Disaster Recovery Planning and Implementa6on. Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University

Size: px
Start display at page:

Download "Disaster Recovery Planning and Implementa6on. Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University"

Transcription

1 Disaster Recovery Planning and Implementa6on Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University

2 Agenda Background for York s I.T. Disaster Recovery Planning and Ini6al Hurdles Major Implementa6on Steps Expanding outside the main data centre Physically diverse cable plant Resilient/redundant networks and systems Lessons Learned Next Steps

3 Star6ng Out with Disaster Recovery Planning Educause survey results in 2007: 17% of responding ins6tu6ons had completed DR plans for central I.T. If it was easy, someone would have already done it.

4 Project start: January 2003 Genesis of York s I.T. DRP Ini6a6ve Sponsored by CIO and VP Finance and Administra6on Intended to be a mul6 phase, mul6 year effort Scope: Systems: key informa6on systems Scenarios: localized disaster or failure A lot of defini6on s6ll to be desired

5 Where DO you start? Easy to feel overwhelmed Best Prac6ces variety of sources ITIL, COBIT, ISO17799, etc. Good informa6on but these will not take into account resource considera6ons, compe6ng priori6es, ins6tu6onal poli6cs, etc. Scope (Systems, Scenarios) must s6ll be defined

6 Disaster Recovery Threat Assessment Proximity to heavy industry Oil depot across street Near intersec6on of major highways (400 & 407) Freight train corridor (chemical spill 1980) Main Campus is on airport flight path Main data centre in basement of old building High traffic area (library, with washrooms) located directly above Worst-case scenario chosen: Loss of building containing main data centre

7 Typical DRP Phases 1: Risk Assessment 2: Architecture/Recovery Strategies 3: Implementa6on 4: Tes6ng 5: Sustain Program (loop back to 1) First What systems are you planning for?

8 First Phase: Business Impact Assessment/Cri6cality Analysis Business Con6nuity vs. Disaster Recovery not the same thing: BC: Considers the academic, research and business func6oning of the ins6tu6on as a whole. Includes risk assessment, and plans for func6onal units and business processes. Poten6ally wider variety of scenarios to consider. DR: Ac6vi6es to enable recovery to an acceptable condi6on aner a disaster. BC includes DR. DR requires guidance from BC to direct priori6es and set scope.

9 Cri6cality Assessment (CA) Engaged func6onal unit leaders and I.T. support areas Asked to gauge effect on loss of I.T. systems on business processes, loss of business processes on the mission of the University Asked to iden6fy maximum tolerable outages and data loss Results Greater than 50% of business processes ranked cri6cal very high cost to implement DR measures Reality Check: everyone s work is cri6cal at some point the findings did not agree with observed impacts from lesser scale outages VP and AVP consulta6ons final step to ra6onalizing CA Costs of DR implementa6on < Risk of delayed business processes

10 Risk Management

11 Service Classifica6ons Category Objec.ves Service Types 1 RTO,RPO<4hr Safety, Primary Communica6ons 2 RTO<72hrs Cri6cal Customer and Partner Interfaces 3 RTO<7 days Primary Customer and Partner Interfaces 4 RTO<14 days Secondary Customer and Partner Interfaces 5 RTO<30 days Departmental 6 RTO>30 days All Others RTO = Recovery Time Objective, max time between incident and system recovery RPO = Recovery Point Objective, max acceptable data loss between incident and data restore point Major systems are grouped into these categories

12 DRP Phase 2: Architecture Task: Design systems and infrastructure to support recovery objec6ves Infrastructure not categorized; recovery objec6ves variable depending on reliant services Clear vulnerabili6es: Main Data Centre Fibre/Cable Plant Network (LAN, WAN)

13 Architecture: Recovery Strategies Category Recovery Strategy 1 On or Off campus Hot site, ac6ve mirror or synchronized data copy 2 On or Off campus Hot site, async data copy or restore from disk backup 3 On or Off campus Hot site, promote QA, restore from backup 4 On or Off campus cold site, repurpose hardware, restore from backup 5 On or Off campus cold site, replacement or consolidated hardware 6 On or Off campus cold site, replacement or consolidated hardware

14 DRP Phase 3: Implementa6on Infrastructure work completed for: Cable Plant Off campus Data Centre On campus alternate Data Centre WAN (in progress) Some design work s6ll progressing (Network) None of this is men6oned in any DR category, it just has to be there

15 Steacie Data Centre

16 Cable Plan Modifica6ons Historical: low cost star configura6on, no DR capability or rerou6ng op6ons Solu6on: retrofit ring like topology Start with selected physical fibre aggrega6on points Added new fibre to provide alternate connec6vity to these points, leading to new data centre in another building (500m distant, not in basement, former dance studio)

