Download presentation
Presentation is loading. Please wait.
Published byArchibald Stanley Modified over 9 years ago
1
IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer
2
Presenters The Panel: Scott Pelletier, Lewan Technology, CTO Rob McClary, SVP & GM, FORTRUST Dan McCarter, Manager, Agility Recovery Conor Overstake, Assistant VP, Woodruff-Sawyer Moderator: Rick Cranston, Director of Business & Product Development Mountain West Credit Union Association
3
IT Risk Considerations Network Security Data Protection Geographic Protection Employee Productivity Physical Security Compliance Insurance Protection
4
Risk Mitigation Techniques Risk Acceptance Risk Avoidance Risk Limitation Risk Transference
5
WHAT ARE RTOs and RPOs? RTO/RPO (these should be vetted with business leadership) Recovery Time Objective – maximum time to bring a system back online before severe business impact occurs Recovery Point Objective – the amount of data loss a business process/application can sustain before severe business impact occurs Ask business questions that yield technology answers
6
What’s Your Overall IT Risk Reduction Considerations Information / Infrastructure Security Physical, Social and Technical Who in your organization is responsible for security? Do you have written security policies and procedures? Do you follow them? How often are they reviewed? How do you train your employees on your security procedures? When was the last time you had a security penetration or DR test? Do you take security seriously? Data Protection Strategies Real-time Point-in-time Long time Geographic
7
Hazards NATURAL HAZARDS Meteorological Geological Biological HUMAN-CAUSED HAZARDS Accidents Intentional Acts TECHNOLOGICAL HAZARDS Information Technology Utility Outage Fire/Explosion Hazardous Materials Supply Chain Interruption
8
How many eggs in how many baskets Office Assets: Office Space Employees Edge network Wireless Desktop Computers Phones Printers Files (paper or electronic) Internet* WAN Circuits* Power* Cooling* Data Center IT Assets: Space for computer room Servers Storage Backup System Core Network Firewalls Phone System Internet* WAN Circuits* Power* Cooling* *Could be in one or both categories Main Office Branch Offices
9
How many eggs in how many baskets Office Assets: Office Space Employees Edge network Wireless Desktop Computers Phones Printers Files (paper or electronic) Internet* WAN Circuits* Power* Cooling* Data Center IT Assets: Space for computer room Servers Storage Backup System Core Network Firewalls Phone System Internet* WAN Circuits* Power* Cooling* *Could be in one or both categories Main Office Branch Offices
10
Move or Replicate IT Assets to a More Secure Environment Office Assets: Office Space Employees Edge network Wireless Desktop Computers Phones Printers Files (paper or electronic) Internet* WAN Circuits* Power* Cooling* Main Office Branch Offices Data Center IT Assets: Space for computer room Servers Storage Backup System Core Network Firewalls Phone System Internet* WAN Circuits* Power* Cooling*
11
Enable Mobile Workforce Strategy Office Assets: Office Space Employees Edge network Wireless Desktop Computers Phones Printers Files (paper or electronic) Internet* WAN Circuits* Power* Cooling* Main Office Branch Offices Data Center IT Assets: Space for computer room Servers Storage Backup System Core Network Firewalls Phone System Internet* WAN Circuits* Power* Cooling*
12
Obtain Mobile Office Space with Needed Assets Main Office Data Center IT Assets: Space for computer room Servers Storage Backup System Core Network Firewalls Phone System Internet* WAN Circuits* Power* Cooling* Office Assets: Office Space Employees Edge network Wireless Desktop Computers Phones Printers Files (paper or electronic) Internet* WAN Circuits* Power* Cooling*
13
Obtain Mobile Office Space with Needed Assets Main Office Data Center IT Assets: Space for computer room Servers Storage Backup System Core Network Firewalls Phone System Internet* WAN Circuits* Power* Cooling* Office Assets: Office Space Employees Edge network Wireless Desktop Computers Phones Printers Files (paper or electronic) Internet* WAN Circuits* Power* Cooling* Protect Against Financial and Property Loss as well
15
Data loss, breach, disasters are expensive
16
Common Insurance Gaps
17
How Can We Help Planning People, Process and Technology http://www.ready.gov/business Backup & Recovery Solutions Disaster Recovery Solutions IaaS / Data Center Services Managed Services Mobility Solutions Mobile Office Solutions Insurance Protection Solutions
18
DR TOOLS vs. BCP Disaster Recovery Tools Processes that allow a business to protect data and resume business critical applications Designed to protect from localized failures Business Continuity Planning (BCP) Procedures that enable business processes to resume beyond the technology People, Process, Procedure and Communications
19
Backup Solutions Backup/Data Protection Solutions Key weaknesses of traditional backup solutions: Usually have 24hr RPOs (hourly at best), RTOs in hours at best (if disk based) Very limited DR orchestration/automation, especially for bulk operations Normally require recovery to similar HW at DR site No failback mechanism (when production systems are back online)
20
Managed and/or Outsourced Services to Mitigate Risk Outsourcing some services can help to transfer risk and/or provide policy, standards and tools to help avoid or limit risk. Managed Security Services Internet / Private Line Disaster Recovery IT Infrastructure Applications Infrastructure Monitoring / Management Hosted Email / Collaboration Managed Data Protection Managed Print Services Cloud Infrastructure Servers Storage Core Network Server Virtualization CoLo End-user Service Desk Tier 3 Data Centers
21
Employee Productivity Protection 4 key Elements of Protecting Employee Productivity 1. Office Space: Mobile or Brick & Mortar 2. Power: Generators & Fuel 3. Communications: Telephone and Internet Connectivity, Employee Communication Plan 4. Computer Systems: Computers, servers, printers, fax
22
Agility Membership Benefits Membership Features Immediate Protection Access to Member Services Online Planning Tool Monitoring of Risks & Threats: eAlerts Ongoing Education Programs: Weekly Tips Educational Webinars Testing
23
Business Continuity Planner to help guide members step by step Comprehensive Business Continuity Plan Template Alert Notification Tool Document Management Storage Tool Planning and Execution
24
Insurance Gaps What are the elements and what’s commonly missed Error and Omissions Privacy Network Security Media Infringement
25
Q&A / Panel Discussion
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.