Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Business Continuity-Disaster Recovery Planning

Welcome to the Business Continuity-Disaster Recovery Planning topic!

Collaborate, contribute, consume and create knowledge around topics such as business impact analysis (BIA), business continuity planning (BCP), and disaster recovery planning (DR).

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
835 Members
0 Online
8863 Visits

 Recent Discussions

BIA for a military organization. Posted by Oscar.
BCP of Head Office or Subsidiary?. Posted by Faisal Abdullah.
Call for Papers and Discount Code for ISACA Ir... Posted by Neil_Curran.

Community Leader



Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 48 total

Must be a Topic member to contribute
View All »
Hello Everyone, I was wondering how different is performing a BIA for a private company than from a military organization.  Of course, the goals and objectives for both are quite different, thus, for instance, loss of revenue or goodwill may not apply pe...
Oscar | 8/26/2014 11:27:21 AM | COMMENTS(7)
There is an organization (subsidiary) of about 1000employees where SAP is running as core ERP. SAP Servers are placed in the DataCenter at Head Office which is out of the country. Now, in this scenario, Headoffice must have BCP in place, however, what abo...
Faisal Abdullah | 8/22/2014 10:06:21 AM | COMMENTS(7)
Hi Everyone, I'm the chapter president of ISACA Ireland and would like to let members of this topic know that we are seeking innovative, practical and / or thought provoking session proposals for our conference on 3rd Oct 2014.  For knowledge center membe...
Neil_Curran | 8/12/2014 8:49:22 AM | COMMENTS(2)
Hi Everyone, As a topic with nearly 750 members, I hope that there is the ability to provide data or information that you can utilize for your personal knowledge or career.  Please feel free to ask questions, post requests, or let me know how I can assist...
SArndt | 7/20/2014 5:05:22 AM | COMMENTS(2)
With additional timely reaction needing to occur for breach related events, does your organization practice incident management and response as part of your business continuity tabletop exercises?  Are other groups outside of IT included in this training?...
SArndt | 7/18/2014 2:19:35 AM | COMMENTS(2)
Many different organizations structure their BCP/DR programs in different ways.  I'm curious on how your organization manages BCP/DR, and where it fits in the organization.  Some examples could be: BCP is managed by each business process, DR is managed by...
SArndt | 4/8/2014 9:07:54 AM | COMMENTS(0)

Documents & Publications: 32 total

Must be a Topic member to contribute
View All »
Posted by ISACA 101 days ago
Posted by ISACA 154 days ago
Posted by ISACA 163 days ago

Events & Online Learning: 2 total

6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
29 Sep 2014
ISACA International Event
Barcelona, Spain
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM 2014—the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 53 total

Volume 4, 2014
by Haris Hamidovic, Ph.D., CIA, ISMS IA
The fire protection strategy for computer rooms should be formulated after determination of, or in conjunction with, the choice of a disaster recovery plan.
Volume 4, 2014
As enterprises increasingly rely on IT to succeed, effective IT risk management has become an essential component of IT governance.
Volume 3, 2014
by Steven J. Ross, CISA, CISSP, MBCP
The issue is no longer whether cyberattacks occur, but what to do about them.
Volume 3, 2014
by Tommie Singleton, CISA, CGEIT, CPA
The need for consideration of IT in internal and external audits seems intuitively obvious.
Volume 2, 2014
by Steven J. Ross, CISA, CISSP, MBCP
While certain systems and their associated data may be of obvious importance to a department or an organization as a whole, it does not follow that that which is less evident is not vital to the organization’s welfare.
Volume 1, 2014
by Dauda Sule, CISA
Almost all organizations are now dependent, one way or another, on information technology. This has led to a great deal of development as well as associated risk.

Wikis: 2 total

Blog Posts: 7 total

19 Jun 2014
Posted By : masarker | 2 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 0 comments
Enterprise Architecture (EA) is about holistic understanding of the enterprise including the business side. I had to stress on the business side as sometimes the EA is taken as IT Architecture. EA is a combination of IT and Business Architectures. It take...
Posted By : SA | 0 comments
28 Jan 2014
Welcome to my blog which will be dedicated to views and discussions on Enterprise Architect (EA) and Business-IT Alignment (BITA). I encourage the colleagues to join the ISACA topic group for "Strategic Planning/Alignment" for initiating and promoting...
Posted By : SA | 0 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : Umesh391 | 2 comments