All pages
Jump to navigation
Jump to search
- Part 0: Cover sheet v2 (RAR)
- Part 0: Cover sheet v2 (RAR) CM
- Part 1: Crisis Prevention Strategy CCS
- Part 1: Crisis Prevention Strategy CST1 v2
- Part 1: IT RAR - List of Threats v2
- Part 1: Identification of Business Functions DR
- Part 1: Identification of Business Functions DR AIA
- Part 1: Identification of Business Functions v2
- Part 1: Identification of Business Functions v2.0
- Part 1: Identification of Critical Business Functions
- Part 1: Identification of Critical Business Functions v2
- Part 1: Introduction to Crisis Communication Plan
- Part 1: Introduction v2
- Part 1: List of Threats CRA1 v2
- Part 1: MBCO & Product and Services
- Part 1: MBCO & Product and Services DR AIA
- Part 1: Mitigation Strategies-CC-ST
- Part 1: Mitigation Strategies DR
- Part 1: Mitigation Strategies v2
- Part 1: RAR-List of Threats DR
- Part 1: RAR - List of Threats
- Part 1: RAR - List of Threats v2
- Part 1: identification of Business Functions v2.0
- Part 2-1: Risk Treatment CRA2 v2
- Part 2: Crisis Communication Objectives v2
- Part 2: Crisis Management Objectives v2
- Part 2: Crisis Response Strategy CCS
- Part 2: Crisis Response Strategy CST2 v2
- Part 2: Crisis Scenarios CRA2 v2
- Part 2: IT RAR - Risk Treatment v2
- Part 2: Impact Area
- Part 2: Impact Area Of Business Functions DR
- Part 2: Impact Area Of Business Functions v2
- Part 2: Impact Area Of Business Functions v2.0
- Part 2: Impact Area Of Critical Business Functions v2
- Part 2: Impact Area of Critical Business Functions v2
- Part 2: RAR - Treatment and Control DR
- Part 2: RAR - Treatment and Control v2
- Part 2: RAR - Treatment and Control v2 CM
- Part 2: Recovery Strategies-CC-ST
- Part 2: Recovery Strategies DR
- Part 2: Recovery Strategies v2
- Part 2: Timeliness of Critical Business Functions
- Part 2: Timeliness of Critical Business Functions v2
- Part 3: Crisis Communication Team v2
- Part 3: Crisis Management Team v2
- Part 3: IT RAR - Risk Impact and Likelihood Assessment v2
- Part 3: Impact Over Time Of Business Functions DR
- Part 3: Impact Over Time Of Business Functions v2
- Part 3: Impact Over Time of Business Functions DR
- Part 3: Impact Over Time of Business Functions v2.0
- Part 3: Minimum Resources Required-CC-ST
- Part 3: Minimum Resources Required DR
- Part 3: Minimum Resources Required v2
- Part 3: RAR - Risk Analysis DR
- Part 3: RAR - Risk Analysis v2
- Part 3: RAR - Risk Analysis v2 CM
- Part 3: Resource Requirements CST3 v2
- Part 3: Resource Used To Carry Out Critical Business Functions During A Disaster
- Part 3: Resource Used To Carry Out Critical Business Functions During A Disaster v2
- Part 3: Risk Assessment CRA3 v2
- Part 3: Timeliness of Critical Business Functions v2
- Part 4: Crisis Communication Policy v2
- Part 4: Incident Management Team v2
- Part 4: Inter-dependencies
- Part 4: Inter-dependencies v2
- Part 4: Resource Used To Carry Out Critical Business Functions During A Disaster v2
- Part 4: Supporting IT Systems and Applications DR
- Part 4: Supporting IT Systems and Applications v2.0
- Part 5: Crisis Communication Checklist v2
- Part 5: General Considerations v2
- Part 5: Inter-dependencies DR
- Part 5: Inter-dependencies v2
- Part 5: Inter-dependencies v2.0
- Part 5: Vital Records
- Part 5: Vital Records v2
- Part 6: Crisis Communication Procedures v2
- Part 6: External Contact and Communications v2
- Part 6: Vital Records DR
- Part 6: Vital Records v2
- Part 6: Vital Records v2.0
- Part 7: Crisis Communication Command Centre v2
- Part 7: Incident Action Lists v2
- Part 8: Command Centre
- Part 8: Crisis Communication Team Responsibilities v2
- Part 9: Holding Statements v2
- Part A Introduction
- Part B Corporate Level Procedures
- Part C Business Unit Procedures
- Partial Simulation Test
- Partner Misuse
- Passing Score
- Patch
- Pathogenic
- Patricia Jalleh
- Patrick G Corcoran
- Paul Cheng
- Paul Kangro
- Paul Yap Tiong Ghee
- Paypal
- Payroll
- Peer Review
- Penny Chong
- Penny Fung
- People
- Percentage Utilisation
- Performance
- Performance Criteria
- Performance Evaluation
- Period of Disruption
- Period of Tolerance
- Peripheral Tampering
- Personal Protective Equipment (PPE)
- Personally Identifiable Information
- Petri Kuivala
- Phantom Line Error
- Philip Kee Tuang Loh
- Phishing
- Php List
- Physical/Virtual Server
- Physical I/O
- Pichai Ngamwutthibul
- Pick and Pack
- Pipelines Safety Regulations 1996
- Plan-Do-Check-Act Cycle
- Plan Administrator
- Plan Currency
- Plan Development
- Plan Dissemination of Key Messages
- Plan Maintenance
- Planning Assumptions
- Planning Software
- Platform as a Service
- Plausible Scenarios
- Policy
- Population
