...
- Business Continuity After Hurricane Ike: A Tale of Two Schools
- Fire at OLLU! Business Continuity from an IT Perspective
- A Report on the Business Continuity Summit
- How Ready Are IT Managers for a Crisis?
- ISO 27002 Toolkit - Business Continuity
- Business Continuity diagram and description
Collaborative Information Security Project - Vulnerability Assessments - California State University, San Bernardino
Top of page
Planning Information Security Continuity
...
- Presidents and Campus Cybersecurity
- Presidential Leadership for Information Technology
- Gaining the President's Support for IT Initiatives at Small Colleges
...
Top of page
Framework and Planning Cycle
...
University of California, Davis: Creating an Institutional Framework for Business Continuity
Collaborative Information Security Project - Vulnerability Assessments - California State University, San Bernardino
(ECAR case study)
Building an ISO/IEC 27001 Certified Information Security Management System - University of Tampa
...
Disaster Recovery: A Multi-Institutional Collaboration at the University of California System (ECAR case study)
- A Business Continuity Planning Toolkit (2008 presentation + resources)
...
- Business Continuity Planning (EDUCAUSE Library page)
- Disaster Recovery Planning (EDUCAUSE Library page)
- IT Disaster Recovery Plan, Adams State College
- Creation of Disaster Recovery and IT Continuity Plan
- Seizing the Moment: A New Model for Disaster Recovery at Florida State University
- Business Continuity Planning: Process, Impact, and Implications
- Business Continuity Plan from READY.GOV
Effective Practice: Incident Response at University of Wisconsin-Madison - University of Wisconsin-Madison
Top of page
Business Continuity and Risk Management - Perform a risk assessment in each unit
...
Post-9/11 Emergency Response and Business Continuity Changes at Pace University and New York University
Collaborative Information Security Project - Vulnerability Assessments - California State University, San Bernardino
Lessons Learned from RIT's First Security Posture Assessment - RIT
Self-Service/Automated Security Vulnerability Assessment Program - Indiana University (ECAR case study)
Business Impact Analysis - Identify Critical Resources
...
Shared Responsibility for Business Continuity: The Team Approach at UCLA (ECAR case study)
Top of page
Documentation
All required information pertaining to the plan, key resources, facilities, management structure, priorities/dependencies, documentation, and personnel should be kept in secure locations which can be physical, virtual, or cloud-based. This information should also be made available to key personnel who will be responsible for coordinating continuity efforts during and after the incident or event.
...
Examples of the use of emergency communications include the Virginia Tech shooting, Hurricane Katrina/Super Storm Sandy preparations and aftermath, New York City area on and after 9/11, tornadoes/blizzards/earthquakes/massive fires/floods, the major northeast power disruption, and more. Shared Responsibility for Business Continuity: The Team Approach at UCLA
...
LOCATION/GEOGRAPHY | Campuses, metro area, flood plain/river bank, avalanche, hurricane or tornado prone, unreliable power source, poor transportation/communication systems, etc. |
FACILITIES and INFRASTRUCTURE | Power, generators/fuel supplies/suppliers, air conditioning, communications lines-data, voice, multiple high speed network connects, network topology, environmental conditions/hazards, central organization, schools, or admin units |
SYSTEMS | Lost, damaged, can't be "touched" or "reached" |
DATA | Lost, not accessible |
PEOPLE | Not 24x7 staffing; off hours not on campus, no/limited transportation, not reachable via communications-voice, Internet, cell, text, etc., facilities disabled, unsafe conditions, evacuated, can't leave campus – government enforced, not cross trained, insufficient backup of skills |
DOCUMENTATION | must document critical/emergency procedures and recovery procedures, must assume that "usual" trained people are unavailable, need for depth of cross training, docs must be available to all potential users – not just on one, local system or in one place, vendor contacts – office, cell, text, social networking, IM, etc. |
Top of page
Key Considerations
...
Establishing good, working relationship with key vendors can help in times of crisis. Resources may need to be replaced. Good relationships may help move your needs to the head of the queue of waiting orders. While there may be many others facing similar problems related to the same or other crises, vendors are sensitive to the problems and will try to assist however and whenever possible when there is an existing relationship. Irene/Katrina Business Continuity and Disaster Recovery
Post-9/11 Emergency Response and
...
- Business Continuity After Hurricane Ike: A Tale of Two Schools
- At Least It Wasn't a Football Weekend: The Notre Dame Tunnel Fire
- Hazards and Hurricanes: Hallmarks of IT Readiness, Response, and Recovery
- Fire at OLLU! Business Continuity from an IT Perspective
- Irene/Katrina Business Continuity and Disaster Recovery
Top of page
After the Resumption of Normalcy
...
...