SlideShare a Scribd company logo
1 of 17
DATA PROTECTION
FOR CREDIT UNIONS
A Peer Supported Discussion
October 20, 2016
MEET YOUR MODERATOR
Lee Bird, President, Btech
Btech specializes in affordable, managed IT
security services for credit unions.
Btech works with over 120 credit unions throughout the United
States. Btech helps credit unions meet compliance goals by
implementing and managing security services.
John Lockie, AVP of Infrastructure and Security
Caltech Employees FCU
Rick Menjivar, Chief Information Officer
Chaffey FCU
PEER PANELISTS
Credit union landscape
Data loss threats
Methods to protect data
Compliance
Technology choices
Q&A
AGENDA
Increasing
complexity of IT
environments
Hyper-growth
of data and
applications
Protection of
electronic member
information
Compliance
requirements for
data
retention/destruction
CREDIT UNION LANDSCAPE
Accidental Deletion
Viruses, Malware, Ransomware
Natural Disasters – Storms, Floods, Fires
Power Outages
Hardware Failures
WHAT CAUSES DATA LOSS?
Determine RTO (Recovery Time Objective)
Define RTO for all data
Use the appropriate data protection technology based on the required RTO
Protect all data
1.
Determine Onsite vs. Offsite Requirements
Onsite for DR’s or data loss where site is still available
Offsite for DR’s where access to data center isn’t possible
“Out of the region” – Compliance requirements
HOW SHOULD I START PROTECTING DATA?
2.
WHAT DO I NEED TO KNOW ABOUT COMPLIANCE?
NCUA Rules –
Do you know them?
Encryption of
electronic member
information
Measures to protect
against destruction,
loss or damage of
member information
Regularly test the key
controls, systems
and procedures of
the InfoSec program
Gramm-Leach-Bliley
Act (GLBA)
DO THESE TECHNOLOGIES COVER ALL
MY DATA PROTECTION NEEDS?
Challenges with these technologies
• Regularly scheduled backups
• Unattended
• Multiple Copies of the same data
• Multiple retentions over a
pre-defined period of time
- Daily, weekly, monthly,
annual retentions
POINT-IN-TIME BACKUP
Slow
WHAT ABOUT BACKING UP TO TAPE VERSUS DISK?
CHALLENGES WITH TAPE
Tapes need to be
replaced annually
Transfer of tapes off-site
Are they out of the region? The
cost for an offsite storage vendor
Security
How many people are
touching my tapes?
Tape audit
All tapes must be accounted
for, all the time, otherwise
must report possible loss of
member information.
• Cloud for DR if region is affected
• Cloud so that protected data is out of the region
• Site replication or CDR for low RTO
• Can have a local copy for quick recovery
WHAT DOES CLOUD BACKUP BRING TO THE TABLE?
vs.
PUBLIC PRIVATE
• Identify all data to be protected
• Break down data recovery into RTO’s
• Have multiple data points for recovery
• Data must be out of the region
• Data must be encrypted
• Solution must be unattended – What does this mean?
SUMMARY: WHAT ARE DATA
PROTECTION “MUST-DOs” FOR CREDIT
UNIONS?
QUESTIONS FROM ATTENDEES
We created a quick checklist for you
to get a real Data Protection Score
IS YOUR DATA PROTECTED?
RESOURCES
Compliance Datasheet Comparison Card
All attendees will receive resources in a follow-up email
Data Protection Checklist
THANK YOU!
Lee Bird, President, Btech
221 E. Walnut Street, Suite 138
Pasadena, CA 91101
626-397-1045 | leebird@btechonline.com

More Related Content

What's hot

Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignmentnaterator
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Bianca Mueller, LL.M.
 
