156:(national or interorganizational). There are also two main types of resilience, which are proactive and post resilience. Proactive resilience is preparing for a crisis and creating a solid foundation for the company. Post resilience includes continuing to maintain communication and check in with employees. Proactive resilience is dealing with issues at hand before they cause a possible shift in the work environment and post resilience maintaining communication and accepting changes after an incident has happened. Resilience can be applied to any organization. In New Zealand, the Canterbury University Resilient Organisations programme developed an assessment tool for benchmarking the Resilience of Organisations. It covers 11 categories, each having 5 to 7 questions. A
137:. In her 2010 article, "Resilience: Talking, Resisting, and Imagining New Normalcies Into Being" Buzzanell discussed the ability for organizations to thrive after having a crisis through building resistance. Buzzanell notes that there are five different processes that individuals use when trying to maintain resilience- crafting normalcy, affirming identity anchors, maintaining and using communication networks, putting alternative logics to work and downplaying negative feelings while foregrounding positive emotions.
3577:
687:โข Tier 7 solutions include all the major components being used for a Tier 6 solution with the additional integration of automation. This allows a Tier 7 solution to ensure consistency of data above that of which is granted by Tier 6 solutions. Additionally, recovery of the applications is automated, allowing for restoration of systems and applications much faster and more reliably than would be possible through manual Disaster Recovery procedures.
903:: Businesses must have continuity planning measures to survive and continue to thrive whilst working towards keeping the incident as minimal as possible. The Act was separated into two parts: Part 1: civil protection, covering roles & responsibilities for local responders Part 2: emergency powers. In the United Kingdom, resilience is implemented locally by the
141:
crafting normalcy, affirming identity anchors, maintaining and using communication networks, putting alternative logics to work, and downplaying negative feelings while foregrounding negative emotions. Each of these processes can be applicable to businesses in crisis times, making resilience an important factor for companies to focus on while training.
617:โข Tier 2 Disaster Recovery solutions make regular backups on tape. This is combined with an off-site facility and infrastructure (known as a hot site) in which to restore systems from those tapes in the event of a disaster. This tier solution will still result in the need to recreate several hours to days worth of data, but
168:
Plans and procedures are used in business continuity planning to ensure that the critical organizational operations required to keep an organization running continue to operate during events when key dependencies of operations are disrupted. Continuity does not need to apply to every activity which
140:
When looking at the resilience theory, the crisis communication theory is similar, but not the same. The crisis communication theory is based on the reputation of the company, but the resilience theory is based on the process of recovery of the company. There are five main components of resilience:
94:
outlines a range of disaster scenarios and the steps the business will take in any particular scenario to return to regular trade. BCP's are written ahead of time and can also include precautions to be put in place. Usually created with the input of key staff as well as stakeholders, a BCP is a set
895:
Within the UK, BS 25999-2:2007 and BS 25999-1:2006 were being used for business continuity management across all organizations, industries and sectors. These documents give a practical plan to deal with most eventualitiesโfrom extreme weather conditions to terrorism, IT system failure, and staff
114:
Adapting to change in an apparently slower, more evolutionary manner - sometimes over many years or decades - has been described as being more resilient, and the term "strategic resilience" is now used to go beyond resisting a one-time crisis, but rather continuously anticipating and adjusting,
63:
Business continuity requires a top-down approach to identify an organisation's minimum requirements to ensure its viability as an entity. An organization's resistance to failure is "the ability ... to withstand changes in its environment and still function". Often called resilience, it is a
31:
645:โข Tier 4 solutions are used by businesses that require both greater data currency and faster recovery than users of lower tiers. Rather than relying largely on shipping tape, as is common in the lower tiers, Tier 4 solutions begin to incorporate more disk-based solutions.
421:
277:
Recovery point objective (RPO) โ the acceptable latency of data that will not be recovered. For example, is it acceptable for the company to lose 2 days of data? The recovery point objective must ensure that the maximum tolerable data loss for each activity is not
340:
objectives, to define a measurement for the consistency of distributed business data within interlinked systems after a disaster incident. Similar terms used in this context are "Recovery
Consistency Characteristics" (RCC) and "Recovery Object Granularity" (ROG).
1112:
Software and work process changes must be documented and validated, including verification that documented work process recovery tasks and supporting disaster recovery infrastructure allow staff to recover within the predetermined recovery time objective.
941:
3036:
801::2021 Security and resilience โ Business continuity management systems โ Guidelines for business impact analysis - (Replaces ISO/TS 22315:2015 Societal security โ Business continuity management systems โ Guidelines for business impact analysis.)
807::2021 Security and resilience โ Business continuity management systems โ Guidelines for supply chain continuity (Replaces ISO/TS 22318:2015 Societal security โ Business continuity management systems โ Guidelines for supply chain continuity.)
125:
Resilience Theory can be related to the field of Public
Relations. Resilience is a communicative process that is constructed by citizens, families, media system, organizations and governments through everyday talk and mediated conversation.
2115:
2037:
2045:
1426:
631:โข Tier 3 solutions utilize components of Tier 2. Additionally, some mission-critical data is electronically vaulted. This electronically vaulted data is typically more current than that which is shipped via PTAM. As a result there is
344:
While RTO and RPO are absolute per-system values, RCO is expressed as a percentage that measures the deviation between actual and targeted state of business data across systems for process groups or individual business processes.
846:
ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection โ Information security controls. (Replaces ISO/IEC 27002:2013 Information technology โ Security techniques โ Code of practice for information security
843:, cybersecurity and privacy protection โ Information security management systems โ Requirements. (Replaces ISO/IEC 27001:2013 Information technology โ Security techniques โ Information security management systems โ Requirements.)
1003:- Several departments, teams or disciplines concentrate on multiple BCP aspects; the scope can range from a few teams from one building to multiple teams operating across dispersed locations. Pre-scripted "surprises" are added.
64:
capability that enables organizations to either endure environmental changes without having to permanently adapt, or the organization is forced to adapt a new way of working that better suits the new environmental conditions.
3184:
831::2014 Conformity assessment โ Requirements for bodies providing audit and certification of management systems โ Part 6: Competence requirements for auditing and certification of business continuity management systems.
2648:
1272:
677:. They are used by businesses with little or no tolerance for data loss and who need to restore data to applications rapidly. These solutions have no dependence on the applications to provide data consistency.
49:) is the process of creating systems of prevention and recovery to deal with potential threats to a company. In addition to prevention, the goal is to enable ongoing operations before and during execution of
180:
A major cost in planning for this is the preparation of audit compliance management documents; automation tools are available to reduce the time and cost associated with manually producing this information.
1288:
Elliot, D.; Swartz, E.; Herbane, B. (1999) Just waiting for the next big bang: business continuity planning in the UK finance sector. Journal of
Applied Management Studies, Vol. 8, No, pp. 43โ60. Here: p.
589:โข Businesses with a Tier 0 Disaster Recovery solution have no Disaster Recovery Plan. There is no saved information, no documentation, no backup hardware, and no contingency plan. Typical recovery time:
2975:
237:
Quantifying of loss ratios must also include "dollars to defend a lawsuit." It has been estimated that a dollar spent in loss prevention can prevent "seven dollars of disaster-related economic loss."
2108:
1433:
351:
3018:
290:
Maximum time constraints for how long an enterprise's key products or services can be unavailable or undeliverable before stakeholders perceive unacceptable consequences have been named as:
1503:
2066:
2530:
1457:
3192:
1556:"An estimated 80 percent of companies without a well-conceived and tested business continuity plan, go out of business within two years of a major disaster" (Santangelo 2004)
173:, organizations are required to define their business continuity objectives, the minimum levels of product and service operations which will be considered acceptable and the
41:
may be defined as "the capability of an organization to continue the delivery of products or services at pre-defined acceptable levels following a disruptive incident", and
603:โข Businesses that use Tier 1 Disaster Recovery solutions back up their data at an off-site facility. Depending on how often backups are made, they are prepared to accept
1258:
2605:
1009:- All aspects of a medium exercise remain, but for maximum realism no-notice activation, actual evacuation and actual invocation of a disaster recovery site is added.
