Linda Hanwacker MSCS, MBA, CBCP. Information Technology (IT) – hardware and software used to store, retrieve and process data Communication Technology.

Slides:



Advertisements
Similar presentations
FMS. 2 Fires Terrorism Internal Sabotage Natural Disasters System Failures Power Outages Pandemic Influenza COOP/ Disaster Recovery/ Emergency Preparedness.
Advertisements

G.W ICT for risk management FP6 Strategic Objective ICT for Environment Information Society & Media DG European Commission, Brussels Guy Weets Deputy.
IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
Information Systems in Business
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
Technical Review Group (TRG)Agenda 27/04/06 TRG Remit Membership Operation ICT Strategy ICT Roadmap.
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
CHAPTER FIVE INFRASTRUCTURES SUSTAINABLE TECHNOLOGIES CHAPTER FIVE INFRASTRUCTURES SUSTAINABLE TECHNOLOGIES Copyright © 2015 McGraw-Hill Education. All.
Manasa Guduru Sai Prasanth Sridhar Malini srinivasan Sinduja Narasimhan Reference: Aymerich, F. M., Fenu, G., & Surcis, S. (2008). An approach to a cloud.
Cloud Usability Framework
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
THE DICOM 2013 INTERNATIONAL CONFERENCE & SEMINAR March 14-16Bangalore, India DICOM Medical Image Management the Challenges and Solutions – Cloud as a.
Duncan Fraiser, Adam Gambrell, Lisa Schalk, Emily Williams
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Selling Consolidation’s Value. Why Consolidate? Reduce Complexity Increase Productivity Reduce TCO Improve End User Experience Improve IT Performance.
By N.Gopinath AP/CSE. Why a Data Warehouse Application – Business Perspectives  There are several reasons why organizations consider Data Warehousing.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
Sanbolic Enabling the Always-On Enterprise Company Overview.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 9. Preventing and Responding to Computer Fraud IT Security Ranked #2 Preventing and Responding.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Management Information Systems
CHAPTER FIVE INFRASTRUCTURES SUSTAINABLE TECHNOLOGIES
CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Disaster Recovery Strategies & criteria for evaluation of information management strategies.
Introduction to Information Systems Class Agenda Instructor Introductions –Instructor –Class Objectives Competitive Advantages will be a key area Very.
An Answer to the EC Expert Group on CLOUD Computing Keith G Jeffery Scientific Coordinator.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B17 Organizational Architecture Trends.
1 Nassau Community CollegeProf. Vincent Costa Session 7 Infrastructures Sustainable Technologies CMP 117 Business Computing: Concepts &Applications.
Database Administration
By: Ashish Gohel 8 th sem ISE.. Why Cloud Computing ? Cloud Computing platforms provides easy access to a company’s high-performance computing and storage.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Enterprise Architectures.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Analysis. Solution Requirements 1. Identify the functions and attributes of the website. 2. Write a problem statement. (What is the problem? What will.
1 IBM TIVOLI Business Continuance Seminar Training Document.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
CLOUD COMPUTING JAZ PATERNOSTER. DEFINITION Cloud computing is the use of ‘the cloud’ as a place to save files rather than in a personal computer, allowing.
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
Enterprise Cybersecurity Strategy
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Nov 22/26 Tech Forum 2015 Roberto Trinconi Cloud the New Path to the Business Leadership.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
2006 Infrastructure Projects Four Themes: Storage – room to grow Security – reacting to threats Virtual Systems – increased efficiency Service Management.
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
CLOUD COMPUTING WHAT IS CLOUD COMPUTING?  Cloud Computing, also known as ‘on-demand computing’, is a kind of Internet-based computing,
Business Continuity Disaster Planning
Simplifying IT, Empowering Business.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Start out with questions? Does anyone work with Databases? Has anyone ever had their computer slow down, to a crash? Would it be more beneficial for your.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
Identify Assess Plan Implementation. Managed Service Providers (MSPs) must use the best and latest technologies on the market to deliver services. IT.
Chapter 6: Securing the Cloud
Avenues International Inc.
Lecture 9 - Business Information Systems: Electronic Business Systems
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
Cloud Computing By P.Mahesh
EIS Fast-track Revision Om Trivedi Enterprise Information Systems
Cloud & Developing Nations
Cloud Consulting Services and Solutions
Enterprise Data Solution Running on the Azure Cloud Platform Protects, Preserves Critical Data “Druva takes a proactive approach to help customers address.
Convergence “must haves” Common ICT ETP Challenges
Capitalize on Your Business’s Technology
Done by:Thikra abdullah
Presentation transcript:

