How is security of enterprise data going to be protected during the event and the recovery processes?

  1. What risks are faced if core applications go down for a day, a week, or longer?
  2. What are the Recovery Time Objectives (RTO) by fac1lity and application?
  3. How are facilities and applications currently protected and are they all protected the same way?
  4. How is security of enterprise data going to be protected during the event and the recovery processes?
  5. Who are the key decision makers in the recovery process?
  6. Does the recovery plan meet all compliance objectives?
  7. What will happen to key data in the event of a disaster?
  8. Against which types of disasters are we guarding?
  9. What was the scope of the last test of the recovery processes?
  10. What were the results of our latest full recovery test?