A5: How to Transform Your BCM Program with Digital Process Automation: Decision, Implementation, and Launch
Larry Delfiner, Doma and Tejas Katwala, Continuity Logic
Doma, the real estate title insurance company that is disrupting the market, needed to grow its BCM program as fast as its business was growing. As the organization is in hyper-growth and going public, BCM and automation became part of the leadership’s digital transformation initiative. So, how do you get it right? Join Doma’s Director of Facilities & Business Resiliency, Larry Delfiner, and Tejas Katwala, CEO, Continuity Logic as they share practical advice taken directly from Doma’s real-life implementation and learn what it takes to lead a successful launch, how digital process automation can accelerate time to value, and how you can keep your program in alignment with your organization goals, processes, and culture.
Indicators that you may need a new BCM system and digital process automation:
- Your enterprise is looking for competitive advantages and digital transformation
- There are many disconnected databases (BCP, DR, Crisis, Supplier Risk, etc.)
- There are still a lot of manual processes and Excel spreadsheets
- There is a lack of inter-office communication regarding the BCM program
- Need to improve your program is on the rise but change management is too slow and expensive
- Cannot keep up with the demand for better data (reports, dashboards, and insights)
The main learning points for this session include:
- How to create a realistic BCM software implementation strategy and roadmap
- How to define the process of BCM software selection
- How to launch a solution within weeks instead of months
- How to avoid the pitfalls many organizations fall into while looking for BCM
- When and how to integrate enterprise data into BCM
- How to increase user adoption
- What are the 3 tips to accelerate your BCM program in the next 3 months
B10: Buying Down the Risk of a Failed Ransomware Compromised Data Recovery Effort
John Beattie, Sungard Availability Services
In order to create the opportunity to extort a ransom payment, ransomware threat actors must make it compelling for you to consider it. They must make it a viable option – one you have to consider. In fact, they will be working diligently to make sure it’s your only option. And that happens when they successfully encrypt or disable your data replicas and backups as well as your production data. They must attack the data that you care about: data that’s important to your organization’s success; your “must-have” data; your vital data. They are thinking ahead. Are you? It is therefore essential to extend your thinking beyond your Cyber Security Incident Response Plan and your Disaster Recovery Plan. You need to think about a Cyber-compromised Data Recovery Management Program. This session will explore exactly that and what you need to put in place to have the right thinking, the right approach, the right team, the right plan, and the right capabilities that buy down your risk of a failed data recovery effort in the aftermath of a successful data compromising cyberattack.
D7: Three Steps Towards Becoming ISO 22301 Compliant
Tim Woodcome, NQA
This presentation will focus in-depth on three key components of a successful BCMS under ISO 22301: Internal BCMS Audit, BCMS Corrective Action, and BCMS Management Review. These key requirements are the building blocks to any robust management system and need to be understood and implemented effectively to achieve ISO 22301 conformance. The presenter will go in-depth to the specifics of these requirements, providing interpretations, guidance, and potential tools and templates to be used. Takeaways of this session include the inside knowledge and expectations of the requirements, examples to demonstrate best-practices, and templates to be brought back to organizations for potential use.
E4: Resiliency Training for a Virtual Workplace
Paul Lambert, Ripcord Solutions
Your fellow employees are working from home. You are probably still working from home. But best practices, experience, standards, and regulators keep whispering that training and awareness are required for a continuously improving program. Odds are 2020, and now 2021, have ushered in an incredible amount of change to your program – such as new software, evolving methodology, new team members, etc. And we can’t train everyone on Zoom! This presentation will cover the importance of a well-organized resiliency training strategy including: the different types of effective training, delivery models that will work for you, how to train a dispersed and overwhelmed workforce, and how you can do it yourself. Following the presentation, all attendees will receive a free training video titled, “Back to the Office after Covid-19” branded for your organization and licensed to use internally.