Enron Corp. Disaster Recovery/Business Continuity Options June, 2000.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Cloud Computing - clearing the fog Rob Gear 8 th December 2009.
Disaster Recovery Planning Because It’s Time! Copyright Columbia University and Bentley College, This work is the intellectual property of the author.
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
HUD and Disaster Mitigation ASFPM May 22, Community Development Block Grant (CDBG) Disaster Recovery In response to a Presidentially-declared disaster,
DISASTER CENTER Study Case DEMIRBANK ROMANIA “Piata Financiara” ConferenceJanuary 29, 2002 C 2002.
1 Disaster Recovery “Protecting City Data” Ron Bergman First Deputy Commissioner Gregory Neuhaus Assistant Commissioner THE CITY OF NEW YORK.
Top Questions Executives and Board Members Should be Asking About IT and Cloud Risks.
@TxSchoolSafety Continuity of Operations Planning Workshop Devolution & Reconstitution.
Audit Considerations of Data Center Consolidation Jon Ingram Audit Manager Information Technology Audits Florida Auditor General 1.
Disaster Protection and Recovery By: Michael Morrell Ross Ashenfelter Teresa Furnish Karla Maddox.
1 Record Management Medical Center Administrative Group Fall Symposium November 15, 2000 University Audit.
Stephen S. Yau CSE , Fall Contingency and Disaster Recovery Planning.
Disaster Prevention and Recovery Presented By: Sean Snodgrass and Theodore Smith.
Management Information Systems, 4 th Edition 1 Chapter 16 Alternative Avenues for Systems Acquisitions.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES CHAPTER.
Informed Consent and HIPAA Tim Noe Coordinating Center.
Disaster Recovery and Business Continuity Ensuring Member Service in Times of Crisis.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Business Crisis and Continuity Management (BCCM) Class Session
IT Assurance and Reliability Why Should You Care? Richard Oppenheim, CPA, CITP President, SysTrust Services Corporation Presented to ISACA Regional Meeting.
Services Tailored Around You® Business Contingency Planning Overview July 2013.
November 2009 Network Disaster Recovery October 2014.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 9. Preventing and Responding to Computer Fraud IT Security Ranked #2 Preventing and Responding.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
Hosted by Keep Data at a Distance Disaster Recovery for the "New Realities” Presented by: Damian Walch, CISA, CISSP, MBCI T-Systems, Inc.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
SLA of an Outsource Process - 1 Service Level Agreements (SLAs) of an Outsource Process Michael Day MBA 731 October 29, 2007.
BUSINESS INTERRUPTION RISK FEATURES PETE HOLMES BUSINESS RESILIENCE FORUM APRIL 2015.
1 November 2008 David Hall Sales Manager – New Business Data Centre Hosting for the M-Business.
VendorVision Lender and Agent Module New Release Features June 9, 2015 H. Balogh, G. Gabe Confidential.
Storage and data services eIRG Workshop Amsterdam Dr. ir. A. Osseyran Managing director SARA
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1 Availability Policy (slides from Clement Chen and Craig Lewis)
Co-location Sites for Business Continuity and Disaster Recovery Peter Lesser (212) Peter Lesser (212) Kraft.
Important points and activities.  The objective is to secure life, property, information in the event of a disaster and to facilitate business continuity.
Information Availability Brett Paulson Sr. VP and Chief Information Officer Board of Trade Clearing Corporation FIA – November 7, 2002.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Module 13 Implementing Business Continuity. Module Overview Protecting and Recovering Content Working with Backup and Restore for Disaster Recovery Implementing.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
Welcome Georgia Infrastructure Transformation 2010 Kick-off Meeting January 30, 2008.
ARE YOU MANAGING YOUR OPERATIONAL RISKS? Michael B. Hetzel CHCM, CSM, CUSA Director – Risk Management Services Unitel Insurance Group Lincoln, Nebraska.
Disaster Recovery and Business Continuity Planning IBK3IBV01 College 7 Paul J. Cornelisse.
The Problem YOU are responsible for confidential, mission- critical data... but.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Disaster Recovery: Can Your Business Survive Data Loss? DR Strategies for Today and Tomorrow.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
A2 LEVEL ICT 13.6 LEGAL ASPECTS DISASTER RECOVERY.
The 82 nd Legislative Session Ben G. Raimer, MD Senior Vice President Health Policy and Legislative Affairs The University of Texas Medical Branch
® _1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Dr. Hussein Al-Bahadili Faculty of Information Technology Petra University Securing E-Transaction 1/24.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Information Security Crisis Management Daryl Goodwin.
CTS Quarterly Customer Meeting CTS Disaster Recovery (DR) Project October 22, 2014.
THE TOP FOUR BEST PRACTICES WHEN SELECTING A DALLAS DATA CENTER.
© 2015 CT State Library. All rights reserved. 2 Contacts Maria Bernier E-rate Coordinator CT State Library Scott Taylor.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Making the Connection ISO Master Class An Overview.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Business Contingency Planning
CTS Quarterly Customer Meeting
CTS Quarterly Customer Meeting
Understanding Back-End Systems
Presentation transcript:

