Cloud and Data Center Your Local IT Rooms Need You. DHL Express Europe
|
|
|
- Eric Tucker
- 10 years ago
- Views:
Transcription
1 Beyond (or below) Cloud and Data Center Your Local IT Rooms Need You Martin Frevert Too DHL Express Europe
2 Agenda The Challenge The Approach Five Tasks Summary and Q&A
3 Agenda The Challenge The Approach Five Tasks Summary and Q&A
4 The Challenge (1/2) For more than 2.6 million customers One Promise More than 220 countries and territories served ~100,000 employees worldwide de 3 global hubs: Cincinnati, Hong Kong, Leipzig Additional ~4,000 facilities worldwide ~260 dedicated di d aircraft ~29,500 vehicles Connecting ~500 airports around the world Time Definite International Delivery IT needs to ensure smooth operation of the 24/7 business
5 The Challenge (2/2) Central global data centers but ~4,000 facilities with IT equipment critical for site operations From network equipment only to servers and specialized IT equipment for call centers or cross belt sorters One Global Customer Promise Local IT rooms protected properly following a global standard
6 Agenda The Challenge The Approach Five Tasks 1. Clarify, what you mean by IT Room Protection 2. Business Alignment I: Develop something that will be accepted 3. Business Alignment II: Develop something that can be used 4. Define a meaningful standard 5. Be smart about closing any gaps Summary and Q& A
7 IT Room Protection Overall Objective Achieve a common, reduced level of risk of an IT room outage which would lead to a business disruption or significantly impact a country business In Scope Out of Scope What Reduction of most common risk Existing and new rooms Business continuity IT operational procedures Protection against other elemental dangers Where Every IT room in every location Enterprise data centers (follow Key: IT room is relevant for DHL higher, data center focused Express standards)
8 Limitations Risk of IT Room Outage Most common threats, e.g. Power Cooling Fire Intrusion Other threats * Without IT Room Protection Risk Reduction through IT Room Protection Most common threats Other threats With IT Room Protection None of the risk can be completely eliminated Residual risk to be addressed by Continuity Management * e.g. earth quakes
9 Recommendation 1 Manage expectations
10 Agenda The Challenge The Approach Five Tasks 1. Clarify, what you mean by IT Room Protection 2. Business Alignment I: Develop something that will be accepted 3. Business Alignment II: Develop something that can be used 4. Define a meaningful standard 5. Be smart about closing any gaps Summary and Q& A
11 Business Alignment I Customer Criticality determined from top to bottom Costs for IT Room Protection have to be justified ~4,000 sites = ~4,000 individual cases Need for rationalization Business alignment through classes IT room with different protection levels
12 Different Classes of IT Rooms Cost Protection IT Room Class Attribute A B C N Baseline: requirements by local authorities, health & safety regulations etc. Driver for protection need: criticality of IT room for the business Not a driver: size of room or number of servers Standby back-up diesel generator Dedicated Cooling System To be defined per attribute for each class Mandatory Strongly recommended Recommended Not needed
13 Recommendation 2 Introduce different classes of IT rooms for business alignment
14 Agenda The Challenge The Approach Five Tasks 1. Clarify, what you mean by IT Room Protection 2. Business Alignment I: Develop something that will be accepted 3. Business Alignment II: Develop something that can be used 4. Define a meaningful standard 5. Be smart about closing any gaps Summary and Q& A
15 Business Alignment II How to determine the different IT room classes and how to classify IT rooms? Simple, pragmatic approach Classification depending on criticality for the business but Business does not appreciate sophisticated, incomprehensible elaborations If you want to apply it globally, only a simple approach will succeed What it means What-if scenario: what, if the IT room is down? Limited scope of business impact analysis Proxy for business impact Complemented by key business impact scenarios Matrix for classification based on multipliers
16 Business Impact Analysis What, if IT room is down? Impact Economic loss from damaged or destroyed property Regulatory or contractual impact Reputation Economic loss from loss of function How to consider Impossible to standardize Impossible to standardize Impossible to standardize Using a proxy Do not try to determine exact business loss Use revenue that is supported by the IT room in "business-as-usual" (BAU) circumstances as proxy Known within IT function Very powerful and convincing: break down to revenue per day Not equal to revenue loss, but proxy only. Not sufficient to cover complexity of the business.
