Email Alerts
-
H1N1 planning for your organization: An essential guide
There are some things that every company should do as part of their H1N1 planning. Discover how to prepare for a possible swine flu outbreak so your business can continue to operate smoothly and securely by downloading this exclusive eBook now. E-Guide
-
PING with Bernard Donnelly
In this exclusive interview with Information Security magazine, Bernard Donnelly, vice president of quality assurance for the Philadelphia Stock Exchange, discusses how and why his organization transitioned to a wireless trading system the measures t... Information Security maga
-
PING: Tim Ozmun
A post hurricane Katrina interview with Tim Ozmun, information security officer for the NCDDC. Information Security maga
-
PING: Bill Derwostyp
Bill Derwostyp, security administration manager at the University of Southern Mississippi, explains his hopes to turn the devastation of hurricane Katrina into an opportunity to refine security, disaster recovery and business continuity policies. Information Security maga
-
PING: Jennifer Creger
OmniBank's technology and information security officer, Jennifer Creger, explains how she was able to maintain a secure environment during hurricane Katrina. Information Security maga
-
Disaster recovery: Know what you really need
Disaster recovery should be just one piece of an overall contingency plan that includes all levels of your company. Feature
-
Sandy put business continuity planning in spotlight
Some firms struggled while others smoothly executed disaster procedures. Experts said cloud computing aided data center resiliency. News | 05 Nov 2012
-
Study finds overconfidence in disaster recovery, continuity plans
Businesses that experienced a network outage suffered more than $1.7 billiion in profit loss, despite having business continuity and disaster recovery plans in place. Article | 30 Sep 2010
-
For Google, DNS log analysis essential in Aurora attack investigation
A malicious link in an instant message set the stage for a well-coordinated network infiltration of Google's systems. Subtle clues helped investigators trace the attacker's steps. Article | 15 Jun 2010
-
Feds must take action on Cyber Storm exercise lessons, expert says
Legislators, DHS and other federal agencies must use the Cyber Storm outcomes to take action rather than conducting more studies, said former federal cybersecurity czar Andy Purdy. Article | 21 Apr 2010
-
Updated Cybersecurity Act reshapes federal compliance, education
The proposed law now lacks an Internet kill-switch provision, clarifies certification and expands public-private cooperation on federal cybersecurity compliance. News | 24 Mar 2010
-
Data breach costs continue to rise in 2009, Ponemon study finds
A Ponemon Institute study of 45 businesses found data breach costs increased last year to $204 per compromised record, a rise of $2 per customer record over 2008 costs. Article | 25 Jan 2010
-
Five mistakes banks make in pandemic planning
Experts cite five areas where financial institutions could improve their planning for a potential H1N1 outbreak Article | 13 Oct 2009
-
Firms muddle security breach response, expert says
Security incident handlers are at the core of the coordination problems during security incidents, says security expert and consultant Lenny Zeltser. Article | 18 Mar 2009
-
Cleaning up after a data attack: CardSystems' Joe Christensen
The credit card processor's new vice president of security and compliance is convinced he can restore the company's reputation after it made the evening news. Article | 14 Apr 2006
-
Surviving a data disaster: Lexis-Nexis' Leo Cronin
Read how the information security officer for the data broker handled the headlines after last year's major data breach and then decide if he deserves your vote as Top Survivor. Article | 14 Apr 2006
- See more News on Disaster Recovery and Business Continuity Planning
-
DoS attack responses demand better business continuity plans
Expert Nick Lewis says an effective DoS attack responses demand better business continuity plans, including pre-negotiating with providers. Tip
-
Disaster recovery security considerations for financial services
Financial firms need to include security in their disaster recovery planning. In this tip, Randall Gamby discusses how enterprises can ensure information remains secure during a business disruption. Tip
-
Week 10: Are you throwing out company secrets? (Part 1 -- physical records)
This week Shelley Bard reinforces the importance of shredding sensitive documents before they fall into the wrong hands. Tip
-
More companies seeking to create internal disaster recovery centers
More and more companies are looking to create in-house disaster recovery facilities. Tip
-
Spurred by disaster, firm invests in email backup system
After three days without email, a venture capital firm knew it needed a new backup and recovery plan, leading to an investment in an email backup system. Tip
-
Lessons learned about disaster recovery since Sept. 11, 2001
Implementing a disaster recovery plan is important because crises can happen at any time. Tip
-
Protecting the workstation from physical and electronic theft
Here is some advice for keeping the data on your PCs physically and electronically safe. Tip
-
Developing a business continuity plan
Learn step-by-step what every disaster recovery plan and business continuity plan needs. Tip
-
If disaster struck, would you be prepared?
Plan for the worst. That's what security expert Mark Edmead says you should do when it comes to protecting your systems. Tip
-
How most compromises are made
Learn how systems are often compromised in this user-submitted tip. Tip
-
Prepare for Shamoon malware with data backup and recovery plan
Expert Nick Lewis discusses how to detect Shamoon malware and emphasizes the importance of detailed data backup and recovery plans. Answer
-
Avoiding a breach by a third-party data recovery services provider
Expert Nick Lewis discusses the security requirements enterprises should establish when selecting a third-party data recovery services provider. Answer
-
Getting started with a DNSSEC implementation
The many well-publicized flaws in DNS make implementing DNSSEC even more vital. In this expert response, Mike Chapple explains the enterprise basics for a DNSSEC implementation. Answer
-
How to update a disaster recovery, contingency planning strategy
Have your disaster recovery plans fallen woefully behind the current state of your business? In this expert response, Ernie Hayden discusses how to conduct tabletop exercises to get your plans back on track. Ask the Expert
-
Best practices for log data retention
Figuring out how long to retain log data and how much log data should be kept in the event of incident response can be tricky to navigate. In this information security management expert response, David Mortman gives best practices for log data retent... Ask the Expert
-
How to preserve an IT security budget from data breach fines
After a data breach, it's important to re-build security quickly and well, but when breach fines are exacted from a security team, it can cripple improvement efforts. Learn how to preserve an IT security budget to meet IT security goals. Ask the Expert
-
What are best practices for secure password distribution after a data breach?
After an information security data breach, it might seem like a good idea to create new user IDs and passwords for all employees in the user directory. But is there an easier way to handle the aftermath of a data breach? Find out more in this IAM exp... Ask the Expert
-
Physical security for a data center
Ask the Expert
-
Deciphering the Covered Entities definition
Ask the Expert
-
Reporting hack attempts
Ask the Expert
- See more Expert Advice on Disaster Recovery and Business Continuity Planning
-
Security risk management video: Business partner security and pandemic planning
In this exclusive interview, Sara Santarelli gives tips on how to deal with the risks posed by business partners and possible pandemics, and how to assess your enterprise's exposure to these risks. Video
-
Key elements of disaster recovery and business continuity planning
In part four of this series, Andre Gold discusses the key aspects of developing a successful business continuity and disaster recovery plan, including location, technology, crisis management and communications. Video
-
Disaster recovery and business continuity planning: Problems and issues
Andre Gold discusses the most common problems and pitfalls organizations can be expected to face in their business continuity and disaster recovery planning efforts and how to avoid these problems. Video
-
Core elements to prevent business continuity, disaster recovery problems
In conclusion to this video series, Andre Gold discusses the importance of communication to avoid business continuity and disaster recovery planning problems, and defines the core elements needed for a successful BCP and DR efforts. Video
-
The availability, business continuity and disaster recovery relationship
In part two of this series, gain a better understanding of the relationship between availability, business continuity planning and disaster recovery. Video
-
Disaster recovery and business continuity planning basics
In this video, Andre Gold, vice president and CISO of MoneyGram International, will discuss the basics of disaster recovery and business continuity planning, and define several general terms associated with disaster recovery and business continuity p... Video
-
Business continuity: Defining internal risk management policies
In part three of this series, Andre Gold explains how organizations should define their own internal risk management policies and standards to ensure a solid development to your disaster recovery and business continuity efforts. Video
-
Prepare for Shamoon malware with data backup and recovery plan
Expert Nick Lewis discusses how to detect Shamoon malware and emphasizes the importance of detailed data backup and recovery plans. Answer
-
Sandy put business continuity planning in spotlight
Some firms struggled while others smoothly executed disaster procedures. Experts said cloud computing aided data center resiliency. News
-
Avoiding a breach by a third-party data recovery services provider
Expert Nick Lewis discusses the security requirements enterprises should establish when selecting a third-party data recovery services provider. Answer
-
DoS attack responses demand better business continuity plans
Expert Nick Lewis says an effective DoS attack responses demand better business continuity plans, including pre-negotiating with providers. Tip
-
Getting started with a DNSSEC implementation
The many well-publicized flaws in DNS make implementing DNSSEC even more vital. In this expert response, Mike Chapple explains the enterprise basics for a DNSSEC implementation. Answer
-
Study finds overconfidence in disaster recovery, continuity plans
Businesses that experienced a network outage suffered more than $1.7 billiion in profit loss, despite having business continuity and disaster recovery plans in place. Article
-
For Google, DNS log analysis essential in Aurora attack investigation
A malicious link in an instant message set the stage for a well-coordinated network infiltration of Google's systems. Subtle clues helped investigators trace the attacker's steps. Article
-
Disaster recovery security considerations for financial services
Financial firms need to include security in their disaster recovery planning. In this tip, Randall Gamby discusses how enterprises can ensure information remains secure during a business disruption. Tip
-
Feds must take action on Cyber Storm exercise lessons, expert says
Legislators, DHS and other federal agencies must use the Cyber Storm outcomes to take action rather than conducting more studies, said former federal cybersecurity czar Andy Purdy. Article
-
Updated Cybersecurity Act reshapes federal compliance, education
The proposed law now lacks an Internet kill-switch provision, clarifies certification and expands public-private cooperation on federal cybersecurity compliance. News
- See more All on Disaster Recovery and Business Continuity Planning
About Disaster Recovery and Business Continuity Planning
Get the latest information on preparing for and recovering from disasters from our sister site, SearchDisasterRecovery.com.
Security Management Strategies for the CIO