness
Ernst & Young refers to the global organization                      and efficiency of operations. But as opportunity grows, so does risk. Effective IT risk management
of member firms of Ernst & Young Global                              helps you to improve the competitive advantage of your IT operations, by making these operations
Limited, each of which is a separate legal entity.                   more cost efficient and managing down the risks related to running your systems. Our 6,000 IT
Ernst & Young Global Limited, a UK company                           risk professionals draw on extensive personal experience to give you fresh perspectives and open,
limited by guarantee, does not provide services                      objective advice — wherever you are in the world. We work with you to develop an integrated,
to clients. For more information about our                           holistic approach to your IT risk or to deal with a specific risk and information security issue.
organization, please visit www.ey.com.                               We understand that to achieve your potential you need tailored services as much as consistent
                                                                     methodologies. We work to give you the benefit of our broad sector experience, our deep
About Ernst & Young’s Advisory Services                              subject-matter knowledge and the latest insights from our work worldwide. It’s how
The relationship between risk and performance                        Ernst & Young makes a difference.
improvement is an increasingly complex and
central business challenge, with business                            For more information on how we can make a difference in your organization, contact your local
performance directly connected to the                                Ernst & Young professional or a member of our team listed below.
recognition and effective management of risk.
Whether your focus is on business transformation
or sustaining achievement, having the right                          Contacts
advisors on your side can make all the difference.
Our 20,000 Advisory professionals form one                            Global
of the broadest global advisory networks
                                                                      Norman Lonergan                         +44 20 7980 0596       norman.lonergan@uk.ey.com
of any professional organization, delivering
                                                                      (Advisory Services Leader, London)
seasoned multidisciplinary teams that work with
our clients to deliver a powerful and superior                        Paul van Kessel                         +31 88 40 71271        paul.van.kessel@nl.ey.com
client experience. We use proven, integrated                          (IT Risk and Assurance
methodologies to help you achieve your strategic                      Services Leader, Amsterdam)
priorities and make improvements that are
sustainable for the longer term. We understand                        Advisory Services
that to achieve your potential as an organization
                                                                      Robert Patton                           +1 404 817 5579        robert.patton@ey.com
you require services that respond to your specific
                                                                      (Americas Leader, Atlanta)
issues, so we bring our broad sector experience
and deep subject-matter knowledge to bear in                          Andrew Embury                           +44 20 7951 1802       aembury@uk.ey.com
a proactive and objective way. Above all, we are                      (Europe, Middle East, India and
committed to measuring the gains and identifying                      Africa Leader, London)
where the strategy is delivering the value your                       Doug Simpson                            +61 2 9248 4923        doug.simpson@au.ey.com
business needs. It’s how Ernst & Young makes                          (Asia-Pacific Leader, Sydney)
a difference.
                                                                      Naoki Matsumura                         +81 3 3503 1100        matsumura-nk@shinnihon.or.jp
© 2011 EYGM Limited.                                                  (Japan Leader, Tokyo)
All Rights Reserved.
                                                                      IT Risk and Assurance Services
EYG no. AU0924
                                                                      Bernie Wedge                            +1 404 817 5120        bernard.wedge@ey.com
          In line with Ernst & Young’s commitment to minimize         (Americas Leader, Atlanta)
          its impact on the environment, this document has
          been printed on paper with a high recycled content.
                                                                      Manuel Giralt Herrero                   +34 91572747           manuel.giraltherrero@es.ey.com
                                                                      (Europe, Middle East, India and
This publication contains information in summary form and is          Africa Leader, Madrid)
therefore intended for general guidance only. It is not intended
to be a substitute for detailed research or the exercise of
                                                                      Troy Kelly                              +85 2 2629 3238        troy.kelly@hk.ey.com
professional judgment. Neither EYGM Limited nor any other             (Asia Pacific Leader, Hong Kong)
member of the global Ernst & Young organization can accept
any responsibility for loss occasioned to any person acting           Giovanni Stagno                         +81 3 3506 2411        stagno-gvnn@shinnihon.or.jp
or refraining from action as a result of any material in this         (Japan Leader, Chiyoda-ku)
publication. On any specific matter, reference should be made
to the appropriate advisor. The opinions of third parties set out
in this publication are not necessarily the opinions of the global
Ernst & Young organization or its member firms. Moreover, they
should be viewed in the context of the time they were expressed.

www.ey.com

More Related Content

What's hot

Tutorial joaopascoalfaria-2confcmmiportugal-v1-3-split
Tutorial joaopascoalfaria-2confcmmiportugal-v1-3-splitTutorial joaopascoalfaria-2confcmmiportugal-v1-3-split
Tutorial joaopascoalfaria-2confcmmiportugal-v1-3-splitisabelmargarido
 
