SlideShare uma empresa Scribd logo
1 de 14
Don’t Risk IT: Managing & Mitigating Risk in Your Business Melinda Fieldus
Agenda ,[object Object],[object Object],[object Object],[object Object]
Evolving towards a Smarter Planet 162 million Almost 162 million smart phones were sold in 2008, surpassing laptop sales for the first time. 90% Nearly 90% of innovation  in automobiles is related to  software and electronics systems. 1 trillion Soon, there will be 1 trillion  connected devices in the world, constituting an “internet of things.”
Evolving towards a Smarter Planet “ We have seen more change in the last 10 years than in the previous 90.” Ad J. Scheepbouwer, CEO, KPN Telecom New  possibilities. New  complexities. New  risks....... Information Explosion Emerging Technologies Privacy Risks Complex Regulatory Landscape
Not all Risks are Created Equal Frequency of occurrences per year Frequent Infrequent Consequences (single occurrence loss) in dollars per occurrence Low High Viruses Worms Disk failures System availability failures Pandemics Natural disasters Application outages Data corruption Network problems Building fires Terrorism/civil unrest Data driven Event driven Business driven Regulatory compliance Workplace inaccessibility Failure to meet industry standards Regional power failures Governance Source: IBM Data growth Long term preservation Mergers and  acquisitions New products Marketing campaigns Audits
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Threats and disruptions can vary greatly in business impact… ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Ignoring risk management is not an option “ I need to manage complexity of compliance across  my organization and silos -- and be audit-ready all the time.”   “ Lack of resources, expertise and tools to cost effectively manage multi-vendor environments” “ I need to protect against threats – even the ones I’m not prepared for.”  “ I need to provide access to and recoverability of data at any time.”
The key success factors for managing risk ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Reduce cost of security & resiliency Protect data & manage compliance Secure your data center
[object Object],[object Object],[object Object],[object Object],Reducing Costs  while Ensuring Strong Security and Resilience  Increases Profitability
Fuel Innovation   by  Protecting Critical Data  while   Meeting  Regulatory Compliance  Mandates ,[object Object],[object Object],[object Object],[object Object]
Secure the Datacentre   from Threats to Ensure Productivity, Profitability and   Reputation Management ,[object Object],[object Object],[object Object],[object Object]
Why IBM? IBM has a unique perspective on Managing Risk 400,000 employees across 130 countries with private data to protect Helping customers  build smarter cities, smarter grids, rail systems, new data centers, trusted passport systems and more A leading provider of security and business resiliency solutions across a vast array of industries and services segments A leading provider of software, hardware, and service solutions around the world Trusted Advisor Security Company Solution Provider The Company
A smarter business needs smarter systems . Reduce the cost of security and resiliency. Protect data and manage compliance. Secure your data center . IBM can help you  manage risk .
Textit Live Polling Q: Is addressing RISK a key focus in your current IT Strategy? Y / N

Mais conteúdo relacionado

Mais procurados

Empowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesEmpowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesDell World
 
5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernization5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernizationscoopnewsgroup
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580Joanna Hendricks
 
Future Proofing Your Mission - Samuel Gordy
Future Proofing Your Mission - Samuel GordyFuture Proofing Your Mission - Samuel Gordy
Future Proofing Your Mission - Samuel Gordyscoopnewsgroup
 
Taming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug BourgeoisTaming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug Bourgeoisscoopnewsgroup
 
Why Cloud needs to be seen beyond it's cost advantages.
Why Cloud needs to be seen beyond it's cost advantages. Why Cloud needs to be seen beyond it's cost advantages.
Why Cloud needs to be seen beyond it's cost advantages. CMS IT SERVICES (Admin)
 
Cloud computing concept & design
Cloud computing concept & designCloud computing concept & design
Cloud computing concept & designSandipan Samaddar
 
Hybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyHybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyOneNeck
 
Cloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismITCloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismITPrismITsolutions
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager OverviewDell World
 
Next Generation Managed Services KOX
Next Generation Managed Services KOXNext Generation Managed Services KOX
Next Generation Managed Services KOXJose A. Abril
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any BusinessePlus
 