- Post-Exercise Report
- Post Implementation Review
- Pre-Audit Meeting
- Pre-Positional Resource
- Pre-approved statements
- Pre-crisis Example (1) Mail Services and Office Supplies
- Pre-crisis Example (2) Security Services
- Pre-crisis Example (3) Telephone Service
- Pre-crisis Example (4) Medical Purchasing & Deport
- Pre-crisis Examples
- Pre-pandemic Vaccine
- Preparedness Clinics (PPC)
- Press Briefing
- Press Kit
- Press Release
- Prevalence
- Prevent
- Prevention
- Preventive Action
- Preventive Measures
- Primary Site
- Prime Cost
- Principles for Operational Resilience
- Prioritization
- Prioritized Activities
- Priority
- Private Cloud
- Privilege
- Privileges
- Probability
- Problem
- Problem Management
- Procedure
- Process
- Process Audit
- Process Control
- Process Owner/Manager
- Product Audit
- Production
- Products and Services
- Prof Dr Mohd Rasid Hussin
- Professional Competence
- Program
- Program Management
- Programme
- Project
- Project Management
- Project Sponsor
- Project Team
- Prophylactic
- Prophylaxis
- Protective Security
- Provider
- Prudential Regulatory Authority (PRA)
- Public Affairs
- Public Cloud
- Public Relations
- Public Service Announcement
- Publics
- Purchasing
- Qualifying Educational Activities
- Qualitative Assessment
- Qualitative Losses
- Quality Assurance
- Quantification
- Quantitative Assessment
- Quantitative Losses
- Quarantine
- Quat Guat Keng
- RA-Impact to Personnel Issues v2
- RA-List of Threats v2
- RA-Scale for Financial Lost Impact v2
- RA-Scale for Impact v2
- RA-Scale for Likelihood of Event v2
- RA-Scale for Market Impact v2
- RA-Scale for Probability (Frequency) v2
- RA-Scale for Probability (Vulnerability) v2
- RA-Scale for Regulatory Impact v2
- RA-Scale for Reputation Impact v2
- RAM Scraping
- RAR-Financial Impact v2
- RAR-Impact of Event v2
- RAR-Impact to Personnel Issues v2
- RAR-Likelihood of Event v2
- RAR-List of Threats v2
- RAR-Market Impact v2
- RAR-Regulatory Impact v2
- RAR-Reputation Impact v2
- RAR-Scale for Probability (Frequency) v2
- RAR-Scale for Probability (Vulnerability) v2
- RS After X Hours Examples v2
- RS FAQ Column "Critical Process (If any)"
- RS FAQ Column "Recovery Strategy (Alternatives)"
- RS FAQ Column "Remarks/ Reasons/ Justifications "
- RS FAQ Column "Time"
- RS FAQ Column Critical Process v2
- RS FAQ Column Remarks v2
- RS FAQ Column Time v2
- RS FAQ General Comments
- RS FAQ General Comments v2
- RS Pre-crisis Example (1) v2
- RS Pre-crisis Example (2) v2
- RS Pre-crisis Example (3) v2
- RS Pre-crisis Example (4) v2
- RS Pre-crisis Examples v2
- RS Suggested Recovery Options v2
- RS WXH Mail Services And Office Supplies v2
- RS Within X Hours Examples v2
- RT-PCR
- Rachel Teoh
- Radiation
- Radiological Dispersion Device (RDD)
- Raid
- Ransomware
- Ravindra Narayan Chinchore
- Raymond Cheong
- Re-evaluation Process
- Re-examination Fees
- Re-sync
- Readiness
- Readiness Checklist
- Reading: BCM Fundamentals
- Reading: Business Impact Analysis
- Reading: Project Management
- Reading: Recovery Strategy
- Reading for BCMBoK 3: Business Impact Analysis
- Reassortment
- Rebekah Seragih
- Recertification
- Recertification Glossary
- Recertification Process
- Recertification confirmation email
- Reciprocal Agreement
- Reciprocal Site
- Record
- Record Keeping
- Recover
- Recoverable Loss
- Recovery
- Recovery/Resumption
- Recovery Exercise
- Recovery Management Team
- Recovery Objectives - Category
- Recovery Period
- Recovery Plan
- Recovery Point Objective (RPO)
- Recovery Services Agreement
- Recovery Site
- Recovery Strategy
- Recovery Team
- Recovery Team Leader
- Recovery Time Objective
- Recovery Time Objective (RTO)
- Recovery Timeline
- Recovery Window
- Recovery Work Area
- Recovery as a Service
- Reduce
- Redundancy
- Redundant Arrays of Independent Disks (RAID)
- Reference Data
- Refund Policy
- Registration of Patient
- Regulations
- Reinstatement
- Relational Resilience
- Release
- Release of Examination Scores
- Remezov Nikita
- Remote Failover
- Remote Fixes
- Remote Journaling
- Remote Mirroring
- Remote Tape Vaulting
- Rendezvous Point
- Replication
- Report of a Disease
- Reporter
- Request Changes
- Request For Change (RFC)
- Request for Proposal
- Requirement
- Reservoir
- Residual Risk
- Resilience
- Resiliency
- Resilient Information Communication Technology (ICT)
- Resolution
- Resource Cost
- Resource Profile
- Resource Requirements
- Resource Unit Costs
- Resources
- Respond
- Response
- Response Program
- Responsible
- Responsive Action
- Restart
- Restoration
- Restoration Team
- Restore
- Resume
- Resumption
- Retailer
- Return
- Return On Investment (ROI)
- Return on BCP
- Return to Normal Phase