SlideShare uma empresa Scribd logo
1 de 22
LIVE WEBINAR Data Protection:  Safeguarding your business today & tomorrow   Wednesday, November 25, 2009 12:30 PM - 1:30 PM (AEDST), Sydney Australia Conference Number: Australia: 1800 098 754 New Zealand: 0800 447 860 Your conference ID #: 42727822
Current issues in information security, and the value of data James Turner Advisor
Presentation outline ,[object Object],[object Object],[object Object],[object Object],[object Object],What is the common thread? “ Colour Beginning” J.(M.W.) Turner
Our advisors IBRS is an Australian company providing timely advice,  insightful judgement, and thorough research  to benefit IT and business managers in Australasian organisations. Dr Kevin McIsaac Terry Dargan Dr Colin Boswell Joseph Sweeney James Turner Alan Hansell Rob Mackinnon Guy Cranswick Irene Pimentel Brian Bowman Jorn Bettin Peter Hind
[object Object],[object Object],[object Object],[object Object],[object Object],The CIA triad Confidentiality Integrity Availability Your sensitive data needs all 3 attributes
[object Object],[object Object],[object Object],The issues and trends
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Data Loss Prevention "The scream" Edvard Munch Business cases based on fear  of public disclosure
[object Object],[object Object],[object Object],Mobility of workers Virtualisation is the market response  to rampant multiformity The PED trilemma Source: " Portable electronic devices ( PEDs ): a frog close to the boil ", IBRS, February 2008
The cloud ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The cloud Big migrations will make the news,  because they are the exceptions "Clouds" John Constable
The value of the data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Incident response lifecycle Mitigate risks Backup  important data Restore Life is too short to only learn from  your own mistakes
Current issues in information security, and the value of data James Turner Advisor
Andrew Fry Business Unit Executive Business Continuity & Resiliency Services, IBM Global Technology Services
Data Security Services – Endpoint Data Protection PGP Corporation Encryption Software and Support Benefits ,[object Object],[object Object],[object Object],What does PGP Encryption do? ,[object Object],[object Object],[object Object],[object Object],[object Object]
PGP Encryption – Example Company:  A mining and exploration company operating in a highly competitive and volatile market. Problem: Suffered from leakage of sensitive corporate data as a result of stolen employee’s laptop. Solution: Security specialists from IBM ISS implemented a  PGP® Whole Disk Encryption solution to  protect sensitive corporate data on desktops, laptops and removable media. Benefits:   1)   Peace of mind that sensitive data is constantly protected from unauthorised access,    providing strong security for intellectual property and reduced competitive risk   2)  Data is protected without changing the user experience   3)  Reduced operational costs by centrally automating encryption policies
Data Backup and Restoration services Cloud delivered, fully managed service Disk, tape and virtual tape-based backup and recovery for  data centres, and remote sites Protect the core:  Onsite and Remote data protection Scalable on-demand services architecture Disk-based backup and recovery for  Desktops and laptops Protect the edge:  Fastprotect Online ,[object Object],[object Object],[object Object]
[object Object],Remote Data Protection  Automatic, reliable protection for your critical data that can be restored virtually anywhere, anytime
[object Object],[object Object],[object Object],[object Object],A Better way to recover data  and  server infrastructure Combine Data backup via cloud, and virtualised disaster recovery servers IBM Recovery Centre
Server and Data recovery - Example Company: Financial services firm, servicing mid-size organisations in Australia Problem: Business demanded faster recovery times and assurance that data was being  protected every day across distributed sites, and all within existing budget. Solution: Implemented  IBM Remote Data Protection  to backup critical server data to secure  IBM facility, on a pay-as-you-go service. IBM coupled the backup service with  IBM  Virtual Server recovery  to provide complete offsite server and data recovery  solution, for a shared price point.  Benefits: 1)  Client achieved vastly improved recovery times, without needing to invest in  expensive dedicated infrastructure 2)  Daily reports confirming critical data is securely backed up 3)  Storage capacity scales up/down based on usage (opex model)
Data Protection Services Avoid data loss or leakage, and have a plan for recovery Mitigate risks Backup  important data Restore
THANK YOU

Mais conteúdo relacionado

Mais procurados

Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Complianceaccenture
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyThoughtworks
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in IndonesiaEryk Budi Pratama
 
Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataOpenAIRE
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and SecurityAnuMarySunny
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementEryk Budi Pratama
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacyhimanshu jain
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 

Mais procurados (20)

Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Compliance
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Data protection
Data protectionData protection
Data protection
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
 
Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 
Data protection
Data protectionData protection
Data protection
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 

Destaque

Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
New Media Internet Expression and European Data Protection
New Media Internet Expression and European Data ProtectionNew Media Internet Expression and European Data Protection
New Media Internet Expression and European Data ProtectionDavid Erdos
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To KnowEamonnORagh
 
Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...
Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...
Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...MongoDB
 
Security Measure
Security MeasureSecurity Measure
Security Measuresyafiqa
 
Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)ainizbahari97
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacylegalPadmin
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Russell_Kennedy
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 
Security of the database
Security of the databaseSecurity of the database
Security of the databasePratik Tamgadge
 
Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social mediaSupriya Radhakrishna
 

Destaque (18)

Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
New Media Internet Expression and European Data Protection
New Media Internet Expression and European Data ProtectionNew Media Internet Expression and European Data Protection
New Media Internet Expression and European Data Protection
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To Know
 
Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...
Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...
Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...
 
Security Measure
Security MeasureSecurity Measure
Security Measure
 
Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data Privacy
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Data protection act
Data protection act Data protection act
Data protection act
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Security of the database
Security of the databaseSecurity of the database
Security of the database
 
Database Security
Database SecurityDatabase Security
Database Security
 
Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social media
 
Database security
Database securityDatabase security
Database security
 
Database security
Database securityDatabase security
Database security
 

Semelhante a Data Protection Presentation

Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5damonhough
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
Accelerate Journey To The Cloud
Accelerate Journey To The CloudAccelerate Journey To The Cloud
Accelerate Journey To The CloudMark Treweeke
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Iron Mountain
 
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...Amazon Web Services
 
Skip the Disk, Move to the Cloud
Skip the Disk, Move to the CloudSkip the Disk, Move to the Cloud
Skip the Disk, Move to the CloudIron Mountain
 
How can Enterprise Email Security and Enterprise File Security protect compan...
How can Enterprise Email Security and Enterprise File Security protect compan...How can Enterprise Email Security and Enterprise File Security protect compan...
How can Enterprise Email Security and Enterprise File Security protect compan...UCloud Asia Pte Ltd
 
ITOX PGP CommandLine slide_share march 2010
ITOX PGP CommandLine slide_share march 2010ITOX PGP CommandLine slide_share march 2010
ITOX PGP CommandLine slide_share march 2010James Cheng
 
Solutions Overview
Solutions OverviewSolutions Overview
Solutions Overviewmelcash
 
Remote Data Backup Protection
Remote Data Backup ProtectionRemote Data Backup Protection
Remote Data Backup ProtectionCrystaLink Inc.
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudErik Von Schlehenried
 
UCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Pte Ltd
 
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Pte Ltd
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or notebuc
 
EMC Storage Redefine FILE
EMC Storage Redefine FILEEMC Storage Redefine FILE
EMC Storage Redefine FILEsolarisyougood
 

Semelhante a Data Protection Presentation (20)

Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Accelerate Journey To The Cloud
Accelerate Journey To The CloudAccelerate Journey To The Cloud
Accelerate Journey To The Cloud
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?
 
