Disaster Recovery Planning and Implementa6on. Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University
|
|
- Pearl Robinson
- 8 years ago
- Views:
Transcription
1 Disaster Recovery Planning and Implementa6on Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University
2 Agenda Background for York s I.T. Disaster Recovery Planning and Ini6al Hurdles Major Implementa6on Steps Expanding outside the main data centre Physically diverse cable plant Resilient/redundant networks and systems Lessons Learned Next Steps
3 Star6ng Out with Disaster Recovery Planning Educause survey results in 2007: 17% of responding ins6tu6ons had completed DR plans for central I.T. If it was easy, someone would have already done it.
4 Project start: January 2003 Genesis of York s I.T. DRP Ini6a6ve Sponsored by CIO and VP Finance and Administra6on Intended to be a mul6 phase, mul6 year effort Scope: Systems: key informa6on systems Scenarios: localized disaster or failure A lot of defini6on s6ll to be desired
5 Where DO you start? Easy to feel overwhelmed Best Prac6ces variety of sources ITIL, COBIT, ISO17799, etc. Good informa6on but these will not take into account resource considera6ons, compe6ng priori6es, ins6tu6onal poli6cs, etc. Scope (Systems, Scenarios) must s6ll be defined
6 Disaster Recovery Threat Assessment Proximity to heavy industry Oil depot across street Near intersec6on of major highways (400 & 407) Freight train corridor (chemical spill 1980) Main Campus is on airport flight path Main data centre in basement of old building High traffic area (library, with washrooms) located directly above Worst-case scenario chosen: Loss of building containing main data centre
7 Typical DRP Phases 1: Risk Assessment 2: Architecture/Recovery Strategies 3: Implementa6on 4: Tes6ng 5: Sustain Program (loop back to 1) First What systems are you planning for?
8 First Phase: Business Impact Assessment/Cri6cality Analysis Business Con6nuity vs. Disaster Recovery not the same thing: BC: Considers the academic, research and business func6oning of the ins6tu6on as a whole. Includes risk assessment, and plans for func6onal units and business processes. Poten6ally wider variety of scenarios to consider. DR: Ac6vi6es to enable recovery to an acceptable condi6on aner a disaster. BC includes DR. DR requires guidance from BC to direct priori6es and set scope.
9 Cri6cality Assessment (CA) Engaged func6onal unit leaders and I.T. support areas Asked to gauge effect on loss of I.T. systems on business processes, loss of business processes on the mission of the University Asked to iden6fy maximum tolerable outages and data loss Results Greater than 50% of business processes ranked cri6cal very high cost to implement DR measures Reality Check: everyone s work is cri6cal at some point the findings did not agree with observed impacts from lesser scale outages VP and AVP consulta6ons final step to ra6onalizing CA Costs of DR implementa6on < Risk of delayed business processes
10 Risk Management
11 Service Classifica6ons Category Objec.ves Service Types 1 RTO,RPO<4hr Safety, Primary Communica6ons 2 RTO<72hrs Cri6cal Customer and Partner Interfaces 3 RTO<7 days Primary Customer and Partner Interfaces 4 RTO<14 days Secondary Customer and Partner Interfaces 5 RTO<30 days Departmental 6 RTO>30 days All Others RTO = Recovery Time Objective, max time between incident and system recovery RPO = Recovery Point Objective, max acceptable data loss between incident and data restore point Major systems are grouped into these categories
12 DRP Phase 2: Architecture Task: Design systems and infrastructure to support recovery objec6ves Infrastructure not categorized; recovery objec6ves variable depending on reliant services Clear vulnerabili6es: Main Data Centre Fibre/Cable Plant Network (LAN, WAN)
13 Architecture: Recovery Strategies Category Recovery Strategy 1 On or Off campus Hot site, ac6ve mirror or synchronized data copy 2 On or Off campus Hot site, async data copy or restore from disk backup 3 On or Off campus Hot site, promote QA, restore from backup 4 On or Off campus cold site, repurpose hardware, restore from backup 5 On or Off campus cold site, replacement or consolidated hardware 6 On or Off campus cold site, replacement or consolidated hardware
