SlideShare a Scribd company logo
1 of 4
Download to read offline
BUSINESS
                                                     CONTINUITY,
                                                     DISASTER
                                                     RECOVERY
                                                     PLANNING &
                                                     LEADERSHIP

                                                     18 - 21 JUNE 2013                                                                     KEAWAY
                                                     FOUR SEASONS HOTEL                                                      EXCLUSIinE TA fore 12-APRIL-2013
                                                                                                                                    V
                                                                                                                                      gs be
                                                                                                                                  book                      th £75)
IT                                                   JAKARTA                                                       For early bird            bership (wor te
                                                                                                                                Affiliate mem         Institu
                                                                                                                     EE 1 Yeare Business Continuitydetails)
SERIES                                               INDONESIA                                                     FR
                                                                                                                        with th to page 3 for further
                                                                                                                           (** refer




   COURSE OVERVIEW                                                                                           YOUR INTERNATIONAL
   Disasters could cripple your organization, suspending mission-critical processes and
   disrupting service to your customers. These disasters could be man-made or natural
                                                                                                             COURSE FACILITATOR
   in nature.

   The Business Continuity Plan addresses an organization’s ability to continue
                                                                                                                                Dr Mark T. Edmead
   functioning when normal operations are disrupted.                                                                            MBA, CISSP, CISA, CompTIA Security+

   A Disaster Recovery Plan is used to define the resources, action, tasks, and data                                            IT Security
   required to manage the business recovery process in the event of a disaster. In this                                         Consultant & Trainer
   workshop you learn to identify vulnerabilities and implement appropriate                                                     MTE Advisors
   countermeasures to prevent and mitigate threats to your mission-critical processes.
                                                                                                             Mark T. Edmead is a successful technology entrepreneur
   You will learn techniques for creating a business continuity plan (BCP) and the                           with over 28 years of practical experience in computer
                                                                                                             systems architecture, information security, and project
   methodology for building an infrastructure that supports its effective                                    management.
   implementation.
                                                                                                             Mark excels in managing the tight-deadlines and ever
                                                                                                             changing tasks related to mission-critical project
   BENEFITS OF ATTENDING                                                                                     schedules. He has extensive knowledge in IT security, IT
     Using a carefully selected case study, course participants will:                                        and application audits, Internal Audit, IT governance,
                                                                                                             including Sarbanes-Oxley, FDIC/FFIEC, and GLBA
     • Create, document and test continuity arrangements for an organization                                 compliance auditing.
     • Perform a risk assessment and Business Impact Assessment (BIA) to identify                            Mr. Edmead understands all aspects of information
       vulnerabilities                                                                                       security and protection including access controls,
                                                                                                             cryptography, security management practices, network
     • Select and deploy an alternate site for continuity of mission-critical activities                     and Internet security, computer security law and
     • Identify appropriate strategies to recover the infrastructure and processes                           investigations, and physical security.
     • Organize and manage recovery teams                                                                    He has trained Fortune 500 and Fortune 1000 companies
                                                                                                             in the areas of information, system, and Internet security.
     • Test and maintain an effective recovery plan in a rapidly changing technology                         He has worked with many international firms, and has the
       environment                                                                                           unique ability to explain very technical concepts in
                                                                                                             simple-to-understand terms. Mr. Edmead is a sought after
   Sample Case Studies:                                                                                      author and lecturer for information security and
                                                                                                             information technology topics.
  • A major Middle Eastern bank has been experiencing tremendous growth and management feels that            Mark works as an information security and regulatory
   their current BCP and DRP plans outdated. In this case study the delegates with perform a business
                                                                                                             compliance consultant. He has:
   impact analysis, based on interviews with key company stakeholders and subject matter experts, and
   outline which business areas are the most critical and in need of improved continuity and recovery        • Conducted internal IT audits in the areas of critical
   plans.                                                                                                    infrastructure/ systems and applications,

  • A manufacturing company is considering implementing a disaster recovery plan but does not know           • Assessed and tested internal controls of critical
   which disaster recovery approach they should implement. In this case study the delegates with study       infrastructure platform systems (Windows, UNIX, IIS, SQL,
                                                                                                             Oracle)
   the business enterprise, perform a risk analysis, and determine if a hot site, cold site, warm site, or
   another disaster recovery method is the best approach.                                                    • Assessed and tested internal controls of various critical
                                                                                                             financial applications.

   EXCLUSIVE:
            :                  TEMPLATES & TAKEAWAYS                                                         • Prepared risk assessments and determined risks to
                                                                                                             critical financial data systems and infrastructure
                                                                                                             c
                                                                                                             components.
                                                                                                             c
   1. Bring your Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) for
      Bring your Busines Continuity Plan/Disaster Recov
      Bring your Busines Continuity Plan/Disaster Recovery
                        ss
      private consultation review
                        on review                                                                            • Created test plans & processes and executed test plans.
   2. BCP/DRP Step-by-step Guide                                                                             • Conducted reviews of existing systems and
   3. BCP/DRP templates and worksheets to aid you in applying and putting into                               applications, ensuring appropriate security, management
                                                                                                             a
      practice what you have learned from this workshop                                                      and data integrity via control processes.
                                                                                                             a
   4. FREE copy of the course material, case studies, and other related items of the                         • Prepared written reports to all levels of management
      training workshop
                                                                                                             • Participated in audit review panel sessions to address
                                                                                                             results, conclusions and follow-up actions required.
                                                                                                             r

 Tel: +6016 3326360                     Fax: +603 9205 7788                        kris@360bsigroup com
                                                                                   kris@360bsigroup.com                                                                1
COURSE
     CONTENT
DAY1 BUSINESS CONTINUITY
     LEADERSHIP WORKSHOP                                                          WHY THIS EVENT
     IT Leadership Workshop is a special one-day course designed to cover         The aim of this interactive workshop is to provide
     the challenges faced with managing the business continuity efforts in an     you with the skills critical to business continuity,
     organization. Implementing a full business continuity plan and disaster      disaster recovery & risk management.
     recovery plan is a major effort. This requires coordination with all         After attending this workshop, you will leave
     departments. It requires interfacing with individuals at all levels from     fully armed with the knowledge needed to
     technicians and programmers to managers, directors, and C-level              create a business continuity plan (BCP) and the
     executives.                                                                  methodology for building an infrastructure that
                                                                                  supports its effective implementation.
     In this workshop you will learn how perform a stakeholder analysis,          The combination of interactive presentations,
     outline the stakeholders required to accomplish your job, and how to         hands-on exercises and open discussion groups
     effectively navigate the possible roadblocks preventing you from             along with real case studies, ensures you will
     accomplishing your tasks. In addition, you will learn tips and techniques    obtain maximum value from attending.
     that will increase your competence and confidence when influencing
     and implementing information technology in your organization.

     Managing the Business Continuity Process
     - Creating a BCP/DRP framework
     - Determining your critical success factors (CSF)
     - Determining your key performance indicators (KPI)
     - Business continuity management strategies

     Understanding your Corporate Culture
     - Understanding your organization’s trends, strategy and environment
     - Tips, tricks, and trouble spots
     - Developing a business continuity management culture
     - Exercising, maintenance, and audit

     Understanding your Stakeholders
     - How to identify your key stakeholders
     - Performing a stakeholder analysis
     - Creating a stakeholder engagement communication plan
     - Getting stakeholder engagement and support


DAY2 BCP/DRP - CONCEPTS & PRINCIPLES
     Introduction to Business Continuity and Disaster Recovery Planning
     - The difference between business continuity and disaster recovery           WHO SHOULD ATTEND
     - Why a recovery plan is an integral part of an organization’s operational
                                                                                    Vice Presidents, Directors, General Managers
     strategy
     Understanding where the threats come from                                      Chief Information Officers
     - Understanding codes of practice and legal/regulatory compliance              Chief Information Security Officers
     requirements                                                                   Chief Technology Officers
     - The step-by-step process for BCP/DRP                                         Business Continuity Officers
                                                                                    Heads of Departments in Information Security
     Protecting our assets                                                          Management Information Systems, IT
     - What are we protecting?                                                      Infrastructure, IT Architecture, Network
     - What are our mission-critical processes?                                     Operations, IT Operations, IT Data Center,
     - How to prioritize what is important to protect                               DataBase Management, IT Deployment
                                                                                    IT Business Enterprise, IT Risk Management,
     What is risk and how do we deal with it?
     - Understanding risk assessment methodologies                                  IT Quality Assurance, IT Audit, Risk Management,
     - Matching the response to the threat based on the risk                        Internal Audit, Disaster Recovery
     - Enterprise vs. local risk management
     - Top business continuity planning mistakes

     The need for business continuation – a case study
     - Introduction of fictitious business case
     - Understand business continuity/disaster recovery needs
     - Documenting the continuity requirements




                                                                                                                                   2
COURSE
             CONTENT
 DAY3 RISK ASSESSMENT & RECOVERY
             The Business Impact Assessment (BIA)
             - What is a Business Impact Assessment?
             - Assessing the risk to the enterprise                                          Latest TESTIMONIALS
             - How to identify business critical activities
             - Impact versus likelihood of occurrence                                        1   “Session well organized The trainer is ver
                                                                                                               organized.               very
             Establishing the Recovery Options                                                   conversant with the subject matter. Well delivered
             - Choosing a recovery site                                                          and would definitely recommend to anyone else.”
                                                                                                 - Habil Mutende, Manager Information Security & Change
             - Specifying equipment                                                              Management, Central Bank of Kenya
             - Choosing suppliers
             - How to select backup and restore strategies                                   2   “Excellent presentation, excellent attitude to
                                                                                                 answer our questions & to share his experience.”
             Where is the data?                                                                  - Senior Manager, IT Department, Deloitte
             - Why you need to classify levels of information
             - Managing data at rest and in transit                                          3   “I have used Mark in key roles with high visibility
             - Understanding data access controls                                                clients. Without hesitation I would highly
             - The value of knowing where your data resides                                      recommend Mark for any and all IT audit
                                                                                                 engagements. His professionalism, deep
             Maintaining user connectivity                                                       knowledge, and results oriented work style are
             - How to communicate the disaster and recovery efforts to users                     deeply valued by not only myself, but more
             - How to identify and eliminate single points of failure                            importantly by the all those who are lucky enough
             - Communicating with the media                                                      to use his services.” - Russ Aebig, Director at Artesient

                                                                                             4   “We have used Mark Edmead on several projects in
                                                                                                 the past few years including SOX readiness for
 DAY4 PROJECT MANAGEMENT & REVIEW                                                                publicly traded companies and IT vulnerability
             BCP/DRP Project Management                                                          assessments for major financial institutions. He
             - Identifying stakeholders                                                          always delivers professional and detail-oriented
             - Analyzing stakeholder needs                                                       workpapers on-time and within budget. Mark is
             - Obtaining commitment from upper management                                        highly recommended and we will continue to use
                                                                                                 him on other projects.” - Brenda Piazza, Director at CBIZ MHM
             Review of the BCP/DRP Process
             - Project initiation
             - Risk analysis
             - Business Impact analysis
             - Develop/choose strategies
             - Test and validate the plan
             - Modify/update the plan
             - Approve and implement the plan

             Analysis of fictitious business case

             Applying lessons learned




**Affiliate membership to Business Continuity Institute                                      COURSE SCHEDULE
 Affiliate members Business Continuity Institute
 Affiliate members Business Continuity Institute get access the following membership
 Affiliate members to Business Continuity Institute get access to the following membership
                                                        access        following membership   8.00                              Registration & Coffee/Tea
 benefits:                                                                                   8.30                              Workshop commences
 - Continuity magazine – 4 per year (digital version)                                        10.10 - 10.30                     Morning coffee/tea
 - Monthly BCI ENewsletter                                                                   12.00 - 13.00                     Lunch
 - Access to ‘member only’ section of BCI website
                                                                                             14.40 - 15.00                     Afternoon coffee/tea
 - Access to copies of BCI Workshop Reports
 - Member rates on BCI products and services                                                 16.00                             End of day
 - Networking opportunities at BCI organised events
 - Access to BCI mentoring programme
 - Access to discounted events


                                                                                                                                                           3
BUSINESS
CONTINUITY,                                                                                           REGISTRATION FORM
DISASTER
RECOVERY                                                                                              Fax: +603 9205 7788
PLANNING &
LEADERSHIP                                                                                            Tel: +603 9205 7772
                                                                                                      Mobile: +6016 3326 360
18 - 21 JUNE 2013
FOUR SEASONS HOTEL
JAKARTA                                                                                               Email: kris@360bsigroup.com
INDONESIA

 DELEGATES                                                                                                IN-HOUSE TRAINING
 1   Name         :                                                                                       360 BSI is passionate about providing strategic IT programs
                                                                                                          and high potential training solutions across the region to build
     Name on tag :                                                                                        personal competencies and organizational capability.
     Job Title :                                                                                          You will receive practical training from a professionally
                                                                                                          qualified educator with over twenty years of teaching and
     Email        :                                                                                       training experience.
     Mobile       :                                                                                       Please feel free to mix-and-match topics from the areas listed
                                                                                                          below to get the right training content for your staff. Other
 2   Name         :                                                                                       topics may be available upon request.
     Name on tag :
                                                                                                          OTHER RELATED PUBLIC COURSES
     Job Title :
                                                                                                                  IT Strategic Planning
     Email        :                                                                                               Service Oriented Architecture (SOA)
                                                                                                                  IT Risk Management & Leadership
     Mobile       :                                                                                               Preparing for the CISSP exam
                                                                                                                  Cybercrime & Fraud Investigation
 3   Name         :
                                                                                                                  IT Change Management
     Name on tag :                                                                                                IT Project Management
     Job Title :
                                                                                                      Hotel Contact Details:
     Email        :                                                                                   For Room Reservation, please contact Reservation Desk.
                                                                                                      Tel. +62 (21) 252-3456 or Fax. +62 (21) 252-4480
     Mobile       :
                                                                                                      Four Seasons Hotel Jakarta
     AUTHORIZATION                                                                                    Jalan H.R. Rasuna Said, Jakarta 12920, Indonesia
     (This form is invalid without a signature)                                                       General Information:
     Name             :                                                                               1    Closing date for registration is 11th June 2013.
                                                                                                      2    The fees cover lunch, tea breaks, materials and certificate.
     Job Title        :                                                                               3    Official confirmation will be sent, once registration has
     Email            :                                                                                    been received.
                                                                                                      4    Participants will need to arrange their own accommodation.
                                                                                                      5    Attire: Smart Casual
     Tel :            (      )
                                                                                                      Cancellations/Substitutions
     Organization :
                                                                                                      Substitutions are welcome at any time. Please notify us at
     Address :                                                                                        least 2 working days prior to the event. All cancellations will
                                                                                                      carry a 10% cancellation fee, once a registration form is
                                                                                                      received. All cancellations must be in writing by fax or email
                                                                                                      at least 2 weeks before the event date. Cancellations with
                                                                                                      less than 2 weeks prior to the event date carry a 100% liability.
                                                                                                      However, course materials will still be couriered to you.
     Signature :                                              Date:              /         /
                                                                                                      Thank you for your registration!
 FEES                                                                                                 PAYMENT DETAILS
                                                                                                      Payment is required within 5 days upon receipt of
      USD 2,995 per delegate                                                                          the invoice.

      USD 2,795 per delegate - register before 12-APRIL-2013                                          Bank transfer:

      USD 8,085 - Special for Group of 3                                                              360 BSI (M) Sdn Bhd
 The fee does not include any taxes (withholding or otherwise). In case of any taxes applicable
                                                                                                      HSBC Bank Malaysia Berhad
 the client has to ensure that the taxes are paid on top of the investment fee paid for the course.   Bukit Bintang Branch, Kuala Lumpur, Malaysia
 Compliance with the local tax laws is the responsibility of the client.
                                                                                                      Account No: 203-371059-725
                                                                                                      Swift No: HBMBMYKL
 * Save up to 50% for In-house Training program
                                                                                                      All payments must be received prior to the event date

 ©      360 BSI (M) Sdn Bhd (833835-X), Level 8 Pavilion KL, 168 Jalan Bukit Bintang, 55100 Kuala Lumpur, Malaysia.               www.360bsi.com/IT                        4

More Related Content

What's hot

operations strategy_1
operations strategy_1operations strategy_1
operations strategy_1midhunraj007
 
Bill Stankiewicz Copy Of July 31, 2010 Of Voice Of Vics July 2010v3
Bill Stankiewicz Copy Of July 31, 2010 Of Voice Of Vics   July 2010v3Bill Stankiewicz Copy Of July 31, 2010 Of Voice Of Vics   July 2010v3
Bill Stankiewicz Copy Of July 31, 2010 Of Voice Of Vics July 2010v3BillStankiewicz
 
People Strategy-Fundamentals for compiling a People Strategy
People Strategy-Fundamentals for compiling a People StrategyPeople Strategy-Fundamentals for compiling a People Strategy
People Strategy-Fundamentals for compiling a People StrategyCecil van Niekerk
 
Delivering Business Value By Applying Agile Principles To Business Continuity...
Delivering Business Value By Applying Agile Principles To Business Continuity...Delivering Business Value By Applying Agile Principles To Business Continuity...
Delivering Business Value By Applying Agile Principles To Business Continuity...Ken Collins
 
Dynamic potential in disaster exercises: identifcation – development – evalua...
Dynamic potential in disaster exercises: identifcation – development – evalua...Dynamic potential in disaster exercises: identifcation – development – evalua...
Dynamic potential in disaster exercises: identifcation – development – evalua...Global Risk Forum GRFDavos
 
Risk Analysis In Business Continuity Management - Jeremy Wong
Risk Analysis In Business Continuity Management - Jeremy WongRisk Analysis In Business Continuity Management - Jeremy Wong
Risk Analysis In Business Continuity Management - Jeremy WongBCM Institute
 
SRA Benefits 100+ Employees
SRA Benefits 100+ EmployeesSRA Benefits 100+ Employees
SRA Benefits 100+ Employeesrfalke
 
Process Based Risk Management
Process Based Risk ManagementProcess Based Risk Management
Process Based Risk ManagementPéter Fehér
 

What's hot (8)

operations strategy_1
operations strategy_1operations strategy_1
operations strategy_1
 
Bill Stankiewicz Copy Of July 31, 2010 Of Voice Of Vics July 2010v3
Bill Stankiewicz Copy Of July 31, 2010 Of Voice Of Vics   July 2010v3Bill Stankiewicz Copy Of July 31, 2010 Of Voice Of Vics   July 2010v3
Bill Stankiewicz Copy Of July 31, 2010 Of Voice Of Vics July 2010v3
 
People Strategy-Fundamentals for compiling a People Strategy
People Strategy-Fundamentals for compiling a People StrategyPeople Strategy-Fundamentals for compiling a People Strategy
People Strategy-Fundamentals for compiling a People Strategy
 
Delivering Business Value By Applying Agile Principles To Business Continuity...
Delivering Business Value By Applying Agile Principles To Business Continuity...Delivering Business Value By Applying Agile Principles To Business Continuity...
Delivering Business Value By Applying Agile Principles To Business Continuity...
 
Dynamic potential in disaster exercises: identifcation – development – evalua...
Dynamic potential in disaster exercises: identifcation – development – evalua...Dynamic potential in disaster exercises: identifcation – development – evalua...
Dynamic potential in disaster exercises: identifcation – development – evalua...
 
Risk Analysis In Business Continuity Management - Jeremy Wong
Risk Analysis In Business Continuity Management - Jeremy WongRisk Analysis In Business Continuity Management - Jeremy Wong
Risk Analysis In Business Continuity Management - Jeremy Wong
 
SRA Benefits 100+ Employees
SRA Benefits 100+ EmployeesSRA Benefits 100+ Employees
SRA Benefits 100+ Employees
 
Process Based Risk Management
Process Based Risk ManagementProcess Based Risk Management
Process Based Risk Management
 

Similar to Business Continuity, Disaster Recovery Planning & Leadership 18 - 21 June 2013 Jakarta Indonesia

Virtualisation:- Business Continuity Solution or Enabler
Virtualisation:- Business Continuity Solution or EnablerVirtualisation:- Business Continuity Solution or Enabler
Virtualisation:- Business Continuity Solution or Enablersubtitle
 
Gerenciamento e Implementacao de Sistemas ERP Utilizando Softwares Basicos - ...
Gerenciamento e Implementacao de Sistemas ERP Utilizando Softwares Basicos - ...Gerenciamento e Implementacao de Sistemas ERP Utilizando Softwares Basicos - ...
Gerenciamento e Implementacao de Sistemas ERP Utilizando Softwares Basicos - ...Ricardo Viana Vargas
 
Example business continuity plan
Example business continuity planExample business continuity plan
Example business continuity planMicheal Axelsen
 
MEGA Webinar - PwC - Baker/Tong - EA & GRC, Separated at Birth
MEGA Webinar - PwC - Baker/Tong - EA & GRC, Separated at BirthMEGA Webinar - PwC - Baker/Tong - EA & GRC, Separated at Birth
MEGA Webinar - PwC - Baker/Tong - EA & GRC, Separated at BirthDavid Baker
 
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...360 BSI
 
Business Continuity & Disaster Recovery Planning, 23 - 25 February 2016 Kuala...
Business Continuity & Disaster Recovery Planning, 23 - 25 February 2016 Kuala...Business Continuity & Disaster Recovery Planning, 23 - 25 February 2016 Kuala...
Business Continuity & Disaster Recovery Planning, 23 - 25 February 2016 Kuala...360 BSI
 
Internal audit requirement
Internal audit requirementInternal audit requirement
Internal audit requirementabhijitsingh007
 
GROM Overview
GROM OverviewGROM Overview
GROM OverviewTADAM
 
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...360 BSI
 
TOWARDS AN APPROACH FOR INTEGRATING BUSINESS CONTINUITY MANAGEMENT INTO ENTER...
TOWARDS AN APPROACH FOR INTEGRATING BUSINESS CONTINUITY MANAGEMENT INTO ENTER...TOWARDS AN APPROACH FOR INTEGRATING BUSINESS CONTINUITY MANAGEMENT INTO ENTER...
TOWARDS AN APPROACH FOR INTEGRATING BUSINESS CONTINUITY MANAGEMENT INTO ENTER...ijcsit
 
Business Continuity Planning Seminar
Business Continuity Planning SeminarBusiness Continuity Planning Seminar
Business Continuity Planning Seminarcmckinney
 
TOWARDS AN APPROACH FOR INTEGRATING BUSINESS CONTINUITY MANAGEMENT INTO ENTER...
TOWARDS AN APPROACH FOR INTEGRATING BUSINESS CONTINUITY MANAGEMENT INTO ENTER...TOWARDS AN APPROACH FOR INTEGRATING BUSINESS CONTINUITY MANAGEMENT INTO ENTER...
TOWARDS AN APPROACH FOR INTEGRATING BUSINESS CONTINUITY MANAGEMENT INTO ENTER...AIRCC Publishing Corporation
 
Risk Management
Risk ManagementRisk Management
Risk Managementrobertgk00
 
Development impacts presentation for 2013 AOG conference
Development impacts presentation for 2013 AOG conferenceDevelopment impacts presentation for 2013 AOG conference
Development impacts presentation for 2013 AOG conferenceDevImp3
 
IDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk ManagementIDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk ManagementFindWhitePapers
 
A method to_define_an_enterprise_architecture_using_the_zachman_framework
A method to_define_an_enterprise_architecture_using_the_zachman_frameworkA method to_define_an_enterprise_architecture_using_the_zachman_framework
A method to_define_an_enterprise_architecture_using_the_zachman_frameworkbambangpadhi
 
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...360 BSI
 

Similar to Business Continuity, Disaster Recovery Planning & Leadership 18 - 21 June 2013 Jakarta Indonesia (20)

Virtualisation:- Business Continuity Solution or Enabler
Virtualisation:- Business Continuity Solution or EnablerVirtualisation:- Business Continuity Solution or Enabler
Virtualisation:- Business Continuity Solution or Enabler
 
Gerenciamento e Implementacao de Sistemas ERP Utilizando Softwares Basicos - ...
Gerenciamento e Implementacao de Sistemas ERP Utilizando Softwares Basicos - ...Gerenciamento e Implementacao de Sistemas ERP Utilizando Softwares Basicos - ...
Gerenciamento e Implementacao de Sistemas ERP Utilizando Softwares Basicos - ...
 
Example business continuity plan
Example business continuity planExample business continuity plan
Example business continuity plan
 
MEGA Webinar - PwC - Baker/Tong - EA & GRC, Separated at Birth
MEGA Webinar - PwC - Baker/Tong - EA & GRC, Separated at BirthMEGA Webinar - PwC - Baker/Tong - EA & GRC, Separated at Birth
MEGA Webinar - PwC - Baker/Tong - EA & GRC, Separated at Birth
 
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
 
Business Continuity & Disaster Recovery Planning, 23 - 25 February 2016 Kuala...
Business Continuity & Disaster Recovery Planning, 23 - 25 February 2016 Kuala...Business Continuity & Disaster Recovery Planning, 23 - 25 February 2016 Kuala...
Business Continuity & Disaster Recovery Planning, 23 - 25 February 2016 Kuala...
 
Internal audit requirement
Internal audit requirementInternal audit requirement
Internal audit requirement
 
GROM Overview
GROM OverviewGROM Overview
GROM Overview
 
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
 
TOWARDS AN APPROACH FOR INTEGRATING BUSINESS CONTINUITY MANAGEMENT INTO ENTER...
TOWARDS AN APPROACH FOR INTEGRATING BUSINESS CONTINUITY MANAGEMENT INTO ENTER...TOWARDS AN APPROACH FOR INTEGRATING BUSINESS CONTINUITY MANAGEMENT INTO ENTER...
TOWARDS AN APPROACH FOR INTEGRATING BUSINESS CONTINUITY MANAGEMENT INTO ENTER...
 
Business Continuity Planning Seminar
Business Continuity Planning SeminarBusiness Continuity Planning Seminar
Business Continuity Planning Seminar
 
TOWARDS AN APPROACH FOR INTEGRATING BUSINESS CONTINUITY MANAGEMENT INTO ENTER...
TOWARDS AN APPROACH FOR INTEGRATING BUSINESS CONTINUITY MANAGEMENT INTO ENTER...TOWARDS AN APPROACH FOR INTEGRATING BUSINESS CONTINUITY MANAGEMENT INTO ENTER...
TOWARDS AN APPROACH FOR INTEGRATING BUSINESS CONTINUITY MANAGEMENT INTO ENTER...
 
Contact75 web
Contact75 webContact75 web
Contact75 web
 
profile
profileprofile
profile
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Development impacts presentation for 2013 AOG conference
Development impacts presentation for 2013 AOG conferenceDevelopment impacts presentation for 2013 AOG conference
Development impacts presentation for 2013 AOG conference
 
IDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk ManagementIDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk Management
 
InTechnology InSpire Newsletter - Issue 4
InTechnology InSpire Newsletter - Issue 4InTechnology InSpire Newsletter - Issue 4
InTechnology InSpire Newsletter - Issue 4
 
A method to_define_an_enterprise_architecture_using_the_zachman_framework
A method to_define_an_enterprise_architecture_using_the_zachman_frameworkA method to_define_an_enterprise_architecture_using_the_zachman_framework
A method to_define_an_enterprise_architecture_using_the_zachman_framework
 
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
 

More from 360 BSI

Information Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big DataInformation Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big Data360 BSI
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE360 BSI
 
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAEEffective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE360 BSI
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
 
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAEEffective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE360 BSI
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
 
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...360 BSI
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
 
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...360 BSI
 
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAEAdvanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE360 BSI
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia360 BSI
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...360 BSI
 
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...360 BSI
 
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia360 BSI
 
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAEEffective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE360 BSI
 
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...360 BSI
 
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...360 BSI
 

More from 360 BSI (20)

Information Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big DataInformation Governance & Records Management in the Age of Big Data
Information Governance & Records Management in the Age of Big Data
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
 
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAEEffective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
Effective Technical Report Writing 17 - 18 March 2019 Dubai, UAE
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
 
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAEEffective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
Effective Technical Report Writing 16 - 17 September 2018 Dubai, UAE
 
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...Document & Records Management in the Age of Big Data: Tools & Skills for Info...
Document & Records Management in the Age of Big Data: Tools & Skills for Info...
 
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...
 
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAEAdvanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
Document Management, Security & Retention 05 - 06 April 2017 Singapore / 15 -...
 
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...
 
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, MalaysiaEffective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia
 
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAEEffective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
Effective Technical Report Writing 12 - 13 March 2017 Dubai, UAE
 
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
 
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...
 

Recently uploaded

8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 

Recently uploaded (20)

8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 

Business Continuity, Disaster Recovery Planning & Leadership 18 - 21 June 2013 Jakarta Indonesia

