Developing and Implementing a Business Continuity Audit Program

Duration: 90 Minutes
Business continuity has been generally defined as a comprehensive managed effort to prioritize key business processes identifying significant threats to normal operations that permit planning strategies for ensuring effective and efficient organizational responses to challenges arising during and after a crisis. Consequently, business continuity planning encompasses processes for developing advance responses to service interruptions in such a manner that critical business functions continue at expected levels.
Business Continuity Audit Program
Instructor: Robert E. Davis
Product ID: 503261
Sub-categorically, disaster recovery planning is normally ranked as a key business continuity component referring to technological aspects of advance planning and organizing necessary to minimize potential losses and ensure critical business functionality if catastrophic circumstances materialize. An effective business continuity capability is essential. However, for most entities, being able to recover information technology (IT) is fundamental.

Arguably, establishing a robust preparedness capability is one of the best investments an entity can pursue. Nonetheless, auditors should assure (based on a thorough risk assessment) the entity's resiliency efforts are operationally ready to respond when required. Beneficially, IT audits of business continuity and disaster recovery plans can assist in ensuring the proper attention is given to information assets supporting an entity's operations.

Objectives of the Presentation
  • Identify issues associated with business continuity planning
  • Differentiate the types of Business Continuity Plan assurance services
  • How to develop an effective and comprehensive Business Continuity Audit Plan
  • Available procedures for studying and evaluating a Business Continuity Plan
  • Methods for testing and evaluating business continuity controls
  • Critical Business Continuity Audit reporting considerations
  • Determining the appropriate amount of business continuity audit follow-up procedures
Why Should you Attend
Considering information systems are generally critical to enhancing productivity, it is imperative deployed IT provide availability with service responsiveness meeting user utilization demands, even during crisis situations. Entity susceptibility as well as IT operational resiliency impact speedy and systematic redress for fulfilling efficiency, effectiveness, availability, and compliance requirements. Furthermore, neither business nor IT resides within static environments. Thus, environmental dynamics can generate changes altering system activities that require timely response and restoration to ensure continuous service delivery.

Threats to an entity's existence manifest in diverse forms, including disruptions, emergencies, crises or disasters. Any one of these incidents or events can jeopardize data processing services sustaining mission critical operations. When business integrated information systems are unavailable, efficiency is diminished, effectiveness is eroded, compliance is hindered, and employees are idled. As a result, entities should regularly examine their business continuity, disaster recovery, as well as back-up plans to ensure adequate operational requirements forecasting for service restoration.

Areas Covered
  • Challenges of business continuity planning in today's volatile threat landscape
  • Key elements of crises management response
  • How a Business Continuity Plan differs from a Disaster Recovery Plan
  • Significant components for developing a Business Continuity Audit Plan
  • Acquiring appropriate business continuity audit evidence
  • Recommendations for analyzing a Business Continuity Plan
  • Communications development before, during, and after a Business Continuity Audit
Who will Benefit
  • Auditors
  • Operations Managers
  • Vendor Managers
  • Disaster Recovery professionals
  • Call centers
  • Business Continuity Team members
  • Information Security personnel
  • Chief Security Officer
  • Risk Managers
  • Chief Information Officer
  • Chief Operations Officer
  • Information Security Managers
  • Technology Managers
Topic Background
Cost effective strategies should be designed to prevent, detect and/or mitigate the impact of potential crises. Reducing system vulnerabilities is typically accomplished by delineating then remediating single as well as combined configuration failure points. Various resources that can contribute to the remediation process should be identified as continuity enablement factors. These resources - including essential personnel (and their roles and responsibilities), information, applications, and infrastructure - should be documented in a plan demonstrating commitment to continuity.
$200
Recorded Session for one participant
Get life time access with download option!
Book this course
Pay Now
  $250.00 Training CD
Free shipment within 4 Working Days of placing the order. Get life time access for unlimited participants.
  $300.00 Training USB Flash Drive
Free shipment within 4 Working Days of placing the order. Get life time access for unlimited participants.
For multiple location please contact our customer care team +1-510-857-5896.
How it works
Live Session - How it works
  • Login to onlinecompliancepanel with your registered username and password https://www.onlinecompliancepanel.com/login
  • The webinar joining link, username and password for joining the webinar will be updated on your OCP Account 24 hours prior to the webinar
  • Presentation handouts in Downloadable PDF format will be updated on your OCP Account 24 hours prior to the live session
  • Login to the audio conference on the scheduled date and time
  • Get answers to your queries through interactive Q&A sessions via chat at the end of the session
  • Download the Certificate of Attendance and Purchase Invoice from your OCP Account 24 hours after the completion of the session
  • Please let us know your thoughts and views at the end of the webinar, your valuable feedback will help us improve
Recorded Session - How it works
  • Login to onlinecompliancepanel with your registered username and password https://www.onlinecompliancepanel.com/login
  • Upon purchase of the recorded session a link will be updated on your OCP Account within 24 hours
  • Please click on the link to access the Recorded Session
  • Presentation handouts in downloadable PDF format will be updated on your OCP Account within 24 hours of the purchase of the product
  • Download the Certificate of Attendance and Purchase Invoice from your OCP Account after 48 hours of the product Purchase
  • Please share your valuable Feedback at the end of the session
Instructor Profile:
Dr. Robert E. Davis obtained a Bachelor of Business Administration in Accounting and Business Law, a Master of Business Administration in Management Information Systems, and a Doctor of Business Administration in Information Systems Management from Temple, West Chester, and Walden University; respectively. Moreover, during his twenty years of involvement in education, Dr. Davis acquired Postgraduate and Professional Technical licenses in Computer Science and Computer Systems Technology. Dr. Davis also obtained the Certified Information Systems Auditor (CISA) certificate - after passing the 1988 Information Systems Audit and Control Association's rigorous three hundred and fifty multiple-choice questions examination; and was conferred the Certified Internal Controls Auditor (CICA) certificate by the Institute for Internal Controls.

Since starting his career as an information systems (IS) auditor, Robert has provided data security consulting and IS auditing services to corporations as well as other organizations; in staff through management positions. Before engaging in the practice of IS auditing and information security consulting; Robert (as a corporate employee) provided inventory as well as general accounting services to Philip Morris, USA, and general accounting services to Philadelphia National Bank (Wells Fargo). Furthermore, he has prior experience as a freelance writer of IT audit and information security training material.
View More