Backup, Disaster Recovery: Defining & Managing Your Risk. Dave Kinsey - 5/9/17

Similar documents
NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

SECURITY & PRIVACY DOCUMENTATION

WHITE PAPER- Managed Services Security Practices

Disaster Planning Essentials and Disaster Planning Checklist

The Common Controls Framework BY ADOBE

HIPAA Security and Privacy Policies & Procedures

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

TSC Business Continuity & Disaster Recovery Session

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

Disaster Recovery Is A Business Strategy

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

PARTNERSHIP INTRODUCTION June 29, 2017

Backup and Restore Strategies

Vendor Security Questionnaire

The simplified guide to. HIPAA compliance

The Case for Office 365 Backup. Uncovering critical reasons why organizations need to backup Office 365 data

Disaster Recovery and Mitigation: Is your business prepared when disaster hits?

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Checklist: Credit Union Information Security and Privacy Policies

CIO Guide: Disaster recovery solutions that work. Making it happen with Azure in the public cloud

Recommendations for Implementing an Information Security Framework for Life Science Organizations

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network?

Juniper Vendor Security Requirements

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

IPMA State of Washington. Disaster Recovery in. State and Local. Governments

TOTAL SAAS BACKUP SAAS PROTECTION

Balancing RTO, RPO, and budget. Table of Contents. White Paper Seven steps to disaster recovery nirvana for wholesale distributors

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Business continuity management and cyber resiliency

DISASTER RECOVERY (DR): SOMETHING EVERYBODY NEEDS, BUT NEVER WANTS TO USE

ACM Retreat - Today s Topics:

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

General Data Protection Regulation (GDPR) The impact of doing business in Asia

A company built on security

Understanding Office 365: Is A Cloud Based Solution Right For Your Business?

TRACKVIA SECURITY OVERVIEW

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AMERICAS

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR APJ

ADIENT VENDOR SECURITY STANDARD

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist

CLOUD DISASTER RECOVERY. A Panel Discussion

CLOUD COMPUTING READINESS CHECKLIST

INFORMATION ASSET MANAGEMENT POLICY

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

6 Critical Reasons for Office 365 Backup. The case for why organizations need to protect Office 365 data

Trust Services Principles and Criteria

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDONESIA

An introductory guide to Disaster Recovery and how it can ultimately keep your company alive. A Publication of

Why Continuity Matters

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

HIPAA Compliance Assessment Module

Maher Duessel Not for Profit Training July Agenda

An SMB s Guide to Business Continuity and Disaster Recovery

Introduction. Read on and learn some facts about backup and recovery that could protect your small business.

Protecting your data. EY s approach to data privacy and information security

Getting Started with Cybersecurity

The HIPAA Omnibus Rule

Managed Security Services - Endpoint Managed Security on Cloud

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR HONG KONG

5 Things Small Businesses Need to Know About Disaster Recovery

Twilio cloud communications SECURITY

Best Practices in Securing a Multicloud World

Disaster Recovery Self-Audit

Evolved Backup and Recovery for the Enterprise

SECURITY. The changing Face and Focus. UPDATED - May Sr. Advisor/Partner at PostMark 21 years in corporate IT P&G and RJ Reynolds

EMC GLOBAL DATA PROTECTION INDEX STUDY KEY RESULTS & FINDINGS FOR THE USA

Morningstar ByAllAccounts Service Security & Privacy Overview

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services

SPAM Malware s Super Highway. How To Protect Yourself Against Malicious s 1

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDIA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR UAE

UNITRENDS CLOUD BACKUP FOR OFFICE 365

Cyber Due Diligence: Understanding the New Normal in Corporate Risk

Cybersecurity Session IIA Conference 2018

What It Takes to be a CISO in 2017

Update on HIPAA Administration and Enforcement. Marissa Gordon-Nguyen, JD, MPH October 7, 2016

Data Protection and GDPR

Google Cloud & the General Data Protection Regulation (GDPR)

arcserve r16.5 Hybrid data protection

Top Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES

Top Five Ways to Protect Your Organization from Data Loss & Cyber Hackers

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR BRAZIL

2015 HFMA What Healthcare Can Learn from the Banking Industry

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY

MigrationWiz Security Overview

THE STATE OF CLOUD & DATA PROTECTION 2018

From Single File Recovery to Full Restore: Choosing the Right Backup and Recovery Solution for Your Cloud Data

Information Security Data Classification Procedure

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

CLOUDALLY EBOOK. Best Practices for Business Continuity

ABB Ability Cyber Security Services Protection against cyber threats takes ability

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

The 10 Disaster Planning Essentials For A Small Business Network

Nine Steps to Smart Security for Small Businesses

Transcription:

Backup, Disaster Recovery: Defining & Managing Your Risk Dave Kinsey - 5/9/17

Smart Business... also, generally a Compliance Requirement Shareholders generally do and absolutely should care that backup & disaster recovery risks are properly managed Clients are increasingly validating firms are appropriately managing risks Many compliance regulations, like HIPAA, require a data backup & recovery plan ER 1.1 & ER 1.6 require competence in safeguarding client information 2

Risk Management Process Risk Assessment Prioritize based on Probability & Impact Document & Plan to Remediate Risks based on probability, impact, legal requirements, cost of mitigation Execute Your Plan Repeat periodically ROUTINE, SCHEDULED, BAKED INTO BUSINESS 3

How do you define a DISASTER? 4

This image cannot currently be displayed. Are these on your list? Hurricanes?? Tornadoes?? Fires? Floods? Power/network outages Mechanical or system failure Human error Ransomware 5

Jigsaw CryptoWall CryptoHost CryptXXX This image cannot currently be displayed. This image cannot currently be displayed.