SBDS
SBDSSBDS
SBDS
 
Dstca
DstcaDstca
Dstca
 
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
Skip the Disk, Move to the Cloud
Skip the Disk, Move to the CloudSkip the Disk, Move to the Cloud
Skip the Disk, Move to the Cloud
 
How can Enterprise Email Security and Enterprise File Security protect compan...
How can Enterprise Email Security and Enterprise File Security protect compan...How can Enterprise Email Security and Enterprise File Security protect compan...
How can Enterprise Email Security and Enterprise File Security protect compan...
 
ITOX PGP CommandLine slide_share march 2010
ITOX PGP CommandLine slide_share march 2010ITOX PGP CommandLine slide_share march 2010
ITOX PGP CommandLine slide_share march 2010
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Solutions Overview
Solutions OverviewSolutions Overview
Solutions Overview
 
Remote Data Backup Protection
Remote Data Backup ProtectionRemote Data Backup Protection
Remote Data Backup Protection
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
UCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Company Presentation
UCloud Asia Company Presentation
 
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or not
 
EMC Storage Redefine FILE
EMC Storage Redefine FILEEMC Storage Redefine FILE
EMC Storage Redefine FILE
 

Mais de IBM Business Insight

Stream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and Shoretel
Stream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and ShoretelStream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and Shoretel
Stream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and ShoretelIBM Business Insight
 
Stream 3 - VMware Sponsor Presentation
Stream 3 - VMware Sponsor PresentationStream 3 - VMware Sponsor Presentation
Stream 3 - VMware Sponsor PresentationIBM Business Insight
 
Stream 2 - Drive Business Performance with Information Analytics
Stream 2 - Drive Business Performance with Information AnalyticsStream 2 - Drive Business Performance with Information Analytics
Stream 2 - Drive Business Performance with Information AnalyticsIBM Business Insight
 
Stream 1 - Keynote Presentation: Perth & Adelaide
Stream 1 - Keynote  Presentation: Perth & AdelaideStream 1 - Keynote  Presentation: Perth & Adelaide
Stream 1 - Keynote Presentation: Perth & AdelaideIBM Business Insight
 
Stream 1- Enhanced Business Performance
Stream 1- Enhanced Business PerformanceStream 1- Enhanced Business Performance
Stream 1- Enhanced Business PerformanceIBM Business Insight
 
Stream 3 - IT optimisation & virtualisation
Stream 3 - IT optimisation & virtualisationStream 3 - IT optimisation & virtualisation
Stream 3 - IT optimisation & virtualisationIBM Business Insight
 
IBM Business Intelligence Software
IBM Business Intelligence SoftwareIBM Business Intelligence Software
IBM Business Intelligence SoftwareIBM Business Insight
 
Breakthrough reporting, analysis and planning tools for midsize companies.
Breakthrough reporting, analysis and planning tools for midsize companies.Breakthrough reporting, analysis and planning tools for midsize companies.
Breakthrough reporting, analysis and planning tools for midsize companies.IBM Business Insight
 

Mais de IBM Business Insight (12)

Stream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and Shoretel
Stream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and ShoretelStream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and Shoretel
Stream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and Shoretel
 
Stream 3 - VMware Sponsor Presentation
Stream 3 - VMware Sponsor PresentationStream 3 - VMware Sponsor Presentation
Stream 3 - VMware Sponsor Presentation
 
Stream 2 - Drive Business Performance with Information Analytics
Stream 2 - Drive Business Performance with Information AnalyticsStream 2 - Drive Business Performance with Information Analytics
Stream 2 - Drive Business Performance with Information Analytics
 
Stream 3 - Cloud Computing
Stream 3 - Cloud ComputingStream 3 - Cloud Computing
Stream 3 - Cloud Computing
 
Stream 2 - Don't Risk IT
Stream 2 - Don't Risk ITStream 2 - Don't Risk IT
Stream 2 - Don't Risk IT
 
Stream 1- Smart Work
Stream 1- Smart WorkStream 1- Smart Work
Stream 1- Smart Work
 
