Security on the Move & In the Clouds

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

THE ROLE OF CSDs DURING ENVIRONMENTAL CRISIS OR OPERATIONAL DISRUPTION THE ROLE OF CSDs DURING ENVIRONMENTAL CRISIS OR OPERATIONAL DISRUPTION A PRESENTATION.
Supreme Systems Profile
Business Continuity Training & Awareness by Sulia Toutai (ANZ)
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
Systems Availability and Business Continuity Chapter Four Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP)
Security Controls – What Works
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
3rd Party Risk Categorization Process
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
| Establishing a Contingency Plan.
Services Tailored Around You® Business Contingency Planning Overview July 2013.
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
ISA 562 Internet Security Theory & Practice
David N. Wozei Systems Administrator, IT Auditor.
Rich Archer Partner, Risk Advisory Services KPMG LLP Auditing Business Continuity Plans.
Data Integrity Lesson 12. Skills Matrix Maintaining Data Integrity Maintaining data integrity is your most important responsibility. –Performing backups.
Business Continuity and Disaster Recovery Planning.
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Chapter 8 Managing Operations. Key Points in Chapter 8 Outsourcing IS Functions Outsourcing IS Functions Security in the Internet Age Security in the.
Alaa Mubaied Risk Management Alaa Mubaied
Unit 3: Identifying and Safeguarding Vital Records Unit Introduction and Overview Unit objective:  Describe the elements of an effective vital records.
Disaster Recovery: Can Your Business Survive Data Loss? DR Strategies for Today and Tomorrow.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
Internal Audit Agency Integrity + Professionalism INTERNAL AUDIT AGENCY ISACA Presentation 15 July, 2013 Alisa Hotel, ACCRA.
SEC 480 assist Expect Success/sec480assistdotcom FOR MORE CLASSES VISIT
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-I)
For more course tutorials visit SEC 480 Entire Course For more course tutorials visit SEC 480 Week 1 DQs SEC 480 Week.
Primary and Backup Connectivity. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or.
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
Information Systems Security
Southern Insurance Agency Business Continuity Management Services
Technology and Business Continuity
Planning for Application Recovery
Utilizing Your Business Continuity Plan.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Server Upgrade HA/DR Integration
Disaster Recovery Constituent Group
CSE 4482 – Session 9 Understand system availability and business continuity, and recognize differences between the two. Comprehend incident response systems.
Business Continuity Plan Training
How to prepare for the End of License of Windows Server 2012/R2
CIS 527 Competitive Success/snaptutorial.com
CYB 110 Competitive Success/snaptutorial.com
CIS 527Competitive Success/tutorialrank.com
CYB 110 Education Begins / Snaptutorial.com. CYB 110 All Assignments For more classes visit CYB 110 Week 1 Individual Protecting.
CIS 527 Education for Service-- snaptutorial.com.
CIS 527 Education for Service-- tutorialrank.com.
CIS 527 Teaching Effectively-- snaptutorial.com
CYB 110 Education for Service-- tutorialrank.com
Personal Introduction
Business Contingency Planning
Cybersecurity compliance for attorneys
Dennis Reid Senior Consultant Elliot Consulting, LLC
Nero Blanco Service Offering – Disaster Recovery as a Service
IST346: Information Security & Risk Management
Business Continuity Program Overview
Developing and testing the Plan
COMPANY NAME Business Continuity Plan Date Presented by.
The Survival Plan.
Presentation transcript:

Security on the Move & In the Clouds DISASTER RECOVERY PRACTICES IN CLOUD COMPUTING ENVIRONMENTS Dr. David A. Abarca, CISSP As an organization migrates it data and applications from local resources to cloud-based solutions, modifications to traditional disaster recovery measures will help translate current practices to prepare for perceived threats associated with this new technology. Two principle elements of information security are the requirement for data integrity and assurance of availability. The cloud computing environment adds new challenges to information security. Information security questions arise when new technologies are introduced to established processes. With the introduction of cloud computing, common questions asked by security professionals are: Where IS the data? How is the data managed? How is the data protected? What assures the integrity of the data backups? What assurance that the cloud has operational integrity? These questions lead to understanding that new threats must be addressed in the disaster preparation process. This presentation will introduce and discuss:(1) the threat vectors associated with the cloud computing environment; (2) the threats that may effect the cloud’s resources; and (3) questions that disaster recovery teams may consider for cloud computing that may have been previously overlooked or were not applicable in a local-resource computing environment.

