SlideShare a Scribd company logo
1 of 24
Download to read offline
Contact us: info@alvinintegrated.com | +91 8802 505619, +91 8287509289
| www.alvinintegrated.com
Platinum Sponsor
OUR SPONSORS & PARTNERS
Event Partner
www.alvinintegrated.com
Knowledge Partners
27th FEB 2021
(SATURDAY)
09:00 AM - 17:30 PM IST
Speaker Introduction:
Rohit Verma
Mumbai, India
27 years of Industry experience/ CRP,
CBCP, CISA, CSP, CA, MBA, PGDFPS,
BS 25999 LA, OHSAS 18001 LA, ITDR,
BCM, Corporate Security, Health and
Safety, Operations Risk Management,
Compliance and Governance
Author of: The Emergency
Management Handbook
Mr Rohit has over 27 years of industry experience in Governance, Risk and Compliance in Business
Continuity Management, IT Disaster Recovery, Crisis Management, Operations Risk Management, Vendor
BCM Risk Management, Information Risk Management, Corporate Security and Health and Safety and
Auditing.
Rohit was Ex-General Manager in IBM, managing Global BCM Program. Prior to IBM, he was Vice President,
Country Head – Business Continuity Management, IT Disaster Recovery, Corporate Security, Health and
Safety in Barclays Bank Group, India. He was Assistant Vice President – Business Continuity Management
in Deutsche Bank Group, having a Regional role in South Asia.
Rohit has also worked with KPMG in their Information Risk Management Division, where he has conducted
IT Security audits for numerous national and MNC clients in India and UAE.
Rohit is a Certified Business Continuity Professional (CBCP) from Disaster Recovery International, USA. He
is also a Certified Information Systems Auditor (CISA) from ISACA (USA), Certified Risk Professional, BS
25999 Lead Auditor, Chartered Accountant, MBA, OHSAS 18001 Lead Auditor, Post Graduate Diploma in
Fire Protection and Safety (PGDFPS).
Rohit is a Guest Faculty with prominent Institutes / Bodies, on the subjects of Business Continuity
Management and Risk Management.
He is an author of a book on preparing and managing personal emergency situations.
His interests include Traveling, Teaching under-privileged children, Music, Reading, Writing poetry.
Connect at LinkedIn: https://www.linkedin.com/in/rohitvermabusinesscontinuity
Designing an effective Crisis
Management Framework
GIKS Summit | Online
Time: 09:55 am - 10:20 am
Date: 27th February 2021
By Mr Rohit Verma
Note for the participants:
Speaker will take
your questions
automatically.
If you have any
questions, please
comment in chat box.
Agenda
1. Crisis Management Framework
2. Command and Control Room
3. Crisis Communication Options
4. External Agencies
MURPHY’s LAWS
Q: Sir, how prepared are you for any Disasters ?
A: “Disaster ? What disaster ??....
I have not come across any disaster
in my 32 years of service”
Captain E.J. Smith
Titanic
14 Apr 1912
The risks we face today
Terrorism
Floods
Infrastructure failure
Riots, Violence
Fires
Earthquakes
Hazards / Risks
• Epidemic
• Pandemic
• Flood
• Tsunami
• Industrial incidents
• Social Engineering
• Cyber attacks
• Virus / IT Security threats
• Data Centre outage
• Cable Cut
• Power Outage
• UPS / DG Failure
• Short circuit
• Fire
• Earthquake
• Strikes
• Riots
• Lightning
• Bomb Threat
• Bomb Blast
• Fire
• Vehicle Crash
• Plane Crash
• Plane Hijack
• Train accidents
Internal
• Vandalism
• Key Person missing
• Hardware Error
• Software Error
• Network Failure
• Corrupted Data
• Lost Data
• Frauds
• Human Error
External
Page 15
Time and Impact relationship
Low
High
Crisis Management Framework
Crisis Management Framework
• Crisis Teams
• Command and Control
• Standing agenda
• Crisis Cards
• Notification Technology
• Crisis Communication Plan
• Crisis Simulation Exercises
• External Agencies
18
Command and Control Room
Location
−Physical or Virtual
Equipment
−2 landlines (with conference facility) from 2 different service providers
−Video conferencing
−Min 2 Desktops with Intranet and Internet connection
−Desktop LAN points
−Enough points for power connection / charging
−Display of emergency phone numbers
−Crisis Kit – Documents, all Call Trees
−Geographical maps for each location in the country
−White board, Flip Chart with stationery
−World Clocks
−TV and Radio with all news channels
19
Crisis Communication options
20
Communication Tools
1. Email – Outlook, Lotus Notes etc
2. Collaborative tools – MS Teams, Webex, Zoom, etc
3. Telephony
4. Emergency Notifications
What are these Tools dependent on ?
1. Third party ?
2. Internet ?
3. Active Directory?
4. DNS?
Functionality available
1. Email
2. Audio
3. Video
4. Chat / SMS
5. File sharing
What functionality will be lost of these Tools are down?
External Agencies
21
1. Floods, Heavy Rain
− Disaster Management Authority
− Meteorology Department
− Local Municipal Corporation
− Transport – Road, Railways, Air
2. Terrorist Attack
− Local Police
− Fire Brigade
− Nearest Hospital
3. IT Outage
− Network service providers
− Internet service providers
4. Fire
− Local Fire Brigade
− Nearest Hospital
5. Strikes / Bandhs / Riots
− Transport vendors
− Hotels
− Food vendors
6. Theft / Burglary
− Police
7. Epidemic / Pandemic
− World Health Organization
− International SOS
− Local Chemists
− Hospitals
8. Hacking / Cyber Attack
− IT Security Expert
− Forensic investigation
− Local Police
9. Building outage / Earthquake
− Alternate site vendors / WAR
− Real Estate Consultants
10. Supply Chain Outage
− Alternate Suppliers
Suggested Readings
• Business Continuity Management Handbook – Andrew Hiles
• www.continuitycentral.com - Jobs, Knowledge, News
• www.thebci.org - Knowledge, Events, News, Certifications
• www.drii.org - Knowledge, Events, Certifications
• www.bcm-institute.org – Courses, Certifications
Questions
are Welcome!
Please give your feedbacks in
the chat box about the webinar.
Thank You
Rohit Verma
M: 99 2093 2083
E: puremindbodysoul@gmail.com
The only thing harder than planning for an Emergency
is explaining why you didn’t !!

