Security, Continuity & Compliance Gordon McKenzie Business Development Director, Syan Limited.

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Driving change in information risk within the financial services industry Subtitle Date.
IAPP CONFIDENTIAL Insider Leakage Threatens Privacy.
In Harmony, In the Cloud: Harmonizing Data Protection Rules In a Cross-Border World Steve Mutkoski Worldwide Director Policy Microsoft Corporation.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
Forces of Change Don H. Hansen Health Care Services Partner
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
© The McGraw-Hill Companies, Inc., 2008 McGraw-Hill/Irwin Chapter 14 Regulating the Financial System.
Managing Risk Minimising Insurance Risks –Legal requirements –Premises –Equipment –Employees –Theft and fraud –Transport –Insuring the risks Risk Management.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
SOX & ISO Protect your data and be ready to be audited!!!
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
MICROSOFT AZURE ISV PROFILE: BUYING BUTLER LTD Our free concierge buying service makes complex purchases easy. Our first category is cars: We help consumers.
INSURANCE How it works… Why YOU need it…. ALL ABOUT RISK The chance of financial loss from some type of danger RISK MANAGEMENT AVOID THE RISK – Don’t.
Overview of Cybercrime
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Evolving IT Framework Standards (Compliance and IT)
Do you Know Where your Data is? Gregory P. Silberman, CISSP Technology Intellectual Property & Outsourcing Group Kaye Scholer LLP May 10, 2005.
What’s in it for Me?. Recognition Program The Recognition Program requires extra work on the part of a Department. Why do we need to do it???
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
GRC - Governance, Risk MANAGEMENT, and Compliance
STORAGE MANAGEMENT/ EXECUTIVE: Managing a Compliant Infrastructure Processes and Procedures Mike Casey Principal Analyst Contoural Inc.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Outsourcing Opportunity: “Strategic and Operational Level” H. Srikrishnan Executive Director January 31, 2006.
2 - 1 Introduction to US Health Care HS230 Health Care Administration Unit 2: Health Care Professionals Chapter 2 & Chapter 5 Kaplan University Kathy L.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
1 © 2012 John Wiley & Sons, Ltd, Accounting for Managers, 4th edition, Chapter 2 Accounting and its Relationship to Shareholder Value and.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Records Management Benchmarking: Choosing a Standard Presentation by Martin Bradley.
The State of Computer & Data Security in Corporations Independent Survey.
Connorco Law Offices Find the right path Next.  Pro-active, entrepreneurial lawyer  Hands-on understanding of your business  Big savings from standard.
Data Security in a Mobile World Emmitt Wells – Getronics.
Law College 1 Techno-Legal Security For Information Assets Naavi August 29, 2003.
CIA Annual Meeting LOOKING BACK…focused on the future.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Microsoft.com/publicsector Records Management Microsoft Records Management for Government Agencies.
Role of Montana State Fund. Montana State Fund is committed to the health and economic prosperity of Montana through superior service, leadership and.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
Preparing for negotiation  Understand client’s business intention and goals  Measure positioning of your client and the opposite party: the purpose.
YASED International Investors Association IPR Approach Mr. Tankut Turnaoğlu YASED Vice Chairman P&G - Vice President & General Manager, Turkey & Caucasus.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Information Management in Retail: A Legal Perspective Chris Hill Barlow Lyde & Gilbert LLP 17 September 2009.
Alliance Key Manager for Windows Azure Puts Encryption Key Management and Data Breach Security at Your Fingertips COMPANY PROFILE: TOWNSEND SECURITY Townsend.
Legal framework Look at the legal compliance and framework a business is subject to.
Insurance and Investments Lesson 5. Insurance Why is it important? –Risk: chance of loss from some type of danger Can be reduced (helmet, seatbelt, locked.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Welcome to the ICT Department Unit 3_5 Security Policies.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
Cyber Liability Insurance for an unsecure world
Draft - Enterprise Risk Management Risk Universe
Cybersecurity as a Business Differentiator
Learn Your Information Security Management System
Enterprise risk management
BUSINESS CONTINUITY BY HUI ZHENG.
AIBT Nassau Conference Bootcamp Family Offices
Information Security based on International Standard ISO 27001
Cyber Exposures The Importance of Risk Identification and Transfer
Anthem Data Breach Group 2: Jing Jiang, Dongjie Wang, Haitao Huang, Binju Gaire, Parneet Toor.
Cloud Computing for Wireless Networks
Presentation transcript:

Security, Continuity & Compliance Gordon McKenzie Business Development Director, Syan Limited

What’s it all about? Legislation Regulation/Directives Standards and Accords Greater disclosure and openness

What’s it all about? REGULATORY COMPLIANCE  Sarbanes-Oxley  Basel II  Global Privacy Directives It’s not just SOX Sarbanes-Oxley only directly affects approximately 400+ companies in Europe: Not just the largest – just those listed in the US

What’s it all about? RISK MANAGEMENT  Legal Liabilities  Brand Value Protection  Stakeholder Satisfaction  Financial Performance Protection

And if you don’t? Regulator attention Fines Higher auditing bills Reduction in brand image Failing investor confidence  reduced share price  potentially terminal Lower credit rating  higher cost of capital Legislation breach – Prison!

Businesses don’t want to comply! Businesses exploit loopholes Compliance is a cost Compliance creates level playing fields That is why we have legislation / regulation

Butler Group’s Compliance Matrix

Technology of Compliance Business Process Management Collaboration Digital/ Archiving Disaster Recovery Content Management, including & Records Management Business Intelligence/Analysis Corporate Performance Management Search/Discovery/Retrieval Identity Access Management Network Security Policy Management Profiling INFORMATION MANAGEMENT INFORMATION ANALYSIS INFORMATION SECURITY

What does it mean? The information needs to be available –To the right people –At the right time Reports must be out on time Lost data is not an excuse Neither is a broken system or a network failure Disasters can (and will) happen Information needs to be managed

Traditional Disasters… But you must try to protect against all eventualities

What is a disaster? Not just natural disasters Anything that has the potential to damage your business can be classed as a disaster

Data must be protected Customer Data  Personal Data Files  Financial Records / Credit History  Medical History Employee HR Data  Employment History  Employee Reviews  Wage/Salary Structures  Health Records

Assets must be protected Intellectual Property  Research and Development Product designs and cost budgets  Business Methods and Best Practices  Proprietary Source Code  Specific Project Data  Proposals and Price Lists  Marketing plans, advertising and packaging

Information must be available High Availability Disaster Recovery Business Continuity Many different solutions

Windows Syan’s Availability Solutions pSeries HACMP HACMP-XD Storage ESS & DS Family Tivoli Linux Disaster Recovery and Business Continuity Facilities iSeries Networks Intel

It’s not just about the data Secure and managed access Secure and managed infrastructure Secure and managed record of all process: –Ensuring consistency –Keeping all the doors bolted

You can’t outsource it! You can outsource the service – but not the responsibility –The outsourcer will not stand alongside you in court But if managed properly outsourcing can help

What can you outsource? Everything but the responsibility Decide what your business is about? Do you want to be a delivery company? Do you want to be a warehousing company? Do you want to be an IT company? What services could be done better by specialists? And then choose someone you can trust – your business will depend on it

BS7799 / ISO17799 Big investment But a big saving when being audited "We always believed that Syan was doing things right and, following the SOX audits, we now know that they are. If Syan had failed the audits, then we would have failed.“ Anthony Mitchell, Network Administrator for Gardner Denver International

The Specialists in IT Outsourcing and IBM eServer Solutions Visit for more information about Syan’s Services