17 Cable Plant

18 Cable Plant DR Modifica6ons

19 Power Redundant power feeds, but no generator University co genera6on plant expected to provide backup power to building in the event of a loss This proved false, co gen does not have capability to direct output to selected buildings, and does not have capacity to serve en6re campus. Only 6me in 40 years both feeds have been down was Aug New alternate data centre has generator, more robust than main facility

20 Cooling Data centre usage always growing Density increasing along with server count helps reduce increased need for physical space High density equipment need more power/area More power/area means more cooling/area Airflow also a concern cubic metres/min Failure of cooling as bad as power failure S6ll working on refinements to resiliency Make sure to size backup power to include A/C

21 Co loca6on Site RFP in 2007, 9 racks of equipment Sufficient for priority systems: SIS, ERP, , Web, LMS, virtual tape library and part of backup system Telus IDC Selected, 15km distant Deployment as hot/produc6on site in progress WAN upgrade with L2 na6ve fibre connec6vity (currently 1Gbit) plus redundant connec6ons to the Keele campus

22 Network Survivability Designing alternate network core to be located at alternate on campus data centre WAN Upgrade Greatly enhanced performance L2 na6ve fibre connec6vity to Telus IDC Physically diverse links to off campus, and to fibre aggrega6on points on campus where possible

23 Off Campus Storage and Backup System Redesigning Backup and storage systems to u6lize WAN + on & off campus data centres Disk staging/virtual tape for backup system Stop duplica6ng tapes, they are already offsite Mirroring and/or replica6on for short RPO systems

24 Telecom System Survivability TDM Technology Not going to rip & replace Not going to expand for redundancy U6lize IP telephony and leverage DR capable network TDM/IP gateways to bridge non IP phones Arrangements with telecom provider to temp reroute calls Finally, deploy DR capable telecom system to use both on campus data centres similar to network

25 DRP Documenta6on Refresh Revising classifica6on of systems to match new technical capabili6es Adapt to changing business processes and needs Tes6ng Phase: Walkthrough exercises at minimum (done) Bare metal rebuilds/restores as SOP DR fire drill poten6al

26 Planets must be aligned Lessons Learned Execu6ve, Management (technical and business), Staff Resources all commiwed lack of any probably means it won t happen Risk Assessment par6cipa6on by business units and execu6ve review Technical: Virtualiza6on helps solve a lot of problems, but S6ll runs on real hardware, s6ll need all the usual elements: alternate sites, power, cooling and the network to get there

27 Lessons Learned Recovery is good, resiliency is bewer Some6mes not much extra effort to go from fast recovery to simply not going down at all When can you claim victory? Be realis6c No plan survives contact with the enemy Failure to plan is planning to fail Can t plan for every scenario, but the act of DR planning can be as useful as the completed plans affects thinking, start asking what if much more

28 Next Steps Finish what we started with infrastructure build out WAN/network connec6vity upgrade Resilient/Redundant Network Redesigned Backups and Storage Systems for Geo diversity Deployment to hot site Refresh of DR Plans to occur annually Incorporate applica6on level into planning Improve linkages with University Emergency Planning Provide more basis for Business Con6nuity Plans

29 Ques6ons

An introduction to disaster recovery. And how DrAAS from I.R.I.S. Ondit can help!

An introduction to disaster recovery. And how DrAAS from I.R.I.S. Ondit can help! An introduction to disaster recovery And how DrAAS from I.R.I.S. Ondit can help! Events That Impact Information Availability Events that require a data center move: Fewer than 1% of occurrences Natural

More information

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items

More information

DDC Sequencing and Redundancy

DDC Sequencing and Redundancy DDC Sequencing and Redundancy Presenter Sequencing Importance of sequencing Essen%al piece to designing and delivering a successful project Defines how disparate components interact to make up a system

More information

IT Change Management Process Training

IT Change Management Process Training IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge

More information

Data Center 2020. DC planning for the next 5 10 years. Copyright 2004-2013 Experture and Robert Frances Group, all rights reserved

Data Center 2020. DC planning for the next 5 10 years. Copyright 2004-2013 Experture and Robert Frances Group, all rights reserved DC planning for the next 5 10 years Topics to be Discussed Introduc=on Indirect Drivers Technology Direct Drivers Data Center DC Management DC Opera=ons s and Disaster Recovery 2 Introduc=on The future