14 DRP Phase 3: Implementa6on Infrastructure work completed for: Cable Plant Off campus Data Centre On campus alternate Data Centre WAN (in progress) Some design work s6ll progressing (Network) None of this is men6oned in any DR category, it just has to be there
15 Steacie Data Centre
16 Cable Plan Modifica6ons Historical: low cost star configura6on, no DR capability or rerou6ng op6ons Solu6on: retrofit ring like topology Start with selected physical fibre aggrega6on points Added new fibre to provide alternate connec6vity to these points, leading to new data centre in another building (500m distant, not in basement, former dance studio)
17 Cable Plant
18 Cable Plant DR Modifica6ons
19 Power Redundant power feeds, but no generator University co genera6on plant expected to provide backup power to building in the event of a loss This proved false, co gen does not have capability to direct output to selected buildings, and does not have capacity to serve en6re campus. Only 6me in 40 years both feeds have been down was Aug New alternate data centre has generator, more robust than main facility
20 Cooling Data centre usage always growing Density increasing along with server count helps reduce increased need for physical space High density equipment need more power/area More power/area means more cooling/area Airflow also a concern cubic metres/min Failure of cooling as bad as power failure S6ll working on refinements to resiliency Make sure to size backup power to include A/C
21 Co loca6on Site RFP in 2007, 9 racks of equipment Sufficient for priority systems: SIS, ERP, , Web, LMS, virtual tape library and part of backup system Telus IDC Selected, 15km distant Deployment as hot/produc6on site in progress WAN upgrade with L2 na6ve fibre connec6vity (currently 1Gbit) plus redundant connec6ons to the Keele campus
22 Network Survivability Designing alternate network core to be located at alternate on campus data centre WAN Upgrade Greatly enhanced performance L2 na6ve fibre connec6vity to Telus IDC Physically diverse links to off campus, and to fibre aggrega6on points on campus where possible
23 Off Campus Storage and Backup System Redesigning Backup and storage systems to u6lize WAN + on & off campus data centres Disk staging/virtual tape for backup system Stop duplica6ng tapes, they are already offsite Mirroring and/or replica6on for short RPO systems
24 Telecom System Survivability TDM Technology Not going to rip & replace Not going to expand for redundancy U6lize IP telephony and leverage DR capable network TDM/IP gateways to bridge non IP phones Arrangements with telecom provider to temp reroute calls Finally, deploy DR capable telecom system to use both on campus data centres similar to network
25 DRP Documenta6on Refresh Revising classifica6on of systems to match new technical capabili6es Adapt to changing business processes and needs Tes6ng Phase: Walkthrough exercises at minimum (done) Bare metal rebuilds/restores as SOP DR fire drill poten6al
26 Planets must be aligned Lessons Learned Execu6ve, Management (technical and business), Staff Resources all commiwed lack of any probably means it won t happen Risk Assessment par6cipa6on by business units and execu6ve review Technical: Virtualiza6on helps solve a lot of problems, but S6ll runs on real hardware, s6ll need all the usual elements: alternate sites, power, cooling and the network to get there
27 Lessons Learned Recovery is good, resiliency is bewer Some6mes not much extra effort to go from fast recovery to simply not going down at all When can you claim victory? Be realis6c No plan survives contact with the enemy Failure to plan is planning to fail Can t plan for every scenario, but the act of DR planning can be as useful as the completed plans affects thinking, start asking what if much more
28 Next Steps Finish what we started with infrastructure build out WAN/network connec6vity upgrade Resilient/Redundant Network Redesigned Backups and Storage Systems for Geo diversity Deployment to hot site Refresh of DR Plans to occur annually Incorporate applica6on level into planning Improve linkages with University Emergency Planning Provide more basis for Business Con6nuity Plans
29 Ques6ons
An introduction to disaster recovery. And how DrAAS from I.R.I.S. Ondit can help!
