About Us | Contact Us
View Cart

Seven Steps of a BCP Walk-through Test

By Dan Hadaway | Friday, August 26, 2011 - 10 Comments

I just sent this in an e-mail to a Client, and thought maybe other people could use it.

WALK-THROUGH TEST AGENDA ITEMS:

  1. The walk-through should be a planned test (needs to be scheduled in advance, with all BCT members required to attend, and all BCT members should know the purpose of the test.)  Sharing this checklist in the meeting invitation would suffice.
  2. All Business Continutity Team (BCT) Members need to be present and they need to sign an attendance sheet.
  3. The walk-through should confirm that all BCT Members have their own copy of the plan, and that their copy is up-to-date.  The BCP coordinator should personally and physically look at each BCT Member’s plan to confirm updates are in the plan.
  4. The walk-through should also review any policies or procedures that call for the plan.
  5. The walk-through should go through the entire plan, one page at a time, making sure that all BCT members understand and agree with the plan, updating system descriptions and such.  If there is disagreements, they should NOT be resolved in the walk-through, but the minutes of the walk-through should reflect this so that the BCP can be updated at a later date with resolution of disagreements.
  6. The walk-through should confirm all phone numbers, and remind BCT members to keep their plan at home (when they are not using it in BCP Tests).
  7. The walk-through should end with a reading of the “decision summary” or “minutes” and a written copy of such should be sent to all BCT members (as well as other appropriate management team members) within a reasonable amount of time after the test.

 

The above is quick and off the top of my head, but I believe if you follow it as a guide, you’ll have a sufficient Walk-through Test of your Business Continuity Plan.

Dan Hadaway
Managing Partner
infotex, inc.

 

 

10 Responses to “Seven Steps of a BCP Walk-through Test”

Comment from Server 2016 Migration Experts
Time 06/28/2017 at 4:11 pm

This is one technology that I would love to be able to use for myself. It’s definitely a cut above the rest and I can’t wait until my provider has it. Your insight was what I needed. Thanks

Comment from Server 2016 Migration Experts
Time 07/10/2017 at 2:06 am

This is really serious, You’re an exceedingly qualified writer. I have signed up with your feed and additionally will enjoy finding your personal wonderful write-ups. Incidentally, We have shared your web blog in our social networks. plz visit the site

Server 2016 Migration Experts

Comment from Server 2016 Migration Experts
Time 07/17/2017 at 1:01 am

Hey there I am so glad I found your site, I really found you by accident, while I was researching on Aol for something else, Anyhow I am here now and would just like to say thanks for a tremendous post and a all round thrilling blog (I also love the theme/design), I don’t have time to read through it all at the minute but I have book-marked it and also added in your RSS feeds, so when I have time I will be back to read a lot more, Please do keep up the fantastic work.

Server 2016 Migration Experts

Comment from Microsoft Server 2016
Time 08/31/2017 at 6:46 pm

This is the first time I came here. I found many recreational elements on your blog, especially from the tons of comments in your article, I suppose here’s not the only one being enjoyed all over! Keep doing good things.

Microsoft Server 2016

Comment from Microsoft Server 2016 Support
Time 09/04/2017 at 11:21 am

Wonderful website. A lot of useful info here. I am sending it to a few friends ans also sharing in delicious. And obviously, thanks for your sweat!

Microsoft Server 2016 Support

Comment from Microsoft Server 2016
Time 10/02/2017 at 3:37 am

This is a technology that I would like to be able to use for myself. It’s definitely a cut above the rest and I can not wait until my provider has it. What was your insight I needed to thank you

Microsoft Server 2016

Comment from Server 2016 Support
Time 11/13/2017 at 2:51 am

Hello I wish to to share a comment here concerning you to definitely be able to inform you just how much i personally Loved this particular study. I have to elope in order to aTurkey Day time Supper but desired to leave ya an easy comment. We preserved you Same goes with be returning subsequent function to read more of yer quality articles. Keep up the quality work.

Server 2016 Support

Comment from Microsoft Server 2016 Repair
Time 11/19/2017 at 11:49 pm

This design is incredible! You most certainly know how to keep a reader entertained. Between your wit and your videos, I was almost moved to start my own blog (well, almost…HaHa!) Great job. I really enjoyed what you had to say, and more than that, how you presented it. Too cool!

Microsoft Server 2016 Repair

Comment from Microsoft Server 2016
Time 11/27/2017 at 6:43 am

I think I will become a great follower.Just want to say your story is striking. The clarity in your post is simply striking and i can take for granted you are an expert on this subject.

Microsoft Server 2016

Trackback from Google
Time 05/10/2019 at 2:26 pm

Google

Here is a superb Blog You might Come across Interesting that we encourage you to visit.

Latest News
    As the investigation of the SolarWinds Hack was ongoing, another hack stole some of the limelight… This is the final update on the SolarWinds hack unless a major development comes to light. You can see the previous article here: “Autopsy of the SolarWinds Hack Update“. One of the largest cyber-espionage campaigns in the history of […]
    Employees working from home may find it more difficult to follow security policies… An article review. The surge in employees working from home during the pandemic created many headaches for IT departments around the world, many of whom had no telecommuting policies or procedures before the start… but what about the employees who had to […]
    A Webinar-Movie infotex presents the 2021 update of a previously released webinar presented by our Lead Non-Technical Auditor, Adam Reynolds. This movie-short is intended for those who are planning to participate in an infotex Incident Response Test. Not sure about the importance of an Incident Response Test? Check out onetest.infotex.com for more information! Please let […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS INFOTEX PROMOTES BRYAN BONNELL TO DIGITAL MEDIA MANAGER infotex, the Managed Security Service Provider, announced Bryan Bonnell’s promotion from Senior Data Security Analyst to Digital Media Manager.  “He will continue his normal DSA duties on a limited basis, because we want everybody to stay in touch with […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS RYAN HENSLER OF INFOTEX, EARNS CISSP CERTIFICATE Ryan Hensler, Senior NOC Associate of infotex, Inc., recently received the CISSP certification. “Ryan has proven himself to be a seasoned security professional both in his work for infotex and now through achieving this certification.” said Sean Waugh, Information Security Officer. […]
    Dubious app store subscriptions bring in hundreds of millions of dollars in revenue… An article review. When it comes to malicious applications you’re probably familiar with things like malware and ransomware, and you have ways to avoid them.  Modern desktop and smartphone operating systems have built-in malware detection tools, and some web browsers even automatically […]
    Another Manifesto A supply-chain manifesto by the author of Never Say Never: A Password Manifesto! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . [Sssshh.  Turn out the lights.  Let’s lower our inner voices, as I have something to propose that might be a bit […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office.  
    While malware and security exploits continue to make headlines, the majority of reported security incidents involve phishing… An article review. With all the attention given recently to security incidents involving software exploits and high-profile malware attacks, it would be easy to believe that they represented the most likely incidents you may encounter in the wild.  […]
    Implementing Protective DNS could help your organization avoid attack… An article review. Noting the risks still associated with the Domain Name System (DNS), the National Security Agency and the Cybersecurity and Infrastructure Security Agency (CISA) have recently released new guidance on the selection and use of a Protective DNS service (PDNS). The guidance, released in […]