953:
836:
ISO/IEC 24762:2008 Information technology โ Security techniques โ Guidelines for information and communications technology disaster recovery services (withdrawn)
825::2021 Security and resilience โ Business continuity management systems โ Guidelines for developing business continuity plans and procedures (Current as of 2022.)
2638:
Cabinet Office. (2004). overview of the Act. In: Civil
Contingencies Secretariat Civil Contingencies Act 2004: a short. London: Civil Contingencies Secretariat
348:
The following formula calculates RCO with "n" representing the number of business processes and "entities" representing an abstract value for business data:
1808:
1528:
3258:
1790:
1300:
828:
433:
After defining recovery requirements, each potential threat may require unique recovery steps (contingency plans or playbooks). Common threats include:
3297:
1935:
1238:
1158:
3007:
1761:
107:
over entities not prepared for various contingencies extended then-common business continuity planning practices. Business organizations such as the
1980:
2555:
813::2018 Security and resilience โ Business continuity management systems โ Guidelines for people aspects on business continuity (Current as of 2022.)
754:(ISO) has for example developed a whole series of standards on Business continuity management systems under responsibility of technical committee
850:
649:, but it is easier to make such point-in-time (PIT) copies with greater frequency than data that can be replicated through tape-based solutions.
1568:
1507:
997:- a small number of people concentrate on a specific aspect of a BCP. Another form involves a single representative from each of several teams.
853::2011 Information technology โ Security techniques โ Guidelines for information and communication technology readiness for business continuity.
822:
816:
810:
804:
798:
751:
1741:
962:
ASIS SPC.1-2009, Organizational
Resilience: Security, Preparedness, and Continuity Management Systems - Requirements with Guidance for Use,
819::2018 Security and resilience โ Business continuity management systems โ Guidelines for business continuity strategy - (Current as of 2022.)
659:โข Tier 5 solutions are used by businesses with a requirement for consistency of data between production and recovery data centers. There is
3238:
607:, but their backups are secure off-site. However, this Tier lacks the systems on which to restore data. Pickup Truck Access Method (PTAM).
332:
When more than one system crashes, recovery plans must balance the need for data consistency with other objectives, such as RTO and RPO.
2948:
ASIS SPC.1-2009 Organizational
Resilience: Security, Preparedness, and Continuity Management Systems - Requirements with Guidance for Use
2059:
1318:
1461:
103:
A 2005 analysis of how disruptions can adversely affect the operations of corporations and how investments in resilience can give a
3496:
2580:
3173:
3290:
1914:
2359:
2327:
2309:
2263:
2245:
2227:
703:
Outside IT: preservation of hard copy (such as contracts). A process plan must consider skilled staff and embedded technology.
76:
interruption, loss of or damage to critical infrastructure (major machinery or computing/network resource). As such, BCP is a
53:. Business continuity is the intended outcome of proper execution of both business continuity planning and disaster recovery.
2959:
963:
856:
ISO/PAS 22399:2007 Societal security - Guideline for incident preparedness and operational continuity management (withdrawn)
1961:
1863:
1013:
While start and stop times are pre-agreed, the actual duration might be unknown if events are allowed to run their course.
946:
934:
1025:
Confirmation of information in the manual, roll out to staff for awareness and specific training for critical individuals.
416:{\displaystyle {\text{RCO}}=1-{\frac {({\text{number of inconsistent entities}})_{n}}{({\text{number of entities}})_{n}}}}
3506:
3371:
3351:
3205:
2745:
17:
3200:
3150:
3114:
3086:
3067:
1347:
Ian McCarthy; Mark
Collard; Michael Johnson (2017). "Adaptive organizational resilience: an evolutionary perspective".
3250:
3461:
3341:
3283:
3233:
872:(BSI Group) released a series of standards which have since been withdrawn and replaced by the ISO standards above.
789::2020 Security and resilience โ Business continuity management systems โ Guidance on the use of ISO 22301 (Replaces
3583:
3562:
3486:
1225:
3659:
3593:
3471:
2704:
2676:
1812:
1779:
3255:
1021:
Biannual or annual maintenance cycle maintenance of a BCP manual is broken down into three periodic activities.
3639:
3598:
2815:
2531:"BS 7799-1:1995 Information security management - Code of practice for information security management systems"
1921:
1635:
Buzzanell, Patrice M. (March 2010). "Resilience: Talking, Resisting, and
Imagining New Normalcies Into Being".
663:
in such solutions; however, the presence of this functionality is entirely dependent on the application in use.
534:
of the disease. They also banned in-person contact during both business and non-business hours. This increased
891:
2008: BS 25777, Information and communications technology continuity management. Code of practice. (withdrawn)
3649:
3436:
2606:"BS 25777:2008 (Paperback) Information and communications technology continuity management. Code of practice"
987:
869:
86:
57:
1542:
Tiffany Braun; Benjamin Martz (2007). "Business
Continuity Preparedness and the Mindfulness State of Mind".
3624:
3411:
3366:
2843:
1939:
1754:
1405:
900:
793::2012 Security and resilience - Business continuity management systems - Guidance on the use of ISO 22301.)
1973:
3654:
3521:
3501:
3466:
3441:
3386:
3321:
1600:
Buzzanell, Patrice M. (2010). "Resilience: Talking, Resisting, and
Imagining New Normalcies Into Being".
1221:
750:
There are many standards that are available to support business continuity planning and management. The
535:
2946:
526:
The above areas can cascade: Responders can stumble. Supplies may become depleted. During the 2002โ2003
256:
Each function/activity typically relies on a combination of constituent components in order to operate:
3644:
3491:
3416:
3396:
2732:
457:
250:
108:
1826:
3619:
3456:
3431:
3361:
2629:
British Standards Institution (2006). Business continuity management-Part 1: Code of practice :London
2209:
2023:
3588:
3552:
3526:
3476:
3391:
1670:
Buzzanell, Patrice M. (2018-01-02). "Organizing resilience as adaptive-transformational tensions".
956:(COOP) and National Continuity Policy Implementation Plan (NCPIP), United States Federal Government
700:
For IT: the minimum application and data requirements and the time in which they must be available.
60:
have been published by various standards bodies to assist in checklisting ongoing planning tasks.
3481:
3451:
3376:
3326:
1163:
990:
identified three types of exercises that can be employed when testing business continuity plans.
779::2019 Security and resilience โ Business continuity management systems โ Requirements (Replaces
3629:
3446:
3406:
3401:
3381:
3336:
2184:
CERTยฎ Resilience Management Model (RMM) v1.1: Code of Practice Crosswalk Commercial Version 1.1
974:
The implementation phase involves policy changes, material acquisitions, staffing and testing.
904:
959:
Business Continuity Planning Suite, DHS National Protection and Programs Directorate and FEMA.
320:
mean the same thing and are defined using exactly the same words. Some standards use the term
3536:
3531:
3511:
3421:
2010:
104:
888:
BS 25999-2:2007 Business Continuity Management Part 2: Specification (superseded, withdrawn)
3557:
3516:
3426:
3356:
3346:
3243:
2921:
2868:
1356:
1322:
1170:
1128:
840:
281:
Recovery time objective (RTO) โ the acceptable amount of time to restore the function
2150:
2133:
72:
Any event that could negatively impact operations should be included in the plan, such as
8:
1195:
885:-1:2006 - Business continuity management Part 1: Code of practice (superseded, withdrawn)
3267:
1360:
1035:
Issues found during the testing phase often must be reintroduced to the analysis phase.
2163:
1695:
1547:
1143:
2816:"NATIONAL CONTINUITY POLICY IMPLEMENTATION PLAN Homeland Security Council August 2007"
1583:"Communication and resilience: concluding thoughts and key issues for future research"
1383:
3146:
3110:
3082:
3063:
2955:
2741:
2734:
NFPA 1600, Standard on Disaster/Emergency Management and Business Continuity Programs
2167:
2155:
1699:
1687:
1652:
1648:
1617:
1613:
1582:
1190:
1180:
1153:
1133:
1123:
1063:
718:
708:
575:
571:
531:
134:
130:
50:
3228:
3223:
1028:
Testing and verification of technical solutions established for recovery operations.