IBM Smarter Campus-Cloud Computing in Education
IBM Smarter Campus-Cloud Computing in EducationIBM Smarter Campus-Cloud Computing in Education
IBM Smarter Campus-Cloud Computing in EducationJyothi Satyanathan
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Dell World
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsDell World
 
Impact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceImpact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceAsim Kumar Pathak
 
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorialWicsa2011 cloud tutorial
Wicsa2011 cloud tutorialAnna Liu
 
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyData Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyDell World
 

Mais procurados (20)

Empowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesEmpowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspaces
 
5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernization5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernization
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
 
Future Proofing Your Mission - Samuel Gordy
Future Proofing Your Mission - Samuel GordyFuture Proofing Your Mission - Samuel Gordy
Future Proofing Your Mission - Samuel Gordy
 
Taming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug BourgeoisTaming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug Bourgeois
 
Why Cloud needs to be seen beyond it's cost advantages.
Why Cloud needs to be seen beyond it's cost advantages. Why Cloud needs to be seen beyond it's cost advantages.
Why Cloud needs to be seen beyond it's cost advantages.
 
Cloud computing concept & design
Cloud computing concept & designCloud computing concept & design
Cloud computing concept & design
 
Hybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyHybrid IT – A Winning Strategy
Hybrid IT – A Winning Strategy
 
Cloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismITCloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismIT
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager Overview
 
Next Generation Managed Services KOX
Next Generation Managed Services KOXNext Generation Managed Services KOX
Next Generation Managed Services KOX
 
Why the Cloud?
Why the Cloud?Why the Cloud?
Why the Cloud?
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any Business
 
IBM Smarter Campus-Cloud Computing in Education
IBM Smarter Campus-Cloud Computing in EducationIBM Smarter Campus-Cloud Computing in Education
IBM Smarter Campus-Cloud Computing in Education
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
Impact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceImpact of cloud computing in education, e governance
Impact of cloud computing in education, e governance
 
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorialWicsa2011 cloud tutorial
Wicsa2011 cloud tutorial
 
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyData Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
 
Get file
Get fileGet file
Get file
 

Destaque

Exploring IBM's Advanced Collaboration Solutions
Exploring IBM's Advanced Collaboration SolutionsExploring IBM's Advanced Collaboration Solutions
Exploring IBM's Advanced Collaboration SolutionsVincent Kwon
 
Capitalising on Complexity - Ross Pearce
Capitalising on Complexity - Ross PearceCapitalising on Complexity - Ross Pearce
Capitalising on Complexity - Ross PearceVincent Kwon
 
Smarter Eduction - Higher Education Summit 2011 - D Watt
Smarter Eduction - Higher Education Summit 2011 - D WattSmarter Eduction - Higher Education Summit 2011 - D Watt
Smarter Eduction - Higher Education Summit 2011 - D WattVincent Kwon
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurityVincent Kwon
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
Lean IT Presentation
Lean IT PresentationLean IT Presentation
Lean IT Presentationbyunesiu
 

Destaque (6)

Exploring IBM's Advanced Collaboration Solutions
Exploring IBM's Advanced Collaboration SolutionsExploring IBM's Advanced Collaboration Solutions
Exploring IBM's Advanced Collaboration Solutions
 
Capitalising on Complexity - Ross Pearce
Capitalising on Complexity - Ross PearceCapitalising on Complexity - Ross Pearce
Capitalising on Complexity - Ross Pearce
 
Smarter Eduction - Higher Education Summit 2011 - D Watt
Smarter Eduction - Higher Education Summit 2011 - D WattSmarter Eduction - Higher Education Summit 2011 - D Watt
Smarter Eduction - Higher Education Summit 2011 - D Watt
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurity
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Lean IT Presentation
Lean IT PresentationLean IT Presentation
Lean IT Presentation
 

Semelhante a Don't risk it presentation

2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutionsharman041
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016SteveAtHPE
 
Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...Steve Lamb
 
Information security trends and concerns
Information security trends and concernsInformation security trends and concerns
Information security trends and concernsJohn Napier
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...Taiye Lambo
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
 
Cloud Computing - Benefits and Risks
Cloud Computing - Benefits and RisksCloud Computing - Benefits and Risks
Cloud Computing - Benefits and RisksMichael Yung
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistancePaul-Charife Allen
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew RosenquistMatthew Rosenquist
 

Semelhante a Don't risk it presentation (20)

2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
Risk Product.pptx
Risk Product.pptxRisk Product.pptx
Risk Product.pptx
 
Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...
 