17 Impact Scenarios - Example Business, but Business, but No business Business, but shipments low Customer possible at thigher h cost delayed Service quality Customer Visibility Business Impact Very high High Medium None Disruptive Very high High Medium No business possible without the IT room on one or more sites Business still possible without t the IT room Service commitment/ product promise cannot be kept Business still possible without t the IT room Customer Service not able to meet KPIs due to outage of IT room Business still possible without t the IT room Business can only be run at extra costs
18 Classification Thresholds Classification Matrix Define Thresholds Step 1: Baseline Step 2: Multipliers IT Room Class IT Room Class A B C N What are the revenue thresholds for each combination? 1 x 1.0 Threshold [Revenue] A > 100 B >40 C > 10 N N/A x 1.5 x 2.0 x 3.0 >40 x 2.0 >80 Use scenario 1 Use multipliers to increase (business disruption) thresholds to reflect lower as baseline due to business impact maximum business more revenue needed to impact justify a certain class
19 IT Room Classification Step Principle Example 1 Select room Analyze ay eevery eyit room individually Tampa, Florida 2 3 Determine "businessas-usual" (BAU) Use BAU revenue as proxy revenue Determine business impact scenarios Most critical business impact scenarios x EUR p.a. or y EUR per business day Scenario 2: Business possible, but shipments delayed 4 Look up class in matrix 2 BAU revenue Business Impact Scenario Manage classification matrix ti > 100 A 3 IT Room Class > 40 4 B > 10 C D N
20 Recommendation Define a simple approach for IT room classification 4. Use a tailored, but simple approach to 4. Use a tailored, but simple approach to determine IT room classes for your business
21 Agenda The Challenge The Approach Five Tasks 1. Clarify, what you mean by IT Room Protection 2. Business Alignment I: Develop something that will be accepted 3. Business Alignment II: Develop something that can be used 4. Define a meaningful standard 5. Be smart about closing any gaps Summary and Q& A
22 Protection Level per Class Precise specifications Enabling assessment IT Room Class Attribute A B C N Attribute 1 Mandatory Mandatory Strongly Recomme nded Attribute 2 Mandatory Strongly Recomme nded Recomme nded Recomme nded Not needed Expensive attributes managed by class Increasing requirement for higher classes Redundancy levels managed by class Increasing requirement for higher classes Not only equipment, but also responsibilities and procedures
23 Content of the Standard General Physical Fire HVAC Power Network Security Protection Supply Governance Risk Assessment Other Equipment Policies & Procedures Service & Maintenance Equipment Policies & Procedures Service & Maintenance Equipment Policies & Procedures Service & Maintenance Equipment Policies & Procedures Service & Maintenance General LAN WAN
24 Recommendation 5 Define the standard precisely and with meaningful differences between the classes
25 Agenda The Challenge The Approach Five Tasks 1. Clarify, what you mean by IT Room Protection 2. Business Alignment I: Develop something that will be accepted 3. Business Alignment II: Develop something that can be used 4. Define a meaningful standard 5. Be smart about closing any gaps Summary and Q& A
26 Gap Closure As-Is (no DHL example!) Standard Gap Gap Closure Obvious solution: lift to meet the standard. But: Smartest solution needs to be determined individually!
27 Generic Gap Closure Improve IT room protection Move to highly protected data center Make IT capabilities recoverable Design resilient IT capabilities i high high high high Impact I I I IT capability overall For an individual component of the IT capability low low high Likelihood Achievable short- /mid-term, but good investment in long-term? low low high L Achievable short- /mid-term Best for critical services, but restrictions to be considered low low high L Reducing impact through quick recovery Achievable midterm, but requiring significant investment low low high L Outage of 1 component doesn't impact the IT capability as a whole making it less likely to fail
28 Recommendation 6 Think out of the box improving the protection of an individual IT room might not be the smartest solution
29 Agenda The Challenge The Approach Five Tasks Summary and Q& A
30 Recommendations Summary 1. Manage expectations 2. Introduce different classes of IT rooms for business alignment 3. Define a simple approach for IT room classification 4. Use a tailored, but simple approach to determine IT room classes for your business 5. Define the standard precisely and with meaningful differences between the classes 6. Think out of the box improving the protection of an individual IT room might not be the smartest solution
31 Q & A Your questions, please!
Offsite Disaster Recovery Plan
1 Offsite Disaster Recovery Plan Offsite Disaster Recovery Plan Presented By: Natan Verkhovsky President Disty Portal Inc. 2 Offsite Disaster Recovery Plan Introduction This document is a comprehensive
Bus incident management planning: Guidelines
Bus incident management planning: Guidelines What is incident management planning? Incident management planning is everything your business does to prepare for potential disruptive or damaging incidents.
Business Continuity Planning
Business Continuity Planning We believe all organisations recognise the importance of having a Business Continuity Plan, however we understand that it can be difficult to know where to start. That s why
How to measure your business resiliency
How to measure your business resiliency Define the KPI s/kri s and scorecards to control your security and business continuity capabilities Krzysztof Pulkiewicz BCMLogic [email protected]
PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA
1 Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand
Share the webinar Ask a question Votes (polling questions) Rate (before you leave) Attachments (you can download today s presentation)
Data Center Migration Primer Mark Smith Wednesday, June 27, 2012 General Information Share the webinar Ask a question Votes (polling questions) Rate (before you leave) Attachments (you can download today
Cisco Disaster Recovery: Best Practices White Paper
Table of Contents Disaster Recovery: Best Practices White Paper...1 Introduction...1 Performance Indicators for Disaster Recovery...1 High Level Process Flow for Disaster Recovery...2 Management Awareness...2
Managing business risk
Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success
Desktop Scenario Self Assessment Exercise Page 1
Page 1 Neil Jarvis Head of IT Security & IT Risk DHL Page 2 From reputation to data loss - how important is business continuity? Neil Jarvis Head of IT Security (EMEA) DHL Logistics IT Security Taking
The FDA recently announced a significant
This article illustrates the risk analysis guidance discussed in GAMP 4. 5 By applying GAMP s risk analysis method to three generic classes of software systems, this article acts as both an introduction
Key Components of a Risk-Based Security Plan
Key Components of a Risk-Based Security Plan How to Create a Plan That Works Authors: Vivek Chudgar Principal Consultant Foundstone Professional Services Jason Bevis Director Foundstone Professional Services
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
AdvancedHosting SM Solutions from SunGard Availability Services
AdvancedHosting SM Solutions from SunGard Availability Services A SINGLE POINT OF CONTACT A COMPLETE MANAGED SERVICES SOLUTION Higher levels of availability Continuous investment in people, technology
<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP
IT Disaster Recovery Plan Template By Paul Kirvan, CISA, CISSP, FBCI, CBCP Revision History REVISION DATE NAME DESCRIPTION Original 1.0 2 Table of Contents Information Technology Statement
IT Disaster Recovery Plan Template
HOPONE INTERNET CORP IT Disaster Recovery Plan Template Compliments of: Tim Sexton 1/1/2015 An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned
Disaster Recovery Policy
Disaster Recovery Policy INTRODUCTION This policy provides a framework for the ongoing process of planning, developing and implementing disaster recovery management for IT Services at UCD. A disaster is
Business resilience: The best defense is a good offense
IBM Business Continuity and Resiliency Services January 2009 Business resilience: The best defense is a good offense Develop a best practices strategy using a tiered approach Page 2 Contents 2 Introduction
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Security Officer s Checklist in a Sourcing Deal
Security Officer s Checklist in a Sourcing Deal Guide Share Europe Ostend, May 9th 2014 Johan Van Mengsel IBM Distinguished IT Specialist IBM Client Abstract Sourcing deals creates opportunities and challenges.
Metrics that Matter Security Risk Analytics
Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa [email protected] April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk
Information Security Team
Title Document number Add document Document status number Draft Owner Approver(s) CISO Information Security Team Version Version history Version date 0.01-0.05 Initial drafts of handbook 26 Oct 2015 Preface
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
DRAFT Disaster Recovery Policy Template
DRAFT Disaster Recovery Policy Template NOTE: This is a boiler plate template much information is needed from to finalizeconsider this document pre-draft FOREWARD... 3 Policy Overview...