Information Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelKoen Maris
 
Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Erik Ginalick
 
Symantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
Process Safety Blind Spots: EXPOSED [Infographic]
Process Safety Blind Spots: EXPOSED [Infographic]Process Safety Blind Spots: EXPOSED [Infographic]
Process Safety Blind Spots: EXPOSED [Infographic]Darwin Jayson Mariano
 
Attackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the EquilibriumAttackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the EquilibriumRadware
 
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...Energy Network marcus evans
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionRamón Gómez de Olea y Bustinza
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...GFI Software
 
Taming the data demons: leveraging information in the age of risk white paper
Taming the data demons: leveraging information in the age of risk white paperTaming the data demons: leveraging information in the age of risk white paper
Taming the data demons: leveraging information in the age of risk white paperIBM India Smarter Computing
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic ManagementMarcelo Martins
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity ModelCSCJournals
 
Information security governance
Information security governanceInformation security governance
Information security governanceKoen Maris
 

What's hot (20)

csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
Tutorial joaopascoalfaria-2confcmmiportugal-v1-3-split
Tutorial joaopascoalfaria-2confcmmiportugal-v1-3-splitTutorial joaopascoalfaria-2confcmmiportugal-v1-3-split
Tutorial joaopascoalfaria-2confcmmiportugal-v1-3-split
 
Information Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive Level
 
Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366
 
Symantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery Study
 
Convergence of Security Risks
Convergence of Security RisksConvergence of Security Risks
Convergence of Security Risks
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Security Feature Cover Story
Security Feature Cover StorySecurity Feature Cover Story
Security Feature Cover Story
 
Process Safety Blind Spots: EXPOSED [Infographic]
Process Safety Blind Spots: EXPOSED [Infographic]Process Safety Blind Spots: EXPOSED [Infographic]
Process Safety Blind Spots: EXPOSED [Infographic]
 
Attackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the EquilibriumAttackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the Equilibrium
 
7350_RiskWatch-Summer2015-Maligec
7350_RiskWatch-Summer2015-Maligec7350_RiskWatch-Summer2015-Maligec
7350_RiskWatch-Summer2015-Maligec
 
The software-security-risk-report
The software-security-risk-reportThe software-security-risk-report
The software-security-risk-report
 
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
 
Taming the data demons: leveraging information in the age of risk white paper
Taming the data demons: leveraging information in the age of risk white paperTaming the data demons: leveraging information in the age of risk white paper
Taming the data demons: leveraging information in the age of risk white paper
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic Management
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
 
Information security governance
Information security governanceInformation security governance
Information security governance
 

Viewers also liked

Insights on it risks cyber attacks
Insights on it risks cyber attacksInsights on it risks cyber attacks
Insights on it risks cyber attacksVladimir Matviychuk
 
Роль ИТ в выявлении и предотвращении мошенничества на предприятии
Роль ИТ в выявлении и предотвращении мошенничества на предприятииРоль ИТ в выявлении и предотвращении мошенничества на предприятии
Роль ИТ в выявлении и предотвращении мошенничества на предприятииVladimir Matviychuk
 
Building control efficiency: Rationalization, optimization and redesign
Building control efficiency: Rationalization, optimization and redesign Building control efficiency: Rationalization, optimization and redesign
Building control efficiency: Rationalization, optimization and redesign Vladimir Matviychuk
 
Thinking outside the box survey questions
Thinking outside the box survey questions Thinking outside the box survey questions
Thinking outside the box survey questions Vladimir Matviychuk
 
Insights on it risks evolving it landscape
Insights on it risks evolving it landscapeInsights on it risks evolving it landscape
Insights on it risks evolving it landscapeVladimir Matviychuk
 
Управление рисками - серебряная пуля или данность моды?
Управление рисками - серебряная пуля или данность моды?Управление рисками - серебряная пуля или данность моды?
Управление рисками - серебряная пуля или данность моды?Vladimir Matviychuk
 

Viewers also liked (9)

Insights on it risks cyber attacks
Insights on it risks cyber attacksInsights on it risks cyber attacks
Insights on it risks cyber attacks
 
Роль ИТ в выявлении и предотвращении мошенничества на предприятии
Роль ИТ в выявлении и предотвращении мошенничества на предприятииРоль ИТ в выявлении и предотвращении мошенничества на предприятии
Роль ИТ в выявлении и предотвращении мошенничества на предприятии
 
Building control efficiency: Rationalization, optimization and redesign
Building control efficiency: Rationalization, optimization and redesign Building control efficiency: Rationalization, optimization and redesign
Building control efficiency: Rationalization, optimization and redesign
 
2010 BCM & Risk brochure
2010 BCM & Risk brochure2010 BCM & Risk brochure
2010 BCM & Risk brochure
 
дети в интернете
дети в интернетедети в интернете
дети в интернете
 
Thinking outside the box (SOX)
Thinking outside the box (SOX)Thinking outside the box (SOX)
Thinking outside the box (SOX)
 
Thinking outside the box survey questions
Thinking outside the box survey questions Thinking outside the box survey questions
Thinking outside the box survey questions
 
Insights on it risks evolving it landscape
Insights on it risks evolving it landscapeInsights on it risks evolving it landscape
Insights on it risks evolving it landscape
 
Управление рисками - серебряная пуля или данность моды?
Управление рисками - серебряная пуля или данность моды?Управление рисками - серебряная пуля или данность моды?
Управление рисками - серебряная пуля или данность моды?
 