EMC At A Glance
EMC At A GlanceEMC At A Glance
EMC At A Glance
 
Information security trends and concerns
Information security trends and concernsInformation security trends and concerns
Information security trends and concerns
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
Omzig
OmzigOmzig
Omzig
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
Qradar Business Case
Qradar Business CaseQradar Business Case
Qradar Business Case
 
Cloud Computing - Benefits and Risks
Cloud Computing - Benefits and RisksCloud Computing - Benefits and Risks
Cloud Computing - Benefits and Risks
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistance
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist
 

Mais de Vincent Kwon

IBM Maximo for Utilities
IBM Maximo for UtilitiesIBM Maximo for Utilities
IBM Maximo for UtilitiesVincent Kwon
 
IBM 'After 5' Session - IBM System X
IBM 'After 5' Session - IBM System XIBM 'After 5' Session - IBM System X
IBM 'After 5' Session - IBM System XVincent Kwon
 
VMWare Sponsor Presentation: Accelerating the journey to cloud
VMWare Sponsor Presentation: Accelerating the journey to cloudVMWare Sponsor Presentation: Accelerating the journey to cloud
VMWare Sponsor Presentation: Accelerating the journey to cloudVincent Kwon
 
Turn data into intelligence: Uncover insights. Take action
Turn data into intelligence: Uncover insights. Take actionTurn data into intelligence: Uncover insights. Take action
Turn data into intelligence: Uncover insights. Take actionVincent Kwon
 
Keynote intelligence, innovation & best practice
Keynote    intelligence, innovation & best practiceKeynote    intelligence, innovation & best practice
Keynote intelligence, innovation & best practiceVincent Kwon
 
It optimisation & virtualisation
It optimisation & virtualisationIt optimisation & virtualisation
It optimisation & virtualisationVincent Kwon
 
Enhanced business performance
Enhanced business performanceEnhanced business performance
Enhanced business performanceVincent Kwon
 
Drive business performance with information analytics
Drive business performance with information analyticsDrive business performance with information analytics
Drive business performance with information analyticsVincent Kwon
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)Vincent Kwon
 
Acclerating jounrey to cloud computing
Acclerating jounrey to cloud computingAcclerating jounrey to cloud computing
Acclerating jounrey to cloud computingVincent Kwon
 
Gen-i: Business Continuity considering reputation, security and virtualisation
Gen-i: Business Continuity considering reputation, security and virtualisationGen-i: Business Continuity considering reputation, security and virtualisation
Gen-i: Business Continuity considering reputation, security and virtualisationVincent Kwon
 
Wellington Business Keynote - Paul Callaghan
Wellington Business Keynote - Paul CallaghanWellington Business Keynote - Paul Callaghan
Wellington Business Keynote - Paul CallaghanVincent Kwon
 
VMware vSphere 4.0: The best platform for business applications
VMware vSphere 4.0: The best platform for business applicationsVMware vSphere 4.0: The best platform for business applications
VMware vSphere 4.0: The best platform for business applicationsVincent Kwon
 
WebSphere BlueWorks - how to build your business process models using free IB...
WebSphere BlueWorks - how to build your business process models using free IB...WebSphere BlueWorks - how to build your business process models using free IB...
WebSphere BlueWorks - how to build your business process models using free IB...Vincent Kwon
 
Utility AP - Best Practice, out of the box with Maximo Asset Management
Utility AP - Best Practice, out of the box with Maximo Asset ManagementUtility AP - Best Practice, out of the box with Maximo Asset Management
Utility AP - Best Practice, out of the box with Maximo Asset ManagementVincent Kwon
 
SolNet - Ministry of Health: Cancer Registry Solution
SolNet - Ministry of Health: Cancer Registry SolutionSolNet - Ministry of Health: Cancer Registry Solution
SolNet - Ministry of Health: Cancer Registry SolutionVincent Kwon
 