More information

Update on the Cloud Demonstration Project

Update on the Cloud Demonstration Project Update on the Cloud Demonstration Project Khalil Yazdi and Steven Wallace Spring Member Meeting April 19, 2011 Project Par4cipants BACKGROUND Eleven Universi1es: Caltech, Carnegie Mellon, George Mason,

More information

Update on the Cloud Demonstration Project

Update on the Cloud Demonstration Project Update on the Cloud Demonstration Project Steven Wallace Joint Techs Summer 2011 13- July- 2011 Project Par4cipants BACKGROUND Twelve Universi,es: Caltech, Carnegie Mellon,Cornell George Mason, Indiana

More information

Why Buy Eaton: Trusted Source to Manage Power

Why Buy Eaton: Trusted Source to Manage Power Why Buy Eaton: Trusted Source to Manage Power If you are responsible for power protec0on for small or medium data centers, Eaton can help you deliver a reliable power source for your business. Target Markets:

More information

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist

More information

10 Steps to Preparedness

10 Steps to Preparedness 10 Steps to Preparedness Key Take- Aways Review basics of disaster recovery and con2nuity of opera2ons. Understand what you can do to prepare your pool and its members for an unplanned interrup2on. Ini2ate

More information

UAB Cyber Security Ini1a1ve

UAB Cyber Security Ini1a1ve UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment

More information

Architec;ng Splunk for High Availability and Disaster Recovery

Architec;ng Splunk for High Availability and Disaster Recovery Copyright 2014 Splunk Inc. Architec;ng Splunk for High Availability and Disaster Recovery Dritan Bi;ncka BD Solu;on Architecture Disclaimer During the course of this presenta;on, we may make forward- looking

More information

Migra'ng AmLight from legacy to SDN: Challenges, Results and Next Steps

Migra'ng AmLight from legacy to SDN: Challenges, Results and Next Steps NANOG 63 February 04th 2015 Migra'ng AmLight from legacy to SDN: Challenges, Results and Next Steps Jeronimo A. Bezerra Florida Interna3onal University Agenda Who are we? What is SDN?

More information

Contents. Foreword. Acknowledgments

Contents. Foreword. Acknowledgments Foreword Preface Acknowledgments xv xvii xviii CHAPTER 1 Introduction 1 1.1 What Is Mission Critical? 1 1.2 Purpose of the Book 2 1.3 Network Continuity Versus Disaster Recovery 2 1.4 The Case for Mission-Critical

More information

Legacy Archiving How many lights do you leave on? September 14 th, 2015

Legacy Archiving How many lights do you leave on? September 14 th, 2015 Legacy Archiving How many lights do you leave on? September 14 th, 2015 1 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory

More information

Data Management in the Cloud: Limitations and Opportunities. Annies Ductan

Data Management in the Cloud: Limitations and Opportunities. Annies Ductan Data Management in the Cloud: Limitations and Opportunities Annies Ductan Discussion Outline: Introduc)on Overview Vision of Cloud Compu8ng Managing Data in The Cloud Cloud Characteris8cs Data Management

More information

Developing a Full- Spectrum Security Training Program

Developing a Full- Spectrum Security Training Program Developing a Full- Spectrum Security Training Program Wayne State University Compu3ng & Informa3on Kevin Hayes, CISSP, CISM Informa)on Security Officer Geoff Nathan Faculty Liason Agenda Background Our

More information

San Jacinto College Banner & Enterprise Applica5on Review Task Force Report. November 01, 2011 FINAL

San Jacinto College Banner & Enterprise Applica5on Review Task Force Report. November 01, 2011 FINAL San Jacinto College Banner & Enterprise Applica5on Review Task Force Report November 01, 2011 FINAL 1 Content Review goal and approach 3 Barriers to effec5ve use of Banner: Consultant observa5ons 10 Consultant

More information

Direct Fibre Data Centre Telephone Internet Virtual and Hosted Services Professional Services

Direct Fibre Data Centre Telephone Internet Virtual and Hosted Services Professional Services Direct Fibre Data Centre Telephone Internet Virtual and Hosted Services Professional Services Direct Fibre! IAI is well known for its exper@se in managing, opera@ng, and connec@ng customers to its extensive

More information

Phone Systems Buyer s Guide

Phone Systems Buyer s Guide Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers

More information

Elliptical Mobile Solutions Data Center Solutions

Elliptical Mobile Solutions Data Center Solutions Elliptical Mobile Solutions Data Center Solutions The Next Genera-on of Modular Data Centers Copyright Ellip.cal Mobile Solu.ons 2010 www.ellip.calmobilesolu.ons.com 1 EMS CURRENT PRODUCTS BENEFITS We

