Con-ti-nu'i-ty Beyond the Definitions

Zalud, Bill
November 2008
Security: Solutions for Enterprise Security Leaders;Nov2008, Vol. 45 Issue 11, p108
Trade Publication
The article focuses on crisis management, disaster recovery and continuity planning. The Consultative, Objective and Bi-functional Risk Analysis (COBRA) consists various risk analysis, consultative and security review tools that are developed in recognition of the varying nature of information technology and security. The MIT continuity plan includes updating the plan and revising documents that reflect updates, and others.


Related Articles

  • SAFETY, NUCLEAR STYLE.  // Industrial Engineer: IE;Aug2010, Vol. 42 Issue 8, p48 

    The article offers tips on the use of probability risk assessment (PRA) for the calculation of damages from disasters and for the prevention of further damage to businesses in the U.S.

  • Addressing Information Security Risks by Adopting Standards. Al-Ahmad, Walid; Mohammad, Bassil // International Journal of Information Security Science;Jun2013, Vol. 2 Issue 2, p28 

    Modern society depends on information technology in nearly every facet of human activity including, finance, transportation, education, government, and defense. Organizations are exposed to various and increasing kinds of risks, including information technology risks. Several standards, best...

  • Calculating the risk equation. Barwise, Mike // Computer Weekly;1/16/2003, p30 

    Focuses on the significance of correct risk assessment in the information technology sector's security management. Ambiguities related to risk assessment; Use of precise classification of risk in security management; Steps for evaluating the assets of an enterprise for determination of the...

  • The dangers of cloud computing. Schwartz, Ephraim // NetworkWorld Asia;Sep/Oct2008, Vol. 4 Issue 7, p10 

    The article focuses on the dangers of using cloud computing by businesses in Asia. The author notes that the idea of cloud computing, which is designed around an architecture whose natural state is a shared pool outside the enterprise has gained momentum. It is used as a way to reduce cost and...

  • Embrace This Acronym: IT GRC. it Could Save Banks a Bundle. Conte, Patrick // U.S. Banker;Nov2007, Vol. 117 Issue 11, p62 

    The article discusses the adoption of information-technology governance, risk and compliance (IT GRC) by banks in the U.S. Banks face challenges that drive them to invest in IT GRC to create and automate processes to manage compliance and security risk. These include a shift by regulators to...

  • KRITIÄŒNE INFRASTRUKTURE I KRIZNO UPRAVLJANJE. Pokaz, Ivan; Perčić, Uta // International Conference: Crisis Management Days;2014, p1129 

    The new forms of security threats have direct impact on the security risks, their consequences and management. Even a single event can cause a crisis of tremendous proportions which can exceed any natural, organizational or national boundaries. Unfortunately, organized groups or individuals may...

  • Protection of Facilities and Risk Assessment Application. Nađ, Ivan; Mihaljević, Branko; Mihalinčić, Martina // Collegium Antropologicum;2014, Vol. 38 Issue 1 Supp, p155 

    The state of security on a specific area imposes the necessity for constant analysis of the existing system of protection of key state facilities, especially facilities of special significance for the defence. The facilities of special significance for the defence are an important part of the...

  • Managing in Conditions of Crisis Events -Environmental Aspects. Sazdovska, Marina Malish; Nikoloska, Svetlana // Collegium Antropologicum;2014, Vol. 38 Issue 1 Supp, p179 

    Inside frames of acting of the authority services and bodies it is necessary to take measures and activities in the part of protection of the environment, especially protection of the resources for pristine continuation of everyday life of the popu-lation in time of crisis. In the field of...

  • What To Do? French, Jon M. // Business Mexico;Oct2005, Vol. 15 Issue 10, p25 

    The article offers important guidelines on how to upgrade security. For personal security, it is important to review and update the company's crisis management program, validated with periodic desktop simulation exercises and give employees security awareness briefings tailored to minimize risks...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics