Practice makes perfect - so put your BC/DR plans to the test This set of 3 tabletop exercises has proven popular over the intervening years, so here’s another troika for testing your processes for resilience or recovery. You know the drill: Appoint a moderator, gather a team representing multiple departments within the organization (and ideally some outside business partners as well) and work through a scenario, one stage at a time. Allow interaction and discussion after each segment’s information is released. Does each department have the necessary processes in place to handle the given sequence of events? How will the necessary communication take place? What unforeseen employee needs might arise? Are business partners adequately prepared? Modify these exercises to best fit your particular organization’s profile. scenario one: Chemical Explosion Segment One: Rail cars carrying a highly flammable chemical compound explode near the data center, taking out a section of track and a stretch of two-lane road at an adjacent crossing, spewing toxins into the air. Data center employees hear the blast and begin frantically contacting family, colleagues and emergency services. Emergency services deploy and call for a general evacuation, including the data center and its attached offices. Segment Two: Due to the toxins, the fire department insists that the data center evacuate immediately. Data center technicians can’t fire up the diesel engines because they may spark, igniting the toxins, so the data center must go completely dark. Fearful employees, including some of the people needed to switch the data center over to the disaster recovery (DR) or backup site, leave to pick up children and elderly family members. All this leaves the data center without the time or expertise to declare a disaster, cut over to the remote DR site, and power down and close the facility properly. The data center loses untold quantities of data in the process. Segment Three: Management attempts to notify team leaders to interact with each other to escalate communications and response as everyone is leaving. But in the panic, and with smartphones tied up contacting loved ones, the chain of communications breaks down. The fire department informs management that their designated meeting place is inside the danger zone and they must pick a new meeting place and inform all employees to go directly there. Management does not have a second location in place further out and chooses a parking lot near a busy highway intersection, during rush hour and the evacuation of the larger area. Segment Four: Not everyone receives updates about the new meeting place, so while some go to a safe meeting spot, others go to the original meeting area, and still others don’t show up at all. The wind picks up, moving the toxic air toward the first meeting area. Reporters, who are asking lots of questions, meet the people who make it to the furthest meeting place. These employees are not the marketing-savvy media relations executives, so they are not able to give appropriate status updates and instead say things to the media that are inappropriate, inaccurate and misleading, causing further confusion and panic. -With suggestions from Bob DiLossi, director of crisis management at Sungard Availability Services scenario two: Primary Supplier Cannot Deliver Segment One: The enterprise receives a call from a primary vendor, a supplier of raw materials for the company. The vendor-supplier has experienced significant damage to its manufacturing plant from a hurricane, and there are no forecasts as to when the plant will be back up and running. At this time, the vendor can only speculate that it will be able to ship 30 percent of the usual order. This material is a critical component of the enterprise’s finished product and is usually most available from this single-source vendor, with few if any other vendor-suppliers. Segment Two: Upon further inspection by the vendor and the regulatory agencies in the vendor’s industry, the vendor has shut down the plant with its damaged facilities and equipment until it makes all necessary repairs. The vendor will not make any product deliveries for at least two or three months. Without critical supplies, the enterprise cannot provide finished products or services to its customer base. There is a small reserve of materials onsite that will last about 35 days. Segment Three: The enterprise will need to qualify an alternative material supplier that meets requirements laid out by client agreements and industry regulations. If the enterprise does manage to identify a supplier, it may be located overseas, creating new logistics challenges. The enterprise starts looking closely at two potential qualifying vendors, one in China and one in a small, volatile developing country in the east. Segment Four: When vetting the potential vendor in China, the enterprise uncovers a trail of broken contracts in which the foreign vendor supplied diluted raw materials that were deemed unsatisfactory. The enterprise turns to the one remaining producer of the raw materials. As the enterprise is about to reach full approval for the new supplier, an internal conflict breaks out in the small eastern nation, a coup ensues and powers opposing the new leadership call for boycotts of the small country’s exports, including raw materials, putting pressure on the enterprise’s international relations. -With suggestions from Mark Madar, director of risk management and quality assurance at CBIZ Risk and Advisory Services scenario three: Angry IT guy Segment One: A systems engineer or administrator who foresees imminent layoffs is working on internal systems. The enterprise has upgraded his access rights and turned off monitoring systems so he can complete his work. Due to fears of termination, he installs back doors everywhere. Because the enterprise elevated his administrative privileges and disabled the monitoring systems, and because he uses stealthy back doors that are set to activate after the company fires him, IT has no visibility into what he has done or what will happen in the coming months. Segment Two: The enterprise fires the systems guy, along with many of his colleagues and friends, in a massive layoff. Once the back doors open, he siphons off stores of intellectual property and customers’ personally identifiable information. He next launches a malicious, stealthy attack that renders multiple data backups useless. The data center is unaware of this until some time later, when it tries to restore data in a crisis. Segment Three: During the crisis, the data center discovers that the data is corrupted and so attempts to restore from backups. Finding the disk-based backup data unrecoverable, IT must rely on tape backups, losing the most recent week’s data, which was not yet archived. In the meantime, the disgruntled ex-employee finds a buyer for the stolen data on the black market and sells it for less than its true worth. Segment Four: The black market data buyer is part of a hacker group that holds stolen data for ransom. On a highly visible website, the hackers publish just enough of the data to prove they have it, and demand a larger sum than they paid for it to return the data without publishing or re-selling it further. While the enterprise mulls its options, regulatory bodies get wind of the data-protection fiasco. The media reports on the shocking debacle just as affected parties and customers launch a massive lawsuit. As e-discovery begins, the enterprise realizes it will not be able to produce at least a week’s worth of data. -Based on suggestions from Brian Barnier, principal analyst at ValueBridge Advisors, and Jeremy Suratt, senior solutions marketing manager at Iron Mountain’s Data Backup and Recovery practice Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe