145:(national or interorganizational). There are also two main types of resilience, which are proactive and post resilience. Proactive resilience is preparing for a crisis and creating a solid foundation for the company. Post resilience includes continuing to maintain communication and check in with employees. Proactive resilience is dealing with issues at hand before they cause a possible shift in the work environment and post resilience maintaining communication and accepting changes after an incident has happened. Resilience can be applied to any organization. In New Zealand, the Canterbury University Resilient Organisations programme developed an assessment tool for benchmarking the Resilience of Organisations. It covers 11 categories, each having 5 to 7 questions. A
126:. In her 2010 article, "Resilience: Talking, Resisting, and Imagining New Normalcies Into Being" Buzzanell discussed the ability for organizations to thrive after having a crisis through building resistance. Buzzanell notes that there are five different processes that individuals use when trying to maintain resilience- crafting normalcy, affirming identity anchors, maintaining and using communication networks, putting alternative logics to work and downplaying negative feelings while foregrounding positive emotions.
3566:
676:โข Tier 7 solutions include all the major components being used for a Tier 6 solution with the additional integration of automation. This allows a Tier 7 solution to ensure consistency of data above that of which is granted by Tier 6 solutions. Additionally, recovery of the applications is automated, allowing for restoration of systems and applications much faster and more reliably than would be possible through manual Disaster Recovery procedures.
892:: Businesses must have continuity planning measures to survive and continue to thrive whilst working towards keeping the incident as minimal as possible. The Act was separated into two parts: Part 1: civil protection, covering roles & responsibilities for local responders Part 2: emergency powers. In the United Kingdom, resilience is implemented locally by the
130:
crafting normalcy, affirming identity anchors, maintaining and using communication networks, putting alternative logics to work, and downplaying negative feelings while foregrounding negative emotions. Each of these processes can be applicable to businesses in crisis times, making resilience an important factor for companies to focus on while training.
606:โข Tier 2 Disaster Recovery solutions make regular backups on tape. This is combined with an off-site facility and infrastructure (known as a hot site) in which to restore systems from those tapes in the event of a disaster. This tier solution will still result in the need to recreate several hours to days worth of data, but
157:
Plans and procedures are used in business continuity planning to ensure that the critical organizational operations required to keep an organization running continue to operate during events when key dependencies of operations are disrupted. Continuity does not need to apply to every activity which
129:
When looking at the resilience theory, the crisis communication theory is similar, but not the same. The crisis communication theory is based on the reputation of the company, but the resilience theory is based on the process of recovery of the company. There are five main components of resilience:
83:
outlines a range of disaster scenarios and the steps the business will take in any particular scenario to return to regular trade. BCP's are written ahead of time and can also include precautions to be put in place. Usually created with the input of key staff as well as stakeholders, a BCP is a set
884:
Within the UK, BS 25999-2:2007 and BS 25999-1:2006 were being used for business continuity management across all organizations, industries and sectors. These documents give a practical plan to deal with most eventualitiesโfrom extreme weather conditions to terrorism, IT system failure, and staff
103:
Adapting to change in an apparently slower, more evolutionary manner - sometimes over many years or decades - has been described as being more resilient, and the term "strategic resilience" is now used to go beyond resisting a one-time crisis, but rather continuously anticipating and adjusting,
52:
Business continuity requires a top-down approach to identify an organisation's minimum requirements to ensure its viability as an entity. An organization's resistance to failure is "the ability ... to withstand changes in its environment and still function". Often called resilience, it is a
20:
634:โข Tier 4 solutions are used by businesses that require both greater data currency and faster recovery than users of lower tiers. Rather than relying largely on shipping tape, as is common in the lower tiers, Tier 4 solutions begin to incorporate more disk-based solutions.
410:
266:
Recovery point objective (RPO) โ the acceptable latency of data that will not be recovered. For example, is it acceptable for the company to lose 2 days of data? The recovery point objective must ensure that the maximum tolerable data loss for each activity is not
329:
objectives, to define a measurement for the consistency of distributed business data within interlinked systems after a disaster incident. Similar terms used in this context are "Recovery
Consistency Characteristics" (RCC) and "Recovery Object Granularity" (ROG).
1101:
Software and work process changes must be documented and validated, including verification that documented work process recovery tasks and supporting disaster recovery infrastructure allow staff to recover within the predetermined recovery time objective.
930:
3025:
790::2021 Security and resilience โ Business continuity management systems โ Guidelines for business impact analysis - (Replaces ISO/TS 22315:2015 Societal security โ Business continuity management systems โ Guidelines for business impact analysis.)
796::2021 Security and resilience โ Business continuity management systems โ Guidelines for supply chain continuity (Replaces ISO/TS 22318:2015 Societal security โ Business continuity management systems โ Guidelines for supply chain continuity.)
114:
Resilience Theory can be related to the field of Public
Relations. Resilience is a communicative process that is constructed by citizens, families, media system, organizations and governments through everyday talk and mediated conversation.
2104:
2026:
2034:
1415:
620:โข Tier 3 solutions utilize components of Tier 2. Additionally, some mission-critical data is electronically vaulted. This electronically vaulted data is typically more current than that which is shipped via PTAM. As a result there is
333:
While RTO and RPO are absolute per-system values, RCO is expressed as a percentage that measures the deviation between actual and targeted state of business data across systems for process groups or individual business processes.
835:
ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection โ Information security controls. (Replaces ISO/IEC 27002:2013 Information technology โ Security techniques โ Code of practice for information security
832:, cybersecurity and privacy protection โ Information security management systems โ Requirements. (Replaces ISO/IEC 27001:2013 Information technology โ Security techniques โ Information security management systems โ Requirements.)
992:- Several departments, teams or disciplines concentrate on multiple BCP aspects; the scope can range from a few teams from one building to multiple teams operating across dispersed locations. Pre-scripted "surprises" are added.
53:
capability that enables organizations to either endure environmental changes without having to permanently adapt, or the organization is forced to adapt a new way of working that better suits the new environmental conditions.
3173:
820::2014 Conformity assessment โ Requirements for bodies providing audit and certification of management systems โ Part 6: Competence requirements for auditing and certification of business continuity management systems.
2637:
1261:
666:. They are used by businesses with little or no tolerance for data loss and who need to restore data to applications rapidly. These solutions have no dependence on the applications to provide data consistency.
38:) is the process of creating systems of prevention and recovery to deal with potential threats to a company. In addition to prevention, the goal is to enable ongoing operations before and during execution of
169:
A major cost in planning for this is the preparation of audit compliance management documents; automation tools are available to reduce the time and cost associated with manually producing this information.
1277:
Elliot, D.; Swartz, E.; Herbane, B. (1999) Just waiting for the next big bang: business continuity planning in the UK finance sector. Journal of
Applied Management Studies, Vol. 8, No, pp. 43โ60. Here: p.
578:โข Businesses with a Tier 0 Disaster Recovery solution have no Disaster Recovery Plan. There is no saved information, no documentation, no backup hardware, and no contingency plan. Typical recovery time:
2964:
226:
Quantifying of loss ratios must also include "dollars to defend a lawsuit." It has been estimated that a dollar spent in loss prevention can prevent "seven dollars of disaster-related economic loss."
2097:
1422:
340:
3007:
279:
Maximum time constraints for how long an enterprise's key products or services can be unavailable or undeliverable before stakeholders perceive unacceptable consequences have been named as:
1492:
2055:
2519:
1446:
3181:
1545:"An estimated 80 percent of companies without a well-conceived and tested business continuity plan, go out of business within two years of a major disaster" (Santangelo 2004)
162:, organizations are required to define their business continuity objectives, the minimum levels of product and service operations which will be considered acceptable and the
30:
may be defined as "the capability of an organization to continue the delivery of products or services at pre-defined acceptable levels following a disruptive incident", and
592:โข Businesses that use Tier 1 Disaster Recovery solutions back up their data at an off-site facility. Depending on how often backups are made, they are prepared to accept
1247:
2594:
998:- All aspects of a medium exercise remain, but for maximum realism no-notice activation, actual evacuation and actual invocation of a disaster recovery site is added.
942:
825:
ISO/IEC 24762:2008 Information technology โ Security techniques โ Guidelines for information and communications technology disaster recovery services (withdrawn)
814::2021 Security and resilience โ Business continuity management systems โ Guidelines for developing business continuity plans and procedures (Current as of 2022.)
2627:
Cabinet Office. (2004). overview of the Act. In: Civil
Contingencies Secretariat Civil Contingencies Act 2004: a short. London: Civil Contingencies Secretariat
337:
The following formula calculates RCO with "n" representing the number of business processes and "entities" representing an abstract value for business data:
1797:
1517:
3247:
1779:
1289:
817:
422:
After defining recovery requirements, each potential threat may require unique recovery steps (contingency plans or playbooks). Common threats include:
3286:
1924:
1227:
1147:
2996:
1750:
96:
over entities not prepared for various contingencies extended then-common business continuity planning practices. Business organizations such as the
1969:
2544:
802::2018 Security and resilience โ Business continuity management systems โ Guidelines for people aspects on business continuity (Current as of 2022.)
743:(ISO) has for example developed a whole series of standards on Business continuity management systems under responsibility of technical committee
839:
638:, but it is easier to make such point-in-time (PIT) copies with greater frequency than data that can be replicated through tape-based solutions.
1557:
1496:
986:- a small number of people concentrate on a specific aspect of a BCP. Another form involves a single representative from each of several teams.
842::2011 Information technology โ Security techniques โ Guidelines for information and communication technology readiness for business continuity.
811:
805:
799:
793:
787:
740:
1730:
951:
ASIS SPC.1-2009, Organizational
Resilience: Security, Preparedness, and Continuity Management Systems - Requirements with Guidance for Use,
808::2018 Security and resilience โ Business continuity management systems โ Guidelines for business continuity strategy - (Current as of 2022.)
648:โข Tier 5 solutions are used by businesses with a requirement for consistency of data between production and recovery data centers. There is
3227:
596:, but their backups are secure off-site. However, this Tier lacks the systems on which to restore data. Pickup Truck Access Method (PTAM).
321:
When more than one system crashes, recovery plans must balance the need for data consistency with other objectives, such as RTO and RPO.
2937:
ASIS SPC.1-2009 Organizational
Resilience: Security, Preparedness, and Continuity Management Systems - Requirements with Guidance for Use
2048:
1307:
1450:
92:
A 2005 analysis of how disruptions can adversely affect the operations of corporations and how investments in resilience can give a
3485:
2569:
3162:
3279:
1903:
2348:
2316:
2298:
2252:
2234:
2216:
692:
Outside IT: preservation of hard copy (such as contracts). A process plan must consider skilled staff and embedded technology.
65:
interruption, loss of or damage to critical infrastructure (major machinery or computing/network resource). As such, BCP is a
42:. Business continuity is the intended outcome of proper execution of both business continuity planning and disaster recovery.
2948:
952:
845:
ISO/PAS 22399:2007 Societal security - Guideline for incident preparedness and operational continuity management (withdrawn)
1950:
1852:
1002:
While start and stop times are pre-agreed, the actual duration might be unknown if events are allowed to run their course.
935:
923:
1014:
Confirmation of information in the manual, roll out to staff for awareness and specific training for critical individuals.
405:{\displaystyle {\text{RCO}}=1-{\frac {({\text{number of inconsistent entities}})_{n}}{({\text{number of entities}})_{n}}}}
3495:
3360:
3340:
3194:
2734:
3189:
3139:
3103:
3075:
3056:
1336:
Ian McCarthy; Mark
Collard; Michael Johnson (2017). "Adaptive organizational resilience: an evolutionary perspective".
3239:
3450:
3330:
3272:
3222:
861:(BSI Group) released a series of standards which have since been withdrawn and replaced by the ISO standards above.
778::2020 Security and resilience โ Business continuity management systems โ Guidance on the use of ISO 22301 (Replaces
3572:
3551:
3475:
1214:
3648:
3582:
3460:
2693:
2665:
1801:
1768:
3244:
1010:
Biannual or annual maintenance cycle maintenance of a BCP manual is broken down into three periodic activities.
3628:
3587:
2804:
2520:"BS 7799-1:1995 Information security management - Code of practice for information security management systems"
1910:
1624:
Buzzanell, Patrice M. (March 2010). "Resilience: Talking, Resisting, and
Imagining New Normalcies Into Being".
652:
in such solutions; however, the presence of this functionality is entirely dependent on the application in use.
523:
of the disease. They also banned in-person contact during both business and non-business hours. This increased
880:
2008: BS 25777, Information and communications technology continuity management. Code of practice. (withdrawn)
3638:
3425:
2595:"BS 25777:2008 (Paperback) Information and communications technology continuity management. Code of practice"
976:
858:
75:
46:
1531:
Tiffany Braun; Benjamin Martz (2007). "Business
Continuity Preparedness and the Mindfulness State of Mind".
3613:
3400:
3355:
2832:
1928:
1743:
1394:
889:
782::2012 Security and resilience - Business continuity management systems - Guidance on the use of ISO 22301.)
1962:
3643:
3510:
3490:
3455:
3430:
3375:
3310:
1589:
Buzzanell, Patrice M. (2010). "Resilience: Talking, Resisting, and
Imagining New Normalcies Into Being".
1210:
739:
There are many standards that are available to support business continuity planning and management. The
524:
2935:
515:
The above areas can cascade: Responders can stumble. Supplies may become depleted. During the 2002โ2003
245:
Each function/activity typically relies on a combination of constituent components in order to operate:
3633:
3480:
3405:
3385:
2721:
446:
239:
97:
1815:
3608:
3445:
3420:
3350:
2618:
British Standards Institution (2006). Business continuity management-Part 1: Code of practice :London
2198:
2012:
3577:
3541:
3515:
3465:
3380:
1659:
Buzzanell, Patrice M. (2018-01-02). "Organizing resilience as adaptive-transformational tensions".
945:(COOP) and National Continuity Policy Implementation Plan (NCPIP), United States Federal Government
689:
For IT: the minimum application and data requirements and the time in which they must be available.
49:
have been published by various standards bodies to assist in checklisting ongoing planning tasks.
3470:
3440:
3365:
3315:
1152:
979:
identified three types of exercises that can be employed when testing business continuity plans.
768::2019 Security and resilience โ Business continuity management systems โ Requirements (Replaces
3618:
3435:
3395:
3390:
3370:
3325:
2173:
CERTยฎ Resilience Management Model (RMM) v1.1: Code of Practice Crosswalk Commercial Version 1.1
963:
The implementation phase involves policy changes, material acquisitions, staffing and testing.
893:
948:
Business Continuity Planning Suite, DHS National Protection and Programs Directorate and FEMA.
309:
mean the same thing and are defined using exactly the same words. Some standards use the term
3525:
3520:
3500:
3410:
1999:
93:
877:
BS 25999-2:2007 Business Continuity Management Part 2: Specification (superseded, withdrawn)
3546:
3505:
3415:
3345:
3335:
3232:
2910:
2857:
1345:
1311:
1159:
1117:
829:
270:
Recovery time objective (RTO) โ the acceptable amount of time to restore the function
2139:
2122:
61:
Any event that could negatively impact operations should be included in the plan, such as
8:
1184:
874:-1:2006 - Business continuity management Part 1: Code of practice (superseded, withdrawn)
3256:
1349:
1024:
Issues found during the testing phase often must be reintroduced to the analysis phase.
2152:
1684:
1536:
1132:
2805:"NATIONAL CONTINUITY POLICY IMPLEMENTATION PLAN Homeland Security Council August 2007"
1572:"Communication and resilience: concluding thoughts and key issues for future research"
1372:
3135:
3099:
3071:
3052:
2944:
2730:
2723:
NFPA 1600, Standard on Disaster/Emergency Management and Business Continuity Programs
2156:
2144:
1688:
1676:
1641:
1637:
1606:
1602:
1571:
1179:
1169:
1142:
1122:
1112:
1052:
707:
697:
564:
560:
520:
123:
119:
39:
3217:
3212:
1017:
Testing and verification of technical solutions established for recovery operations.
919:
NFPA 1600 Standard on Disaster/Emergency Management and Business Continuity Programs
84:
of contingencies to minimize potential harm to businesses during adverse scenarios.
2134:
1987:
1877:
1668:
1633:
1598:
1540:
1353:
1189:
1164:
1127:
716:
326:
1672:
1061:
Information about communication and transportation infrastructure (roads, bridges)
3623:
3251:
3198:
2779:
1841:
1357:
1174:
1032:
The BCP manual must evolve with the organization, and maintain information about
235:
70:
3204:
1716:
2171:
1991:
1949:"How to evaluate a recovery management solution." West World Productions, 2006
1074:
888:
In 2004, following crises in the preceding years, the UK government passed the
3320:
3209:
Mary Hall. The Storage Community (IBM). 18 July 2011. Retrieved 26 March 2013.
2570:"BS 25999-2:2007 (USA Edition) Business continuity management - Specification"
868:-1:1995 - peripherally addressed information security procedures. (withdrawn)
519:
outbreak, some organizations compartmentalized and rotated teams to match the
3602:
3087:
Business Continuity Plan Design, 8 Steps for Getting Started Designing a Plan
2750:
2148:
1680:
1645:
1610:
1478:
The Resilient Enterprise: Overcoming Vulnerability for Competitive Enterprise
610:. Examples include: PTAM with Hot Site available, IBM Tivoli Storage Manager.
1558:"Annex A.17: Information Security Aspects of Business Continuity Management"
238:(urgent) and non-critical (non-urgent) organization functions/activities. A
3296:
3264:
1472:
1255:
463:
108:
62:
2978:
2638:"July 2013 (V2) The role of Local Resilience Forums: A reference document"
2494:
2468:
2442:
2417:
2392:
2366:
2334:
2284:
2270:
195:
Documents and documentation, including which have off-site backup copies:
3175:
SteelStore Cloud Storage Gateway: Disaster Recovery Best Practices Guide.
2729:(2010 ed.). Quincy, MA: National Fire Protection Association. 2010.
722:
189:
3166:
Charlotte Brooks, Matthew Bedernjak, Igor Juran, and John Merryman. In,
1335:
744:
713:
Telecommunication architecture between primary and secondary work sites
433:
3218:
Maximum Tolerable Period of Disruption (MTPOD): BSI committee response
3148:
1963:"Six Myths About Business Continuity Management and Disaster Recovery"
1476:
905:
HB 292-2006, "A practitioners guide to business continuity management"
567:
released in 1992, were updated in 2012 by IBM as an eight tier model:
414:
100% RCO means that post recovery, no business data deviation occurs.
142:
134:
3170:
Chapter 2. Pages 21โ36. Red Books Series. IBM. Tivoli Software. 2002.
1518:"Newsday | Long Island's & NYC's News Source | Newsday"
1051:
Definitions of terminology to facilitate timely communication during
918:
779:
775:
769:
765:
759:
755:
751:
477:
457:
159:
1960:
1070:
Specialized technical resources must be maintained. Checks include:
138:
133:
There are three main groups that are affected by a crisis. They are
2545:"BS 25999-1:2006 Business continuity management - Code of practice"
2086:
developed by SHARE's Technical Steering Committee, working with IBM
1731:
ISO 22301 Business Continuity Management: Your implementation guide
1137:
931:
NFPA 1600, Standard on Continuity, Emergency, and Crisis Management
871:
451:
427:
3186:
Robert Kern and Victor Peltz. IBM Systems Magazine. November 2003.
3114:
2666:"HB HB 292โ2006 Executive Guide to Business Continuity Management"
1228:"How to Build an Effective and Organized Business Continuity Plan"
1096:
249:
Human resources (full-time staff, part-time staff, or contractors)
2885:
2123:"Disaster Governance: Social, Political, and Economic Dimensions"
865:
492:
Theft (insider or external threat, vital information or material)
3257:
Adapt and respond to risks with a business continuity plan (BCP)
2072:
Chloe Demrovsky (December 22, 2017). "Holding It All Together".
1447:"Business Continuity Planning (BCP) for Businesses of all Sizes"
1058:
Distribution lists (staff, important clients, vendors/suppliers)
908:
HB 293-2006, "Executive guide to business continuity management"
16:
Prevention and recovery from threats that might affect a company
2694:"HB 293โ2006 Executive Guide to Business Continuity Management"
1395:"Continuity Resources and Technical Assistance | FEMA.gov"
1310:. United States Department of Homeland Security. Archived from
1232:
481:
66:
19:
1878:"Plain English ISO 22301 2012 Business Continuity Definitions"
1842:"BIA Instructions, BUSINESS CONTINUITY MANAGEMENT - WORKSHOP"
1020:
Testing and verification of organization recovery procedures.
580:
The length of recovery time in this instance is unpredictable
441:
3206:
Continuous Operations: The Seven Tiers of Disaster Recovery.
3168:
Disaster Recovery Strategies with Tivoli Storage Management.
3096:
Disaster Survival Planning: A Practical Guide for Businesses
1702:
3129:
1530:
516:
122:, a professor at the Brian Lamb School of Communication at
73:. In the U.S., government entities refer to the process as
2833:"Continuity Resources and Technical Assistance | FEMA.gov"
1416:"A Guide to the preparation of a Business Continuity Plan"
685:
Two main requirements from the impact analysis stage are:
255:
Physical assets (mobile phones, laptops/workstations etc.)
104:"before the case for change becomes desperately obvious".
3240:
Department of Homeland Security Emergency Plan Guidelines
1986:"Medical supply location and distribution in disasters".
1925:"The Rise and Rise of the Recovery Consistency Objective"
1851:. Disaster Recovery Information Exchange (DRIE) Central.
1043:
Job descriptions, skillsets needed, training requirements
486:
966:
3191:
Business Continuity: The 5-tiers of Disaster Recovery.
2098:"A Business Continuity Solution Selection Methodology"
754::2021 Security and resilience โ Vocabulary (Replaces
3026:"Validation of a Disaster Management Metamodel (DMM)"
343:
2751:"A Comprehensive Overview of the NFPA 1600 Standard"
1290:"Constructing a Successful Business Continuity Plan"
719:
methodology between primary and secondary work sites
622:
less data recreation or loss after a disaster occurs
582:. In fact, it may not be possible to recover at all.
1917:
1913:- National Cyber Security Center. 2022. p. 12.
1769:"Can your Organization survive a natural disaster?"
1080:
Application security and service patch distribution
3068:Business Continuity Planning, A Step-by-Step Guide
1148:Disaster recovery and business continuity auditing
404:
1217:, published April 2018, accessed 19 February 2021
552:These should reflect the widest possible damage.
468:Water outage (supply interruption, contamination)
417:
229:
3600:
3065:
2911:"Business Continuity Planning Suite | Ready.gov"
758::2018 Security and resilience - Vocabulary and
535:Impact scenarios are identified and documented:
234:A business impact analysis (BIA) differentiates
158:the organization undertakes. For example, under
3046:
2943:. American National Standards Institute. 2009.
2071:
1338:Current Opinion in Environmental Sustainability
1097:Testing and verification of recovery procedures
242:may be considered critical if dictated by law.
3213:Maximum Tolerable Period of Disruption (MTPOD)
2203:International Organization for Standardization
2169:
2027:"transportation planning in disaster recovery"
1961:Josh Krischer; Donna Scott; Roberta J. Witty.
741:International Organization for Standardization
674:Highly automated, business-integrated solution
548:need for business and data processing supplies
3280:
1209:BCI Good Practice Guidelines 2013, quoted in
958:
848:IWA 5:2006 Emergency Preparedness (withdrawn)
3294:
3112:
3098:. Disaster Survival Planning, Incorporated.
3084:
2199:"ISO - ISO/TC 292 - Security and resilience"
2179:. Pittsburgh, PA: Carnegie Mellon University
2170:Partridge, Kevin G.; Young, Lisa R. (2011).
2095:
1471:
762::2012 Security and resilience - Vocabulary.)
664:maintain the highest levels of data currency
636:Several hours of data loss is still possible
262:For each function, two values are assigned:
2774:
2772:
1766:
1287:
325:(RCO) is the name of this goal. It applies
36:business continuity and resiliency planning
3287:
3273:
2127:Annual Review of Environment and Resources
1027:
495:Random failure of mission-critical systems
107:This approach is sometimes summarized as:
3093:
2163:
2138:
1661:Journal of Applied Communication Research
1658:
1623:
1588:
608:it is less unpredictable in recovery time
2769:
2089:
2049:"PLANNING SCENARIOS Executive Summaries"
1816:"Maximum Acceptable Outage (Definition)"
1410:
1408:
1370:
555:
18:
3178:Riverbed Technology, Inc. October 2011.
3163:The tiers of Disaster Recovery and TSM.
3049:A Guide to Business Continuity Planning
2858:"Continuity of operations: An overview"
2120:
2114:
1371:Intrieri, Charles (10 September 2013).
899:
188:Locations, including other offices and
23:Business continuity planning life cycle
3601:
3130:Andrew Zolli; Ann Marie Healy (2013).
2780:"Business Continuity Plan | Ready.gov"
2121:Tierney, Kathleen (21 November 2012).
1733:, published, accessed 20 February 2021
1331:
1329:
725:with applications, data and work space
307:maximum tolerable period of disruption
285:Maximum tolerable period of disruption
178:Planners must have information about:
164:maximum tolerable period of disruption
3268:
3245:CIDRAP/SHRM Pandemic HR Guide Toolkit
3149:International Glossary for Resilience
2957:
2140:10.1146/annurev-environ-020911-095618
1405:
1046:Documentation and document management
967:Testing and organizational acceptance
953:American National Standards Institute
662:โข Tier 6 Disaster Recovery solutions
111:, protection, response and recovery.
1215:Business Continuity Policy Statement
936:National Fire Protection Association
924:National Fire Protection Association
852:
545:civilian impact of nuclear disasters
2979:"Glossary | DRI International"
2965:"Business Continuity Plan Template"
1326:
530:
118:The theory is based on the work of
13:
3132:Resilience: Why Things Bounce Back
3113:Dimattia, S. (November 15, 2001).
3040:
3023:
2997:"Disaster Recovery Plan Checklist"
1904:"Baseline Cyber Security Controls"
1493:"Transform. The Resilient Economy"
680:
594:several days to weeks of data loss
258:Documents (electronic or physical)
14:
3660:
3155:
2074:Manufacturing Business Technology
301:According to ISO 22301 the terms
76:continuity of operations planning
3565:
3564:
3552:Outline of organizational theory
3013:from the original on 2022-10-09.
2110:from the original on 2022-10-09.
2061:from the original on 2022-10-09.
2037:from the original on 2022-10-09.
1975:from the original on 2022-10-09.
1785:from the original on 2022-10-09.
1756:from the original on 2022-10-09.
1638:10.1111/j.1460-2466.2009.01469.x
1603:10.1111/j.1460-2466.2009.01469.x
1267:from the original on 2022-10-09.
912:
734:
291:Maximum tolerable downtime (MTD)
212:The analysis phase consists of:
163:
3066:Kenneth L Fulmer (2004-10-04).
3017:
2989:
2971:
2928:
2903:
2878:
2850:
2825:
2797:
2743:
2714:
2686:
2658:
2630:
2621:
2612:
2587:
2562:
2537:
2512:
2487:
2461:
2435:
2410:
2385:
2359:
2341:
2327:
2309:
2291:
2277:
2263:
2245:
2227:
2209:
2191:
2096:Ellis Holman (March 13, 2012).
2080:
2065:
2041:
2019:
1979:
1954:
1943:
1896:
1870:
1858:from the original on 2022-10-09
1834:
1808:
1795:
1789:
1767:Helen Clark (August 15, 2012).
1760:
1736:
1723:
1709:
1695:
1652:
1617:
1582:
1564:
1550:
1524:
1510:
1485:
1465:
1449:. 19 April 2017. Archived from
1439:
1258:.org (American Bar Association)
890:Civil Contingencies Act of 2004
703:The solution phase determines:
542:need for transportation options
366:number of inconsistent entities
297:Maximum acceptable outage (MAO)
192:/work area recovery (WAR) sites
100:embraced this resilience goal.
3047:James C. Barnes (2001-06-08).
1387:
1373:"Business Continuity Planning"
1364:
1300:
1281:
1271:
1240:
1220:
1203:
1005:
418:Threat and risk analysis (TRA)
390:
381:
370:
361:
323:Recovery Consistency Objective
316:
294:Maximum tolerable outage (MTO)
274:
230:Business impact analysis (BIA)
1:
1673:10.1080/00909882.2018.1426711
1560:. ISMS.online. November 2021.
1288:Alan Berman (March 9, 2015).
1196:
977:British Standards Institution
859:British Standards Institution
166:(MTPD) which can be allowed.
152:
87:
47:business continuity standards
1927:. 2016-03-22. Archived from
1884:. Praxiom Research Group LTD
1358:10.1016/j.cosust.2017.07.005
1065:
729:
590:Data backup with no Hot Site
454:(insider or external threat)
173:
149:summarizes this evaluation.
141:(group or organization) and
32:business continuity planning
7:
3201:Recovery Specialties. 2007.
1294:Business Insurance Magazine
1211:Mid Sussex District Council
1105:
207:
56:
10:
3667:
3094:Judy Bell (October 1991).
1992:10.1016/j.ijpe.2009.10.004
1308:"Business Continuity Plan"
959:Implementation and testing
933:(2019, current standard),
698:disaster recovery planning
98:Council on Competitiveness
3560:
3534:
3303:
3183:Disaster Recovery Levels.
3115:"Planning for Continuity"
2349:"ISO/IEC TS 17021-6:2014"
1703:"Resilient Organisations"
973:Exercising for Excellence
696:This phase overlaps with
604:Data backup with Hot Site
539:need for medical supplies
303:maximum acceptable outage
219:Threat and risks analysis
3542:History of organizations
3233:Business Continuity Plan
3134:. Simon & Schuster.
1626:Journal of Communication
1591:Journal of Communication
943:Continuity of Operations
660:Zero or little data loss
81:business continuity plan
3573:Aspects of corporations
1717:"Resilience Diagnostic"
1153:Disaster risk reduction
1086:Application operability
1077:definition distribution
1040:A series of checklists
1028:Information and targets
498:Single point dependency
201:Procedure documentation
3649:Management cybernetics
3583:Aspects of occupations
2886:"Business | Ready.gov"
2007:Cite journal requires
1533:AMCIS 2007 Proceedings
1248:"Surviving a Disaster"
894:Local Resilience Forum
650:little to no data loss
406:
311:maximum downtime limit
185:Supplies and suppliers
24:
3629:Disaster preparedness
3588:Aspects of workplaces
1822:. Albion Research Ltd
1798:"Finding RPO and RTO"
646:Transaction integrity
556:Tiers of preparedness
407:
94:competitive advantage
22:
3639:Emergency management
3547:Organization studies
3496:Retaliatory behavior
3341:Citizenship behavior
3151:, DRI International.
2469:"ISO/PAS 22399:2007"
2443:"ISO/IEC 27031:2011"
2418:"ISO/IEC 27002:2022"
2393:"ISO/IEC 27001:2022"
2367:"ISO/IEC 24762:2008"
1968:. Gartner Research.
1911:Ministry of Interior
1744:"Emergency Planning"
1719:. November 28, 2017.
1576:www.researchgate.net
1160:Emergency management
1118:Catastrophe modeling
1083:Hardware operability
1034:who has to know what
900:Australian standards
830:Information security
632:Point-in-time copies
527:against the threat.
460:or other major storm
341:
120:Patrice M. Buzzanell
3614:Business continuity
2701:Standards Australia
2673:Standards Australia
2335:"Iso/Ts 22332:2021"
2317:"ISO/TS 22331:2018"
2299:"ISO/TS 22330:2018"
2285:"Iso/Ts 22318:2021"
2271:"Iso/Ts 22317:2021"
1350:2017COES...28...33M
1185:Systems engineering
975:, published by The
828:ISO/IEC 27001:2022
618:Electronic vaulting
28:Business continuity
3644:IT risk management
3569:See also templates
3250:2013-05-18 at the
3197:2018-09-26 at the
3085:Richard Kepenach.
3030:SCHOLAR.google.com
2449:. 5 September 2016
2031:SCHOLAR.google.com
1314:on 7 December 2018
1133:Digital continuity
984:Tabletop exercises
818:ISO/IEC/TS 17021-6
563:'s seven tiers of
402:
386:number of entities
198:Business documents
25:
3634:Disaster recovery
3596:
3595:
3476:Perceived support
2950:978-1-887056-92-2
2757:. 29 January 2019
1820:riskythinking.com
1705:. March 22, 2011.
1180:Scenario planning
1143:Disaster recovery
1123:Crisis management
1113:Capacity planning
1089:Data verification
1053:disaster recovery
996:Complex exercises
853:British standards
710:command structure
708:Crisis management
565:disaster recovery
521:incubation period
400:
387:
367:
347:
124:Purdue University
40:disaster recovery
3656:
3609:Systems thinking
3568:
3567:
3461:Network analysis
3451:Machiavellianism
3289:
3282:
3275:
3266:
3265:
3228:Janco Associates
3145:
3126:
3109:
3090:
3081:
3062:
3034:
3033:
3021:
3015:
3014:
3012:
3001:
2993:
2987:
2986:
2975:
2969:
2968:
2961:
2955:
2954:
2942:
2932:
2926:
2925:
2923:
2921:
2907:
2901:
2900:
2898:
2896:
2882:
2876:
2875:
2873:
2871:
2862:
2854:
2848:
2847:
2845:
2843:
2829:
2823:
2822:
2820:
2818:
2809:
2801:
2795:
2794:
2792:
2790:
2776:
2767:
2766:
2764:
2762:
2747:
2741:
2740:
2728:
2718:
2712:
2711:
2709:
2707:
2698:
2690:
2684:
2683:
2681:
2679:
2670:
2662:
2656:
2655:
2653:
2651:
2642:
2634:
2628:
2625:
2619:
2616:
2610:
2609:
2607:
2605:
2591:
2585:
2584:
2582:
2580:
2566:
2560:
2559:
2557:
2555:
2541:
2535:
2534:
2532:
2530:
2516:
2510:
2509:
2507:
2505:
2491:
2485:
2484:
2482:
2480:
2465:
2459:
2458:
2456:
2454:
2439:
2433:
2432:
2430:
2428:
2414:
2408:
2407:
2405:
2403:
2389:
2383:
2382:
2380:
2378:
2363:
2357:
2356:
2345:
2339:
2338:
2331:
2325:
2324:
2313:
2307:
2306:
2295:
2289:
2288:
2281:
2275:
2274:
2267:
2261:
2260:
2253:"ISO 22313:2020"
2249:
2243:
2242:
2235:"ISO 22301:2019"
2231:
2225:
2224:
2217:"ISO 22300:2018"
2213:
2207:
2206:
2195:
2189:
2188:
2186:
2184:
2178:
2167:
2161:
2160:
2142:
2118:
2112:
2111:
2109:
2102:
2093:
2087:
2084:
2078:
2077:
2069:
2063:
2062:
2060:
2053:
2045:
2039:
2038:
2023:
2017:
2016:
2010:
2005:
2003:
1995:
1983:
1977:
1976:
1974:
1967:
1958:
1952:
1947:
1941:
1940:
1938:
1936:
1921:
1915:
1914:
1908:
1900:
1894:
1893:
1891:
1889:
1874:
1868:
1867:
1865:
1863:
1857:
1846:
1838:
1832:
1831:
1829:
1827:
1812:
1806:
1805:
1800:. Archived from
1793:
1787:
1786:
1784:
1773:
1764:
1758:
1757:
1755:
1748:
1740:
1734:
1727:
1721:
1720:
1713:
1707:
1706:
1699:
1693:
1692:
1656:
1650:
1649:
1621:
1615:
1614:
1586:
1580:
1579:
1568:
1562:
1561:
1554:
1548:
1547:
1528:
1522:
1521:
1514:
1508:
1507:
1505:
1504:
1495:. Archived from
1489:
1483:
1482:
1475:(October 2005).
1469:
1463:
1462:
1460:
1458:
1453:on 24 April 2017
1443:
1437:
1436:
1434:
1433:
1427:
1421:. Archived from
1420:
1412:
1403:
1402:
1391:
1385:
1384:
1382:
1380:
1368:
1362:
1361:
1333:
1324:
1323:
1321:
1319:
1304:
1298:
1297:
1285:
1279:
1275:
1269:
1268:
1266:
1252:
1244:
1238:
1237:
1236:. June 26, 2015.
1224:
1218:
1207:
1190:System lifecycle
1165:Man-made hazards
1128:Cyber resilience
1092:Data application
990:Medium exercises
717:Data replication
576:No off-site data
531:Impact scenarios
507:Misconfiguration
501:Supplier failure
471:Telecomms outage
411:
409:
408:
403:
401:
399:
398:
397:
388:
385:
379:
378:
377:
368:
365:
359:
348:
345:
327:data consistency
287:
286:
222:Impact scenarios
147:Resilience Ratio
3666:
3665:
3659:
3658:
3657:
3655:
3654:
3653:
3599:
3598:
3597:
3592:
3578:Aspects of jobs
3556:
3530:
3299:
3293:
3262:
3252:Wayback Machine
3223:Wayback Machine
3199:Wayback Machine
3158:
3142:
3119:Library Journal
3106:
3078:
3059:
3043:
3041:Further reading
3038:
3037:
3022:
3018:
3010:
2999:
2995:
2994:
2990:
2977:
2976:
2972:
2963:
2962:
2958:
2951:
2940:
2934:
2933:
2929:
2919:
2917:
2909:
2908:
2904:
2894:
2892:
2884:
2883:
2879:
2869:
2867:
2860:
2856:
2855:
2851:
2841:
2839:
2831:
2830:
2826:
2816:
2814:
2807:
2803:
2802:
2798:
2788:
2786:
2778:
2777:
2770:
2760:
2758:
2749:
2748:
2744:
2737:
2736:978-161665005-6
2726:
2720:
2719:
2715:
2705:
2703:
2696:
2692:
2691:
2687:
2677:
2675:
2668:
2664:
2663:
2659:
2649:
2647:
2640:
2636:
2635:
2631:
2626:
2622:
2617:
2613:
2603:
2601:
2593:
2592:
2588:
2578:
2576:
2568:
2567:
2563:
2553:
2551:
2543:
2542:
2538:
2528:
2526:
2518:
2517:
2513:
2503:
2501:
2493:
2492:
2488:
2478:
2476:
2467:
2466:
2462:
2452:
2450:
2441:
2440:
2436:
2426:
2424:
2416:
2415:
2411:
2401:
2399:
2391:
2390:
2386:
2376:
2374:
2365:
2364:
2360:
2347:
2346:
2342:
2333:
2332:
2328:
2315:
2314:
2310:
2305:. 12 July 2019.
2297:
2296:
2292:
2283:
2282:
2278:
2269:
2268:
2264:
2251:
2250:
2246:
2233:
2232:
2228:
2223:. 12 July 2019.
2215:
2214:
2210:
2197:
2196:
2192:
2182:
2180:
2176:
2168:
2164:
2119:
2115:
2107:
2100:
2094:
2090:
2085:
2081:
2070:
2066:
2058:
2051:
2047:
2046:
2042:
2025:
2024:
2020:
2008:
2006:
1997:
1996:
1985:
1984:
1980:
1972:
1965:
1959:
1955:
1948:
1944:
1934:
1932:
1923:
1922:
1918:
1906:
1902:
1901:
1897:
1887:
1885:
1876:
1875:
1871:
1861:
1859:
1855:
1849:driecentral.org
1844:
1840:
1839:
1835:
1825:
1823:
1814:
1813:
1809:
1794:
1790:
1782:
1771:
1765:
1761:
1753:
1746:
1742:
1741:
1737:
1728:
1724:
1715:
1714:
1710:
1701:
1700:
1696:
1657:
1653:
1622:
1618:
1587:
1583:
1570:
1569:
1565:
1556:
1555:
1551:
1529:
1525:
1516:
1515:
1511:
1502:
1500:
1491:
1490:
1486:
1470:
1466:
1456:
1454:
1445:
1444:
1440:
1431:
1429:
1425:
1418:
1414:
1413:
1406:
1393:
1392:
1388:
1378:
1376:
1369:
1365:
1334:
1327:
1317:
1315:
1306:
1305:
1301:
1286:
1282:
1276:
1272:
1264:
1250:
1246:
1245:
1241:
1226:
1225:
1221:
1208:
1204:
1199:
1194:
1175:Risk management
1170:Natural hazards
1108:
1099:
1068:
1030:
1008:
969:
961:
927:. (superseded).
915:
902:
855:
737:
732:
683:
681:Solution design
558:
533:
513:
504:Data corruption
489:/civil disorder
420:
393:
389:
384:
380:
373:
369:
364:
360:
358:
344:
342:
339:
338:
319:
284:
283:
277:
232:
216:Impact analysis
210:
176:
155:
90:
71:risk management
59:
17:
12:
11:
5:
3664:
3663:
3652:
3651:
3646:
3641:
3636:
3631:
3626:
3621:
3616:
3611:
3594:
3593:
3591:
3590:
3585:
3580:
3575:
3570:
3561:
3558:
3557:
3555:
3554:
3549:
3544:
3538:
3536:
3532:
3531:
3529:
3528:
3523:
3518:
3513:
3508:
3503:
3498:
3493:
3488:
3483:
3478:
3473:
3468:
3463:
3458:
3453:
3448:
3443:
3438:
3433:
3428:
3426:Identification
3423:
3418:
3413:
3408:
3403:
3398:
3393:
3388:
3383:
3378:
3373:
3368:
3363:
3358:
3353:
3348:
3343:
3338:
3333:
3328:
3323:
3318:
3313:
3307:
3305:
3301:
3300:
3292:
3291:
3284:
3277:
3269:
3260:
3259:
3254:
3242:
3236:
3235:
3230:
3225:
3220:
3215:
3210:
3202:
3187:
3179:
3171:
3157:
3156:External links
3154:
3153:
3152:
3146:
3141:978-1451683813
3140:
3127:
3110:
3105:978-0963058003
3104:
3091:
3082:
3077:978-1931332217
3076:
3063:
3058:978-0471530152
3057:
3042:
3039:
3036:
3035:
3016:
2988:
2970:
2956:
2949:
2927:
2902:
2877:
2849:
2824:
2796:
2768:
2742:
2735:
2713:
2685:
2657:
2645:Cabinet Office
2629:
2620:
2611:
2586:
2561:
2536:
2511:
2486:
2475:. 18 June 2012
2460:
2434:
2409:
2384:
2373:. 6 March 2008
2358:
2340:
2326:
2308:
2290:
2276:
2262:
2244:
2241:. 5 June 2023.
2226:
2208:
2190:
2162:
2133:(1): 341โ363.
2113:
2088:
2079:
2064:
2040:
2018:
2009:|journal=
1978:
1953:
1942:
1916:
1895:
1869:
1833:
1807:
1804:on 2016-03-03.
1796:May, Richard.
1788:
1759:
1735:
1722:
1708:
1694:
1651:
1616:
1581:
1563:
1549:
1523:
1509:
1484:
1464:
1438:
1404:
1386:
1363:
1325:
1299:
1280:
1270:
1239:
1219:
1201:
1200:
1198:
1195:
1193:
1192:
1187:
1182:
1177:
1172:
1167:
1162:
1157:
1156:
1155:
1150:
1145:
1135:
1130:
1125:
1120:
1115:
1109:
1107:
1104:
1098:
1095:
1094:
1093:
1090:
1087:
1084:
1081:
1078:
1067:
1064:
1063:
1062:
1059:
1056:
1049:
1048:
1047:
1044:
1029:
1026:
1022:
1021:
1018:
1015:
1007:
1004:
1000:
999:
993:
987:
971:The 2008 book
968:
965:
960:
957:
956:
955:
949:
946:
940:
928:
914:
911:
910:
909:
906:
901:
898:
882:
881:
878:
875:
869:
854:
851:
850:
849:
846:
843:
837:
833:
826:
822:
821:
815:
809:
803:
797:
791:
784:
783:
773:
763:
736:
733:
731:
728:
727:
726:
720:
714:
711:
694:
693:
690:
682:
679:
678:
677:
667:
653:
639:
625:
611:
597:
583:
557:
554:
550:
549:
546:
543:
540:
532:
529:
512:
511:
510:Network outage
508:
505:
502:
499:
496:
493:
490:
484:
475:
472:
469:
466:
461:
455:
449:
444:
439:
436:
431:
424:
419:
416:
396:
392:
383:
376:
372:
363:
357:
354:
351:
318:
315:
299:
298:
295:
292:
289:
276:
273:
272:
271:
268:
260:
259:
256:
253:
250:
231:
228:
224:
223:
220:
217:
209:
206:
205:
204:
203:
202:
199:
193:
186:
183:
175:
172:
160:ISO 22301:2019
154:
151:
137:(individual),
89:
86:
58:
55:
15:
9:
6:
4:
3:
2:
3662:
3661:
3650:
3647:
3645:
3642:
3640:
3637:
3635:
3632:
3630:
3627:
3625:
3622:
3620:
3619:Collaboration
3617:
3615:
3612:
3610:
3607:
3606:
3604:
3589:
3586:
3584:
3581:
3579:
3576:
3574:
3571:
3563:
3562:
3559:
3553:
3550:
3548:
3545:
3543:
3540:
3539:
3537:
3533:
3527:
3524:
3522:
3519:
3517:
3514:
3512:
3509:
3507:
3504:
3502:
3499:
3497:
3494:
3492:
3489:
3487:
3484:
3482:
3479:
3477:
3474:
3472:
3469:
3467:
3464:
3462:
3459:
3457:
3454:
3452:
3449:
3447:
3444:
3442:
3439:
3437:
3434:
3432:
3429:
3427:
3424:
3422:
3419:
3417:
3414:
3412:
3409:
3407:
3404:
3402:
3401:Effectiveness
3399:
3397:
3394:
3392:
3389:
3387:
3384:
3382:
3379:
3377:
3374:
3372:
3369:
3367:
3364:
3362:
3359:
3357:
3356:Communication
3354:
3352:
3349:
3347:
3344:
3342:
3339:
3337:
3334:
3332:
3329:
3327:
3324:
3322:
3319:
3317:
3314:
3312:
3309:
3308:
3306:
3302:
3298:
3297:organizations
3290:
3285:
3283:
3278:
3276:
3271:
3270:
3267:
3263:
3258:
3255:
3253:
3249:
3246:
3243:
3241:
3238:
3237:
3234:
3231:
3229:
3226:
3224:
3221:
3219:
3216:
3214:
3211:
3208:
3207:
3203:
3200:
3196:
3193:
3192:
3188:
3185:
3184:
3180:
3177:
3176:
3172:
3169:
3165:
3164:
3160:
3159:
3150:
3147:
3143:
3137:
3133:
3128:
3124:
3120:
3116:
3111:
3107:
3101:
3097:
3092:
3088:
3083:
3079:
3073:
3070:. Rothstein.
3069:
3064:
3060:
3054:
3050:
3045:
3044:
3031:
3027:
3020:
3009:
3005:
2998:
2992:
2984:
2980:
2974:
2966:
2960:
2952:
2946:
2939:
2938:
2931:
2916:
2915:www.ready.gov
2912:
2906:
2891:
2890:www.ready.gov
2887:
2881:
2866:
2859:
2853:
2838:
2834:
2828:
2813:
2806:
2800:
2785:
2784:www.ready.gov
2781:
2775:
2773:
2756:
2752:
2746:
2738:
2732:
2725:
2724:
2717:
2702:
2695:
2689:
2674:
2667:
2661:
2646:
2639:
2633:
2624:
2615:
2600:
2596:
2590:
2575:
2571:
2565:
2550:
2546:
2540:
2525:
2521:
2515:
2500:
2496:
2490:
2474:
2470:
2464:
2448:
2444:
2438:
2423:
2419:
2413:
2398:
2394:
2388:
2372:
2368:
2362:
2354:
2350:
2344:
2336:
2330:
2322:
2318:
2312:
2304:
2300:
2294:
2286:
2280:
2272:
2266:
2258:
2254:
2248:
2240:
2236:
2230:
2222:
2218:
2212:
2204:
2200:
2194:
2175:
2174:
2166:
2158:
2154:
2150:
2146:
2141:
2136:
2132:
2128:
2124:
2117:
2106:
2099:
2092:
2083:
2075:
2068:
2057:
2050:
2044:
2036:
2032:
2028:
2022:
2014:
2001:
1993:
1989:
1982:
1971:
1964:
1957:
1951:
1946:
1931:on 2020-09-26
1930:
1926:
1920:
1912:
1905:
1899:
1883:
1879:
1873:
1854:
1850:
1843:
1837:
1821:
1817:
1811:
1803:
1799:
1792:
1781:
1777:
1770:
1763:
1752:
1745:
1739:
1732:
1726:
1718:
1712:
1704:
1698:
1690:
1686:
1682:
1678:
1674:
1670:
1666:
1662:
1655:
1647:
1643:
1639:
1635:
1631:
1627:
1620:
1612:
1608:
1604:
1600:
1596:
1592:
1585:
1577:
1573:
1567:
1559:
1553:
1546:
1542:
1538:
1534:
1527:
1519:
1513:
1499:on 2013-10-22
1498:
1494:
1488:
1480:
1479:
1474:
1468:
1452:
1448:
1442:
1428:on 2019-02-09
1424:
1417:
1411:
1409:
1400:
1396:
1390:
1374:
1367:
1359:
1355:
1351:
1347:
1343:
1339:
1332:
1330:
1313:
1309:
1303:
1295:
1291:
1284:
1274:
1263:
1259:
1257:
1249:
1243:
1235:
1234:
1229:
1223:
1216:
1212:
1206:
1202:
1191:
1188:
1186:
1183:
1181:
1178:
1176:
1173:
1171:
1168:
1166:
1163:
1161:
1158:
1154:
1151:
1149:
1146:
1144:
1141:
1140:
1139:
1136:
1134:
1131:
1129:
1126:
1124:
1121:
1119:
1116:
1114:
1111:
1110:
1103:
1091:
1088:
1085:
1082:
1079:
1076:
1073:
1072:
1071:
1060:
1057:
1054:
1050:
1045:
1042:
1041:
1039:
1038:
1037:
1035:
1025:
1019:
1016:
1013:
1012:
1011:
1003:
997:
994:
991:
988:
985:
982:
981:
980:
978:
974:
964:
954:
950:
947:
944:
941:
938:
937:
932:
929:
926:
925:
920:
917:
916:
913:United States
907:
904:
903:
897:
895:
891:
886:
879:
876:
873:
870:
867:
864:
863:
862:
860:
847:
844:
841:
840:ISO/IEC 27031
838:
834:
831:
827:
824:
823:
819:
816:
813:
810:
807:
804:
801:
798:
795:
792:
789:
786:
785:
781:
777:
774:
771:
767:
764:
761:
757:
753:
750:
749:
748:
746:
742:
735:ISO Standards
724:
721:
718:
715:
712:
709:
706:
705:
704:
701:
699:
691:
688:
687:
686:
675:
671:
668:
665:
661:
657:
654:
651:
647:
643:
640:
637:
633:
629:
626:
623:
619:
615:
612:
609:
605:
601:
598:
595:
591:
587:
584:
581:
577:
573:
570:
569:
568:
566:
562:
553:
547:
544:
541:
538:
537:
536:
528:
526:
522:
518:
509:
506:
503:
500:
497:
494:
491:
488:
485:
483:
479:
476:
473:
470:
467:
465:
462:
459:
456:
453:
450:
448:
445:
443:
440:
437:
435:
432:
429:
426:
425:
423:
415:
412:
394:
374:
355:
352:
349:
335:
331:
328:
324:
314:
312:
308:
304:
296:
293:
290:
282:
281:
280:
269:
265:
264:
263:
257:
254:
251:
248:
247:
246:
243:
241:
237:
227:
221:
218:
215:
214:
213:
200:
197:
196:
194:
191:
187:
184:
181:
180:
179:
171:
167:
165:
161:
150:
148:
144:
140:
136:
131:
127:
125:
121:
116:
112:
110:
105:
101:
99:
95:
85:
82:
78:
77:
72:
68:
64:
54:
50:
48:
43:
41:
37:
33:
29:
21:
3511:Storytelling
3431:Intelligence
3311:Architecture
3261:
3205:
3190:
3182:
3174:
3167:
3161:
3131:
3125:(19): 32โ34.
3122:
3118:
3095:
3086:
3067:
3048:
3029:
3019:
3003:
2991:
2982:
2973:
2959:
2936:
2930:
2918:. Retrieved
2914:
2905:
2893:. Retrieved
2889:
2880:
2868:. Retrieved
2864:
2852:
2840:. Retrieved
2836:
2827:
2815:. Retrieved
2811:
2799:
2787:. Retrieved
2783:
2759:. Retrieved
2754:
2745:
2722:
2716:
2704:. Retrieved
2700:
2688:
2676:. Retrieved
2672:
2660:
2648:. Retrieved
2644:
2632:
2623:
2614:
2602:. Retrieved
2598:
2589:
2577:. Retrieved
2573:
2564:
2552:. Retrieved
2548:
2539:
2527:. Retrieved
2523:
2514:
2502:. Retrieved
2498:
2495:"IWA 5:2006"
2489:
2477:. Retrieved
2472:
2463:
2451:. Retrieved
2446:
2437:
2425:. Retrieved
2421:
2412:
2400:. Retrieved
2396:
2387:
2375:. Retrieved
2370:
2361:
2352:
2343:
2329:
2320:
2311:
2302:
2293:
2279:
2265:
2256:
2247:
2238:
2229:
2220:
2211:
2202:
2193:
2181:. Retrieved
2172:
2165:
2130:
2126:
2116:
2103:. IBM Corp.
2091:
2082:
2073:
2067:
2043:
2030:
2021:
2000:cite journal
1981:
1956:
1945:
1935:September 9,
1933:. Retrieved
1929:the original
1919:
1898:
1886:. Retrieved
1881:
1872:
1860:. Retrieved
1848:
1836:
1824:. Retrieved
1819:
1810:
1802:the original
1791:
1775:
1762:
1738:
1725:
1711:
1697:
1667:(1): 14โ18.
1664:
1660:
1654:
1629:
1625:
1619:
1594:
1590:
1584:
1575:
1566:
1552:
1544:
1532:
1526:
1512:
1501:. Retrieved
1497:the original
1487:
1481:. MIT Press.
1477:
1473:Yossi Sheffi
1467:
1455:. Retrieved
1451:the original
1441:
1430:. Retrieved
1423:the original
1399:www.fema.gov
1398:
1389:
1379:29 September
1377:. Retrieved
1366:
1341:
1337:
1316:. Retrieved
1312:the original
1302:
1293:
1283:
1273:
1256:American Bar
1254:
1242:
1231:
1222:
1205:
1100:
1069:
1033:
1031:
1023:
1009:
1001:
995:
989:
983:
972:
970:
962:
934:
922:
887:
883:
856:
812:ISO/TS 22332
806:ISO/TS 22331
800:ISO/TS 22330
794:ISO/TS 22318
788:ISO/TS 22317
738:
702:
695:
684:
673:
669:
663:
659:
655:
649:
645:
641:
635:
631:
627:
621:
617:
613:
607:
603:
599:
593:
589:
585:
579:
575:
571:
559:
551:
534:
514:
464:Power outage
447:Cyber attack
421:
413:
336:
332:
322:
320:
310:
306:
302:
300:
278:
261:
244:
233:
225:
211:
177:
168:
156:
146:
132:
128:
117:
113:
109:preparedness
106:
102:
91:
80:
74:
63:supply chain
60:
51:
44:
35:
31:
27:
26:
3481:Performance
3406:Engineering
3386:Diagnostics
3381:Development
3295:Aspects of
1882:praxiom.com
1632:(1): 1โ14.
1597:(1): 1โ14.
1006:Maintenance
723:Backup site
317:Consistency
275:Maximum RTO
3603:Categories
3491:Resilience
3486:Psychology
3456:Narcissism
3446:Life cycle
3361:Complexity
3351:Commitment
2755:AlertMedia
1503:2019-02-04
1432:2019-02-08
1197:References
885:sickness.
836:controls.)
745:ISO/TC 292
525:resiliency
434:Earthquake
252:IT systems
153:Continuity
88:Resilience
79:(COOP). A
3516:Structure
3466:Ombudsman
3421:Hierarchy
3051:. Wiley.
2920:5 January
2895:5 January
2870:5 January
2842:5 January
2817:5 January
2789:5 January
2761:4 January
2706:5 January
2678:5 January
2650:5 January
2604:5 January
2599:BSI Group
2579:5 January
2574:BSI Group
2554:5 January
2549:BSI Group
2529:5 January
2524:BSI Group
2504:5 January
2479:5 January
2453:5 January
2427:5 January
2402:5 January
2377:5 January
2183:5 January
2157:154422711
2149:1543-5938
1888:4 October
1862:4 October
1826:4 October
1689:149004681
1681:0090-9882
1646:0021-9916
1611:1460-2466
1344:: 33โ40.
1318:4 October
1066:Technical
780:ISO 22313
776:ISO 22313
770:ISO 22301
766:ISO 22301
760:ISO 22300
756:ISO 22300
752:ISO 22300
730:Standards
478:Terrorism
474:IT outage
458:Hurricane
430:/pandemic
356:−
267:exceeded.
182:Equipment
174:Inventory
3535:See also
3526:Workshop
3471:Patterns
3441:Learning
3366:Conflict
3316:Behavior
3248:Archived
3195:Archived
3024:Othman.
3008:Archived
2983:drii.org
2105:Archived
2056:Archived
2035:Archived
1970:Archived
1853:Archived
1780:Archived
1751:Archived
1457:28 April
1262:Archived
1260:. 2011.
1138:Disaster
1106:See also
921:(2010).
872:BS 25999
452:Sabotage
428:Epidemic
240:function
236:critical
208:Analysis
57:Overview
45:Several
3436:Justice
3396:Ecology
3391:Dissent
3371:Culture
3346:Climate
3326:Capital
3004:CMS.gov
1541:7698286
1375:. Flevy
1346:Bibcode
866:BS 7799
772::2012.)
288:(MTPoD)
3624:Backup
3521:Theory
3501:Safety
3411:Ethics
3376:Design
3304:Topics
3138:
3102:
3074:
3055:
2947:
2733:
2155:
2147:
1776:RI.gov
1687:
1679:
1644:
1609:
1539:
1233:Forbes
670:Tier 7
656:Tier 6
642:Tier 5
628:Tier 4
614:Tier 3
600:Tier 2
586:Tier 1
572:Tier 0
482:Piracy
190:backup
67:subset
3506:Space
3416:Field
3336:Chart
3331:Cells
3321:Blame
3011:(PDF)
3000:(PDF)
2941:(PDF)
2861:(PDF)
2808:(PDF)
2727:(PDF)
2697:(PDF)
2669:(PDF)
2641:(PDF)
2177:(PDF)
2153:S2CID
2108:(PDF)
2101:(PDF)
2059:(PDF)
2052:(PDF)
1973:(PDF)
1966:(PDF)
1907:(PDF)
1856:(PDF)
1845:(PDF)
1783:(PDF)
1772:(PDF)
1754:(PDF)
1747:(PDF)
1729:ISO,
1685:S2CID
1537:S2CID
1426:(PDF)
1419:(PDF)
1265:(PDF)
1251:(PDF)
1075:Virus
561:SHARE
442:Flood
143:macro
135:micro
3136:ISBN
3100:ISBN
3072:ISBN
3053:ISBN
2945:ISBN
2922:2023
2897:2023
2872:2023
2865:FEMA
2844:2023
2837:FEMA
2819:2023
2812:FEMA
2791:2023
2763:2023
2731:ISBN
2708:2023
2680:2023
2652:2023
2606:2023
2581:2023
2556:2023
2531:2023
2506:2023
2481:2023
2455:2023
2429:2023
2404:2023
2379:2023
2185:2023
2145:ISSN
2013:help
1937:2019
1890:2018
1864:2018
1828:2018
1677:ISSN
1642:ISSN
1607:ISSN
1459:2017
1381:2013
1320:2018
857:The
517:SARS
438:Fire
305:and
139:meso
34:(or
3123:126
2499:ISO
2473:ISO
2447:ISO
2422:ISO
2397:ISO
2371:ISO
2353:ISO
2321:ISO
2303:ISO
2257:ISO
2239:ISO
2221:ISO
2135:doi
1988:doi
1669:doi
1634:doi
1599:doi
1354:doi
1278:48.
747::
487:War
346:RCO
69:of
3605::
3121:.
3117:.
3028:.
3006:.
3002:.
2981:.
2913:.
2888:.
2863:.
2835:.
2810:.
2782:.
2771:^
2753:.
2699:.
2671:.
2643:.
2597:.
2572:.
2547:.
2522:.
2497:.
2471:.
2445:.
2420:.
2395:.
2369:.
2351:.
2319:.
2301:.
2255:.
2237:.
2219:.
2201:.
2151:.
2143:.
2131:37
2129:.
2125:.
2054:.
2033:.
2029:.
2004::
2002:}}
1998:{{
1909:.
1880:.
1847:.
1818:.
1778:.
1774:.
1749:.
1683:.
1675:.
1665:46
1663:.
1640:.
1630:60
1628:.
1605:.
1595:60
1593:.
1574:.
1543:.
1535:.
1407:^
1397:.
1352:.
1342:28
1340:.
1328:^
1292:.
1253:.
1230:.
1213:,
1036::
896:.
700:.
672:โ
658:โ
644:โ
630:โ
616:โ
602:โ
588:โ
574:โ
313:.
3288:e
3281:t
3274:v
3144:.
3108:.
3089:.
3080:.
3061:.
3032:.
2985:.
2967:.
2953:.
2924:.
2899:.
2874:.
2846:.
2821:.
2793:.
2765:.
2739:.
2710:.
2682:.
2654:.
2608:.
2583:.
2558:.
2533:.
2508:.
2483:.
2457:.
2431:.
2406:.
2381:.
2355:.
2337:.
2323:.
2287:.
2273:.
2259:.
2205:.
2187:.
2159:.
2137::
2076:.
2015:)
2011:(
1994:.
1990::
1939:.
1892:.
1866:.
1830:.
1691:.
1671::
1648:.
1636::
1613:.
1601::
1578:.
1520:.
1506:.
1461:.
1435:.
1401:.
1383:.
1360:.
1356::
1348::
1322:.
1296:.
1055:,
939:.
624:.
480:/
395:n
391:)
382:(
375:n
371:)
362:(
353:1
350:=
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.