Keynote Speech Keys to Resilience for SMEs

Size: px
Start display at page:

Download "Keynote Speech Keys to Resilience for SMEs"

Transcription

1 2014/EPWG-SMEWG/HLPD/003 Session 2 Keynote Speech Keys to Resilience for SMEs Submitted by: IBM High Level Policy Dialogue on Resilient SMEs for Better Global Supply Chains Taichung, Chinese Taipei 24 March 2014

2 Mijee Dirks, Executive Consultant, IBM Global Business Continuity and Resilience Services 24 March 2014 Keys to Resilience for Small and Medium Enterprises BUP03031-USEN-03 Agenda Risks to Resilience IBM Resilience Framework Resilience Lifecycle Conclusion 2 1

3 Today s businesses need to reduce expenses and manage risk while maintaining continual availability to data and services. Mobile in the enterprise 90 percent of organizations will support corporate applications on personal devices by Increased outage costs 38 percent Increased to US$182 thousand per hour in two years from Innovation in the cloud 60 percent of chief information officers view cloud computing as critical to their plans 5 Aging infrastructure 71 percent of data centers are over 7 years old 1 Budgetary constraints 71 percent of the average IT budget is dedicated to ongoing operations 4 Exploding data growth 40 zettabyte of digital content in 2020, a 500 percent increase from Unplanned IT outages 70 percent of organizations surveyed list this as their primary concern 7 1 The Essential CIO: Insights from the Global Chief Information Officer Study, May 2011, 2 Aberdeen Group, Datacenter Downtime: How Much Does it Really Cost?, March 2012, 3 IDC, Digital Universe Study, June 2011, 4 Based on IBM Research, 5 McKinsey, How IT is managing new demands, 2011, 6 Gartner predicts that by 2014, 90% of organizations will support corporate applications on a personal devices., 7 The Business Continuity Institute, Horizon Scan Survey Report 3 External threats are increasing globally, with economic losses from all types of disasters escalating rapidly natural catastrophes Hailstorms, severe storms Canada, August Drought USA, Summer Severe storms, tornadoes USA, 2-4 March Severe storms USA, April Earthquake Mexico, 20 March Severe storms USA, 28 June- 2 July Hurricane Sandy USA, Caribbean August Hurricane Isaac USA, Caribbean August United Kingdom, November Winter storm Andrea Europe, 5-6 January Earthquakes Italy, 20/29 May Nigeria, July- Oct Cold wave Eastern Europe, Jan- Feb Flash floods Russia, 6-8 July Earthquake Iran, 11 August Cold wave Afghanistan, Jan- March Pakistan, 3-27September, flash floods Australia, Jan - Feb China, July Typhoon Haikui China, 8-9 August Typhoon Bopha Philippines. 4-5 December Columbia, March- June, hailstorms South Africa, October, flash floods Australia, Feb - March Number of events: 905 Geophysical events (earthquake, tsunami, volcanic activity) Meteorological events (storm) Hydrological events (floods, mass movement) Climatological events (extreme temperature, drought, wildfire) Source: Münchener Rückversicherungs-Gesellschaft, Geo Risks Research, NatCatSERVICE, January

4 The increasingly connected world has magnified the impact on every aspect of life, including its disruptions. Earthquake and tsunami BT resin shortage Car parts shortage Nuclear plant explosion Mobile circuit production issue WW impact to car production 90 percent of the worldwide (WW) Bismaleimide-Triazine (BT) resin supply stopped 1 World-wide car production was down by percent for some major auto manufacturers during April and May 2 The percentage of visitors to Japan dropped to 60 percent in April 3 Volcano Flight cancellation Decreasing tourism Airlines discontinuation The Iceland volcanic eruption cost airlines US$1.7 billion with more than 10 million people affected 4 Game site attacked by hacker Personal information stolen Class action lawsuit Personal information leaks have cost millions of dollars, led to class action law suits, and damaged corporate reputation Servers shut down by human error Platform outage Downstream service provider disruption Hosting provider service outages affect Platform-as-a-Service (PaaS) and Software-asa-Service (SaaS) for other vendors 1 Update: Analysts fear shortage of key resin, Dylan McGrath, 17 March Japan's Earthquake and Tsunami Hit Parts Supplies, Motor Trend, June Japan's tourism industry recovering after the tsunami, BBC Business News, 6 October Volcano Crisis Cost Airlines $1.7 Billion in Revenue - IATA Urges Measures to Mitigate Impact, IATA Pressroom, 21 April IBM s Resilience Framework depicts a comprehensive view of an Enterprise Resilience program. Continuity Availability Recovery Strategy and vision Security IBM Resilience Framework Organization Processes Applications and data Technology Facilities To deliver a total resilience program, the resilience capability of each layer must be optimized. 6 3

