SECURITY SUMMIT 2014: EVOLUZIONE DELLA BUSINESS CONTINUITY E RUOLO DEL DISASTER RECOVERY

Size: px
Start display at page:

Download "SECURITY SUMMIT 2014: EVOLUZIONE DELLA BUSINESS CONTINUITY E RUOLO DEL DISASTER RECOVERY"

Transcription

1 SECURITY SUMMIT 2014: EVOLUZIONE DELLA BUSINESS CONTINUITY E RUOLO DEL DISASTER RECOVERY 20 March 2014 Corradino Corradi Vodafone Italy Head of ICT Security & Fraud Management

2 Business Continuity vs. Disaster Recovery: Two professions looking for connections BC Manager D/R Manager Risk oriented Focus on all processes and critical activities (business resilience) RTO/RPO as operational indicator Report to CRO or Corporate Security Technology oriented Focus on information protection (IT & Network uptime) Service catalogue (SLA) and daily system downtime (availability 99.99%) Report to CTO or CIO New governance From contrast to confrontation and active cooperation

3 BCM responsibilities Worldwide statistics C-level executive with ultimate reporting responsibility BCM Program Leader Job title of the executive sponsor for organization s BCM programs Job title of the BCM program sponsor Source: Continuity Insights & KPMG LLP Global BCM Program Benchmarking Study

4 BCM responsibilities Italian scenario Is BCM managed internally or externally? When BC is managed internally, who does the BC manager report to? Externally 21% Internally 79% 24% 28% 48% ICT Manager CEO/Managing Dir. Other Source: ASIS and AIPSA surveys

5 Top 10 operational risks (2013) 1. IT sabotage 2. Reputational damage 3. Incentives and compensation 4. Fraud and customer data abuse 5. Epidemic disease 6. Political intervention 7. Sanctions and AML compliance 8. Emerging market operating risks 9. Business continuity and disaster recovery Source: IT matters and plays a critical role in the definition of the public and private enterprises Business Continuity plans

6 Top 10 Infrastructure Issues that CIOs need to include in IT Strategy 1. Users will not be centrally located The day of a central office that controls the ebb and flow of information from the field is gone 2. Users can be anywhere in the world As business branch out and the global economy takes over the infrastructure will have to address access and control from multiple locations 3. The work day no longer is 9 to 5 As more users are in different time zones responses for things like service centers will need to be 7 by Holidays and week-ends do not matter In much of the world the weekend as we know it in the US is not the same and Thanksgiving and Christmas are not celebrated around the world. 5. The language barrier needs to be crossed When someone who does not speak English interacts with the infrastructure it must be adaptable to meet their needs in their local language 6. Applications need to be mobile Smartphones and tablets are taking over the world of computing and applications need to be available to them 7. Security and privacy need to be balanced with the needs of everyone in the product service chain of the enterprise 8. Compliance will only become more complex Not only do applications and data need to comply with local legislation but the infrastructure needs to be able to adjust to new more demanding and diverse requirements 9. Data capture and dissemination need to be productive Data need to be captured once (accurately) and then harnessed so that the infrastructure can leverage it productively 10. Business never stops and the Business Continuity and Disaster Recovery plans need to keep that in mind Source: Janco Associates. Inc.

7 10 Business Continuity Predictions for getting to grips with Business Resilience 1. Business Resilience we ll see the move from an academic discussion to one more practical; the debate will continue as to whether this is a rebranding exercise or a substantive change. 2. Security, risk and business continuity professionals will continue to look at synergies while recognizing that each discipline actually deals with different challenges. 3. IT will still dominate BC thinking but refreshed under the cyber threat, big data, cloud and mobility services. The cyber threat will start to move on from its hype phase to a more sophisticated, nuanced understanding. 4. Contingency planning will become fashionable again as part of a broader understanding of Business Continuity which includes continuity capability and crisis response. 5. ISO 22301, the new international Business Continuity Management standard, will start to take-off with certificates issued in more than one country. 6. Regulators will question whether the answer to resilience is more regulation; alternative, market-driven methods will be explored. 7. There will be some high profile business continuity failures, where the actual Business Continuity Management team will not be involved at all. Discussions on extending Business Continuity concepts more broadly will still be a minority activity. 8. Sustainability as a driver for Business Continuity will still be in the wings, waiting for its call onto the stage. 9. Service failures by outsourcers will put continued pressure on globalised service delivery models that don t consider resilience. Business Continuity professionals will need to get the economic case for Business Continuity on the table. 10. Social media will continue to present both a challenge and opportunity for business continuity professionals, as it provides opportunities for early visibility of issues and effective crisis communications, while equally being a source of misinformation and a medium to fan the flames of a crisis. Source: The BC Eye

8 Gartner: the Nexus of Forces Changes Everything IT, Business, Society

9 Business Continuity vs. Disaster Recovery Interest through time... Parted means losing! Trend Italia * ** Business Continuity Disaster Recovery Crisis Management Source: Google * 31/12/2006: deadline applicazione Direttiva Banca d Italia "Continuità operativa in casi di emergenza ** Incidente Costa Concordia Resource and/or workload constraints (35%) whenever possible, combine the skills and forces of BC and D/R mangers Planning and anticipation (33%) regulation is not necessarily bad

10 Conclusions Need for greater dialogue between the BC Managers and D/R Managers Need for renewed governance mechanisms (committees, working groups) promoting integration and dialogue Shared managerial and operational performance goals to "row in the same direction Joint adoption of international standards (e.g. ITIL, ISO 22301) to facilitate standardization and homogenization of projects, including the information management ones supporting the business, is a MUST both for Business Continuity Manager and Disaster Recovery Managers

11 Q & A

How to measure your business resiliency

How to measure your business resiliency How to measure your business resiliency Define the KPI s/kri s and scorecards to control your security and business continuity capabilities Krzysztof Pulkiewicz BCMLogic krzysztof.pulkiewicz@bcmlogic.com

More information

HOW TO CHOOSE A CLOUD BACKUP SERVICE PROVIDER

HOW TO CHOOSE A CLOUD BACKUP SERVICE PROVIDER HOW TO CHOOSE A CLOUD BACKUP SERVICE PROVIDER Why Should You Protect Your Data? Sooner or later by mischief, misfortune or mistake it is statistically likely that you will lose precious data. A 2007 Carnegie

More information

Trends in Information Technology (IT) Auditing

Trends in Information Technology (IT) Auditing Trends in Information Technology (IT) Auditing Padma Kumar Audit Officer May 21, 2015 Discussion Topics Common and Emerging IT Risks Trends in IT Auditing IT Audit Frameworks & Standards IT Audit Plan

More information

How to Choose a Cloud Backup Service Provider.

How to Choose a Cloud Backup Service Provider. How to Choose a Cloud Backup Service Provider. 1 How to Choose a Cloud Backup Service Provider Why Should You Protect Your Data? Sooner or later - by mischief, misfortune or mistake - it is statistically

More information

Endorsed by: Sponsored by: www.enterprisedata.com.au

Endorsed by: Sponsored by: www.enterprisedata.com.au Endorsed by: Sponsored by: www.enterprisedata.com.au Table of Contents Executive Summary...3 Survey Objectives...4 The Survey Process...5 Response Profile...6 Key Findings...7 Disruption Profile...9 Alternate

More information

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist for As the importance and value of corporate data grows, complex enterprise IT environments need

More information

How To Understand The State Of Business Continuity Preparedness

How To Understand The State Of Business Continuity Preparedness M ARKET STUDY The State of Business Continuity Preparedness Photo by Sergey Nivens Fotolia.com By STEPHANIE BALAOURAS Forrester Research and the Disaster Recovery Journal have partnered to field a number

More information

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Whitepaper: Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider WHITEPAPER Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist

More information

Boost BCM Program Maturity: Arm Your Team with the Right Tools. Jason Zimmerman Vice President Operations

Boost BCM Program Maturity: Arm Your Team with the Right Tools. Jason Zimmerman Vice President Operations Boost BCM Program Maturity: Arm Your Team with the Right Tools Jason Zimmerman Vice President Operations Gartner Rates Incident Management Systems Benefit High In their 2014 Hype Cycle Report, Gartner

More information

Business Continuity Trends and Risk Considerations Financial Executives International Portland Chapter June 12 2013

Business Continuity Trends and Risk Considerations Financial Executives International Portland Chapter June 12 2013 Business Continuity Trends and Risk Considerations Financial Executives International Portland Chapter June 12 2013 Chitra Gopalakrishnan Director KPMG LLP Agenda Introduction Business Continuity / Disaster

More information

South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy

South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy Reference No: CG 01 Version: Version 1 Approval date 18 December 2013 Date ratified: 18 December 2013 Name of Author

More information

IT Governance and IT Operations Bizdirect, Mainroad, WeDo, Saphety Lisbon, Portugal October 2 2008

IT Governance and IT Operations Bizdirect, Mainroad, WeDo, Saphety Lisbon, Portugal October 2 2008 IT Governance and IT Operations Bizdirect, Mainroad, WeDo, Saphety Lisbon, Portugal October 2 2008 Jan Duffy, Research Director Industry Insights Agenda About IDC Insights Today s organizational complexities

More information

Accenture Risk Management. Industry Report. Life Sciences

Accenture Risk Management. Industry Report. Life Sciences Accenture Risk Management Industry Report Life Sciences Risk management as a source of competitive advantage and high performance in the life sciences industry Risk management that enables long-term competitive

More information

Top 7 Best Practices for IT Service Continuity

Top 7 Best Practices for IT Service Continuity Top 7 Best Practices for IT Service Continuity Who should read this paper Organizational leads that influence and make decisions on Business Continuity practices for the business IT service continuity

More information

Contingency Plan 32 Success Secrets. Copyright by Philip Downs

Contingency Plan 32 Success Secrets. Copyright by Philip Downs Contingency Plan 32 Success Secrets Copyright by Philip Downs Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical,

More information

Cloud Computing Safe Harbor or Wild West?

Cloud Computing Safe Harbor or Wild West? IT Best Practices Series Cloud Computing Safe Harbor or Wild West? With IT expenditures coming under increasing scrutiny, the cloud is being sold as an oasis of practical solutions. It s true that many

More information

Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary

Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary Is cyber security now too hard for enterprises? Executive Summary Sponsors The creation and distribution of this study was supported by CGI, cybx and Fujitsu/Symantec. Premium sponsors: Gold sponsor: 2

More information

Berlin, 15 th November 2013. Mark Dunne SaaSAssurance

Berlin, 15 th November 2013. Mark Dunne SaaSAssurance Berlin, 15 th November 2013 Mark Dunne SaaSAssurance SaaSAssurance guidance to Irish Government on Cloud Adoption Who are SaaSAssurance? Diverse multilingual European team Focus on the here and now Digital

More information

Vendor Risk Management Financial Organizations

Vendor Risk Management Financial Organizations Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current

More information

Business Continuity Management Program Maturity Report - SAMPLE -

Business Continuity Management Program Maturity Report - SAMPLE - Business Continuity Management Program Maturity Report - SAMPLE - Prepared by BC Management, Inc. Benchmarking. Plan Ahead. Be Ahead. - Not Actual Data Table of Contents Introduction 4 Reporting History

More information

Best-in-Class Crisis Preparation:

Best-in-Class Crisis Preparation: Best-in-Class Crisis Preparation: Maximize Readiness with the Four T s Robert Edson Vice President, Global Sales and Marketing Business Continuity Readiness Overview Business Continuity Management (BCM)

More information

Data Center Consolidation: Lessons From The Field. John Tsiofas, Kraft Kennedy David Carlson, Kraft Kennedy

Data Center Consolidation: Lessons From The Field. John Tsiofas, Kraft Kennedy David Carlson, Kraft Kennedy Data Center Consolidation: Lessons From The Field John Tsiofas, Kraft Kennedy David Carlson, Kraft Kennedy Agenda Factors to consider Technology strategy Building a project team How to use vendors wisely

More information

Managed Services. The collaborative route to business transformation.

Managed Services. The collaborative route to business transformation. Managed Services The collaborative route to business transformation. Today s world never sleeps. Sourcing managers will also need individuals who understand, prioritize and support broader business goals,

More information

The State Of Business Continuity Preparedness

The State Of Business Continuity Preparedness 14 DISASTER RECOVERY JOURNAL WINTER 2012 MARKET STUDY The State Of Business Continuity Preparedness F DISASTER By STEPHANIE BALAOURAS orrester Research and the Disaster Recovery Journal have partnered

More information

- SAMPLE CUSTOMIZED REPORT - Business Continuity Program Benchmark Report

- SAMPLE CUSTOMIZED REPORT - Business Continuity Program Benchmark Report - SAMPLE CUSTOMIZED REPORT - Business Continuity Program Benchmark Report Customized & Prepared Exclusively for XXX Company July 16, 2009 Benchmarking. Plan Ahead. Be Ahead. HAVE YOU EVER NEEDED DATA TO

More information

Business Continuity and Risk Management. Ken Kaberia Principal BCM Officer, Enterprise Risk Safaricom Limited

Business Continuity and Risk Management. Ken Kaberia Principal BCM Officer, Enterprise Risk Safaricom Limited Business Continuity and Risk Management Ken Kaberia Principal BCM Officer, Enterprise Risk Safaricom Limited What does Business Continuity mean? Business Continuity Management- Definition Business Continuity

More information

CIBECS / IDG Connect DATA LOSS SURVEY. The latest statistics and trends around user data protection for business. www.cibecs.

CIBECS / IDG Connect DATA LOSS SURVEY. The latest statistics and trends around user data protection for business. www.cibecs. CIBECS / IDG Connect 2014 DATA LOSS SURVEY The latest statistics and trends around user data protection for business. REPORT www.cibecs.com 2 Table of ontents EXECUTIVE 01 02 03 04 05 06 SUMMARY WHO PARTICIPATED

More information

Hosted Exchange for Business

Hosted Exchange for Business Your complete guide to Hosted Exchange Hosted Exchange for Business 1 Table of Contents Hosted Desk- 3 What is Hosted Exchange? 3 What are the benefits of Hosted Exchange? 4 How easy is it to migrate to

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

Understanding Enterprise Risk Management. Presented by Dorothy Gjerdrum Arthur J Gallagher

Understanding Enterprise Risk Management. Presented by Dorothy Gjerdrum Arthur J Gallagher Understanding Enterprise Risk Management Presented by Dorothy Gjerdrum Arthur J Gallagher Learning Objectives Understand the components of a wellrun ERM program Review scope and process Explore the role

More information

BCM Data Research within a Business Intelligence Dashboard

BCM Data Research within a Business Intelligence Dashboard BCM Data Research within a Business Intelligence Dashboard A powerful, innovative assessment tool designed exclusively for the Business Continuity Profession Collecting BCM data metrics since 2000. The

More information

1.877.896.3611 www.infrascale.com

1.877.896.3611 www.infrascale.com White Paper Making the Upgrade: From Backup Vendor to Data Protection Platform nfrascaletm Simplify Your Business and Offer Customers Complete Data Protection Your customers are ready to explore data protection

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary

Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK Executive Summary Core statements I. Cyber security is now too hard for enterprises The threat is increasing

More information

US companies experience and attitudes towards security threats

US companies experience and attitudes towards security threats US companies experience and attitudes towards security threats Q u a n t i t a t i v e s u r v e y w i t h i n L a r g e a n d M e d i u m c o m p a n i e s i n t h e U S A Objectives Determine the existing

More information

Challenges & Trends. Differentiate & Innovate the Business Model. Optimize and streamline the Operations

Challenges & Trends. Differentiate & Innovate the Business Model. Optimize and streamline the Operations Consulting Challenges & Trends Differentiate & Innovate the Business Model Optimize and streamline the Operations The constantly evolving market context, increasingly driven by technological developments,

More information

How to Choose a Cloud Backup Service Provider

How to Choose a Cloud Backup Service Provider How to Choose a Cloud Backup Service Provider Why Should You Protect Your Data? Sooner or later - by mischief, misfortune or mistake - Odds are you will experience a data loss. Hardware failure, accidental

More information

TOP 7 REASONS WHY YOUR BUSINESS NEEDS TO UNDERSTAND THE CLOUD

TOP 7 REASONS WHY YOUR BUSINESS NEEDS TO UNDERSTAND THE CLOUD TOP 7 REASONS WHY YOUR BUSINESS NEEDS TO UNDERSTAND THE CLOUD Top 7 Reasons Why Your Business needs to Understand the Cloud! 1 Improve the future of your business impact! 5 Look in on your resources anytime!

More information

One major business challenge is maintaining and improving the efficiency and effectiveness of a company s information technology. Wouldn t it be nice

One major business challenge is maintaining and improving the efficiency and effectiveness of a company s information technology. Wouldn t it be nice Contents Managed IT Services Life Cycle Why ProActive SM Outsource Your IT Function Professional Services How Does It Work? How Do You Benefit? Disaster Recovery/Back-up Business Partners ANALYZE MANAGE

More information

RSA ARCHER BUSINESS CONTINUITY MANAGEMENT AND OPERATIONS Solution Brief

RSA ARCHER BUSINESS CONTINUITY MANAGEMENT AND OPERATIONS Solution Brief RSA ARCHER BUSINESS CONTINUITY MANAGEMENT AND OPERATIONS Solution Brief INTRODUCTION Now more than ever, organizations depend on services, business processes and technologies to generate revenue and meet

More information

1 www.forbes.com/sites/ louiscolumbus/2012/10/31/saas-adoptionaccelerates-goes-global-in-the-enterprise/

1 www.forbes.com/sites/ louiscolumbus/2012/10/31/saas-adoptionaccelerates-goes-global-in-the-enterprise/ 1 / 10 Cloud done the right way Organizations are moving many of their IT operations to the Cloud to realize cost efficiencies and gain a level of flexibility that is needed in today s fast-changing business

More information

Institute for Business Continuity Training 1623 Military Road, # 377 Niagara Falls, NY 14304-1745

Institute for Business Continuity Training 1623 Military Road, # 377 Niagara Falls, NY 14304-1745 ECP - 601: Effective Business Continuity Management: ISO 22301 This 3-day course provides an intensive, hands-on workshop covering all major aspects for the design of an effective Business Continuity Plan

More information

Enterprise Cloud Computing

Enterprise Cloud Computing Enterprise Cloud Computing: The Infrastructure s Ultimate Revenge Jill T. Singer, Chief Information Officer National Reconnaissance Office, US Intelligence Community What is enterprise cloud computing?

More information

Microsoft Windows 7 and Office. Key Initiative Overview

Microsoft Windows 7 and Office. Key Initiative Overview Michael Silver Research Vice President and Distinguished Analyst IT leaders have questions and concerns about issues associated with Microsoft Windows 7 and Office 2010 migrations. This overview points

More information

Preparing for the Convergence of Risk Management & Business Continuity

Preparing for the Convergence of Risk Management & Business Continuity Preparing for the Convergence of Risk Management & Business Continuity Disaster Recovery Journal Webinar Series September 5, 2012 2012 Strategic BCP, Inc. All rights reserved. strategicbcp.com 1 Today

More information

The Business Continuity Maturity Continuum

The Business Continuity Maturity Continuum The Business Continuity Maturity Continuum Nick Benvenuto & Brian Zawada Protiviti Inc. 2004 Protiviti Inc. EOE Agenda Terminology Risk Management Infrastructure Discussion A Proposed Continuity Maturity

More information

Information Security in Business: Issues and Solutions

Information Security in Business: Issues and Solutions Covenant University Town & Gown Seminar 2015 Information Security in Business: Issues and Solutions A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

Justifying Business Continuity: How it Impacts Risk Management

Justifying Business Continuity: How it Impacts Risk Management Justifying Business Continuity: How it Impacts Risk Management Joe Elliott Neverfail 2 Agenda Definition of Business Continuity Road Blocks to Justification Defining Risk Management Reduction through the

More information

Moving from BS 25999-2 to ISO 22301. The new international standard for business continuity management systems. Transition Guide

Moving from BS 25999-2 to ISO 22301. The new international standard for business continuity management systems. Transition Guide Transition Guide Moving from BS 25999-2 to ISO 22301 The new international standard for business continuity management systems Extract from The Route Map to Business Continuity Management: Meeting the

More information

Beyond Crisis Communications

Beyond Crisis Communications Beyond Crisis Communications Capitalizing on Social Media to Bolster Business Continuity Management With more organizations embracing social business and introducing enterprise social software into the

More information

How to Choose a Cloud Backup Service Provider

How to Choose a Cloud Backup Service Provider How to Choose a Cloud Backup Service Provider List Products Implemented in File- Properties Why Should You Protect Your Data? Sooner or later - by mischief, misfortune or mistake - Odds are you will experience

More information

BUSINESS CONTINUITY POLICY

BUSINESS CONTINUITY POLICY BUSINESS CONTINUITY POLICY Last Review Date Approving Body n/a Audit Committee Date of Approval 9 th January 2014 Date of Implementation 1 st February 2014 Next Review Date February 2017 Review Responsibility

More information

Business Continuity Policy

Business Continuity Policy Page 1 of 16 Business Continuity Policy Issue Date: Aug 2013 Document Number: 00241 Prepared by: Business Management and Continuity Senior Manager Next Review Date: April 2014 Page 2 of 16 NHS England

More information

All Clouds Are Not Created Equal THE NEED FOR HIGH AVAILABILITY AND UPTIME

All Clouds Are Not Created Equal THE NEED FOR HIGH AVAILABILITY AND UPTIME THE NEED FOR HIGH AVAILABILITY AND UPTIME 1 THE NEED FOR HIGH AVAILABILITY AND UPTIME All Clouds Are Not Created Equal INTRODUCTION Companies increasingly are looking to the cloud to help deliver IT services.

More information

O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s

O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s EXECUTIVE BRIEF O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s Adapted from IDC research by Eric Owen Click here to enter text. September 2014 INTRODUCTION

More information

BCP and DR. P K Patel AGM, MoF

BCP and DR. P K Patel AGM, MoF BCP and DR P K Patel AGM, MoF Key difference between BS 25999 and ISO 22301 ISO 22301 puts a much greater emphasis on setting the objectives, monitoring performance and metrics aligning BC to top management

More information

Everything You Need To Know About Cloud Computing

Everything You Need To Know About Cloud Computing Everything You Need To Know About Cloud Computing What Every Business Owner Should Consider When Choosing Cloud Hosted Versus Internally Hosted Software 1 INTRODUCTION Cloud computing is the current information

More information

State of the States: IT Trends, Priorities and Issues

State of the States: IT Trends, Priorities and Issues State of the States: IT Trends, Priorities and Issues OSC Financial Conference 2012 Doug Robinson, Executive Director National Association of State Chief Information Officers Fiscal recovery: budgets are

More information

Strategic Planning. Key Initiative Overview

Strategic Planning. Key Initiative Overview David Aron Research Vice President This overview provides a high-level description of the Strategic Planning Key Initiative. IT leaders can use it to create strategies that help the business win, and change

More information

Data centre strategies for business growth in a hybrid cloud world

Data centre strategies for business growth in a hybrid cloud world Data centre strategies for business growth in a hybrid cloud world A joint report from Pacnet and CIO Custom Solutions Group October 2014 Introduction The data centre has become an integral part of the

More information

Business Continuity and Disaster Recovery Planning

Business Continuity and Disaster Recovery Planning Business Continuity and Disaster Recovery Planning Jennifer Brandt, CISA A p r i l 16, 2015 HISTORY OF STINNETT & ASSOCIATES Stinnett & Associates (Stinnett) is a professional advisory firm offering services

More information

Shankar Gawade VP IT INFRASTRUCTURE ENAM SECURITIES PVT. LTD.

Shankar Gawade VP IT INFRASTRUCTURE ENAM SECURITIES PVT. LTD. Business Continuity Management & Disaster Recovery Planning Presented by: Shankar Gawade VP IT INFRASTRUCTURE ENAM SECURITIES PVT. LTD. 1 What is Business Continuity Management? Is a holistic management

More information

Security Officer s Checklist in a Sourcing Deal

Security Officer s Checklist in a Sourcing Deal Security Officer s Checklist in a Sourcing Deal Guide Share Europe Ostend, May 9th 2014 Johan Van Mengsel IBM Distinguished IT Specialist IBM Client Abstract Sourcing deals creates opportunities and challenges.

More information

Business Continuity Planning

Business Continuity Planning Business Continuity Planning We believe all organisations recognise the importance of having a Business Continuity Plan, however we understand that it can be difficult to know where to start. That s why

More information

SaaS and the enterprise perception

SaaS and the enterprise perception SaaS and the enterprise perception A REPORT FROM NCC GROUP Introduction? Cloud computing is increasingly becoming entrenched into the modern IT landscape. The phrase is used to strike fear into IT departments

More information

WHITE PAPER ENSURING APPLICATION AVAILABILITY AND SECURITY IN THE CLOUD

WHITE PAPER ENSURING APPLICATION AVAILABILITY AND SECURITY IN THE CLOUD WHITE PAPER ENSURING APPLICATION AVAILABILITY AND SECURITY IN THE CLOUD CONTENTS EXECUTIVE SUMMARY 3 THE LIFEBLOOD OF MANY BUSINESSES IS UNDER ATTACK 3 IT LEADERS FACE A DIFFICULT BALANCING ACT 3 Companies

More information

3 rd Party Vendor Risk Management

3 rd Party Vendor Risk Management 3 rd Party Vendor Risk Management Session 402 Tuesday, June 9, 2015 (11 to 12pm) Session Objectives The need for enhanced reporting on vendor risk management Current outsourcing environment Key risks faced

More information

Business Continuity for the New Professional. Britt Corra Enterprise BCM Erika Voss Senior BCM

Business Continuity for the New Professional. Britt Corra Enterprise BCM Erika Voss Senior BCM Business Continuity for the New Professional Britt Corra Enterprise BCM Erika Voss Senior BCM New to Business Continuity? Agenda & Experience 3-5 years experience? Seasoned veteran? What is BCM Tool Kit?

More information

2014 DATA CENTER TRENDS

2014 DATA CENTER TRENDS 2014 DATA CENTER TRENDS CONTENTS Overview _2 Small and Medium Business Move-In 3 Cloud computing use continues to grow _ 4 the internet of things gaining speed _ 5 disaster recovery is a necessity _ 7

More information

Euler Hermes World Agency. Your world, our world

Euler Hermes World Agency. Your world, our world Euler Hermes World Agency Your world, our world Your world, our complete 360 solutions Delivering tailored solutions Understanding global risk As a multinational, you have operations around the world and

More information

Accenture Technology Consulting. Clearing the Path for Business Growth

Accenture Technology Consulting. Clearing the Path for Business Growth Accenture Technology Consulting Clearing the Path for Business Growth Mega technology waves are impacting and shaping organizations in a profound way When a company s executive management team considers

