SlideShare une entreprise Scribd logo
1  sur  51
Hi
me
me



mickey
me
mickey
me
mickey
me
mickey
me
mickey
me
mickey
me
mickey
me
mickey
me
mickey
me
mickey
me
mickey
me
mickey
me
                mickey




(^ full stop)
Disasters
Disasters


  (oh my!)
More disasters:
More disasters:
More disasters:
More disasters:
More disasters:
Emergencies
Emergencies
   (can be)
Emergencies
   (can be)

Disastrous
Emergencies
   (can be)

Disastrous
Plan!

• Prevent
• Communicate
• Recover
• Energize!
Communicate
Communicate


     :(
Communicate


      :(
    (share)
Communicate


      :(
    (share)
Test
Test

(like voting)
Test

(like voting)
Test

 (like voting)


don’t be a Dick
pound of cure

• Colocate / managed services
• Good server/network design
• Network backups (mozy, symantec, iron
  mountain)
In the closet

• File server (if it’s a file, it should be on the
  server)
• Local backups
• Servers (v. workstations)
Out of the closet


• Everything else.
• Network backups
Security
Security

   DOS
Security

    DOS
  “hacking”
Security

                 DOS
               “hacking”
insider attacks, social engineering, etc.
Security

                 DOS
               “hacking”
insider attacks, social engineering, etc.
Communications


• Diversify
• who calls whom when and how?
the starting gun


• When does an emergency start?
• Milestones
Continuity planning


• How long can you afford to be down?
• How much does it cost to stay up?
0-24hr downtime

       Hot standby
  Geographical redundancy
      “spare” servers
   Network connectivity?
Work from home
http://www.infamia.com


 mickey@infamia.com

Contenu connexe

Similaire à Disasters!

William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015CSO_Presentations
 
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...Pro Mrkt
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DANeil Lines
 
Go.miami.july.17.2014.golang.powers.docker
Go.miami.july.17.2014.golang.powers.dockerGo.miami.july.17.2014.golang.powers.docker
Go.miami.july.17.2014.golang.powers.dockerGuillaume Charmes
 
Fix What Matters: A Data Driven Approach to Vulnerability Management
Fix What Matters: A Data Driven Approach to Vulnerability ManagementFix What Matters: A Data Driven Approach to Vulnerability Management
Fix What Matters: A Data Driven Approach to Vulnerability ManagementMichael Roytman
 
Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)Dan Kaminsky
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Justin Bull
 
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02Mark Evertz
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesMaxime ALAY-EDDINE
 
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON
 
Bh europe 2013_wilhoit
Bh europe 2013_wilhoitBh europe 2013_wilhoit
Bh europe 2013_wilhoitKyle Wilhoit
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"StHack
 
Genetic Malware
Genetic MalwareGenetic Malware
Genetic MalwareOkta
 

Similaire à Disasters! (20)

William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015
 
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DA
 
Go.miami.july.17.2014.golang.powers.docker
Go.miami.july.17.2014.golang.powers.dockerGo.miami.july.17.2014.golang.powers.docker
Go.miami.july.17.2014.golang.powers.docker
 
Fix What Matters: A Data Driven Approach to Vulnerability Management
Fix What Matters: A Data Driven Approach to Vulnerability ManagementFix What Matters: A Data Driven Approach to Vulnerability Management
Fix What Matters: A Data Driven Approach to Vulnerability Management
 
Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)
 
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?
 
Dmk bo2 k8_ccc
Dmk bo2 k8_cccDmk bo2 k8_ccc
Dmk bo2 k8_ccc
 
Bh europe 2013_wilhoit
Bh europe 2013_wilhoitBh europe 2013_wilhoit
Bh europe 2013_wilhoit
 
Confidence web
Confidence webConfidence web
Confidence web
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Genetic Malware
Genetic MalwareGenetic Malware
Genetic Malware
 
Genetic Malware
Genetic MalwareGenetic Malware
Genetic Malware
 

Dernier

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Dernier (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Disasters!