Stream 1 - Keynote Presentation: Perth & Adelaide
Stream 1 - Keynote  Presentation: Perth & AdelaideStream 1 - Keynote  Presentation: Perth & Adelaide
Stream 1 - Keynote Presentation: Perth & Adelaide
 
Stream 1- Enhanced Business Performance
Stream 1- Enhanced Business PerformanceStream 1- Enhanced Business Performance
Stream 1- Enhanced Business Performance
 
Stream 1 - Cloud Computing
Stream 1 - Cloud ComputingStream 1 - Cloud Computing
Stream 1 - Cloud Computing
 
Stream 3 - IT optimisation & virtualisation
Stream 3 - IT optimisation & virtualisationStream 3 - IT optimisation & virtualisation
Stream 3 - IT optimisation & virtualisation
 
IBM Business Intelligence Software
IBM Business Intelligence SoftwareIBM Business Intelligence Software
IBM Business Intelligence Software
 
Breakthrough reporting, analysis and planning tools for midsize companies.
Breakthrough reporting, analysis and planning tools for midsize companies.Breakthrough reporting, analysis and planning tools for midsize companies.
Breakthrough reporting, analysis and planning tools for midsize companies.
 

Último

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Data Protection Presentation

  • 1. LIVE WEBINAR Data Protection: Safeguarding your business today & tomorrow Wednesday, November 25, 2009 12:30 PM - 1:30 PM (AEDST), Sydney Australia Conference Number: Australia: 1800 098 754 New Zealand: 0800 447 860 Your conference ID #: 42727822
  • 2. Current issues in information security, and the value of data James Turner Advisor
  • 3.
  • 4. Our advisors IBRS is an Australian company providing timely advice, insightful judgement, and thorough research to benefit IT and business managers in Australasian organisations. Dr Kevin McIsaac Terry Dargan Dr Colin Boswell Joseph Sweeney James Turner Alan Hansell Rob Mackinnon Guy Cranswick Irene Pimentel Brian Bowman Jorn Bettin Peter Hind
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Incident response lifecycle Mitigate risks Backup important data Restore Life is too short to only learn from your own mistakes
  • 13. Current issues in information security, and the value of data James Turner Advisor
  • 14. Andrew Fry Business Unit Executive Business Continuity & Resiliency Services, IBM Global Technology Services
  • 15.
  • 16. PGP Encryption – Example Company: A mining and exploration company operating in a highly competitive and volatile market. Problem: Suffered from leakage of sensitive corporate data as a result of stolen employee’s laptop. Solution: Security specialists from IBM ISS implemented a PGP® Whole Disk Encryption solution to protect sensitive corporate data on desktops, laptops and removable media. Benefits: 1) Peace of mind that sensitive data is constantly protected from unauthorised access, providing strong security for intellectual property and reduced competitive risk 2) Data is protected without changing the user experience 3) Reduced operational costs by centrally automating encryption policies
  • 17.
  • 18.
  • 19.
  • 20. Server and Data recovery - Example Company: Financial services firm, servicing mid-size organisations in Australia Problem: Business demanded faster recovery times and assurance that data was being protected every day across distributed sites, and all within existing budget. Solution: Implemented IBM Remote Data Protection to backup critical server data to secure IBM facility, on a pay-as-you-go service. IBM coupled the backup service with IBM Virtual Server recovery to provide complete offsite server and data recovery solution, for a shared price point. Benefits: 1) Client achieved vastly improved recovery times, without needing to invest in expensive dedicated infrastructure 2) Daily reports confirming critical data is securely backed up 3) Storage capacity scales up/down based on usage (opex model)
  • 21. Data Protection Services Avoid data loss or leakage, and have a plan for recovery Mitigate risks Backup important data Restore

Notas do Editor

  1. No, not this cloud
  2. Law of very large numbers – given the number of computer rooms and servers around the place; it’s likely that something will go wrong somewhere.
  3. Price? Subscription? OTC? Rollout?