More information

CITO Research Advancing the craft of technology leadership. Hybrid Cloud Myths. Sponsored by

CITO Research Advancing the craft of technology leadership. Hybrid Cloud Myths. Sponsored by CITO Research Advancing the craft of technology leadership Hybrid Cloud Myths Sponsored by Contents Introduction 1 Myth: You can use the public cloud for everything. 2 Myth: You can t be secure in the

More information

CPI Customer Success Story Sawyer Savings Bank

CPI Customer Success Story Sawyer Savings Bank CPI Customer Success Story Sawyer Savings Bank Technology Management for Optimal Performance, Security & Cost Savings Leveraging CPI s expertise in capturing true IT value, mitigating risks and reducing

More information

security changes with Orange focus on your business, we focus on your security

security changes with Orange focus on your business, we focus on your security security changes with Orange focus on your business, we focus on your security the only constant in security is change New uses and new technologies, proliferation of platforms and new workspaces in a

More information

2011 DIY Ediscovery Trends Survey by Kroll Ontrack. 9 Trends in the Evolution of Ediscovery

2011 DIY Ediscovery Trends Survey by Kroll Ontrack. 9 Trends in the Evolution of Ediscovery 2011 DIY Ediscovery Trends Survey by Kroll Ontrack 9 Trends in the Evolution of Ediscovery Introduction By now, most corporations and law firms intimately understand the complexities and realities of ediscovery,

More information

Hope for the best, prepare for the worst:

Hope for the best, prepare for the worst: Hope for the best, prepare for the worst: Why your customers will demand self-service back-up Presented by Ridley Ruth, COO Breaking News Yahoo email Accounts were hacked in Jan 2014 (Washington Post)

More information

Remarks by. Thomas J. Curry Comptroller of the Currency. At the. Bank Information Technology Training Conference. Atlanta.

Remarks by. Thomas J. Curry Comptroller of the Currency. At the. Bank Information Technology Training Conference. Atlanta. Remarks by Thomas J. Curry Comptroller of the Currency At the Bank Information Technology Training Conference Atlanta October 2, 2012 Good morning everyone. Thank you, Carolyn, for your gracious introduction,

More information

Seminar on Unfair Competition Enforcement in the United States and Supply Chain Cybersecurity Issues. Palace Hotel Saigon, HCMC, November 19 th 2014

Seminar on Unfair Competition Enforcement in the United States and Supply Chain Cybersecurity Issues. Palace Hotel Saigon, HCMC, November 19 th 2014 Seminar on Unfair Competition Enforcement in the United States and Supply Chain Cybersecurity Issues Palace Hotel Saigon, HCMC, November 19 th 2014 Cyber Security and Supply Chain Integrity as Risk Factors

More information

Disaster Recovery Process

Disaster Recovery Process Disaster Recovery Process Getting Back to Business After Unforeseen Events Review of Potential Disasters Step-by-step Process for Creating Disaster Recovery Protocols System for Resuming Operations After

More information

SAFETY FIRST. Emerging Trends in IT Disaster Recovery. By Cindy LaChapelle, Principal Consultant. www.isg-one.com

SAFETY FIRST. Emerging Trends in IT Disaster Recovery. By Cindy LaChapelle, Principal Consultant. www.isg-one.com SAFETY FIRST Emerging Trends in IT Disaster Recovery By Cindy LaChapelle, Principal Consultant www.isg-one.com INTRODUCTION Against a backdrop of increasingly integrated and interdependent global service

More information

Technology. Building Your Cloud Strategy with Accenture

Technology. Building Your Cloud Strategy with Accenture Technology Building Your Cloud Strategy with Accenture 2 Cloud computing, in its simplest form, allows companies to procure technology as services, including infrastructure, applications, platforms and

More information

Whitepaper. 10 Reasons to Move to the Cloud

Whitepaper. 10 Reasons to Move to the Cloud Whitepaper 10 Reasons to Move to the Cloud 2 10 Reasons to Move to the Cloud 10 Reasons to Move to the Cloud and Why It Will Be the Best Business Decision You Will Ever Make RapidScale s CloudOffice is

More information

Business Continuity and Disaster Recovery for Law Firms CAROLINE POYNTON

Business Continuity and Disaster Recovery for Law Firms CAROLINE POYNTON Business Continuity and Disaster Recovery for Law Firms CAROLINE POYNTON PUBLISHED BY IN ASSOCIATION WITH Contents Executive summary... VII The regulatory landscape...vii Part One Business Continuity