New Zealand Premiere! A first look at Rational Insight
New Zealand Premiere! A first look at Rational InsightNew Zealand Premiere! A first look at Rational Insight
New Zealand Premiere! A first look at Rational InsightVincent Kwon
 
Open systems Specialists: XiV Storage Reinvented
Open systems Specialists: XiV Storage ReinventedOpen systems Specialists: XiV Storage Reinvented
Open systems Specialists: XiV Storage ReinventedVincent Kwon
 
Macleans - NZ Business taking on the world with a world class IT infrastructu...
Macleans - NZ Business taking on the world with a world class IT infrastructu...Macleans - NZ Business taking on the world with a world class IT infrastructu...
Macleans - NZ Business taking on the world with a world class IT infrastructu...Vincent Kwon
 
Integral Technology Group - A IBM Power systems demonstration
Integral Technology Group - A IBM Power systems demonstrationIntegral Technology Group - A IBM Power systems demonstration
Integral Technology Group - A IBM Power systems demonstrationVincent Kwon
 

Mais de Vincent Kwon (20)

IBM Maximo for Utilities
IBM Maximo for UtilitiesIBM Maximo for Utilities
IBM Maximo for Utilities
 
IBM 'After 5' Session - IBM System X
IBM 'After 5' Session - IBM System XIBM 'After 5' Session - IBM System X
IBM 'After 5' Session - IBM System X
 
VMWare Sponsor Presentation: Accelerating the journey to cloud
VMWare Sponsor Presentation: Accelerating the journey to cloudVMWare Sponsor Presentation: Accelerating the journey to cloud
VMWare Sponsor Presentation: Accelerating the journey to cloud
 
Turn data into intelligence: Uncover insights. Take action
Turn data into intelligence: Uncover insights. Take actionTurn data into intelligence: Uncover insights. Take action
Turn data into intelligence: Uncover insights. Take action
 
Keynote intelligence, innovation & best practice
Keynote    intelligence, innovation & best practiceKeynote    intelligence, innovation & best practice
Keynote intelligence, innovation & best practice
 
It optimisation & virtualisation
It optimisation & virtualisationIt optimisation & virtualisation
It optimisation & virtualisation
 
Enhanced business performance
Enhanced business performanceEnhanced business performance
Enhanced business performance
 
Drive business performance with information analytics
Drive business performance with information analyticsDrive business performance with information analytics
Drive business performance with information analytics
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)
 
Acclerating jounrey to cloud computing
Acclerating jounrey to cloud computingAcclerating jounrey to cloud computing
Acclerating jounrey to cloud computing
 
Gen-i: Business Continuity considering reputation, security and virtualisation
Gen-i: Business Continuity considering reputation, security and virtualisationGen-i: Business Continuity considering reputation, security and virtualisation
Gen-i: Business Continuity considering reputation, security and virtualisation
 
Wellington Business Keynote - Paul Callaghan
Wellington Business Keynote - Paul CallaghanWellington Business Keynote - Paul Callaghan
Wellington Business Keynote - Paul Callaghan
 
VMware vSphere 4.0: The best platform for business applications
VMware vSphere 4.0: The best platform for business applicationsVMware vSphere 4.0: The best platform for business applications
VMware vSphere 4.0: The best platform for business applications
 
WebSphere BlueWorks - how to build your business process models using free IB...
WebSphere BlueWorks - how to build your business process models using free IB...WebSphere BlueWorks - how to build your business process models using free IB...
WebSphere BlueWorks - how to build your business process models using free IB...
 
Utility AP - Best Practice, out of the box with Maximo Asset Management
Utility AP - Best Practice, out of the box with Maximo Asset ManagementUtility AP - Best Practice, out of the box with Maximo Asset Management
Utility AP - Best Practice, out of the box with Maximo Asset Management
 
SolNet - Ministry of Health: Cancer Registry Solution
SolNet - Ministry of Health: Cancer Registry SolutionSolNet - Ministry of Health: Cancer Registry Solution
SolNet - Ministry of Health: Cancer Registry Solution
 
New Zealand Premiere! A first look at Rational Insight
New Zealand Premiere! A first look at Rational InsightNew Zealand Premiere! A first look at Rational Insight
New Zealand Premiere! A first look at Rational Insight
 
Open systems Specialists: XiV Storage Reinvented
Open systems Specialists: XiV Storage ReinventedOpen systems Specialists: XiV Storage Reinvented
Open systems Specialists: XiV Storage Reinvented
 
Macleans - NZ Business taking on the world with a world class IT infrastructu...
Macleans - NZ Business taking on the world with a world class IT infrastructu...Macleans - NZ Business taking on the world with a world class IT infrastructu...
Macleans - NZ Business taking on the world with a world class IT infrastructu...
 
