13,95 €
13,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
7 °P sammeln
13,95 €
13,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
7 °P sammeln
Als Download kaufen
13,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
7 °P sammeln
Jetzt verschenken
13,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
7 °P sammeln
  • Format: ePub

You have the knowledge and skill to create a workable Business Continuity Management (BCM) program - but too often, your projects are stalled while you attempt to get the right information from the right person. Rachelle Loyear experienced these struggles for years before she successfully revamped and reinvented her company's BCM program. In The Manager's Guide to Simple, Strategic, Service-Oriented Business Continuity, she takes you through the practical steps to get your program back on track.
Rachelle Loyear understands your situation well. Her challenge was to manage BCM in a large
…mehr

  • Geräte: eReader
  • mit Kopierschutz
  • eBook Hilfe
  • Größe: 8.83MB
Produktbeschreibung
You have the knowledge and skill to create a workable Business Continuity Management (BCM) program - but too often, your projects are stalled while you attempt to get the right information from the right person. Rachelle Loyear experienced these struggles for years before she successfully revamped and reinvented her company's BCM program. In The Manager's Guide to Simple, Strategic, Service-Oriented Business Continuity, she takes you through the practical steps to get your program back on track.

Rachelle Loyear understands your situation well. Her challenge was to manage BCM in a large enterprise that required hundreds of BC plans to be created and updated. The frustrating reality she faced was that subject matter experts in various departments held the critical information she needed, but few were willing to write their parts of the plan. She tried and failed using all the usual methods to educate and motivate - and even threaten - departments to meet her deadlines.

Finally, she decided there had to be a better way. The result was an incredibly successful BCM program that was adopted by BCM managers in other companies. She calls it "The Three S's of BCM Success," which can be summarized as: Simple - Strategic - Service-Oriented.

Loyear's approach is easy and intuitive, considering the BCM discipline from the point of view of the people in your organization who are tasked to work with you on building the plans and program. She found that most people prefer:

  • Simple solutions when they are faced with something new and different.
  • Strategic use of their time, making their efforts pay off.
  • Service to be provided, lightening their part of the load while still meeting all the basic requirements.


These tactics explain why the 3S program works. It helps you, it helps your program, and it helps your program partners.

Loyear says, "If you follow the 'Three S' philosophy, the number of plans you need to document will be fewer, and the plans will be simpler and easier to produce. I've seen this method succeed repeatedly when the traditional method of handing a business leader a form to fill out or a piece of software to use has failed to produce quality plans in a timely manner."

In The Manager's Guide to Simple, Strategic, Sevice-Oriented Business Continuity, Loyear shows you how to:

  • Completely change your approach to the problems of "BCM buy-in."
  • Find new ways to engage and support your BCM program partners and subject matter experts.
  • Develop easier-to-use policies, procedures, and plans.
  • Improve your overall relationships with everyone involved in your BCM program.
  • Craft a program that works around the roadblocks rather than running headlong into them.

  • Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, D ausgeliefert werden.

Autorenporträt
Rachelle Loyear, MBCP, AFBCI, CISM, PMP, has spent over a decade managing various projects and programs in corporate security organizations, focusing strongly on business continuity and organizational resilience. In her work life, she has directed teams responsible for ensuring resilience in the face of many different types of security risks, both physical and logical. Her responsibilities have included: Security/business continuity management program design and development; crisis management and emergency response planning; functional and location-based recovery and continuity planning; training personnel in crisis management and continuity; operational continuity exercises; logistical programs, such as public/private partnership relationship management; and crisis recovery resource programs.

She began her career in information technology (IT), working in programming and training design at an online training company, before moving into the telecommunications industry. She has worked in various IT roles - including Web design, user experience, business analysis, and project management - before moving into the security/business continuity arena. This diverse background enables her to approach security, risk, business continuity, and disaster recovery with a broad methodology that melds many aspects into a cohesive whole.

Rachelle holds a bachelor's degree in history from the University of North Carolina at Charlotte, and a master's degree in business administration from the University of Phoenix. She is certified as a Master Business Continuity Professional (MBCP) through DRI International, as an Associate Fellow of Business Continuity International (AFBCI), as a Certified Information Security Manager (CISM) through ISACA, and as a Project Management Professional (PMP) through the Project Management Institute (PMI). She is active in multiple business continuity management industry groups, and is vice-chair of the Crisis Management and Business Continuity Council of ASIS International as well as serving on the IT Security Council. With Brian Allen, she co-authored The Manager's Guide to Enterprise Security Risk Management: Essentials of Risk-Based Security(Rothstein Publishing, 2016).