Category Archives: BS 25999

Join us @ 2011 Business Continuity Awareness Week BCAW 2011

Business Continuity Awareness Week 2011: March 21st to 25th

B.C.C MANAGEMENT IS PARTICIPATING IN THE WORLD BUSINESS CONTINUITY AWARENESS WEEK.

Join us and book your place now for the webcast ” IT DISASTER RECOVERY IN THE BUSINESS CONTINUITY MANAGEMENT”

Business Continuity Awareness Week (BCAW) is the global educational event designed to help people understand more about business continuity management, its applications and benefits.

BCAW is facilitated by the Business Continuity Institute (BCI), the prestigious international membership body for business continuity management with over 5,000 members in 90 countries.

Join us along leading industry professional, ( Deloitte, Oracle, British standard institute BSI, EBAY,  and many others)

 

http://www.bcaw2011.com

http://www.bccmanagement.com

Business Continuity Institute, BCI Exam Certification process.


Those candidates who successfully pass the BCI Certificate are entitled to use the post-nominal credential of CBCI – they are not members of the Business Continuity Institute but are expected to uphold the Code of Practice and Ethics. CBCIs will have the opportunity to be placed on a register of those holding this credential (an annual fee is payable). They will also be invited to apply for professional membership of the Business Continuity Institute if they are able to demonstrate sufficient practical application of their knowledge. Professional membership grades include AMBCI, SBCI, and MBCI.

After successful payment, your information will be filled out towards the CBCI Application. This form requires basic demographic information, details about prior work history in Business Continuity Management, and the provision of 2 referees. A current resume is also required to submit the application.
Once submitted, an Education Consultant will contact you within 4 working days, usually sooner, to provide you an authorization to test letter, which will include a link for you to choose a venue date and time.

The examination (English language) consists of 120 multiple choice questions which the candidate will have 2 hours to complete.

What happens after the examination?

At the end of examination all candidates should receive an immediate confirmation notice that their answers have been submitted by for marking. This confirmation will show where results will be sent – please check this for accuracy.

Results should be available within 4 to 6 weeks after the examination and will be mailed to the address shown on the confirmation notice. Under no circumstances will scores or pass/fail information be released over the phone.

Email support@bccmanagement.com to help you book your exam.

OTTAWA OPERATION CENTER OC

MAILING ADDRESS
P.O BOX 42054
RPO ST LAURENT
OTTAWA, ON, K1K 4L8
CANADA

Tel: +1.800.961.7592
Fax: +1.613.248.5149
TORONTO HEAD OFFICE HO
4915 BATHURST STREET, UNIT # 209-338
TORONTO, ON, M2R 1X9
CANADA
Tel: +1.800.961.7592

Middle East Regional Office

P.O.Box 116-5108
Beirut -Lebanon
Tel: +961.7061.9274
Fax: +961.923.2406
ttp://lebanon.bccmanagement.com

20 steps for securing your Information Technology, Microsoft Windows Business environment.

Technology alone will not solve the IT security problem.

Technology is an important part, but only a part of a comprehensive information security solution. Equally important is the development of an information security policy for your company, an assessment of your current situation, and training for all users and process owners.
Securing the internal network is as important as securing the external network (ex-employees, contractors, temporary personnel, fired employees, Viruses …)
Also never think that Security incidents won’t happen in your organization, no matter how big or small you are, because it does and once it hits it hits hard.

It is a must that the technical implementation is actually drafted from a policy not just on the ground only.

Security is part of an organization internal process never to be outsourced, Technical capabilities can be found outside but the process should be owned by the organization only.
Below are some 20 steps to consider for securing your Information Technology, Microsoft Windows Business environment:

 One man do it all should not exist in your organization, small or big since it is a serious threat.
One man show was a phenomenon and is becoming more since the economy recession and this may lead to the organizations depending on one single person to do the Security/IT administration job and the High potential risk of losing him and its consequence on the job and security aspect. (Retirement, Firing, Resignation or Sudden Death)

 Lock down your workstations and Network
Don’t Allow End Users and Administrators to Log On as Administrator
Create an alternative account non administrator for administrators, to do the daily work and when admin privileges is needed use the RunAs Feature, the application will run in administrator account privileges.

 Disable Booting from CD, USB and everything else but the Primary Hard Disk, and put a password on the Bios.
With that in place no change can be done, or any trials of booting from alternative.

 Rename the Administrator and Other Highly Privileged accounts, first thing a virus tries is to get admin privileges using the administrator account and trying passwords and if it is renamed with a strong password then it is 100 % Safe

 Defeat Password Crackers Enable password complexity in your environment no matter what.
And enabled password lockout (be careful Viruses e.g.: Conficker.C) Disable LM hashing. And enable NTLM version 2 and run (LC 4 to test Cracking SAM)

 Strengthen Windows Services.
Disable un-necessary service e.g. telephony or schedules.
Define the log on as a services accounts as a GPO.
Change Standard ports for Example SQL Server.

 Work on NTFS permission for users files and important executable
And be careful on the registry it is an important part of security which you must secure, Firstly if it is possible to stop remote registry access, and always deny non admin user to have write on it.

 Run Firewall, antivirus, spyware on local Workstation and on networks for example internet/email gateway (in case the antivirus on the Workstation is outdated or disabled) have different brands make sure you antivirus can’t be disabled or killed.
Separate the external network from the internal, using DMZ; never Ever publish any service directly to internet from the internal network.

 Patch, Patch and Patch
Nothing more important as patching as an organization you need a patch management solution, there is plenty in the market for Example Windows SUS which comes for free.
Others such as SMS, GFI, Shavlik.

 Get a remote access solution, in case there is a need for it or in case a disaster hit and no accessibility to the premises.

 Get and Have an effective backup/Restore solution, Test Backups Frequently, and don’t forget to integrate it to the policy.

 Disable FTP access to the outside world.

 Invest in your network:
Get network firewalls (from layer 1 to layers 7 today’s viruses are on all layers) for VPN/IPSec Tunnels and segregation of network (VLANS)
Get web and email filters but an intrusion prevention system.
And not forgetting someone dedicated to look at the logs otherwise all the investment is thrown away
Also encrypt tunnels or data if you have more than one branch, never send clear data and never presume it is safe.

 Lock, Log and protect the IT Server Room/Data Centre (theft, Fire, breaking, leakage)

 Clustering Alone is not enough using Data replication where adequate also. Since Clustering only protects application failure not data.

 Do periodic external checks using Nesuss or any other product just to see if you are exposed to the outside world.

 Be careful of SNMP Components to change the password never leave them to defaults since a virus/technical person can issue command to shut them down or unauthorized access to the components can happen, which may lead to undesirable events.

 Have all your employees acknowledge formally the IT/Security Policies and procedures.

 Wireless:
Be careful from wireless Networks if they are configured wrongly.
Always have them behind a firewall; always use high encryption and never use static password connect them to a Radius server or any other password mechanism for ultimate security.

About BCCManagement:
We’ve been in Business since 2006, we have participated in several related International Conferences and seminars held in many countries including Canada, United Kingdom, and the United States.

Also, we published numerous Business Continuity studies and articles in renowned magazines and international websites, noting that BCCManagement had been actively involved in the development of standards dealing with Business Continuity namely the Business Continuity Standard BS25999.

In 2009 BCCManagement has done a corporate partnership with Business Continuity Institute BCI to Bring It’s Client the state of the art Business Continuity practice.

Business Continuity Training in LEBANON – Beirut October 5-6 2009 B.C.C Management Canada – Lebanon

business continuity

BCC Management Canada – Lebanon, Is proud to present Business Continuity Training in Lebanon on October 5-6 2009 in Radisson Hotel – Beirut Lebanon.

Recommended Participants:
::: Business Continuity Managers
::: MIS / I.T Managers
::: Project Managers
::: Head of Operations
::: Audit Professionals
::: Internal and External Auditors
::: Financial Controllers
::: Risk Manager
::: IT Security Manager

Objectives:
The Objective of this course is to facilitate the
participants to understand the Business
Continuity concept.

