Disaster Recovery, Business Continuity, and the Cloud January 2014 Joel Maloff Vice President – Channel Development

Slides:



Advertisements
Similar presentations
Security and Control Soetam Rizky. Why Systems Are Vulnerable ?
Advertisements

How to Ensure Your Business Survives, Even if Your Server Crashes Backup Fast, Recover Faster Fast and Reliable Disaster Recovery, Data Protection, System.
4 Information Security.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Ch.5 It Security, Crime, Compliance, and Continuity
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey.
Lesson 11 – NETWORK DISASTER RECOVERY Disaster recovery plans Network backup and restoration OVERVIEW.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES CHAPTER.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Saving Your Business from a Data Loss Randy Clark.
Business Continuity & Disaster Recovery Planning at The Chicago Board of Trade Presented By: Bryan Durkin Sr. Vice President The Chicago Board of Trade.
| Establishing a Contingency Plan.
Disaster Recovery Plan: Do you have one? Neal Cross, Assistant Director of Instructional Technology Shelly Brown, Director of Web Services Southwest Baptist.
Services Tailored Around You® Business Contingency Planning Overview July 2013.
COMPUTER SOFTWARE ALISA RAHMANI PUTRI / VIDIYA RACHMAWATI /
Author: Andy Reedftp://topsurf.co.uk/reed FdSc IT/Computer Networking & IT(e-commerce) Communications Network Management An Introduction to Security.
Continuity Planning & Disaster Recovery ( BRPASW Workshop)
Presented By: MICHAEL HOFFMAN President & CEO - Bolt Data Systems June 16, 2010 Data Backup for the Shared Platform.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Evolving IT Framework Standards (Compliance and IT)
MANAGEMENT INFORMATION SYSTEMS Data Raw facts and figures. Information Knowledge gained from processing data. Management information system (MIS) Organized.
Disaster Recovery Strategies & criteria for evaluation of information management strategies.
Insurance Institute for Business & Home Safety Even if the worst happens, be prepared to stay.
FORESEC Academy FORESEC Academy Security Essentials (II)
Using Technology to Manage Information Chapter 14.
Managing Technology and Information Chapter 15. Distinguish between data and information and explain the role of management information systems in business.
Information Warfare Playgrounds to Battlegrounds.
1 Crisis Management / Emergency Management Overview.
Using Technology to Manage Information
IS Network and Telecommunications Risks Chapter Six.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Note1 (Admi1) Overview of administering security.
1 Chapter 12 Enterprise Computing. Objectives Overview Discuss the special information requirements of an enterprise-sized corporation Identify information.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Risk and Financial Management Panel FPPA 13 th Annual Convention Sanibel Harbour – Fort Meyers, Florida February 23, 2010.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Business Continuity Planning  What is it?  Why do we do it?  How do we do it?
Chap1: Is there a Security Problem in Computing?.
SFDV Principles of Information Systems Lecture 15: Enterprise Integration.
Information Warfare Playgrounds to Battlegrounds.
Health Safety and Preparedness.  Identify the resources required to develop and maintain a safe and prepared workplace  Understand the key roles and.
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
Utilities and Crisis Management June 13, 2015 Carolyn Bermudez Vice President and General Manager, Operations.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Disaster Recovery. Refer to the process,policy and procedure related to recovery or continuation of technology infrastructure critical to an organization.
Computer Security Threats
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Onsite CRM Security
What Is Enterprise Computing?
Understanding The Cloud
Discovering Computers 2010: Living in a Digital World Chapter 14
7.00 Understand marketing and business management.
CHAPTER 4 Information Security.
7.00 Understand marketing and business management.
7.00 Understand marketing and business management
Unit 11 Task #1 Read the unit specification and create a glossary which defines each of the words / terms you don’t know.
7.00 Understand marketing and business management.
Business Contingency Planning
Technical Considerations for SIP Trunking
COMPANY NAME Business Continuity Plan Date Presented by.
Presentation transcript:

Disaster Recovery, Business Continuity, and the Cloud January 2014 Joel Maloff Vice President – Channel Development

Overview Disaster Recovery and Business Continuity – What’s the Difference? Key Questions for DR/BC Planning How does cloud communications help? 2

Disasters

 What other events can compromise a business?  Sabotage  Industrial Espionage  Theft  Unintentional Incompetence  Intellectual Property contamination  Communications disruption

What is the nature or mission of the business that we are seeking to protect? – Military – Electronic Commerce – Healthcare – Manufacturing – Communications Carrier – Legal – Transportation – Nonprofit organizations – Other Requirements for each vertical industry can differ dramatically, including industry and government regulations. Key Questions for DR Planning

What are the critical systems and resources that are required to continue operating our business? – Software – Hardware – Data networks – Written documentation – Media storage – People – Communications – Physical facilities – Raw materials Key Questions for DR Planning

How could each of these critical systems and resources possibly be disrupted? – Computer viruses, worms, Trojan Horses – Intentional sabotage – Unintentional interruption – Fire, flood, earthquake, tornado, blizzard – Theft – Physical intrusion or attack – Network assault (DDOS, et al) – Supply chain disruption Key Questions for DR Planning

Who is responsible for ensuring the integrity and continuity of these business systems and resources? – Top executives Commanders CEO COO CFO CIO – Line executives Human resources and personnel Sales and Marketing Operations Manufacturing Engineering Information Systems – Managers – Employees Key Questions for DR Planning

Disaster Recovery Planning Team Emergency Response Team Key Questions for DR Planning

How does Cloud Communications Help? The premises-based PBX is a single point of failure. – Cloud-based communications delivers inherent redundancy. Traditional communications systems are geographically rooted. – Multi-location organizations may have separate communications systems. – The cloud provides “virtual identity” and easy failover 10

How does Cloud Communications Help? What is DRaas? – Not all DRaaS providers include voice and/or video communication What are our legal and regulatory obligations in the case of an “event?” 11

Conclusions Disaster Recovery and Business Continuity planning is only effective BEFORE an event. The cloud offers a variety of tools to help maintain continuity of business regardless of the event. 12

Joel Maloff