An introduction to disaster recovery And how DrAAS from I.R.I.S. Ondit can help! Events That Impact Information Availability Events that require a data center move: Fewer than 1% of occurrences Natural
More informationProtec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items
More informationDDC Sequencing and Redundancy
DDC Sequencing and Redundancy Presenter Sequencing Importance of sequencing Essen%al piece to designing and delivering a successful project Defines how disparate components interact to make up a system
More informationIT Change Management Process Training
IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge
More informationData Center 2020. DC planning for the next 5 10 years. Copyright 2004-2013 Experture and Robert Frances Group, all rights reserved
DC planning for the next 5 10 years Topics to be Discussed Introduc=on Indirect Drivers Technology Direct Drivers Data Center DC Management DC Opera=ons s and Disaster Recovery 2 Introduc=on The future
More informationUpdate on the Cloud Demonstration Project
Update on the Cloud Demonstration Project Khalil Yazdi and Steven Wallace Spring Member Meeting April 19, 2011 Project Par4cipants BACKGROUND Eleven Universi1es: Caltech, Carnegie Mellon, George Mason,
More informationUpdate on the Cloud Demonstration Project
Update on the Cloud Demonstration Project Steven Wallace Joint Techs Summer 2011 13- July- 2011 Project Par4cipants BACKGROUND Twelve Universi,es: Caltech, Carnegie Mellon,Cornell George Mason, Indiana
More informationWhy Buy Eaton: Trusted Source to Manage Power
Why Buy Eaton: Trusted Source to Manage Power If you are responsible for power protec0on for small or medium data centers, Eaton can help you deliver a reliable power source for your business. Target Markets:
More informationEffec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist
More information10 Steps to Preparedness
10 Steps to Preparedness Key Take- Aways Review basics of disaster recovery and con2nuity of opera2ons. Understand what you can do to prepare your pool and its members for an unplanned interrup2on. Ini2ate
More informationUAB Cyber Security Ini1a1ve
UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment
More informationArchitec;ng Splunk for High Availability and Disaster Recovery
Copyright 2014 Splunk Inc. Architec;ng Splunk for High Availability and Disaster Recovery Dritan Bi;ncka BD Solu;on Architecture Disclaimer During the course of this presenta;on, we may make forward- looking
More informationMigra'ng AmLight from legacy to SDN: Challenges, Results and Next Steps
NANOG 63 February 04th 2015 Migra'ng AmLight from legacy to SDN: Challenges, Results and Next Steps Jeronimo A. Bezerra Florida Interna3onal University Agenda Who are we? What is SDN?
More informationContents. Foreword. Acknowledgments
Foreword Preface Acknowledgments xv xvii xviii CHAPTER 1 Introduction 1 1.1 What Is Mission Critical? 1 1.2 Purpose of the Book 2 1.3 Network Continuity Versus Disaster Recovery 2 1.4 The Case for Mission-Critical
More informationLegacy Archiving How many lights do you leave on? September 14 th, 2015
Legacy Archiving How many lights do you leave on? September 14 th, 2015 1 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory
More informationData Management in the Cloud: Limitations and Opportunities. Annies Ductan
Data Management in the Cloud: Limitations and Opportunities Annies Ductan Discussion Outline: Introduc)on Overview Vision of Cloud Compu8ng Managing Data in The Cloud Cloud Characteris8cs Data Management
More informationDeveloping a Full- Spectrum Security Training Program
Developing a Full- Spectrum Security Training Program Wayne State University Compu3ng & Informa3on Kevin Hayes, CISSP, CISM Informa)on Security Officer Geoff Nathan Faculty Liason Agenda Background Our
More informationSan Jacinto College Banner & Enterprise Applica5on Review Task Force Report. November 01, 2011 FINAL
San Jacinto College Banner & Enterprise Applica5on Review Task Force Report November 01, 2011 FINAL 1 Content Review goal and approach 3 Barriers to effec5ve use of Banner: Consultant observa5ons 10 Consultant
