Fundamentals of BCM
Fundamentals of BCM
leadership
The fundamentals of business
continuity management
Contents
The path to digital leadership
Introduction 3
Action planning 13
Incident detection 16
2022
Checklist 19
The fundamentals of business continuity management
Conclusion 20
2
Introduction
The path to digital leadership
3
Implementing BCM enables the company to act as a single organism
The path to digital leadership
4
Why implement
The path to digital leadership
BCM tools
The role of BCM has become particularly prominent over the last
few years.
When the world was faced with the pandemic, many found themselves
unprepared. Our research showed that 1 in 5 companies failed to keep
service quality at the same level when they moved to remote operations.
Numerous organizations were struggling to maintain their business
processes, including those related to cybersecurity. The reasons for
this were the heavy workload on their staff, time constraints, and a lack
of technical tools and capacities. The companies most affected by such
challenges allocated very few (to none) resources for predicting possible
emergencies and developing effective action plans.
The exodus of foreign IT vendors from the Russian market in 2022
has demonstrated the importance of BCM mechanisms. Focusing
on the company’s operating environment, identifying business-critical
2022
RE
CA IT
ALTH
HE
2.4
MEDIA
IONS
2.4
1.4
ICAT
A
ND E-C
MUN
2.8
OMM
2.7
TELE
ERCE
1.2
1.5
3.1
N
IO
3.1
T
RE
TA
TA
OR
I
SP
L
3.1
AN
TR
3.2
FINANCE
5 1
To learn more about our approach to the research, refer to Threat Zone 2020,
“Cybersecurity maturity across industries.“
The examples below were derived from our practical experience and highlight
The path to digital leadership
the possible consequences for a company without any BCM tools in place.
10x
increase in customer outflow
caused by cybercriminals
6
Compromised
The path to digital leadership
corporate systems
Company B’s employees detected suspicious activity on their network. It was
soon discovered that some attackers had gained access to a privileged account
on the computer that was used to administer the company’s entire network.
The attackers could have potentially disrupted all of the organization’s business
processes and stolen funds from its accounts.
The investigation revealed that behind the attack was a notorious cybercriminal group
called Silence. The intruders were able to penetrate the critical system because
an employee opened a malicious Word file when logged in. From the compromised
machine, the attackers infected the organization’s entire network with several remote
access tools.
31% €43,000
of our external pentesting projects lost by the company due to
resulted in the compromise repeated attacks on its systems
7 of internal networks
Information attack
The path to digital leadership
understanding the severity of the damage due to the stock decline would have
prompted Company C to timely assess the consequences of negative publications
as well as insider leaks.
almost 25%
of the company’s share value lost
following an information attack
8
Website hacked through
The path to digital leadership
Further, the experts restricted third-party rights in the GTM administration panel.
Although such attacks are difficult to predict, organizations need to prepare to repel
them. BCM mechanisms would have helped to draw up scenarios for incidents that
occur through the fault of employees or contractors. Based on this, an effective
response can be developed that allows processes to be restored with minimal loss.
9
7 steps to implement
The path to digital leadership
BCM
BCM is a cyclical process whose components can be broadly divided into two groups:
tools development and incident response actions.
of an incident.
Contain the incident, mitigate its effects, and recover the affected
02 processes.
03 Analyze the root causes of the incident and review your current tools.
10
Connections between the BCM components are presented in the diagram below.
The path to digital leadership
Context
Market Business
processes
Environment External Internal
Requirements
Threats Damage
2022
Reassessment
Planning
The fundamentals of business continuity management
Monitoring Response
11
For a start, let’s look into the steps required at each stage
The path to digital leadership
60%
of companies overlook information
assets during inventory
12
Business impact analysis
The path to digital leadership
Action planning
2022
13 2
D. Lee, “Uber concealed huge data breach,” BBC.
The BCP should set the key continuity parameters:
The path to digital leadership
14
Implementation and testing
The path to digital leadership
15
Now that we have delved into the stages of BCM implementation,
The path to digital leadership
Incident detection
The purpose of this stage is to determine further actions based
on the information about the incident and its implications.
These are the recommended steps to take:
1. Collect as much intelligence as possible that would help to analyze
the incident: what happened, who discovered the incident, and what
measures were taken.
2. Report the incident to your in-house response team or the outsourced
specialists. A minor incident may be reported to a security expert and
an IT specialist alone.
3. Document the incident.
4. Assess the extent of compromise: the potential consequences,
the suspended business processes, and the time and resources it will take
2022
16
Mitigation, remediation,
The path to digital leadership
and recovery
The purpose of this stage is to minimize the consequences
of the incident.
The first steps are as follows:
• Assess the measures you have taken.
• Try to isolate the systems that might be infected. Where this is
not possible, enhance the monitoring. In this step, you can launch
investigation procedures. In this step, you can launch investigation
procedures.
• Check all the systems to make sure the incident has not affected
the entire infrastructure.
• Eliminate the cause of the incident.
• Determine whether the affected systems can be recovered. If not,
prepare a further action plan factoring in the lost infrastructure
components or critical data.
These will provide you with a basis for a safe recovery of your business
2022
processes.
In the course of recovery:
1. Estimate when the affected business processes can be restored.
Consider the investigation specifics: a system might have to be
isolated for the time of the examination.
The fundamentals of business continuity management
17
Revision of existing measures
The path to digital leadership
The purpose of this stage is to identify and rectify the shortcomings that
resulted in an incident.
These steps will help in revising the measures:
• Are the documents easy to read for all employees? Are there any
sections written in difficult language and hence hard to understand?
• Are the issues encountered during the incident covered
in the documents?
18
Checklist
The path to digital leadership
Determine when you last analyzed the digital trends. If your research was
conducted more than six months ago, it is time for another round. Analyzing
trends assists in predicting events that can affect business in the short and long
term.
Take inventory of your digital assets. The complete picture will enable informed
decisions, such as software replacement, help to detect weaknesses in the IT
infrastructure and plan further steps to strengthen your defenses.
Create a cyber incident response team. Identify the key stakeholders (PR, legal,
HR, and IT units, company executives, client support) to inform and involve
in case of an incident.
Make sure that the technical cybersecurity tools are suitable for your company
2022
Check your technical defenses: they must be properly configured and updated
to the latest versions.
Make sure that the incident response documentation is simple and clear.
The fundamentals of business continuity management
Prepare a plan to improve cyber literacy among the line personnel and
executives.
19
Conclusion
The path to digital leadership
20