Developing an Enterprise Continuity Program
- Length: 578 pages
- Edition: 1
- Language: English
- Publisher: River Publishers
- Publication Date: 2021-08-23
- ISBN-10: 8770223971
- ISBN-13: 9788770223973
- Sales Rank: #24726473 (See Top 100 Books)
The book discusses the activities involved in developing an Enterprise ContinuityProgram (ECP) that will cover both Business Continuity Management (BCM) as wellas Disaster Recovery Management (DRM).
Cover Title Half title Copyrights Contents Foreword Preface Acknowledgements List of Figures List of Tables List of Abbreviations Glossary Introduction 1 ECP Relevance 1.1 Motivation and Achievable Benefits 1.1.1 Examples of Incidents 1.1.2 The Main Reasons 1.1.3 Economic Feasibility 1.1.4 Additional Advantages 1.2 ECP Content and Structure 1.2.1 Background 1.2.2 Cloud Perspectives 1.2.3 ECP Practice 1.3 Example of Task Statement 1.3.1 The Purpose and Objectives of Work 1.3.2 Work Duration 1.4 Analysis of BCM Technologies 1.4.1 General Approaches and Directions 1.4.2 Infrastructure Decisions 1.4.3 Software 1.5 Business Continuity and Cyber Resilience 1.5.1 Basic Concepts and Definitions of Cyber Resilience 1.5.2 Cyber Transformation Trends 1.5.3 Mathematical Problem Definition 2 BCM Best Practice 2.1 The International ISO 22301:2019 Standard 2.1.1 First Version of the Standard 2.1.2 Second Version of Standard 2.2 BCI Practice 2.2.1 Activity Directions 2.2.2 Main Results 2.3 DRI Practice 2.3.1 Direction of Activity 2.3.2 Features of the Approach 2.4 SANS Institute Practice 2.4.1 BCP Development 2.4.2 BCP Testing 2.5 AS/NZS 5050:2010 Standard 2.5.1 Basic Recommendations 2.5.2 The Application Specifics 2.6 Risk Management Practices 2.6.1 ISO 31000 Family of Standards 2.6.2 Managing Cyber Risks 2.6.3 The NIST SP 800-30 Standard 2.6.4 OCTAVE Methodology 2.6.5 MG-2 Lifecycle 2.6.6 COBIT 2019 Standard 2.6.7 SA-CMM Maturity Model 2.7 Business Process Description Practices 2.7.1 Process Modeling 2.7.2 NGOSS Methodology 2.8 COBIT Standard® 2019 2.8.1 Description of the DSS04 process 2.8.2 DSS04 Maturity Levels 2.9 ITIL V4 Library 2.9.1 The ITSCM Process 2.9.2 ITSCM Implementation 2.10 ISO/IEC 27001:2013 andISO/IEC 27031:2011 Standards 2.10.1 BCM Aspects 2.10.2 BCP Development and Implementation 2.11 Possible Measures and Metrics 2.11.1 Introducing a Passport System for Programs 2.11.2 Intellectual Cyber Resilience Orchestration 3 BC Project Management 3.1 Accenture Practice 3.1.1 RA and BIA 3.1.2 Definition of BC Strategy 3.1.3 Improving the BC Strategy 3.2 Ernst & Young (E&Y) Experience 3.2.1 ECP Program Maturity Assessment 3.2.2 Developing a BCM Strategy 3.2.3 Implementing a BCM Strategy 3.3 IBM Practice 3.3.1 Methods of Work Performance 3.3.2 IBM BCRS Approach 3.3.3 Services IBM BCRS 3.3.4 Example of a Solution Selection 3.3.5 Example of Task Statement 3.4 Hewlett-Packard Practice 3.4.1 Evaluating the Current ECP State 3.4.2 Developing a BCM Strategy 3.4.3 Implementing a BCM Strategy 3.5 EMC Practice 3.5.1 Type of Work 3.5.2 EMC Methodology 3.6 Microsoft Practice 3.6.1 Characteristics of the Approach 3.6.2 ITCM Function 4 ECP Development Samples 4.1 Characteristics of the Research Object 4.1.1 Current Active Directory Architecture 4.1.2 Target Active Directory Architecture 4.2 BIA Example 4.2.1 Classification of Active Directory Processes andServices 4.2.2 Calculating RTO and RPO 4.2.3 Active Directory Interrupt Scenarios 4.3 Defining BC Strategies 4.3.1 General Requirements 4.3.2 Detailed Reading of RTO and RPO 4.3.3 Selection of Technical Solutions 4.3.4 Possible Recovery Strategies 4.3.5 Restoring the IT Service 4.3.6 The Business Recovery 4.4 BCP Example 4.4.1 Requirements Analysis 4.4.2 BCP Content and Structure 4.4.3 Management Procedure 4.4.4 BCP Testing Conclusion References Index About the Author
Donate to keep this site alive
To access the Link, solve the captcha.
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.