More information

UNIQUE AND DISTRIBUTED, LIKE THE FASHION INDUSTRY. Fashion and Retail for Made in Italy worldwide

UNIQUE AND DISTRIBUTED, LIKE THE FASHION INDUSTRY. Fashion and Retail for Made in Italy worldwide UNIQUE AND DISTRIBUTED, LIKE THE FASHION INDUSTRY Fashion and Retail for Made in Italy worldwide UNIQUE AND DISTRIBUTED, LIKE THE FASHION INDUSTRY INTERNATIONAL EXPANSION, MORE INTEGRATION IN DATA MANAGING

More information

Gartner Executive Programs. Hunting and Harvesting in a Digital World. Insights From the 2013 Gartner CIO Agenda Report

Gartner Executive Programs. Hunting and Harvesting in a Digital World. Insights From the 2013 Gartner CIO Agenda Report Gartner Executive Programs Hunting and Harvesting in a Digital World Insights From the 2013 Gartner CIO Agenda Report About the Gartner CIO Agenda Report The annual Gartner CIO Agenda Report is informed

More information

TELECOM ITALIA LAUNCHES THE ITALIAN CLOUD WITH A FOCUS ON THE IT MARKET. Milan, Teatro Puccini Monday, 20 September 2010. Dr.

TELECOM ITALIA LAUNCHES THE ITALIAN CLOUD WITH A FOCUS ON THE IT MARKET. Milan, Teatro Puccini Monday, 20 September 2010. Dr. TELECOM ITALIA LAUNCHES THE ITALIAN CLOUD WITH A FOCUS ON THE IT MARKET Milan, Teatro Puccini Monday, 20 September 2010 The general outlook Good morning everyone, thank you for taking part in our press

More information

Technology. Building Your Cloud Strategy with Accenture

Technology. Building Your Cloud Strategy with Accenture Technology Building Your Cloud Strategy with Accenture 2 Cloud computing, in its simplest form, allows companies to procure technology as services, including infrastructure, applications, platforms and

More information

Public Sector Chief Information Officer Council

Public Sector Chief Information Officer Council Report to Public Sector Chief Information Officer Council White Paper on a Pan Canadian Opportunities for Collaboration Project Goal Two Report: Outline and Approach Draft v1.0 Submitted by: Stuart Culbertson

More information

Italy. EY s Global Information Security Survey 2013

Italy. EY s Global Information Security Survey 2013 Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information

More information

New Computing Models, and What They Mean to the Small and Mid-Sized Business Consumer

New Computing Models, and What They Mean to the Small and Mid-Sized Business Consumer New Computing Models, and What They Mean to the Small and Mid-Sized Business Consumer How your business can make practical decisions between The Cloud, Utility Computing and Hosted Services 1 Business

More information

Building a Case for Business Continuity. $159,331 Average loss to North American businesses per year due to IT downtime and data loss.

Building a Case for Business Continuity. $159,331 Average loss to North American businesses per year due to IT downtime and data loss. Building a Case for Business Continuity Executive Summary Every business faces network failure and downtime at one point or another. The more downtime a company experiences, the more money and time lost,

More information

Bruce Allison. Steve Moran

Bruce Allison. Steve Moran Bruce Allison Steve Moran ASK A QUESTION POST A COMMENT SUBMIT TECHNICAL QUERIES SHARE YOUR TIPS PROVIDE FEEDBACK DIAL IN AND LISTEN VIA YOUR TELEPHONE! 1800 896 323 81178679# Virtual Desktops A simple,

More information

Taking the Complexity Out of Hybrid IT : Questions for Every CIO to Consider. CIO 100, August 2015

Taking the Complexity Out of Hybrid IT : Questions for Every CIO to Consider. CIO 100, August 2015 Taking the Complexity Out of Hybrid IT : Questions for Every CIO to Consider CIO 100, August 2015 Today s Presenters Wade Alt Senior Vice President Sungard Availability Services Rajeev Ankireddypalli Vice

More information

Choosing a global cloud infrastructure provider

Choosing a global cloud infrastructure provider IMAGE: ANIMIND/FOTOLIA.COM Choosing a global cloud infrastructure provider Top considerations for choosing a global cloud infrastructure provider A guide for enterprises considering IaaS services, by Lisa

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Beyond Voice. Data Only Cloud & Data Centers Mostly

Beyond Voice. Data Only Cloud & Data Centers Mostly Beyond Voice. Data Only Cloud & Data Centers Mostly Alexandros Bechrakis, Commercial Director INFOCOM World 2013 Cloud Computing Cloud computing usually refers to: Use of leased/shared IT resources (computation,

More information