Similar to Insights on it risk bcm

Microsoft Power Point Information Security And Risk Managementv2
Microsoft Power Point   Information Security And Risk Managementv2Microsoft Power Point   Information Security And Risk Managementv2
Microsoft Power Point Information Security And Risk Managementv2Graeme Payne
 
Enabling Embedded Business Continuity
Enabling Embedded Business ContinuityEnabling Embedded Business Continuity
Enabling Embedded Business ContinuityMustafa KILIC
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesJorge Sebastiao
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012Lumension
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0isc2-hellenic
 
Symantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec
 
Data growth-protection-trends-research-results
Data growth-protection-trends-research-resultsData growth-protection-trends-research-results
Data growth-protection-trends-research-resultsAccenture
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Emily Brady
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
FIS Profile Summary V7.3
FIS Profile Summary V7.3FIS Profile Summary V7.3
FIS Profile Summary V7.3Jorge Sebastiao
 

Similar to Insights on it risk bcm (20)

Microsoft Power Point Information Security And Risk Managementv2
Microsoft Power Point   Information Security And Risk Managementv2Microsoft Power Point   Information Security And Risk Managementv2
Microsoft Power Point Information Security And Risk Managementv2
 
Enabling Embedded Business Continuity
Enabling Embedded Business ContinuityEnabling Embedded Business Continuity
Enabling Embedded Business Continuity
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed Services
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
Resilience in the Cyber Era
Resilience in the Cyber EraResilience in the Cyber Era
Resilience in the Cyber Era
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0
 
Symantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global Results
 
Data growth-protection-trends-research-results
Data growth-protection-trends-research-resultsData growth-protection-trends-research-results
Data growth-protection-trends-research-results
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Handling risk
Handling riskHandling risk
Handling risk
 
Forrester Infographic
Forrester Infographic Forrester Infographic
Forrester Infographic
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
FIS Profile Summary V7.3
FIS Profile Summary V7.3FIS Profile Summary V7.3
FIS Profile Summary V7.3
 
Unlocking High Fidelity Security
Unlocking High Fidelity SecurityUnlocking High Fidelity Security
Unlocking High Fidelity Security
 

More from Vladimir Matviychuk (11)

Privacy trends 2011
Privacy trends 2011Privacy trends 2011
Privacy trends 2011
 
2010 giss results_global and ua_2010
2010 giss results_global and ua_20102010 giss results_global and ua_2010
2010 giss results_global and ua_2010
 
Effective risk management
Effective risk managementEffective risk management
Effective risk management
 
как составить грамотный Slа
как составить грамотный Slакак составить грамотный Slа
как составить грамотный Slа
 
BCP intro
BCP introBCP intro
BCP intro
 
2010 GISS EY
2010 GISS EY2010 GISS EY
2010 GISS EY
 
Continious auditing
Continious auditingContinious auditing
Continious auditing
 
Security certification overview
Security certification overviewSecurity certification overview
Security certification overview
 
Legalcamp 2.0
Legalcamp 2.0Legalcamp 2.0
Legalcamp 2.0
 
Security Innovation Forum
Security Innovation ForumSecurity Innovation Forum
Security Innovation Forum
 
Yalta_10 _ey-cio_forum
Yalta_10 _ey-cio_forumYalta_10 _ey-cio_forum
Yalta_10 _ey-cio_forum
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Insights on it risk bcm