930:
NFPA 1600 Standard on Disaster/Emergency Management and Business Continuity Programs
95:
of contingencies to minimize potential harm to businesses during adverse scenarios.
2145:
1998:
1888:
1679:
1644:
1609:
1551:
1364:
1200:
1175:
1138:
727:
337:
1683:
1072:
Information about communication and transportation infrastructure (roads, bridges)
3634:
3262:
3209:
2790:
1852:
1368:
1185:
1043:
The BCP manual must evolve with the organization, and maintain information about
246:
81:
3215:
1727:
2182:
2002:
1960:"How to evaluate a recovery management solution." West World Productions, 2006
1085:
899:
In 2004, following crises in the preceding years, the UK government passed the
3331:
3220:
Mary Hall. The Storage Community (IBM). 18 July 2011. Retrieved 26 March 2013.
2581:"BS 25999-2:2007 (USA Edition) Business continuity management - Specification"
879:-1:1995 - peripherally addressed information security procedures. (withdrawn)
530:
outbreak, some organizations compartmentalized and rotated teams to match the
3613:
3098:
Business Continuity Plan Design, 8 Steps for Getting Started Designing a Plan
2761:
2159:
1691:
1656:
1621:
1489:
The Resilient Enterprise: Overcoming Vulnerability for Competitive Enterprise
621:. Examples include: PTAM with Hot Site available, IBM Tivoli Storage Manager.
1569:"Annex A.17: Information Security Aspects of Business Continuity Management"
249:(urgent) and non-critical (non-urgent) organization functions/activities. A
3307:
3275:
1483:
1266:
474:
119:
73:
2989:
2649:"July 2013 (V2) The role of Local Resilience Forums: A reference document"
2505:
2479:
2453:
2428:
2403:
2377:
2345:
2295:
2281:
206:
Documents and documentation, including which have off-site backup copies:
3186:
SteelStore Cloud Storage Gateway: Disaster Recovery Best Practices Guide.
2740:(2010 ed.). Quincy, MA: National Fire Protection Association. 2010.
733:
200:
3177:
Charlotte Brooks, Matthew Bedernjak, Igor Juran, and John Merryman. In,
1346:
755:
724:
Telecommunication architecture between primary and secondary work sites
444:
3229:
Maximum Tolerable Period of Disruption (MTPOD): BSI committee response
3159:
1974:"Six Myths About Business Continuity Management and Disaster Recovery"
1487:
916:
HB 292-2006, "A practitioners guide to business continuity management"
578:
released in 1992, were updated in 2012 by IBM as an eight tier model:
425:
100% RCO means that post recovery, no business data deviation occurs.
153:
145:
3181:
Chapter 2. Pages 21โ36. Red Books Series. IBM. Tivoli Software. 2002.
1529:"Newsday | Long Island's & NYC's News Source | Newsday"
1062:
Definitions of terminology to facilitate timely communication during
929:
790:
786:
780:
776:
770:
766:
762:
488:
468:
170:
1971:
1081:
Specialized technical resources must be maintained. Checks include:
149:
144:
There are three main groups that are affected by a crisis. They are
2556:"BS 25999-1:2006 Business continuity management - Code of practice"
2097:
developed by SHARE's Technical Steering Committee, working with IBM
1742:
ISO 22301 Business Continuity Management: Your implementation guide
1148:
942:
NFPA 1600, Standard on Continuity, Emergency, and Crisis Management
882:
462:
438:
3197:
Robert Kern and Victor Peltz. IBM Systems Magazine. November 2003.
3125:
2677:"HB HB 292โ2006 Executive Guide to Business Continuity Management"
1239:"How to Build an Effective and Organized Business Continuity Plan"
1107:
260:
Human resources (full-time staff, part-time staff, or contractors)
2896:
2134:"Disaster Governance: Social, Political, and Economic Dimensions"
876:
503:
Theft (insider or external threat, vital information or material)
3268:
Adapt and respond to risks with a business continuity plan (BCP)
2083:
Chloe Demrovsky (December 22, 2017). "Holding It All Together".
1458:"Business Continuity Planning (BCP) for Businesses of all Sizes"
1069:
Distribution lists (staff, important clients, vendors/suppliers)
919:
HB 293-2006, "Executive guide to business continuity management"
27:
Prevention and recovery from threats that might affect a company
2705:"HB 293โ2006 Executive Guide to Business Continuity Management"
1406:"Continuity Resources and Technical Assistance | FEMA.gov"
1321:. United States Department of Homeland Security. Archived from
1243:
492:
77:
30:
1889:"Plain English ISO 22301 2012 Business Continuity Definitions"
1853:"BIA Instructions, BUSINESS CONTINUITY MANAGEMENT - WORKSHOP"
1031:
Testing and verification of organization recovery procedures.
591:
The length of recovery time in this instance is unpredictable
452:
3217:
Continuous Operations: The Seven Tiers of Disaster Recovery.
3179:
Disaster Recovery Strategies with Tivoli Storage Management.
3107:
Disaster Survival Planning: A Practical Guide for Businesses
1713:
3140:
1541:
527:
133:, a professor at the Brian Lamb School of Communication at
84:. In the U.S., government entities refer to the process as
2844:"Continuity Resources and Technical Assistance | FEMA.gov"
1427:"A Guide to the preparation of a Business Continuity Plan"
696:
Two main requirements from the impact analysis stage are:
266:
Physical assets (mobile phones, laptops/workstations etc.)
115:"before the case for change becomes desperately obvious".
3251:
Department of Homeland Security Emergency Plan Guidelines
1997:"Medical supply location and distribution in disasters".
1936:"The Rise and Rise of the Recovery Consistency Objective"
1862:. Disaster Recovery Information Exchange (DRIE) Central.
1054:
Job descriptions, skillsets needed, training requirements
497:
977:
3202:
Business Continuity: The 5-tiers of Disaster Recovery.
2109:"A Business Continuity Solution Selection Methodology"
765::2021 Security and resilience โ Vocabulary (Replaces
3037:"Validation of a Disaster Management Metamodel (DMM)"
354:
2762:"A Comprehensive Overview of the NFPA 1600 Standard"
1301:"Constructing a Successful Business Continuity Plan"
730:
methodology between primary and secondary work sites
633:
less data recreation or loss after a disaster occurs
593:. In fact, it may not be possible to recover at all.
1928:
1924:- National Cyber Security Center. 2022. p. 12.
1780:"Can your Organization survive a natural disaster?"
1091:
Application security and service patch distribution
3079:Business Continuity Planning, A Step-by-Step Guide
1159:Disaster recovery and business continuity auditing
415:
1228:, published April 2018, accessed 19 February 2021
563:These should reflect the widest possible damage.
479:Water outage (supply interruption, contamination)
428:
240:
3611:
3076:
2922:"Business Continuity Planning Suite | Ready.gov"
769::2018 Security and resilience - Vocabulary and
546:Impact scenarios are identified and documented:
245:A business impact analysis (BIA) differentiates
169:the organization undertakes. For example, under
3057:
2954:. American National Standards Institute. 2009.
2082:
1349:Current Opinion in Environmental Sustainability
1108:Testing and verification of recovery procedures
253:may be considered critical if dictated by law.
3224:Maximum Tolerable Period of Disruption (MTPOD)
2214:International Organization for Standardization
2180:
2038:"transportation planning in disaster recovery"
1972:Josh Krischer; Donna Scott; Roberta J. Witty.
752:International Organization for Standardization
685:Highly automated, business-integrated solution
559:need for business and data processing supplies
3291:
1220:BCI Good Practice Guidelines 2013, quoted in
969:
859:IWA 5:2006 Emergency Preparedness (withdrawn)
3305:
3123:
3109:. Disaster Survival Planning, Incorporated.