More informationDirect Fibre Data Centre Telephone Internet Virtual and Hosted Services Professional Services
Direct Fibre Data Centre Telephone Internet Virtual and Hosted Services Professional Services Direct Fibre! IAI is well known for its exper@se in managing, opera@ng, and connec@ng customers to its extensive
More informationPhone Systems Buyer s Guide
Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers
More informationElliptical Mobile Solutions Data Center Solutions
Elliptical Mobile Solutions Data Center Solutions The Next Genera-on of Modular Data Centers Copyright Ellip.cal Mobile Solu.ons 2010 www.ellip.calmobilesolu.ons.com 1 EMS CURRENT PRODUCTS BENEFITS We
More informationKaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars
Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on
More informationDisaster Recovery & Business Continuity Dell IT Executive Learning Series
Disaster Recovery & Business Continuity Dell IT Executive Learning Series Presented by Rich Armour, Debi Higdon & Mitchell McGovern THIS PRESENTATION SUMMARY IS FOR INFORMATIONAL PURPOSES ONLY AND MAY
More informationCase Study. The SACM Journey at the Ontario Government
Case Study The SACM Journey at the Ontario Government Agenda Today s Objec=ves The Need for SACM Our SACM Journey Scope and Governance Process Ac=vi=es Key Process Roles Training and Measurement Lessons
More informationNetwork Performance Tools
Network Performance Tools Jeff Boote Internet2/R&D June 1, 2008 NANOG 43/ Brooklyn, NY Overview BWCTL OWAMP NDT/NPAD BWCTL: What is it? A resource alloca=on and scheduling daemon for arbitra=on of iperf
More informationFounda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael
More informationInforma.on Systems in Organiza.ons
Informa.on Systems in Organiza.ons MIS 2101 Week 7 / Chapter 7 Enhancing Business Processes Using Enterprise Informa.on Systems Photo: Objet Mathema+que by Man Ray, 1934 Chapter 7 Learning Objec.ves Core
More informationCan Cloud Hos+ng Providers Really Replace. Your Cri(cal IT Infrastructure?
Can Cloud Hos+ng Providers Really Replace Your Cri(cal IT Infrastructure? Housekeeping Welcome to Align s Webinar Can Cloud Hos+ng Providers Really Replace Your Cri(cal IT Infrastructure? Informa+on for
More informationHelp Framework. Ticket Management Ticket Resolu/on Communica/ons. Ticket Assignment Follow up Customer - communica/on System updates Delay management
Help for JD Edwards Our Help Framework Ticket qualifica/on Ticket crea/on Ticket Rou/ng Closures L1 issues Resolu/on KG SOPs Co- ordinate Ticket Assignment Follow up Customer - communica/on System updates
More informationTim Blevins Execu;ve Director Labor and Revenue Solu;ons. FTA Technology Conference August 4th, 2015
Tim Blevins Execu;ve Director Labor and Revenue Solu;ons FTA Technology Conference August 4th, 2015 Governance and Organiza;onal Strategy PaIerns of Fraud and Abuse in Government What tools can we use
More informationConnec(ng to the NC Educa(on Cloud
NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are
More informationLeveraging the Hybrid Cloud For Complete Data Protec:on. Private Public Managed
Leveraging the Hybrid Cloud For Complete Data Protec:on Private Public Managed Agenda Introduc>ons What is the Hybrid Cloud Data Protec>on Key Concepts Backup vs. Disaster Recovery How can I achieve Complete
More informationMAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term
MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al
More informationThe Big Bang: cloud resiliency and the data explosion
Deborah Orr, Forbes Insights Analyst Daniel Witteveen, Director, IBM Cloud Managed Backup and Data Virtualization 03/23/2015 The Big Bang: cloud resiliency and the data explosion 2015 IBM Corporation Agenda
More informationAIS TECHNOLOGY SOLUTIONS GUIDE
AIS TECHNOLOGY SOLUTIONS GUIDE WHAT IS AIS AT TECH DATA? Advanced Infrastructure Solutions provide resellers with everything they need to keep their data centers up-to-date with the latest technology.