5 True resilience requires a lifecycle methodology to achieve sustainable improvements. Inputs: Business imperatives: IT risk management Business objectives, goals, priorities, policies and current capabilities Evaluate Analyze Define Design Regulatory compliance Corporate governance Reputation Operational risk management Outputs: Reduced risk, improved governance and facilitated compliance management Control Monitor Deploy Validate 7 To build a business resilience program, you must first assess your potential risks, their impact and your ability to mitigate them. Assess Analyze current and potential risks, and establish a risk profile by location, line-ofbusiness function and business process. Determine impact of event: financial, opportunity and reputation. Evaluate mitigation capabilities to develop customized risk framework Identify areas for further analysis. Assess maturity of mitigation capabilities, including basic, managed, predictive, adaptive and resilient capabilities. Diagnose risks to business objectives and prescribe appropriate actions to improve business resilience. 8 4

6 Enterprise-wide risks need to be identified, prioritized and addressed as you design and develop your business resilience programs. Plan Set objectives for risk mitigation or enhancement to help: Define the scope for the risk strategy. Select the risks that need to be mitigated or enhanced Define strategic business continuity, disaster recovery and crisis management plans to help sustain critical operations in the event of a disruption Design for business resilience: Business and financial justification Governance and authority and policies Systems management disciplines Physical and logical security Application and data Program execution Facilities Improve your business resilience with cost-optimized, IT resilience architectures, plans, procedures and strategies. 9 Validate IT recovery plans, procedures, and processes meet business resilience requirements through appropriate testing. Implement Choose resilient partners for your resilience solutions, including data storage and Disaster Recovery Deploy business resilience program: Implement resilience architecture, processes, and organization structure Document resilience programs and train key personnel Validate business resilience plans and procedures Architect and execute tests of defined resilience plans to help confirm they meet specified objectives: Protection of critical information Recoverability of business functions Execute tests or perform walkthrough drills to identify resilience plan weaknesses for improvement and preparedness Identify resilience plan issues and gaps to be addressed before a disruptive event occurs. 10 5

7 A centralized governance program is critical for managing and maintaining a sustainable business resilience program. Manage Monitor current conditions to detect and respond to risks. Control negative risk while enhancing positive risk. Maintain compliance with regulatory requirements Report on performance utilizing resilience dashboards to demonstrate readiness and results of business investment in resilience Re-assess Perform periodic assessments to validate that resilience plans still address business strategies and risks Perform continuous improvement Helps ensure a state of readiness to respond to an outage event or a market opportunity. 11 Conclusion Surviving in a competitive business environment requires continuous availability of IT systems and data, even in the event of a disaster. Businesses can face revenue loss and erosion of customer trust if they fail to maintain continuity while rapidly adapting and responding to risks and opportunities. You need to create, implement and manage a business resilience strategy that centers on identifying and mitigating prioritized risks across your enterprise. It is critical to choose resilient partners as you implement your enterprise resilience strategy. IBM s recommended lifecycle methodology helps you achieve more sustainable improvements in business resilience, optimize cost and better manage risk and compliance. 12 6

8 Thank you for your time today. For more information: IBM Resiliency Consulting Services IBM Business Continuity and Resiliency Services Contact: IBM Taiwan BCRS Solution Sales Manager Samuel Tsai Tel :

Summary of today s session.