3095:
2210:"ISO - ISO/TC 292 - Security and resilience"
2190:. Pittsburgh, PA: Carnegie Mellon University
2181:Partridge, Kevin G.; Young, Lisa R. (2011).
2106:
1482:
773::2012 Security and resilience - Vocabulary.)
675:maintain the highest levels of data currency
647:Several hours of data loss is still possible
273:For each function, two values are assigned:
2785:
2783:
1777:
1298:
336:(RCO) is the name of this goal. It applies
47:business continuity and resiliency planning
3298:
3284:
2138:Annual Review of Environment and Resources
1038:
506:Random failure of mission-critical systems
118:This approach is sometimes summarized as:
3104:
2174:
2149:
1672:Journal of Applied Communication Research
1669:
1634:
1599:
619:it is less unpredictable in recovery time
2780:
2100:
2060:"PLANNING SCENARIOS Executive Summaries"
1827:"Maximum Acceptable Outage (Definition)"
1421:
1419:
1381:
566:
29:
3189:Riverbed Technology, Inc. October 2011.
3174:The tiers of Disaster Recovery and TSM.
3060:A Guide to Business Continuity Planning
2869:"Continuity of operations: An overview"
2131:
2125:
1382:Intrieri, Charles (10 September 2013).
910:
199:Locations, including other offices and
34:Business continuity planning life cycle
14:
3612:
3141:Andrew Zolli; Ann Marie Healy (2013).
2791:"Business Continuity Plan | Ready.gov"
2132:Tierney, Kathleen (21 November 2012).
1744:, published, accessed 20 February 2021
1342:
1340:
736:with applications, data and work space
318:maximum tolerable period of disruption
296:Maximum tolerable period of disruption
189:Planners must have information about:
175:maximum tolerable period of disruption
3279:
3256:CIDRAP/SHRM Pandemic HR Guide Toolkit
3160:International Glossary for Resilience
2968:
2151:10.1146/annurev-environ-020911-095618
1416:
1057:Documentation and document management
978:Testing and organizational acceptance
964:American National Standards Institute
673:โข Tier 6 Disaster Recovery solutions
122:, protection, response and recovery.
1226:Business Continuity Policy Statement
947:National Fire Protection Association
935:National Fire Protection Association
863:
556:civilian impact of nuclear disasters
2990:"Glossary | DRI International"
2976:"Business Continuity Plan Template"
1337:
541:
129:The theory is based on the work of
24:
3143:Resilience: Why Things Bounce Back
3124:Dimattia, S. (November 15, 2001).
3051:
3034:
3008:"Disaster Recovery Plan Checklist"
1915:"Baseline Cyber Security Controls"
1504:"Transform. The Resilient Economy"
691:
605:several days to weeks of data loss
269:Documents (electronic or physical)
25:
3671:
3166:
2085:Manufacturing Business Technology
312:According to ISO 22301 the terms
87:continuity of operations planning
3576:
3575:
3563:Outline of organizational theory
3024:from the original on 2022-10-09.
2121:from the original on 2022-10-09.
2072:from the original on 2022-10-09.
2048:from the original on 2022-10-09.
1986:from the original on 2022-10-09.
1796:from the original on 2022-10-09.
1767:from the original on 2022-10-09.
1649:10.1111/j.1460-2466.2009.01469.x
1614:10.1111/j.1460-2466.2009.01469.x
1278:from the original on 2022-10-09.
923:
745:
302:Maximum tolerable downtime (MTD)
223:The analysis phase consists of:
174:
3077:Kenneth L Fulmer (2004-10-04).
3028:
3000:
2982:
2939:
2914:
2889:
2861:
2836:
2808:
2754:
2725:
2697:
2669:
2641:
2632:
2623:
2598:
2573:
2548:
2523:
2498:
2472:
2446:
2421:
2396:
2370:
2352:
2338:
2320:
2302:
2288:
2274:
2256:
2238:
2220:
2202:
2107:Ellis Holman (March 13, 2012).
2091:
2076:
2052:
2030:
1990:
1965:
1954:
1907:
1881:
1869:from the original on 2022-10-09
1845:
1819:
1806:
1800:
1778:Helen Clark (August 15, 2012).
1771:
1747:
1734:
1720:
1706:
1663:
1628:
1593:
1575:
1561:
1535:
1521:
1496:
1476:
1460:. 19 April 2017. Archived from
1450:
1269:.org (American Bar Association)
901:Civil Contingencies Act of 2004
714:The solution phase determines:
553:need for transportation options
377:number of inconsistent entities
308:Maximum acceptable outage (MAO)
203:/work area recovery (WAR) sites
111:embraced this resilience goal.
3058:James C. Barnes (2001-06-08).
1398:
1384:"Business Continuity Planning"
1375:
1311:
1292:
1282:
1251:
1231:
1214:
1016:
429:Threat and risk analysis (TRA)
401:
392:
381:
372:
334:Recovery Consistency Objective
327:
305:Maximum tolerable outage (MTO)
285:
241:Business impact analysis (BIA)
13:
1:
1684:10.1080/00909882.2018.1426711
1571:. ISMS.online. November 2021.
1299:Alan Berman (March 9, 2015).
1207:
988:British Standards Institution
870:British Standards Institution
177:(MTPD) which can be allowed.
163:
98:
58:business continuity standards
1938:. 2016-03-22. Archived from
1895:. Praxiom Research Group LTD
1369:10.1016/j.cosust.2017.07.005
1076:
740:
601:Data backup with no Hot Site
465:(insider or external threat)
184:
160:summarizes this evaluation.
152:(group or organization) and
43:business continuity planning
7:
3212:Recovery Specialties. 2007.
1305:Business Insurance Magazine
1222:Mid Sussex District Council
1116:
218:
67:
10:
3676:
3105:Judy Bell (October 1991).
2003:10.1016/j.ijpe.2009.10.004
1319:"Business Continuity Plan"
970:Implementation and testing
944:(2019, current standard),
709:disaster recovery planning
109:Council on Competitiveness
3571:
3545:
3314:
3194:Disaster Recovery Levels.
3126:"Planning for Continuity"
2360:"ISO/IEC TS 17021-6:2014"
1714:"Resilient Organisations"
984:Exercising for Excellence
707:This phase overlaps with
615:Data backup with Hot Site
550:need for medical supplies
314:maximum acceptable outage
230:Threat and risks analysis
3553:History of organizations
3244:Business Continuity Plan
3145:. Simon & Schuster.
1637:Journal of Communication
1602:Journal of Communication
954:Continuity of Operations
671:Zero or little data loss
92:business continuity plan
3584:Aspects of corporations
1728:"Resilience Diagnostic"
1164:Disaster risk reduction
1097:Application operability
1088:definition distribution
1051:A series of checklists
1039:Information and targets
509:Single point dependency
212:Procedure documentation
3660:Management cybernetics
3594:Aspects of occupations
2897:"Business | Ready.gov"
2018:Cite journal requires
1544:AMCIS 2007 Proceedings
1259:"Surviving a Disaster"
905:Local Resilience Forum
661:little to no data loss
417:
322:maximum downtime limit
196:Supplies and suppliers
35:
3640:Disaster preparedness
3599:Aspects of workplaces
1833:. Albion Research Ltd
1809:"Finding RPO and RTO"
657:Transaction integrity
567:Tiers of preparedness
418:
105:competitive advantage
33:
3650:Emergency management
3558:Organization studies
3507:Retaliatory behavior
3352:Citizenship behavior
3162:, DRI International.
2480:"ISO/PAS 22399:2007"
2454:"ISO/IEC 27031:2011"
2429:"ISO/IEC 27002:2022"
2404:"ISO/IEC 27001:2022"
2378:"ISO/IEC 24762:2008"
1979:. Gartner Research.
1922:Ministry of Interior
1755:"Emergency Planning"
1730:. November 28, 2017.
1587:www.researchgate.net
1171:Emergency management
1129:Catastrophe modeling
1094:Hardware operability
1045:who has to know what
911:Australian standards
841:Information security
643:Point-in-time copies
538:against the threat.
