What is Next-Generation Disaster Recovery and Service Availability? Why do We Need it? Dan Smith Senior Manager, Solution Consulting and Engineering, GTSI.

Slides:



Advertisements
Similar presentations
IT Service Continuity Management
Advertisements

FMS. 2 Fires Terrorism Internal Sabotage Natural Disasters System Failures Power Outages Pandemic Influenza COOP/ Disaster Recovery/ Emergency Preparedness.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
Topic Outline — Information security? — Security Why? — Security approach — Vocabulary — The weakest link — Real life security sample.
BCP/DRP Consultancy Project- An approach
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Oracle Data Guard Ensuring Disaster Recovery for Enterprise Data
Security Controls – What Works
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
2003 Indigo Technology, Inc. All Rights Reserved Alliance Portfolio Computing Infrastructure Services Customer Relationship Management Engineering Services.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Factors to be taken into account when designing ICT Security Policies
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Stephen S. Yau CSE , Fall Security Strategies.
Saving Your Business from a Data Loss Randy Clark.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
IT Assurance and Reliability Why Should You Care? Richard Oppenheim, CPA, CITP President, SysTrust Services Corporation Presented to ISACA Regional Meeting.
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Evolving IT Framework Standards (Compliance and IT)
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
City of Seattle Office of the City Clerk Open Government = Access Challenges and Opportunities with Digital Records.
Bring Consolidation Into Focus The Value of Compaq AlphaServer and Storage Consolidation Solutions Joseph Batista Director Enterprise & Internet Initiatives.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
David N. Wozei Systems Administrator, IT Auditor.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
E-Data Experts, Inc. An Introduction. 2 Agenda Introductions Introductions The Company Overview The Company Overview Our Services Portfolio Our Services.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Information Systems Security Operational Control for Information Security.
UnitedLayer Managed Private Cloud Saad Saleem Director of Customer Engineering.
Secure Connections for a Smarter World Dr. Shuyuan Mary Ho Assistant Professor School of Information Florida State University.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
1 Operations Objectives April 21, Q
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Engineering e-Business Applications for Security DISCUSSANT GERALD TRITES, FCA, CA*IT/CISA.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
State of New Jersey IT Consolidation Charles S. Dawson CTO/CIO.
Accounting and Information Systems: a powerful combination.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
The NIST Special Publications for Security Management By: Waylon Coulter.
A Lightweight Business Continuity & Disaster Recovery Plan Motahareh Moravej Issuers’ Affairs Director at CSDI PHD. Student of Computer Engineering, UT.
Welcome to the ICT Department Unit 3_5 Security Policies.
Information Systems Security
Risk management.
DISASTER RECOVERY INSTITUTE INTERNATIONAL
CCNET Managed Services
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
IT Services Portfolio Todd Endicott – Senior Network and System Engineer Mary Monroe – Implementation Engineer.
Enterprise Systems Management – ESM821S
Workgroup Technology Partners
Cisco’s Intelligent Automation for Cloud
Across the entire value chain
Introduction to Databases Transparencies
Cyber Security Best Practices
Increase and Improve your PC management with Windows Intune
Cyber Security Best Practices
Cybersecurity Threat Assessment
Capitalize on Your Business’s Technology
IT Management Services Infrastructure Services
Presentation transcript:

What is Next-Generation Disaster Recovery and Service Availability? Why do We Need it? Dan Smith Senior Manager, Solution Consulting and Engineering, GTSI

Why Focus on Disaster Recovery? Continued Threat of Disasters Environmental (Floods, Fires, Power) System failure (Hardware, Software) Man-made Accidental (user error) Deliberate (hacker, disgruntled employee) Increased Enterprise Reliance on IT Automated business processes Technology-based communications Increased user expectations Shorter inter-organizational SLAs S.F. officials locked out of computer network July 15, 2008, San Francisco Chronicle Midwest flooding could push prices of food higher June 11, 2008, USA Today Cost of fire damage to crest $2 billion, institute estimates October 30, 2007, San Diego Union Tribune

The Disaster Recovery Planning Lifecycle Must be viewed as a continual process  Ensure training levels are sufficient  Perform rigorous full- scale exercise of the plan  Iteratively integrate feedback from the business AnalysisDevelopment Solution Implementation Awareness & Training Exercise & Maintenance Continual Improvement

Today’s Disaster Recovery Solution DR Planning Focused on recovery Focused on data protection High dependencies on unpredictable assets Based on documentation and manual processes Service Availability Planning Focused on continuous availability Focused on data utilization High dependencies on predictable assets Based on live configurations and process automation

Looking Forward into Continuous Service Availability Assess DR/COOP at the IT service catalog layer What services are you offering, and how do your customers use those services? How can those services be made to sustain and exceed SLAs? Build appropriate resiliency into the infrastructure Make the infrastructure “location independent” to offset environmental threats Implement automated responses to threats to replace manual recovery tasks Build logic and intelligence into applications Ensure the application self-optimizes availability to best serve its users Integrate security to support multiple locations and user access methods without service interruption Build redundancy and availability into data Ensure the right data is available at the right time for the right users Map application and data dependencies for consistent and predictable availability