Learn all the right questions to ask and how to be assured that:
-- Your business goals (RTO, RPO, DLE) will be met
-- Your data will really be protected
-- You can actually recovery your data
-- Your data will be secure at all times
-- Your service provider has been and will be here for the long-haul
Presentation designed by Adam and teammates from Consulting Career Acceleration Module, in the Mason School. Awarded 1st place at Deloitte competition.
M12S23 - Right-sizing Your Information Footprint by Chucking Your Dead DataMER Conference
Speakers: Randolph A. Kahn, Esq. & Jonathan Redgrave, Esq.
Today, most organizations have too much digital content that has outlived its usefulness. Every year, the quantity of this unusable content multiplies. So, there's no time like the present to get busy, get cleaner and get meaner.
Having a defensible methodology and using the right tool for the task allows organizations to right-size their "Information Footprint" without worrying about regulatory or legal consequences.
If your organization right-sizes its' "Information Footprint", it would be much better off. Keeping old, unnecessary content will result in higher costs and risks. If the costs and risks are big enough, the case for proactively cleaning up the "Information Footprint" is very compelling.
Read more: http://www.rimeducation.com/videos/rimondemand.php
TDWI NYC Chapter - Tony Baer Ovum on Big data, Data quality, and BI ConvergenceFitzgerald Analytics, Inc.
Intersecting with Neil Raden's keynote, Ovum Principal Analyst Tony Baer asks, “what does it take to turn the promise of Big Data into tangible results?” Big opportunities to benefit from new technology have come and gone, yet the consistent challenge has been translating new potential into concrete benefits. Mr. Baer shared a practical perspective on making big data manageable by understanding key challenges you must overcome to leverage big data, especially the unique data quality issues the Big Data sources introduce.
Mr. Baer also shared his insight that while Business Intelligence and Big Data are viewed and managed separately, in reality "Big Data and Business Intelligence must converge." Big Data needs to be approached with "less of a silo mentality," and so does Business Intelligence.
With Hadoop entering the mainstream, can -- and should -- it benefit from best practices from the world of Data Warehousing. Should the same ground rules developed for capacity-constrained internal enterprise DWs apply to Hadoop data stores designed for scale out, or for harvesting data from the Internet? We will pinpoint 3 key areas: data quality, privacy & confidentiality, and lifecycle management, addressing issues such as: 1. Does it make sense to apply traditional data cleansing practices to Hadoop data? Or will removing "errors" remove the possibility for discovering new insights? 2. Do different standards for privacy protection apply when harvesting sources such as social media that are already public? Should enterprises track their customers on Facebook or Twitter? 3. Will Hadoop make conventional data archiving practices obsolete? Is it cost effective to "move" petabytes of data offline? Just because the Googles & Yahoos of the world retain all their data, should mainstream enterprises? Should Hadoop be considered the new tape?
Why the systemic risks in Enterprise Cloud Computing could cripple your busin...Livingstone Advisory
Organisations that have successfully implemented standalone cloud systems may feel that they have won the war against complex and expensive enterprise IT. That feeling may not last too long once these systems need to be integrated with other systems, cloud or otherwise. The minute you start integrating your cloud with these other systems, you have what is termed a Hybrid Cloud.
Your IT risks are now becoming systemic risks – a point not lost in the most recent KPMG 2012 Audit Institute Report which identified “IT Risk & Emerging Technologies” as the second highest concern for 2012
In this presentation, Rob Livingstone, suggests some practical approaches that CEOs, COOs and CFOs should be considering in the identification and mitigation of the pitfalls of Cloud computing in the enterprise.
Presentation designed by Adam and teammates from Consulting Career Acceleration Module, in the Mason School. Awarded 1st place at Deloitte competition.
M12S23 - Right-sizing Your Information Footprint by Chucking Your Dead DataMER Conference
Speakers: Randolph A. Kahn, Esq. & Jonathan Redgrave, Esq.
Today, most organizations have too much digital content that has outlived its usefulness. Every year, the quantity of this unusable content multiplies. So, there's no time like the present to get busy, get cleaner and get meaner.
Having a defensible methodology and using the right tool for the task allows organizations to right-size their "Information Footprint" without worrying about regulatory or legal consequences.
If your organization right-sizes its' "Information Footprint", it would be much better off. Keeping old, unnecessary content will result in higher costs and risks. If the costs and risks are big enough, the case for proactively cleaning up the "Information Footprint" is very compelling.
Read more: http://www.rimeducation.com/videos/rimondemand.php
TDWI NYC Chapter - Tony Baer Ovum on Big data, Data quality, and BI ConvergenceFitzgerald Analytics, Inc.
Intersecting with Neil Raden's keynote, Ovum Principal Analyst Tony Baer asks, “what does it take to turn the promise of Big Data into tangible results?” Big opportunities to benefit from new technology have come and gone, yet the consistent challenge has been translating new potential into concrete benefits. Mr. Baer shared a practical perspective on making big data manageable by understanding key challenges you must overcome to leverage big data, especially the unique data quality issues the Big Data sources introduce.
Mr. Baer also shared his insight that while Business Intelligence and Big Data are viewed and managed separately, in reality "Big Data and Business Intelligence must converge." Big Data needs to be approached with "less of a silo mentality," and so does Business Intelligence.
With Hadoop entering the mainstream, can -- and should -- it benefit from best practices from the world of Data Warehousing. Should the same ground rules developed for capacity-constrained internal enterprise DWs apply to Hadoop data stores designed for scale out, or for harvesting data from the Internet? We will pinpoint 3 key areas: data quality, privacy & confidentiality, and lifecycle management, addressing issues such as: 1. Does it make sense to apply traditional data cleansing practices to Hadoop data? Or will removing "errors" remove the possibility for discovering new insights? 2. Do different standards for privacy protection apply when harvesting sources such as social media that are already public? Should enterprises track their customers on Facebook or Twitter? 3. Will Hadoop make conventional data archiving practices obsolete? Is it cost effective to "move" petabytes of data offline? Just because the Googles & Yahoos of the world retain all their data, should mainstream enterprises? Should Hadoop be considered the new tape?
Why the systemic risks in Enterprise Cloud Computing could cripple your busin...Livingstone Advisory
Organisations that have successfully implemented standalone cloud systems may feel that they have won the war against complex and expensive enterprise IT. That feeling may not last too long once these systems need to be integrated with other systems, cloud or otherwise. The minute you start integrating your cloud with these other systems, you have what is termed a Hybrid Cloud.
Your IT risks are now becoming systemic risks – a point not lost in the most recent KPMG 2012 Audit Institute Report which identified “IT Risk & Emerging Technologies” as the second highest concern for 2012
In this presentation, Rob Livingstone, suggests some practical approaches that CEOs, COOs and CFOs should be considering in the identification and mitigation of the pitfalls of Cloud computing in the enterprise.
EDF2013: Invited Talk Daragh O'Brien: The Story of Maturity – How data in Bus...European Data Forum
Invited talk of Daragh O'Brien, Managing Director of Castlebridge Associates, at the European Data Forum 2013, 9 April 2013 in Dublin, Ireland: The Story of Maturity – How data in Business needs to pass the ‘So What’ tests
EDF2013: Invited Talk Daragh O'Brien: The Story of Maturity – How data in Bus...European Data Forum
Invited talk of Daragh O'Brien, Managing Director of Castlebridge Associates, at the European Data Forum 2013, 9 April 2013 in Dublin, Ireland: The Story of Maturity – How data in Business needs to pass the ‘So What’ tests
Incident Response in the age of Nation State Cyber AttacksResilient Systems
One of the most important and yet least discussed aspects of any corporate structure is the incident response framework. As recent events have highlighted, the risk of intellectual property and critical infrastructure being the target of a cyber-attack is quite real. More than ever before, corporate preparation and response plans are necessary for any entity operating in the digital age.
This webinar will examine how an organization's incident response framework can help limit the exposure of intellectual property and critical infrastructure to outside, malicious parties. Our presenters will review how to construct corporate response plans that yield best-of-breed preparedness.
