C13: Third Party Supplier Resilience – Smart Practices to Enhance a Program
Jeremy Gudgeon, Chubb, and Margaret Millett, Uber
Many businesses experienced resilience gaps with their third-party suppliers during COVID. From loss of employees to an inability to access offices and continue delivering as usual, suppliers experienced real impacts. Businesses have an opportunity post-Covid to assess how they manage Supplier Resilience. Join us as we review ways to reaffirm/address/accept residual risks to supplier-supported business processes.
C14: Teaming on the Pathway to IT Resilience
Dave Gehrum, Geisinger Health System, and Chris Wright, Deloitte and Touche LLP
Building an Information Technology Resilience Program can present many challenges including understanding the full scope of an organization’s resilience needs, identifying and engaging key stakeholders, and introducing new terms and concepts. To develop a comprehensive program to address IT Resilience, one must take a broad approach, considering existing components and building upon that foundation. As Geisinger Health System set out on its journey to develop and maintain its IT Resilience Program, the presenters will discuss the challenges and opportunities encountered while navigating the resilience needs of a large health care system, including the introduction and reinforcement of concepts such as Technology Impact Analysis (TIA), Maximum Tolerable Period of Disruption (MTPD), Recovery Time Objective (RTO), and Recovery Point Objective(RPO). They will also discuss the foundational importance of developing and maintaining relationships with key stakeholders as well as maintaining clear and concise communication throughout the process.
C15: Defining Resilience
Dianne Stephens, Globe Life
Are you struggling to accurately define ‘Resiliency’- Is it the same as Business Continuity or Disaster Recovery or neither? Key takeaways from this session will provide clarity on the differences between 3 types of resiliency – Organizational, Enterprise and Operational. Attending this session will help you know which type of resiliency is pertinent to which level of your organization.
D5: How to Keep the Business Going Even After a Ransomware Attack or Disaster
Scott Hetrick, Quest | Data Protection
Your role is to ensure that your organization is protected and can recover from a ransomware attack as well as disasters like hurricanes, tornadoes, wildfires, floods and power outages for business continuity. But, how do you know that you’re really protected? How rapidly can you restore ALL your company’s systems, applications and data in a mass restore event? And is your backup repository really safe?
Attend this session where we’ll answer all these questions, share best practices and discuss new technologies in planning for business continuity and disaster recovery.
You’ll learn how to:
- Lower risk of business downtime
- Better prepare for unplanned outages
- Protect your data from ransomware and other cyber-attacks
- Accelerate recovery using on-prem and cloud resources
- Significantly reduce your data protection costs