471:or other major storm
352:
131:Patrice M. Buzzanell
3625:Business continuity
2712:Standards Australia
2684:Standards Australia
2346:"Iso/Ts 22332:2021"
2328:"ISO/TS 22331:2018"
2310:"ISO/TS 22330:2018"
2296:"Iso/Ts 22318:2021"
2282:"Iso/Ts 22317:2021"
1361:2017COES...28...33M
1196:Systems engineering
986:, published by The
839:ISO/IEC 27001:2022
629:Electronic vaulting
39:Business continuity
18:Business continuity
3655:IT risk management
3580:See also templates
3261:2013-05-18 at the
3208:2018-09-26 at the
3096:Richard Kepenach.
3041:SCHOLAR.google.com
2460:. 5 September 2016
2042:SCHOLAR.google.com
1325:on 7 December 2018
1144:Digital continuity
995:Tabletop exercises
829:ISO/IEC/TS 17021-6
574:'s seven tiers of
413:
397:number of entities
209:Business documents
36:
3645:Disaster recovery
3607:
3606:
3487:Perceived support
2961:978-1-887056-92-2
2768:. 29 January 2019
1831:riskythinking.com
1716:. March 22, 2011.
1191:Scenario planning
1154:Disaster recovery
1134:Crisis management
1124:Capacity planning
1100:Data verification
1064:disaster recovery
1007:Complex exercises
864:British standards
721:command structure
719:Crisis management
576:disaster recovery
532:incubation period
411:
398:
378:
358:
135:Purdue University
51:disaster recovery
16:(Redirected from
3667:
3620:Systems thinking
3579:
3578:
3472:Network analysis
3462:Machiavellianism
3300:
3293:
3286:
3277:
3276:
3239:Janco Associates
3156:
3137:
3120:
3101:
3092:
3073:
3045:
3044:
3032:
3026:
3025:
3023:
3012:
3004:
2998:
2997:
2986:
2980:
2979:
2972:
2966:
2965:
2953:
2943:
2937:
2936:
2934:
2932:
2918:
2912:
2911:
2909:
2907:
2893:
2887:
2886:
2884:
2882:
2873:
2865:
2859:
2858:
2856:
2854:
2840:
2834:
2833:
2831:
2829:
2820:
2812:
2806:
2805:
2803:
2801:
2787:
2778:
2777:
2775:
2773:
2758:
2752:
2751:
2739:
2729:
2723:
2722:
2720:
2718:
2709:
2701:
2695:
2694:
2692:
2690:
2681:
2673:
2667:
2666:
2664:
2662:
2653:
2645:
2639:
2636:
2630:
2627:
2621:
2620:
2618:
2616:
2602:
2596:
2595:
2593:
2591:
2577:
2571:
2570:
2568:
2566:
2552:
2546:
2545:
2543:
2541:
2527:
2521:
2520:
2518:
2516:
2502:
2496:
2495:
2493:
2491:
2476:
2470:
2469:
2467:
2465:
2450:
2444:
2443:
2441:
2439:
2425:
2419:
2418:
2416:
2414:
2400:
2394:
2393:
2391:
2389:
2374:
2368:
2367:
2356:
2350:
2349:
2342:
2336:
2335:
2324:
2318:
2317:
2306:
2300:
2299:
2292:
2286:
2285:
2278:
2272:
2271:
2264:"ISO 22313:2020"
2260:
2254:
2253:
2246:"ISO 22301:2019"
2242:
2236:
2235:
2228:"ISO 22300:2018"
2224:
2218:
2217:
2206:
2200:
2199:
2197:
2195:
2189:
2178:
2172:
2171:
2153:
2129:
2123:
2122:
2120:
2113:
2104:
2098:
2095:
2089:
2088:
2080:
2074:
2073:
2071:
2064:
2056:
2050:
2049:
2034:
2028:
2027:
2021:
2016:
2014:
2006:
1994:
1988:
1987:
1985:
1978:
1969:
1963:
1958:
1952:
1951:
1949:
1947:
1932:
1926:
1925:
1919:
1911:
1905:
1904:
1902:
1900:
1885:
1879:
1878:
1876:
1874:
1868:
1857:
1849:
1843:
1842:
1840:
1838:
1823:
1817:
1816:
1811:. Archived from
1804:
1798:
1797:
1795:
1784:
1775:
1769:
1768:
1766:
1759:
1751:
1745:
1738:
1732:
1731:
1724:
1718:
1717:
1710:
1704:
1703:
1667:
1661:
1660:
1632:
1626:
1625:
1597:
1591:
1590:
1579:
1573:
1572:
1565:
1559:
1558:
1539:
1533:
1532:
1525:
1519:
1518:
1516:
1515:
1506:. Archived from
1500:
1494:
1493:
1486:(October 2005).
1480:
1474:
1473:
1471:
1469:
1464:on 24 April 2017
1454:
1448:
1447:
1445:
1444:
1438:
1432:. Archived from
1431:
1423:
1414:
1413:
1402:
1396:
1395:
1393:
1391:
1379:
1373:
1372:
1344:
1335:
1334:
1332:
1330:
1315:
1309:
1308:
1296:
1290:
1286:
1280:
1279:
1277:
1263:
1255:
1249:
1248:
1247:. June 26, 2015.
1235:
1229:
1218:
1201:System lifecycle
1176:Man-made hazards
1139:Cyber resilience
1103:Data application
1001:Medium exercises
728:Data replication
587:No off-site data
542:Impact scenarios
518:Misconfiguration
512:Supplier failure
482:Telecomms outage
422:
420:
419:
414:
412:
410:
409:
408:
399:
396:
390:
389:
388:
379:
376:
370:
359:
356:
338:data consistency
298:
297:
233:Impact scenarios
158:Resilience Ratio
21:
3675:
3674:
3670:
3669:
3668:
3666:
3665:
3664:
3610:
3609:
3608:
3603:
3589:Aspects of jobs
3567:
3541:
3310:
3304:
3273:
3263:Wayback Machine
3234:Wayback Machine
3210:Wayback Machine
3169:
3153:
3130:Library Journal
3117:
3089:
3070:
3054:
3052:Further reading
3049:
3048:
3033:
3029:
3021:
3010:
3006:
3005:
3001:
2988:
2987:
2983:
2974:
2973:
2969:
2962:
2951:
2945:
2944:
2940:
2930:
2928:
2920:
2919:
2915:
2905:
2903:
2895:
2894:
2890:
2880:
2878:
2871:
2867:
2866:
2862:
2852:
2850:
2842:
2841:
2837:
2827:
2825:
2818:
2814:
2813:
2809:
2799:
2797:
2789:
2788:
2781:
2771:
2769:
2760:
2759:
2755:
2748:
2747:978-161665005-6
2737:
2731:
2730:
2726:
2716:
2714:
2707:
2703:
2702:
2698:
2688:
2686:
2679:
2675:
2674:
2670:
2660:
2658:
2651:
2647:
2646:
2642:
2637:
2633:
2628:
2624:
2614:
2612:
2604:
2603:
2599:
2589:
2587:
2579:
2578:
2574:
2564:
2562:
2554:
2553:
2549:
2539:
2537:
2529:
2528:
2524:
2514:
2512:
2504:
2503:
2499:
2489:
2487:
2478:
2477:
2473:
2463:
2461:
2452:
2451:
2447:
2437:
2435:
2427:
2426:
2422:
2412:
2410:
2402:
2401:
2397:
2387:
2385:
2376:
2375:
2371:
2358:
2357:
2353:
2344:
2343:
2339:
2326:
2325:
2321:
2316:. 12 July 2019.
2308:
2307:
2303:
2294:
2293:
2289:
2280:
2279:
2275:
2262:
2261:
2257:
2244:
2243:
2239:
2234:. 12 July 2019.
