From the course: CISA Cert Prep: 2 Information Technology Governance and Management for IS Auditors
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Developing and implementing the plan
From the course: CISA Cert Prep: 2 Information Technology Governance and Management for IS Auditors
Developing and implementing the plan
- [Narrator] Alright, so let's talk about developing and implementing the actual business continuity plan, the plan document itself. Well, first of all, we did a lot of work in the business impact analysis, that's where most of the work is done. And the results of that impact analysis contain things like all of our identified critical functions and the resources that those functions depend on, the magical MTD, the maximum tolerable down time, for each of those functions and resources. We've identified the threats and vulnerabilities to those functions and resources. We've calculated the risk or the impact that the company would endure for each of the threats that we have outlined in our scope, and we've come up with some protection and recovery solutions. Now, we take that, we document it, and we present it to management for approval. If they sign-off, then, it's going to go in our plan. So we take the results, and that's we use to create the actual BCP document, the business…
Contents
-
-
-
-
-
-
-
Introduction3m 25s
-
(Locked)
BCP step-by-step6m 59s
-
(Locked)
Business impact analysis8m 20s
-
(Locked)
Recovery strategies and solutions8m 50s
-
(Locked)
Developing and implementing the plan9m 25s
-
(Locked)
Testing, training, and maintenance7m 24s
-
(Locked)
Auditing business continuity and disaster recovery3m 24s
-
-
-