More information

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on

More information

Disaster Recovery & Business Continuity Dell IT Executive Learning Series

Disaster Recovery & Business Continuity Dell IT Executive Learning Series Disaster Recovery & Business Continuity Dell IT Executive Learning Series Presented by Rich Armour, Debi Higdon & Mitchell McGovern THIS PRESENTATION SUMMARY IS FOR INFORMATIONAL PURPOSES ONLY AND MAY

More information

Case Study. The SACM Journey at the Ontario Government

Case Study. The SACM Journey at the Ontario Government Case Study The SACM Journey at the Ontario Government Agenda Today s Objec=ves The Need for SACM Our SACM Journey Scope and Governance Process Ac=vi=es Key Process Roles Training and Measurement Lessons

More information

Network Performance Tools

Network Performance Tools Network Performance Tools Jeff Boote Internet2/R&D June 1, 2008 NANOG 43/ Brooklyn, NY Overview BWCTL OWAMP NDT/NPAD BWCTL: What is it? A resource alloca=on and scheduling daemon for arbitra=on of iperf

More information

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael

More information

Informa.on Systems in Organiza.ons

Informa.on Systems in Organiza.ons Informa.on Systems in Organiza.ons MIS 2101 Week 7 / Chapter 7 Enhancing Business Processes Using Enterprise Informa.on Systems Photo: Objet Mathema+que by Man Ray, 1934 Chapter 7 Learning Objec.ves Core

More information

Can Cloud Hos+ng Providers Really Replace. Your Cri(cal IT Infrastructure?

Can Cloud Hos+ng Providers Really Replace. Your Cri(cal IT Infrastructure? Can Cloud Hos+ng Providers Really Replace Your Cri(cal IT Infrastructure? Housekeeping Welcome to Align s Webinar Can Cloud Hos+ng Providers Really Replace Your Cri(cal IT Infrastructure? Informa+on for

More information

Help Framework. Ticket Management Ticket Resolu/on Communica/ons. Ticket Assignment Follow up Customer - communica/on System updates Delay management

Help Framework. Ticket Management Ticket Resolu/on Communica/ons. Ticket Assignment Follow up Customer - communica/on System updates Delay management Help for JD Edwards Our Help Framework Ticket qualifica/on Ticket crea/on Ticket Rou/ng Closures L1 issues Resolu/on KG SOPs Co- ordinate Ticket Assignment Follow up Customer - communica/on System updates

More information

Tim Blevins Execu;ve Director Labor and Revenue Solu;ons. FTA Technology Conference August 4th, 2015

Tim Blevins Execu;ve Director Labor and Revenue Solu;ons. FTA Technology Conference August 4th, 2015 Tim Blevins Execu;ve Director Labor and Revenue Solu;ons FTA Technology Conference August 4th, 2015 Governance and Organiza;onal Strategy PaIerns of Fraud and Abuse in Government What tools can we use

More information

Connec(ng to the NC Educa(on Cloud

Connec(ng to the NC Educa(on Cloud NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are

More information

Leveraging the Hybrid Cloud For Complete Data Protec:on. Private Public Managed

Leveraging the Hybrid Cloud For Complete Data Protec:on. Private Public Managed Leveraging the Hybrid Cloud For Complete Data Protec:on Private Public Managed Agenda Introduc>ons What is the Hybrid Cloud Data Protec>on Key Concepts Backup vs. Disaster Recovery How can I achieve Complete

More information

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al

More information

The Big Bang: cloud resiliency and the data explosion

The Big Bang: cloud resiliency and the data explosion Deborah Orr, Forbes Insights Analyst Daniel Witteveen, Director, IBM Cloud Managed Backup and Data Virtualization 03/23/2015 The Big Bang: cloud resiliency and the data explosion 2015 IBM Corporation Agenda

More information

AIS TECHNOLOGY SOLUTIONS GUIDE

AIS TECHNOLOGY SOLUTIONS GUIDE AIS TECHNOLOGY SOLUTIONS GUIDE WHAT IS AIS AT TECH DATA? Advanced Infrastructure Solutions provide resellers with everything they need to keep their data centers up-to-date with the latest technology.

