Operational Resilience DR’s Big Data Dilemma September 16, 2015 Datalink IT Resiliency Practice.

Slides:



Advertisements
Similar presentations
Copyright The Info-Tech Research Group Inc. All Rights Reserved. D1-1 by James M. Dutcher Strategic IT Planning & Governance Creation H I G H.
Advertisements

Life Science Services and Solutions
Auditing Governance Functions
Private Sector Perspectives on Federal Financial Systems Modernization and Shared Services.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
National Update: The information revolution and the 2012 Caldicott Review Simon Richardson – Information Rights Manager.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Public Sector Perspective on CSR and Responsibility Who is Responsible for Responsibility? Santiago, Chile September 2005.
Security Controls – What Works
Audit Planning and Analytical Procedures Chapter 8.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
Viewpoint Consulting – Committed to your success.
IT Governance and Management
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
One Firm. One Team. Countless Opportunities. Baruch College Come out to network and learn more about a career with KPMG that is far beyond coding !
1 Chapter 9 E-commerce portal design strategy. Learning objectives  At the end of the chapter, the students would learn  The need to design e-commerce.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Information Systems Controls for System Reliability -Information Security-
Company LOGO Leading, Connecting, Transforming UNC… …Through Its People Human Capital Management.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Privileged and Confidential Strategic Approach to Asset Management Presented to October Urban Water Council Regional Seminar.
Information Technology Audit
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Consultancy.
© 2010 RightNow Technologies, Inc. ASU – CABIT – Privacy Day Privacy in the Cloud Ben Nelson CISO, RightNow Technologies.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
SecureAware Building an Information Security Management System.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Outsourcing Louis P. Piergeti VP, IIROC March 29, 2011.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Colorado Springs Utilities Environmental Services Functional Assessment Presentation for the American Public Power Association’s 2001 Engineering & Operations.
GRC - Governance, Risk MANAGEMENT, and Compliance
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
OVERVIEW OF INFORMATION SYSTEM (IS) AUDITING NORHAFIZAH BINTI ABDUL MUDALIP YAP YONG TECK TAN YUAN JUE TAY QIU JIE GROUP MEMBER:
Challenges in Infosecurity Practices at IT Organizations
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Mark Estberg, John Howie Senior Directors Microsoft Corporation SESSION CODE: SIA317.
© 2008 IBM Corporation Challenges for Infrastructure Outsourcing July 29, 2011 Atul Gupta Vice President, Strategic Outsourcing, IBM.
Conducting Compliance Assessments and Building Internal Controls In Pharmaceutical R&D Third Annual Medical Research Summit – Session 2.01 Michael Swiatocha.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
ERP For Payments Presented by: Greg Midtbo Oracle Corporation Industry Vice President Financial Services.
G:\99Q3\9220\PD\AJD2.PPT 1 Harriet P. Pearson Chief Privacy Officer IBM February 7, 2003 IBM.
RISK MANAGEMENT : JOURNEY OR DESTINATION ?. What is Risk? “ Any uncertain event that could significantly enhance or impede a Company’s ability to achieve.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
IT GOVERNANCE  Objective : The objective of this area is to ensure that the Certified Information Systems Auditor ( CISA ) candidate understands and can.
1 MISA Model Douglas Petry Manager Information Security Architecture Methodist Health System Managed Information Security.
Jim Rozsypal Partner Risk Management Practice - Ernst & Young ERM Symposium focus | support | accelerate t.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
ITIL VS COBIT 06 PLM - Group 9
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
CLOUD-BASED VIDS A CIO’S PERSPECTIVE Stephen Alford, CIO WEP, Inc.
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
ROLE OF ANALYTICS IN ENHANCING BUSINESS RESILIENCY.
- Company Confidential - Corporate Overview March 2015.
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
An Information Security Management System
TALKS 360 DATA MANAGEMENT INFORMATION MANAGEMENT Graham Olding
Continuity of operations planning
Transforming IT Management
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Session 8: Innovative Uses of Captives: Cyber and Beyond
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Presentation transcript:

Operational Resilience DR’s Big Data Dilemma September 16, 2015 Datalink IT Resiliency Practice

“The significant problems we face today cannot be solved at the same level of thinking we were at when we created them. ” - Albert Einstein

