From Implementation to Testing: Information Technology Disaster Recovery Planning for Universities Cheryl Barkby and Ed Gregory Information Services DePaul.

Slides:



Advertisements
Similar presentations
Cyber Security Haunted House: Creating a New Approach to Reach Students Kenneth Janz Director, Center for Instruction, Research, and Technology Indiana.
Advertisements

Glenn Johnson John A. Dutton e-Education Institute Project Manager, Penn States e-Portfolio Initiative Glenn Johnson John A. Dutton e-Education Institute.
Information Technology Disaster Recovery Awareness Program.
Copyright Kathy J. Lang and Ed Mahon, This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Business Continuity Planning: Moving BEYOND Disaster Recovery Planning Cheryl Barkby and Ed Gregory Information Services-Business Continuity and Security.
“Build It and They Will Come," But Will They? A Poster Presentation by Abdul Shibli Harvard Graduate School of Education Cambridge, Massachusetts
A multi-tiered storage and data protection strategy Carl Follstad Manager, University Data Mgmt Services Office of Information Technology University of.
What Does the Net Generation Expect From Us? SAC August 8, 2005 SAC August 8, 2005 Copyright © 2005, Joel L. Hartman. This work is the intellectual property.
Southeast Regional Educause Conference, June 6, 2005 The Learning, Teaching and Innovative Technologies Center (LT&ITC): A Partnership to Support Faculty.
Copyright Copyright Timothy F. Brown, This work is the intellectual property of the author. Permission is granted for this material to be shared.
Making Sense out of the Information Security and Privacy Alphabet Soup in terms of Data Access A pragmatic, collaborative approach to promulgating campus-wide.
Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
© Copyright Computer Lab Solutions All rights reserved. Do you need usage information about your computer labs? Copyright Computer Lab Solutions.
Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring. Copyright © T3 Software Builders, Inc 2004.
The Academic Computing Assessment Data Repository: A New (Free) Tool for Program Assessment Heather Stewart, Director, Institute for Technology Development,
Web Application Management Moving Beyond CMS Douglas Clark Director, Web Applications Copyright Douglas Clark 2003 This work is the intellectual property.
A Web-based Bibliography Management Initiative: Collaborating for Classroom and Library Technology Integration Brian Nielsen, Academic Technologies Denise.
Business Continuity Planning at CSULB Business Continuity Services California State University, Long Beach CSULB, 2008.
Disaster Recovery Planning Because It’s Time! Copyright Columbia University and Bentley College, This work is the intellectual property of the author.
The EduPop Project Copyright Hubert Daugherty and Julie Cohn, The Center for Technology in Teaching and Learning at Rice University, February, This.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Brief Introduction: Business Continuity Business Continuity Services California State University, Long Beach CSULB, 2008.
Seeing the Forest and the Acorns in the Decision Tree Sandy Burke Computing Center HelpDesk Manager Copyright Sandy Burke, This work is the intellectual.
Pace University Rebounding from the World Trade Center Disaster Copyright Barbara Cunningham, This work is the intellectual property of the author.
Copyright Jill M. Forrester This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Educause Security 2007ISC Information Security Copyright Joshua Beeman, This work is the intellectual property of the author. Permission is granted.
Virtualization Across The Enterprise Rob Lowden Director, Enterprise Infrastructure Indiana University 23 May 2007.
UWM CIO Office A Collaborative Process for IT Training and Development Copyright UW-Milwaukee, This work is the intellectual property of the author.
Pam Downs Ajay Gupta The Pennsylvania Prince George’s State University Community College "Copyright Penn State University This work is the intellectual.
IT Strategic Planning From Technical Dreams to Institutional Reality
Providing and Managing Technology Training Providing & Managing Technology Training Susan McKibben The University of Akron.
NLII Mapping the Learning Space New Orleans, LA Colleen Carmean NLII Fellow Information Technology Director, ASU West Editor, MERLOT Faculty Development.
Unraveling Web Development PRESENTERS: Bob Nakles and Paras Kaul, George Mason University.
Moving Out of The Shadows: Shining a Light on Data David Rotman Director of Computer Services Mark Mazelin Web Development Coordinator Copyright David.
Risk Assessment 101 Kelley Bradder VP and CIO Simpson College.
So You Want to Switch Course Management Systems? We Have! Come Find Out What We’ve Learned. Copyright University of Okahoma This work is the intellectual.
Information Security Governance in Higher Education Policy2004 The EDUCAUSE Policy Conference Gordon Wishon EDUCAUSE/Internet 2 Security Task Force This.
Funding Strategic Initiatives in Academic Technology A Process for Identifying, Cataloging, and Categorizing IT Needs Campuswide Copyright© D. Tebbetts,
Intellectual Property Protocol and Assessment for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Copyright Statement Copyright William F. Hogue, This work is the intellectual property of the author. Permission is granted for this material to.
Classroom Technologies Re-organization Copyright Kathy Bohnstedt, This work is the intellectual property of the author. Permission is granted for.
Washington and Lee University Lexington, Virginia EDUCAUSE 2002 "Juggling Opportunities in Collaborative Environments" October 1 ‑ 4, Atlanta, Georgia.
Copyright The Board of Regents of the University of Wisconsin System This work is the intellectual property of the author. Permission is granted.
Incorporating IT Standards into the Planning Process: A Collaborative Model Information Technology Systems Division Copyright Beverly Vagnerini and Bobby.
Managing Intellectual Property for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the University System.
NERCOMP 2002 Networks, Town and Gown: Collaborating with the Community Pat Cronin & Bill Davis Bridgewater State College Bridgewater, Massachusetts Copyright.
Rethinking Campus and Classroom Design William J. Mitchell NLII 2004 September 9, 2004 Copyright William Mitchell, This work is the intellectual.
Center for Planning and Information Technology T HE C ATHOLIC U NIVERSITY of A MERICA Bringing IT All Back Home Centralized Systems in a Decentralized.
Copyright [Dr. Michael Hoadley, Chat Chatterji, and John Henderson ] [2004]. This work is the intellectual property of the authors. Permission is granted.
Getting Everyone "On Board" for a Major IT Project Presentation to CUMREC MAY 16, 2002 Warren Mills, CEO Copyright Advantiv, Inc This work is the.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Copyright James Kulich This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Copyright Michael White and Sylvia Maxwell, This work is the intellectual property of the author. Permission is granted for this material to be shared.
AUDITING BUSINESS CONTINUITY PROGRAMS AND PLANS What to Look For Presented by: Tommye White, CBCP, DRP Chuck Walts, CBCP, CRP.
Business Continuity Steven S. Keleman, CPM. Emergency Management Prevention Response Preparation Mitigation Recovery.
Jill Forrester and David Kelly| October 20, 2011
Julian Hooker Assistant Managing Director Educause Southwest
Educause/Internet 2 Computer and Network Security Task Force
Defining an IT Workflow, from Request to Support
Berry College Disaster Recovery Soft Exit
Blaine A. Brownell, President,
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
© Mike Reese This work is the intellectual property of the author
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
EDUCAUSE Networking 2002 Washington, D.C. April 17, 2002
Bad News Messages: How Much and How Often?
Presentation transcript:

