Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Business Continuity-Disaster Recovery Planning

Welcome to the Business Continuity-Disaster Recovery Planning topic!

Collaborate, contribute, consume and create knowledge around topics such as business impact analysis (BIA), business continuity planning (BCP), and disaster recovery planning (DR).

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1758 Members
1 Online
14881 Visits

Community Leader

SArndt

SArndt

Badge: Observer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 80 total

Must be a Topic member to contribute
View All »
Hello all, I was wondering if anyone had a template or guide on developing a disaster recovery plan using COBIT. I haven't had the opportunity to prepare a DRP from start to finish and am seeking some guidance.
GBarrie | 7/22/2016 11:55:48 AM | COMMENTS(2)
I am reviewing DSS04 Manage Continuity and would like some confirmation on DSS04.08 Conduct post-resumption review to make sure I understand the meaning behind the management practice. Does DSS04.08 deal with resumption of business at the ALTERNATE SITE o...
Lloyd Majeski | 7/20/2016 10:48:31 AM | COMMENTS(1)
DR strike, first it look like incident but soon it becomes a measure disaster. Is there any formula to use when to switch?
nooruddin | 5/25/2016 1:53:00 AM | COMMENTS(17)
Good Morning Can anyone please share their experiences in Disaster Recovery planning in a virtualised environment for different possible scenarios. How is the DRP to be structured?
Helly263 | 5/24/2016 9:22:36 AM | COMMENTS(1)
Normally in an audit I would check to see that systems/databases etc have been tested for disaster recovery this would include recovery from on site storage and off site storage.  Here is my question.  Users say if they would have to do a full restore of ...
Tina278 | 3/21/2016 11:17:42 AM | COMMENTS(6)
There's a school of thought that IT systems used to develop critical applications require assured levels of service (e.g., availability) so that time critical fixes to application incidents can be developed in a timely manner. Has anyone in this forum had...
Phil Green | 2/26/2016 9:43:37 AM | COMMENTS(1)

Documents & Publications: 31 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 252 days ago
Books
Posted by ISACA 449 days ago
Books
Posted by ISACA 463 days ago
Books
Posted by ISACA 493 days ago

Events & Online Learning: 3 total

9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.
22 Aug 2016
ISACA International Event
Hollywood, Florida, US
2016 GRC Conference - 22-24 August , Fort Lauderdale, FL. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 36 total

Volume 3, 2016
by Aleksandr Kuznetcov, CISM
This article addresses an existing imbalance between technical issues and process aspects related to SIEM.
Volume 3, 2016
by Samuel Shanthan, CISA, CIPM, MBCI
It is of paramount importance to ensure the continuity of vendors, especially those that are providing and supporting the critical services and processes of the organisation.
Volume 3, 2016
by Mustafa S. Poonawala, CISA, ITIL
Every organization, big or small, faces its own black swan and there is little one can do to avoid it. What can be done is taking steps to ensure that its impact is minimal.
Volume 2, 2016
by Sanjiv Agarwala, CISA, CISM, CGEIT, BS 25999/ISO 22301 LA, CISSP, ISO 27001:2013 LA, MBCI
Cybersecurity threats are on the rise. Every organization is connected to one another, and any organization can become the victim of cyberattacks.
Volume 2, 2016
by David Eduardo Acosta R., CISA, CISM, CRISC, BS 25999 LA, CCNA Security, CHFI Trainer, CISSP Instructor, OPST, PCI QSA
The typical postincident cliché assumes that misfortunes are opportunities. Instead, one can methodically prepare using the correct tools to implement a realistic and objective perspective...
Volume 2, 2016
by Leighton R. Johnson III | Reviewed by A. Krista Kivisild, CISA, CA, CPA
The book addresses how to prosecute malicious insiders or external hackers and describes all of the incident response stages that should be followed and completed.

Wikis: 2 total

Blog Posts: 8 total

“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: http://feapo.org/press-release-ea-perspectives-white-paper/ Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments
13 Nov 2014
Now a days, you don’t need to be a IT guru or best software programmer to access /control other personal/organization data. If you follow below techniques, you can easily get confidential information.1. Masquerading2. Tailgeting (Piggy back)3. Dumpster di...
Posted By : Shaklain | 1 comments
Enterprise Architecture (EA) is about holistic understanding of the enterprise including the business side. I had to stress on the business side as sometimes the EA is taken as IT Architecture. EA is a combination of IT and Business Architectures. It take...
Posted By : SA | 0 comments
28 Jan 2014
Welcome to my blog which will be dedicated to views and discussions on Enterprise Architect (EA) and Business-IT Alignment (BITA). I encourage the colleagues to join the ISACA topic group for "Strategic Planning/Alignment" for initiating and promoting...
Posted By : SA | 0 comments