Technology Resilience and Failover policy
Technology Resilience and Failover policy Status: Approved Contents 1 Introduction... 4 2 Technology Resilience and Failover policy... 6 2.1 Policy scope... 6 2.2 Policy statements... 6 2.3 Exception management...
The Difference Between Disaster Recovery and Business Continuance
The Difference Between Disaster Recovery and Business Continuance In high school geometry we learned that a square is a rectangle, but a rectangle is not a square. The same analogy applies to business
Varicent View. Core Principles of Sales Compensation: a 10-Step Approach By Laura Roach, CCP General Manager Varicent Software Incorporated
Varicent View Core Principles of Sales Compensation: a 10-Step Approach By Laura Roach, CCP General Manager Varicent Software Incorporated Historically, and over the course of the last 20 years, sales
Delivering peace of mind in outsourcing
> Delivering peace of mind in outsourcing How to increase enterprise performance when outsourcing mission critical systems www.thalesgroup.com/security-services AND >> PERFORMANCE OUTSOURCING OF MISSION
CIS 523/423 Disaster Recovery Business Continuity
CIS 523/423 Disaster Recovery Business Continuity Course Description A study of disaster recovery and business continuity as related to the information technology function in organizations. Topics will
DATA RECOVERY SOLUTIONS EXPERT DATA RECOVERY SOLUTIONS FOR ALL DATA LOSS SCENARIOS.
The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them
The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or
Hong Kong Baptist University
Hong Kong Baptist University Disaster Recovery Standard FOR INTERNAL USE ONLY Date of Issue: JULY 2012 Revision History Version Author Date Revision 1.0 Information Security Subcommittee (ISSC) July 2012
Risk Based Internal Auditing & Enterprise Risk
Risk Based Internal Auditing & Enterprise Risk Management PRESENTERS: JUDITH NELSON, UNIVERSITY MANAGEMENT AUDITOR DWIGHT WALTERS, MANAGER, PROJECTS & COMMERCIAL OPERATIONS What we will cover today: 1.
Oracle Data Centre Rationalisation
Ian Gardner - Oracle Applications Architect 2012-06-13 Oracle Data Centre Rationalisation A Practical View [email protected] Tel. 07740 923060 2012 IBM Corporation Why perform Oracle Data Centre Rationalisations...
AUSTRACLEAR REGULATIONS Guidance Note 10
BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they
ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 10
BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they
Disaster Recovery Hosting Provider Selection Criteria
Disaster Recovery Hosting Provider Selection Criteria By, Solution Director 6/18/07 As more and more companies choose to use Disaster Recovery (DR), services the questions that keep coming up are What
Business Continuity Planning Principles and Best Practices Tom Hinkel and Zach Duke
Business Continuity Planning Principles and Best Practices Tom Hinkel and Zach Duke Agenda Key components essential to a FFIEC compliant Business Continuity Plan Recovery Time Objectives & Recovery Point
The PMO as a Project Management Integrator, Innovator and Interventionist
Article by Peter Mihailidis, Rad Miletich and Adel Khreich: Peter Mihailidis is an Associate Director with bluevisions, a project and program management consultancy based in Milsons Point in Sydney. Peter
An ITIL Perspective for Storage Resource Management
An ITIL Perspective for Storage Resource Management BJ Klingenberg, IBM Greg Van Hise, IBM Abstract Providing an ITIL perspective to storage resource management supports the consistent integration of storage
Protecting your Enterprise
Understanding Disaster Recovery in California Protecting your Enterprise Session Overview Why do we Prepare What is? How do I analyze (measure) it? What to do with it? How do I communicate it? What does
BT Conferencing Business Continuity Management. Planning to stay in business
BT Conferencing Business Continuity Management Planning to stay in business Planning for the unexpected In today s connected world, businesses are increasingly dependent on their communications and networked
ASX SETTLEMENT OPERATING RULES Guidance Note 10
BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they
Supporting information technology risk management
IBM Global Technology Services Thought Leadership White Paper October 2011 Supporting information technology risk management It takes an entire organization 2 Supporting information technology risk management
Identifying & Managing IT Risks to Your Business
Identifying & Managing IT Risks to Your Business In a competitive business environment, every organization operates in a climate of risk. It is never possible to remove all risk from a business, but it
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
What is the Cloud, and why should it matter?
