SlideShare une entreprise Scribd logo
1  sur  22
LIVE WEBINAR Data Protection:  Safeguarding your business today & tomorrow   Wednesday, November 25, 2009 12:30 PM - 1:30 PM (AEDST), Sydney Australia Conference Number: Australia: 1800 098 754 New Zealand: 0800 447 860 Your conference ID #: 42727822
Current issues in information security, and the value of data James Turner Advisor
Presentation outline ,[object Object],[object Object],[object Object],[object Object],[object Object],What is the common thread? “ Colour Beginning” J.(M.W.) Turner
Our advisors IBRS is an Australian company providing timely advice,  insightful judgement, and thorough research  to benefit IT and business managers in Australasian organisations. Dr Kevin McIsaac Terry Dargan Dr Colin Boswell Joseph Sweeney James Turner Alan Hansell Rob Mackinnon Guy Cranswick Irene Pimentel Brian Bowman Jorn Bettin Peter Hind
[object Object],[object Object],[object Object],[object Object],[object Object],The CIA triad Confidentiality Integrity Availability Your sensitive data needs all 3 attributes
[object Object],[object Object],[object Object],The issues and trends
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Data Loss Prevention "The scream" Edvard Munch Business cases based on fear  of public disclosure
[object Object],[object Object],[object Object],Mobility of workers Virtualisation is the market response  to rampant multiformity The PED trilemma Source: " Portable electronic devices ( PEDs ): a frog close to the boil ", IBRS, February 2008
The cloud ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The cloud Big migrations will make the news,  because they are the exceptions "Clouds" John Constable
The value of the data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Incident response lifecycle Mitigate risks Backup  important data Restore Life is too short to only learn from  your own mistakes
Current issues in information security, and the value of data James Turner Advisor
Andrew Fry Business Unit Executive Business Continuity & Resiliency Services, IBM Global Technology Services
Data Security Services – Endpoint Data Protection PGP Corporation Encryption Software and Support Benefits ,[object Object],[object Object],[object Object],What does PGP Encryption do? ,[object Object],[object Object],[object Object],[object Object],[object Object]
PGP Encryption – Example Company:  A mining and exploration company operating in a highly competitive and volatile market. Problem: Suffered from leakage of sensitive corporate data as a result of stolen employee’s laptop. Solution: Security specialists from IBM ISS implemented a  PGP® Whole Disk Encryption solution to  protect sensitive corporate data on desktops, laptops and removable media. Benefits:   1)   Peace of mind that sensitive data is constantly protected from unauthorised access,    providing strong security for intellectual property and reduced competitive risk   2)  Data is protected without changing the user experience   3)  Reduced operational costs by centrally automating encryption policies
Data Backup and Restoration services Cloud delivered, fully managed service Disk, tape and virtual tape-based backup and recovery for  data centres, and remote sites Protect the core:  Onsite and Remote data protection Scalable on-demand services architecture Disk-based backup and recovery for  Desktops and laptops Protect the edge:  Fastprotect Online ,[object Object],[object Object],[object Object]
[object Object],Remote Data Protection  Automatic, reliable protection for your critical data that can be restored virtually anywhere, anytime
[object Object],[object Object],[object Object],[object Object],A Better way to recover data  and  server infrastructure Combine Data backup via cloud, and virtualised disaster recovery servers IBM Recovery Centre
Server and Data recovery - Example Company: Financial services firm, servicing mid-size organisations in Australia Problem: Business demanded faster recovery times and assurance that data was being  protected every day across distributed sites, and all within existing budget. Solution: Implemented  IBM Remote Data Protection  to backup critical server data to secure  IBM facility, on a pay-as-you-go service. IBM coupled the backup service with  IBM  Virtual Server recovery  to provide complete offsite server and data recovery  solution, for a shared price point.  Benefits: 1)  Client achieved vastly improved recovery times, without needing to invest in  expensive dedicated infrastructure 2)  Daily reports confirming critical data is securely backed up 3)  Storage capacity scales up/down based on usage (opex model)
Data Protection Services Avoid data loss or leakage, and have a plan for recovery Mitigate risks Backup  important data Restore
THANK YOU

Contenu connexe

Tendances

Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 
Data protection act
Data protection act Data protection act
Data protection act
Iqbal Bocus
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
Watchful Software
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
Symantec
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
DallasHaselhorst
 

Tendances (20)

Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
Data protection act
Data protection act Data protection act
Data protection act
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Data classification-policy
Data classification-policyData classification-policy
Data classification-policy
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by design
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 

En vedette

Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
 
Security Measure
Security MeasureSecurity Measure
Security Measure
syafiqa
 
Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)
ainizbahari97
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
SaimaRafiq
 

En vedette (20)

Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
New Media Internet Expression and European Data Protection
New Media Internet Expression and European Data ProtectionNew Media Internet Expression and European Data Protection
New Media Internet Expression and European Data Protection
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To Know
 
Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...
Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...
Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...
 
