SlideShare a Scribd company logo
Pro-active Emergency Planning:Pro-active Emergency Planning:
Case Studies in AdaptationCase Studies in Adaptation
Tom GeraceTom Gerace
December 14, 2007December 14, 2007
AgendaAgenda
Emergency planningEmergency planning
Hurricane KatrinaHurricane Katrina
Importance of adapting any plan to realityImportance of adapting any plan to reality
Lessons learned and plan revisionsLessons learned and plan revisions
BackgroundBackground
Tulane UniversityTulane University
Freeman School of BusinessFreeman School of Business
BackgroundBackground
Freeman School of BusinessFreeman School of Business
– 2 buildings on Tulane’s main campus2 buildings on Tulane’s main campus
– Houston campusHouston campus
Emergency PlanningEmergency Planning
IT emergency planIT emergency plan
School-wide emergency planSchool-wide emergency plan
The “norm”The “norm”
Several hurricane scares each seasonSeveral hurricane scares each season
– June 1 through November 30June 1 through November 30
The drillThe drill
August 29, 2005August 29, 2005
Hurricane KatrinaHurricane Katrina
ImpactImpact
The city and the campus were fine post-The city and the campus were fine post-
stormstorm
Then the levees brokeThen the levees broke
– Worst man-made disaster in U.S. historyWorst man-made disaster in U.S. history
Major issuesMajor issues
We could not return to New OrleansWe could not return to New Orleans
Staff, faculty, and students spread outStaff, faculty, and students spread out
across the countryacross the country
Communications were impactedCommunications were impacted
– PhonePhone
– E-mailE-mail
– Web siteWeb site
How to continue operations?How to continue operations?
Houston programsHouston programs
Houston programs continued operationsHouston programs continued operations
Houston campus instrumental in ourHouston campus instrumental in our
business continuitybusiness continuity
AdaptationAdaptation
Major technology issuesMajor technology issues
Web siteWeb site
– Information disseminationInformation dissemination
Restoring e-mail communicationsRestoring e-mail communications
Restore and distribute data from backupsRestore and distribute data from backups
Researcher access to subscriptionResearcher access to subscription
databasesdatabases
The work of getting back to workThe work of getting back to work
The human considerationsThe human considerations
The workThe work
– One example: Office of UndergraduateOne example: Office of Undergraduate
EducationEducation
– Rebuilding classroomsRebuilding classrooms
Lessons learnedLessons learned
Emergency plan revisedEmergency plan revised
– Improved communicationImproved communication
– Expand business continuityExpand business continuity
Emergency planningEmergency planning
Collect and update alternate contactCollect and update alternate contact
information for all constituentsinformation for all constituents
Formalize call-tree for post-event check-inFormalize call-tree for post-event check-in
Business continuityBusiness continuity
– Base of operationsBase of operations
Emergency planningEmergency planning
Technology continuity checksTechnology continuity checks
– Backup web server off-siteBackup web server off-site
Quick DNS change if neededQuick DNS change if needed
Off-site spinning backupsOff-site spinning backups
– Key databases and dataKey databases and data
Review tape backup proceduresReview tape backup procedures
– Revise for diversity of restore proceduresRevise for diversity of restore procedures
ConclusionConclusion
The most difficult step is getting startedThe most difficult step is getting started
– The next most difficult step is keeping theThe next most difficult step is keeping the
plan currentplan current
Doing nothing is not an option.Doing nothing is not an option.