StepFwdIT_FACTSHEET_Datto
StepFwdIT_FACTSHEET_DattoStepFwdIT_FACTSHEET_Datto
StepFwdIT_FACTSHEET_Dattochrismannering
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityDell EMC World
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPFidelis Cybersecurity
 
Collaborative Threat Mitigation or (Collective Self Defense) by Scott Pinkert...
Collaborative Threat Mitigation or (Collective Self Defense) by Scott Pinkert...Collaborative Threat Mitigation or (Collective Self Defense) by Scott Pinkert...
Collaborative Threat Mitigation or (Collective Self Defense) by Scott Pinkert...TheAnfieldGroup
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedJerry Paul Acosta
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
The Datacenter Security Continuum
The Datacenter Security ContinuumThe Datacenter Security Continuum
The Datacenter Security ContinuumMartin Hingley
 
SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013Wolfgang Kandek
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateFidelis Cybersecurity
 
Managed Service Brochure
Managed Service BrochureManaged Service Brochure
Managed Service BrochureLen Moncrieffe
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?NTEN
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...TheAnfieldGroup
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)Trustmarque
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsAbbie Hosta
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec
 

What's hot (20)

Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
StepFwdIT_FACTSHEET_Datto
StepFwdIT_FACTSHEET_DattoStepFwdIT_FACTSHEET_Datto
StepFwdIT_FACTSHEET_Datto
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Collaborative Threat Mitigation or (Collective Self Defense) by Scott Pinkert...
Collaborative Threat Mitigation or (Collective Self Defense) by Scott Pinkert...Collaborative Threat Mitigation or (Collective Self Defense) by Scott Pinkert...
Collaborative Threat Mitigation or (Collective Self Defense) by Scott Pinkert...
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
The Datacenter Security Continuum
The Datacenter Security ContinuumThe Datacenter Security Continuum
The Datacenter Security Continuum
 
SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
 
Managed Service Brochure
Managed Service BrochureManaged Service Brochure
Managed Service Brochure
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
 
YBB-NW-distribution
YBB-NW-distributionYBB-NW-distribution
YBB-NW-distribution
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 

Viewers also liked

How to fight back against ransomware
How to fight back against ransomwareHow to fight back against ransomware
How to fight back against ransomwareCarbonite
 
ActiveStor Performance at Scale
ActiveStor Performance at ScaleActiveStor Performance at Scale
ActiveStor Performance at ScalePanasas
 
Discover Smart Solutions for Enterprise Cloud Storage on Amazon Web Services
Discover Smart Solutions for Enterprise Cloud Storage on Amazon Web ServicesDiscover Smart Solutions for Enterprise Cloud Storage on Amazon Web Services
Discover Smart Solutions for Enterprise Cloud Storage on Amazon Web ServicesOxygen Cloud
 
Working from home? Here's how the cloud can help.
Working from home? Here's how the cloud can help.Working from home? Here's how the cloud can help.
Working from home? Here's how the cloud can help.Carbonite
 
Letter of Reccomendation from Max Drucker
Letter of Reccomendation from Max DruckerLetter of Reccomendation from Max Drucker
Letter of Reccomendation from Max DruckerBrent Lachowski
 
The Building Block for Business Continuity & Disaster Recovery
The Building Block for Business Continuity & Disaster RecoveryThe Building Block for Business Continuity & Disaster Recovery
The Building Block for Business Continuity & Disaster RecoveryCarbonite
 
Шизандра. Улучшенная формула
Шизандра. Улучшенная формулаШизандра. Улучшенная формула
Шизандра. Улучшенная формулаGrigory Korshunov
 
Keeping Your Business HIPAA-Compliant
Keeping Your Business HIPAA-CompliantKeeping Your Business HIPAA-Compliant
Keeping Your Business HIPAA-CompliantCarbonite
 
Noritz Water Usage Infographics
Noritz Water Usage InfographicsNoritz Water Usage Infographics
Noritz Water Usage InfographicsFlyingCamels
 
eBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBseBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBsCarbonite
 
LitBit Interim Business Presentation
LitBit Interim Business PresentationLitBit Interim Business Presentation
LitBit Interim Business PresentationPhilip Wang
 
JCBMemorial9-8-14-Owens
JCBMemorial9-8-14-OwensJCBMemorial9-8-14-Owens
JCBMemorial9-8-14-OwensKevin Owens
 