More Related Content

What's hot

Denial Of Service Attacks (1)
Denial Of Service Attacks (1)Denial Of Service Attacks (1)
Denial Of Service Attacks (1)
Waheb Samaraie
 
Risk 101 – Know the Unknown by Nehru Nagappan
Risk 101 – Know the Unknown by Nehru NagappanRisk 101 – Know the Unknown by Nehru Nagappan
Risk 101 – Know the Unknown by Nehru Nagappan
BCM Institute
 

What's hot (16)

Snapshot Vested Gang Resistance for Students
Snapshot Vested Gang Resistance for StudentsSnapshot Vested Gang Resistance for Students
Snapshot Vested Gang Resistance for Students
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business Resilience
 
What cybersecurity risk management entails
What cybersecurity risk management entailsWhat cybersecurity risk management entails
What cybersecurity risk management entails
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Countering Cyber Threats
Countering Cyber ThreatsCountering Cyber Threats
Countering Cyber Threats
 
The Influence of Public Awareness and Transparency on Corporate Governance an...
The Influence of Public Awareness and Transparency on Corporate Governance an...The Influence of Public Awareness and Transparency on Corporate Governance an...
The Influence of Public Awareness and Transparency on Corporate Governance an...
 
Denial Of Service Attacks (1)
Denial Of Service Attacks (1)Denial Of Service Attacks (1)
Denial Of Service Attacks (1)
 
Situational Awareness-Your BEST Security Tool
Situational Awareness-Your BEST Security ToolSituational Awareness-Your BEST Security Tool
Situational Awareness-Your BEST Security Tool
 
CM FAll 2015
CM FAll 2015CM FAll 2015
CM FAll 2015
 
Human Risk Management
Human Risk ManagementHuman Risk Management
Human Risk Management
 
Cian Blackwell - Risk management and mitigation 2011
Cian Blackwell - Risk management and mitigation 2011Cian Blackwell - Risk management and mitigation 2011
Cian Blackwell - Risk management and mitigation 2011
 
Reputation Risk: Why Companies Need to Care
Reputation Risk: Why Companies Need to CareReputation Risk: Why Companies Need to Care
Reputation Risk: Why Companies Need to Care
 
Lesson 3 cmice
Lesson 3 cmiceLesson 3 cmice
Lesson 3 cmice
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Lloyds arup future cities 2017 energy
Lloyds arup future cities 2017 energyLloyds arup future cities 2017 energy
Lloyds arup future cities 2017 energy
 
Risk 101 – Know the Unknown by Nehru Nagappan
Risk 101 – Know the Unknown by Nehru NagappanRisk 101 – Know the Unknown by Nehru Nagappan
Risk 101 – Know the Unknown by Nehru Nagappan
 

Similar to Designing an effective Crisis Management Framework

Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
John Palfreyman
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
mharbpavia
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
OurCrowd
 

Similar to Designing an effective Crisis Management Framework (20)

Abso lutely!
Abso lutely!Abso lutely!
Abso lutely!
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
Communications in a Disaster
Communications in a DisasterCommunications in a Disaster
Communications in a Disaster
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of Engagement
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoT
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Input on threat images against information society
Input on threat images against information societyInput on threat images against information society
Input on threat images against information society
 
Cyber Security Action Plan of RVNL
Cyber Security Action Plan of RVNLCyber Security Action Plan of RVNL
Cyber Security Action Plan of RVNL
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
BIFM Risk Management Event 8th September 2016
BIFM Risk Management Event 8th September 2016BIFM Risk Management Event 8th September 2016
BIFM Risk Management Event 8th September 2016
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
Cyber Threat Landscape
Cyber Threat LandscapeCyber Threat Landscape
Cyber Threat Landscape
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Crisis management 2013
Crisis management 2013Crisis management 2013
Crisis management 2013
 
Security in a Mobile World
Security in a Mobile WorldSecurity in a Mobile World
Security in a Mobile World
 

More from Alvin Integrated Services [AIS]

More from Alvin Integrated Services [AIS] (8)

Pandemic: Crisis or Opportunity? ISO 22301 best practice Implementation tips ...
Pandemic: Crisis or Opportunity? ISO 22301 best practice Implementation tips ...Pandemic: Crisis or Opportunity? ISO 22301 best practice Implementation tips ...
Pandemic: Crisis or Opportunity? ISO 22301 best practice Implementation tips ...
 
ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?
 
Digital Maturity – Business as Usual & Integration of multiple ISO Management...
Digital Maturity – Business as Usual & Integration of multiple ISO Management...Digital Maturity – Business as Usual & Integration of multiple ISO Management...
Digital Maturity – Business as Usual & Integration of multiple ISO Management...
 
Thinking beyond “Conventional” Crisis Communication.
Thinking beyond “Conventional” Crisis Communication.Thinking beyond “Conventional” Crisis Communication.
Thinking beyond “Conventional” Crisis Communication.
 
Effective Leadership – The Cornerstone – applied study on ISO 22000:2018 Food...
Effective Leadership – The Cornerstone – applied study on ISO 22000:2018 Food...Effective Leadership – The Cornerstone – applied study on ISO 22000:2018 Food...
Effective Leadership – The Cornerstone – applied study on ISO 22000:2018 Food...
 
COVID – 19 and Resilience: Has ISO 22316 standard been responsive?
COVID – 19 and Resilience: Has ISO 22316 standard been responsive?COVID – 19 and Resilience: Has ISO 22316 standard been responsive?
COVID – 19 and Resilience: Has ISO 22316 standard been responsive?
 
Business Continuity Management System: How, Why and for What?
Business Continuity Management System: How, Why and for What?Business Continuity Management System: How, Why and for What?
Business Continuity Management System: How, Why and for What?
 
ISO 31000:2018 Risk Management System, Framework and Implementation
ISO 31000:2018 Risk Management System, Framework and ImplementationISO 31000:2018 Risk Management System, Framework and Implementation
ISO 31000:2018 Risk Management System, Framework and Implementation
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Designing an effective Crisis Management Framework