Enron Corp. Disaster Recovery/Business Continuity Options June, 2000

Confidential & Proprietary Information 1 IT Compliance DRP/BCP Options Build Recovery Facilities Ourselves Build facilities to house both operational (ready to run) computer systems and personnel. –Positives: –All equipment and workspace available for Enron’s exclusive use –No risk of giving others access to proprietary systems or data –Some existing infrastructure in place at Ardmore. The Ardmore solution, however, would not cover against widespread disasters in the Houston area –Negatives: –Very expensive –Idle equipment and space tends to be “cannibalized” for other purposes

Confidential & Proprietary Information 2 IT Compliance DRP/BCP Options Contract for Use of Facilities Contract for facilities and equipment with a service provider, such as Comdisco, SunGard, or IBM –Positives: –Companies have extensive experience in disaster recovery –Facilities are shared so cost of maintaining is defrayed –Much of the infrastructure already exists –Opportunity to partner, notably with Comdisco, on broadband solutions. May create a “win win” situation. –Negatives: –Difficult to keep synchronized –Nearest recovery centers are in Dallas

Confidential & Proprietary Information 3 IT Compliance DRP/BCP Options Mirror between Offices Set up redundant equipment in other offices (e.g., London mirrors Houston) –Redundant systems are likely to be cannibalized –Still requires a facility where people can relocate with telecommunications links to backup site –Communications bandwidth has recently been expanded between Houston and London from 6 Megabits per second to 90 Megabits per second. This makes mirroring key information much more viable than in the past Variation. Mirroring could be managed internally or with a vendor. The vendor solution may be preferable, since they would be dedicated to ensuring that the information at the redundant site is current.

Confidential & Proprietary Information 4 IT Compliance DRP/BCP Options Build “Hot” Site and Outsource Technology infrastructure can be changed in size and configuration without breaking down or needing complete replacement Build Shared Facility Legislation requiring recovery plans such as the Health Insurance Portability and Accountability Act may provide an opportunity for Enron to leverage building a site. Hospitals in the Texas Medical Center may be open to paying for the use of a shared facility that would be funded by Enron and another service provider Insurance Appropriate steps are taken to protect Enron’s rights and remain in compliance with applicable laws and regulations. Insurance is typically an extra precaution, since effective DRP/BCP solutions are required to obtain a policy. It is also very expensive Do Nothing Enron may chose to accept the risk of disasters. Since Enron’s reliance on technology increases daily, this approach is not advised

Confidential & Proprietary Information 5 IT Compliance Action Items Cost Analysis. IT Compliance is currently seeking cost estimates from vendors Management Support. Management needs to agree to an approach and provide funding and support Risk Analysis. Much of this was done in the Year 2000 program. Mission critical systems can be loosely categorized into trading applications, pipeline controls systems and, more recently, Internet based systems that interface with customers. These systems should be covered. Enron can tolerate extended down time of most other applications