  • 1. BUSINESS CONTINUITY, DISASTER RECOVERY PLANNING & LEADERSHIP 18 - 21 JUNE 2013 KEAWAY FOUR SEASONS HOTEL EXCLUSIinE TA fore 12-APRIL-2013 V gs be book th £75) IT JAKARTA For early bird bership (wor te Affiliate mem Institu EE 1 Yeare Business Continuitydetails) SERIES INDONESIA FR with th to page 3 for further (** refer COURSE OVERVIEW YOUR INTERNATIONAL Disasters could cripple your organization, suspending mission-critical processes and disrupting service to your customers. These disasters could be man-made or natural COURSE FACILITATOR in nature. The Business Continuity Plan addresses an organization’s ability to continue Dr Mark T. Edmead functioning when normal operations are disrupted. MBA, CISSP, CISA, CompTIA Security+ A Disaster Recovery Plan is used to define the resources, action, tasks, and data IT Security required to manage the business recovery process in the event of a disaster. In this Consultant & Trainer workshop you learn to identify vulnerabilities and implement appropriate MTE Advisors countermeasures to prevent and mitigate threats to your mission-critical processes. Mark T. Edmead is a successful technology entrepreneur You will learn techniques for creating a business continuity plan (BCP) and the with over 28 years of practical experience in computer systems architecture, information security, and project methodology for building an infrastructure that supports its effective management. implementation. Mark excels in managing the tight-deadlines and ever changing tasks related to mission-critical project BENEFITS OF ATTENDING schedules. He has extensive knowledge in IT security, IT Using a carefully selected case study, course participants will: and application audits, Internal Audit, IT governance, including Sarbanes-Oxley, FDIC/FFIEC, and GLBA • Create, document and test continuity arrangements for an organization compliance auditing. • Perform a risk assessment and Business Impact Assessment (BIA) to identify Mr. Edmead understands all aspects of information vulnerabilities security and protection including access controls, cryptography, security management practices, network • Select and deploy an alternate site for continuity of mission-critical activities and Internet security, computer security law and • Identify appropriate strategies to recover the infrastructure and processes investigations, and physical security. • Organize and manage recovery teams He has trained Fortune 500 and Fortune 1000 companies in the areas of information, system, and Internet security. • Test and maintain an effective recovery plan in a rapidly changing technology He has worked with many international firms, and has the environment unique ability to explain very technical concepts in simple-to-understand terms. Mr. Edmead is a sought after Sample Case Studies: author and lecturer for information security and information technology topics. • A major Middle Eastern bank has been experiencing tremendous growth and management feels that Mark works as an information security and regulatory their current BCP and DRP plans outdated. In this case study the delegates with perform a business compliance consultant. He has: impact analysis, based on interviews with key company stakeholders and subject matter experts, and outline which business areas are the most critical and in need of improved continuity and recovery • Conducted internal IT audits in the areas of critical plans. infrastructure/ systems and applications, • A manufacturing company is considering implementing a disaster recovery plan but does not know • Assessed and tested internal controls of critical which disaster recovery approach they should implement. In this case study the delegates with study infrastructure platform systems (Windows, UNIX, IIS, SQL, Oracle) the business enterprise, perform a risk analysis, and determine if a hot site, cold site, warm site, or another disaster recovery method is the best approach. • Assessed and tested internal controls of various critical financial applications. EXCLUSIVE: : TEMPLATES & TAKEAWAYS • Prepared risk assessments and determined risks to critical financial data systems and infrastructure c components. c 1. Bring your Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) for Bring your Busines Continuity Plan/Disaster Recov Bring your Busines Continuity Plan/Disaster Recovery ss private consultation review on review • Created test plans & processes and executed test plans. 2. BCP/DRP Step-by-step Guide • Conducted reviews of existing systems and 3. BCP/DRP templates and worksheets to aid you in applying and putting into applications, ensuring appropriate security, management a practice what you have learned from this workshop and data integrity via control processes. a 4. FREE copy of the course material, case studies, and other related items of the • Prepared written reports to all levels of management training workshop • Participated in audit review panel sessions to address results, conclusions and follow-up actions required. r Tel: +6016 3326360 Fax: +603 9205 7788 kris@360bsigroup com kris@360bsigroup.com 1
  • 2. COURSE CONTENT DAY1 BUSINESS CONTINUITY LEADERSHIP WORKSHOP WHY THIS EVENT IT Leadership Workshop is a special one-day course designed to cover The aim of this interactive workshop is to provide the challenges faced with managing the business continuity efforts in an you with the skills critical to business continuity, organization. Implementing a full business continuity plan and disaster disaster recovery & risk management. recovery plan is a major effort. This requires coordination with all After attending this workshop, you will leave departments. It requires interfacing with individuals at all levels from fully armed with the knowledge needed to technicians and programmers to managers, directors, and C-level create a business continuity plan (BCP) and the executives. methodology for building an infrastructure that supports its effective implementation. In this workshop you will learn how perform a stakeholder analysis, The combination of interactive presentations, outline the stakeholders required to accomplish your job, and how to hands-on exercises and open discussion groups effectively navigate the possible roadblocks preventing you from along with real case studies, ensures you will accomplishing your tasks. In addition, you will learn tips and techniques obtain maximum value from attending. that will increase your competence and confidence when influencing and implementing information technology in your organization. Managing the Business Continuity Process - Creating a BCP/DRP framework - Determining your critical success factors (CSF) - Determining your key performance indicators (KPI) - Business continuity management strategies Understanding your Corporate Culture - Understanding your organization’s trends, strategy and environment - Tips, tricks, and trouble spots - Developing a business continuity management culture - Exercising, maintenance, and audit Understanding your Stakeholders - How to identify your key stakeholders - Performing a stakeholder analysis - Creating a stakeholder engagement communication plan - Getting stakeholder engagement and support DAY2 BCP/DRP - CONCEPTS & PRINCIPLES Introduction to Business Continuity and Disaster Recovery Planning - The difference between business continuity and disaster recovery WHO SHOULD ATTEND - Why a recovery plan is an integral part of an organization’s operational Vice