From Implementation to Testing: Information Technology Disaster Recovery Planning for Universities Cheryl Barkby and Ed Gregory Information Services DePaul University Copyright Ed Gregory, Cheryl Barkby, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Today’s Agenda Background information Overview of DePaul’s Information Technology(IT) Disaster Recovery Plan Selecting a hotsite vendor How to secure funding Importance of exercising/testing DePaul University’s response to September 11th

Importance of Disaster Recovery Disaster Recovery Journal has reported:  “94% of companies that experience a catastrophic data loss go out of business within two years.” Source: Yatish Mishra, “Can Your Company be Liable for not Implementing DR Plans?”, Disaster Recovery Journal, Summer  “97% of respondents reported that their specific plans needed to be altered in light of the new realities of Sept. 11 attacks, and about half of those said that the needed alterations had to be complete or significant.” Source: Robert Chandler, Ph.D., J.D. Wallace, Ph.D., “What Disaster Recovery Experts Were Thinking Just After the Attacks”, Pgs , Disaster Recovery Journal, Winter 2002.

DePaul University: Who we are Founded in 1898 Largest Catholic university in the U.S. 8 th largest private university in the U.S. Over 23,000 students Over 4,000 faculty and staff Total of seven campuses: two within the city of Chicago, five in the surrounding suburbs

Overall Map of DePaul

Map of Downtown Campus

Previous disaster recovery efforts were minimal Original plan designed for mainframe operations Plan then updated for Y2K compliance  Contracted for hotsite  No exercising/testing was planned or done

IT Plan Review for New System In August of 2001, review was necessary due to the university’s transition from a mainframe computer system to PeopleSoft. Events of September 11, 2001 forced further scrutiny. Steps necessary to update plan  Revise DRP team  Produced walllet-sized cards  Verify mission critical business applications  Update processes and procedures  Perform data, hardware, and software inventory

IT Disaster Recovery Planning Process

Selecting a HotSite Vendor DePaul analysis  Analyzed three hotsite vendors, including current provider.  Selection criteria Number of sites available Distance from site Equipment Cost Contract  Selected SunGard as sole vendor

Securing Funding DePaul’s method for securing funding  Received executive support  Created proposals detailing: Hot-site services Emergency communication tools Off-site storage Back-up web presence Back-up Internet connection Suggestions for acquiring executive support  Scare the executives  Stakeholder support  Solid proposal: Cost of not having recovery plan Possible disaster scenarios Keep it simple

Exercising/Testing Preparation for exercise Review of exercise for IT mission critical systems Exercise outcomes  Problems identified  Software and hardware changes  Updated procedures Demonstrated need for additional funding Post-exercise meeting

Overall University Response to September 11 Chaotic response/evacuation on September 11 th Further response to events:  Performed external audit of disaster recovery plans for key areas. Discovered numerous areas that lacked a plan or required major updating. Overall guidance and cross-divisional collaboration were not in place.  Began updating university-wide disaster recovery plans including: Communication processes ( , back-up phone system, pagers) Evacuation and emergency procedures Began to develop a comprehensive university plan.

Overall Timeline

Final Recommendations Testing/Exercising is key: IT, evacuation, communications Collaboration with other university departments, especially business units Perform Business Impact Analysis (BIA) Analyze all hotsite options: outsourcing, internal, mobile Obtain certification Make use of consultants/experts Network with other universities about their experiences

Vendor and Website Information Vendors:  Strohl Systems, Contact: Matt Ott,  SunGard,  Iron Mountain, Useful Websites:  Disaster Recovery International Institute:  Disaster Recovery Journal:  Contingency Planning Management:  Continuity Insights:

Contact Information Ed Gregory  Manager of Data Center, Information Services   Cheryl Barkby  DRP Analyst, Information Services   Questions?