FEMA's National Mitigation Framework and disaster preparedness

Disaster Recovery and Business Continuity Planning

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • The availability, business continuity and disaster recovery relationship

    In part two of this series, gain a better understanding of the relationship between availability, business continuity planning and disaster recovery. 

  • Disaster recovery and business continuity planning basics

    In this video, Andre Gold, vice president and CISO of MoneyGram International, will discuss the basics of disaster recovery and business continuity planning, and define several general terms associated with disaster recovery and business continuity p... 

  • Business continuity: Defining internal risk management policies

    In part three of this series, Andre Gold explains how organizations should define their own internal risk management policies and standards to ensure a solid development to your disaster recovery and business continuity efforts. 

  • Best practices for log data retention

    Figuring out how long to retain log data and how much log data should be kept in the event of incident response can be tricky to navigate. In this information security management expert response, David Mortman gives best practices for log data retent... 

  • Firms muddle security breach response, expert says

    Security incident handlers are at the core of the coordination problems during security incidents, says security expert and consultant Lenny Zeltser. 

  • How to preserve an IT security budget from data breach fines

    After a data breach, it's important to re-build security quickly and well, but when breach fines are exacted from a security team, it can cripple improvement efforts. Learn how to preserve an IT security budget to meet IT security goals. 

  • What are best practices for secure password distribution after a data breach?

    After an information security data breach, it might seem like a good idea to create new user IDs and passwords for all employees in the user directory. But is there an easier way to handle the aftermath of a data breach? Find out more in this IAM exp... 

  • PING with Bernard Donnelly

    In this exclusive interview with Information Security magazine, Bernard Donnelly, vice president of quality assurance for the Philadelphia Stock Exchange, discusses how and why his organization transitioned to a wireless trading system the measures t... 

  • Cleaning up after a data attack: CardSystems' Joe Christensen

    The credit card processor's new vice president of security and compliance is convinced he can restore the company's reputation after it made the evening news. 

  • Surviving a data disaster: Lexis-Nexis' Leo Cronin

    Read how the information security officer for the data broker handled the headlines after last year's major data breach and then decide if he deserves your vote as Top Survivor.