Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Business Continuity-Disaster Recovery Planning

Welcome to the Business Continuity-Disaster Recovery Planning topic!

Collaborate, contribute, consume and create knowledge around topics such as business impact analysis (BIA), business continuity planning (BCP), and disaster recovery planning (DR).

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
2241 Members
0 Online
19105 Visits

Community Leader

SArndt

SArndt

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 110 total

Must be a Topic member to contribute
View All »
I have a general question.Who within a financial institution (ex: a bank) is responsible for cyber risk management? The IT Risk Management department or the IT Security department? Is there a best practice/guidance in place stating cyber risk governance? ...
Alexandra806 | 6/19/2018 10:25:00 AM | COMMENTS(6)
From what I understand, when an invocation happens from the Chairman, the RTO clock immediately begins regardless where you are. However I've seen few companies whereby when the invocation happens, but the RTO clock only begins when the IT staff have ...
Mohd Aidil595 | 6/7/2018 10:50:42 AM | COMMENTS(14)
I am planning to visit adisaster recovery site (used as backup data center). Which are the minimrequirements that I should focus on? What am I expected to see?
Alexandra806 | 4/27/2018 1:55:45 PM | COMMENTS(7)
What type of tests can be done on a disaster recovery plan, especially if you do NOT have a hot or warm recovery site.
tmutsambwa | 4/16/2018 10:48:23 AM | COMMENTS(4)
Hello. I'm about to start an audit of our company's data backup and restore processes and procedures. Does anyone have an audit program to suggest or know where I can find an audit program related to data backup and recovery? Thanks for your help.
Alan S | 4/12/2018 4:08:38 PM | COMMENTS(5)
Hello everyone, My organisation confronted with a power outage at the end of last year.  The biggest problem with the power outage was that the employee (of the firm that is renting the space for the data center) that was at the site that day  did not kne...
Alexandra806 | 4/9/2018 7:27:25 AM | COMMENTS(3)

Documents & Publications: 19 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 949 days ago
Books
Posted by ISACA 1492 days ago
Research
Posted by ISACA 1666 days ago
Research
Posted by ISACA 1749 days ago

Events & Online Learning: 2 total

13 Aug 2018
ISACA International Event
Nashville, Tennessee, US
2018 GRC Conference - 13-15 August , Nashville, TN. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 45 total

Volume 3, 2018
by Yuri Bobbert, CISM, CISA, SCF, and Talitha Papelard-Agteres, CISM
Understanding the key factors that influence effective BIS is crucial for business leaders; otherwise, security problems can occur, which can lead to financial loss, unavailability, reputational damage or even bankruptcy.
Volume 2, 2018
by Steven J. Ross, CISA, CISSP, MBCP
In this era of multi-modal technology, many disaster recovery issues are solved, some are simply transferred and a few are made worse.
Volume 2, 2018
by Ray Cheung, CISA, CITP, CPA, Vikas Sharma, CISA and Bhupinder Singh, CISA, CISM, ITIL v3, PMP, QSA
It is no surprise that many enterprises, ranging from early start-ups to mature global enterprises, have considered or implemented a migration to Amazon Web Services’ (AWS) cloud computing services.
Volume 1, 2018
by Ian Cooke, CISA, CGEIT, CRISC, COBIT Assessor and Implementer, CFE, CPTE, DipFM, ITIL Foundation, Six Sigma Green Belt
Innovative technologies such as VMs and the cloud help the efficiency and effectiveness of backup and recovery plans, but they do not replace the need to plan, document, or test and test again.
Volume 3, 2017
by ISACA | Reviewed by Sunil Bakshi, CISA, CRISC, CISM, CGEIT, ABCI, AMIIB, BS 25999 LI, CEH, CISSP, ISO 27001 LA, MCA, PMP
This book is useful for security professionals, consultants and students pursuing cyber security as it provides guidance for identifying/detecting, responding and eradicating targeted cyberattacks.
Volume 2, 2017
by Steven J. Ross, CISA, CISSP, MBCP
It is those three dots that save me from accusations of rank lunacy. (Oh, well, from accusations based on this subject.)

Wikis: 2 total

Blog Posts: 9 total

Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments
“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: http://feapo.org/press-release-ea-perspectives-white-paper/ Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 1 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments
13 Nov 2014
Now a days, you don’t need to be a IT guru or best software programmer to access /control other personal/organization data. If you follow below techniques, you can easily get confidential information.1. Masquerading2. Tailgeting (Piggy back)3. Dumpster di...
Posted By : Shaklain | 1 comments
Enterprise Architecture (EA) is about holistic understanding of the enterprise including the business side. I had to stress on the business side as sometimes the EA is taken as IT Architecture. EA is a combination of IT and Business Architectures. It take...
Posted By : SA | 0 comments