Lunesys’ Business Continuity & Disaster Recovery Training
In the industry, many service providers:
- Equate BCP with DRP (Disaster Recovery Planning)
- Create a BCP to sell DRP hardware and services
- Fail to understand both of the strategic and tactical dimensions of business continuity planning
LuneSys’ approach is centered on the following principles:
- The BCP should leverage and ultimately enable the organization’s business strategy
- May require DRP as the manifestation of the risk mitigation action, but the BCP is truly business centric (not technology or catastrophe centric)
- Should be created by an objective party with no potential financial gain as a result of selling DRP hardware or software.
- Holistically consider key scenarios that could cause interruption in critical business functions, processes and tasks
- Evaluating risks (probability, impact) and the corporate risk tolerance against mitigation costs and remediation strategies (it is not just about insurance coverage!)
Course Details
The followings are covered in the training course offered by LuneSys:
Risk Assessment
- Identify the business risks meaningful to your business with expected probabilities and outcomes
- Provide our subject matter expertise relative to potential risk areas (that have not been identified)
- Present methods for reducing or managing those risks
Prioritization and Strategy Selection
- Develop strategy for addressing each of the prioritized BCP areas
- Work with customers and external regulatory groups to understand and document their requirements
- Discuss options, pros, cons and costs
Gain Consensus/Backup Plan Review
- Review backup mechanisms for each information system and service
- Review staff backup and cross-training in each major business function
- Review supplier alternatives for each major material and service
- Present options for improving
Testing and Maintenance
- Coordinate with internal business subject matter experts to ensure satisfactory test plans are developed
- Document all test scripts
- Coordinate recovery tests and document results
- Review results, present findings, and recommend improvements
- Develop plan for reviewing BCP on a regular basis
- Ensure that BCP is incorporated into future business processes, development, and purchases
At the end of the courses delegates will:
- Be aware of the key features and content of Business Continuity Planning
- Understand the differences between BCP code of practice and DRP, and how to use them to best effect
- Understand how to use the standards to support BCP within their own organization
- Be able to develop a Business Continuity Management system based upon best practices, principles and BS25999
- Understand the benefits and be aware of some of the pitfalls in Business Continuity Management
Be able to weigh up the likely returns from investment in a range of different planning choices
Pre-requisites
Attendees should have a good understanding of the key functions and operations of their own organization and come prepared to discuss in broad terms some of the risk and performance issues which may affect their business.
Lunesys’ Other Training Workshops
Ethical Hacking
Ethical Hacking / Penetration Testing Training WorkshopPenetration Testing
The control of information is something the elite always does… Information, knowledge, is power.” – Tom Clancy
Computer Forensics Investigator
The incident was not the end of the world. We can backtrack!Learn to uncover and interprete electronic data
How to conduct forensically sound computer examinations with forensic recovery techniques
CISSP Boot Camp
Credential demonstrates that an IT professional understands full range of security for the automated information system.Certified Information System Security Professional (CISSP)
Our CISSP boot camp course ensures that you can review the CBK in-depth and prepare for the certification exam.
Enterprise Security Awareness for IT Users
Information Technology professionals are typically in need of on-target security knowledge that they can directly apply to their everyday work.A Must-Have Training for Every IT User of your Organization
LuneSys’ Enterprise Security Awareness Training for IT Professionals utilizes lectures with hands-on lab work to ensure practical knowledge transfer.
Why Choose Lunesys
- We are not a jack-of-all-trades involved in every sort of business and training;
- We are focused on information security management purely, which rally us round understanding and facilitating the clients’ specific need;
- We have an extensive range of highly qualified trainers, a comprehensive range of professional public training courses, enabling the potential participants to hit upon and sign up for exactly the training they need, in their most suitable time span;
- We don’t only provide trainings but also offer the implementation of the theories, which gives us an edge to assist the participants later in their practical epochs;
- The most reasonable price is another advantage we offer;
- Our previous clients’ great satisfaction and highly-rating testimonials are our honor.