BCMS Awareness Training

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

[Audio] Welcome to Business Continuity Management System Awareness Training..

Scene 2 (10s)

[Audio] Objective of the program is to provide a basic knowledge of importance of Business Continuity Management System (BCMS) and steps needs to follow in order to ensure the bank's ability to continue operating its critical functions and services in the face of disruptive events or disasters..

Scene 3 (27s)

[Audio] What is Business Continuity Management System.

Scene 4 (35s)

[Audio] It is a structured approach to ensure a bank's ability to continue critical functions during disruptive events. (ex: natural disasters, pandemic, riots, cyber threats) The objective is to minimize downtime and maintain operations. A better understanding of critical issues and areas of vulnerability. Improved business performance and organizational resilience. BCMS ensures regulatory compliance with business continuity and disaster recovery requirements. Risks are assessed and managed to reduce the impact of disruptions. Communication and coordination protocols are established. Provides ability to reassure clients, suppliers, regulators and other stakeholders..

Scene 5 (1m 27s)

[Audio] Interested Parties or Stakeholders. Employees Shareholders Customers Providers / Suppliers Regulatory Authorities Employees' dependents Board of Directors Parent Company.

Scene 6 (1m 50s)

[Audio] Importance of BCMS. Importance of BCMS. 03.

Scene 7 (1m 57s)

[Audio] Importance of BCMS. Protection of reputation and image. Protection of shareholder value. Improved understanding of the business as gained through risk assessment and mitigation. Operational resilience which ends up from implementing risk mitigation. Reduction in downtime when alternative processes and workarounds are identified. Safeguard employees, visitors and public. Compliance issues which will be identified and managed for alternative processes..

Scene 8 (2m 32s)

[Audio] Les see what is "Business Continuity Plan & Disaster Recovery Plan".

Scene 9 (2m 40s)

[Audio] Business Continuity Plan (BCP) Business continuity planning is a strategy designed to help businesses continue operating with minimal disruption during a disruptive event. The outcome of that planning process is the business continuity plan, or BCP. Processes, steps, and guidelines in a business continuity plan answer one question: "How businesses can continue offering acceptable service levels when disaster strikes.".

Scene 10 (3m 10s)

[Audio] Disaster Recovery Plan (DRP) Disaster Recovery Plan (DRP) contains clear action plans for rapidly responding to, dealing with, and recovering from disruptive contingencies. A DR plan helps organizations reduce the impact and duration of unexpected disruptions by minimizing the downtime of key IT infrastructure and critical operations. The goal of a DRP is to minimize downtime and data loss as much as possible..

Scene 11 (3m 42s)

[Audio] Disaster Management Phases (Execution) It has below phases. 1.Pre Incident 2.Incident 3.Post-Incident Please look at the diagram and understand the process..

Scene 12 (4m 2s)

[Audio] ISO 22301 Certification. ISO 22301 Certification.

Scene 13 (4m 8s)

[Audio] What is ISO 22301? ISO 22301 is an International Standard for implementing and maintaining effective business continuity plans, systems and processes. It establishes a framework for industrial or entire companies to manage all aspects of business continuity. Applies to all types and sizes of organization. The standard specifies requirements to implement, maintain and improve a management system to protect against, reduce the likelihood of the occurrence of, prepare for, respond to and recover from disruptions when they arise..

Scene 14 (4m 48s)

[Audio] Advantages of Certification. National / International recognition Independent check of conformity to ISO 22301:2019 by a certification body Indicates an effective Business Continuity Management System Improves company image A documented BCMS that is fully implemented and meets ISO 22301:2019 requirements Adhering to regulatory and statutory Predefined Recovery Time Objectives (RTO) to restore normal operations after a disruption.

Scene 15 (5m 30s)

[Audio] ISO 22301:2019 Certification Process. It has 7 stages. Implementation of BCMS Conduct Internal Audit and review result Selection of a certification body Stage 1 Audit Stage 2 Audit Confirmation of Registration Continual Improvement and Surveillance Audit.

Scene 16 (6m 2s)

[Audio] Importance of following BCMS. Importance of following BCMS.

Scene 17 (6m 8s)

[Audio] Complying with Business Continuity Management System. Ensuring Safety and Security. By following the established procedures and protocols, employees can mitigate risks, evacuate safely if necessary, and respond appropriately to emergency situations. Preserving Customer Trust When customers see that an organization is well-prepared and can continue providing products or services even during disruptions, it enhances their perception of reliability and professionalism. Protecting Assets and Data Employees who safeguard assets contribute to protecting sensitive information, preventing unauthorized access, and minimizing the potential for data breaches or losses. Enhancing Efficiency and Effectiveness By adhering to BCMS procedures, employees can work more efficiently and effectively, reducing confusion and allowing for a smoother response and recovery process. Fostering a Culture of Preparedness Employees who are familiar with the BCMS and actively participate in training and drills develop a proactive mindset, enabling them to respond better to unexpected events and contribute to a more resilient organization overall..

