New Threats to Data Security

423 views

Published on

The webinar will cover highlights of the 2012 Ponemon Study: Trends in Security of Data Recovery

Operations such as:
Why data loss incidents are on the rise.
Why data recovery vendors are being used more often.
Why more data breach incidents are occurring at data recovery vendors.

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
423
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
7
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

New Threats to Data Security

  1. 1. New Threats to Data Security Growing Risk of Using Unsecure Data Recovery VendorsPresented by: Michael Hall, CISO Lynda Martel, Director, Privacy ComplianceCommunications
  2. 2. Data Loss a Reality in Today’s Digital WorldResource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
  3. 3. Multiple DR Vendors Being Used Majority Used 1X/Week +Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
  4. 4. Data Recovery Outsourced More Often When Critical Data LostResource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
  5. 5. Data Recovery Vendors HandleYour Most Sensitive Data
  6. 6. IT Support Chooses Data Recovery VendorResource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
  7. 7. IT Support Believes Speed andCost Tops Data Security
  8. 8. Data Recovery Vendors FlyUnder IT Security’s Radar
  9. 9. IT Security Not Involved InDR Vendor Vetting Process
  10. 10. Vetting Process in Most Companies Below ParResource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
  11. 11. Risk Assessments Not Often ConductedResource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
  12. 12. Data Breaches at RecoveryCompanies Going Up
  13. 13. Insecure Data Recovery Operations Cause of BreachResource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
  14. 14. Would Your Cloud Service Provider Notify You Of A Breach?Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
  15. 15. IT & IT Security Understands Need to Strengthen ProtocolsResource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
  16. 16. Not All Data RecoveryCompanies are Created Equal
  17. 17. DriveSavers Highlights Annual and company-wide SAS 70 II Audit Reports Certified secure network Compliant with NIST 800.32, FERPA, GLBA, SOX AND HIPAA State-of-the-art ISO-5 cleanroom Engineers certified to recover data from encrypted files and drives – leading data recovery success rates since 1985 DoD approved data degaussing process Authorized by all leading storage device OEMs
  18. 18. A Few of OurHappy Customers
  19. 19. Thank You! Q&A

×