391 12 What is the Cloud, and why should it matter? 23 Everyone seems to be asking about it. No one seems to know exactly what it is, what they need, and where to find it. 4 A Philosophy of Design and
Data Center Consolidation: Lessons From The Field. John Tsiofas, Kraft Kennedy David Carlson, Kraft Kennedy
Data Center Consolidation: Lessons From The Field John Tsiofas, Kraft Kennedy David Carlson, Kraft Kennedy Agenda Factors to consider Technology strategy Building a project team How to use vendors wisely
Overview TECHIS60851. Manage information security business resilience activities
Overview Information security business resilience encompasses business continuity and disaster recovery from information security threats. As well as addressing the consequences of a major security incident,
Disaster Recovery. Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support
Disaster Recovery Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support Categories of Risk Financial Operational Reputational Market share Revenue
Maintaining PCI-DSS compliance. Daniele Bertolotti [email protected] Antonio Ricci [email protected]
Maintaining PCI-DSS compliance Daniele Bertolotti [email protected] Antonio Ricci [email protected] Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance
eet Business continuity and disaster recovery Enhancing enterprise resiliency for the power and utilities industry Power and Utilities Fact Sheet
Power and Utilities Fact Sh Business continuity and disaster recovery Enhancing enterprise resiliency for the power and utilities industry A holistic approach to business resiliency and disaster recovery
Ensure Absolute Protection with Our Backup and Data Recovery Services. ds-inc.com (609) 655 1707
Ensure Absolute Protection with Our Backup and Data Recovery Services ds-inc.com (609) 655 1707 Ensure Absolute Protection with Our Backup and Data Recovery Services STAY PROTECTED WITH OUR BACKUP AND
DISASTER RECOVERY PLANNING GUIDE
DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide
Introduction UNDERSTANDING BUSINESS CONTINUITY MANAGEMENT
INFORMATION SECURITY: UNDERSTANDING BUSINESS CONTINUITY MANAGEMENT FACTSHEET This factsheet will introduce you to Business Continuity Management (BCM), which is a process developed to counteract systems
Backup and Redundancy
Backup and Redundancy White Paper NEC s UC for Business Backup and Redundancy allow businesses to operate with confidence, providing security for themselves and their customers. When a server goes down
TO AN EFFECTIVE BUSINESS CONTINUITY PLAN
5 STEPS TO AN EFFECTIVE BUSINESS CONTINUITY PLAN Introduction The Snowpocalypse of 2015 brought one winter storm after another, paralyzing the eastern half of the United States. It knocked out power for
KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity
INFORMATION RISK MANAGEMENT KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity ADVISORY Contents Agenda: Global trends and BCM
The reality of cloud. Go beyond the hype and make a better choice. t 0845 5055 365 e [email protected]. www.365itms.co.uk
The reality of cloud Go beyond the hype and make a better choice www. The meaning of cloud 1. Cloud means different things to different people, something that s reflected in the many definitions of what
Business Continuity Planning Guide
Business Continuity Planning Guide For Small Businesses Prepared by the City of Vaughan Emergency Planning Department 1 Business Continuity Planning Business Continuity Planning (BCP) is a planning process
Endeavour Dynamics Offering
Endeavour Dynamics Offering Microsoft Dynamics AX 2012 is recognised as a global leading ERP system that supports a single instance strategy for medium to large enterprise companies. Endeavour is proud
Introduction. The Inherent Unpredictability of IP Networks # $# #
Introduction " $ % & ' The Inherent Unpredictability of IP Networks A major reason that IP became the de facto worldwide standard for data communications networks is its automated resiliency based on intelligent
MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure.