5 Deadly Sins of Small Business Data Backup- webinar slides12082011
5 Deadly Sins of Small Business Data Backup- webinar slides120820115 Deadly Sins of Small Business Data Backup- webinar slides12082011
5 Deadly Sins of Small Business Data Backup- webinar slides12082011Carbonite
 
2014 State of Backup for SMBs
2014 State of Backup for SMBs2014 State of Backup for SMBs
2014 State of Backup for SMBsCarbonite
 
AppFolio Presentation: Rental Business Trends
AppFolio Presentation: Rental Business TrendsAppFolio Presentation: Rental Business Trends
AppFolio Presentation: Rental Business TrendsAppFolio
 
AppFolio Reports and Letters - Webinar Recap
AppFolio Reports and Letters - Webinar RecapAppFolio Reports and Letters - Webinar Recap
AppFolio Reports and Letters - Webinar RecapAppFolio
 
AppFolio End of Year Preparation
AppFolio End of Year PreparationAppFolio End of Year Preparation
AppFolio End of Year PreparationAppFolio
 
AppFolio Maintenance Contact Center (Customer Webinar Slides)
AppFolio Maintenance Contact Center (Customer Webinar Slides) AppFolio Maintenance Contact Center (Customer Webinar Slides)
AppFolio Maintenance Contact Center (Customer Webinar Slides) AppFolio
 
Small Business Big Impact: 10 Facts About Small Businesses
Small Business Big Impact: 10 Facts About Small Businesses Small Business Big Impact: 10 Facts About Small Businesses
Small Business Big Impact: 10 Facts About Small Businesses Carbonite
 

Viewers also liked (20)

How to fight back against ransomware
How to fight back against ransomwareHow to fight back against ransomware
How to fight back against ransomware
 
ActiveStor Performance at Scale
ActiveStor Performance at ScaleActiveStor Performance at Scale
ActiveStor Performance at Scale
 
Discover Smart Solutions for Enterprise Cloud Storage on Amazon Web Services
Discover Smart Solutions for Enterprise Cloud Storage on Amazon Web ServicesDiscover Smart Solutions for Enterprise Cloud Storage on Amazon Web Services
Discover Smart Solutions for Enterprise Cloud Storage on Amazon Web Services
 
Working from home? Here's how the cloud can help.
Working from home? Here's how the cloud can help.Working from home? Here's how the cloud can help.
Working from home? Here's how the cloud can help.
 
Letter of Reccomendation from Max Drucker
Letter of Reccomendation from Max DruckerLetter of Reccomendation from Max Drucker
Letter of Reccomendation from Max Drucker
 
The Building Block for Business Continuity & Disaster Recovery
The Building Block for Business Continuity & Disaster RecoveryThe Building Block for Business Continuity & Disaster Recovery
The Building Block for Business Continuity & Disaster Recovery
 
Шизандра. Улучшенная формула
Шизандра. Улучшенная формулаШизандра. Улучшенная формула
Шизандра. Улучшенная формула
 
JD Gen Book
JD Gen BookJD Gen Book
JD Gen Book
 
Keeping Your Business HIPAA-Compliant
Keeping Your Business HIPAA-CompliantKeeping Your Business HIPAA-Compliant
Keeping Your Business HIPAA-Compliant
 
Noritz Water Usage Infographics
Noritz Water Usage InfographicsNoritz Water Usage Infographics
Noritz Water Usage Infographics
 
eBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBseBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBs
 
LitBit Interim Business Presentation
LitBit Interim Business PresentationLitBit Interim Business Presentation
LitBit Interim Business Presentation
 
JCBMemorial9-8-14-Owens
JCBMemorial9-8-14-OwensJCBMemorial9-8-14-Owens
JCBMemorial9-8-14-Owens
 
5 Deadly Sins of Small Business Data Backup- webinar slides12082011
5 Deadly Sins of Small Business Data Backup- webinar slides120820115 Deadly Sins of Small Business Data Backup- webinar slides12082011
5 Deadly Sins of Small Business Data Backup- webinar slides12082011
 
