Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Business Continuity-Disaster Recovery Planning

Welcome to the Business Continuity-Disaster Recovery Planning topic!

Collaborate, contribute, consume and create knowledge around topics such as business impact analysis (BIA), business continuity planning (BCP), and disaster recovery planning (DR).

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
1031 Members
1 Online
9976 Visits

Community Leader



Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 52 total

Must be a Topic member to contribute
View All »
How often are you using or even suggesting to use reciprocal agreements with your partners/customers/etc. as an option for your DR plans? (not within the same business) To be honest, I have not encountered a business willing to go into this agreement with...
Donatas | 12/9/2014 1:27:08 PM | COMMENTS(3)
The definition of BCP and DR have been changing over a period of time. This is what I think is the difference between BCP and DR. What do the others in this group think?
Chaitanya Kunthe | 11/26/2014 11:09:24 AM | COMMENTS(31)
Many different organizations structure their BCP/DR programs in different ways.  I'm curious on how your organization manages BCP/DR, and where it fits in the organization.  Some examples could be: BCP is managed by each business process, DR is managed by...
SArndt | 11/24/2014 9:21:13 PM | COMMENTS(2)
What are the options in selecting Standard for BCP / DR for a FMCG company please?  Will appreciate to receive the advice please.Thanks
andani | 11/18/2014 7:37:44 AM | COMMENTS(5)
Due to inherent "collaborative" nature of disaster recovery activities, no company can claim that it will recover IT systems and processes 100% without impacting the business. It's a collaborative effort, application development dept. and operations depar...
syed-adnan-shahab | 11/16/2014 1:39:49 AM | COMMENTS(0)
I appreciate a help to find a guideline to review the organization DR plan, So I can have specific points to check it will be better if I have a reference/template anyone can share to use as a guideline. thanks,
AHMED359 | 10/28/2014 12:26:40 AM | COMMENTS(5)

Documents & Publications: 29 total

Must be a Topic member to contribute
View All »
Posted by ISACA 214 days ago
Posted by ISACA 268 days ago
Posted by ISACA 277 days ago

Events & Online Learning: 2 total

6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
29 Sep 2014
ISACA International Event
Barcelona, Spain
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM 2014—the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 56 total

Volume 6, 2014
by Eric A. Beck
Corporate risk managers and security professionals understand that risk is not a problem that can be solved, but rather a process that must be managed.
Volume 6, 2014
by Flint Brenton
While there is no one-size-fits-all solution to securing every network, the following seven mistakes of current SIEM systems must be solved to effectively secure data in the modern enterprise.
Volume 5, 2014
by Steven J. Ross, CISA, CISSP, MBCP
“CERT,” in the context of information security, is a term with a long and noble pedigree.
Volume 4, 2014
As enterprises increasingly rely on IT to succeed, effective IT risk management has become an essential component of IT governance.
Volume 4, 2014
by Haris Hamidovic, Ph.D., CIA, ISMS IA
The fire protection strategy for computer rooms should be formulated after determination of, or in conjunction with, the choice of a disaster recovery plan.
Volume 3, 2014
by Steven J. Ross, CISA, CISSP, MBCP
The issue is no longer whether cyberattacks occur, but what to do about them.

Wikis: 2 total

Blog Posts: 8 total

“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments
13 Nov 2014
Now a days, you don’t need to be a IT guru or best software programmer to access /control other personal/organization data. If you follow below techniques, you can easily get confidential information.1. Masquerading2. Tailgeting (Piggy back)3. Dumpster di...
Posted By : Shaklain | 1 comments
Enterprise Architecture (EA) is about holistic understanding of the enterprise including the business side. I had to stress on the business side as sometimes the EA is taken as IT Architecture. EA is a combination of IT and Business Architectures. It take...
Posted By : SA | 0 comments
28 Jan 2014
Welcome to my blog which will be dedicated to views and discussions on Enterprise Architect (EA) and Business-IT Alignment (BITA). I encourage the colleagues to join the ISACA topic group for "Strategic Planning/Alignment" for initiating and promoting...
Posted By : SA | 0 comments