Scene 18 (7m 26s)

[Audio] Responsibility as an employee adhering to BCMS.

Scene 19 (7m 34s)

[Audio] Responsibility as an employee adhering to BCMS Following established procedures and guidelines for business continuity Reporting incidents or disruptions according to the call-tree Participating in training and awareness programs Cooperating with communication protocols and emergency response measures Understanding and fulfilling assigned roles and responsibilities during a crisis Adhering to security protocols to protect critical assets and information.

Scene 20 (8m 9s)

[Audio] Roles and Responsibilities 1.BCSC (Business Continuity Steering Committee) – IT Department Ensure to operationalize BCMS in IT Department (Detailed description can be found in the NDB-BCMS-PR-001-Business Continuity Roles and Responsibilities) 2.Chief Information Officer (CIO/VP) Serves as the focal point for deciding on all IT Business Continuity Issues. (Detailed description can be found in the NDB-BCMS-PR-001-Business Continuity Roles and Responsibilities) 3.ITBCMT (IT Business Continuity Management Team) Developing and implementing strategies and plans to ensure the bank's critical IT business functions can continue during and after a disruption or crisis (Detailed description can be found in the NDB-BCMS-PR-001-Business Continuity Roles and Responsibilities) 4.ITBCM (Business Continuity Manager) Ensuring that an organization's IT infrastructure and systems can continue to operate during and after a disaster event. (Detailed description can be found in the NDB-BCMS-PR-001-Business Continuity Roles and Responsibilities) 5.ERT (Emergency Response Team) Provide rapid and effective response during emergency situations (Detailed description can be found in the NDB-BCMS-PR-006-Disaster Recovery Procedure).

Scene 21 (9m 54s)

[Audio] 1.DRT (Disaster Recovery Team) Restore and recover IT systems and infrastructure after a disruptive incident. (Detailed description can be found in the NDB-BCMS-PR-006-Disaster Recovery Procedure) 2.SCT (Service Continuity Team) The composition of the team will be decided by the ERT and should consist of financial and management leads, along with technical experts. (Detailed description can be found in the NDB-BCMS-PR-006-Disaster Recovery Procedure) 3.IT Staff Adhere to the BCMS policies and procedures.

Scene 22 (10m 42s)

[Audio] Examples of disruptive events. Examples of disruptive events.

Scene 23 (10m 49s)

[Audio] Example 1 – Signs of a ransomware attack. Your computer is sluggish or slow to respond If your computer or network experiences sudden sluggishness, frequent crashes, or freezes, it could be a sign of a ransomware infection. Scrambled or encrypted files If you notice your data appended with unknown file extensions that you never remembered changing in the first place, it's a clear sign of a ransomware attack. An instance of MimiKatz running Cybercriminals often use MimiKatz and Microsoft Process Explorer to steal credentials. The presence of MimiKatz should always be a red flag. You receive instructions for ransom payment A confirmed sign of a ransomware infection is that somewhere on Desktop, My Documents, etc. you will receive a text file containing payment instructions. The file name starts usually with an underscore (_) and has the words in CAPITAL. You get new installations of software you don't recognize While using any of the machines on your network, if you notice some sort of strange or weird looking software in the Start menu, a desktop shortcut or an unrecognized EXE file, it's another sign of a ransomware..

Scene 24 (12m 12s)

[Audio] Actions to be taken during a ransomware attack. 1.You are required to call the Helpdesk department to inform any IT related issues you are facing, and the Helpdesk team will open a ticket for you. 2. The IT department/End-point Security Manager will be informed about the incident by the Helpdesk team. Then you will be further inquired for more details regarding the issue reported to helpdesk. Based on that endpoint security manager will identify whether it is a ransomware. 3. After that the IT Security department/End-point Security Manager will take immediate actions to prevent the ongoing crisis. 4. The helpdesk team will disable wi-fi and network sharing. 5. The ER team will communicate to the other departments regarding the on-going crisis. 6. The analysis part when it comes to taking the decision of paying the ransom or not will be done by the IT department..

Scene 25 (13m 20s)

[Audio] Example 2 - Actions to be taken during a pandemic situation By the employee Receive notifications about the activation of the work-from-home policy, including the communication channels and procedures to be followed. Infected employees should inform the management/seniors to delegate the work. And inform the management once recovered. Report if any IT incidents or disruptions that occur during remote work. By the management Communicate working arrangements to the employees. Communicate to infected employees and provide necessary services/funds. Ensure that IT staff have the necessary equipment (ex: laptops, monitors, peripherals) to work remotely. Maintain regular communication channels to keep IT staff informed about any changes, updates, or operational adjustments related to remote work arrangements..

Scene 26 (14m 23s)

[Audio] Thank you for completing the program.. THANK YOU.

Scene 27 (14m 29s)

Some or all of the services described herein may not be permissible for KPMG audit clients and their affiliates or related entities..