Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Business Continuity-Disaster Recovery Planning

Welcome to the Business Continuity-Disaster Recovery Planning topic!

Collaborate, contribute, consume and create knowledge around topics such as business impact analysis (BIA), business continuity planning (BCP), and disaster recovery planning (DR).

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
1461 Members
2 Online
12804 Visits

Community Leader



Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 70 total

Must be a Topic member to contribute
View All »
Cloud computing offers many benefits over traditional DR mechanisms by reducing the need for a specified data center, IT infrastructure and IT resources. It enables SMEs (Small- medium enterprises) to deploy DR options in a cost effective manner. On the o...
Gaurav332 | 11/1/2015 12:58:59 PM | COMMENTS(5)
DR strike, first it look like incident but soon it becomes a measure disaster. Is there any formula to use when to switch?
nooruddin | 10/28/2015 2:29:00 AM | COMMENTS(0)
We are in the process of adopting the IT Continuity Planning Audit Assurance Program within our contingency planning and disaster recovery policy. To assist in the development of our audit procedures, we are looking for examples of a final report template...
Royal049 | 10/22/2015 9:21:24 AM | COMMENTS(0)
Does anyone know of any frameworks to use when implementing and documenting a BCP? I've seen a number of guides but was curious if there are similar frameworks such as those that exist in other areas (e.g., NIST CyberSecurity Framework). Right now I'm goi...
Lyons4021 | 10/14/2015 2:48:04 PM | COMMENTS(4)
I am currently working writing my dissertation for the MSc in Computer & Information Security at the University of Liverpool. Part of my work is a maturity survey covering the Business Continuity Effort. Please help me out here :-)
tekmic | 10/13/2015 1:16:28 AM | COMMENTS(0)
For my dissertation, I would very much like some input in regards to maturity analysis carried out in your area. In my dissertation I will perform an analysis of the maturity of the BCM efforts in Danish enterprises, and comparable analysis would be very...
tekmic | 9/26/2015 5:21:31 PM | COMMENTS(0)

Documents & Publications: 31 total

Must be a Topic member to contribute
View All »
Posted by ISACA 12 days ago
Posted by ISACA 209 days ago
Posted by ISACA 223 days ago
Posted by ISACA 253 days ago

Events & Online Learning: 3 total

6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.
17 Aug 2015
ISACA International Event
Phoenix, Arizona, US
2015 GRC Conference - August 17-19, Phoenix, AZ. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.
9 Nov 2015
ISACA International Event
Copenhagen, Denmark
Stay on top of the trends and opportunities of the dynamic technology industry at EuroCACS/ISRM —the leading European conference for IT audit, assurance, security and risk professionals.

Journal Articles: 63 total

Volume 6, 2015
by Hari Mukundhan, CISA, CISSP
With the significant increase in the rate of cybersecurity incidents worldwide, the financial impacts due to these incidents have also soared.
Volume 5, 2015
by Gary Lieberman, Ph.D., CISSP
With 2014 being known as The Year of the Mega Breach, cyberattacks have quickly become a key focus in almost every BC/DR program.
Volume 4, 2015
by Matthew Pepe, Jason Luttgens and Kevin Mandia | Reviewed by Dino Ippoliti, CISA, CISM
This book is useful to anyone who is concerned about dealing with the inevitable security incident, from IT professionals to senior managers.
Volume 2, 2015
by Nurudeen Odeshina, CISA, CISM, CRISC, ISO 27001 LI, ITSM
The implementation of and certification to global best practice standards can be quite challenging for most organizations given the resources (e.g., manpower, time, finances) required.
Volume 1, 2015
by Yuri Bobbert
Hackers and negative social media hypes have proven able to bring proud organizations to their knees, yet many information and communications technology (ICT) security managers lack a strategy to anticipate and overcome such unpredictable challenges.
Volume 1, 2015
by Mary Lou Heastings | Reviewed by A. Krista Kivisild, CISA, CA
Everyone from technical practitioners to those just beginning their IS audit, security, risk or governance careers can find value in this general management book as it keeps readers aware of the latest risk concerns.

Wikis: 2 total

Blog Posts: 8 total

“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments
13 Nov 2014
Now a days, you don’t need to be a IT guru or best software programmer to access /control other personal/organization data. If you follow below techniques, you can easily get confidential information.1. Masquerading2. Tailgeting (Piggy back)3. Dumpster di...
Posted By : Shaklain | 1 comments
Enterprise Architecture (EA) is about holistic understanding of the enterprise including the business side. I had to stress on the business side as sometimes the EA is taken as IT Architecture. EA is a combination of IT and Business Architectures. It take...
Posted By : SA | 0 comments
28 Jan 2014
Welcome to my blog which will be dedicated to views and discussions on Enterprise Architect (EA) and Business-IT Alignment (BITA). I encourage the colleagues to join the ISACA topic group for "Strategic Planning/Alignment" for initiating and promoting...
Posted By : SA | 0 comments