More Related Content

Viewers also liked

Human resource - Shivms Jaiswal
Human resource  - Shivms JaiswalHuman resource  - Shivms Jaiswal
Human resource - Shivms Jaiswal
Shivam Jaiswal
 
Estimating mobilized private climate finance for adaptation
Estimating mobilized private climate finance for adaptationEstimating mobilized private climate finance for adaptation
Estimating mobilized private climate finance for adaptation
Climate Policy Initiative
 
Engaging the Private Sector for National Adaptation Plan (NAP) Implementation...
Engaging the Private Sector for National Adaptation Plan (NAP) Implementation...Engaging the Private Sector for National Adaptation Plan (NAP) Implementation...
Engaging the Private Sector for National Adaptation Plan (NAP) Implementation...
NAP Global Network
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
In a Rocket
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
Post Planner
 

Viewers also liked (6)

Human resource - Shivms Jaiswal
Human resource  - Shivms JaiswalHuman resource  - Shivms Jaiswal
Human resource - Shivms Jaiswal
 
Estimating mobilized private climate finance for adaptation
Estimating mobilized private climate finance for adaptationEstimating mobilized private climate finance for adaptation
Estimating mobilized private climate finance for adaptation
 
Urbanisation
UrbanisationUrbanisation
Urbanisation
 
Engaging the Private Sector for National Adaptation Plan (NAP) Implementation...
Engaging the Private Sector for National Adaptation Plan (NAP) Implementation...Engaging the Private Sector for National Adaptation Plan (NAP) Implementation...
Engaging the Private Sector for National Adaptation Plan (NAP) Implementation...
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 

Similar to Proactive Emergency Planning: Case Studies in Adaptation

Business continuity at_northrop_grumman
Business continuity at_northrop_grummanBusiness continuity at_northrop_grumman
Business continuity at_northrop_grummanAnshuman Jaiswal
 
Business Continuty Planning and Disester Recovry Planning
Business Continuty Planning and Disester Recovry Planning Business Continuty Planning and Disester Recovry Planning
Business Continuty Planning and Disester Recovry Planning
Mohammad Ashfaqur Rahman
 
Contingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery PlanningContingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery Planningmmohamme1124
 
Your company .docx
Your company                                                .docxYour company                                                .docx
Your company .docx
danielfoster65629
 
DR luncheon presentation
DR luncheon presentationDR luncheon presentation
DR luncheon presentation
seishi1
 
2009_NYC_OpRiskUSA_Conf
2009_NYC_OpRiskUSA_Conf2009_NYC_OpRiskUSA_Conf
2009_NYC_OpRiskUSA_ConfPeter Poulos
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuity
Dhani Ahmad
 
Planning for the Inevitable: IT Disaster Preparedness - Linda Sharp
Planning for the Inevitable: IT Disaster Preparedness - Linda SharpPlanning for the Inevitable: IT Disaster Preparedness - Linda Sharp
Planning for the Inevitable: IT Disaster Preparedness - Linda SharpSchoolDude Editors
 
Ready Business
Ready BusinessReady Business
Ready Business
guestb74ceb8
 
Light In The Storm
Light In The StormLight In The Storm
Light In The Storm
wbesse
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - Eryk
Eryk Budi Pratama
 

Similar to Proactive Emergency Planning: Case Studies in Adaptation (13)

Business continuity at_northrop_grumman
Business continuity at_northrop_grummanBusiness continuity at_northrop_grumman
Business continuity at_northrop_grumman
 
Business Continuty Planning and Disester Recovry Planning
Business Continuty Planning and Disester Recovry Planning Business Continuty Planning and Disester Recovry Planning
Business Continuty Planning and Disester Recovry Planning
 
Contingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery PlanningContingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery Planning
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
Your company .docx
Your company                                                .docxYour company                                                .docx
Your company .docx
 
Challenging Environment In Asia Requires Emergency Response
Challenging Environment In Asia Requires Emergency ResponseChallenging Environment In Asia Requires Emergency Response
Challenging Environment In Asia Requires Emergency Response
 
DR luncheon presentation
DR luncheon presentationDR luncheon presentation
DR luncheon presentation
 
2009_NYC_OpRiskUSA_Conf
2009_NYC_OpRiskUSA_Conf2009_NYC_OpRiskUSA_Conf
2009_NYC_OpRiskUSA_Conf
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuity
 