Notes de l'éditeur

  1. Name is Mickey [cue x2], I used to work at Verio [cue x2] for 10 years where I managed the east coast network.. Now I co-own infamia [cuex2] with my business partner Ernesto [cue x2], which is also the name of a tropical storm [cuex2] I spent at anchor by Vera’s White Sands just down the street. Some people say I talk too fast [cue x2] so if you don’t understand me, please feel free to raise a hand or raise your voice and stop me [cue]. I’m here to talk a bit about Disasters.
  2. Name is Mickey [cue x2], I used to work at Verio [cue x2] for 10 years where I managed the east coast network.. Now I co-own infamia [cuex2] with my business partner Ernesto [cue x2], which is also the name of a tropical storm [cuex2] I spent at anchor by Vera’s White Sands just down the street. Some people say I talk too fast [cue x2] so if you don’t understand me, please feel free to raise a hand or raise your voice and stop me [cue]. I’m here to talk a bit about Disasters.
  3. Name is Mickey [cue x2], I used to work at Verio [cue x2] for 10 years where I managed the east coast network.. Now I co-own infamia [cuex2] with my business partner Ernesto [cue x2], which is also the name of a tropical storm [cuex2] I spent at anchor by Vera’s White Sands just down the street. Some people say I talk too fast [cue x2] so if you don’t understand me, please feel free to raise a hand or raise your voice and stop me [cue]. I’m here to talk a bit about Disasters.
  4. Name is Mickey [cue x2], I used to work at Verio [cue x2] for 10 years where I managed the east coast network.. Now I co-own infamia [cuex2] with my business partner Ernesto [cue x2], which is also the name of a tropical storm [cuex2] I spent at anchor by Vera’s White Sands just down the street. Some people say I talk too fast [cue x2] so if you don’t understand me, please feel free to raise a hand or raise your voice and stop me [cue]. I’m here to talk a bit about Disasters.
  5. Name is Mickey [cue x2], I used to work at Verio [cue x2] for 10 years where I managed the east coast network.. Now I co-own infamia [cuex2] with my business partner Ernesto [cue x2], which is also the name of a tropical storm [cuex2] I spent at anchor by Vera’s White Sands just down the street. Some people say I talk too fast [cue x2] so if you don’t understand me, please feel free to raise a hand or raise your voice and stop me [cue]. I’m here to talk a bit about Disasters.
  6. Name is Mickey [cue x2], I used to work at Verio [cue x2] for 10 years where I managed the east coast network.. Now I co-own infamia [cuex2] with my business partner Ernesto [cue x2], which is also the name of a tropical storm [cuex2] I spent at anchor by Vera’s White Sands just down the street. Some people say I talk too fast [cue x2] so if you don’t understand me, please feel free to raise a hand or raise your voice and stop me [cue]. I’m here to talk a bit about Disasters.
  7. Name is Mickey [cue x2], I used to work at Verio [cue x2] for 10 years where I managed the east coast network.. Now I co-own infamia [cuex2] with my business partner Ernesto [cue x2], which is also the name of a tropical storm [cuex2] I spent at anchor by Vera’s White Sands just down the street. Some people say I talk too fast [cue x2] so if you don’t understand me, please feel free to raise a hand or raise your voice and stop me [cue]. I’m here to talk a bit about Disasters.
  8. Name is Mickey [cue x2], I used to work at Verio [cue x2] for 10 years where I managed the east coast network.. Now I co-own infamia [cuex2] with my business partner Ernesto [cue x2], which is also the name of a tropical storm [cuex2] I spent at anchor by Vera’s White Sands just down the street. Some people say I talk too fast [cue x2] so if you don’t understand me, please feel free to raise a hand or raise your voice and stop me [cue]. I’m here to talk a bit about Disasters.
  9. Name is Mickey [cue x2], I used to work at Verio [cue x2] for 10 years where I managed the east coast network.. Now I co-own infamia [cuex2] with my business partner Ernesto [cue x2], which is also the name of a tropical storm [cuex2] I spent at anchor by Vera’s White Sands just down the street. Some people say I talk too fast [cue x2] so if you don’t understand me, please feel free to raise a hand or raise your voice and stop me [cue]. I’m here to talk a bit about Disasters.
  10. Name is Mickey [cue x2], I used to work at Verio [cue x2] for 10 years where I managed the east coast network.. Now I co-own infamia [cuex2] with my business partner Ernesto [cue x2], which is also the name of a tropical storm [cuex2] I spent at anchor by Vera’s White Sands just down the street. Some people say I talk too fast [cue x2] so if you don’t understand me, please feel free to raise a hand or raise your voice and stop me [cue]. I’m here to talk a bit about Disasters.
  11. Name is Mickey [cue x2], I used to work at Verio [cue x2] for 10 years where I managed the east coast network.. Now I co-own infamia [cuex2] with my business partner Ernesto [cue x2], which is also the name of a tropical storm [cuex2] I spent at anchor by Vera’s White Sands just down the street. Some people say I talk too fast [cue x2] so if you don’t understand me, please feel free to raise a hand or raise your voice and stop me [cue]. I’m here to talk a bit about Disasters.
  12. Name is Mickey [cue x2], I used to work at Verio [cue x2] for 10 years where I managed the east coast network.. Now I co-own infamia [cuex2] with my business partner Ernesto [cue x2], which is also the name of a tropical storm [cuex2] I spent at anchor by Vera’s White Sands just down the street. Some people say I talk too fast [cue x2] so if you don’t understand me, please feel free to raise a hand or raise your voice and stop me [cue]. I’m here to talk a bit about Disasters.
  13. Name is Mickey [cue x2], I used to work at Verio [cue x2] for 10 years where I managed the east coast network.. Now I co-own infamia [cuex2] with my business partner Ernesto [cue x2], which is also the name of a tropical storm [cuex2] I spent at anchor by Vera’s White Sands just down the street. Some people say I talk too fast [cue x2] so if you don’t understand me, please feel free to raise a hand or raise your voice and stop me [cue]. I’m here to talk a bit about Disasters.
  14. A few “disasters” I’ve had to work through: on a normal night in 2003 the northeeast looks like this, and I had at least one data center in every major city. When this [slide] happened, it wasn’t very much fun. Hurricane isabelle (pictured is Hatteras, before and after Isabelle), when I was carrying jerry cans of diesel to our generator because I couldn’t get in touch with the fuel truck. And 9/11, of which I have no pictures because nobody wants to see that again, but props to my man Louis who gave us updates when he could. Lastly: not all disasters make the news, so we’ll address small disasters here as well. Quite frankly the nature of the disaster does not matter much. What does matter is how it affects you, your network, your data, your clients. So instead of disasters I like to talk about emergencies.
  15. A few “disasters” I’ve had to work through: on a normal night in 2003 the northeeast looks like this, and I had at least one data center in every major city. When this [slide] happened, it wasn’t very much fun. Hurricane isabelle (pictured is Hatteras, before and after Isabelle), when I was carrying jerry cans of diesel to our generator because I couldn’t get in touch with the fuel truck. And 9/11, of which I have no pictures because nobody wants to see that again, but props to my man Louis who gave us updates when he could. Lastly: not all disasters make the news, so we’ll address small disasters here as well. Quite frankly the nature of the disaster does not matter much. What does matter is how it affects you, your network, your data, your clients. So instead of disasters I like to talk about emergencies.
  16. A few “disasters” I’ve had to work through: on a normal night in 2003 the northeeast looks like this, and I had at least one data center in every major city. When this [slide] happened, it wasn’t very much fun. Hurricane isabelle (pictured is Hatteras, before and after Isabelle), when I was carrying jerry cans of diesel to our generator because I couldn’t get in touch with the fuel truck. And 9/11, of which I have no pictures because nobody wants to see that again, but props to my man Louis who gave us updates when he could. Lastly: not all disasters make the news, so we’ll address small disasters here as well. Quite frankly the nature of the disaster does not matter much. What does matter is how it affects you, your network, your data, your clients. So instead of disasters I like to talk about emergencies.
  17. A few “disasters” I’ve had to work through: on a normal night in 2003 the northeeast looks like this, and I had at least one data center in every major city. When this [slide] happened, it wasn’t very much fun. Hurricane isabelle (pictured is Hatteras, before and after Isabelle), when I was carrying jerry cans of diesel to our generator because I couldn’t get in touch with the fuel truck. And 9/11, of which I have no pictures because nobody wants to see that again, but props to my man Louis who gave us updates when he could. Lastly: not all disasters make the news, so we’ll address small disasters here as well. Quite frankly the nature of the disaster does not matter much. What does matter is how it affects you, your network, your data, your clients. So instead of disasters I like to talk about emergencies.
  18. Emergencies have a tricky tendency of not always being associated with a disaster. But even when they’re not, they can be disastrous: a hard drive crash, power failure, a/c failure, connectivity failure all seem to happen at the worst time. We used to have a point of present in columbia called the “barn” (because it was in an actual barn). An entire disk array decided to go bad one night. Christmas Eve, I believe. How do we cope with hurricanes, floods, dust storms, and barn animals? Three things.
  19. Emergencies have a tricky tendency of not always being associated with a disaster. But even when they’re not, they can be disastrous: a hard drive crash, power failure, a/c failure, connectivity failure all seem to happen at the worst time. We used to have a point of present in columbia called the “barn” (because it was in an actual barn). An entire disk array decided to go bad one night. Christmas Eve, I believe. How do we cope with hurricanes, floods, dust storms, and barn animals? Three things.
  20. Emergencies have a tricky tendency of not always being associated with a disaster. But even when they’re not, they can be disastrous: a hard drive crash, power failure, a/c failure, connectivity failure all seem to happen at the worst time. We used to have a point of present in columbia called the “barn” (because it was in an actual barn). An entire disk array decided to go bad one night. Christmas Eve, I believe. How do we cope with hurricanes, floods, dust storms, and barn animals? Three things.
  21. Emergencies have a tricky tendency of not always being associated with a disaster. But even when they’re not, they can be disastrous: a hard drive crash, power failure, a/c failure, connectivity failure all seem to happen at the worst time. We used to have a point of present in columbia called the “barn” (because it was in an actual barn). An entire disk array decided to go bad one night. Christmas Eve, I believe. How do we cope with hurricanes, floods, dust storms, and barn animals? Three things.
  22. Have an emergency management/preparedness plan. Plan should include: preventative measures (backups, network redundancy, off-site backups, managed v. self-hosted, etc) communications strategies: don’t assume you’ll be able to reach the person you need in an emergency. Landlines and cellphones may be useless. Plan on diverse communications strategies Recovery methods. Will you need new hardware? different connectivity? What repair/replace times does your support/maintenance plan with your vendors promise you? Your backups vendor? lastly: When do you trigger your emergency plan? This is not always so simple in the middle of an ongoing disaster to decide that this really is a disaster and it won’t get better in about 35 seconds. Hope springs eternal… More on these, but first…
  23. So you got yourself a plan, you got it approved, printed at the printers with twenty seven eight-by-ten colour glossy photographs with circles and arrows and a paragraph on the back of each one just like Officer Obie…and then shit hits the fan and Mickey can’t find you and he calls up Fred, and guess what, Fred’s never even seen the plan. So sad. (like the officer Obie when he saw the blind judge) [cue] So, share. I know it’s your baby, but it does you no good if nobody knows it. Play well with others: share. [cue] You won’t know who’ll be around when disaster hits, so the question is not “who needs this”, but rather, why would anyone NOT have this? Hire a skywriter if you have to. Get the word out.
  24. So you got yourself a plan, you got it approved, printed at the printers with twenty seven eight-by-ten colour glossy photographs with circles and arrows and a paragraph on the back of each one just like Officer Obie…and then shit hits the fan and Mickey can’t find you and he calls up Fred, and guess what, Fred’s never even seen the plan. So sad. (like the officer Obie when he saw the blind judge) [cue] So, share. I know it’s your baby, but it does you no good if nobody knows it. Play well with others: share. [cue] You won’t know who’ll be around when disaster hits, so the question is not “who needs this”, but rather, why would anyone NOT have this? Hire a skywriter if you have to. Get the word out.