Summary of today s session. IBM Global Technology Services How to integrate cloud-based disaster recovery into your existing business continuity plans Richard Cocchiara: IBM Distinguished Engineer; CTO & Resiliency Services (BCRS);

More information

Time to Rethink our Assumptions about Risk and Resiliency Approaches. Business Continuity and Disaster Resiliency Forum Manila, Philippines

Time to Rethink our Assumptions about Risk and Resiliency Approaches. Business Continuity and Disaster Resiliency Forum Manila, Philippines IBM Global Technology Services Time to Rethink our Assumptions about Risk and Resiliency Approaches Business Continuity and Disaster Resiliency Forum Manila, Philippines Patrick Corcoran, Global Business

More information

Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security

Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security Cyber Resiliency Minimizing the impact of breaches on business continuity Jean-Michel Lamby Associate Partner - IBM Security Brussels Think Brussels / Cyber Resiliency / Oct 4, 2018 / 2018 IBM Corporation

More information

Threat and Hazard Identification and Risk Assessment (THIRA) In Progress Review (IPR) July 2012

Threat and Hazard Identification and Risk Assessment (THIRA) In Progress Review (IPR) July 2012 Threat and Hazard Identification and Risk Assessment (THIRA) In Progress Review (IPR) 2 13 July 2012 1 Roll Call Region A Region B Region C Region D Region E Region F Region G Region H Region I STL UASI

More information

TSC Business Continuity & Disaster Recovery Session

TSC Business Continuity & Disaster Recovery Session TSC Business Continuity & Disaster Recovery Session Mohamed Ashmawy Infrastructure Consulting Pursuit Hewlett-Packard Enterprise Saudi Arabia Mohamed.ashmawy@hpe.com Session Objectives and Outcomes Objectives

More information

UL and Business Continuity

UL and Business Continuity UL and Business Continuity David Stowe, CBCP Business Continuity Manager APEC EPWG Workshop: Private Sector Emergency Preparedness Hotel Monterey Sendai 3 rd August 2011 2011 Underwriters Laboratories

More information

EQUINIX BUSINESS CONTINUITY ADVANCED SERVICES KEEP YOUR BUSINESS UP AND RUNNING

EQUINIX BUSINESS CONTINUITY ADVANCED SERVICES KEEP YOUR BUSINESS UP AND RUNNING EQUINIX BUSINESS CONTINUITY ADVANCED SERVICES KEEP YOUR BUSINESS UP AND RUNNING BUSINESS CONTINUITY EQUINIX BUSINESS CONTINUITY ADVANCED SERVICES The key to every successful Business Continuity Solution

More information

DATACENTER SERVICES DATACENTER

DATACENTER SERVICES DATACENTER SERVICES SOLUTION SUMMARY ALL CHANGE React, grow and innovate faster with Computacenter s agile infrastructure services Customers expect an always-on, superfast response. Businesses need to release new

More information

IBM Resiliency Services:

IBM Resiliency Services: IBM Resiliency Services: Always there, in an always-on world How did we get here? Two IT professionals are experiencing frequent business interruptions that are beyond what a traditional disaster recovery

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

The IBM Resiliency Model Business Continuity & Resiliency Services Site & Facility Services

The IBM Resiliency Model Business Continuity & Resiliency Services Site & Facility Services Global Technology Services The IBM Resiliency Model Business Continuity & Resiliency Services Site & Facility Services 7 June 2007 - Lux Tech - Luxembourg Erwin Husmann Graham Aldridge The IBM Resiliency

More information

The Future of Business Continuity & Resiliency

The Future of Business Continuity & Resiliency The Future of Business Continuity & Resiliency Richard Cocchiara: IBM Distinguished Engineer; CTO IBM Business Continuity & Resiliency Services (BCRS); Managing Partner IBM Resiliency Consulting Services

More information

Build a viable plan for disaster recovery and crisis management.

Build a viable plan for disaster recovery and crisis management. Disaster recovery and crisis management solutions To support your IT objectives Build a viable plan for disaster recovery and crisis management. Highlights Build a plan to help respond to and recover from

More information

PARTNERSHIP INTRODUCTION June 29, 2017

PARTNERSHIP INTRODUCTION June 29, 2017 PARTNERSHIP INTRODUCTION June 29, 2017 OUR MISSION ERADICATE DOWNTIME & DATA-LOSS With a 15-Minute Failover Guarantee THREATS TO BUSINESS CONTINUITY DATA LOSS RANSOMWARE DOWNTIME THE PROBLEMS SYSTEM DOWNTIME