Presidents, Directors, General Managers strategy Understanding where the threats come from Chief Information Officers - Understanding codes of practice and legal/regulatory compliance Chief Information Security Officers requirements Chief Technology Officers - The step-by-step process for BCP/DRP Business Continuity Officers Heads of Departments in Information Security Protecting our assets Management Information Systems, IT - What are we protecting? Infrastructure, IT Architecture, Network - What are our mission-critical processes? Operations, IT Operations, IT Data Center, - How to prioritize what is important to protect DataBase Management, IT Deployment IT Business Enterprise, IT Risk Management, What is risk and how do we deal with it? - Understanding risk assessment methodologies IT Quality Assurance, IT Audit, Risk Management, - Matching the response to the threat based on the risk Internal Audit, Disaster Recovery - Enterprise vs. local risk management - Top business continuity planning mistakes The need for business continuation – a case study - Introduction of fictitious business case - Understand business continuity/disaster recovery needs - Documenting the continuity requirements 2
  • 3. COURSE CONTENT DAY3 RISK ASSESSMENT & RECOVERY The Business Impact Assessment (BIA) - What is a Business Impact Assessment? - Assessing the risk to the enterprise Latest TESTIMONIALS - How to identify business critical activities - Impact versus likelihood of occurrence 1 “Session well organized The trainer is ver organized. very Establishing the Recovery Options conversant with the subject matter. Well delivered - Choosing a recovery site and would definitely recommend to anyone else.” - Habil Mutende, Manager Information Security & Change - Specifying equipment Management, Central Bank of Kenya - Choosing suppliers - How to select backup and restore strategies 2 “Excellent presentation, excellent attitude to answer our questions & to share his experience.” Where is the data? - Senior Manager, IT Department, Deloitte - Why you need to classify levels of information - Managing data at rest and in transit 3 “I have used Mark in key roles with high visibility - Understanding data access controls clients. Without hesitation I would highly - The value of knowing where your data resides recommend Mark for any and all IT audit engagements. His professionalism, deep Maintaining user connectivity knowledge, and results oriented work style are - How to communicate the disaster and recovery efforts to users deeply valued by not only myself, but more - How to identify and eliminate single points of failure importantly by the all those who are lucky enough - Communicating with the media to use his services.” - Russ Aebig, Director at Artesient 4 “We have used Mark Edmead on several projects in the past few years including SOX readiness for DAY4 PROJECT MANAGEMENT & REVIEW publicly traded companies and IT vulnerability BCP/DRP Project Management assessments for major financial institutions. He - Identifying stakeholders always delivers professional and detail-oriented - Analyzing stakeholder needs workpapers on-time and within budget. Mark is - Obtaining commitment from upper management highly recommended and we will continue to use him on other projects.” - Brenda Piazza, Director at CBIZ MHM Review of the BCP/DRP Process - Project initiation - Risk analysis - Business Impact analysis - Develop/choose strategies - Test and validate the plan - Modify/update the plan - Approve and implement the plan Analysis of fictitious business case Applying lessons learned **Affiliate membership to Business Continuity Institute COURSE SCHEDULE Affiliate members Business Continuity Institute Affiliate members Business Continuity Institute get access the following membership Affiliate members to Business Continuity Institute get access to the following membership access following membership 8.00 Registration & Coffee/Tea benefits: 8.30 Workshop commences - Continuity magazine – 4 per year (digital version) 10.10 - 10.30 Morning coffee/tea - Monthly BCI ENewsletter 12.00 - 13.00 Lunch - Access to ‘member only’ section of BCI website 14.40 - 15.00 Afternoon coffee/tea - Access to copies of BCI Workshop Reports - Member rates on BCI products and services 16.00 End of day - Networking opportunities at BCI organised events - Access to BCI mentoring programme - Access to discounted events 3
  • 4. BUSINESS CONTINUITY, REGISTRATION FORM DISASTER RECOVERY Fax: +603 9205 7788 PLANNING & LEADERSHIP Tel: +603 9205 7772 Mobile: +6016 3326 360 18 - 21 JUNE 2013 FOUR SEASONS HOTEL JAKARTA Email: kris@360bsigroup.com INDONESIA DELEGATES IN-HOUSE TRAINING 1 Name : 360 BSI is passionate about providing strategic IT programs and high potential training solutions across the region to build Name on tag : personal competencies and organizational capability. Job Title : You will receive practical training from a professionally qualified educator with over twenty years of teaching and Email : training experience. Mobile : Please feel free to mix-and-match topics from the areas listed below to get the right training content for your staff. Other 2 Name : topics may be available upon request. Name on tag : OTHER RELATED PUBLIC COURSES Job Title : IT Strategic Planning Email : Service Oriented Architecture (SOA) IT Risk Management & Leadership Mobile : Preparing for the CISSP exam Cybercrime & Fraud Investigation 3 Name : IT Change Management Name on tag : IT Project Management Job Title : Hotel Contact Details: Email : For Room Reservation, please contact Reservation Desk. Tel. +62 (21) 252-3456 or Fax. +62 (21) 252-4480 Mobile : Four Seasons Hotel Jakarta AUTHORIZATION Jalan H.R. Rasuna Said, Jakarta 12920, Indonesia (This form is invalid without a signature) General Information: Name : 1 Closing date for registration is 11th June 2013. 2 The fees cover lunch, tea breaks, materials and certificate. Job Title : 3 Official confirmation will be sent, once registration has Email : been received. 4 Participants will need to arrange their own accommodation. 5 Attire: Smart Casual Tel : ( ) Cancellations/Substitutions Organization : Substitutions are welcome at any time. Please notify us at Address : least 2 working days prior to the event. All cancellations will carry a 10% cancellation fee, once a registration form is received. All cancellations must be in writing by fax or email at least 2 weeks before the event date. Cancellations with less than 2 weeks prior to the event date carry a 100% liability. However, course materials will still be couriered to you. Signature : Date: / / Thank you for your registration! FEES PAYMENT DETAILS Payment is required within 5 days upon receipt of USD 2,995 per delegate the invoice. USD 2,795 per delegate - register before 12-APRIL-2013 Bank transfer: USD 8,085 - Special for Group of 3 360 BSI (M) Sdn Bhd The fee does not include any taxes (withholding or otherwise). In case of any taxes applicable HSBC Bank Malaysia Berhad the client has to ensure that the taxes are paid on top of the investment fee paid for the course. Bukit Bintang Branch, Kuala Lumpur, Malaysia Compliance with the local tax laws is the responsibility of the client. Account No: 203-371059-725 Swift No: HBMBMYKL * Save up to 50% for In-house Training program All payments must be received prior to the event date © 360 BSI (M) Sdn Bhd (833835-X), Level 8 Pavilion KL, 168 Jalan Bukit Bintang, 55100 Kuala Lumpur, Malaysia. www.360bsi.com/IT 4