2226:
2225:
2221:
2208:
2207:
2203:
2193:
2191:
2187:
2179:
2175:
2130:
2126:
2118:
2111:
2105:
2101:
2096:
2092:
2081:
2077:
2069:
2062:
2058:
2057:
2053:
2036:
2035:
2031:
2019:
2017:
2008:
2007:
1996:
1995:
1991:
1983:
1976:
1970:
1966:
1959:
1955:
1945:
1943:
1934:
1933:
1929:
1917:
1913:
1912:
1908:
1898:
1896:
1887:
1886:
1882:
1872:
1870:
1866:
1860:driecentral.org
1855:
1851:
1850:
1846:
1836:
1834:
1825:
1824:
1820:
1805:
1801:
1793:
1782:
1776:
1772:
1764:
1757:
1753:
1752:
1748:
1739:
1735:
1726:
1725:
1721:
1712:
1711:
1707:
1668:
1664:
1633:
1629:
1598:
1594:
1581:
1580:
1576:
1567:
1566:
1562:
1540:
1536:
1527:
1526:
1522:
1513:
1511:
1502:
1501:
1497:
1481:
1477:
1467:
1465:
1456:
1455:
1451:
1442:
1440:
1436:
1429:
1425:
1424:
1417:
1404:
1403:
1399:
1389:
1387:
1380:
1376:
1345:
1338:
1328:
1326:
1317:
1316:
1312:
1297:
1293:
1287:
1283:
1275:
1261:
1257:
1256:
1252:
1237:
1236:
1232:
1219:
1215:
1210:
1205:
1186:Risk management
1181:Natural hazards
1119:
1110:
1079:
1041:
1019:
980:
972:
938:. (superseded).
926:
913:
866:
748:
743:
694:
692:Solution design
569:
544:
524:
515:Data corruption
500:/civil disorder
431:
404:
400:
395:
391:
384:
380:
375:
371:
369:
355:
353:
350:
349:
330:
295:
294:
288:
243:
227:Impact analysis
221:
187:
166:
101:
82:risk management
70:
28:
23:
22:
15:
12:
11:
5:
3673:
3663:
3662:
3657:
3652:
3647:
3642:
3637:
3632:
3627:
3622:
3605:
3604:
3602:
3601:
3596:
3591:
3586:
3581:
3572:
3569:
3568:
3566:
3565:
3560:
3555:
3549:
3547:
3543:
3542:
3540:
3539:
3534:
3529:
3524:
3519:
3514:
3509:
3504:
3499:
3494:
3489:
3484:
3479:
3474:
3469:
3464:
3459:
3454:
3449:
3444:
3439:
3437:Identification
3434:
3429:
3424:
3419:
3414:
3409:
3404:
3399:
3394:
3389:
3384:
3379:
3374:
3369:
3364:
3359:
3354:
3349:
3344:
3339:
3334:
3329:
3324:
3318:
3316:
3312:
3311:
3303:
3302:
3295:
3288:
3280:
3271:
3270:
3265:
3253:
3247:
3246:
3241:
3236:
3231:
3226:
3221:
3213:
3198:
3190:
3182:
3168:
3167:External links
3165:
3164:
3163:
3157:
3152:978-1451683813
3151:
3138:
3121:
3116:978-0963058003
3115:
3102:
3093:
3088:978-1931332217
3087:
3074:
3069:978-0471530152
3068:
3053:
3050:
3047:
3046:
3027:
2999:
2981:
2967:
2960:
2938:
2913:
2888:
2860:
2835:
2807:
2779:
2753:
2746:
2724:
2696:
2668:
2656:Cabinet Office
2640:
2631:
2622:
2597:
2572:
2547:
2522:
2497:
2486:. 18 June 2012
2471:
2445:
2420:
2395:
2384:. 6 March 2008
2369:
2351:
2337:
2319:
2301:
2287:
2273:
2255:
2252:. 5 June 2023.
2237:
2219:
2201:
2173:
2144:(1): 341โ363.
2124:
2099:
2090:
2075:
2051:
2029:
2020:|journal=
1989:
1964:
1953:
1927:
1906:
1880:
1844:
1818:
1815:on 2016-03-03.
1807:May, Richard.
1799:
1770:
1746:
1733:
1719:
1705:
1662:
1627:
1592:
1574:
1560:
1534:
1520:
1495:
1475:
1449:
1415:
1397:
1374:
1336:
1310:
1291:
1281:
1250:
1230:
1212:
1211:
1209:
1206:
1204:
1203:
1198:
1193:
1188:
1183:
1178:
1173:
1168:
1167:
1166:
1161:
1156:
1146:
1141:
1136:
1131:
1126:
1120:
1118:
1115:
1109:
1106:
1105:
1104:
1101:
1098:
1095:
1092:
1089:
1078:
1075:
1074:
1073:
1070:
1067:
1060:
1059:
1058:
1055:
1040:
1037:
1033:
1032:
1029:
1026:
1018:
1015:
1011:
1010:
1004:
998:
982:The 2008 book
979:
976:
971:
968:
967:
966:
960:
957:
951:
939:
925:
922:
921:
920:
917:
912:
909:
893:
892:
889:
886:
880:
865:
862:
861:
860:
857:
854:
848:
844:
837:
833:
832:
826:
820:
814:
808:
802:
795:
794:
784:
774:
747:
744:
742:
739:
738:
737:
731:
725:
722:
705:
704:
701:
693:
690:
689:
688:
678:
664:
650:
636:
622:
608:
594:
568:
565:
561:
560:
557:
554:
551:
543:
540:
523:
522:
521:Network outage
519:
516:
513:
510:
507:
504:
501:
495:
486:
483:
480:
477:
472:
466:
460:
455:
450:
447:
442:
435:
430:
427:
407:
403:
394:
387:
383:
374:
368:
365:
362:
329:
326:
310:
309:
306:
303:
300:
287:
284:
283:
282:
279:
271:
270:
267:
264:
261:
242:
239:
235:
234:
231:
228:
220:
217:
216:
215:
214:
213:
210:
204:
197:
194:
186:
183:
171:ISO 22301:2019
165:
162:
148:(individual),
100:
97:
69:
66:
26:
9:
6:
4:
3:
2:
3672:
3661:
3658:
3656:
3653:
3651:
3648:
3646:
3643:
3641:
3638:
3636:
3633:
3631:
3630:Collaboration
3628:
3626:
3623:
3621:
3618:
3617:
3615:
3600:
3597:
3595:
3592:
3590:
3587:
3585:
3582:
3574:
3573:
3570:
3564:
3561:
3559:
3556:
3554:
3551:
3550:
3548:
3544:
3538:
3535:
3533:
3530:
3528:
3525:
3523:
3520:
3518:
3515:
3513:
3510:
3508:
3505:
3503:
3500:
3498:
3495:
3493:
3490:
3488:
3485:
3483:
3480:
3478:
3475:
3473:
3470:
3468:
3465:
3463:
3460:
3458:
3455:
3453:
3450:
3448:
3445:
3443:
3440:
3438:
3435:
3433:
3430:
3428:
3425:
3423:
3420:
3418:
3415:
3413:
3412:Effectiveness
3410:
3408:
3405:
3403:
3400:
3398:
3395:
3393:
3390:
3388:
3385:
3383:
3380:
3378:
3375:
3373:
3370:
3368:
3367:Communication
3365:
3363:
3360:
3358:
3355:
3353:
3350:
3348:
3345:
3343:
3340:
3338:
3335:
3333:
3330:
3328:
3325:
3323:
3320:
3319:
3317:
3313:
3309:
3308:organizations
3301:
3296:
3294:
3289:
3287:
3282:
3281:
3278:
3274:
3269:
3266:
3264:
3260:
3257:
3254:
3252:
3249:
3248:
3245:
3242:
3240:
3237:
3235:
3232:
3230:
3227:
3225:
3222:
3219:
3218:
3214:
3211:
3207:
3204:
3203:
3199:
3196:
3195:
3191:
3188:
3187:
3183:
3180:
3176:
3175:
3171:
3170:
3161:
3158:
3154:
3148:
3144:
3139:
3135:
3131:
3127:
3122:
3118:
3112:
3108:
3103:
3099:
3094:
3090:
3084:
3081:. Rothstein.