Security Measure
Security MeasureSecurity Measure
Security Measure
 
Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data Privacy
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Security of the database
Security of the databaseSecurity of the database
Security of the database
 
Database Security
Database SecurityDatabase Security
Database Security
 
Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social media
 
Database security
Database securityDatabase security
Database security
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Database security
Database securityDatabase security
Database security
 

Similaire à Data Protection Presentation

Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
damonhough
 
Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?
Iron Mountain
 
Skip the Disk, Move to the Cloud
Skip the Disk, Move to the CloudSkip the Disk, Move to the Cloud
Skip the Disk, Move to the Cloud
Iron Mountain
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
Arrow ECS UK
 

Similaire à Data Protection Presentation (20)

Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Accelerate Journey To The Cloud
Accelerate Journey To The CloudAccelerate Journey To The Cloud
Accelerate Journey To The Cloud
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?
 
SBDS
SBDSSBDS
SBDS
 
Dstca
DstcaDstca
Dstca
 
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
Skip the Disk, Move to the Cloud
Skip the Disk, Move to the CloudSkip the Disk, Move to the Cloud
Skip the Disk, Move to the Cloud
 
How can Enterprise Email Security and Enterprise File Security protect compan...
How can Enterprise Email Security and Enterprise File Security protect compan...How can Enterprise Email Security and Enterprise File Security protect compan...
How can Enterprise Email Security and Enterprise File Security protect compan...
 
ITOX PGP CommandLine slide_share march 2010
ITOX PGP CommandLine slide_share march 2010ITOX PGP CommandLine slide_share march 2010
ITOX PGP CommandLine slide_share march 2010
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Solutions Overview
Solutions OverviewSolutions Overview
Solutions Overview
 
Remote Data Backup Protection
Remote Data Backup ProtectionRemote Data Backup Protection
Remote Data Backup Protection
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
UCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Company Presentation
UCloud Asia Company Presentation
 
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or not
 

Plus de IBM Business Insight

Stream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and Shoretel
Stream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and ShoretelStream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and Shoretel
Stream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and Shoretel
IBM Business Insight
 
Stream 3 - VMware Sponsor Presentation
Stream 3 - VMware Sponsor PresentationStream 3 - VMware Sponsor Presentation
Stream 3 - VMware Sponsor Presentation
IBM Business Insight
 
Stream 2 - Drive Business Performance with Information Analytics
Stream 2 - Drive Business Performance with Information AnalyticsStream 2 - Drive Business Performance with Information Analytics
Stream 2 - Drive Business Performance with Information Analytics
IBM Business Insight
 
Stream 1 - Keynote Presentation: Perth & Adelaide
Stream 1 - Keynote  Presentation: Perth & AdelaideStream 1 - Keynote  Presentation: Perth & Adelaide
Stream 1 - Keynote Presentation: Perth & Adelaide
IBM Business Insight
 
Stream 1- Enhanced Business Performance
Stream 1- Enhanced Business PerformanceStream 1- Enhanced Business Performance
Stream 1- Enhanced Business Performance
IBM Business Insight
 
Stream 3 - IT optimisation & virtualisation
Stream 3 - IT optimisation & virtualisationStream 3 - IT optimisation & virtualisation
Stream 3 - IT optimisation & virtualisation
IBM Business Insight
 

Plus de IBM Business Insight (12)

Stream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and Shoretel
Stream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and ShoretelStream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and Shoretel
Stream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and Shoretel
 
Stream 3 - VMware Sponsor Presentation
Stream 3 - VMware Sponsor PresentationStream 3 - VMware Sponsor Presentation
Stream 3 - VMware Sponsor Presentation
 
Stream 2 - Drive Business Performance with Information Analytics
Stream 2 - Drive Business Performance with Information AnalyticsStream 2 - Drive Business Performance with Information Analytics
Stream 2 - Drive Business Performance with Information Analytics
 