More information

Business Con'nuity & Pa'ent Safety

Business Con'nuity & Pa'ent Safety Business Con'nuity & Pa'ent Safety Why are we doing BCP? It has a direct impact on Pa'ent Safety and our overall opera'ons We ve already had outages and experienced first hand when things aren t working

More information

9/23/2013. Disaster Recovery Planning Best Practices. Over the Next Decade. 75X growth in files. 50X growth in data. 10X growth in servers

9/23/2013. Disaster Recovery Planning Best Practices. Over the Next Decade. 75X growth in files. 50X growth in data. 10X growth in servers Disaster Recovery Planning Best Practices Mohammad Alshafie, Systems Engineer mo@unitrends.com Harold Schmoecker, Regional Sales VP harold@unitrends.com Over the Next Decade 75X growth in files 50X growth

More information

courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P

courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview Business Continuity, Disaster Recovery and Data Center Consolidation IT managers today must be ready for the

More information

How To Manage A Mobile Device Management At Harvard

How To Manage A Mobile Device Management At Harvard Demys&fying Mobile Device Management Challenges Indir Avdagic Director of Informa.on Security and Risk Management, SEAS Objec&ves Our hope is that this conversa0on will get people thinking about mobile

More information

How To Protect Virtualized Data From Security Threats

How To Protect Virtualized Data From Security Threats S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust

More information

How to Design and Implement a Successful Disaster Recovery Plan

How to Design and Implement a Successful Disaster Recovery Plan How to Design and Implement a Successful Disaster Recovery Plan Feb. 21 ASA Office-Administrative Section is Sponsored by Today s ASAPro Webinar is Brought to You by the How to Ask a Question Questions

More information

Privileged Administra0on Best Prac0ces :: September 1, 2015

Privileged Administra0on Best Prac0ces :: September 1, 2015 Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program

More information

DTCC Data Quality Survey Industry Report

DTCC Data Quality Survey Industry Report DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6

More information

Backup and Recovery 1

Backup and Recovery 1 Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup

More information

C24 - Inside the Data Center Andrew J. Luca

C24 - Inside the Data Center Andrew J. Luca C24 - Inside the Data Center Andrew J. Luca Inside the Data Center What an auditor needs to know Course Objectives Understand the looks and feel of a data center Know what to look for and what questions

More information

THE STATE OF IT RECOVERY FOR SMBS: A SURVEY OF IT PROFESSIONALS

THE STATE OF IT RECOVERY FOR SMBS: A SURVEY OF IT PROFESSIONALS Introduction Unscheduled downtime can have dramatic impacts on business results. Outages are detrimental to any business, regardless of its size. With increasingly complex and critical IT environments,

More information

Disaster Recovery Checklist Disaster Recovery Plan for <System One>

Disaster Recovery Checklist Disaster Recovery Plan for <System One> Disaster Recovery Plan for SYSTEM OVERVIEW PRODUCTION SERVER HOT SITE SERVER APPLICATIONS (Use bold for Hot Site) ASSOCIATED SERVERS KEY CONTACTS Hardware Vendor System Owners Database Owner

More information

Leveraging Virtualization for Disaster Recovery in Your Growing Business

Leveraging Virtualization for Disaster Recovery in Your Growing Business Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster

More information

Data Warehousing. Yeow Wei Choong Anne Laurent

Data Warehousing. Yeow Wei Choong Anne Laurent Data Warehousing Yeow Wei Choong Anne Laurent Databases Databases are developed on the IDEA that DATA is one of the cri>cal materials of the Informa>on Age Informa>on, which is created by data, becomes

More information

Growing a Student Environmental Resource Center. Hanna Morris Manon von Kaenel Katherine Walsh

Growing a Student Environmental Resource Center. Hanna Morris Manon von Kaenel Katherine Walsh Growing a Student Environmental Resource Center Hanna Morris Manon von Kaenel Katherine Walsh AGENDA A Brief History Determining a Need for a Center Challenges Mission and Objec

More information

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define

More information

Protecting your Enterprise

Protecting your Enterprise Understanding Disaster Recovery in California Protecting your Enterprise Session Overview Why do we Prepare What is? How do I analyze (measure) it? What to do with it? How do I communicate it? What does

More information

Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747

Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Introduction Rajesh Gupta - rajgupta@deloitte.com Solution Network

More information

Configura)on Management Process and Environment MACS Review 1 February 5th, 2010 Roland Moser

Configura)on Management Process and Environment MACS Review 1 February 5th, 2010 Roland Moser Configura)on Management Process and Environment MACS Review 1 February 5th, 2010 Roland Moser R. Gutleber 1 Goals Configura)on Management (CM) is the implementa)on and the execu)on of processes and procedures

More information

Disaster Recovery 101. Sudarshan Ranganath & Matthew Phillips Ellucian

Disaster Recovery 101. Sudarshan Ranganath & Matthew Phillips Ellucian Disaster Recovery 101 Sudarshan Ranganath & Matthew Phillips Ellucian SESSION OBJECTIVES Business continuity is critical to every institution and its IT organization. How do you set up your ERP and other