2014 State of Backup for SMBs
2014 State of Backup for SMBs2014 State of Backup for SMBs
2014 State of Backup for SMBs
 
AppFolio Presentation: Rental Business Trends
AppFolio Presentation: Rental Business TrendsAppFolio Presentation: Rental Business Trends
AppFolio Presentation: Rental Business Trends
 
AppFolio Reports and Letters - Webinar Recap
AppFolio Reports and Letters - Webinar RecapAppFolio Reports and Letters - Webinar Recap
AppFolio Reports and Letters - Webinar Recap
 
AppFolio End of Year Preparation
AppFolio End of Year PreparationAppFolio End of Year Preparation
AppFolio End of Year Preparation
 
AppFolio Maintenance Contact Center (Customer Webinar Slides)
AppFolio Maintenance Contact Center (Customer Webinar Slides) AppFolio Maintenance Contact Center (Customer Webinar Slides)
AppFolio Maintenance Contact Center (Customer Webinar Slides)
 
Small Business Big Impact: 10 Facts About Small Businesses
Small Business Big Impact: 10 Facts About Small Businesses Small Business Big Impact: 10 Facts About Small Businesses
Small Business Big Impact: 10 Facts About Small Businesses
 

Similar to Data Protection for Credit Unions

Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Iron Mountain
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013Steven Williams
 
Audax Group: CIO Perspectives - Managing The Copy Data Explosion
Audax Group: CIO Perspectives - Managing The Copy Data ExplosionAudax Group: CIO Perspectives - Managing The Copy Data Explosion
Audax Group: CIO Perspectives - Managing The Copy Data Explosionactifio
 
Trust in a Digital World
Trust in a Digital WorldTrust in a Digital World
Trust in a Digital Worlditnewsafrica
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planningAureusIT
 
vRescue Presentation
vRescue PresentationvRescue Presentation
vRescue PresentationvRescue
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually Works
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually WorksWebinar: How to Create a Disaster Recovery (DR) Plan that Actually Works
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually WorksStorage Switzerland
 
Designing Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT ProfessionalsDesigning Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT ProfessionalsStorage Switzerland
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseRapidScale
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
Idc paper on disaster recovery
Idc paper on disaster recoveryIdc paper on disaster recovery
Idc paper on disaster recoveryEMC Forum India
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Sutedjo Tjahjadi
 

Similar to Data Protection for Credit Unions (20)

Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013
 
Audax Group: CIO Perspectives - Managing The Copy Data Explosion
Audax Group: CIO Perspectives - Managing The Copy Data ExplosionAudax Group: CIO Perspectives - Managing The Copy Data Explosion
Audax Group: CIO Perspectives - Managing The Copy Data Explosion
 
Trust in a Digital World
Trust in a Digital WorldTrust in a Digital World
Trust in a Digital World
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planning
 
DCNCBC
DCNCBCDCNCBC
DCNCBC
 
vRescue Presentation
vRescue PresentationvRescue Presentation
vRescue Presentation
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually Works
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually WorksWebinar: How to Create a Disaster Recovery (DR) Plan that Actually Works
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually Works
 
Designing Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT ProfessionalsDesigning Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT Professionals
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
 
Harris Bdr
Harris BdrHarris Bdr
Harris Bdr
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Idc paper on disaster recovery
Idc paper on disaster recoveryIdc paper on disaster recovery
Idc paper on disaster recovery
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking
 

More from Carbonite

The Business Case for Disaster Recovery
The Business Case for Disaster RecoveryThe Business Case for Disaster Recovery
The Business Case for Disaster RecoveryCarbonite
 
The Role of Backup in a Windows Server 2003 Migration
The Role of Backup in a Windows Server 2003 MigrationThe Role of Backup in a Windows Server 2003 Migration
The Role of Backup in a Windows Server 2003 MigrationCarbonite
 
Important Lessons in Cloud Backup
Important Lessons in Cloud BackupImportant Lessons in Cloud Backup
Important Lessons in Cloud BackupCarbonite
 
How to Knock Out Threats from Crypto-Style Viruses
How to Knock Out Threats from Crypto-Style VirusesHow to Knock Out Threats from Crypto-Style Viruses
How to Knock Out Threats from Crypto-Style VirusesCarbonite
 
Syncing up with business mobility: A look at the capabilities and uses of fil...
Syncing up with business mobility: A look at the capabilities and uses of fil...Syncing up with business mobility: A look at the capabilities and uses of fil...
Syncing up with business mobility: A look at the capabilities and uses of fil...Carbonite
 
A Look at US & European Cloud Adoption Trends
A Look at US & European Cloud Adoption TrendsA Look at US & European Cloud Adoption Trends
A Look at US & European Cloud Adoption TrendsCarbonite
 
Study: Small Businesses and Data Backup Methods
Study: Small Businesses and Data Backup MethodsStudy: Small Businesses and Data Backup Methods
Study: Small Businesses and Data Backup MethodsCarbonite
 
SMB's Unprepared for Data Disaster
SMB's Unprepared for Data DisasterSMB's Unprepared for Data Disaster
SMB's Unprepared for Data DisasterCarbonite
 
Cloud confusion infographic july 2012
Cloud confusion infographic   july 2012Cloud confusion infographic   july 2012
Cloud confusion infographic july 2012Carbonite
 
Working From Home: The Good... The Bad... & How The Cloud Can Help!
Working From Home: The Good... The Bad... & How The Cloud Can Help!Working From Home: The Good... The Bad... & How The Cloud Can Help!
Working From Home: The Good... The Bad... & How The Cloud Can Help!Carbonite
 
Carb blogher-infographic-banner-final.pdf
Carb blogher-infographic-banner-final.pdfCarb blogher-infographic-banner-final.pdf
Carb blogher-infographic-banner-final.pdfCarbonite
 
How much data is 100 Petabytes?
How much data is 100 Petabytes? How much data is 100 Petabytes?
How much data is 100 Petabytes? Carbonite
 

More from Carbonite (12)

The Business Case for Disaster Recovery
The Business Case for Disaster RecoveryThe Business Case for Disaster Recovery
The Business Case for Disaster Recovery
 
The Role of Backup in a Windows Server 2003 Migration
The Role of Backup in a Windows Server 2003 MigrationThe Role of Backup in a Windows Server 2003 Migration
The Role of Backup in a Windows Server 2003 Migration
 
Important Lessons in Cloud Backup
Important Lessons in Cloud BackupImportant Lessons in Cloud Backup
Important Lessons in Cloud Backup
 
How to Knock Out Threats from Crypto-Style Viruses
How to Knock Out Threats from Crypto-Style VirusesHow to Knock Out Threats from Crypto-Style Viruses
How to Knock Out Threats from Crypto-Style Viruses
 
Syncing up with business mobility: A look at the capabilities and uses of fil...
Syncing up with business mobility: A look at the capabilities and uses of fil...Syncing up with business mobility: A look at the capabilities and uses of fil...
Syncing up with business mobility: A look at the capabilities and uses of fil...
 
A Look at US & European Cloud Adoption Trends
A Look at US & European Cloud Adoption TrendsA Look at US & European Cloud Adoption Trends
A Look at US & European Cloud Adoption Trends
 
Study: Small Businesses and Data Backup Methods
Study: Small Businesses and Data Backup MethodsStudy: Small Businesses and Data Backup Methods
Study: Small Businesses and Data Backup Methods
 
SMB's Unprepared for Data Disaster
SMB's Unprepared for Data DisasterSMB's Unprepared for Data Disaster
SMB's Unprepared for Data Disaster
 
Cloud confusion infographic july 2012
Cloud confusion infographic   july 2012Cloud confusion infographic   july 2012
Cloud confusion infographic july 2012
 
Working From Home: The Good... The Bad... & How The Cloud Can Help!
Working From Home: The Good... The Bad... & How The Cloud Can Help!Working From Home: The Good... The Bad... & How The Cloud Can Help!
Working From Home: The Good... The Bad... & How The Cloud Can Help!
 
