Disaster recovery plans are critical to ensuring the continuity of business operations. Like any security control, they should be tested to ensure that they function properly and will be ready to restore business operations in the event of a disruption. In this video, learn about the different types of tests that evaluate the effectiveness of business continuity and disaster recovery plans, including: read-through tests, walk-through tests, simulations, parallel tests, and full interruption tests.
- [Instructor] Disaster recovery plans are critical…to ensuring the continuity of business operations.…As with any security control,…disaster recovery plans should be tested…to ensure that the plan functions properly…and will be ready to restore business operations…in the event of a disruption.…Each test of a disaster recovery plan has two goals.…First, it validates that the plan functions correctly…and that disaster recovery technology…will work in the event of an actual disaster.…
Second, the disaster recovery test…provides an opportunity to identify…necessary updates to the plan…due to technology or business process changes.…Let's talk about five types of disaster recovery testing.…Read-throughs, walk-throughs, simulations,…parallel tests, and full interruption tests.…Read-throughs are the simplest form…of disaster recovery testing.…They're also known as checklist reviews.…In this approach, disaster recovery staff…distribute copies of the current plan…to all personnel involved in disaster recovery efforts…and asks those personnel to review their procedures.…
Author
Released
10/29/2018- Using information classification
- Selecting and implementing security controls
- Conducting ongoing risk management activities
- Comparing adware, spyware, and ransomware
- Dangers posed by advanced persistent threats (APTs)
- Understanding attackers
- Types of attacks, including networking and password attacks
- Social engineering attacks
- Scanning for vulnerabilities
- Business continuity and disaster recovery planning
- Managing vendor relationships
Skill Level Intermediate
Duration
Views
Related Courses
-
Creating a Culture of Privacy
with Kalinda Raina57m 23s Beginner -
Securing the IoT: Privacy
with Lisa Bock1h 54m Intermediate -
Insights from a Cybersecurity Professional
with Mike Chapple32m 15s Appropriate for all -
IT Security Careers and Certifications: First Steps
with Marc Menninger2h 6m Appropriate for all
-
Introduction
-
Study resources1m 23s
-
1. Risk Assessment
-
Risk assessment5m 1s
-
Quantitative risk assessment6m 41s
-
-
2. Risk Management
-
Risk treatment options4m 22s
-
Ongoing risk management2m 26s
-
Risk management frameworks3m 22s
-
-
3. Malware
-
Botnets2m 58s
-
Advanced persistent threats3m 40s
-
4. Understanding Attackers
-
Cybersecurity adversaries4m 11s
-
Threat intelligence2m 37s
-
-
5. Attack Types
-
Denial of service attacks4m 25s
-
Eavesdropping attacks3m 51s
-
Network attacks5m 56s
-
Network address spoofing3m 25s
-
Password attacks8m 22s
-
Watering hole attacks2m 48s
-
-
6. Social Engineering Attacks
-
Social engineering5m 31s
-
Impersonation attacks4m 45s
-
Physical social engineering2m 27s
-
-
7. Vulnerability Scanning and Penetration Testing
-
Security assessment tools5m 49s
-
Scanning for vulnerabilities5m 25s
-
Assessing threats3m 14s
-
Threat assessment techniques2m 41s
-
Penetration testing3m 56s
-
-
8. Awareness and Training
-
Compliance training3m 27s
-
User habits2m 47s
-
User-based threats1m 55s
-
Awareness program reviews1m 20s
-
9. Business Continuity
-
Business continuity planning2m 54s
-
Business continuity controls3m 50s
-
-
10. Disaster Recovery
-
Disaster recovery planning4m 11s
-
Backups8m 49s
-
Validating backups2m 45s
-
Disaster recovery sites2m 59s
-
Testing BC/DR plans3m 42s
-
-
11. Supply Chain Risk
-
Vendor agreements3m 35s
-
12. Compliance
-
Privacy compliance4m 12s
-
Intellectual property4m 16s
-
Data breaches1m 58s
-
Conclusion
-
What's next?37s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Testing BC/DR plans