  • 1. Contact us: info@alvinintegrated.com | +91 8802 505619, +91 8287509289 | www.alvinintegrated.com Platinum Sponsor OUR SPONSORS & PARTNERS Event Partner www.alvinintegrated.com Knowledge Partners 27th FEB 2021 (SATURDAY) 09:00 AM - 17:30 PM IST
  • 2. Speaker Introduction: Rohit Verma Mumbai, India 27 years of Industry experience/ CRP, CBCP, CISA, CSP, CA, MBA, PGDFPS, BS 25999 LA, OHSAS 18001 LA, ITDR, BCM, Corporate Security, Health and Safety, Operations Risk Management, Compliance and Governance Author of: The Emergency Management Handbook Mr Rohit has over 27 years of industry experience in Governance, Risk and Compliance in Business Continuity Management, IT Disaster Recovery, Crisis Management, Operations Risk Management, Vendor BCM Risk Management, Information Risk Management, Corporate Security and Health and Safety and Auditing. Rohit was Ex-General Manager in IBM, managing Global BCM Program. Prior to IBM, he was Vice President, Country Head – Business Continuity Management, IT Disaster Recovery, Corporate Security, Health and Safety in Barclays Bank Group, India. He was Assistant Vice President – Business Continuity Management in Deutsche Bank Group, having a Regional role in South Asia. Rohit has also worked with KPMG in their Information Risk Management Division, where he has conducted IT Security audits for numerous national and MNC clients in India and UAE. Rohit is a Certified Business Continuity Professional (CBCP) from Disaster Recovery International, USA. He is also a Certified Information Systems Auditor (CISA) from ISACA (USA), Certified Risk Professional, BS 25999 Lead Auditor, Chartered Accountant, MBA, OHSAS 18001 Lead Auditor, Post Graduate Diploma in Fire Protection and Safety (PGDFPS). Rohit is a Guest Faculty with prominent Institutes / Bodies, on the subjects of Business Continuity Management and Risk Management. He is an author of a book on preparing and managing personal emergency situations. His interests include Traveling, Teaching under-privileged children, Music, Reading, Writing poetry. Connect at LinkedIn: https://www.linkedin.com/in/rohitvermabusinesscontinuity
  • 3. Designing an effective Crisis Management Framework GIKS Summit | Online Time: 09:55 am - 10:20 am Date: 27th February 2021 By Mr Rohit Verma
  • 4. Note for the participants: Speaker will take your questions automatically. If you have any questions, please comment in chat box.
  • 5. Agenda 1. Crisis Management Framework 2. Command and Control Room 3. Crisis Communication Options 4. External Agencies
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Q: Sir, how prepared are you for any Disasters ? A: “Disaster ? What disaster ??.... I have not come across any disaster in my 32 years of service” Captain E.J. Smith Titanic 14 Apr 1912
  • 14. The risks we face today Terrorism Floods Infrastructure failure Riots, Violence Fires Earthquakes
  • 15. Hazards / Risks • Epidemic • Pandemic • Flood • Tsunami • Industrial incidents • Social Engineering • Cyber attacks • Virus / IT Security threats • Data Centre outage • Cable Cut • Power Outage • UPS / DG Failure • Short circuit • Fire • Earthquake • Strikes • Riots • Lightning • Bomb Threat • Bomb Blast • Fire • Vehicle Crash • Plane Crash • Plane Hijack • Train accidents Internal • Vandalism • Key Person missing • Hardware Error • Software Error • Network Failure • Corrupted Data • Lost Data • Frauds • Human Error External Page 15
  • 16. Time and Impact relationship Low High
  • 18. Crisis Management Framework • Crisis Teams • Command and Control • Standing agenda • Crisis Cards • Notification Technology • Crisis Communication Plan • Crisis Simulation Exercises • External Agencies 18
  • 19. Command and Control Room Location −Physical or Virtual Equipment −2 landlines (with conference facility) from 2 different service providers −Video conferencing −Min 2 Desktops with Intranet and Internet connection −Desktop LAN points −Enough points for power connection / charging −Display of emergency phone numbers −Crisis Kit – Documents, all Call Trees −Geographical maps for each location in the country −White board, Flip Chart with stationery −World Clocks −TV and Radio with all news channels 19
  • 20. Crisis Communication options 20 Communication Tools 1. Email – Outlook, Lotus Notes etc 2. Collaborative tools – MS Teams, Webex, Zoom, etc 3. Telephony 4. Emergency Notifications What are these Tools dependent on ? 1. Third party ? 2. Internet ? 3. Active Directory? 4. DNS? Functionality available 1. Email 2. Audio 3. Video 4. Chat / SMS 5. File sharing What functionality will be lost of these Tools are down?
  • 21. External Agencies 21 1. Floods, Heavy Rain − Disaster Management Authority − Meteorology Department − Local Municipal Corporation − Transport – Road, Railways, Air 2. Terrorist Attack − Local Police − Fire Brigade − Nearest Hospital 3. IT Outage − Network service providers − Internet service providers 4. Fire − Local Fire Brigade − Nearest Hospital 5. Strikes / Bandhs / Riots − Transport vendors − Hotels − Food vendors 6. Theft / Burglary − Police 7. Epidemic / Pandemic − World Health Organization − International SOS − Local Chemists − Hospitals 8. Hacking / Cyber Attack − IT Security Expert − Forensic investigation − Local Police 9. Building outage / Earthquake − Alternate site vendors / WAR − Real Estate Consultants 10. Supply Chain Outage − Alternate Suppliers
  • 22. Suggested Readings • Business Continuity Management Handbook – Andrew Hiles • www.continuitycentral.com - Jobs, Knowledge, News • www.thebci.org - Knowledge, Events, News, Certifications • www.drii.org - Knowledge, Events, Certifications • www.bcm-institute.org – Courses, Certifications
  • 24. Please give your feedbacks in the chat box about the webinar. Thank You Rohit Verma M: 99 2093 2083 E: puremindbodysoul@gmail.com The only thing harder than planning for an Emergency is explaining why you didn’t !!