From the course: CISA Cert Prep: 2 Information Technology Governance and Management for IS Auditors

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Developing and implementing the plan

Developing and implementing the plan

From the course: CISA Cert Prep: 2 Information Technology Governance and Management for IS Auditors

Start my 1-month free trial

Developing and implementing the plan

- [Narrator] Alright, so let's talk about developing and implementing the actual business continuity plan, the plan document itself. Well, first of all, we did a lot of work in the business impact analysis, that's where most of the work is done. And the results of that impact analysis contain things like all of our identified critical functions and the resources that those functions depend on, the magical MTD, the maximum tolerable down time, for each of those functions and resources. We've identified the threats and vulnerabilities to those functions and resources. We've calculated the risk or the impact that the company would endure for each of the threats that we have outlined in our scope, and we've come up with some protection and recovery solutions. Now, we take that, we document it, and we present it to management for approval. If they sign-off, then, it's going to go in our plan. So we take the results, and that's we use to create the actual BCP document, the business…

Contents