More informationBusiness Con'nuity & Pa'ent Safety
Business Con'nuity & Pa'ent Safety Why are we doing BCP? It has a direct impact on Pa'ent Safety and our overall opera'ons We ve already had outages and experienced first hand when things aren t working
More information9/23/2013. Disaster Recovery Planning Best Practices. Over the Next Decade. 75X growth in files. 50X growth in data. 10X growth in servers
Disaster Recovery Planning Best Practices Mohammad Alshafie, Systems Engineer mo@unitrends.com Harold Schmoecker, Regional Sales VP harold@unitrends.com Over the Next Decade 75X growth in files 50X growth
More informationcourtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P
courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview Business Continuity, Disaster Recovery and Data Center Consolidation IT managers today must be ready for the
More informationHow To Manage A Mobile Device Management At Harvard
Demys&fying Mobile Device Management Challenges Indir Avdagic Director of Informa.on Security and Risk Management, SEAS Objec&ves Our hope is that this conversa0on will get people thinking about mobile
More informationHow To Protect Virtualized Data From Security Threats
S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust
More informationHow to Design and Implement a Successful Disaster Recovery Plan
How to Design and Implement a Successful Disaster Recovery Plan Feb. 21 ASA Office-Administrative Section is Sponsored by Today s ASAPro Webinar is Brought to You by the How to Ask a Question Questions
More informationPrivileged Administra0on Best Prac0ces :: September 1, 2015
Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program
More informationDTCC Data Quality Survey Industry Report
DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6
More informationBackup and Recovery 1
Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup
More informationC24 - Inside the Data Center Andrew J. Luca
C24 - Inside the Data Center Andrew J. Luca Inside the Data Center What an auditor needs to know Course Objectives Understand the looks and feel of a data center Know what to look for and what questions
More informationTHE STATE OF IT RECOVERY FOR SMBS: A SURVEY OF IT PROFESSIONALS
Introduction Unscheduled downtime can have dramatic impacts on business results. Outages are detrimental to any business, regardless of its size. With increasingly complex and critical IT environments,
More informationDisaster Recovery Checklist Disaster Recovery Plan for <System One>
Disaster Recovery Plan for SYSTEM OVERVIEW PRODUCTION SERVER HOT SITE SERVER APPLICATIONS (Use bold for Hot Site) ASSOCIATED SERVERS KEY CONTACTS Hardware Vendor System Owners Database Owner
More informationLeveraging Virtualization for Disaster Recovery in Your Growing Business
Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster
More informationData Warehousing. Yeow Wei Choong Anne Laurent
Data Warehousing Yeow Wei Choong Anne Laurent Databases Databases are developed on the IDEA that DATA is one of the cri>cal materials of the Informa>on Age Informa>on, which is created by data, becomes
More informationGrowing a Student Environmental Resource Center. Hanna Morris Manon von Kaenel Katherine Walsh
Growing a Student Environmental Resource Center Hanna Morris Manon von Kaenel Katherine Walsh AGENDA A Brief History Determining a Need for a Center Challenges Mission and Objec
More informationInterna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
More informationProtecting your Enterprise
Understanding Disaster Recovery in California Protecting your Enterprise Session Overview Why do we Prepare What is? How do I analyze (measure) it? What to do with it? How do I communicate it? What does
More informationRajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747
Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Introduction Rajesh Gupta - rajgupta@deloitte.com Solution Network
More informationConfigura)on Management Process and Environment MACS Review 1 February 5th, 2010 Roland Moser
