Lead disaster recovery exercises

Description

Head exercises which educate people on what to do in case of an unforeseen disastrous event in the functioning or security of ICT systems, such as on recovery of data, protection of identity and information and which steps to take in order to prevent further problems.

Alternative labels

Skill type

skill/competence

Skill reusability level

sector-specific

Relationships with occupations

Essential skill

Lead disaster recovery exercises is an essential skill of the following occupations:

Chief ICT security officer: Chief ICT security officers protect company and employee information against unauthorized access. They also define the Information System security policy, manage security deployment across all Information Systems and ensure the provision of information availability.
ICT security manager: ICT security managers propose and implement necessary security updates. They advise, support, inform and provide training and security awareness and take direct action on all or part of a network or system.

ICT resilience manager: ICT resilience managers research, plan and develop models, policies, methods, techniques and tools that enhance an organisation’s cyber security, resilience and disaster recovery.
Security manager: Security managers ensure security for people, such as customers and employees, and company’s assets either fixed, movable, machines, vehicles, and real state. They ensure safety and security by enforcing security policies, keeping track of different events, implementing security protocols, creating emergency response procedures, conducting security evaluations, and supervising security staff members.
 

Optional skill

Lead disaster recovery exercises is optional for these occupations. This means knowing this skill may be an asset for career advancement if you are in one of these occupations.

ICT security administrator: ICT security administrators plan and carry out security measures to protect information and data from unauthorised access, deliberate attack, theft and corruption.
ICT security consultant: ICT security consultants advise and implement solutions to control access to data and programs. They promote a safe exchange of information.

Operations manager: Operations managers plan, oversee and coordinate the daily operations of production of goods and provision of services. They also formulate and implement company policies and plan the use of human resources and materials.

 


 

References

  1. Lead disaster recovery exercises – ESCO

 

Last updated on September 20, 2022