Integral Technology Group - A IBM Power systems demonstration
Integral Technology Group - A IBM Power systems demonstrationIntegral Technology Group - A IBM Power systems demonstration
Integral Technology Group - A IBM Power systems demonstration
 

Último

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 

Último (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

Don't risk it presentation

  • 1. Don’t Risk IT: Managing & Mitigating Risk in Your Business Melinda Fieldus
  • 2.
  • 3. Evolving towards a Smarter Planet 162 million Almost 162 million smart phones were sold in 2008, surpassing laptop sales for the first time. 90% Nearly 90% of innovation in automobiles is related to software and electronics systems. 1 trillion Soon, there will be 1 trillion connected devices in the world, constituting an “internet of things.”
  • 4. Evolving towards a Smarter Planet “ We have seen more change in the last 10 years than in the previous 90.” Ad J. Scheepbouwer, CEO, KPN Telecom New possibilities. New complexities. New risks....... Information Explosion Emerging Technologies Privacy Risks Complex Regulatory Landscape
  • 5. Not all Risks are Created Equal Frequency of occurrences per year Frequent Infrequent Consequences (single occurrence loss) in dollars per occurrence Low High Viruses Worms Disk failures System availability failures Pandemics Natural disasters Application outages Data corruption Network problems Building fires Terrorism/civil unrest Data driven Event driven Business driven Regulatory compliance Workplace inaccessibility Failure to meet industry standards Regional power failures Governance Source: IBM Data growth Long term preservation Mergers and acquisitions New products Marketing campaigns Audits
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Why IBM? IBM has a unique perspective on Managing Risk 400,000 employees across 130 countries with private data to protect Helping customers build smarter cities, smarter grids, rail systems, new data centers, trusted passport systems and more A leading provider of security and business resiliency solutions across a vast array of industries and services segments A leading provider of software, hardware, and service solutions around the world Trusted Advisor Security Company Solution Provider The Company
  • 13. A smarter business needs smarter systems . Reduce the cost of security and resiliency. Protect data and manage compliance. Secure your data center . IBM can help you manage risk .
  • 14. Textit Live Polling Q: Is addressing RISK a key focus in your current IT Strategy? Y / N

