Presentation is loading. Please wait.

Presentation is loading. Please wait.

IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer.

Similar presentations


Presentation on theme: "IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer."— Presentation transcript:

1 IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

2 Presenters The Panel: Scott Pelletier, Lewan Technology, CTO Rob McClary, SVP & GM, FORTRUST Dan McCarter, Manager, Agility Recovery Conor Overstake, Assistant VP, Woodruff-Sawyer Moderator: Rick Cranston, Director of Business & Product Development Mountain West Credit Union Association

3 IT Risk Considerations Network Security Data Protection Geographic Protection Employee Productivity Physical Security Compliance Insurance Protection

4 Risk Mitigation Techniques  Risk Acceptance  Risk Avoidance  Risk Limitation  Risk Transference

5 WHAT ARE RTOs and RPOs? RTO/RPO (these should be vetted with business leadership) Recovery Time Objective – maximum time to bring a system back online before severe business impact occurs Recovery Point Objective – the amount of data loss a business process/application can sustain before severe business impact occurs Ask business questions that yield technology answers

6 What’s Your Overall IT Risk Reduction Considerations  Information / Infrastructure Security  Physical, Social and Technical  Who in your organization is responsible for security?  Do you have written security policies and procedures?  Do you follow them?  How often are they reviewed?  How do you train your employees on your security procedures?  When was the last time you had a security penetration or DR test?  Do you take security seriously?  Data Protection Strategies  Real-time  Point-in-time  Long time  Geographic

7 Hazards  NATURAL HAZARDS Meteorological Geological Biological  HUMAN-CAUSED HAZARDS Accidents Intentional Acts  TECHNOLOGICAL HAZARDS Information Technology Utility Outage Fire/Explosion Hazardous Materials Supply Chain Interruption

8 How many eggs in how many baskets Office Assets: Office Space Employees Edge network Wireless Desktop Computers Phones Printers Files (paper or electronic) Internet* WAN Circuits* Power* Cooling* Data Center IT Assets: Space for computer room Servers Storage Backup System Core Network Firewalls Phone System Internet* WAN Circuits* Power* Cooling* *Could be in one or both categories Main Office Branch Offices

9 How many eggs in how many baskets Office Assets: Office Space Employees Edge network Wireless Desktop Computers Phones Printers Files (paper or electronic) Internet* WAN Circuits* Power* Cooling* Data Center IT Assets: Space for computer room Servers Storage Backup System Core Network Firewalls Phone System Internet* WAN Circuits* Power* Cooling* *Could be in one or both categories Main Office Branch Offices

10 Move or Replicate IT Assets to a More Secure Environment Office Assets: Office Space Employees Edge network Wireless Desktop Computers Phones Printers Files (paper or electronic) Internet* WAN Circuits* Power* Cooling* Main Office Branch Offices Data Center IT Assets: Space for computer room Servers Storage Backup System Core Network Firewalls Phone System Internet* WAN Circuits* Power* Cooling*

11 Enable Mobile Workforce Strategy Office Assets: Office Space Employees Edge network Wireless Desktop Computers Phones Printers Files (paper or electronic) Internet* WAN Circuits* Power* Cooling* Main Office Branch Offices Data Center IT Assets: Space for computer room Servers Storage Backup System Core Network Firewalls Phone System Internet* WAN Circuits* Power* Cooling*

12 Obtain Mobile Office Space with Needed Assets Main Office Data Center IT Assets: Space for computer room Servers Storage Backup System Core Network Firewalls Phone System Internet* WAN Circuits* Power* Cooling* Office Assets: Office Space Employees Edge network Wireless Desktop Computers Phones Printers Files (paper or electronic) Internet* WAN Circuits* Power* Cooling*

13 Obtain Mobile Office Space with Needed Assets Main Office Data Center IT Assets: Space for computer room Servers Storage Backup System Core Network Firewalls Phone System Internet* WAN Circuits* Power* Cooling* Office Assets: Office Space Employees Edge network Wireless Desktop Computers Phones Printers Files (paper or electronic) Internet* WAN Circuits* Power* Cooling* Protect Against Financial and Property Loss as well

14

15 Data loss, breach, disasters are expensive

16 Common Insurance Gaps

17 How Can We Help  Planning People, Process and Technology http://www.ready.gov/business  Backup & Recovery Solutions  Disaster Recovery Solutions  IaaS / Data Center Services  Managed Services  Mobility Solutions  Mobile Office Solutions  Insurance Protection Solutions

18 DR TOOLS vs. BCP Disaster Recovery Tools Processes that allow a business to protect data and resume business critical applications Designed to protect from localized failures Business Continuity Planning (BCP) Procedures that enable business processes to resume beyond the technology People, Process, Procedure and Communications

19 Backup Solutions Backup/Data Protection Solutions Key weaknesses of traditional backup solutions: Usually have 24hr RPOs (hourly at best), RTOs in hours at best (if disk based) Very limited DR orchestration/automation, especially for bulk operations Normally require recovery to similar HW at DR site No failback mechanism (when production systems are back online)

20 Managed and/or Outsourced Services to Mitigate Risk Outsourcing some services can help to transfer risk and/or provide policy, standards and tools to help avoid or limit risk. Managed Security Services Internet / Private Line Disaster Recovery IT Infrastructure Applications Infrastructure Monitoring / Management Hosted Email / Collaboration Managed Data Protection Managed Print Services Cloud Infrastructure Servers Storage Core Network Server Virtualization CoLo End-user Service Desk Tier 3 Data Centers

21 Employee Productivity Protection 4 key Elements of Protecting Employee Productivity 1. Office Space: Mobile or Brick & Mortar 2. Power: Generators & Fuel 3. Communications: Telephone and Internet Connectivity, Employee Communication Plan 4. Computer Systems: Computers, servers, printers, fax

22 Agility Membership Benefits Membership Features Immediate Protection Access to Member Services Online Planning Tool Monitoring of Risks & Threats: eAlerts Ongoing Education Programs: Weekly Tips Educational Webinars Testing

23 Business Continuity Planner to help guide members step by step Comprehensive Business Continuity Plan Template Alert Notification Tool Document Management Storage Tool Planning and Execution

24 Insurance Gaps What are the elements and what’s commonly missed Error and Omissions Privacy Network Security Media Infringement

25 Q&A / Panel Discussion


Download ppt "IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer."

Similar presentations


Ads by Google