E-Book Overview
Offering hundreds of tips, templates, checklists, and pointers to information in the public domain, Business Resumption Planning, Second Edition assists you in creating a rock solid recovery plan for any size organization. It provides the information you need in order to coordinate first responders to meet any disaster scenario head on, whether involving computers, telecommunications, or infrastructure in a timely and effective manner. What’s New in the Second Edition: · The latest techniques for conducting an efficient Business Impact Analysis and an accurate Failure Mode Effects Analysis (FMEA) · Advice on how to successfully recover from Ground Zero events, such as those involving Oklahoma City, the World Trade Center (WTC), and Hurricane Katrina · Tips for recovery teams and first responders, including how to maintain “4Ci” (Command, Control, Communications, Computers and intelligence) during a disaster · An examination of legal ramifications resulting from a failure to plan—including new liability issues that directly affect you · An explanation of how the recently enacted Sarbanes-Oxley Act of 2002 impacts your planning effort · Plans and templates that assess vulnerability in WANs, Open Networks, physical facilities, environmentals, and enhanced services The book contains actual case studies and examples illustrating the vulnerabilities of today’s mission critical systems. It details the proactive steps you should take now to first assess your exposure, then eliminate it. The book also includes a CD-ROM that contains worksheets, checklists, audit forms, work breakdown structures, and reports.
E-Book Content
BUSINESS RESUMPTION PLANNING Second Edition
OTHER INFORMATION SECURITY BOOKS FROM AUERBACH 802.1X Port-Based Authentication Edwin Lyle Brown ISBN: 1-4200-4464-8 Building an Effective Information Security Policy Architecture Sandy Bacik ISBN: 1-4200-5905-X CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives Michael Gentile, Ron Collette and Skye Gentile ISBN: 1-4200-8910-2 Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI Debra S. Herrmann ISBN: 0-8493-5402-1 Computer Forensics: Evidence Collection and Management Robert C. Newman ISBN: 0-8493-0561-6 Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition Albert Marcella, Jr. and Doug Menendez ISBN: 0-8493-8328-5 Digital Privacy: Theory, Technologies, and Practices Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis and Sabrina di Vimercati ISBN: 1-4200-5217-9 How to Achieve 27001 Certification: An Example of Applied Compliance Management Sigurjon Thor Arnason and Keith D. Willett ISBN: 0-8493-3648-1 Information Assurance Architecture Keith D. Willett ISBN: 0-8493-8067-7
Information Security Management Handbook, Sixth Edition Harold F. Tipton and Micki Krause ISBN: 0-8493-7495-2 Information Security Management Handbook, Sixth Edition, Volume 2 Harold F. Tipton and Micki Krause ISBN: 1-4200-6708-7 Information Security Management Handbook, 2008 CD-ROM Edition Harold F. Tipton and Micki Krause ISBN: 1-4200-6698-6 Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks Kenneth Brancik ISBN 1-4200-4659-4 Mechanics of User Identification and Authentication: Fundamentals of Identity Management Dobromir Todorov ISBN: 1-4200-5219-5 Official (ISC)2 Guide to the SSCP CBK Diana-Lynn Contesti, Douglas Andre, Eric Waxvik, Paul A. Henry and Bonnie A. Goins ISBN: 0-8493-2774-1 Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition Marlin B. Pohlman ISBN: 1-4200-7247-1 Software Deployment, Updating, and Patching Bill Stackpole and Patrick Hanrion ISBN: