SlideShare a Scribd company logo
1 of 13
Assessing your Risks
Preparing for recovery
18th July 2018
LDSC
Run | Grow | Transform
2
Run the business
Innovate the business
Grow the business
66%
20%
14%
BCI Cyber Resilience report 2018
3
Cyber is now the Number 1 threat to Business
Continuity
Top 3 Cyber threats
4
Top 3 threats all compromise data integrity
RISK – the Swiss cheese model
5
Layers of Defence,
Barriers & Safeguards
Residual Risk
Building design
Sprinklers
Fire extinguishers
Staff Training
Fire
Insurance
Self
Insure
Fire Loss
RISK – the Swiss cheese model
6
Layers of Defence,
Barriers & Safeguards
Residual Risk
Technology Defences
Policies & Procedures
Training & Awareness
Testing & Verification
Cyber/
Business
Interruption/
Data Loss/
Insurance
Self
Insure
Data Loss
3-2-1 of Data Protection
3 COPIES
The source and two in backup
2 ENVIRONMENTS [Live systems – Backup]
Different media//vendors//software//firmware
1 COPY OFFSITE
Geographically separate source data from a backup copy
7
8
10
6
8
9
7
11
9
10
10
11
18
15
30
31
28
29
28
35
35
37
39
36
31
28
15
17
16
15
17
11
Restoration
Emergency/Incident
Management
Contingency Planning
Business Resumption
Work Area/Workforce
Continuity
Disaster Recovery
Outcome of Last Exercise
Exercising DR plans
is the second most
critical aspect of the
DR process
(conducting a BIA is
the first) and the
aspect most feared
Exercise Cancelled.
Exercise went OK – Significant Problems.
Exercise went well with Problems.
Exercise fully successful. All service levels fully met.
Not sure.
It is all about Recovery
A false sense of security
Ransomware’s Evolution
Moving target
Recover
again,
and again
Pay again,
and again
Attack-Loop
Virus attacks BUs
(infects repository)
Virus
infects
Detonates
And now
this …
Keep “n” copies of
backups
No Ransom
Virus attacks BUs
(deletes repository)
Then this
Virus
infects
Detonates
Recover from
Backup
Pay Ransom
Cannot
Recover
Virus attacks BUs
(deletes repository)
And then
this
Virus
infects
Detonates
Recover from
Backup
No Ransom
Then this
Detonates
Virus
infects
Virus
infects
Detonates
Pay Ransom
This
happened
Achieve Compliance
Simply, Affordably
 Efficient methodologies flex to changing,
stringent regulations
 Privacy by Design
 Article 6 (Managing Consent)
 Article 17 (“Right to Be Forgotten”)
 Find and wipe Personal Identifiable
Information (PII) from backup and archive
data
 Limit image-based backups to DR only
 Backup files for long-term retention
 Article 25 (State of the Art)
 Article 32 (Recover in a timely manner)
Public Cloud services
High Availability
 Multiple servers
 Multiple Data Centres
 Multiple copies
 Same data, viruses and malware
Data Backup
 Protects your data
 Multiple separate copies
 Multiple locations
 Multiple generations
 Scans for malware
11
Cloud Service High
Availability
Data
Backup
MS Office365 Yes No
Google Apps Yes No
Salesforce.com Yes No
AWS Yes No
Azure Yes No
What about protecting your data in a Cyber Attack?
Plan, Simplify & Test
Plan
 Business Impact Analysis
 Identify the critical data
 Identify the priority threats
 Respond to emerging threats
Simplify
 Less software and hardware to maintain
 Optimise resources
 Automate to remove human intervention
Test
 Backup & Recovery
 IT Disaster Recovery services
 Business Continuity services
12
13
Transferring Residual Risk
www.data2vault.com
Twitter: @data2vault
LinkedIn: data2vault
Email: mark.saville@data2vault.com

More Related Content

Recently uploaded

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 

Recently uploaded (20)

Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 

Featured (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Data2Vault on Reviewing your risks and your action plan

  • 1. Assessing your Risks Preparing for recovery 18th July 2018 LDSC
  • 2. Run | Grow | Transform 2 Run the business Innovate the business Grow the business 66% 20% 14%
  • 3. BCI Cyber Resilience report 2018 3 Cyber is now the Number 1 threat to Business Continuity
  • 4. Top 3 Cyber threats 4 Top 3 threats all compromise data integrity
  • 5. RISK – the Swiss cheese model 5 Layers of Defence, Barriers & Safeguards Residual Risk Building design Sprinklers Fire extinguishers Staff Training Fire Insurance Self Insure Fire Loss
  • 6. RISK – the Swiss cheese model 6 Layers of Defence, Barriers & Safeguards Residual Risk Technology Defences Policies & Procedures Training & Awareness Testing & Verification Cyber/ Business Interruption/ Data Loss/ Insurance Self Insure Data Loss
  • 7. 3-2-1 of Data Protection 3 COPIES The source and two in backup 2 ENVIRONMENTS [Live systems – Backup] Different media//vendors//software//firmware 1 COPY OFFSITE Geographically separate source data from a backup copy 7
  • 8. 8 10 6 8 9 7 11 9 10 10 11 18 15 30 31 28 29 28 35 35 37 39 36 31 28 15 17 16 15 17 11 Restoration Emergency/Incident Management Contingency Planning Business Resumption Work Area/Workforce Continuity Disaster Recovery Outcome of Last Exercise Exercising DR plans is the second most critical aspect of the DR process (conducting a BIA is the first) and the aspect most feared Exercise Cancelled. Exercise went OK – Significant Problems. Exercise went well with Problems. Exercise fully successful. All service levels fully met. Not sure. It is all about Recovery A false sense of security
  • 9. Ransomware’s Evolution Moving target Recover again, and again Pay again, and again Attack-Loop Virus attacks BUs (infects repository) Virus infects Detonates And now this … Keep “n” copies of backups No Ransom Virus attacks BUs (deletes repository) Then this Virus infects Detonates Recover from Backup Pay Ransom Cannot Recover Virus attacks BUs (deletes repository) And then this Virus infects Detonates Recover from Backup No Ransom Then this Detonates Virus infects Virus infects Detonates Pay Ransom This happened
  • 10. Achieve Compliance Simply, Affordably  Efficient methodologies flex to changing, stringent regulations  Privacy by Design  Article 6 (Managing Consent)  Article 17 (“Right to Be Forgotten”)  Find and wipe Personal Identifiable Information (PII) from backup and archive data  Limit image-based backups to DR only  Backup files for long-term retention  Article 25 (State of the Art)  Article 32 (Recover in a timely manner)
  • 11. Public Cloud services High Availability  Multiple servers  Multiple Data Centres  Multiple copies  Same data, viruses and malware Data Backup  Protects your data  Multiple separate copies  Multiple locations  Multiple generations  Scans for malware 11 Cloud Service High Availability Data Backup MS Office365 Yes No Google Apps Yes No Salesforce.com Yes No AWS Yes No Azure Yes No What about protecting your data in a Cyber Attack?
  • 12. Plan, Simplify & Test Plan  Business Impact Analysis  Identify the critical data  Identify the priority threats  Respond to emerging threats Simplify  Less software and hardware to maintain  Optimise resources  Automate to remove human intervention Test  Backup & Recovery  IT Disaster Recovery services  Business Continuity services 12
  • 13. 13 Transferring Residual Risk www.data2vault.com Twitter: @data2vault LinkedIn: data2vault Email: mark.saville@data2vault.com