Cargando…

Business continuity management : choosing to survive /

Business Continuity Management: Choosing to survive shows you how to systematically prepare your business, not only for the unthinkable, but also for smaller incidents which, if left unattended, could well lead to major disasters. A business continuity management (BCM) program is critical for every...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Al Hour, Abdullah
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely, Cambridgeshire, U.K. : IT Governance Pub., 2012.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover; Title; Copyright; Preface; About the Author; Acknowledgements; Contents; Chapter 1: Introduction; What is business continuity management?; Benefits of effective BCM programs; Emerging risk and threat topologies; BCM and risk management; BCM and compliance; BCM and insurance; Chapter 2: Setting up the BCM Program; Gathering key success factors; Establishing the governance model; Establishing the BCM organizational unit; Organizations with a regional or international presence; Chapter 3: Running the BCM Life Cycle; Running the BCM life cycle for the first time; Business impact analysis.
  • Risk and threat assessmentStrategies and risk treatment plans; Planning and implementation; Awareness and training; Testing; Rerunning the cycle; Chapter 4: BCM Standards; ISO22301 societal security
  • preparedness and continuity management systems
  • requirements; ASIS SPC. 1-2009 organizational resilience: security, preparedness, and continuity management systems requirements with guidance for use; Chapter 5: Technology Continuity; IT disaster recovery and readiness for business continuity (ITDR and IRBC); Technology continuity sites; Technology continuity outside IT.
  • Chapter 6: Technology Continuity StandardsISO/IEC 27031 information technology
  • security techniques
  • guidelines for information and communication technology readiness for business continuity (IRBC); ISO/IEC 24762:2008 information technology
  • security techniques
  • guidelines for information and communications technology disaster recovery sites; Chapter 7: Facilities Management and Physical Security; Facilities management; Physical security preparations; Environmental setups and preparations; Chapter 8: Evacuation Plans; Features of an effective evacuation plan; Evacuation plan development.
  • Communicating the plansTraining and testing; Chapter 9: People and BCM; The importance of people; Succession planning; Chapter 10: BCM Software; The need for BCM software; Role of BCM software within the BCM life cycle; Features of effective BCM software; Deploying BCM software; Appendix 1: BCM Policy; Objective; Policy statement; Policy ownership and maintenance; Disaster definition; Policy guidelines; Appendix 2: BIA Questionnaire; Purpose; Questionnaire contacts; Terminology; Understanding your processes
  • general process information.
  • Understanding your processes
  • internal and external dependenciesUnderstanding your processes
  • impacts and criticality; Identifying RTO, season, and RPO; Understanding your processes
  • IT and resource requirements; Succession planning
  • identification of human resources; Assets required during disaster
  • identification of recovery resources; Appendix 3: BIA Report; Executive summary; Abbreviations and acronyms; Introduction; Scope; Approach; Assumptions; Consolidated results; Observations; Recommendations; Appendix 4: Risk Assessment Questionnaire; Appendix 5: Risk Assessment Report.