Carb blogher-infographic-banner-final.pdf
Carb blogher-infographic-banner-final.pdfCarb blogher-infographic-banner-final.pdf
Carb blogher-infographic-banner-final.pdf
 
How much data is 100 Petabytes?
How much data is 100 Petabytes? How much data is 100 Petabytes?
How much data is 100 Petabytes?
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Data Protection for Credit Unions

  • 1. DATA PROTECTION FOR CREDIT UNIONS A Peer Supported Discussion October 20, 2016
  • 2. MEET YOUR MODERATOR Lee Bird, President, Btech Btech specializes in affordable, managed IT security services for credit unions. Btech works with over 120 credit unions throughout the United States. Btech helps credit unions meet compliance goals by implementing and managing security services.
  • 3. John Lockie, AVP of Infrastructure and Security Caltech Employees FCU Rick Menjivar, Chief Information Officer Chaffey FCU PEER PANELISTS
  • 4. Credit union landscape Data loss threats Methods to protect data Compliance Technology choices Q&A AGENDA
  • 5. Increasing complexity of IT environments Hyper-growth of data and applications Protection of electronic member information Compliance requirements for data retention/destruction CREDIT UNION LANDSCAPE
  • 6. Accidental Deletion Viruses, Malware, Ransomware Natural Disasters – Storms, Floods, Fires Power Outages Hardware Failures WHAT CAUSES DATA LOSS?
  • 7. Determine RTO (Recovery Time Objective) Define RTO for all data Use the appropriate data protection technology based on the required RTO Protect all data 1. Determine Onsite vs. Offsite Requirements Onsite for DR’s or data loss where site is still available Offsite for DR’s where access to data center isn’t possible “Out of the region” – Compliance requirements HOW SHOULD I START PROTECTING DATA? 2.
  • 8. WHAT DO I NEED TO KNOW ABOUT COMPLIANCE? NCUA Rules – Do you know them? Encryption of electronic member information Measures to protect against destruction, loss or damage of member information Regularly test the key controls, systems and procedures of the InfoSec program Gramm-Leach-Bliley Act (GLBA)
  • 9. DO THESE TECHNOLOGIES COVER ALL MY DATA PROTECTION NEEDS? Challenges with these technologies
  • 10. • Regularly scheduled backups • Unattended • Multiple Copies of the same data • Multiple retentions over a pre-defined period of time - Daily, weekly, monthly, annual retentions POINT-IN-TIME BACKUP
  • 11. Slow WHAT ABOUT BACKING UP TO TAPE VERSUS DISK? CHALLENGES WITH TAPE Tapes need to be replaced annually Transfer of tapes off-site Are they out of the region? The cost for an offsite storage vendor Security How many people are touching my tapes? Tape audit All tapes must be accounted for, all the time, otherwise must report possible loss of member information.
  • 12. • Cloud for DR if region is affected • Cloud so that protected data is out of the region • Site replication or CDR for low RTO • Can have a local copy for quick recovery WHAT DOES CLOUD BACKUP BRING TO THE TABLE? vs. PUBLIC PRIVATE
  • 13. • Identify all data to be protected • Break down data recovery into RTO’s • Have multiple data points for recovery • Data must be out of the region • Data must be encrypted • Solution must be unattended – What does this mean? SUMMARY: WHAT ARE DATA PROTECTION “MUST-DOs” FOR CREDIT UNIONS?
  • 15. We created a quick checklist for you to get a real Data Protection Score IS YOUR DATA PROTECTED?
  • 16. RESOURCES Compliance Datasheet Comparison Card All attendees will receive resources in a follow-up email Data Protection Checklist
  • 17. THANK YOU! Lee Bird, President, Btech 221 E. Walnut Street, Suite 138 Pasadena, CA 91101 626-397-1045 | leebird@btechonline.com