Ransomware had a BIG 2016 So big, that it has cost US businesses upwards of $75 billion dollars in downtime and other costs YIKES! 7

Ransomware is NOT 100% Preventable 1. Harden defenses: significantly minimize expected infection frequency 2. Minimize impact of infections: Limit/segment/compartmentalize access Ensure high confidence in timely & complete recovery from backup Assess likelihood of data breach & respond appropriately 3. Learn from any incidents for use in ongoing risk assessment & management process 8

Layers of Defense, Constant Review, Updates No magic bullet for security Many layers and approaches work in concert A Harder Target: Well trained people Limited access, eliminate non-business activity Tested, evaluated, maintained defenses Layer upon layer (redundant, with different vendors) defenses Security as a process and a culture Double-checks, verifications, independent audits 9

Malware Prevention Administrative & Technical Safeguards Patch systems Maintain anti-virus, anti-malware Restrict permissions Block suspect email and attachments Network restrictions: update/maintain IPS/IDS, network AV/AM, block TOR, I2P, restrict unnecessary countries PC security (prevent apps running from %APPDATA%, %TEMP% - other) App whitelisting Provide phishing & other security training Ensure robust, segregated backups 10

Disaster Recovery Plan Off-site & on-site File & folder vs. server images Verify Completeness ON A ROUTINE BASIS: Complete inventory of data Complete inventory of backups Anything missing? By accident? By design? Who approves reviews approves omitting items from a backup? 11

Recovery Point Objective (RPO) & Recovery Time Objective (RTO) Recovery Point Objective (RPO): How often is everything backed up? How much backup history is retained? What CAN I recover? Recovery Time Objective (RTO): Depending on the disaster, and your plan/capabilities, it could take a LONG time to get back up and running Best Case, Worst Case WHEN CAN I GET IT? 12

Total Networks Approach for On-Site Servers Backup & Failover Server on-site (encrypted on-site) Image-level backup, generally every hour Encrypted backup transfer to two secure data centers (encrypted in-transit and on-site at remote location) RPO: from last hourly backup on-site, from last completed off-site replication off-site RTO: can be within minutes on-site to standby hardware, in under an hour to off-site Verification: monitoring and alerting throughout the day for any failures, daily review of system boot screenshots onsite and off, simulated DR tests performed every 2 months (first step in review process manual audit of all data, manual audit of backups, nothing new/missing) 13

Privacy & Ethical Considerations Carefully review and vet vendors (and review your client and legal requirements and disclosures) Don t let your systems OR BACKUPS cause a data breach HIPAA Business Associate Agreement (BAA) may be required and can be a HUGE HELP 14

It s in the cloud I don t need backups Good cloud applications can reduce your backup/recovery risk especially from obvious disaster. Carries obvious risks as well. Diligence & review absolutely still required. Consider separate backup of hosted data. Total Networks uses Mimecast for backup & DR AND ARCHIVING of both on-premise Exchange & Office 365. Some example risk management questions do you have risks with emails accidentally deleted 2 months ago? emails to be placed on legal hold due to a complaint filed against you by a former employee? items on an employee s C: drive? 15

Beyond Backup & DR Plan Business Continuity Plan Think through the various risk scenarios. For EACH scenario (type of issue, expected duration) document your planned response: Managing Communication (with employees, clients) Everybody Work from Home? Physical Meeting Rally Point? Testing Your Plan Plans Readily Available During Disaster? Use this thought experiment to refine your plans. 16

Total Networks new offering: compliancekit provides practical guidance and resources to help businesses manage their security & compliance. No matter where you are at in your risk management process, we believe we can help. compliancekit provides a framework, templates, coaching, consulting, employee training, and security awareness tools that help business owners succeed. Simulated PHISHING emails provide online training to your people (ongoing, plus new hire), see who still gets tricked and clicks, provide follow-up training for those folks. 17

Total Networks Compliance Consulting Services & Tools We can help you assess and manage your risk & compliance. Information conveniently delivered through a web portal 18

THANK YOU FOR YOUR TIME! Questions? Dave Kinsey dkinsey@totalnetworks.com 602-412-5001 Next CLE State Bar Convention, Friday, June 16 th Protecting the Client & Serving the Public in the Digital Age 3 Hour (ethics) 19