More information

ISO in the world today

ISO in the world today ISO 27001 in the world today 1 Agenda ISO 27001 worldwide Why ISO 27001 Framework to implement ISO 27001 2 ISO 27001 worldwide Source: ISO Annual Survey 3 ISO 27001 worldwide Number of Certificates Year

More information

IT Consulting and Implementation Services

IT Consulting and Implementation Services PORTFOLIO OVERVIEW IT Consulting and Implementation Services Helping IT Transform the Way Business Innovates and Operates 1 2 PORTFOLIO OVERVIEW IT Consulting and Implementation Services IT is moving from

More information

Taking a Business Risk Portfolio (BRP) Approach to Information Security

Taking a Business Risk Portfolio (BRP) Approach to Information Security SESSION ID: GRC-F03 Taking a Business Risk Portfolio (BRP) Approach to Information Security Johna Till Johnson CEO and Founder Nemertes Research @johnatilljohnso - @nemertes Executive View of InfoSec ca.

More information

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe Think Oslo 2018 Where Technology Meets Humanity Oslo Felicity March Cyber Resilience - Europe Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity

More information

Business continuity and resiliency services from IBM

Business continuity and resiliency services from IBM IBM Global Technology Services Thought Leadership White Paper May 2011 Business continuity and resiliency services from IBM Helping business stay in business 2 Business continuity and resiliency services

More information

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust SECURING THE DIGITAL ECONOMY Reinventing the Internet for Trust The Internet Just Can t Keep Up Companies Are Increasingly Dependent on the Internet for Business Growth 90% 76% 18% 35% to rank business

More information

IBM Global Technology Services December 2008 Business continuity and resiliency services from IBM

IBM Global Technology Services December 2008 Business continuity and resiliency services from IBM IBM Global Technology Services December 2008 Business continuity and resiliency services from IBM Helping business stay in business 2 IBM Global Technology Services Contents 3 Determining your risk factors

More information

Table of Contents. Sample

Table of Contents. Sample TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...

More information

Business Continuity Planning

Business Continuity Planning Business Continuity Planning The Unexpected Happens Be Ready Copyright -Business Survival Partners, llc. 2011 - All Rights Reserved www.survivalpartners.biz RISK 2 Risks to National Security A secure and

More information

Emergence of Business Continuity to Ensure Business and IT Operations. Solutions to successfully meet the requirements of business continuity.

Emergence of Business Continuity to Ensure Business and IT Operations. Solutions to successfully meet the requirements of business continuity. Emergence of Business Continuity to Ensure Business and IT Operations Solutions to successfully meet the requirements of business continuity. 2 3 4 5 Introduction Use of Virtualization Technology as a

More information

Business continuity and resiliency services from IBM

Business continuity and resiliency services from IBM IBM Global Technology Services August 2010 Thought Leadership White Paper Business continuity and resiliency services from IBM Helping business stay in business 2 Business continuity and resiliency services

More information

Business Continuity Management

Business Continuity Management Business Continuity Management Cyber Security importance by Ashraf Hasanov Business Continuity Expert BCMS BS25999 Lead Auditor Regional Disaster Response Team Member of IFRC What could stop your business?

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

The Data Protection Rule and Hybrid Cloud Backup

The Data Protection Rule and Hybrid Cloud Backup The 3-2-1 Data Protection Rule and Hybrid Cloud Backup IT teams are under extreme pressure to improve backup, disaster recovery and data protection to eliminate downtime and facilitate digital transformation.

More information

Service Provider Consulting

Service Provider Consulting From Microsoft Services 1 Industry Overview More and more businesses are looking to outsource IT, decrease management requirements and ultimately save money. With worldwide public cloud spending expected

More information

Business Continuity: How to Keep City Departments in Business after a Disaster

Business Continuity: How to Keep City Departments in Business after a Disaster Business Continuity: How to Keep City Departments in Business after a Disaster Shannon Spence, PE Red Oak Consulting, an ARCADIS group Agenda Security, Resilience and All Hazards The Hazards Cycle and

More information

Business continuity management and cyber resiliency

Business continuity management and cyber resiliency Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,

More information

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Featuring Sophia Vargas, Forrester Research Inc. 30 May 2014 Introducing today s presenters: Matt Miszewski Senior Vice President of Sales

