25
IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

Embed Size (px)

Citation preview

Page 1: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

IT Risk MitigationLewan Technology, Agility Recovery, FORTRUST & Woodruff

Sawyer

Page 2: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

Presenters

The Panel:Scott Pelletier, Lewan Technology, CTORob McClary, SVP & GM, FORTRUSTDan McCarter, Manager, Agility RecoveryConor Overstake, Assistant VP, Woodruff-Sawyer

Moderator:Rick Cranston, Director of Business & Product DevelopmentMountain West Credit Union Association

Page 3: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

IT Risk Considerations

NetworkSecurity

Data Protection

Geographic Protection

Employee Productivit

y

PhysicalSecurity

Compliance

Insurance Protection

Page 4: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

Risk Mitigation Techniques

Risk Acceptance

Risk Avoidance

Risk Limitation

Risk Transference

Page 5: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

WHAT ARE RTOs and RPOs?

RTO/RPO  (these should be vetted with business leadership)

• Recovery Time Objective – maximum time to bring a system back online before severe business impact occurs

• Recovery Point Objective – the amount of data loss a business process/application can sustain before severe business impact occurs

• Ask business questions that yield technology answers

Page 6: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

What’s Your Overall IT Risk Reduction Considerations Information / Infrastructure Security

Physical, Social and Technical

Who in your organization is responsible for security?

Do you have written security policies and procedures?

Do you follow them?

How often are they reviewed?

How do you train your employees on your security procedures?

When was the last time you had a security penetration or DR test?

Do you take security seriously?

Data Protection Strategies Real-time

Point-in-time

Long time

Geographic

Page 7: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

Hazards NATURAL HAZARDS

• Meteorological

• Geological 

• Biological

HUMAN-CAUSED HAZARDS

• Accidents

• Intentional Acts

TECHNOLOGICAL HAZARDS

• Information Technology

• Utility Outage

• Fire/Explosion

• Hazardous Materials

• Supply Chain Interruption

Page 8: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

How many eggs in how many baskets

Office Assets:Office SpaceEmployeesEdge networkWirelessDesktop ComputersPhonesPrintersFiles (paper or electronic)Internet*WAN Circuits*Power*Cooling*

Data Center IT Assets:Space for computer roomServersStorageBackup SystemCore NetworkFirewallsPhone SystemInternet*WAN Circuits*Power*Cooling*

*Could be in one or both categories

Main Office

Branch Offices

Page 9: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

How many eggs in how many baskets

Office Assets:Office SpaceEmployeesEdge networkWirelessDesktop ComputersPhonesPrintersFiles (paper or electronic)Internet*WAN Circuits*Power*Cooling*

Data Center IT Assets:Space for computer roomServersStorageBackup SystemCore NetworkFirewallsPhone SystemInternet*WAN Circuits*Power*Cooling*

*Could be in one or both categories

Main Office

Branch Offices

Page 10: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

Move or Replicate IT Assets to a More Secure Environment

Office Assets:Office SpaceEmployeesEdge networkWirelessDesktop ComputersPhonesPrintersFiles (paper or electronic)Internet*WAN Circuits*Power*Cooling*

Main Office

Branch Offices

Data Center IT Assets:Space for computer roomServersStorageBackup SystemCore NetworkFirewallsPhone SystemInternet*WAN Circuits*Power*Cooling*

Page 11: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

Enable Mobile Workforce Strategy

Office Assets:Office SpaceEmployeesEdge networkWirelessDesktop ComputersPhonesPrintersFiles (paper or electronic)Internet*WAN Circuits*Power*Cooling*

Main Office

Branch Offices

Data Center IT Assets:Space for computer roomServersStorageBackup SystemCore NetworkFirewallsPhone SystemInternet*WAN Circuits*Power*Cooling*

Page 12: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

Obtain Mobile Office Space with Needed Assets

Main Office

Data Center IT Assets:Space for computer roomServersStorageBackup SystemCore NetworkFirewallsPhone SystemInternet*WAN Circuits*Power*Cooling*

Office Assets:Office SpaceEmployeesEdge networkWirelessDesktop ComputersPhonesPrintersFiles (paper or electronic)Internet*WAN Circuits*Power*Cooling*

Page 13: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

Obtain Mobile Office Space with Needed Assets

Main Office

Data Center IT Assets:Space for computer roomServersStorageBackup SystemCore NetworkFirewallsPhone SystemInternet*WAN Circuits*Power*Cooling*

Office Assets:Office SpaceEmployeesEdge networkWirelessDesktop ComputersPhonesPrintersFiles (paper or electronic)Internet*WAN Circuits*Power*Cooling*

Protect Against Financial and Property Loss as well

Page 14: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer
Page 15: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

Data loss, breach, disasters are expensive

Page 16: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

Common Insurance Gaps

Page 17: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

How Can We Help

Planning

• People, Process and Technology

• http://www.ready.gov/business

Backup & Recovery Solutions

Disaster Recovery Solutions

IaaS / Data Center Services

Managed Services

Mobility Solutions

Mobile Office Solutions

Insurance Protection Solutions

Page 18: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

DR TOOLS vs. BCP Disaster Recovery Tools• Processes that allow a business to protect data and resume business critical

applications• Designed to protect from localized failures  Business Continuity Planning (BCP)• Procedures that enable business processes to resume beyond the

technology• People, Process, Procedure and Communications

Page 19: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

Backup Solutions Backup/Data Protection Solutions Key weaknesses of traditional backup solutions:• Usually have 24hr RPOs (hourly at best), RTOs in hours at best (if disk based)• Very limited DR orchestration/automation, especially for bulk operations• Normally require recovery to similar HW at DR site• No failback mechanism (when production systems are back online)

Page 20: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

Managed and/or Outsourced Services to Mitigate Risk

Outsourcing some services can help to transfer risk and/or provide policy, standards and tools to help avoid or limit risk.

Managed Security Services

Internet / Private Line

Disaster Recovery

IT Infrastructure Applications

Infrastructure Monitoring / Management

Hosted Email / Collaboration

Managed Data Protection

Managed Print Services

Cloud Infrastructure

Servers

Storage

Core Network

Server Virtualization

CoLo

End-user Service Desk

Tier 3 Data Centers

Lewan Managed Services

Page 21: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

Employee Productivity Protection

4 key Elements of Protecting Employee Productivity 1. Office Space: Mobile or Brick & Mortar

2. Power: Generators & Fuel3. Communications: Telephone and

Internet Connectivity, Employee Communication Plan

4. Computer Systems: Computers, servers, printers, fax

Page 22: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

Agility Membership Benefits

Membership Features

• Immediate Protection

• Access to Member Services

• Online Planning Tool

• Monitoring of Risks & Threats:

• eAlerts

• Ongoing Education Programs:

• Weekly Tips

• Educational Webinars

• Testing

Page 23: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

• Business Continuity Planner to help guide members step by step

• Comprehensive Business Continuity Plan Template

• Alert Notification Tool

• Document Management Storage Tool

Planning and Execution

Page 24: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

Insurance Gaps

• What are the elements and what’s commonly missed

• Error and Omissions

• Privacy

• Network Security

• Media Infringement

Page 25: IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer

Q&A / Panel Discussion