Linda Hanwacker MSCS, MBA, CBCP

Information Technology (IT) – hardware and software used to store, retrieve and process data Communication Technology (CT) – electronic systems used for communication Information Communication Technologies (ICT) – Convergence of IT and CT combines the software, cloud/technology, network, applications and devices. 2© 2016 The LSH Group, LLC

The effectiveness and timeliness of information in a crisis is critical and can be a challenge. Crisis and Emergency Actions Plans - dependent on technology for maintaining critical information  accessible and communicated during a crisis Crisis and Emergency Management - concerned with the resiliency of being able to obtain the necessary information quickly  evacuation procedures  emergency escape procedures  floor plans  safe areas  contact information  emergency notification system  other vital information 3 © 2016 The LSH Group, LLC

Today: Virtualization - degree of flexibility that was not possible in the past. The methods today involve convergence-  Minimize storage costs  Allow for almost instant recovery and access of information,  Faster results  More reliable 4 © 2016 The LSH Group, LLC

1. Understanding the new convergence strategy for bridging the gap between technology and crisis management/communication. 2. Basic philosophy behind instant access to communications and information, rather than implementation of traditional methods and social media. 5© 2016 The LSH Group, LLC

6 Organization Inputs Outputs Time Priorities Dependencies Impacts © 2016 The LSH Group, LLC ICRC Conference The Process The CRISIS

Research: Software, Hardware and Crisis Communication App that utilize virtualization and other technologies during a crisis, that are the most beneficial and cost effective. Address:  Implementation  Deployment of the latest technology/architectures  Benefits 7© 2016 The LSH Group, LLC

Software 8© 2016 The LSH Group, LLC CASE STUDY 1 DISCUSSION

9© 2016 The LSH Group, LLC

10© 2016 The LSH Group, LLC

Hardware 11© 2016 The LSH Group, LLC CASE STUDY 2 DISCUSSION

12© 2016 The LSH Group, LLC Vblock™ 240 Elevation

Reduce costs and complexity through centralized provisioning and management Increase security by separating company and personal desktops and centrally controlling sensitive data Create consistent user experiences by deploying a uniform high performance architecture 13© 2016 The LSH Group, LLC

Crisis Communication App 14© 2016 The LSH Group, LLC CASE STUDY 3 DISCUSSION

15© 2016 The LSH Group, LLC RPX is an end to end, comprehensive solution:

Robust automatic notification system Centralized management Plan maintenance Incident management Faster and more reliable results Ease of use 16© 2016 The LSH Group, LLC

Technological convergence has raised a number of issues to the new environment - by telecom operators, service providers, policymakers, regulators, and users. New Regulatory Framework  The combination of services over the same platform - interoperability, interconnection, consumer protection and universal access appear as the most relevant challenges. Bandwidth Shortage and Infrastructure Upgrade  Convergence gives rise to new services and applications which are bandwidth intensive. Privacy, Security and Reliability  As society becomes increasingly interconnected cybercriminals continue to invent increasingly cunning ways to exploit human and computer vulnerabilities to their malicious benefits. 17© 2016 The LSH Group, LLC

How will you handle your communications and technology in the next crisis? 18© 2016 The LSH Group, LLC

LSH Business Continuity, Continuity of Operations, Emergency Mgmt. & Disaster Recovery Planning Specialists Linda S. Hanwacker Phone: (239) Website: The LSH Group, LLC 20 © 2016 The LSH Group, LLC ICRC Conference Contact Information: