Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Business Continuity-Disaster Recovery Planning

Welcome to the Business Continuity-Disaster Recovery Planning topic!

Collaborate, contribute, consume and create knowledge around topics such as business impact analysis (BIA), business continuity planning (BCP), and disaster recovery planning (DR).

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
2193 Members
1 Online
18626 Visits

Community Leader



Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 105 total

Must be a Topic member to contribute
View All »
Cyber threat has become a global issue and is serious hitting into the technological world. Organisations who want to remain in business and who wish to maintain their customer base must guide their plain in cyberspace with unwavering focus. Do you really...
MOSES824 | 3/2/2018 5:20:26 AM | COMMENTS(0)
Hello All, I am new to Business Continuity, as I just joined this team within my organization. I have been tasked with creating a Business Continuity timeline of projects for the year. So far I have the following projects listed, however, not sure if I am...
Fatou200 | 2/28/2018 3:52:38 PM | COMMENTS(2)
I mean the best strategy to deploy to ensure both Audits can be done by a professional Accountant in a company employment.
MOSES824 | 2/28/2018 8:54:31 AM | COMMENTS(0)
Hello, There used to be a e-Library link somewhere in the ISACA website, which I am not able to find. When I looked up the Sitemap, I found a link under Bookstore, but when I clicked it, it returned a  Page not found error.  I recall that I referred to a ...
SwathikTk | 2/3/2018 3:33:57 AM | COMMENTS(7)
Does anyone know of any frameworks to use when implementing and documenting a BCP? I've seen a number of guides but was curious if there are similar frameworks such as those that exist in other areas (e.g., NIST CyberSecurity Framework). Right now I'm goi...
Lyons4021 | 2/1/2018 2:54:50 AM | COMMENTS(6)
No matter how many searches I perform on the internet I cannot seem to find any explicit language that clearly and unequivocally states DR and BC plans are NOT considered an IT General Control to be tested during SOX controls testing. I have found some po...
mpdsal | 1/3/2018 12:30:40 PM | COMMENTS(4)

Documents & Publications: 19 total

Must be a Topic member to contribute
View All »
Posted by ISACA 861 days ago
Posted by ISACA 1404 days ago
Posted by ISACA 1578 days ago
Posted by ISACA 1661 days ago

Events & Online Learning: 1 total

13 Aug 2018
ISACA International Event
Nashville, Tennessee, US
2018 GRC Conference - 13-15 August , Nashville, TN. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 43 total

Volume 2, 2018
by Steven J. Ross, CISA, CISSP, MBCP
In this era of multi-modal technology, many disaster recovery issues are solved, some are simply transferred and a few are made worse.
Volume 1, 2018
by Ian Cooke, CISA, CGEIT, CRISC, COBIT Assessor and Implementer, CFE, CPTE, DipFM, ITIL Foundation, Six Sigma Green Belt
Innovative technologies such as VMs and the cloud help the efficiency and effectiveness of backup and recovery plans, but they do not replace the need to plan, document, or test and test again.
Volume 3, 2017
by ISACA | Reviewed by Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP
This book is useful for security professionals, consultants and students pursuing cyber security as it provides guidance for identifying/detecting, responding and eradicating targeted cyberattacks.
Volume 2, 2017
by Steven J. Ross, CISA, CISSP, MBCP
It is those three dots that save me from accusations of rank lunacy. (Oh, well, from accusations based on this subject.)
Volume 2, 2017
by Ed Moyle
To understand how the business side of any organization intersects with technology, ask an internal auditor. This might sound counterintuitive at first, but think about what auditors need to know to do their job...
Volume 5, 2016
by Steven J. Ross, CISA, CISSP, MBCP
Still having a base in IS/IT auditing, ISACA now encompasses consultants, educators, IS security professionals, risk professionals, chief information officers and internal auditors

Wikis: 2 total

Blog Posts: 9 total

Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments
“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 1 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments
13 Nov 2014
Now a days, you don’t need to be a IT guru or best software programmer to access /control other personal/organization data. If you follow below techniques, you can easily get confidential information.1. Masquerading2. Tailgeting (Piggy back)3. Dumpster di...
Posted By : Shaklain | 1 comments
Enterprise Architecture (EA) is about holistic understanding of the enterprise including the business side. I had to stress on the business side as sometimes the EA is taken as IT Architecture. EA is a combination of IT and Business Architectures. It take...
Posted By : SA | 0 comments