  • 1. Insights on IT risk Business briefing August 2011 Business continuity management Current trends
  • 2.
  • 3. Introduction Floods, fires, hurricanes, explosions, earthquakes, pandemics, cyber attacks and even terrorist attacks can cause data to be lost, websites to go down, servers to fail and employees to lose communication with one another. Not being able to give or get necessary resources — data, raw materials, personnel, finished products, and so much more — for any length of time can be devastating. Such inactivity and non-availability can handicap a company for months, reducing income and affecting precious market share. Margins for error in the current economic environment have narrowed, leaving little or no room for mistakes. As organizations grow in size and complexity within the world of the “extended enterprise,” the impact of non-availability of any resources has magnified. High-profile events caused by natural disasters and technology infrastructure failures have increased awareness of the need to develop, maintain and sustain business continuity programs. Although these large-scale events — such as the Japanese earthquake and tsunami — dramatically challenge the existence of some companies, there are smaller, less impactful but more frequent disruptions that cause many executives to question their organization’s ability to react and recover. These big disasters, as well as the smaller disruptions, have prompted leading executives to hope for the best but prepare for the worst by investing in effective business continuity management (BCM). Insights on IT risk | August 2011 1
  • 4. Recognizing the importance of BCM Effective BCM is rising in importance on the corporate agenda. Volatile Ernst & Young’s 2010 Global Information Security Survey affirmed global economies have shrunk margins for error. Companies that that BCM is viewed as the “most” important security risk, according previously would have survived a significant disaster or disruption to 1,598 survey respondents. may now find the same event pushing their corporate existence to the brink. Executives are realizing that effective BCM may be the only buffer between a small disruption and bankruptcy. Business continuity/disaster recovery plans and capabilities 28% 11% 9% 7% 7% Compliance with regulatory requirements 16% 12% 9% 5% 4% Data leakage/data loss prevention technologies and processes 10% 12% 10% 7% 5% Inf ormation security risk management 8% 9% 10% 9% 9% Compliance with corporate policies 7% 10% 7% 6% 5% Identity and access management technologies and processes 7% 10% 8% 8% 7% Implementing security standards 5% 5% 4% 4% 5% Protecting personal inf ormation 4% 5% 6% 5% 5% Security awareness and training 3% 4% 7% 9% 11% Protecting proprietary inf ormation 3% 4% 5% 5% 3% Vulnerability management technologies and processes 2% 3% 4% 5% 5% Security testing 1% 3% 4% 6% 7% Securing new technologies 2% 3% 3% 6% 7% Incident response plans and capabilities 1% 3% 4% 5% 5% Secure development processes 12% 4% 4% 3% Security metrics and reporting 11 3% 4% 6% Outsourcing security f unctions 111 1 2% Forensics/f raud support 11 2 2 1 Recruiting security resources 11111 First priority Second priority Third priority Fourth priority Fifth priority 2 Insights on IT risk | August 2011
  • 5. Additionally, half of the respondents indicated that they were A 2011 Forrester survey, “Global IT Budgets, Priorities, And Emerging intending to increase their spending on business continuity. This is Technology Tracking,” indicated that for 1,000 respondents, the a further indication that most organizations are not as advanced as average IT investment in business continuity and disaster recovery they would like to be this arena. was 6% of the annual budget. While this percentage was considerably lower than within other categories of IT spend, it nonetheless demonstrates that BCM is a significant element of an IT program. Data leakage/data loss prevention technologies and processes 50% 46% 4% Business continuity/disaster recovery plans and capabilities 50% 45% 5% Identity and access management 48% 45% 7% technologies and processes Securing new technologies 44% 50% 6% Security awareness and training 42% 53% 5% Compliance with regulatory requirements 41% 55% 4% Information security risk management 41% 55% 4% Security testing 36% 58% 6% Protecting personal information 34% 61% 5% Vulnerability management technologies and processes 33% 63% 4% Protecting proprietary information 32% 64% 4% Security metrics and reporting 32% 64% 4% Implementing security standards 30% 61% 9% Secure development processes 30% 63% 7% Compliance with corporate policies 28% 67% 5% Incident response plans and capabilities 26% 68% 6% Recruiting security resources 22% 63% 15% Forensics/fraud support 18% 74% 8% Outsourcing security functions 17% 64% 19% Spend more Same or constant Spend less Insights on IT risk | August 2011 3
  • 6. Business continuity: pressure to improve resilience The increased focus on BCM is being driven by three main factors: Business continuity management continues to rise up the corporate agenda 1. Strategic business reasons Pressure to improve 3. Current business landscape Competitive edge performance, resiliency Increased complexity Resiliency of business and information technology and sustainability The increased adoption of new technologies such processes provides a competitive edge. Companies in the wake of a as mobile computing, cloud computing and social want to conduct their own internal capability media into regular business streams have also assessments, and also want to understand where disaster, loss of introduced new risks to the business operations, their competition might rank. In the event of a supplier or service which — paired with a service interruption or disaster, a well-prepared company can show delivery interruption disaster — would be signi cant. customers and the world it has prepared adequately, thereby strengthening its brand and marketplace credibility. Push for shorter recovery times Raised expectations on business performance and demand for availability of service has led to Systemic risk 2. Compliance- and pressure to shorten recovery time for critical Supply chain managers used to look only for low- cost suppliers. But that model is changing fast as regulatory-related reasons processes, people, technology and data. These rising expectations are propelled by technology companies seek resiliency, disaster preparedness, Increased regulation improvements that have reduced data storage and redundant multi-geographical suppliers. costs and improved simple data recovery strategies. Widespread concern over the role of regulators in the recent global downturn have prompted Economic conditions legislators and regulators around the world to Global impact of disasters more actively seek new and more strident The challenging economic climate has increased a regulations designed to help prevent similar Increasing globalization means that a disaster in one general sense of vulnerability with a resulting problems in the future. Countries have pursued part of the world rarely occurs without impacting increase in business continuity budgets. With more robust regulations such as consent almost every other part. As understanding and margins thinner and markets shaky, companies feel decrees, business continuity program audits, acceptance of globalization spreads, so does the closer to peril, prompting them to believe that the and even corporate “living wills” designed to expectation that companies will make corresponding risk posed by a disaster could be more signi cant limit the risk to surrounding industries should efforts to prepare for any complications that might to the bottom line and ultimately their survival. that company fail. arise from it. These factors create pressure to improve performance, resiliency and sustainability after a disaster or service delivery interruption. 4 Insights on IT risk | August 2011
  • 7. Japan and beyond: local disaster, global impact A total of 385 disasters killed more than 297,000 people worldwide in 2010, affected more than 217 million others and caused US$123.9 billion in direct economic damage, according to the Centre of Research on the Epidemiology of Disasters. These damage estimates do not include secondary damages or impacts caused by loss of revenue through lack of supplies or suppliers. So, while many disasters are local in nature, the operational impacts can be felt worldwide. For example, an analysis by Dun & Bradstreet showed that the catastrophic Japanese earthquake and tsunami has the potential to impact 86,418 businesses, 311,934 employees and $209 billion in sales volume. Based on the Japanese suppliers that the business and credit information firm monitors for its US customers, the top 10 Japanese supplier industry categories that can potentially be impacted include manufacturing durable, services, computer services, wholesale durable and manufacturing non- durable. The industries most likely to be impacted include electronics (Japan produces 40% of the global electronic component supply), automotive and certain textiles. As a result, thousands of businesses and industries — many of which are located around the world and were not directly impacted by the catastrophe but rely on suppliers and buyers that were — will be severely affected. Many of them were left desperately scrambling to find new suppliers, ensure IT system integrity and get data back up and online. Several automakers and their suppliers impacted by the earthquake and tsunami suffered lower earnings as a result of the catastrophe. A high cost: disasters in 2010 700 450 421 432 Victims (in millions)* 413 414 No. of reported disasters 385 400 600 350 Number of reported victims (in millions)* 354 343 500 Number of reported disasters 350 278 259 400 250 227 200 300 150 200 100 100 50 0 0 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 * Victims: sum of killed and total affected Source: Centre of Research on the Epidemiology of Disasters Insights on IT risk | August 2011 5
  • 8. Leading trends: making good from bad Disasters do not have to be large in scale to capture world attention Background or cause severe business damage. A flood at a key overseas In recent years, both the enterprise risk environment and distribution center may hardly make headlines back home, but it enterprise BCM measures have evolved considerably. As all risks might cripple critical supply chains if no quick alternative exists. are converging, enterprise risk management (ERM) consolidates A now-common denial-of-service attack can bring down a popular, previously siloed risk management efforts within a single, high-volume website, frustrating consumers, potentially jeopardizing centralized governance structure. BCM, which has evolved from data security and quickly eroding an otherwise strong brand. The backup and disaster recovery efforts, now incorporates a wide collapse of a regional stock exchange can panic investors, shrink variety of risk areas within the business and IT. Bringing BCM capital availability for months and put construction and expansion under ERM is becoming increasingly important as the business plans on hold for years. and regulatory compliance environment forces the development of a consolidated view of risk. The emerging trends suggest that In today’s environment, companies want to secure a level of confidence the global BCM executive leader should report to ERM under the such that they can effectively manage an emergency situation chief risk officer (CRO). to both protect life and prevent an escalation of the situation. Management seeks confirmation that it has the ability to detect and Companies lacking centralized direction often develop BCM swiftly address issues as an effort to change the course of a crisis, processes, protocols and plans that are fragmented in nature, or at least minimize its overall impact. do not synchronize with each other, and do not share a common taxonomy or event classification. This type of fragmentation is Leading companies want to invest in BCM programs by moving their very disruptive in a global disaster, and divisions that developed approach from reactive and tactical to proactive and strategic. They their processes in a silo may have difficulties getting what they want the ability to prepare for events before adverse effects occur. need from corporate in a disaster. A consistent framework Many of these leading companies have deployed leading practices spanning different geographical BCPs allows them to be better to maximize the chances of success in the wake of a disaster or synchronized with each other if there is an actual event that disruption including: forces them to be activated. 