SlideShare une entreprise Scribd logo
1  sur  19
New Threats to Data Security
                 Growing Risk of Using Unsecure Data Recovery Vendors




Presented by:    Michael Hall, CISO
                 Lynda Martel, Director, Privacy Compliance
Communications
Data Loss a Reality in
 Today’s Digital World




Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
Multiple DR Vendors Being Used
 Majority Used 1X/Week +




Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
Data Recovery Outsourced More
 Often When Critical Data Lost




Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
Data Recovery Vendors Handle
Your Most Sensitive Data
IT Support Chooses
 Data Recovery Vendor




Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
IT Support Believes Speed and
Cost Tops Data Security
Data Recovery Vendors Fly
Under IT Security’s Radar
IT Security Not Involved In
DR Vendor Vetting Process
Vetting Process in Most
 Companies Below Par




Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
Risk Assessments
 Not Often Conducted




Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
Data Breaches at Recovery
Companies Going Up
Insecure Data Recovery
 Operations Cause of Breach




Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
Would Your Cloud Service Provider
 Notify You Of A Breach?




Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
IT & IT Security Understands
 Need to Strengthen Protocols




Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
Not All Data Recovery
Companies are Created Equal
DriveSavers Highlights
 Annual and company-wide SAS 70 II Audit Reports

 Certified secure network

 Compliant with NIST 800.32, FERPA, GLBA, SOX AND HIPAA

 State-of-the-art ISO-5 cleanroom

 Engineers certified to recover data from encrypted files and
  drives – leading data recovery success rates since 1985

 DoD approved data degaussing process

 Authorized by all leading storage device OEMs
A Few of Our
Happy Customers
Thank You!


 Q&A

Contenu connexe

Tendances

Business in the cloud
Business in the cloudBusiness in the cloud
Business in the cloud
NickP0820
 
The We Care A Lot Organization
The We Care A Lot OrganizationThe We Care A Lot Organization
The We Care A Lot Organization
guest2e501e
 
Successes And Achievements
Successes And AchievementsSuccesses And Achievements
Successes And Achievements
waysar
 
Electronic Lab Notebooks in Biomedical Research
Electronic Lab Notebooks in Biomedical ResearchElectronic Lab Notebooks in Biomedical Research
Electronic Lab Notebooks in Biomedical Research
Axiope Limited
 

Tendances (20)

Sgci data west 12-15-16
Sgci data west 12-15-16Sgci data west 12-15-16
Sgci data west 12-15-16
 
Symantec 2011 State of Cloud Survey
Symantec 2011 State of Cloud SurveySymantec 2011 State of Cloud Survey
Symantec 2011 State of Cloud Survey
 
Pentest as a Service Impact 2020
Pentest as a Service Impact 2020Pentest as a Service Impact 2020
Pentest as a Service Impact 2020
 
Business in the cloud
Business in the cloudBusiness in the cloud
Business in the cloud
 
What researchers want with regard to research data management (RDM)
What researchers want with regard to research data management (RDM)What researchers want with regard to research data management (RDM)
What researchers want with regard to research data management (RDM)
 
Storage Made Easy Cloud Control Gateway Overview
Storage Made Easy Cloud Control Gateway OverviewStorage Made Easy Cloud Control Gateway Overview
Storage Made Easy Cloud Control Gateway Overview
 
Tri con feb 2015 final sebastien
Tri con feb 2015  final  sebastienTri con feb 2015  final  sebastien
Tri con feb 2015 final sebastien
 
Symantec 2011 State of Cloud Survey - South Asia Findings
Symantec 2011 State of Cloud Survey - South Asia FindingsSymantec 2011 State of Cloud Survey - South Asia Findings
Symantec 2011 State of Cloud Survey - South Asia Findings
 
Outpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar: Risk-based approach to security assessmentsOutpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar: Risk-based approach to security assessments
 
The We Care A Lot Organization
The We Care A Lot OrganizationThe We Care A Lot Organization
The We Care A Lot Organization
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
 
Preserving software workshop - Community engagement workshop
Preserving software workshop - Community engagement workshopPreserving software workshop - Community engagement workshop
Preserving software workshop - Community engagement workshop
 
Successes And Achievements
Successes And AchievementsSuccesses And Achievements
Successes And Achievements
 
2013 bio it world
2013 bio it world2013 bio it world
2013 bio it world
 
Outpost24 webinar: Security Analytics: what's in a risk score
Outpost24 webinar: Security Analytics: what's in a risk scoreOutpost24 webinar: Security Analytics: what's in a risk score
Outpost24 webinar: Security Analytics: what's in a risk score
 
3 dvc nsf-062813
3 dvc nsf-0628133 dvc nsf-062813
3 dvc nsf-062813
 
Open Decision Repository homecoming day presentation
Open Decision Repository homecoming day presentationOpen Decision Repository homecoming day presentation
Open Decision Repository homecoming day presentation
 
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...
 