MM8000 safety and security with smart danger management A scalable and flexible management station for any requirement Answers for infrastructure. Sophisticated technology for comprehensive safety Safety
ICT Business Continuity & Disaster Recovery for Local Authorities. White Paper
ICT Business Continuity & Disaster Recovery for Local Authorities White Paper Contents 1 Introduction...3 1.1 What Constitutes a Disaster?...3 1.2 Phases...3 1.3 Overall Contingency Planning...3 2 Discovery
Building a better branch office. www.citrix.com
Building a better branch office www.citrix.com Introduction The majority of workers today are in branch offices, not in a headquarters facility. In many instances, all of the applications used by branch
Data center solutions from Siemens. For the factories of the 21 st century. siemens.com/datacenters
Data center solutions from Siemens For the factories of the 21 st century siemens.com/datacenters We face the challenges for the factories of the 21 st century Based on our vast experience, we offer a
THE INTERNATIONAL JOURNAL OF BUSINESS & MANAGEMENT
THE INTERNATIONAL JOURNAL OF BUSINESS & MANAGEMENT Performance Management Model for SMEs Rusaneanu Alexandra Ph.D. Student, Faculty of Cybernetics, Statistics and Economic Informatics, Bucharest University
Exposing the Cloud: It It s More than a Buzzword Tim Connors, Director, AT&T AT&T
Exposing the Cloud: It s More than a Buzzword Tim Connors, Director, AT&T Exposing the Cloud: It s More than a Buzzword Discussion Agenda Cloud Storage Target Uses When is it right? When is it wrong? Specific
Certified Information Security Manager (CISM)
Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security
Security from a customer s perspective. Halogen s approach to security
September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving
Service availability (in the clouds)
Warsaw, 24 th of March 2014 Service availability (in the clouds) Aleksander P. Czarnowski, AVET INS / EuroCloud Polska Page 1 of 16 Table of Contents 1. Introduction... 3 2. Availability concept for IaaS,
Coping with a major business disruption. Some practical advice
Coping with a major business disruption Some practical advice Coping with a major business disruption What is business continuity? Business continuity planning (BCP) is a management process that helps
Architecting the Cloud
Architecting the Cloud Sumanth Tarigopula Director, India Center, Best Shore Applications Services 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
Security Risk Management Strategy in a Mobile and Consumerised World
Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key
Interactive-Network Disaster Recovery
Interactive-Network Disaster Recovery BACKGROUND IT systems are vulnerable to a variety of disruptions, ranging from mild (e.g., short-term power outage, disk drive failure) to severe (e.g., terrorism,
Protecting Your Business
Protecting Your Business Business Continuity/Disaster Recovery Planning Robert Haberman Senior Product Manager BCP/DRP TELUS BUSINESS SOLUTIONS Business Continuity/Disaster Recovery Planning 1 Agenda:
Test Data Management Best Practice
Test Data Management Best Practice, Inc. 5210 Belfort Parkway, Suite 400 Author: Stephanie Chace Quality Practice Lead [email protected], Inc. 2011 www.meridiantechnologies.net Table of
A VERITAS PERSPECTIVE: Maximize Agility, Minimize Risk In The Multi-Vendor Hybrid Cloud
A VERITAS PERSPECTIVE: Maximize Agility, Minimize Risk In The Multi-Vendor Hybrid Cloud 1 THE HYBRID CLOUD DILEMMA Finding Agility without Adding Fragility Today, businesses have to move fast to stay competitive.
Q uick Guide to Disaster Recovery Planning An ITtoolkit.com White Paper
This quick reference guide provides an introductory overview of the key principles and issues involved in IT related disaster recovery planning, including needs evaluation, goals, objectives and related
Developing a Risk Management Plan. New Partners Initiative Technical Assistance Project (NuPITA)
Developing a Risk Management Plan New Partners Initiative Technical Assistance Project (NuPITA) The New Partners Initiative Technical Assistance (NuPITA) is funded by the United States Agency for International
Private Cloud: Key considerations for an insurance agency
white paper private cloud Private Cloud: Key considerations for an insurance agency in the insurance industry, there are many options for meeting insurance agency information technology requirements. An
Project Risk Analysis toolkit
Risk Analysis toolkit MMU has a corporate Risk Management framework that describes the standard for risk management within the university. However projects are different from business as usual activities,
Setting smar ter sales per formance management goals
IBM Software Business Analytics Sales performance management Setting smar ter sales per formance management goals Use dedicated SPM solutions with analytics capabilities to improve sales performance 2