1. Implement a BCM governance model and an 2. Integrate business impact analysis (BIA) and enterprise BCM framework risk assessment BCM programs should be based upon a clearly defined BIAs and risk assessments are two long-standing components governance model, supported by a single, common framework of any business continuity standard and methodology. They that defines a methodology, a set of policies and roles. The remain two of the most critical inputs toward any BCM program, overall BCM governance focuses on: how the BCM program as major strategy and funding decisions will be made based on should be operationalized within the business and IT by setting their results and how critical they are to the enterprise. well-defined policies and principles; who makes what decisions by defining roles and responsibilities for clear accountability; Background and what mechanisms are in place to ensure that decisions More than just an understanding of threats and risks, a risk are made, acted upon and complied with in relation to the assessment also includes determining whether mitigation company’s overall direction. The BCM governance should measures can cost-effectively be implemented to lower the steer and respond to decision requests that emerge from probability of the risk’s occurrence or lessen its impact. By the business continuity assessment process whereby senior looking at the BIA results and risk assessment results in a single management can make informed decisions in order to reduce view, management can gain a firmer understanding of where enterprise risk. the most critical business functions reside and can apply a comparative risk rating to a particular site. By integrating the BIA and risk assessment results in this way, management will be able to make more informed business decisions on how to better allocate funds to reduce risks and determine which risks it is willing to assume. 6 Insights on IT risk | August 2011
  • 9. 3. Leverage emerging technologies such as cloud distributed (geographical or regional-based), but capable of being computing and virtualization managed as if it were a single consolidated entity. In this case, service resiliency must become a key component of system design Disaster recovery as a service (DRaaS) provides several levels (applications and infrastructure) to support disaster recovery of protection to help companies recover from downtime in a based on geographical intelligence and automatic distribution. potentially more cost-effective and timely manner. Workload can be replicated from virtual or physical environments to 5. Understand the true application dependency for high-availability cloud infrastructure and then hosted in standby recovery assurance mode. Also, the cloud approach can provide companies the ability to replicate across multiple storage platforms to a cloud It is essential to completely understand cross-application, infrastructure or elsewhere. Systems (e.g., VMware) can be data and underlying infrastructure dependency relationships registered on the cloud in standby mode — ready to activate for both disaster recovery planning and as a quality assurance and keep the business up and running should the need arise. validation that dependent parts have been identified for recovery. This becomes especially critical if an operation is Background planning to implement (or has already implemented) one or Although disaster recovery outsourcing and managed services more application services based on service-oriented architecture are to some extent mature, the cloud adoption trends are (SOA), or whose application services are multisourced. clearly amplified by the recent financial crisis, relying upon key elements such as elastic and scalable capabilities, self-service Background and ease of provisioning; consumption-based pricing; shared There is a perception that a few selective applications in recovery and optimized infrastructure; and the ability to be virtualized and testing are needed to ensure that the right applications are and dynamic. Many of our global clients are monitoring the recovered at the right time and in the right order. Many enterprises cloud market and approaching cloud services with caution and service provider operations have found this simplistic view while adopting a mix of in-house and managed disaster to be inadequate. Many applications and services have complex, recovery services with some well-proven DRaaS based on the meshed relationships and dependencies on other applications, application’s criticality, recovery objectives, suitability and cost infrastructure services (e.g., network, active directory) and data, of service. This trend is known as a hybrid disaster recovery some of which may be currently defined as being part of a lower sourcing approach. recovery tier or assumed to be highly available and recoverable (e.g., network). 4. Build for a resilient environment vs. a reactive recovery 6. Increase the complexity of testing Most companies are looking to enhance their ability to rapidly adapt and respond to business disruptions and to maintain Leading practice organizations are including more complex continuous business operations, be a more trusted partner and integrated exercises in their annual test plan. While most do enable growth. However, many companies have delayed not advocate a “pull the plug” scenario yet, integrated testing investing in or updating their disaster recovery infrastructure between business units and IT is the right way to truly develop and plans due to the lack of funding for disaster recovery over confidence in an organization’s capability to recover. In these the past five years. Companies should focus 70% to 80% of scenarios, the business units may actually deploy to their their disaster recovery spending on supporting the realization alternate site and use their IT workaround procedures during of the recovery time objective (RTO) and recovery point the period that the IT systems are being recovered. This type objective (RPO) targets for the top 20% to 30% mission-critical of testing will prove the viability of the alternate site, the applications. viability of the workaround procedures and that the IT systems that the business unit needs can be recovered within its stated Background RTO. All of these measures will start to establish a validated For these companies, infrastructure diversification is one key to recovery time capability (RTC) for an organization, while enhance their business resiliency without the cost and complexity the best tabletop testing can only provide a recovery time associated with traditional high-availability clusters and fault- estimate (RTE). tolerant systems. This approach is achievable by creating an operational infrastructure beyond active/standby that is physically Insights on IT risk | August 2011 7