Common Business Demands Solutions We need a cloud strategyDetermine if public or hybrid cloud is a possibility for the organization by using criteria from best practice Understand if my infrastructure costs are in-line with a hybrid or private cloud approach Develop Total Cost of Ownership Models for Private, Public and Hybrid Cloud to Determine Best-Fit Hosting options Where do I place a new workload?Develop a Decision Tool for New workload placement based on business requirements and other criteria provided by IT consumers Choosing a specific cloud architecture that suits the needs of the business Review various workload models and converged infrastructure options to determine optimal cloud architecture for the enterprise Proper handling and efficient resource utilization of new and existing workloads Determine which workloads are fit for Public or Private Cloud Difficulties in balancing workloads across various private or public cloud environments Develop a decision tool to determine which workloads are fit for migration to public cloud Protect the Company’s Data and keep all data secureDevelop criteria to determine for mapping of Company workloads to strategic providers Develop a Service Provider Strategy for my OrganizationDetermine which service providers meet the needs of the business and IT organizations requirements

Agenda 5 Reality check Why? - The role of Operational Resilience How? - Relationships & Governance What? - Things to do to set a solid foundation

The role of operational resilience Why?

Reality Check Key Challenges Greater organizational complexity Increasing dependence on technology Growing number of products and channels Increasing transaction volumes Growing competition More stringent regulatory landscape Performance Demands Maintain operating and net margins Maintain service levels Minimize Business Disruption incidents Minimize loss events Maintain compliance with all regulations 7

Operational Resilience Why do we manage it? Is it to comply with regulatory requirements? …to protect from failure? …to create value?

Relationships and Governance How…?

10 BCM Relationship Model Contractual Obligations (SLA’s) Market Forces Industry Trends Regulatory Landscape Functional Areas Influence Cooperation Partnership BCM Audit Security ERM Executive Management Business Strategy Direction

Things to do to set a solid foundation What…?

Regulatory Demands –SANS  The SANS Institute was established in 1989 as a cooperative research and education organization. –ISO  The ISO family of standards helps organizations keep information assets secure. –SAS 70  Statement on Auditing Standards (SAS) No. 70, Service Organizations, was a widely recognized auditing standard developed by the American Institute of Certified Public AccountantsAmerican Institute of Certified Public Accountants –FFIEC  The Federal Financial Institutions Examination Council (FFIEC) was established on March 10, 1979, pursuant to title X of the Financial Institutions Regulatory and Interest Rate Control Act of 1978 (FIRA), Public Law In 1989, title XI of the Financial Institutions Reform, Recovery and Enforcement Act of 1989 (FIRREA) established The Appraisal Subcommittee (ASC) within the Examination Council.ASC

Regulatory Demands continued –National Institute of Standards and Technology  Founded in 1901 and now part of the U.S. Department of Commerce, NIST is one of the nation's oldest physical science laboratories. –FINRA  FINRA is dedicated to investor protection and market integrity through effective and efficient regulation of the securities industry. –SOX  Sarbanes–Oxley Act of 2002 also known as the "Public Company Accounting Reform and Investor Protection Act" (in the Senate) and "Corporate and Auditing Accountability and Responsibility Act" –HIPPA  The HIPAA Privacy regulations require health care providers and organizations, as well as their business associates, develop and follow procedures that ensure the confidentiality and security of protected health information (PHI) when it is transferred, received, handled, or shared. –Consumer Privacy Bill of Rights Act of 2015 Using this family of standards will help your organization manage information entrusted to your organization.

Business requirements around data protection are not defined or are out dated Backup architecture is out of date Archival technology (tape) and methodology is not in use today Customer backs up everything in their environment Retention policy is non-existent or limited Back up admins are overloaded managing the environment –Staff are reactive versus proactive –BURA reporting is time consuming with limited benefits Back up costs are out of control Situation

Customer’s IT organization need to validate their current Backup environment from a technical and operational perspective. Highlights would include: Validate “Current” State with opportunities to improve backup governance and service standardization Envision “Future” State based upon their business/backup/retention requirements and leverage industry “best practices” Identify Gaps between “Current” and “Future” State Back up, Recovery and Archive (BURA) Establish a Roadmap/Timeline with ROI to Close Gaps Background and Objectives

16 BCM – Program Management Model

In summary…

Putting it all together “Begin with the end in mind” - Do we know why? Frameworks should be adapted to your organization’s needs, NOT the other way around Do we know how? Regardless of the chosen framework, develop an integrated governance model - Do we know who? Start where you are and build from there - Do we have a defined road map? Measure and report - Have we defined KPI’s? Foundation for Operational Resilience KPI’s Governance Business Alignment

Questions Paul Thomann Manager – IT Resiliency Practice Manager

Thank You!