© 2020 Content Security Pty Ltd.

Advisory services

Business Continuity Management (ISO 22301)

Business Continuity Management (BCM) helps you plan, implement and maintain a documented management system to prepare, respond and recover from disruptive incidents.

When delivering business continuity management we follow the ISO 22301 (Business Continuity standard) using the following roadmap:

Business Continuity Governance 

This sets the strategic direction allowing management to communicate goals and expectations.

Business Impact Analysis and Risk Assessment

This phase includes:

  • Establishing the context of the assessment defining the criteria and evaluating the potential impact of a disruptive incident.
  • Taking into account legal requirements
  • Providing systematic analysis and prioritising risk treatments.
  • Defining the required output from the business impact analysis and risk assessment.
  • Putting requirements in place to keep information up-to-date and confidential.

Recovery Strategy 

This focuses on critical business functions involved in the business impact analysis exercise where we establish maximum downtimes and recovery times.

What a Business Continuity Plan provides you​

This plan provides much needed emergency notification and disaster declaration procedures. This can include recovery team procedures and facilities and business restoration procedures.

The plan also provides the framework for the testing and maintenance of your continuity plan, Appendices for master contact list, equipment inventories, connectivity schematics, etc.

And to ensure the plan is implemented correctly, workshops to management and key business owners are provided to ensure they understand the Business Continuity Plan.

Why choose Content Security for your Business Continuity Management

Now more than ever have we seen a need for robust continuity plans in the event of dramatic organisation change, disaster or other external forces.

The global shift to Work From Home has highlighted the fast forwarding of technology and reliance on offsite workflow.

Don’t let this shift expose the weaknesses in your cyber resilience. Contact us today.

For more information please contact our cybersecurity professionals today.

For more information please contact our cybersecurity professionals today.