DriveSavers and the Shared Assessments Program Helping Set New Standards for the Data Recovery Industry Presented by: Lynda C. Martel, Director, Privacy.

Slides:



Advertisements
Similar presentations
Fast Reliable Certified Secure Data Recovery Does Your Enterprise Have A Security Gap ? HDI Sacramento Chapter August 16th, 2011.
Advertisements

Business Continuity Training & Awareness by Sulia Toutai (ANZ)
1 Vendor Evaluation: Selecting for Success Dana McCormick Wells Fargo Home Mortgage Delivery Services Baltimore PCC Education Seminar April 27, 2007.
Grow Your Business through Contact Centre Outsourcing Fanny Vaz Director, Personal Market Unit, CTM.
Copyright 2004 Turning Point Solutions Establishing Lines Of Communication Before a Crisis.
Peter Brudenall & Caroline Evans- Simmons & Simmons Marsh Technology Conference 2005 Zurich, Switzerland. Managing the Security Landscape – Legal and Risk.
Security Controls – What Works
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
Outsourcing Policy & Procedures An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
WORKING WITH THIRD- PARTY VENDORS AND STRATEGIC PARTNERS Pharmaceutical Regulatory and Compliance Congress October Washington, D.C. David Davidovic,
Making the Most of Your ADMA Membership The Benefits of ADMA Membership.
Internal Auditing and Outsourcing
Auditing Cloud Computing: Adapting to Changes in Data Management IIA and ISACA Joint Meeting March 12, 2013 Presented by: Jay Hoffman (AEP), John Didlott.
Partnering with Industry Navigating Corporate and Startup Research Contracts Bethany Wuensch Director, Grant Services
Information Asset Classification
Copyright 2005 Welcome to The Great Lakes TL 9000 SIG TL 9000 Requirements Release 3.0 to Release 4.0 Differences Bob Clancy Vice President, BIZPHYX,
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
Seán Paul McGurk National Cybersecurity and Communications
Applied Technology Services, Inc. Your Partner in Technology Applied Technology Services, Inc. Your Partner in Technology.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
Sandra C Security Advisor Energy Dan B Security Advisor Water
The Third Annual Medical Device Regulatory, Reimbursement and Compliance Congress How to establish a Compliance Program that will Minimize the Impact of.
Privacy and Security Risks to Rural Hospitals John Hoyt, Partner December 6, 2013.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Appendix C: Designing an Operations Framework to Manage Security.
Audit Planning Process
5/18/2006 Department of Technology Services Security Architecture.
Shared Assessment Committees Update ©2012 The Shared Assessments Program. All Rights Reserved.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Cloud security
Cybersecurity Risk, Remediation, Response Nathan Gibson, CCE, CEH.
IT Summit November 4th, 2009 Presented by: IT Internal Audit Team Leroy Amos Sue Ann Lipinski Suzanne Lopez Janice Shelton.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
Albany Bank Corporation Security Incident Management Program.
Protecting your Managed Services Practice: Are you at Risk?
SAFE Association UNIQUELY FOCUSED IN A CRITICAL DISCIPLINE ORIGINALLY FOUNDED IN 1956 AS SPACE AND FLIGHT EQUIPMENT ASSOCIATION, SAFE ASSOCIATION IS AN.
Security – 2015’s Biggest Threat to Client Confidentiality A Panel Discussion Joseph Abrenio, VP of Cyber Advisory Services & General Counsel Delta Risk.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
A Shared Commitment to Digital Preservation and Access.
Three Lines of Defense and Business Continuity February 18, 2016.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Cyber Insurance Risk Transfer Alternatives
The Benefits of ADMA Membership
UNIQUELY FOCUSED IN A CRITICAL DISCIPLINE
Internal Process & Due Diligence
JU September Stakeholder Engagement Conference Webinar #1
Information Destruction; 2017 and beyond!
Current ‘Hot Topics’ in Information Security Governance Auditing
IS4680 Security Auditing for Compliance
Alabede, Collura, Walden, Zimmerman
Berry College Disaster Recovery Soft Exit
I have many checklists: how do I get started with cyber security?
The Benefits of ADMA Membership
Audit Planning Presentation - Disaster Recovery Plan
Security Awareness Training: System Owners
General Counsel and Chief Privacy Officer
Current Privacy Issues That May Affect Your Credit Union
Cybersecurity compliance for attorneys
Shared Assessment Committees Update
IFTA, INC. STRATEGIC PLAN
Industry Committee – Recently Completed
Managing your Social Media Presence
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Goddard Chamber September 12th, 2019 Hosts: John Ash & Jon Grover
Presentation transcript:

DriveSavers and the Shared Assessments Program Helping Set New Standards for the Data Recovery Industry Presented by: Lynda C. Martel, Director, Privacy Compliance Comm DriveSavers Data Recovery, Inc.

SA Partner Case Study: DriveSavers Data Recovery  Why DriveSavers Joined the Shared Assessments Program  The Value of the SIG Tool  The Value of the Partnership

SA Partner Case Study: DriveSavers Data Recovery  Why DriveSavers Joined the Shared Assessments Program  Symbiotic Missions – Create Industry Standards and Guidelines

The Data Recovery Industry: AKA “The Wild, Wild West”

DriveSavers — Recovering Critical Data Since 1985

No Recovery Standards No Security Guidelines

Critical Data At Risk Resource: Ponemon Institute Study “Trends in Security of Data Recovery Operations

IT Support Choosing Data Recovery Vendors

IT Security Not Involved In Selection/Vetting Process

Data Breaches At Recovery Companies Are Increasing

Lack of Risk Assessments Part of the Problem Resource: Ponemon Institute Study “Trends in Security of Data Recovery Operations

SA Partner Case Study: DriveSavers Data Recovery  The Value of the SIG Tool  Specific Vetting Language

“Organizations may use third-party vendors to recover data……should consider the security risk….and ensure that proper security vetting of the service provider be conducted before turning over equipment.” Source: Contingency Planning Guide for Federal Information Systems, Section 5.1.3: Protection of Resources NIST SP (Rev.1)

SIG Tool (V6) Updated October 2010 “Do third party vendors have access to Scoped Systems and Data? (backup vendors, service providers, equipment support maintenance, software maintenance vendors, data recovery vendors, etc)? If so, is there: Security review prior to engaging their services (logical, physical, other corporate controls) Security review at least annually, on an ongoing basis Risk assessments or review Confidentiality and/or Non Disclosure Agreement requirements Requirement to notify of changes that might affect services rendered” Source: SIG V6 - Question G4

SA Partner Case Study: DriveSavers Data Recovery  The Value of the Partnership  Education and Awareness Opportunities  Networking Benefits  Influencing the Influencers

Opportunities To Educate Shared Assessments Members

Opportunities to Support Important New Initiatives

Opportunities to Exhibit Our Capabilities

SA Partner Case Study: DriveSavers Data Recovery  Shared Missions  SIG Tool Streamlines Our Vetting Requests  SIG Tool Reminds Companies to Vet Data Recovery Vendors  SA Membership Generated Valued Business Relationships  Opportunities to Support Important New Initiatives  Opportunities to Exhibit our Capabilities and Share our Message

Not All Data Recovery Companies are Created Equal

SA Partner Case Study: DriveSavers Data Recovery THANK YOU!