Our featured speakers for this timely webinar are:
-Mike Gibbons, Managing Director, Alvarez and Marsal, former FBI Special Agent as Unit Chief, overseeing all cyber crime investigations
-Art Ehuan, Managing Director, Alvarez and Marsal, former FBI Supervisory Special Agent assigned to the Computer Crimes Investigations Program
-Gant Redmon, Esq. CIPP/US General Counsel and Vice President of Business Development at Co3
Business-Critical Backup: Preparing for a DisasterNetWize
Here is a brief presentation on the importance of having a backup and recovery plan for your electronic data, especially planning for that recovery in the event of a natural or man-made disaster.
Adam Gugliciello, a 15-year veteran in Software Engineering and Systems Architecture specializes in highly available, parallel systems. In this session, we will answer common questions and demonstrate use cases on how Hadoop and Datameer help with asset management and risk management, fraud detection and data security. This presentation was given on January 24th at the CME Group's offices in Chicago, IL.
Why your Information Security MUST mesh with your Business Continuity ProgramPECB
Data breaches, cyber-attacks and hacking should be thought of as inevitable consequences of our interconnected world. We’re reliant on data and machines which makes us vulnerable when those assets are abused. Information and cyber security measures seek to prevent data breaches and losing control of systems and processes that, for example, use industrial control systems. Business continuity (BC) programs/plans stand as an organization’s last line of defense against any number of threats and hazards, not the least of which are data breaches and hacked control systems. There is added value from good business continuity planning. A rigorous BC program always has included IT disaster recovery, but the preparedness that stems from robust BC plans can deter cyber-attacks and protect an organization – including its reputation – when those attacks occur.
Main points covered:
• Why is the Information Security and Business Continuity plan incorporation important?
• Is hacking inevitable?
• How are Information Security and Business Continuity linked?
• How Business Continuity and Information Security stand as the last line of defense
• What is the ‘best’ plan that we should follow to be protected from threats?
Presenter:
Dr. Ed Goldberg, MBA, BSEE, CBCP, manages Eversource’s BC & DR programs in Berlin, CT and served 10 years as IT manager at Millstone Nuclear Power Station. Ed is a Certified Business Continuity Professional with 25+ years IT and management experience. He served 4 terms as president of the Connecticut ACP and is a popular conference speaker and published author. Also, Ed served 5 years as adjunct faculty and 8 years as core faculty at Capella University where he mentored PhD students, taught and developed IT management and general PhD research coursework. He also taught MBA and IT coursework at Albertus Magnus College for 11 years.
Link to the recorded webinar: https://youtu.be/ePNhhGgaEFc
Securing Your "Crown Jewels": Do You Have What it Takes?IBM Security
Securing Your "Crown Jewels": Do You Have What it Takes to Go From Start to Finish?
Protecting Your Most Valuable Data: Organizations face many data protection challenges, but one of the biggest is identifying and prioritizing the 0.01% - 2% of the data that is most important to your organization's survival and success. IBM Data Security Services can help by providing you with a 5-stage strategy designed to ensure that your "Crown Jewels" are protected and kept safe from loss, hackers, and being compromised. Attend this session and learn about processes to identify and prioritize your critical data, and services available from IBM to protect it.
About Your Speaker Author Bob Chaput 11 25 2011Bob Chaput
** More HIPAA Compliance BootCamp™ and complementary HIPAA HITECH webinars dates released for 2014 - 2015 and beyond! View our schedule or find your nearest event at http://www.clearwatercompliance.com **
Mr. Chaput is president of Clearwater Compliance LLC.
Clearwater Compliance helps Covered Entities and Business Associates meet stringent HIPAA-HITECH Security Rule requirements and address one of five health outcomes policy priorities in the Meaningful Use Stage 1 guidelines dealing with privacy and security. Over the past 30 years, Bob has worked as an educator, an executive and an entrepreneur.
HIPAA Security Assessment Intro & OverviewBob Chaput
Covered Entities and Business Associates – take control of your HIPAA Security – HITECH Act compliance program starting today! Our HIPAA Security Assessment Tool™ is the easiest, fastest and most popular way to establish a baseline scorecard and track compliance progress.
Our Vision - We bring together the world-wide community of Chief Operating Officers and other Second-in-Command Executives striving for superior leadership.
Our Mission - COO Forum’s Mission is professional development for Second-in-Command Executives though peer-to-peer collaboration, education, forums, networks, employing a local, regional, national, and global approach.