activities as well as weaknesses Treatment and recovery processes, which could be exploited Identify
procedures Data Protection and Retention, Disaster Recovery and Business Continuity Plan End user documentation
to schedules Plan and conduct regular disaster recovery testing Assist customers in recovering from disasters