Notas do Editor

  1. Risk is an issue being addressed by almost every company in business today. My name is Melinda Fieldus, I am the Risk Marketing Manager for IBM’s Global Technology Services division and I will over the course of the next 25 minutes be taking you on a journey…. - The Risk Landscape companies are facing today The Key Success Factors for managing risk So, let’s define what we mean by risk. Risk is the threat a business faces if something were to happen to it that would affect its ability to generate revenue, to sell its product, to make a profit. Companies faces risk differently. And the implications of different types of risks can include: downtime, non-compliance, litigation, fines and even bankruptcy. So, risk is commonly on the agenda of the senior mgmt team. In fact, IBM’s Global CIO Study last year found that 71% of CIOs rank risk as 1 of their top 3 priorities.
  2. Risk is an issue being addressed by almost every company in business today. My name is Melinda Fieldus, I am the Risk Marketing Manager for IBM’s Global Technology Services division and I will over the course of the next 25 minutes be taking you on a journey…. - The Risk Landscape companies are facing today The Key Success Factors for managing risk So, to start with …let’s define what we mean by risk. Risk is the threat a business faces if something were to happen to it that would affect its ability to generate revenue, to sell its product, to make a profit. Companies faces risk differently. And the implications of different types of risks can include: downtime, non-compliance, litigation, fines and even bankruptcy. So, risk is commonly on the agenda of the senior mgmt team. In fact, IBM’s Global CIO Study last year found that 71% of CIOs rank risk as 1 of their top 3 priorities.
  3. The situation is is that the world is becoming smaller, flatter, and smarter. More and more people and machines are becoming digitally aware and connected. This year, it is estimated that 1 trillion devices will be connected to the net. While this new, digitally-connected planet is creating many exciting new opportunities and capabilities, it is also creating an explosion in the amount of data and the number of transactions and assets that must be managed and controlled. And from this we are seeing the introduction of a number of risks… The rapid growth in data and digitally aware devices is straining our systems and infrastructure. The exponential growth in communications subscribers and services is exposing limitations in bandwidth and storage capacity. And, the connection of more and more networks, to the internet is exposing businesses to cyber threats. In addition to addressing system and infrastructure deficiencies that threaten future growth, organizations must also address rising customer expectations for quality service and increasing competitive pressures.
  4. So, as you can see, with a smarter planet comes… The reality of living in a globally integrated world impacts us all
  5. Unfortunately, not all risks are created equal – they vary greatly by industry, macroeconomic factors, company size, geographic location and technology availability to name a few. But generally speaking the risk landscape can be discussed in the context three different types of threats or risks that a company must be protect itself against. When you look at how these risks are plotted…certain events such as computer viruses may occur frequently and have a lower impact on the corporation; whereas other less frequent events such as a natural disaster could have devastating impact. You only have to look at the recent Icelandic volcano activity just over a week ago which some analysts claim have cost airlines approximately $1million an hour. What’s clear is that companies today must be able to address a spectrum of risks that could potentially impact their business if they are to survive and grow.
  6. Our own research is backed up by analysts’ findings showing that our clients are no longer able to accept outages of any kind, from any cause, and that critical applications are not the only applications on the “need to be available 24/7” list. IT managers are being squeezed on all sides to reduce planned downtime for maintenance, upgrades, backups, etc.--all of which can create exposure from lack of preventative and necessary maintenance. Additionally IT is being asked to support security or compliance requirements and reporting as security attacks increase and unencrypted data is lost through a variety of sources – malicious or accidental. IT is also expected to provide an environment where new services or applications can be brought on line as fast as possible with minimal disruption to existing business processes and provide scalable hardware that allows for expansion when required. And we see the effects of downtime. It’s amazing that in some industries, downtime can equal 16 percent of revenue. That’s a staggering number. And for 32 percent of organizations, just four hours of downtime could destroy the company's revenue numbers for the year. We also know that some industries are facing fines from regulators if business is disrupted or if information and data are not available for a specified period of time – or recoverable within a designated time frame. Increasingly information, data, applications and systems availability are required 24x7. Consolidation and virtualization, global expansion, and the need to have systems geographically dispersed all increase the need to provide the highest levels of availability possible. It’s very important to understand the cost of outages or potential disruptions for any enterprise. The way to determine that, once you have completed the outage analysis, is to do a business impact analysis for your existing and planned applications and systems which support individual business units
  7. Our own research is backed up by analysts’ findings showing that our clients are no longer able to accept outages of any kind, from any cause, and that critical applications are not the only applications on the “need to be available 24/7” list. IT managers are being squeezed on all sides to reduce planned downtime for maintenance, upgrades, backups, etc.--all of which can create exposure from lack of preventative and necessary maintenance. Additionally IT is being asked to support security or compliance requirements and reporting as security attacks increase and unencrypted data is lost through a variety of sources – malicious or accidental. IT is also expected to provide an environment where new services or applications can be brought on line as fast as possible with minimal disruption to existing business processes and provide scalable hardware that allows for expansion when required. And we see the effects of downtime. It’s amazing that in some industries, downtime can equal 16 percent of revenue. That’s a staggering number. And for 32 percent of organizations, just four hours of downtime could destroy the company's revenue numbers for the year. We also know that some industries are facing fines from regulators if business is disrupted or if information and data are not available for a specified period of time – or recoverable within a designated time frame. Increasingly information, data, applications and systems availability are required 24x7. Consolidation and virtualization, global expansion, and the need to have systems geographically dispersed all increase the need to provide the highest levels of availability possible. It’s very important to understand the cost of outages or potential disruptions for any enterprise. The way to determine that, once you have completed the outage analysis, is to do a business impact analysis for your existing and planned applications and systems which support individual business units
  8. In short, managing risk matters -- now more than ever.
  9. In short, managing risk matters -- now more than ever.