  • 10. Background 8. Exercise an integrated ERM program Recent Gartner studies from the past three years indicate Leading companies have implemented integrated ERM that increasingly fewer live tests involve testing all production programs that bring all types of organizational risk under a applications and data. Instead, these tests are specific to an single “risk universe,” regardless of whether a particular individual recovery tier (typically Recovery Tier 1 and/or risk is classified as a security risk, a health and safety risk, Recovery Tier 2), or they include a ”blend“ of a subset of an insurance risk, an environmental management risk or a production applications that have related software and data business continuity risk. dependencies. Most companies that have developed business continuity programs do perform testing of their business Background: continuity plans. The majority of these types of tests are simple ERM programs have brought key risk issues to the forefront of tabletop exercises as it is often deemed unrealistic to do functional executive awareness. Executive risk testing for all the applications and data from a time and resource committees come together to review and make business decisions perspective. While tabletop exercises are an excellent method on all kinds of organizational risk, allowing risks to be better to evaluate the completeness of a newly developed business prioritized from an enterprise perspective and managed according continuity plan, they generally do not provide a high level of to their level of impact. In most cases, business continuity is always confidence that an organization could actually recover from a top-10 risk within those companies that have implemented such a real disaster. No actual capability is demonstrated through programs and has attained better visibility in the organization. tabletop exercises. 9. Solicit support from the Board of Directors and the 7. Adapt crisis management and communications Audit Committee strategies It is much more common for companies to develop and implement The premise regarding communication during a crisis is company-wide business continuity management programs still the same: it is important for companies to be proactive when there is pressure from the Board or Audit Committee. and transparent with their communications. And likewise, Background customers’ and stakeholders’ expectations remain the same: Members of both the Board and the Audit Committee want to they want to know that the companies are taking ownership make sure that their organization has thought through the risks and accountability and that there is a resolution plan to get and impacts of the operations and has made sound business the services stabilized and restored. What has changed is decisions on the type of strategies they have in place to protect the approach to disseminating this information, which can the critical processes and assets. reduce the negative impacts to brand image and customer satisfaction during a disaster. As companies begin to understand the evolution of mass communication, they adapt 10. Seek certification and achieve regulatory compliance their crisis communication strategies to leverage the various The variety of certifications and regulatory compliance media outlets to their advantage. This way, they are able approvals related to business continuity does two things: to manage their messaging in a timely manner and prevent allows companies to better market their business continuity incorrect information from spreading. prowess and maturity to customers and prospects; and allows Background them to better differentiate themselves in a competitive The media landscape is evolving. With a growing internet user market. base combined with advances in connected devices, compounded Background by the viral nature of social media, information is more easily In addition to the business continuity certification process using accessible to broader audiences now than ever before. From a the BS25999 standard, there is also a Service Organization crisis management perspective, these technological advances Controls standard from the American Institute of Certified present new and complex challenges for managing the flow of Public Accountants (AICPA) that will replace the SAS 70 report — information during a crisis. Corporate public relations strategies now called the ISAE 3402 — for third-party servicers. These reports once considered “rule of thumb” for responding to crises may are intended to meet the needs of a broad range of users that now potentially do more harm than good. need to understand internal controls at a service organization. With respect to management’s need to understand security, availability, processing integrity, confidentiality and privacy at a service organization, the new “SOC 2 report” would contain detailed security and business continuity assessment findings for the use of clients of third-party servicers. These findings may not have appeared within an issued ISAE 3402 report. 8 Insights on IT risk | August 2011
  • 11. Conclusion The current business continuity industry landscape dictates that senior executives address business continuity planning with renewed vigor. Whether this is fueled by the prevention of high- profile events; the desire to remain competitive within the business landscape; or the natural course of the program as it matures, the C-suite requires that the legacy BCM principles be adapted to align with the increasing complexity of today’s environment. The growth in interest around BCM has yielded insight for those looking to justify investment in it. This is a way of both safeguarding a company’s future and providing critical success factors in helping companies secure the output they desire. Why invest in effective BCM Critical BCM success factors Increased pressure to perform and the Gain executive sponsorship to drive global economic uncertainty are pushing the policies and framework, and secure pragmatic business requirements that certification and compliance increasingly require more complex business