Stream 3 - Cloud Computing
Stream 3 - Cloud ComputingStream 3 - Cloud Computing
Stream 3 - Cloud Computing
 
Stream 2 - Don't Risk IT
Stream 2 - Don't Risk ITStream 2 - Don't Risk IT
Stream 2 - Don't Risk IT
 
Stream 1- Smart Work
Stream 1- Smart WorkStream 1- Smart Work
Stream 1- Smart Work
 
Stream 1 - Keynote Presentation: Perth & Adelaide
Stream 1 - Keynote  Presentation: Perth & AdelaideStream 1 - Keynote  Presentation: Perth & Adelaide
Stream 1 - Keynote Presentation: Perth & Adelaide
 
Stream 1- Enhanced Business Performance
Stream 1- Enhanced Business PerformanceStream 1- Enhanced Business Performance
Stream 1- Enhanced Business Performance
 
Stream 1 - Cloud Computing
Stream 1 - Cloud ComputingStream 1 - Cloud Computing
Stream 1 - Cloud Computing
 
Stream 3 - IT optimisation & virtualisation
Stream 3 - IT optimisation & virtualisationStream 3 - IT optimisation & virtualisation
Stream 3 - IT optimisation & virtualisation
 
IBM Business Intelligence Software
IBM Business Intelligence SoftwareIBM Business Intelligence Software
IBM Business Intelligence Software
 
Breakthrough reporting, analysis and planning tools for midsize companies.
Breakthrough reporting, analysis and planning tools for midsize companies.Breakthrough reporting, analysis and planning tools for midsize companies.
Breakthrough reporting, analysis and planning tools for midsize companies.
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

Data Protection Presentation

  • 1. LIVE WEBINAR Data Protection: Safeguarding your business today & tomorrow Wednesday, November 25, 2009 12:30 PM - 1:30 PM (AEDST), Sydney Australia Conference Number: Australia: 1800 098 754 New Zealand: 0800 447 860 Your conference ID #: 42727822
  • 2. Current issues in information security, and the value of data James Turner Advisor
  • 3.
  • 4. Our advisors IBRS is an Australian company providing timely advice, insightful judgement, and thorough research to benefit IT and business managers in Australasian organisations. Dr Kevin McIsaac Terry Dargan Dr Colin Boswell Joseph Sweeney James Turner Alan Hansell Rob Mackinnon Guy Cranswick Irene Pimentel Brian Bowman Jorn Bettin Peter Hind
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Incident response lifecycle Mitigate risks Backup important data Restore Life is too short to only learn from your own mistakes
  • 13. Current issues in information security, and the value of data James Turner Advisor
  • 14. Andrew Fry Business Unit Executive Business Continuity & Resiliency Services, IBM Global Technology Services
  • 15.
  • 16. PGP Encryption – Example Company: A mining and exploration company operating in a highly competitive and volatile market. Problem: Suffered from leakage of sensitive corporate data as a result of stolen employee’s laptop. Solution: Security specialists from IBM ISS implemented a PGP® Whole Disk Encryption solution to protect sensitive corporate data on desktops, laptops and removable media. Benefits: 1) Peace of mind that sensitive data is constantly protected from unauthorised access, providing strong security for intellectual property and reduced competitive risk 2) Data is protected without changing the user experience 3) Reduced operational costs by centrally automating encryption policies
  • 17.
  • 18.
  • 19.
  • 20. Server and Data recovery - Example Company: Financial services firm, servicing mid-size organisations in Australia Problem: Business demanded faster recovery times and assurance that data was being protected every day across distributed sites, and all within existing budget. Solution: Implemented IBM Remote Data Protection to backup critical server data to secure IBM facility, on a pay-as-you-go service. IBM coupled the backup service with IBM Virtual Server recovery to provide complete offsite server and data recovery solution, for a shared price point. Benefits: 1) Client achieved vastly improved recovery times, without needing to invest in expensive dedicated infrastructure 2) Daily reports confirming critical data is securely backed up 3) Storage capacity scales up/down based on usage (opex model)
  • 21. Data Protection Services Avoid data loss or leakage, and have a plan for recovery Mitigate risks Backup important data Restore

Notes de l'éditeur

  1. No, not this cloud
  2. Law of very large numbers – given the number of computer rooms and servers around the place; it’s likely that something will go wrong somewhere.
  3. Price? Subscription? OTC? Rollout?