  25. So you got yourself a plan, you got it approved, printed at the printers with twenty seven eight-by-ten colour glossy photographs with circles and arrows and a paragraph on the back of each one just like Officer Obie…and then shit hits the fan and Mickey can’t find you and he calls up Fred, and guess what, Fred’s never even seen the plan. So sad. (like the officer Obie when he saw the blind judge) [cue] So, share. I know it’s your baby, but it does you no good if nobody knows it. Play well with others: share. [cue] You won’t know who’ll be around when disaster hits, so the question is not “who needs this”, but rather, why would anyone NOT have this? Hire a skywriter if you have to. Get the word out.
  26. And now that everyone has the plan, you need to test it. Early and often. [cue] And end-to-end. If you’re testing a backup, do erase the original file (make sure it’s backed up first). If you’re testing a generator, do turn off municipal power. If we had a guitar, I’d sing you the story of old Dick, our Facilities guy in Alexandria (VA). Dick used to test the generator religiously every month. Every month, on the firsrt Monday, Dick would fire it up, let it warm up, test voltages, fill in forms, take measurements, and on and on. Then we had a power outage. The generator fired up. The generator warmed up, the measurements were measured. Then the transfer switch saw voltage…for the first time in about 5 years, and about 4 copper bus bars promptly burnt to a crisp. The data center lost power. Surprisingly, Dick didn’t get fired, but the moral of the story is still the same [cue]: test the entire thing, end to end. Simulate a problem. Do it in controlled circumstances, and no one gets hurt.
  27. And now that everyone has the plan, you need to test it. Early and often. [cue] And end-to-end. If you’re testing a backup, do erase the original file (make sure it’s backed up first). If you’re testing a generator, do turn off municipal power. If we had a guitar, I’d sing you the story of old Dick, our Facilities guy in Alexandria (VA). Dick used to test the generator religiously every month. Every month, on the firsrt Monday, Dick would fire it up, let it warm up, test voltages, fill in forms, take measurements, and on and on. Then we had a power outage. The generator fired up. The generator warmed up, the measurements were measured. Then the transfer switch saw voltage…for the first time in about 5 years, and about 4 copper bus bars promptly burnt to a crisp. The data center lost power. Surprisingly, Dick didn’t get fired, but the moral of the story is still the same [cue]: test the entire thing, end to end. Simulate a problem. Do it in controlled circumstances, and no one gets hurt.
  28. And now that everyone has the plan, you need to test it. Early and often. [cue] And end-to-end. If you’re testing a backup, do erase the original file (make sure it’s backed up first). If you’re testing a generator, do turn off municipal power. If we had a guitar, I’d sing you the story of old Dick, our Facilities guy in Alexandria (VA). Dick used to test the generator religiously every month. Every month, on the firsrt Monday, Dick would fire it up, let it warm up, test voltages, fill in forms, take measurements, and on and on. Then we had a power outage. The generator fired up. The generator warmed up, the measurements were measured. Then the transfer switch saw voltage…for the first time in about 5 years, and about 4 copper bus bars promptly burnt to a crisp. The data center lost power. Surprisingly, Dick didn’t get fired, but the moral of the story is still the same [cue]: test the entire thing, end to end. Simulate a problem. Do it in controlled circumstances, and no one gets hurt.
  29. Back to prevention. Some more thoughts on that. This is a boring slide, so take notes. -Colocate or managed: that wiring closet full of your “server” that used to be janitorial supplies? Get rid of it. Data centers are built to house computers. Closets are filled to house janitorial supplies. Your janitor will love you, and your boss too. - strong network and server architecture from the start will help prevent a lot of problems, so you won’t need the backups. Ever wondered why some computers cost $300 and some $3000? Go for the $3000. Add RAID, redundant database/fileservers, etc. -Network backups: bla bla bla Or you can rely on Dick (remember Dick?) to take some tape home on Tuesdays.
