Browse content
Table of contents
Actions for selected chapters
- Full text access
- Book chapterAbstract only
1 - Contingency and Continuity Planning
Pages 1-21 - Book chapterAbstract only
2 - Assessing Risk
Pages 23-95 - Book chapterAbstract only
3 - Mitigation Strategies
Pages 97-132 - Book chapterAbstract only
4 - Preparing for a Possible Emergency
Pages 133-153 - Book chapterAbstract only
5 - Disaster Recovery Phase
Pages 155-170 - Book chapterAbstract only
6 - Business Recovery Phase
Pages 171-191 - Book chapterAbstract only
7 - Testing, Auditing, and Training
Pages 193-239 - Book chapterAbstract only
8 - Maintaining a Business Continuity Plan
Pages 241-251 - Book chapterNo access
BCP/DR Glossary
Pages 253-273 - Book chapterNo access
General References
Pages 275-281 - Book chapterNo access
A - Sample Recovery Checklist
Pages 283-289 - Book chapterNo access
B - Physical Facility Questionnaire
Pages 291-294 - Book chapterNo access
C - Organizational Security Management
Pages 295-322 - Book chapterNo access
Index
Pages 323-338
About the book
Description
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer.
This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide.
John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.
James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant.
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer.
This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide.
John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.
James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant.
Key Features
· Provides critical strategies for maintaining basic business functions when and if systems are shut down
· Establishes up to date methods and techniques for maintaining second site back up and recovery
· Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters
· Provides critical strategies for maintaining basic business functions when and if systems are shut down
· Establishes up to date methods and techniques for maintaining second site back up and recovery
· Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters
Details
ISBN
978-1-55558-339-2
Language
English
Published
2006
Copyright
Copyright © 2006 Elsevier Inc. All rights reserved
Imprint
Digital Press