More information

Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery

Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery Dave Komendat Chief Security Officer The Boeing Company What We Do Today Design, assemble and support

More information

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information

More information

The Case for Virtualizing Your Oracle Database Deployment

The Case for Virtualizing Your Oracle Database Deployment June 2012 The Case for Virtualizing Your Oracle Database Deployment Much has been written about the benefits of virtualization over the last few years. Hypervisor software promises to revolutionize the

More information

Technology Priorities SURVEY. Exclusive Research from CIO magazine

Technology Priorities SURVEY. Exclusive Research from CIO magazine Technology Priorities SURVEY Exclusive Research from CIO magazine JULY 2010 EXECUTIVE SUMMARY Top Technology Priorities for CIOs: Cloud Computing, Virtualization Desktop and network virtualization, along

More information

Multi-Sector Urban System Initiatives

Multi-Sector Urban System Initiatives Multi-Sector Urban System Initiatives Colin Harrison IBM Distinguished Engineer Emeritus colinh@us.ibm.com Regional Approaches to Urban Sustainability A National Academies Workshop Portland, OR May 28-29,

More information

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR UAE

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR UAE EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR UAE 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION

More information

Risk Management. Continuity Management

Risk Management. Continuity Management Risk Management vs Continuity Management Marie Hélène Primeau, CA, MBCI President Premier Continuum DRJ Fall World September 12, 2011 Marie-Hélène Primeau, CA, MBCI Chartered Accountant and Member of the

More information

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR BRAZIL

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR BRAZIL EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR BRAZIL 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION

More information

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION

More information

Disaster Recovery Is A Business Strategy

Disaster Recovery Is A Business Strategy Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...

More information

Vulnerability Management Trends In APAC

Vulnerability Management Trends In APAC GET STARTED Introduction In the age of the customer, the threat landscape is constantly evolving. Attackers are out to steal your company s data, and the ever-expanding number of devices and technologies

More information

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AMERICAS

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AMERICAS EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AMERICAS 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION

More information

Global Security Consulting Services, compliancy and risk asessment services

Global Security Consulting Services, compliancy and risk asessment services Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment

More information

Cyber Security in Smart Commercial Buildings 2017 to 2021

Cyber Security in Smart Commercial Buildings 2017 to 2021 Smart Buildings Cyber Security in Smart Commercial Buildings 2017 to 2021 Published: Q2 2017 Cyber Security in Smart Buildings Synopsis 2017 This report will help all stakeholders and investors in the

More information

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR HONG KONG

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR HONG KONG EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR HONG KONG 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION

More information

STRATEGIC PLAN. USF Emergency Management

STRATEGIC PLAN. USF Emergency Management 2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa

More information

Cyber Resilience. Think18. Felicity March IBM Corporation

Cyber Resilience. Think18. Felicity March IBM Corporation Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack

More information

Colocation Enabler for Hybrid and Multi Cloud Solutions. Toan Nguyen, Director Business Development & Cloud Platform, e-shelter services GmbH

Colocation Enabler for Hybrid and Multi Cloud Solutions. Toan Nguyen, Director Business Development & Cloud Platform, e-shelter services GmbH Colocation Enabler for Hybrid and Multi Cloud Solutions Toan Nguyen, Director Business Development & Cloud Platform, e-shelter services GmbH 1 Disruption forces business transformation Who wants to be

More information

I D C T E C H N O L O G Y S P O T L I G H T

I D C T E C H N O L O G Y S P O T L I G H T I D C T E C H N O L O G Y S P O T L I G H T P ow e ring Digital Transfor m a t i o n T h r ough the C l o u d - R e a d y E n t e r p rise September 2016 Adapted from Developing a Cloud Strategy for Digital

More information

TABLE OF CONTENTS ONLY IT Resiliency Benchmarking Report

TABLE OF CONTENTS ONLY IT Resiliency Benchmarking Report TABLE OF CONTENTS ONLY IT Resiliency Benchmarking Report Prepared by BC Management, Inc. October 2016 Benchmarking. Plan Ahead. Be Ahead. Data collected between July September 2016 Table of Contents Reporting

More information

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDIA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDIA EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDIA 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION

More information

Ensuring Business Resilience Jim Neumann, Vice President of Marketing, Power Analytics Corp.