Electronic Lab Notebooks in Biomedical Research
Electronic Lab Notebooks in Biomedical ResearchElectronic Lab Notebooks in Biomedical Research
Electronic Lab Notebooks in Biomedical Research
 
Redefine healthcare with IT by Niranjan Thirumale
Redefine healthcare with IT by Niranjan ThirumaleRedefine healthcare with IT by Niranjan Thirumale
Redefine healthcare with IT by Niranjan Thirumale
 

En vedette

Threats to online security and data
Threats to online security and dataThreats to online security and data
Threats to online security and data
Anthonywheeler
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 

En vedette (8)

The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
 
Threats to online security and data
Threats to online security and dataThreats to online security and data
Threats to online security and data
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online Security
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurity
 
Online Security
Online SecurityOnline Security
Online Security
 
Information Security Challenges & Opportunities
Information Security Challenges & OpportunitiesInformation Security Challenges & Opportunities
Information Security Challenges & Opportunities
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similaire à New Threats to Data Security

AISA - v6 - Damien Manuel
AISA -  v6 - Damien ManuelAISA -  v6 - Damien Manuel
AISA - v6 - Damien Manuel
Damien Manuel
 
Trustwave 2012 Global Güvenlik Raporu
Trustwave 2012 Global Güvenlik RaporuTrustwave 2012 Global Güvenlik Raporu
Trustwave 2012 Global Güvenlik Raporu
Erol Dizdar
 

Similaire à New Threats to Data Security (20)

2010 State Of Enterprise Security
2010 State Of Enterprise Security2010 State Of Enterprise Security
2010 State Of Enterprise Security
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
Secure Your High Risk Data
 Secure Your High Risk Data  Secure Your High Risk Data
Secure Your High Risk Data
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
 
Data Breaches: The Untold Story
Data Breaches: The Untold Story  Data Breaches: The Untold Story
Data Breaches: The Untold Story
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data Governance
 
Keynote Theatre. Keynote Day 2. 16:30 Evelyn de Souza
Keynote Theatre. Keynote Day 2. 16:30   Evelyn de Souza Keynote Theatre. Keynote Day 2. 16:30   Evelyn de Souza
Keynote Theatre. Keynote Day 2. 16:30 Evelyn de Souza
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
 
Veritas Managed Enterprise Vault Infographic
Veritas Managed Enterprise Vault InfographicVeritas Managed Enterprise Vault Infographic
Veritas Managed Enterprise Vault Infographic
 
Veritas Managed Enterprise Vault Infographic
Veritas Managed Enterprise Vault InfographicVeritas Managed Enterprise Vault Infographic
Veritas Managed Enterprise Vault Infographic
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
Operational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureOperational Risk Management Data Validation Architecture
Operational Risk Management Data Validation Architecture
 
AISA - v6 - Damien Manuel
AISA -  v6 - Damien ManuelAISA -  v6 - Damien Manuel
AISA - v6 - Damien Manuel
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
Trustwave 2012 Global Güvenlik Raporu
Trustwave 2012 Global Güvenlik RaporuTrustwave 2012 Global Güvenlik Raporu
Trustwave 2012 Global Güvenlik Raporu
 
Informatica Cloud Data Replication for Salesforce
Informatica Cloud Data Replication for SalesforceInformatica Cloud Data Replication for Salesforce
Informatica Cloud Data Replication for Salesforce
 
The Mobility Challenge - Fran Rosch, SVP Mobility
The Mobility Challenge - Fran Rosch, SVP MobilityThe Mobility Challenge - Fran Rosch, SVP Mobility
The Mobility Challenge - Fran Rosch, SVP Mobility
 
Enterprise Information Systems Security: A Case Study in the Banking Sector
Enterprise Information Systems Security: A Case Study in the Banking SectorEnterprise Information Systems Security: A Case Study in the Banking Sector
Enterprise Information Systems Security: A Case Study in the Banking Sector
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

New Threats to Data Security

  • 1. New Threats to Data Security Growing Risk of Using Unsecure Data Recovery Vendors Presented by: Michael Hall, CISO Lynda Martel, Director, Privacy Compliance Communications
  • 2. Data Loss a Reality in Today’s Digital World Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
  • 3. Multiple DR Vendors Being Used Majority Used 1X/Week + Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
  • 4. Data Recovery Outsourced More Often When Critical Data Lost Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
  • 5. Data Recovery Vendors Handle Your Most Sensitive Data
  • 6. IT Support Chooses Data Recovery Vendor Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
  • 7. IT Support Believes Speed and Cost Tops Data Security
  • 8. Data Recovery Vendors Fly Under IT Security’s Radar
  • 9. IT Security Not Involved In DR Vendor Vetting Process
  • 10. Vetting Process in Most Companies Below Par Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
  • 11. Risk Assessments Not Often Conducted Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
  • 12. Data Breaches at Recovery Companies Going Up
  • 13. Insecure Data Recovery Operations Cause of Breach Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
  • 14. Would Your Cloud Service Provider Notify You Of A Breach? Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
  • 15. IT & IT Security Understands Need to Strengthen Protocols Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
  • 16. Not All Data Recovery Companies are Created Equal
  • 17. DriveSavers Highlights  Annual and company-wide SAS 70 II Audit Reports  Certified secure network  Compliant with NIST 800.32, FERPA, GLBA, SOX AND HIPAA  State-of-the-art ISO-5 cleanroom  Engineers certified to recover data from encrypted files and drives – leading data recovery success rates since 1985  DoD approved data degaussing process  Authorized by all leading storage device OEMs
  • 18. A Few of Our Happy Customers