continuity strategies and processes Globalization is requiring that business Establish a consistent process to conduct continuity programs be holistic in BIAs, risk assessments and other implementation and encompass all resiliency assessments — both strategic aspects of the global organization and operational — to help build the within a single consistent enterprise- business case for investments around wide framework business continuity and disaster recovery options Increasingly, maximum support from top Conduct more comprehensive testing executives and members of the C-suite activities that integrate the dependencies requires the business continuity program’s to validate the recovery strategies and strategy to be aligned with the company’s increase awareness within the objectives recovery teams The needs of a variety of stakeholders — Leverage new technologies (e.g., cloud customers, regulators, suppliers and computing, virtualization, tools, as well as employees — need to be considered when social media tools) in designing business developing a business continuity plan continuity/disaster recovery strategies and response procedures Insights on IT risk | August 2011 9
  • 12. Ernst & Young Assurance | Tax | Transactions | Advisory About Ernst & Young Ernst & Young is a global leader in assurance, tax, transaction and advisory services. Worldwide, IT Risk Management at Ernst & Young our 141,000 people are united by our shared values and an unwavering commitment to quality. At Ernst & Young, our services focus on our individual clients’ specific business needs We make a difference by helping our people, and issues because we recognize that each is unique to that business. our clients and our wider communities achieve their potential. IT is a key to allowing modern organizations to compete. It offers the opportunity to become closer to customers and more focused and faster in responses, and can redefine both the effectiveness Ernst & Young refers to the global organization and efficiency of operations. But as opportunity grows, so does risk. Effective IT risk management of member firms of Ernst & Young Global helps you to improve the competitive advantage of your IT operations, by making these operations Limited, each of which is a separate legal entity. more cost efficient and managing down the risks related to running your systems. Our 6,000 IT Ernst & Young Global Limited, a UK company risk professionals draw on extensive personal experience to give you fresh perspectives and open, limited by guarantee, does not provide services objective advice — wherever you are in the world. We work with you to develop an integrated, to clients. For more information about our holistic approach to your IT risk or to deal with a specific risk and information security issue. organization, please visit www.ey.com. We understand that to achieve your potential you need tailored services as much as consistent methodologies. We work to give you the benefit of our broad sector experience, our deep About Ernst & Young’s Advisory Services subject-matter knowledge and the latest insights from our work worldwide. It’s how The relationship between risk and performance Ernst & Young makes a difference. improvement is an increasingly complex and central business challenge, with business For more information on how we can make a difference in your organization, contact your local performance directly connected to the Ernst & Young professional or a member of our team listed below. recognition and effective management of risk. Whether your focus is on business transformation or sustaining achievement, having the right Contacts advisors on your side can make all the difference. Our 20,000 Advisory professionals form one Global of the broadest global advisory networks Norman Lonergan +44 20 7980 0596 norman.lonergan@uk.ey.com of any professional organization, delivering (Advisory Services Leader, London) seasoned multidisciplinary teams that work with our clients to deliver a powerful and superior Paul van Kessel +31 88 40 71271 paul.van.kessel@nl.ey.com client experience. We use proven, integrated (IT Risk and Assurance methodologies to help you achieve your strategic Services Leader, Amsterdam) priorities and make improvements that are sustainable for the longer term. We understand Advisory Services that to achieve your potential as an organization Robert Patton +1 404 817 5579 robert.patton@ey.com you require services that respond to your specific (Americas Leader, Atlanta) issues, so we bring our broad sector experience and deep subject-matter knowledge to bear in Andrew Embury +44 20 7951 1802 aembury@uk.ey.com a proactive and objective way. Above all, we are (Europe, Middle East, India and committed to measuring the gains and identifying Africa Leader, London) where the strategy is delivering the value your Doug Simpson +61 2 9248 4923 doug.simpson@au.ey.com business needs. It’s how Ernst & Young makes (Asia-Pacific Leader, Sydney) a difference. Naoki Matsumura +81 3 3503 1100 matsumura-nk@shinnihon.or.jp © 2011 EYGM Limited. (Japan Leader, Tokyo) All Rights Reserved. IT Risk and Assurance Services EYG no. AU0924 Bernie Wedge +1 404 817 5120 bernard.wedge@ey.com In line with Ernst & Young’s commitment to minimize (Americas Leader, Atlanta) its impact on the environment, this document has been printed on paper with a high recycled content. Manuel Giralt Herrero +34 91572747 manuel.giraltherrero@es.ey.com (Europe, Middle East, India and This publication contains information in summary form and is Africa Leader, Madrid) therefore intended for general guidance only. It is not intended to be a substitute for detailed research or the exercise of Troy Kelly +85 2 2629 3238 troy.kelly@hk.ey.com professional judgment. Neither EYGM Limited nor any other (Asia Pacific Leader, Hong Kong) member of the global Ernst & Young organization can accept any responsibility for loss occasioned to any person acting Giovanni Stagno +81 3 3506 2411 stagno-gvnn@shinnihon.or.jp or refraining from action as a result of any material in this (Japan Leader, Chiyoda-ku) publication. On any specific matter, reference should be made to the appropriate advisor. The opinions of third parties set out in this publication are not necessarily the opinions of the global Ernst & Young organization or its member firms. Moreover, they should be viewed in the context of the time they were expressed. www.ey.com