Ensuring Business Resilience Jim Neumann, Vice President of Marketing, Power Analytics Corp. Ensuring Business Resilience Jim Neumann, Vice President of Marketing, Power Analytics Corp. In today s digital economy, the importance of taking a bottom-line view of your organization s electrical power

More information

epldt Cloud Services 4 th National ICT Summit National ICT Confederation of the Philippines (NICP) GENSAN, November 4-6, 2011 Sonny Valdez CTO, epldt

epldt Cloud Services 4 th National ICT Summit National ICT Confederation of the Philippines (NICP) GENSAN, November 4-6, 2011 Sonny Valdez CTO, epldt epldt Cloud Services 4 th National ICT Summit National ICT Confederation of the Philippines (NICP) GENSAN, November 4-6, 2011 Sonny Valdez CTO, epldt 2 3 4 5 6 Philippines = 26.75M users (26.78% of population)

More information

Business Continuity & Disaster Recovery

Business Continuity & Disaster Recovery knowledge partner MARKET INSIGHT Business Continuity & Disaster Recovery Considerations for Saudi Organizations /mobily @MobilyBusiness 056 010 0901 I business.sales@mobily.com.sa About Us Mobily; the

More information

6/5/ Michael Hojnicki Chief of Technology and Administrative Services

6/5/ Michael Hojnicki Chief of Technology and Administrative Services Technology Update 6/5/2018 - Michael Hojnicki Chief of Technology and Administrative Services Projects Completed in 2017 Open Checkbook Published Network & Phone Upgrade High Level Design Competitive Bid

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

ICT and Disaster Risk Reduction Division ESCAP

ICT and Disaster Risk Reduction Division ESCAP TOWARDS EIGHTH SESSION OF THE SPECA THEMATIC WORKING GROUP MEETING ON KNOWLEDGE-BASED DEVELOPMENT ALMATY, KAZAKHSTAN 20-22ND SEPTEMBER Shaina Hasan & Jeremy Marand ICT and Development Section ICT and Disaster

More information

Market Trends in Public Cloud Storage

Market Trends in Public Cloud Storage Market Trends in Public Cloud Storage Deepak Mohan, Research Director, Public Cloud Infrastructure as a Service Andrew Smith, Sr. Research Analyst, Storage Software IDC Web Conference 12 September 2017

More information

Cloud Connections SEE Partner Summit Janos Strausz Product Sales Specialist, DC

Cloud Connections SEE Partner Summit Janos Strausz Product Sales Specialist, DC Cloud Connections SEE Partner Summit 2015 Janos Strausz Product Sales Specialist, DC 75% of Businesses To be Digital in 5 years 1 81% 80% 81% 80% Mobile Technologies Mobile for Technologies Customer for

More information

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AUSTRALIA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AUSTRALIA EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AUSTRALIA 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION

More information

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR APJ

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR APJ EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR APJ 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION

More information

A Practical Guide to Avoiding Disasters in Mission-Critical Facilities. What is a Disaster? Associated Business Issues.

A Practical Guide to Avoiding Disasters in Mission-Critical Facilities. What is a Disaster? Associated Business Issues. A Practical Guide to Avoiding Disasters in Mission-Critical Facilities Todd Bermont What is a Disaster? An event that can unexpectedly impact the continuity of your business Anything that injures or has

More information

Machine-Based Penetration Testing

Machine-Based Penetration Testing Always in Control CyBot Suite Machine-Based Penetration Testing www.cronus-cyber.com - April 2016 CyBot PRODUCT SUITE Unique, patented Machine-based Penetration Testing Software with Global Attack Path

More information

Technology Lifecycle Management Assessment. Know your network - achieve business agility

Technology Lifecycle Management Assessment. Know your network - achieve business agility Technology Lifecycle Management Assessment Know your network - achieve business agility Your network is the platform on which you build the success of your organisation. In addition to connecting your

More information

Hitachi Completes Transfer of Hard Disk Drive Business to Western Digital

Hitachi Completes Transfer of Hard Disk Drive Business to Western Digital FOR IMMEDIATE RELEASE Contact: Japan: Hajime Kito Hitachi, Ltd. +81-3-5208-9323 hajime.kito.qy@hitachi.com Hitachi Completes Transfer of Hard Disk Drive Business to Western Digital Tokyo, March 9, 2012

More information

EMC GLOBAL DATA PROTECTION INDEX STUDY KEY RESULTS & FINDINGS FOR THE USA

EMC GLOBAL DATA PROTECTION INDEX STUDY KEY RESULTS & FINDINGS FOR THE USA EMC GLOBAL DATA PROTECTION INDEX STUDY KEY RESULTS & FINDINGS FOR THE USA 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION

More information

List of Southasiadisasters.net (Issue No. 1 to 128, May 2005 to March 2015)

List of Southasiadisasters.net (Issue No. 1 to 128, May 2005 to March 2015) List of Southasiadisasters.net (Issue No. 1 to 128, May 2005 to March 2015) Issue No. Headline of Issues Month of Published 01 Why southasiadisasters.net? May 26, 2005 02 Rethinking Water Risks: Lessons

More information

Progress of Regional Cooperation in the Field of Disaster Risk Reduction in Asia

Progress of Regional Cooperation in the Field of Disaster Risk Reduction in Asia Asian Conference on Disaster Reduction 2007 25-27 June 2007, Astana, Republic of Kazakhstan Progress of Regional Cooperation in the Field of Disaster Risk Reduction in Asia Going forward with Hyogo Framework

More information

Symantec Business Continuity Solutions for Operational Risk Management

Symantec Business Continuity Solutions for Operational Risk Management Symantec Business Continuity Solutions for Operational Risk Management Manage key elements of operational risk across your enterprise to keep critical processes running and your business moving forward.

More information

Public and Private Interdependencies Filling a Gap in Most Continuity Plans

Public and Private Interdependencies Filling a Gap in Most Continuity Plans Public and Private Interdependencies Filling a Gap in Most Continuity Plans John A Jackson Executive Vice President Fusion Risk Management, Inc. The evolution of the continuity industrytechnology advancement

More information

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDONESIA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDONESIA EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDONESIA 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GlOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION

More information

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/60/488/Add.3)]

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/60/488/Add.3)] United Nations A/RES/60/195 General Assembly Distr.: General 2 March 2006 Sixtieth session Agenda item 52 (c) Resolution adopted by the General Assembly [on the report of the Second Committee (A/60/488/Add.3)]

More information

EXECUTIVE BRIEF Optimizing for Innovation: How Hybrid IT Outsourcing Shifts IT Focus to Innovation. At Stake

EXECUTIVE BRIEF Optimizing for Innovation: How Hybrid IT Outsourcing Shifts IT Focus to Innovation. At Stake EXECUTIVE BRIEF : How Hybrid IT Outsourcing Shifts IT Focus to Innovation Challenge IT leaders are tasked to do more with less and increase technology innovation. At Stake As IT increasingly becomes the

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

Everyday Security: Simple Solutions to Complex Security Problems

Everyday Security: Simple Solutions to Complex Security Problems Everyday Security: Simple Solutions to Complex Security Problems Adrian Aldea Tivoli Technical Sales IBM South East Europe The world continues to get flatter, smaller and more interconnected through forces

More information

TechValidate Survey Report: SaaS Application Trends and Challenges

TechValidate Survey Report: SaaS Application Trends and Challenges TechValidate Survey Report: SaaS Application Trends and Challenges TechValidate Survey Report: SaaS Application Trends and Challenges 2 The current growth rates and investments in SaaS are astounding.

More information

Conducted by Vanson Bourne Research

Conducted by Vanson Bourne Research Conducted by Vanson Bourne Research N o v e m b e r 2 0 1 3 1 3200 INTERVIEWS ALTOGETHER, 1600 IT & 1600 BUSINESS DECISION- MAKERS 100 & 100 IT BUSINESS DECISION- DECISION- MAKERS MAKERS COUNTRIES USA

More information

Keeping the lid on storage

Keeping the lid on storage Keeping the lid on storage Drive significant cost savings through innovation and efficiency Publication date: December 2011 Optimising storage performance & costs through innovation As the compute power

More information

Continuity of Business

Continuity of Business White Paper Continuity of Business SAS Continuity of Business initiative reflects our commitment to our employees, to our customers, and to all of the stakeholders in our global business community to be

More information

Hitachi Received Notice of Request for Arbitration

Hitachi Received Notice of Request for Arbitration FOR IMMEDIATE RELEASE Hitachi Received Notice of Request for Arbitration Tokyo, August 22, 2017 --- Hitachi, Ltd. (TSE: 6501, Hitachi ) today announced that it has received the notice of the request for

More information

Copyright 2012 EMC Corporation. All rights reserved.

Copyright 2012 EMC Corporation. All rights reserved. 1 2 Jeremy Burton Executive Vice President Product Operations & Marketing 3 Waves Of Change Mainframe Minicomputer PC/ Microprocessor Networked/ Distributed Computing Cloud Computing 4 EMC s Mission To

More information

PROTECTING BRANDS IN CYBERSPACE

PROTECTING BRANDS IN CYBERSPACE Speaker Profile Abhishek Agarwal, CIPP/US: Security & Privacy Leader at Kraft Foods Manage compliance programs to safeguard consumer, customers and employee information. Responsible for protecting brand

More information

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR TURKEY

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR TURKEY EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR TURKEY 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION

More information

Disaster Recovery Self-Audit

Disaster Recovery Self-Audit Disaster Recovery Self-Audit Disaster Recovery Audit There are 3 steps to this process: 1. Identify all data and IT-related functions (like credit card processing, documents on your file server, member

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

Machine-Based Penetration Testing

Machine-Based Penetration Testing Always in Control CyBot Suite Machine-Based Penetration Testing CyBot PRODUCT SUITE Unique, patented Machine-based Penetration Testing Software with Global Attack Path Scenarios (APS) product suite: CyBot

More information

Leading in the Data-Driven World

Leading in the Data-Driven World Leading in the Data-Driven World George Kurian Chief Executive Officer Agenda 1) Industry Context 2) Our Market Opportunity 3) Transforming to Lead Industry Context The world is changing fundamentally

More information

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach White Paper Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach Sponsored by: Red Hat Tim Grieser January 2018 IN THIS WHITE PAPER This IDC White Paper discusses

More information

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Global Headquarters: 5 Speen Street Framingham, MA USA P F Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com C O M P E T I T I V E A N A L Y S I S I D C M a r k e t S c a p e : W o r l d w i d e D a t a c e

More information

The Critical Role of Emergency Telecommunications and ICTs: Impacts of Natural and Man-made Disasters

The Critical Role of Emergency Telecommunications and ICTs: Impacts of Natural and Man-made Disasters The Critical Role of Emergency Telecommunications and ICTs: Impacts of Natural and Man-made Disasters 8th Symposium on ICTs, the Environment and Climate Change First Meeting of the Focus Group on Smart

More information

Third Annual Green IT & Sustainability Survey: U.S. Results and Services Implications

Third Annual Green IT & Sustainability Survey: U.S. Results and Services Implications Third Annual Green IT & Sustainability Survey: U.S. Results and Services Implications Gard Little Research Manager Worldwide Services, Global Services Markets & Trends 2009 IDC 1 Agenda Overview of the

More information

Aligning CFO and CIO Priorities

Aligning CFO and CIO Priorities white paper economics Aligning and Priorities Forward-thinking organizations are viewing computing as an investment in business transformation, not just a way to cut costs for IT. Thanks to the, s and

More information

Earthquake Early Warning based on smartphones

Earthquake Early Warning based on smartphones Earthquake Early Warning based on smartphones Earthquake Early Warning (EEW) systems involve very high Capex. Therefore, EEW systems have been installed in a very limited number of regions. Applying crowdsourcing

More information

Cyber Resiliency. Felicity March. May 2018

Cyber Resiliency. Felicity March. May 2018 Cyber Resiliency Felicity March May 2018 1 Cyber Resiliency Cyber Resiliency is the ability of an organization to continue to function with the least amount of disruption in the face of cyber attacks.

More information

Mastering The Endpoint

Mastering The Endpoint Organizations Find Value In Integrated Suites GET STARTED Overview In the face of constantly evolving threat vectors, IT security decision makers struggle to manage endpoint security effectively. More

More information

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT 2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for

More information