Configura)on Management Process and Environment MACS Review 1 February 5th, 2010 Roland Moser R. Gutleber 1 Goals Configura)on Management (CM) is the implementa)on and the execu)on of processes and procedures
More informationDisaster Recovery 101. Sudarshan Ranganath & Matthew Phillips Ellucian
Disaster Recovery 101 Sudarshan Ranganath & Matthew Phillips Ellucian SESSION OBJECTIVES Business continuity is critical to every institution and its IT organization. How do you set up your ERP and other
More informationPaco Hope <paco@cigital.com> Florence Mo ay <fmo ay@cigital.com> 2012 Cigital. All Rights Reserved. SecAppDev. Define third party so ware
Paco Hope Florence Moay 2012 Cigital. All Rights Reserved. SecAppDev 1 Objectives Define third party soware What it is, why we use it Define the risks from third
More informationDISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES
DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES Dejan Živanović EMC Technology Solutions Group SEE Presales Manager Dejan.Zivanovic@emc.com 1 The Business Maturity Model V Enabled Web
More informationOhio Conference for Payroll Professionals Disaster Recovery
Ohio Conference for Payroll Professionals Disaster Recovery Speaker Bruce E. Phipps CPP 2011 APA Payroll Man of the Year Principal Product Manager US Legislative Analyst ORACLE Corporation bruce.phipps@oracle.com
More informationPlanning for Disaster Disaster
Planning for Disaster Ramesh Ramani CISM CGEIT Ramesh Ramani CISM CGEIT Paramount-Dubai Agenda Disaster Management-Introduction Examples BCP and IT Continuity Process of Disaster Management-PDCA Disaster
More informationOnline Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1
Online Enrollment Op>ons - Sales Training 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Agenda Understand Why This is Important Enrollment Op>ons Available EDI Blues Enroll
More informationWhy Should Companies Take a Closer Look at Business Continuity Planning?
whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters
More informationAvailability and Disaster Recovery: Basic Principles
Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer
More informationThe Surprising Truth About Your DR Maturity Level
The Surprising Truth About Your DR Maturity Level Todd Scallan VP, Product & Engineering tscallan@axcient.com Daniel Kuperman Sr. Manager Product Marketing dkuperman@axcient.com Agenda 1 Context: Why do
More informationVeeam Backup and Replication Architecture and Deployment. Nelson Simao Systems Engineer
Veeam Backup and Replication Architecture and Deployment Nelson Simao Systems Engineer Agenda Veeam Backup Server / Proxy Architecture Veeam Backup Server / Backup Proxy Backup Transport Modes Physical
More informationMobility in the Modern Factory. Discussion of Mobile Adop7on for the Factories of the Future
Mobility in the Modern Factory Discussion of Mobile Adop7on for the Factories of the Future Talking Points History Lesson The Reasons for Going Mobile Mobile Infrastructure Mobile Device Security BYOD
More informationComputer Security Incident Handling Detec6on and Analysis
Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION
More informationBusiness Con*nuity with Docker
CloudOpen Japan 2015 Business Con*nuity with Docker 2015/06/04 Yoshitaka Kuwata Muroran Ins*tute of Technology Overview of Talk 1. Who is Talking 2. Mo*va*on of Disaster Recovery 3. Exis*ng Solu*ons 4.
More informationFirst Na)on Project Management Boot Camp
First Na)on Project Management Boot Camp Links to Learning - Ontario: Building a Sustainable Future Thunder Bay, Ontario What is a Project / Project Management? A project can be defined as a temporary
More informationCan Your Centre Recover from a IAAO. June 4, 2013 Lead by The Ontario Universities Application Centre
Can Your Centre Recover from a Disaster? IAAO June 4, 2013 Lead by The Ontario Universities Application Centre B Agenda 1.OUAC s Disaster Recovery Activity 2.Definitions i i 3.Has anyone had a disaster?
More informationCloud-Based Commissioning. Dale Davis Mark Walter Keithly Barber Associates
Cloud-Based Commissioning Dale Davis Mark Walter Keithly Barber Associates AIA Quality Assurance The Building Commissioning Association is a Registered Provider with The American Institute of Architects
More information<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures
1 Refreshing Your Data Protection Environment with Next-Generation Architectures Dale Rhine, Principal Sales Consultant Kelly Boeckman, Product Marketing Analyst Program Agenda Storage
More informationBeyond Strategy: Building Your Mobile Capabili6es
Beyond Strategy: Building Your Mobile Capabili6es TASSCC Technology Educa6on Conference April 10, 2015 Presented by: Raj Polikepa6 Director of App Development Texas.gov Agenda ê Objec6ves of Mobile Strategy
More informationBusiness Continuity & Recovery Plan Summary
Introduction An organization s ability to survive a significant business interruption is determined by the company s ability to develop, implement, and maintain viable recovery and business continuity
More informationDisaster Recovery for Ingres. Abstract
Disaster Recovery for Ingres A general disaster recovery discussion followed by Ingres specific issues and recommendations 2002-2003 Comprehensive Consulting Solutions, Inc., All rights reserved. Abstract
More informationCloud Risks and Opportunities
Cloud Risks and Opportunities John Howie COO Cloud Security Alliance #SCCLondon About the Cloud Security Alliance Global, not- for- profit organiza;on Building security best prac;ces for next genera;on
More informationHow To Back Up A Virtual Machine
2010 Symantec Disaster Recovery Study Global Results Methodology Applied Research performed survey 1,700 enterprises worldwide 5,000 employees or more Cross-industry 2 Key Findings Virtualization and Cloud
More informationBusiness Continuity & Recovery Plan Summary
Introduction An organization s ability to survive a significant business interruption is determined by the company s ability to develop, implement, and maintain viable recovery and business continuity
More informationExchange of experience from a SuccessFactors LMS Implementa9on
Exchange of experience from a SuccessFactors LMS Implementa9on Seen from a user perspective Hanne Vasshus Ask Competency Management Cau9onary Statement The following presenta9on includes forward- looking
More informationSocial Media Marke-ng for Academic Research
Social Media Marke-ng for Academic Research 1 David Altman Mar.n Son Susu Wong @MassTTC #Social @TOMO3603 Using Social Media in Technology Licensing Offices 2 David Altman Manager Marke9ng and Communica9ons
More informationBalancing Usability and Security for Medical Devices
Balancing Usability and Security for Medical Devices Ken Hoyme Adven&um Labs ken.hoyme@adven8umlabs.com Robert North, LLC bnorth@humancenteredstrategies.com March 17, 2014 3/17/2014 2014 Adven8um Labs
More informationBuilding your Server for High Availability and Disaster Recovery. Witt Mathot Danny Krouk
Building your Server for High Availability and Disaster Recovery Witt Mathot Danny Krouk Terminology Whoa! Resiliency High Availability RTO Round Robin Business Continuity A Spectrum, Not a Switch Backup
More informationCS 5150 So(ware Engineering System Architecture: Introduc<on
Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering System Architecture: Introduc
More informationSan Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP
Presented by Mike O. Villegas, CISA, CISSP Agenda Information Security (IS) Vision at Newegg.com Typical Issues at Most Organizations Information Security Governance Four Inter-related CoBIT Domains ISO
More informationFrom Big Data to Value
From Big Data to Value The Power of Master Data Management 2.0 Sergio Juarez SVP Elemica EMEA & LATAM Reveal Oct 2014 Agenda Master Data Management Why Now? What To Do? How To Do It? What s Next? Today
More informationIT Governance in Organizations Experiencing Decentralization. Jelena Zdravkovic
IT Governance in Organizations Experiencing Decentralization Jelena Zdravkovic Department of Computer & Systems Sciences (DSV), Stockholm University, Sweden Giannoulis About the Speaker Title: Associate
More informationBacula Open Source Project Bacula Systems (professional support)
Bacula Open Source Project Bacula Systems (professional support) The Enterprise Ready Open Source Network Backup Solu
More informationBest Prac*ces for Deploying Oracle So6ware on Virtual Compute Appliance
Best Prac*ces for Deploying Oracle So6ware on Virtual Compute Appliance CON7484 Jeff Savit Senior Technical Product Manager Oracle VM Product Management October 1, 2014 Safe Harbor Statement The following
More informationPost-Class Quiz: Business Continuity & Disaster Recovery Planning Domain
1. What is the most common planned performance duration for a continuity of operations plan (COOP)? A. 30 days B. 60 days C. 90 days D. It depends on the severity of a disaster. 2. What is the business
More informationUnderstanding Cloud Compu2ng Services. Rain in business success with amazing solu2ons in Cloud technology
Understanding Cloud Compu2ng Services Rain in business success with amazing solu2ons in Cloud technology What is Cloud Compu2ng? Cloud compu2ng encompasses various services and ac2vi2es carried out over
More informationHOW TO PREPARE A DATA CENTER STRATEGY. What you need to know to build a business case for Data Center sourcing
HOW TO PREPARE A DATA CENTER STRATEGY What you need to know to build a business case for Data Center sourcing Presented by: Gary Davis Principal PlanNet Consulting (714) 982-5886 Steve Miano Principal
More informationSourcing the WAN One or Many? (Enterprise Case Study)
Sourcing the WAN One or Many? (Enterprise Case Study) Taki Remtulla CTO & Partner at ABILITA New York, April 2014 Two Enterprise Case Studies Major Oil Company in the Middle East & Financial Ins9tu9on
More informationPoten&al Impact of FDA Regula&on of EMRs. October 27, 2010
Poten&al Impact of FDA Regula&on of EMRs October 27, 2010 Agenda The case for regula&ng Impact on manufacturers Impact on providers Recommenda&ons and best prac&ces 2 A Medical Device Is an instrument,
More informationVoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov
VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security
More informationRunning Successful Disaster Recovery Tests
Running Successful Disaster Recovery Tests Understanding the DR Process Running Successful Disaster Recovery Tests Understanding the DR Process Presented by Ray Lucchesi President Silverton Consulting,
More informationIs Cloud-Based WMS an Option for Complex Distribution Centers?
Welcome to Session 233 Is Cloud-Based WMS an Option for Complex Distribution Centers? Presented by: Sponsored by: Chuck Fuerst 2012 Material Handling Industry. Copyright claimed as to audiovisual works
More informationCisco Disaster Recovery: Best Practices White Paper
Table of Contents Disaster Recovery: Best Practices White Paper...1 Introduction...1 Performance Indicators for Disaster Recovery...1 High Level Process Flow for Disaster Recovery...2 Management Awareness...2
More informationCouncil Monitoring & Assessment Program Development
Council Monitoring & Assessment Program Development Steve Giordano & Mark Monaco, Na9onal Oceanic & Atmospheric Administra9on Greg Steyer & Mike Lee, U.S. Geological Survey Alyssa Dausman & Jessica Henkel,
More informationOperational Continuity
Solution Brief Operational Continuity Achieve Maximum Uptime In a recent speech, Omar Sherin of the Qatar CERT, shared how they shifted their focus from protection and detection to response in the wake
More informationHow Strong is Your Network Recovery Plan?
PLAYING IT SAFE: How Strong is Your Network s Disaster Recovery Operation? Executive Survey Summary October 2010 In Partnership with: Produced by: Introduction Government Technology, working in partnership
More informationCommunity and Economic Development: Collaborative Leadership To Promote Regional Workforce Development
Community and Economic Development: Collaborative Leadership To Promote Regional Workforce Development Presented By: Todd Greene Vice President ATLANTA SKYLINE Photo by Chuck Koehler, Creative Commons
More information