Module 8 - Business Continuity and Disaster Recovery

Beginner
1m 36s
511
5/5

Business continuity management and disaster recovery are about an organization being prepared for business disruption and taking the necessary actions to get the business operational as soon as possible after an incident occurs. This lesson provides a strong foundation in each area by looking at what business continuity management is, why it’s important and how it can be implemented within the overall risk management process, before reviewing the disaster recovery process.

Learning Objectives

The objectives of this lesson are to provide you with and understanding of:

  • The value of business continuity management to an organization
  • The business continuity management process
  • The impact of business disruption on an organization and how long disruption should be tolerated
  • The business continuity implementation process and implementation planning
  • Disaster recovery strategy and the importance of disaster recovery planning
  • Different standby systems and how these relate to recovery time
  • The importance of robust documentation and testing of the plan

Intended Audience

This lesson is ideal for members of information security management teams, IT managers, security and systems managers, information asset owners and employees with legal compliance responsibilities. It acts as a foundation for more advanced managerial or technical qualifications.

Prerequisites

There are no specific pre-requisites to study this lesson, however a basic knowledge of IT, an understanding of the general principles of information technology security, and awareness of the issues involved with security control activity would be advantageous.

Feedback

We welcome all feedback and suggestions - please contact us at support@cloudacademy.com if you are unsure about where to start or if would like help getting started.

About the Author
Avatar
Fred Hickling, opens in a new tab
Cyber Security Trainer
Students
1,657
Courses
11
Learning paths
2

Fred is a trainer and consultant specializing in cyber security.  His educational background is in physics, having a BSc and a couple of master’s degrees, one in astrophysics and the other in nuclear and particle physics.  However, most of his professional life has been spent in IT, covering a broad range of activities including system management, programming (originally in C but more recently Python, Ruby et al), database design and management as well as networking.  From networking it was a natural progression to IT security and cyber security more generally.  As well as having many professional credentials reflecting the breadth of his experience (including CASP, CISM and CCISO), he is a Certified Ethical Hacker and a GCHQ Certified Trainer for a number of cybersecurity courses, including CISMP, CISSP and GDPR Practitioner.