More information

Paco Hope <paco@cigital.com> Florence Mo ay <fmo ay@cigital.com> 2012 Cigital. All Rights Reserved. SecAppDev. Define third party so ware

Paco Hope <paco@cigital.com> Florence Mo ay <fmo ay@cigital.com> 2012 Cigital. All Rights Reserved. SecAppDev. Define third party so ware Paco Hope Florence Moay 2012 Cigital. All Rights Reserved. SecAppDev 1 Objectives Define third party soware What it is, why we use it Define the risks from third

More information

DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES

DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES Dejan Živanović EMC Technology Solutions Group SEE Presales Manager Dejan.Zivanovic@emc.com 1 The Business Maturity Model V Enabled Web

More information

Ohio Conference for Payroll Professionals Disaster Recovery

Ohio Conference for Payroll Professionals Disaster Recovery Ohio Conference for Payroll Professionals Disaster Recovery Speaker Bruce E. Phipps CPP 2011 APA Payroll Man of the Year Principal Product Manager US Legislative Analyst ORACLE Corporation bruce.phipps@oracle.com

More information

Planning for Disaster Disaster

Planning for Disaster Disaster Planning for Disaster Ramesh Ramani CISM CGEIT Ramesh Ramani CISM CGEIT Paramount-Dubai Agenda Disaster Management-Introduction Examples BCP and IT Continuity Process of Disaster Management-PDCA Disaster

More information

Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1

Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Online Enrollment Op>ons - Sales Training 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Agenda Understand Why This is Important Enrollment Op>ons Available EDI Blues Enroll

More information

Why Should Companies Take a Closer Look at Business Continuity Planning?

Why Should Companies Take a Closer Look at Business Continuity Planning? whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters

More information

Availability and Disaster Recovery: Basic Principles

Availability and Disaster Recovery: Basic Principles Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer

More information

The Surprising Truth About Your DR Maturity Level

The Surprising Truth About Your DR Maturity Level The Surprising Truth About Your DR Maturity Level Todd Scallan VP, Product & Engineering tscallan@axcient.com Daniel Kuperman Sr. Manager Product Marketing dkuperman@axcient.com Agenda 1 Context: Why do

More information

Veeam Backup and Replication Architecture and Deployment. Nelson Simao Systems Engineer

Veeam Backup and Replication Architecture and Deployment. Nelson Simao Systems Engineer Veeam Backup and Replication Architecture and Deployment Nelson Simao Systems Engineer Agenda Veeam Backup Server / Proxy Architecture Veeam Backup Server / Backup Proxy Backup Transport Modes Physical

More information

Mobility in the Modern Factory. Discussion of Mobile Adop7on for the Factories of the Future

Mobility in the Modern Factory. Discussion of Mobile Adop7on for the Factories of the Future Mobility in the Modern Factory Discussion of Mobile Adop7on for the Factories of the Future Talking Points History Lesson The Reasons for Going Mobile Mobile Infrastructure Mobile Device Security BYOD

More information

Computer Security Incident Handling Detec6on and Analysis

Computer Security Incident Handling Detec6on and Analysis Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION

More information

Business Con*nuity with Docker

Business Con*nuity with Docker CloudOpen Japan 2015 Business Con*nuity with Docker 2015/06/04 Yoshitaka Kuwata Muroran Ins*tute of Technology Overview of Talk 1. Who is Talking 2. Mo*va*on of Disaster Recovery 3. Exis*ng Solu*ons 4.

More information

First Na)on Project Management Boot Camp

First Na)on Project Management Boot Camp First Na)on Project Management Boot Camp Links to Learning - Ontario: Building a Sustainable Future Thunder Bay, Ontario What is a Project / Project Management? A project can be defined as a temporary

More information

Can Your Centre Recover from a IAAO. June 4, 2013 Lead by The Ontario Universities Application Centre

Can Your Centre Recover from a IAAO. June 4, 2013 Lead by The Ontario Universities Application Centre Can Your Centre Recover from a Disaster? IAAO June 4, 2013 Lead by The Ontario Universities Application Centre B Agenda 1.OUAC s Disaster Recovery Activity 2.Definitions i i 3.Has anyone had a disaster?

More information

Cloud-Based Commissioning. Dale Davis Mark Walter Keithly Barber Associates

Cloud-Based Commissioning. Dale Davis Mark Walter Keithly Barber Associates Cloud-Based Commissioning Dale Davis Mark Walter Keithly Barber Associates AIA Quality Assurance The Building Commissioning Association is a Registered Provider with The American Institute of Architects

More information

<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures

<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures 1 Refreshing Your Data Protection Environment with Next-Generation Architectures Dale Rhine, Principal Sales Consultant Kelly Boeckman, Product Marketing Analyst Program Agenda Storage

More information

Beyond Strategy: Building Your Mobile Capabili6es

Beyond Strategy: Building Your Mobile Capabili6es Beyond Strategy: Building Your Mobile Capabili6es TASSCC Technology Educa6on Conference April 10, 2015 Presented by: Raj Polikepa6 Director of App Development Texas.gov Agenda ê Objec6ves of Mobile Strategy

More information

Business Continuity & Recovery Plan Summary

Business Continuity & Recovery Plan Summary Introduction An organization s ability to survive a significant business interruption is determined by the company s ability to develop, implement, and maintain viable recovery and business continuity

More information

Disaster Recovery for Ingres. Abstract

Disaster Recovery for Ingres. Abstract Disaster Recovery for Ingres A general disaster recovery discussion followed by Ingres specific issues and recommendations 2002-2003 Comprehensive Consulting Solutions, Inc., All rights reserved. Abstract

More information

Cloud Risks and Opportunities

Cloud Risks and Opportunities Cloud Risks and Opportunities John Howie COO Cloud Security Alliance #SCCLondon About the Cloud Security Alliance Global, not- for- profit organiza;on Building security best prac;ces for next genera;on

More information

How To Back Up A Virtual Machine

How To Back Up A Virtual Machine 2010 Symantec Disaster Recovery Study Global Results Methodology Applied Research performed survey 1,700 enterprises worldwide 5,000 employees or more Cross-industry 2 Key Findings Virtualization and Cloud

More information

Business Continuity & Recovery Plan Summary

Business Continuity & Recovery Plan Summary Introduction An organization s ability to survive a significant business interruption is determined by the company s ability to develop, implement, and maintain viable recovery and business continuity

More information

Exchange of experience from a SuccessFactors LMS Implementa9on

Exchange of experience from a SuccessFactors LMS Implementa9on Exchange of experience from a SuccessFactors LMS Implementa9on Seen from a user perspective Hanne Vasshus Ask Competency Management Cau9onary Statement The following presenta9on includes forward- looking

More information

Social Media Marke-ng for Academic Research

Social Media Marke-ng for Academic Research Social Media Marke-ng for Academic Research 1 David Altman Mar.n Son Susu Wong @MassTTC #Social @TOMO3603 Using Social Media in Technology Licensing Offices 2 David Altman Manager Marke9ng and Communica9ons

More information

Balancing Usability and Security for Medical Devices

Balancing Usability and Security for Medical Devices Balancing Usability and Security for Medical Devices Ken Hoyme Adven&um Labs ken.hoyme@adven8umlabs.com Robert North, LLC bnorth@humancenteredstrategies.com March 17, 2014 3/17/2014 2014 Adven8um Labs

More information

Building your Server for High Availability and Disaster Recovery. Witt Mathot Danny Krouk

Building your Server for High Availability and Disaster Recovery. Witt Mathot Danny Krouk Building your Server for High Availability and Disaster Recovery Witt Mathot Danny Krouk Terminology Whoa! Resiliency High Availability RTO Round Robin Business Continuity A Spectrum, Not a Switch Backup

More information

CS 5150 So(ware Engineering System Architecture: Introduc<on

CS 5150 So(ware Engineering System Architecture: Introduc<on Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering System Architecture: Introduc

More information

San Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP

San Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP Presented by Mike O. Villegas, CISA, CISSP Agenda Information Security (IS) Vision at Newegg.com Typical Issues at Most Organizations Information Security Governance Four Inter-related CoBIT Domains ISO

More information

From Big Data to Value

From Big Data to Value From Big Data to Value The Power of Master Data Management 2.0 Sergio Juarez SVP Elemica EMEA & LATAM Reveal Oct 2014 Agenda Master Data Management Why Now? What To Do? How To Do It? What s Next? Today

More information

IT Governance in Organizations Experiencing Decentralization. Jelena Zdravkovic

IT Governance in Organizations Experiencing Decentralization. Jelena Zdravkovic IT Governance in Organizations Experiencing Decentralization Jelena Zdravkovic Department of Computer & Systems Sciences (DSV), Stockholm University, Sweden Giannoulis About the Speaker Title: Associate

More information

Bacula Open Source Project Bacula Systems (professional support)

Bacula Open Source Project Bacula Systems (professional support) Bacula Open Source Project Bacula Systems (professional support) The Enterprise Ready Open Source Network Backup Solu

More information

Best Prac*ces for Deploying Oracle So6ware on Virtual Compute Appliance

Best Prac*ces for Deploying Oracle So6ware on Virtual Compute Appliance Best Prac*ces for Deploying Oracle So6ware on Virtual Compute Appliance CON7484 Jeff Savit Senior Technical Product Manager Oracle VM Product Management October 1, 2014 Safe Harbor Statement The following

More information

Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain

Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain 1. What is the most common planned performance duration for a continuity of operations plan (COOP)? A. 30 days B. 60 days C. 90 days D. It depends on the severity of a disaster. 2. What is the business

More information

Understanding Cloud Compu2ng Services. Rain in business success with amazing solu2ons in Cloud technology

Understanding Cloud Compu2ng Services. Rain in business success with amazing solu2ons in Cloud technology Understanding Cloud Compu2ng Services Rain in business success with amazing solu2ons in Cloud technology What is Cloud Compu2ng? Cloud compu2ng encompasses various services and ac2vi2es carried out over

More information

HOW TO PREPARE A DATA CENTER STRATEGY. What you need to know to build a business case for Data Center sourcing

HOW TO PREPARE A DATA CENTER STRATEGY. What you need to know to build a business case for Data Center sourcing HOW TO PREPARE A DATA CENTER STRATEGY What you need to know to build a business case for Data Center sourcing Presented by: Gary Davis Principal PlanNet Consulting (714) 982-5886 Steve Miano Principal

More information

Sourcing the WAN One or Many? (Enterprise Case Study)

Sourcing the WAN One or Many? (Enterprise Case Study) Sourcing the WAN One or Many? (Enterprise Case Study) Taki Remtulla CTO & Partner at ABILITA New York, April 2014 Two Enterprise Case Studies Major Oil Company in the Middle East & Financial Ins9tu9on

More information

Poten&al Impact of FDA Regula&on of EMRs. October 27, 2010

Poten&al Impact of FDA Regula&on of EMRs. October 27, 2010 Poten&al Impact of FDA Regula&on of EMRs October 27, 2010 Agenda The case for regula&ng Impact on manufacturers Impact on providers Recommenda&ons and best prac&ces 2 A Medical Device Is an instrument,

More information

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security

More information

Running Successful Disaster Recovery Tests

Running Successful Disaster Recovery Tests Running Successful Disaster Recovery Tests Understanding the DR Process Running Successful Disaster Recovery Tests Understanding the DR Process Presented by Ray Lucchesi President Silverton Consulting,

More information

Is Cloud-Based WMS an Option for Complex Distribution Centers?

Is Cloud-Based WMS an Option for Complex Distribution Centers? Welcome to Session 233 Is Cloud-Based WMS an Option for Complex Distribution Centers? Presented by: Sponsored by: Chuck Fuerst 2012 Material Handling Industry. Copyright claimed as to audiovisual works

More information

Cisco Disaster Recovery: Best Practices White Paper

Cisco Disaster Recovery: Best Practices White Paper Table of Contents Disaster Recovery: Best Practices White Paper...1 Introduction...1 Performance Indicators for Disaster Recovery...1 High Level Process Flow for Disaster Recovery...2 Management Awareness...2

More information

Council Monitoring & Assessment Program Development

Council Monitoring & Assessment Program Development Council Monitoring & Assessment Program Development Steve Giordano & Mark Monaco, Na9onal Oceanic & Atmospheric Administra9on Greg Steyer & Mike Lee, U.S. Geological Survey Alyssa Dausman & Jessica Henkel,

More information

Operational Continuity

Operational Continuity Solution Brief Operational Continuity Achieve Maximum Uptime In a recent speech, Omar Sherin of the Qatar CERT, shared how they shifted their focus from protection and detection to response in the wake

More information

How Strong is Your Network Recovery Plan?

How Strong is Your Network Recovery Plan? PLAYING IT SAFE: How Strong is Your Network s Disaster Recovery Operation? Executive Survey Summary October 2010 In Partnership with: Produced by: Introduction Government Technology, working in partnership

More information

Community and Economic Development: Collaborative Leadership To Promote Regional Workforce Development

Community and Economic Development: Collaborative Leadership To Promote Regional Workforce Development Community and Economic Development: Collaborative Leadership To Promote Regional Workforce Development Presented By: Todd Greene Vice President ATLANTA SKYLINE Photo by Chuck Koehler, Creative Commons

More information