  30. Don’t trust powerstrips. They’re good for maybe a year or so but at least used to be notoriously for failing. In addition, when the surge does trip the power strip, the machines go down. UPS (Uninterruptible Power Supply) systems are the way to go for your in-house server. (Do not plug printers into UPS ). The best-quality UPS put out cleaner AC power than your utility power.
  31. I did say you should not keep your servers in-house, but if you have an office, you’ll likely need to keep some server in-house. Your file server, print server, etc. Number one no-questions asked policy: Everyone keeps all the files in the file server. In addition, a local backup can help get you back up and running very quickly in the event of a single server failure.
  32. Everything that doesn’t need to be a stone’s throw away, should be outsourced, colocated, or hosted. (define these) Network backups: of your file server at least. Test backups end-to-end. (My quickbooks file was not compatible with a new qbooks install from DVD, and updates were no longer available from quckbooks)
  33. Denial of service attacks are annoying and cause significant productivity loss. These are a significant concern for hosted services rather than your in-house servers More lossy, hacking attack where an intruder gains access to your server may have more severe consequences, from loss of data to compromise of sensitive information Most attacks where the intruder gains access to a server/network are linked to someone on the “inside”: a disgruntled employee or ex-employee, someone’s personal computer/laptop was poorly secured and compromised, etc. A network is as secure as its weakest link…are your staff’s computers up-to-date with patches?
  34. Denial of service attacks are annoying and cause significant productivity loss. These are a significant concern for hosted services rather than your in-house servers More lossy, hacking attack where an intruder gains access to your server may have more severe consequences, from loss of data to compromise of sensitive information Most attacks where the intruder gains access to a server/network are linked to someone on the “inside”: a disgruntled employee or ex-employee, someone’s personal computer/laptop was poorly secured and compromised, etc. A network is as secure as its weakest link…are your staff’s computers up-to-date with patches?
  35. Denial of service attacks are annoying and cause significant productivity loss. These are a significant concern for hosted services rather than your in-house servers More lossy, hacking attack where an intruder gains access to your server may have more severe consequences, from loss of data to compromise of sensitive information Most attacks where the intruder gains access to a server/network are linked to someone on the “inside”: a disgruntled employee or ex-employee, someone’s personal computer/laptop was poorly secured and compromised, etc. A network is as secure as its weakest link…are your staff’s computers up-to-date with patches?
  36. Denial of service attacks are annoying and cause significant productivity loss. These are a significant concern for hosted services rather than your in-house servers More lossy, hacking attack where an intruder gains access to your server may have more severe consequences, from loss of data to compromise of sensitive information Most attacks where the intruder gains access to a server/network are linked to someone on the “inside”: a disgruntled employee or ex-employee, someone’s personal computer/laptop was poorly secured and compromised, etc. A network is as secure as its weakest link…are your staff’s computers up-to-date with patches?
  37. The only thing I can say about this is diversify. VoIP as well as landline as well as cell as well as satelite phones. Most importantly, communications should be a part of your plan. Your girl on the ground will be the one who knows best how to get word out. Will she know whom to call? With what information? Will the guy on the other end know what to tell her? how to send what she needs? On 9/11, Louis could only call out twice in 2 days. And he still had to call his family. Make sure that one call counts. Have bail money handy.
  38. Disasters cost money. Maybe a lot of money. When is it time to dispatch that executive jet to send replacement parts? (this is actually a service we used to have at Verio). The guy on the ground with his computers on fire should not be placed in a position to make that decision as well. Especially since the guy on the ground may not know the full cost/rewards scenario for your company. Your plan should have reactionary milestones: after 3 hours of downtime, for example. Or 75% of cusotmers without service.