Practicing / simulating DR and on what schedule; process to determine critical systems for restoration; DR strategy moving from onprem to Cloud; separating backups from production to protect against ransomware events; steps to review suitability of DR plans for a ransomware attack; mass communications systems in use to notify stakeholders of major incidents; prioritizing processes / applications; and ultimate accountability for DR / BC.