Page 88 - Cyber Warnings
P. 88







(stakeholders) – BU heads, executive management, investors, partners, clients, staff.
Here regression tests, volume test, stress test becomes significant.
3. “Business intelligence” or high level analysis of an organization and the environment
in which it operates, requires careful planning and comprehensive data sets to be
maintained and analyzed. Here data warehousing related aspects becomes
significant.

Being strategic in nature, its paramount to ensure the Confidentiality, Integrity, Safekeeping
and Integrity of the data across the data management lifecycle when creating the BCP –
right from planning to implementation and maintenance stages.
A formally defined BCP test plan enables testing the communications and assessing the
awareness levels of the personnel involved before an actual disaster occurs.
This acumen enable the leadership to disseminate the precise information correctly
especially during a crisis.

The BC test plans include -
1. Formal “walk throughs” conducted along with the designated BCP team members.
2. “Dress rehearsals” for the identified teams/team members
3. Live simulation tests
4. Interviewing the BU heads and staff to assess the existing processes
5. Revising/updating the plans by incorporating the test results
6. Planning and specifying the dates of the next test

Update the BC plan
BCP is a live document which must be reviewed annually by adopting an organized and
consistent approach which in turn equips the company to be adequately prepared and
handle the disasters in an organized manner with minimal losses.

A practical approach to keep your BCP updated is to compare the existing BCP with the
currently deployed processes and reviewing it by following a formally defined change
management processes.

About the Author
Vineet Aggarwal CBCP, CISSP, CISA, Certified ISO 27001 Lead
Auditor, Certified ISO 22301 Lead Auditor is presently the Senior
Consulting Manager at Wipro Technologies with 17 years Information
Security experience in cybersecurity lifecycle management, risk
assessment, security controls gaps assessment, ISMS deployment,
Data Privacy assessments, cloud and mobility security enforcements,
business continuity deployment, DLP security assessment, industrial
security controls assessment, Information security audits and people
management across global clients and geographies.
.

88 Cyber Warnings E-Magazine February 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   83   84   85   86   87   88   89   90   91   92   93