Business Continuity Management Rikus Matthyser Executive: Telkom Business Integration Services.

Slides:



Advertisements
Similar presentations
Security and Control Soetam Rizky. Why Systems Are Vulnerable ?
Advertisements

Enterprise Architectures
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
Managing Information Systems Information Systems Security and Control Part 1 Dr. Stephania Loizidou Himona ACSC 345.
© 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Data protection and disaster recovery.
9 - 1 Computer-Based Information Systems Control.
Oracle Data Guard Ensuring Disaster Recovery for Enterprise Data
All rights reserved © 2005, Alcatel Distributed Storage Networks  Dr. Stephan Rupp 
Barracuda Backup Service Data Backup and Disaster Recovery.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B4 Enterprise Architecture.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
1 Pertemuan 17 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Saving Your Business from a Data Loss Randy Clark.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Secured Hosting Services Frank Adams / Tom Carter.
Are you Confident that data in your non-production systems is secured?
ATIF MEHMOOD MALIK KASHIF SIDDIQUE Improving dependability of Cloud Computing with Fault Tolerance and High Availability.
Protecting ICT Systems
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
Evolving IT Framework Standards (Compliance and IT)
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
STEALTH Content Store for SharePoint using Caringo CAStor  Boosting your SharePoint to the MAX! "Optimizing your Business behind the scenes"
Prepared by: Dinesh Bajracharya Nepal Security and Control.
DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection.
1 November 2008 David Hall Sales Manager – New Business Data Centre Hosting for the M-Business.
David N. Wozei Systems Administrator, IT Auditor.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B17 Organizational Architecture Trends.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business.
Hosted by Why You Need a Storage Management Organization Ray Paquet Vice President & Research Director Gartner.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
FireProof. The Challenge Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Security Snapshot Assessment Maximizing Return on Security Investment What assets do we have? What is running on those assets? What is our risk level?
Commonwealth of Massachusetts Executive Office of Health and Human Services EOHHS Infrastructure Consolidation and Rationalization October 2008.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Welcome to the ICT Department Unit 3_5 Security Policies.
Cloud Professional Services Cloud Assessment Cloud Migration.
Technology and Business Continuity
Information Security, Theory and Practice.
DC Market Trends and the key focus areas within
Cloud Firewall.
Data Center Firewall.
BUSINESS CONTINUITY BY HUI ZHENG.
Information Technology Sector
DISASTER RECOVERY INSTITUTE INTERNATIONAL
Bharath Ram Ramanathan, Storage Solutions TME,
Dresdner Bank & Wyndham International: The Business Case for Server Consolidation Chapter 3 Case 2.
CCNET Managed Services
What Do We Do? Managed IT services
I have many checklists: how do I get started with cyber security?
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
INFORMATION SYSTEMS SECURITY and CONTROL
Backup and restoration of data, redundancy
Finance for Non-Financial Managers
GRC - A Strategic Approach
Capitalize on Your Business’s Technology
Presentation transcript:

Business Continuity Management Rikus Matthyser Executive: Telkom Business Integration Services

What is Business Continuity? “The goal for companies and organisations with no tolerance for downtime is to achieve a state of business continuity, where critical systems and networks are continuously available, no matter what happens, and the human capital is protected” The Gartner Group

What causes downtime?

Defences against downtime Software Failure Server Load Balancing Information Security Hardware Failure Hot/Cold Standby Storage Area Networks Server Load Balancing Physical & IT Security Human Error Security Resilience Network Transmission Backup Circuits Redundant Infrastructure Security Natural Disasters Hot/Cold Standby Storage Area Networks Server Load Balancing Physical Security

Impact of Downtime on Business Productivity Loss Revenue Loss Damaged Reputation Financial Performance Problems Overhead Expenses caused by Downtime

What do we need to protect

What do we need to secure? Growing Threats Growing Vulnerabilities Growing Business Exposure Customer Requirements –Which boosts: Business growth sustenance Customer confidence Quality of service Non repudiation requirements Service Level Agreements Service availability

What do we secure? Management of Policies and Procedures Identity Management Perimeter Security Internal Security Monitoring State of Security Implementations

Future Trends Commoditisation What is it? Who are best suited to offer managed services as a commodity product?

Conclusion Business continuity is fast becoming the number one board room discussion. As more systems are implemented to control this, security is the only variable with dramatic evolution and changes.