3080:
3075:
3071:
3065:
3061:
3056:
3055:
3042:
3038:
3031:
3020:
3016:
3009:
3003:
2995:
2991:
2985:
2977:
2971:
2963:
2957:
2950:
2949:
2942:
2927:
2926:www.ready.gov
2923:
2917:
2902:
2901:www.ready.gov
2898:
2892:
2877:
2870:
2864:
2849:
2845:
2839:
2824:
2817:
2811:
2796:
2795:www.ready.gov
2792:
2786:
2784:
2767:
2763:
2757:
2749:
2743:
2736:
2735:
2728:
2713:
2706:
2700:
2685:
2678:
2672:
2657:
2650:
2644:
2635:
2626:
2611:
2607:
2601:
2586:
2582:
2576:
2561:
2557:
2551:
2536:
2532:
2526:
2511:
2507:
2501:
2485:
2481:
2475:
2459:
2455:
2449:
2434:
2430:
2424:
2409:
2405:
2399:
2383:
2379:
2373:
2365:
2361:
2355:
2347:
2341:
2333:
2329:
2323:
2315:
2311:
2305:
2297:
2291:
2283:
2277:
2269:
2265:
2259:
2251:
2247:
2241:
2233:
2229:
2223:
2215:
2211:
2205:
2186:
2185:
2177:
2169:
2165:
2161:
2157:
2152:
2147:
2143:
2139:
2135:
2128:
2117:
2110:
2103:
2094:
2086:
2079:
2068:
2061:
2055:
2047:
2043:
2039:
2033:
2025:
2012:
2004:
2000:
1993:
1982:
1975:
1968:
1962:
1957:
1942:on 2020-09-26
1941:
1937:
1931:
1923:
1916:
1910:
1894:
1890:
1884:
1865:
1861:
1854:
1848:
1832:
1828:
1822:
1814:
1810:
1803:
1792:
1788:
1781:
1774:
1763:
1756:
1750:
1743:
1737:
1729:
1723:
1715:
1709:
1701:
1697:
1693:
1689:
1685:
1681:
1677:
1673:
1666:
1658:
1654:
1650:
1646:
1642:
1638:
1631:
1623:
1619:
1615:
1611:
1607:
1603:
1596:
1588:
1584:
1578:
1570:
1564:
1557:
1553:
1549:
1545:
1538:
1530:
1524:
1510:on 2013-10-22
1509:
1505:
1499:
1491:
1490:
1485:
1479:
1463:
1459:
1453:
1439:on 2019-02-09
1435:
1428:
1422:
1420:
1411:
1407:
1401:
1385:
1378:
1370:
1366:
1362:
1358:
1354:
1350:
1343:
1341:
1324:
1320:
1314:
1306:
1302:
1295:
1285:
1274:
1270:
1268:
1260:
1254:
1246:
1245:
1240:
1234:
1227:
1223:
1217:
1213:
1202:
1199:
1197:
1194:
1192:
1189:
1187:
1184:
1182:
1179:
1177:
1174:
1172:
1169:
1165:
1162:
1160:
1157:
1155:
1152:
1151:
1150:
1147:
1145:
1142:
1140:
1137:
1135:
1132:
1130:
1127:
1125:
1122:
1121:
1114:
1102:
1099:
1096:
1093:
1090:
1087:
1084:
1083:
1082:
1071:
1068:
1065:
1061:
1056:
1053:
1052:
1050:
1049:
1048:
1046:
1036:
1030:
1027:
1024:
1023:
1022:
1014:
1008:
1005:
1002:
999:
996:
993:
992:
991:
989:
985:
975:
965:
961:
958:
955:
952:
949:
948:
943:
940:
937:
936:
931:
928:
927:
924:United States
918:
915:
914:
908:
906:
902:
897:
890:
887:
884:
881:
878:
875:
874:
873:
871:
858:
855:
852:
851:ISO/IEC 27031
849:
845:
842:
838:
835:
834:
830:
827:
824:
821:
818:
815:
812:
809:
806:
803:
800:
797:
796:
792:
788:
785:
782:
778:
775:
772:
768:
764:
761:
760:
759:
757:
753:
746:ISO Standards
735:
732:
729:
726:
723:
720:
717:
716:
715:
712:
710:
702:
699:
698:
697:
686:
682:
679:
676:
672:
668:
665:
662:
658:
654:
651:
648:
644:
640:
637:
634:
630:
626:
623:
620:
616:
612:
609:
606:
602:
598:
595:
592:
588:
584:
581:
580:
579:
577:
573:
564:
558:
555:
552:
549:
548:
547:
539:
537:
533:
529:
520:
517:
514:
511:
508:
505:
502:
499:
496:
494:
490:
487:
484:
481:
478:
476:
473:
470:
467:
464:
461:
459:
456:
454:
451:
448:
446:
443:
440:
437:
436:
434:
426:
423:
405:
385:
366:
363:
360:
346:
342:
339:
335:
325:
323:
319:
315:
307:
304:
301:
293:
292:
291:
280:
276:
275:
274:
268:
265:
262:
259:
258:
257:
254:
252:
248:
238:
232:
229:
226:
225:
224:
211:
208:
207:
205:
202:
198:
195:
192:
191:
190:
182:
178:
176:
172:
161:
159:
155:
151:
147:
142:
138:
136:
132:
127:
123:
121:
116:
112:
110:
106:
96:
93:
89:
88:
83:
79:
75:
65:
61:
59:
54:
52:
48:
44:
40:
32:
19:
3522:Storytelling
3442:Intelligence
3322:Architecture
3272:
3216:
3201:
3193:
3185:
3178:
3172:
3142:
3136:(19): 32โ34.
3133:
3129:
3106:
3097:
3078:
3059:
3040:
3030:
3014:
3002:
2993:
2984:
2970:
2947:
2941:
2929:. Retrieved
2925:
2916:
2904:. Retrieved
2900:
2891:
2879:. Retrieved
2875:
2863:
2851:. Retrieved
2847:
2838:
2826:. Retrieved
2822:
2810:
2798:. Retrieved
2794:
2770:. Retrieved
2765:
2756:
2733:
2727:
2715:. Retrieved
2711:
2699:
2687:. Retrieved
2683:
2671:
2659:. Retrieved
2655:
2643:
2634:
2625:
2613:. Retrieved
2609:
2600:
2588:. Retrieved
2584:
2575:
2563:. Retrieved
2559:
2550:
2538:. Retrieved
2534:
2525:
2513:. Retrieved
2509:
2506:"IWA 5:2006"
2500:
2488:. Retrieved
2483:
2474:
2462:. Retrieved
2457:
2448:
2436:. Retrieved
2432:
2423:
2411:. Retrieved
2407:
2398:
2386:. Retrieved
2381:
2372:
2363:
2354:
2340:
2331:
2322:
2313:
2304:
2290:
2276:
2267:
2258:
2249:
2240:
2231:
2222:
2213:
2204:
2192:. Retrieved
2183:
2176:
2141:
2137:
2127:
2114:. IBM Corp.
2102:
2093:
2084:
2078:
2054:
2041:
2032:
2011:cite journal
1992:
1967:
1956:
1946:September 9,
1944:. Retrieved
1940:the original
1930:
1909:
1897:. Retrieved
1892:
1883:
1871:. Retrieved
1859:
1847:
1835:. Retrieved
1830:
1821:
1813:the original
1802:
1786:
1773:
1749:
1736:
1722:
1708:
1678:(1): 14โ18.
1675:
1671:
1665:
1640:
1636:
1630:
1605:
1601:
1595:
1586:
1577:
1563:
1555:
1543:
1537:
1523:
1512:. Retrieved
1508:the original
1498:
1492:. MIT Press.
1488:
1484:Yossi Sheffi
1478:
1466:. Retrieved
1462:the original
1452:
1441:. Retrieved
1434:the original
1410:www.fema.gov
1409:
1400:
1390:29 September
1388:. Retrieved
1377:
1352:
1348:
1327:. Retrieved
1323:the original
1313:
1304:
1294:
1284:
1267:American Bar
1265:
1253:
1242:
1233:
1216:
1111:
1080:
1044:
1042:
1034:
1020:
1012:
1006:
1000:
994:
983:
981:
973:
945:
933:
898:
894:
867:
823:ISO/TS 22332
817:ISO/TS 22331
811:ISO/TS 22330
805:ISO/TS 22318
799:ISO/TS 22317
749:
713:
706:
695:
684:
680:
674:
670:
666:
660:
656:
652:
646:
642:
638:
632:
628:
624:
618:
614:
610:
604:
600:
596:
590:
586:
582:
570:
562:
545:
525:
475:Power outage
458:Cyber attack
432:
424:
347:
343:
333:
331:
321:
317:
313:
311:
289:
272:
255:
244:
236:
222:
188:
179:
167:
157:
143:
139:
128:
124:
120:preparedness
117:
113:
102:
91:
85:
74:supply chain
71:
62:
55:
46:
42:
38:
37:
3492:Performance
3417:Engineering
3397:Diagnostics
3392:Development
3306:Aspects of
1893:praxiom.com
1643:(1): 1โ14.
1608:(1): 1โ14.
1017:Maintenance
734:Backup site
328:Consistency
286:Maximum RTO
3614:Categories
3502:Resilience
3497:Psychology
3467:Narcissism
3457:Life cycle
3372:Complexity
3362:Commitment
2766:AlertMedia
1514:2019-02-04
1443:2019-02-08
1208:References
896:sickness.
847:controls.)
756:ISO/TC 292
536:resiliency
445:Earthquake
263:IT systems
164:Continuity
99:Resilience
90:(COOP). A
3527:Structure
3477:Ombudsman
3432:Hierarchy
3062:. Wiley.
2931:5 January
2906:5 January
2881:5 January
2853:5 January
2828:5 January
2800:5 January
2772:4 January
2717:5 January
2689:5 January
2661:5 January
2615:5 January
2610:BSI Group
2590:5 January
2585:BSI Group
2565:5 January
2560:BSI Group
2540:5 January
2535:BSI Group
2515:5 January
2490:5 January
2464:5 January
2438:5 January
2413:5 January
2388:5 January
2194:5 January
2168:154422711
2160:1543-5938
1899:4 October
1873:4 October
1837:4 October
1700:149004681
1692:0090-9882
1657:0021-9916
1622:1460-2466
1355:: 33โ40.
1329:4 October
1077:Technical
791:ISO 22313
787:ISO 22313
781:ISO 22301
777:ISO 22301
771:ISO 22300
767:ISO 22300
763:ISO 22300
741:Standards
489:Terrorism
485:IT outage
469:Hurricane
441:/pandemic
367:−
278:exceeded.
193:Equipment
185:Inventory
3546:See also
3537:Workshop
3482:Patterns
3452:Learning
3377:Conflict
3327:Behavior
3259:Archived
3206:Archived
3035:Othman.
3019:Archived
2994:drii.org
2116:Archived
2067:Archived
2046:Archived
1981:Archived
1864:Archived
1791:Archived
1762:Archived
1468:28 April
1273:Archived
1271:. 2011.
1149:Disaster
1117:See also
932:(2010).
883:BS 25999
463:Sabotage
439:Epidemic
251:function
247:critical
219:Analysis
68:Overview
56:Several
3447:Justice
3407:Ecology
3402:Dissent
3382:Culture
3357:Climate
3337:Capital
3015:CMS.gov
1552:7698286
1386:. Flevy
1357:Bibcode
877:BS 7799
783::2012.)
299:(MTPoD)
3635:Backup
3532:Theory
3512:Safety
3422:Ethics
3387:Design
3315:Topics
3149:
3113:
3085:
3066:
2958:
2744:
2166:
2158:
1787:RI.gov
1698:
1690:
1655:
1620:
1550:
1244:Forbes
681:Tier 7
667:Tier 6
653:Tier 5
639:Tier 4
625:Tier 3
611:Tier 2
597:Tier 1
583:Tier 0
493:Piracy
201:backup
78:subset
3517:Space
3427:Field
3347:Chart
3342:Cells
3332:Blame
3022:(PDF)
3011:(PDF)
2952:(PDF)
2872:(PDF)
2819:(PDF)
2738:(PDF)
2708:(PDF)
2680:(PDF)
2652:(PDF)
2188:(PDF)
2164:S2CID
2119:(PDF)
2112:(PDF)
2070:(PDF)
2063:(PDF)
1984:(PDF)
1977:(PDF)
1918:(PDF)
1867:(PDF)
1856:(PDF)
1794:(PDF)
1783:(PDF)
1765:(PDF)
1758:(PDF)
1740:ISO,
1696:S2CID
1548:S2CID
1437:(PDF)
1430:(PDF)
1276:(PDF)
1262:(PDF)
1086:Virus
572:SHARE
453:Flood
154:macro
146:micro
3147:ISBN
3111:ISBN
3083:ISBN
3064:ISBN
2956:ISBN
2933:2023
2908:2023
2883:2023
2876:FEMA
2855:2023
2848:FEMA
2830:2023
2823:FEMA
2802:2023
2774:2023
2742:ISBN
2719:2023
2691:2023
2663:2023
2617:2023
2592:2023
2567:2023
2542:2023
2517:2023
2492:2023
2466:2023
2440:2023
2415:2023
2390:2023
2196:2023
2156:ISSN
2024:help
1948:2019
1901:2018
1875:2018
1839:2018
1688:ISSN
1653:ISSN
1618:ISSN
1470:2017
1392:2013
1331:2018
868:The
528:SARS
449:Fire
316:and
150:meso
45:(or
3134:126
2510:ISO
2484:ISO
2458:ISO
2433:ISO
2408:ISO
2382:ISO
2364:ISO
2332:ISO
2314:ISO
2268:ISO
2250:ISO
2232:ISO
2146:doi
1999:doi
1680:doi
1645:doi
1610:doi
1365:doi
1289:48.
758::
498:War
357:RCO
80:of
3616::
3132:.
3128:.
3039:.
3017:.
3013:.
2992:.
2924:.
2899:.
2874:.
2846:.
2821:.
2793:.
2782:^
2764:.
2710:.
2682:.
2654:.
2608:.
2583:.
2558:.
2533:.
2508:.
2482:.
2456:.
2431:.
2406:.
2380:.
2362:.
2330:.
2312:.
2266:.
2248:.
2230:.
2212:.
2162:.
2154:.
2142:37
2140:.
2136:.
2065:.
2044:.
2040:.
2015::
2013:}}
2009:{{
1920:.
1891:.
1858:.
1829:.
1789:.
1785:.
1760:.
1694:.
1686:.
1676:46
1674:.
1651:.
1641:60
1639:.
1616:.
1606:60
1604:.
1585:.
1554:.
1546:.
1418:^
1408:.
1363:.
1353:28
1351:.
1339:^
1303:.
1264:.
1241:.
1224:,
1047::
907:.
711:.
683:โ
669:โ
655:โ
641:โ
627:โ
613:โ
599:โ
585:โ
324:.
3299:e
3292:t
3285:v
3155:.
3119:.
3100:.
3091:.
3072:.
3043:.
2996:.
2978:.
2964:.
2935:.
2910:.
2885:.
2857:.
2832:.
2804:.
2776:.
2750:.
2721:.
2693:.
2665:.
2619:.
2594:.
2569:.
2544:.
2519:.
2494:.
2468:.
2442:.
2417:.
2392:.
2366:.
2348:.
2334:.
2298:.
2284:.
2270:.
2216:.
2198:.
2170:.
2148::
2087:.
2026:)
2022:(
2005:.
2001::
1950:.
1903:.
1877:.
1841:.
1702:.
1682::
1659:.
1647::
1624:.
1612::
1589:.
1531:.
1517:.
1472:.
1446:.
1412:.
1394:.
1371:.
1367::
1359::
1333:.
1307:.
1066:,
950:.
635:.
491:/
406:n
402:)
393:(
386:n
382:)
373:(
364:1
361:=
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.