A type of malicious software designed to block access to a computer system until a sum of money is paid.
What is ransomware?
This is the name of the process that activates after a disaster has occurred and is focused on restoring normal operations.
What is disaster recovery?
What does "PCP" stand for?
Process Continuity Plan
What does "RTO" mean?
Recovery Time Objective
This person is the Process Continuity Planning Lead
Who is Rita Marino?
This term refers to a type of malicious software that usually needs to be launched by the user or another malicious program and often disguises itself as legitimate software.
What is a trojan?
In Information Technology, this is the name of the copy taken of computer data that is stored at a different location or on a different medium.
What is a backup?
What is the highest criticality that a process can be rated within our framework?
What is mission critical?
Which business control is the ITSCM Plan related to?
BCD11
This person is the Information Technology Service Continuity (ITSCM) Lead.
Who is Joseph Rantuccio?
This term is for malicious software that can infect your computer or mobile device without your knowledge or consent and perform harmful actions.
What is malware?
Which business continuity control pertains to the DR Plan?
What is BCD08
How many regions do we have local Process Continuity Plans in?
5
What does the ITSCM Plan and Test Report need to show proof of for the Critical IT to meet Business Continuity Requirements?
What are System Failover Capabilities (HA/DR)?
This person is the Product Business Impact Analysis & Contingency Planning Lead
Who is Ron Garrett?
This is the term for the fraudulent practice of sending emails that appear to be from legitimate sources to trick recipients into revealing personal information or downloading malware.
What is phishing?
This is the name of the service that provides cloud-based disaster recovery solutions for businesses.
What is disaster recovery as a service (DRaaS)?
What is the name of the system that houses the PCPs and Test logs?
What is Maestro RS?
Which business control is the ITSCM Report related to?
BCD12
This person is the Cloud Disaster Recovery Lead
Who is Sandy DeMartino?
This ransomware attack is believed to be the first-ever ransomware attack in history.
What is the AIDS Trojan (1989)?
This organizational unit will ensure all communications regarding SAP and its business, products, and services are coordinated, clear, consistent, on-message, and on-brand in the event of a disaster.
Who is Global Corporate Affairs (GCA)?
What is the first step in the process continuity lifecycle?
What is the completion of the CA/BIA
The current total number of Critical systems/services that are a part of the ITSCM Framework is over 100. (T/F)
False; we currently have 87.
This person is the Global Head of Business Continuity Management
Who is Mary Walby