Cover for Business Continuity and Disaster Recovery for InfoSec Managers

Business Continuity and Disaster Recovery for InfoSec Managers

Book2006

Authors:

John W. Rittinghouse and James F. Ransome

Business Continuity and Disaster Recovery for InfoSec Managers

Book2006

 

Cover for Business Continuity and Disaster Recovery for InfoSec Managers

Authors:

John W. Rittinghouse and James F. Ransome

Browse this book

Book description

Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for co ... read full description

Browse content

Table of contents

Actions for selected chapters

Select all / Deselect all

  1. Full text access
  2. Book chapterAbstract only

    1 - Contingency and Continuity Planning

    Pages 1-21

  3. Book chapterAbstract only

    2 - Assessing Risk

    Pages 23-95

  4. Book chapterAbstract only

    3 - Mitigation Strategies

    Pages 97-132

  5. Book chapterAbstract only

    4 - Preparing for a Possible Emergency

    Pages 133-153

  6. Book chapterAbstract only

    5 - Disaster Recovery Phase

    Pages 155-170

  7. Book chapterAbstract only

    6 - Business Recovery Phase

    Pages 171-191

  8. Book chapterAbstract only

    7 - Testing, Auditing, and Training

    Pages 193-239

  9. Book chapterAbstract only

    8 - Maintaining a Business Continuity Plan

    Pages 241-251

  10. Book chapterNo access

    BCP/DR Glossary

    Pages 253-273

  11. Book chapterNo access

    General References

    Pages 275-281

  12. Book chapterNo access

    A - Sample Recovery Checklist

    Pages 283-289

  13. Book chapterNo access

    B - Physical Facility Questionnaire

    Pages 291-294

  14. Book chapterNo access

    C - Organizational Security Management

    Pages 295-322

  15. Book chapterNo access

    Index

    Pages 323-338

About the book

Description

Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer.

This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide.

John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.

James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant.

Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer.

This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide.

John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.

James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant.

Key Features

· Provides critical strategies for maintaining basic business functions when and if systems are shut down
· Establishes up to date methods and techniques for maintaining second site back up and recovery
· Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters

· Provides critical strategies for maintaining basic business functions when and if systems are shut down
· Establishes up to date methods and techniques for maintaining second site back up and recovery
· Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters

Details

ISBN

978-1-55558-339-2

Language

English

Published

2006

Copyright

Copyright © 2006 Elsevier Inc. All rights reserved

Imprint

Digital Press

You currently don’t have access to this book, however you can purchase separate chapters directly from the table of contents or buy the full version.

Purchase the book

Authors

John W. Rittinghouse

James F. Ransome