Planning for the Inevitable: IT Disaster Preparedness - Linda Sharp
Planning for the Inevitable: IT Disaster Preparedness - Linda SharpPlanning for the Inevitable: IT Disaster Preparedness - Linda Sharp
Planning for the Inevitable: IT Disaster Preparedness - Linda Sharp
 
Ready Business
Ready BusinessReady Business
Ready Business
 
Light In The Storm
Light In The StormLight In The Storm
Light In The Storm
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - Eryk
 

Recently uploaded

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 

Recently uploaded (20)

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 

Proactive Emergency Planning: Case Studies in Adaptation

  • 1. Pro-active Emergency Planning:Pro-active Emergency Planning: Case Studies in AdaptationCase Studies in Adaptation Tom GeraceTom Gerace December 14, 2007December 14, 2007
  • 2. AgendaAgenda Emergency planningEmergency planning Hurricane KatrinaHurricane Katrina Importance of adapting any plan to realityImportance of adapting any plan to reality Lessons learned and plan revisionsLessons learned and plan revisions
  • 3. BackgroundBackground Tulane UniversityTulane University Freeman School of BusinessFreeman School of Business
  • 4. BackgroundBackground Freeman School of BusinessFreeman School of Business – 2 buildings on Tulane’s main campus2 buildings on Tulane’s main campus – Houston campusHouston campus
  • 5. Emergency PlanningEmergency Planning IT emergency planIT emergency plan School-wide emergency planSchool-wide emergency plan
  • 6. The “norm”The “norm” Several hurricane scares each seasonSeveral hurricane scares each season – June 1 through November 30June 1 through November 30 The drillThe drill
  • 7. August 29, 2005August 29, 2005 Hurricane KatrinaHurricane Katrina
  • 8. ImpactImpact The city and the campus were fine post-The city and the campus were fine post- stormstorm Then the levees brokeThen the levees broke – Worst man-made disaster in U.S. historyWorst man-made disaster in U.S. history
  • 9.
  • 10.
  • 11. Major issuesMajor issues We could not return to New OrleansWe could not return to New Orleans Staff, faculty, and students spread outStaff, faculty, and students spread out across the countryacross the country Communications were impactedCommunications were impacted – PhonePhone – E-mailE-mail – Web siteWeb site How to continue operations?How to continue operations?
  • 12. Houston programsHouston programs Houston programs continued operationsHouston programs continued operations Houston campus instrumental in ourHouston campus instrumental in our business continuitybusiness continuity
  • 14. Major technology issuesMajor technology issues Web siteWeb site – Information disseminationInformation dissemination Restoring e-mail communicationsRestoring e-mail communications Restore and distribute data from backupsRestore and distribute data from backups Researcher access to subscriptionResearcher access to subscription databasesdatabases
  • 15. The work of getting back to workThe work of getting back to work The human considerationsThe human considerations The workThe work – One example: Office of UndergraduateOne example: Office of Undergraduate EducationEducation – Rebuilding classroomsRebuilding classrooms
  • 16.
  • 17. Lessons learnedLessons learned Emergency plan revisedEmergency plan revised – Improved communicationImproved communication – Expand business continuityExpand business continuity
  • 18. Emergency planningEmergency planning Collect and update alternate contactCollect and update alternate contact information for all constituentsinformation for all constituents Formalize call-tree for post-event check-inFormalize call-tree for post-event check-in Business continuityBusiness continuity – Base of operationsBase of operations
  • 19. Emergency planningEmergency planning Technology continuity checksTechnology continuity checks – Backup web server off-siteBackup web server off-site Quick DNS change if neededQuick DNS change if needed Off-site spinning backupsOff-site spinning backups – Key databases and dataKey databases and data Review tape backup proceduresReview tape backup procedures – Revise for diversity of restore proceduresRevise for diversity of restore procedures
  • 20. ConclusionConclusion The most difficult step is getting startedThe most difficult step is getting started – The next most difficult step is keeping theThe next most difficult step is keeping the plan currentplan current Doing nothing is not an option.Doing nothing is not an option.