Introduction Disaster Recovery Cloud Services Security in the Cloud Threats Cloud Services Security in the Cloud Impact on Data Centers Compelling Questions Summary Disaster Recovery DRP Versus BCP DR Issues Threats Cloud Services Where is this cloud? What does it do? Security in the Cloud Impact on Data Centers DR Planning Questions

Disaster Recovery Disaster Disaster Recovery Any event that interrupts normal business operations in such a way as to have a significant impact on the reputation, financial health, or customer relationships of an organization. Disaster Recovery The processes associated with returning an organization’s functional status to “normal operations” as they were prior to the disaster event. Introduction Disaster Recovery Threats Cloud Services Security in the Cloud Impact on Data Centers Compelling Questions Summary

Disaster Recovery Disaster Recovery VS Business Continuity Introduction Disaster Recovery Threats Cloud Services Security in the Cloud Impact on Data Centers Compelling Questions Summary Disaster Recovery VS Business Continuity Disaster Recovery Business Processes Restored Disaster Event Normal Operations Normal Operations Business Continuity Business Continuity The processes required for a business to continue limited functionality until the time at which “normal operations” are restored.

Disaster Recovery Risk Management Avoid the threat Reduce the threat or mitigate its impact Assign the risk of the threat to a third party Accept the risk presented by the threat Introduction Disaster Recovery Threats Cloud Services Security in the Cloud Impact on Data Centers Compelling Questions Summary

Local Facility Threats Physical Location Threat Vectors Power Water External and Internal Threats Nature Technological Obsolescence Introduction Disaster Recovery Threats Cloud Services Security in the Cloud Impact on Data Centers Compelling Questions Summary

Cloud Services Question # 1 Question #2 Questions #3 What is the Cloud? Question #2 Where is the Cloud? Questions #3 Is the Cloud safe? Introduction Disaster Recovery Threats Cloud Services Security in the Cloud Impact on Data Centers Compelling Questions Summary

Security in the Cloud Physical Security Access Control Data Integrity Local and Remote Locations Access Control Preventing unauthorized access Data Integrity Local backups as a safeguard? Availability Introduction Disaster Recovery Threats Cloud Services Security in the Cloud Impact on Data Centers Compelling Questions Summary

Cloud Threats Cloud Threat Vectors Power X 2 Water X 2 External and Internal Threats X 2 Nature X2 Technological Obsolescence X2 Connectivity X2 Introduction Disaster Recovery Threats Cloud Services Security in the Cloud Impact on Data Centers Compelling Questions Summary

Impact of the Cloud on Current Data Centers Introduction Disaster Recovery Threats Cloud Services Security in the Cloud Impact on Data Centers Compelling Questions Summary Competing for budget dollars Technological obsolescence Application Maintenance Legislative requirements

Compelling Questions Where IS our data? What are the threats to that(those) location(s)? Does a need still exits to have local backups? Introduction Disaster Recovery Threats Cloud Services Security in the Cloud Impact on Data Centers Compelling Questions Summary

Compelling Questions How does the need for a warm or cold site impact the disaster preparation process? Does the current datacenter transition to become a “lights out” warm site? What about hardware and application maintenance? Introduction Disaster Recovery Threats Cloud Services Security in the Cloud Impact on Data Centers Compelling Questions Summary

Compelling Questions Do we still need a physical warm/hot site? What is the impact on productivity if the connectivity to the cloud is interrupted? Introduction Disaster Recovery Threats Cloud Services Security in the Cloud Impact on Data Centers Compelling Questions Summary

? Your Questions Introduction Disaster Recovery Threats Cloud Services Security in the Cloud Impact on Data Centers Compelling Questions Summary ?