> Understanding & Preventing Network and System Security Attacks

Business Continuity & Disaster Recovery Planning


Many government and private sector executives and managers are faced with the daunting task of implementing a comprehensive Business Continuity or Disaster Recovery Program.  Current MITS compliance deadlines, looming Auditor General requirements and impeding legislative changes for the private sector make implementing an effective program more critical than ever.

The intense one-day course will guide the Business Continuity / Disaster Recovery practitioner on how to implement an effective program. 


  • Overview of Business Continuity, Disaster Recovery and IT Continuity Planning

  • Compliance with current GoC Policies and Standards

  • MITS compliance strategies and meeting upcoming audit requirements

  • Complying with upcoming private sector legislative requirements for Business Continuity

  • Project Initiation and Management

  • Awareness

  • Emergency response

  • Risk Evaluation and Control (Risks, Threats, Vulnerabilities and Mitigation & Control)

  • Business Impact Analysis and business process based BIA methods

  • Developing and implementing Business Continuity and IT Disaster Recovery Strategies

  • Developing your plan

  • Public Relations and Crisis Communications and Coordination with Public Authorities

  • Maintaining and exercising your plan


The session will include a Business Continuity Program readiness self-assessment tool and an overview project plan for a typical full scope project.


About Instructors


Cygnos IT Security employs seasoned consultants.  Our educators are recognized as industry experts in their fields and provide students with the benefits of their field experience when instructing.  Click here for details on our course instructors.


The cost of registration for this course is $895. Click here to register on-line, or contact:

Jennifer Koppernaes

Account Manager

(613) 820-4547 Ext. 206

Email: jkoppernaes@cygnos.com

Do you have a friend or colleague who may also be interested in our courses? Send them a link to this page


Why Invest in Security?

Click above to download our brochure in Adobe Acrobat PDF format

Security Leadership Seminar

BHI & Cygnos IT Security

Contact us | Privacy Statement | Site map
This site is best viewed in 1024x768 resolution