The Course Content will cover 5 major processes
as endorsed by the Business Continuity Institute BCI.

::: Understand your business
::: BCM Strategies
::: Developing a BCM Response
::: Developing a BCM Culture
::: Exercising, Maintenance & audit
::: Understanding compliance requirement regarding Basel ii, BDL.
ISO 27002 and BS 25999

Outcome of the Course:
::: Understanding of the different standards
(BS 25999 and ISO 27002)
::: Understand how BCM works towards your organization
::: Understand the Benefit of Business Continuity Management
::: Understanding how to be an accredited certication

Material Provided:
::: Workshop Manual
::: Support documents & Solutions for exercises (ON CD)
::: Course certificate
::: BCM Case Studies (ON CD)

Registration:
Price: 530 USD
Includes:
::: Lunch
::: Free Internet Available

To Download the registration form :
lebanon.bccmanagement.com/ or
lebanon.bccmanagement.com/registration.doc
Email it to info@bccmanagement.com
Or Fax it to +961.9.232406

bci

http://www.facebook.com/event.php?eid=160537960405&ref=mf
http://events.linkedin.com/Business-Continuity-Training-LEBANON/pub/120404

About BCCManagement:
We’ve been in Business since 2006, we have participated in several related International Conferences
and seminars held in many countries including Canada, United Kingdom, and the United States.
Also, we published numerous Business Continuity studies and articles in renowned magazines and international
websites, noting that BCCManagement had been actively involved in the development of standards dealing with Business Continuity namely the Business Continuity Standard BS25999.
In 2009 BCCManagement has done a corporate partnership with Business Continuity Institute BCI to Bring It’s Client the state of the art Business Continuity practice.

ISO 27002:2005

business continuity
ISO 27002:2005
Information technology — Security techniques — Code of practice for information security management
ISO/IEC 27002 part of a growing family of ISO/IEC ISMS standards, the ‘ISO/IEC 27000 series’ is an information security standard published by the International Organization for Standardization (ISO) and the International Electro technical Commission (IEC) as ISO/IEC 17799:2005 and subsequently renumbered ISO/IEC 27002:2005 in July 2007, bringing it into line with the other ISO/IEC 27000-series standards. It is entitled Information technology – Security techniques – Code of practice for information security management. The current standard is a revision of the version first published by ISO/IEC in 2000, which was a word-for-word copy of the British Standard (BS) 7799-1:1999.
ISO/IEC 27002 provides best practice recommendations on information security management for use by those who are responsible for initiating, implementing or maintaining Information Security Management Systems (ISMS). Information security is defined within the standard in the context of the C-I-A triad:
the preservation of confidentiality (ensuring that information is accessible only to those authorised to have access), integrity (safeguarding the accuracy and completeness of information and processing methods) and availability (ensuring that authorised users have access to information and associated assets when required).
Contents

Outline of the Standard
After the introductory sections, the standard contains the following twelve main sections:
1. Risk assessment
2. Security policy – management direction
3. Organization of information security – governance of information security
4. Asset management – inventory and classification of information assets
5. Human resources security – security aspects for employees joining, moving and leaving an organization
6. Physical and environmental security – protection of the computer facilities
7. Communications and operations management – management of technical security controls in systems and networks
8. Access control – restriction of access rights to networks, systems, applications, functions and data
9. Information systems acquisition, development and maintenance – building security into applications
10. Information security incident management – anticipating and responding appropriately to information security breaches
11. Business continuity management – protecting, maintaining and recovering business-critical processes and systems
12. Compliance – ensuring conformance with information security policies, standards, laws and regulations
Within each section, information security controls and their objectives are specified and outlined. The information security controls are generally regarded as best practice means of achieving those objectives. For each of the controls, implementation guidance is provided. Specific controls are not mandated since:
1. Each organization is expected to undertake a structured information security risk assessment process to determine its specific requirements before selecting controls that are appropriate to its particular circumstances. The introduction section outlines a risk assessment process although there are more specific standards covering this area such as ISO/IEC 27005.
2. It is practically impossible to list all conceivable controls in a general purpose standard. Industry-specific implementation guidelines for ISO/IEC 27001 and ‘27002 are anticipated to give advice tailored to organizations in the telecomms, financial services, healthcare and other industries.

The control objectives and controls in ISO/IEC 27002:2005 are intended to be implemented to meet the requirements identified by a risk assessment. ISO/IEC 27002:2005 is intended as a common basis and practical guideline for developing organizational security standards and effective security management practices, and to help build confidence in inter-organizational activities.

References:
Wikipedia.org
iso.org

About BCCManagement:
We have been in Business since 2006 we have participated in several related International Conferences and seminars held in many countries including Canada, United Kingdom, and the United States. Also, we published numerous Business Continuity studies and articles in renowned magazines and international websites, noting that BCCManagement had been actively involved in the development of standards dealing with Business Continuity namely the Business Continuity Standard BS25999.
BCCManagement Professional team is proudly certified by the “Business Continuity Institute (BCI) England” which is the major international players in Business Continuity field.
For More info:
Business Continuity Consultancy and Management
info@bccmanagement.com http://www.bccmanagement.com

North America +1.800.961.7592 Fax: +1.613.248.5149 P.O.Box 42054- RPO ST Laurent, Ottawa, Ontario K1k4L8, Canada

Middle East office +961.7061.9274 Fax: +961.923.2406 P.O.Box 116-5108, Beirut, Lebanon

Our Partners:
Thebci

Business Continuity Middle East Presence – BCCManagement


Business Continuity Consultancy and Management (BCCManagement) is delighted to announce its presence in the Middle East.

Business Continuity Management:
Is about anticipating the events or circumstances that could hinder the running of a business, and planning to make sure that the business responds swiftly and continue to function in the event of an emergency. A business continuity plan sets out clear roles and responsibilities, for example those assigned to manage all liaison with customers, employees and the emergency services. It lists a series of contingencies that enable key business activities to continue in the most difficult circumstances.

Some examples of threats to a business are:
• A vital computer system or telecom is unavailable.
• Critical process machinery is damaged.
• Loss of key employees due to sudden death, illness.
• Bomb/Terrorism threat.
• Natural disasters such as tornadoes, floods, earthquakes and fire.
• Pandemics.
• The building, or part of the building, or office, cannot be accessed, and.
• Suppliers are unable to deliver.

What BCCManagement can offer you?
• A full Study for Business Continuity Planning.
• Review existing Business Continuity Plans.
• Business impact analysis.
• I.T Disaster Recovery, Information Technology Solutions.
• Review of disaster recovery plans.
• Awareness and Training.
• Compliance with BS25999.
• I.T Security Consultancy.
• Data Replication Solutions.
• SMS Emergency Notification System

About BCCManagement:
We have been in Business since 2006 we have participated in several related International Conferences and seminars held in many countries including Canada, United Kingdom, and the United States. Also, we published
numerous Business Continuity studies and articles in renowned magazines and international websites, noting that BCCManagement had been actively involved in the development of standards dealing with Business Continuity namely the Business Continuity Standard BS25999.
BCCManagement Professional team is proudly certified by the “Business Continuity Institute (BCI) England” which is the major international players in Business Continuity field.

BCC Management Has partnered with Different Associations and Vendors and professional bodies to being its customers Value added services.

BCI partnership:
Was launched in 2007 to enable organizations to work with the Business Continuity Institute to deliver the overall BCI mission of: Promoting the art and science of business continuity management worldwide.

The Corporate partnership aims to achieve the highest standards of BCM practice Corporate Excellence in Business Continuity Management.

-Bronze level partnership with Business Continuity institutes BCI
-Strategic Golden partnership with Business Continuity ME – BCME
-Disaster Recovery institutes Exchange – DRIE
-Continuity Forum
-Business Continuity software Provider
-Online Data Disk Storage and backup

**Ask For our free analysis on the current Business Continuity status of your organization.

For More info:
Business Continuity Consultancy and Management info@bccmanagement.com http://www.bccmanagement.com
North America +1.800.961.7592 Fax: +1.613.248.5149 P.O.Box 42054- RPO ST Laurent, Ottawa, Ontario K1k4L8, Canada
Middle East office +961.7061.9274 Fax: +961.923.2406 P.O.Box 116-5108, Beirut, Lebanon

BS 25999 Business Continuity Assessment Process

BCCManagement.com Highlights the BSI BS25999 CERTIFICATION PROCESS

TAKING THE NEXT STEP:

ACCORDING TO BSI-GLOBAL

Initial Assessment

Stage 1
The following aspects will be covered:
Review of the organization’s BCMS documentation
High level evaluation of the organization’s readiness

Stage 2 assessment Review the organization’s understanding of the
requirements of the standard Understanding of the proposed scope of the stage 2 assessment
Review and confirm the resources needed for the stage 2 assessment
Plan the stage 2 assessment
Ensure that Management Reviews and audit/self assessments are being planned and performed Any areas deemed not in compliance will be raised as nonconformities and must be cleared and approved by the
lead auditor prior to moving into the Stage 2 phase of the
certification audit.

Stage 2

The purpose of the stage 2 audit is to evaluate the
implementation, including effectiveness, of the
organization’s BCMS.

This phase is carried out using the process audit approach.
Unlike a checklist approach, the audit approach assesses
all processes included in the scope of operation and all linked
processes to ensure effectiveness and consistency. This will
include interviews with the stakeholders, gathering of
objective evidence (procedures, reports and test results)
and evaluating those findings against the standard.
Any areas deemed not in compliance and/or effective will
be raised as nonconformities and must be cleared and
approved by the lead auditor prior to being recommended
for certification.

Surveillance Audit
The first surveillance visit is typically planned to take place
yearly after the date of the stage 2 audit.
BSI will perform periodic monitoring audits of the certified
organization’s BCMS. Typically, an organization may be
visited for such an audit once a year. The purpose of these
monitoring audits is to verify the certified organization’s
continued compliance with certification requirements.
Surveillance audits typically cover critical activities that ensure
continuous improvement and effectiveness such as:
Management review and audits/self assessments
Review of actions taken on nonconformities from previous audits
Effectiveness of the BCMS
Progress of planned activities aimed at continual improvement
Verifying the effective interaction among all BCMS elements
Continuing operational control

Review of any changes
Use of marks and any other reference to certification
Verifying a demonstrated commitment by the organization
to maintaining the BCMS effectiveness

Reassessment

The purpose of the reassessment audit is to confirm the
continued conformity and effectiveness of the BCMS and
its continued relevance and applicability for the scope of
certification. The reassessment audit will typically include
the following aspects:
The effectiveness of the BCMS in its entirety in the light of
internal and external changes and applicability to the
scope of certification.
Demonstrated commitment to maintain the effectiveness
and improvement of the BCMS in order to enhance overall
performance.

Whether the operation of the certified BCMS contributes to
the achievement of the organizations policy and objectives.
All steps noted are typical accepted practice based on ISO 17021
and subject to revision at anytime.

Any areas deemed not in
compliance and/or effective will
be raised as nonconformities and
must be cleared and approved by
the lead auditor prior to being
recommended for certification.

BSI Management Systems How to deploy BS 25999

CONCLUSIONS

BS 25999 establishes the processes, principles and
terminology to address business continuity and availability
risk. It also provides a comprehensive set of controls based on
industry leading practices that help organizations develop,
implement, maintain and mature business continuity
processes. The standard can be used as a framework so that
those organizations without a BCMS can efficiently establish
a workable program, and those that already have a program
can ensure it meets best practices where applicable.
The growing consensus regarding BS 25999, combined with
the opportunity to become certified in its use, provides
unparalleled benefits to companies of all sizes whose
customers rely on their products and services

Reference:
BSI Global