Editor's Notes

  1. Moderator introduces himself I’m Lee Bird, President of Btech. I started Btech in 1989, and since 2000, we have worked exclusively with credit unions – providing IT security services using “best of breed” technology. We currently work with over 120 credit unions throughout the United States.
  2. --Introduce John --Introduce Rick Thank you John and Rick and let’s dive right in
  3. Today we’ll be taking a look at these Agenda Items as we learn how today’s Credit Union IT professionals and managers can succeed in a quickly changing and complex environment. We’ve got two great guest panelists – they are YOUR PEERS – TWO CONSUMER CREDIT IT PROS – who will share their recent experiences.
  4. Here’s a look at the Credit Union Landscape today. These are just some of the challenges CU professionals face. We are all seeing a lot of data growth! Is it all just imaging data? Or, are you seeing other areas – like maybe email or email archive – with lots of data growth. John, let’s get started by asking you “Why has data protection surfaced as such a huge challenge for CU professionals?” (Answer) Rick, what about you? Is there ONE SINGLE factor that is making your job tougher these days?
  5. Let’s start with data loss. We need to remind ourselves that there are so many ways that credit unions can lose on-premise data. Better hardware has made some of us complacent in our data protection strategies. We just don’t see crashed HDD’s or broken RAID arrays like we used to. Human error remains the number one way that valuable data is lost. And these days of course, everyone is talking about ransomware, the malware that can encrypt your data while cyber crooks demand payment to unlock it. That’s before we get to the havoc Mother Nature can wreak on systems and the outages and failures that are part of doing business.
  6. Here are some thoughts on looking at your data protection strategies. Do you ever consider RTO? What about Onsite vs. Offsite? Rick, how difficult is it to determine what you are able to keep on premise? John how have you met or tried to meet offsite compliance requirements? Rick and John, what do you feel is best practice for “out of the region” compliance? After all, Hurricane Sandy affected 4 of the 10 FEMA Zones.
  7. What’s the number one challenge compliance poses for credit unions? Does anyone else feel that some of the rules are ambiguous? What about the FFIEC’s requirement for data encryption? That counts as data protection, right? Goes over the NCUA Basics. What it means for Credits Unions.
  8. Do you feel like we have started forgetting about basic “data backup” because of all of the new technologies out there? While newer data protection technologies may offer a lower RTO, do they have limitations in their ability to protect all data? Asks panelists for their experience with any of these, or challenges
  9. Let’s talk about Point-in-Time Backup and Why It’s so Important to Today’s Credit Unions. I strongly feel that there is still a need for point in time backups, even though I’m seeing some CU’s get rid of them in favor of other technologies. This leaves a big gap in the ability to recover data based on certain scenarios. John, how does point-in-time factor into your strategy? Rick, can you explain how these factor into NCUA compliance?
  10. I won’t ask for a show of hands – but, how many of you still have a tape drive? It’s still out there! Backing up to a portable USB is like a tape – isn’t it? What about backing up to a disk vault – an appliance. Lee highlights pros and cons of tape. Moderator’s choice on whether panelists have input here. Lee likely hears plenty of ‘tape’s stories as most attendees do. Tape isn’t dead and a lot of you in audience may be using it. But there are significant challenges.
  11. Let’s talk about cloud backup. I think the Examiners are comfortable with the Cloud now, as long as the vendor is doing their due-diligence, like SSAE-16. Is your CEO, or the Board comfortable with the Cloud yet? I still see some Executives that aren’t comfortable with the Cloud. Rick how has it helped you? Do you test it regularly? Challenges John, what did you learn about cloud backup as it relates to credit union landscape?
  12. Lee summarizes key points or MUST DO’s For panelists: Do our panelists have any final takeaways? Or what do panelists think is biggest challenge moving forward for all credit unions
  13. Now it’s time for your questions for me, or our panelists
  14. We created a quick checklist for you to get a real Data Protection Score
  15. Thank panelists and audience Contact information Question for MZ: How do we want to offer up more extended cheat sheet or detailed Best Practice List?