SlideShare a Scribd company logo
1 of 12
Download to read offline
Presented by Abdiel Louis and Tim Krupinski
LUMINR
Business Continuity and
Disaster Readiness
Abdiel Louis
Co-Founder at Luminr and a Senior IT
Architect in the payment industries,
where he leads and designs Private
Cloud and Identity Management
solutions between cross functional
platforms safeguarding global clients.
He has over ten years of experience
integrating and delivering technology
solutions.
Solution Architect with SageLogix
and Co-Founder at Luminr,
specializing in platform migrations
and operational efficiency
improvement. He has worked on
platforms in the Financial,
Healthcare, Enterprise Support and
Government industries since 2005.
About.(Luminr)
Tim Krupinski
Business Drivers
• How: Storage
• What: Disaster Recovery
• Why: Data Protection
• When: Disaster Recovery
• Challenges and Special Considerations
• Business Continuity and Disaster Readiness Steps
What is Disaster Recovery?
Disaster recovery (DR) : set of policies and procedures to
enable the recovery or continuation of critical business and it
supporting technological infrastructure following a disaster.
• Some Popular Culprits
• Natural Disasters
• Fire or Earthquake
• Terrorist Attacks
• Not-So-Popular Culprits
• Junior Admins
• “Accidental” loss of data
A Look at the Data
In a 2012 study, Enterprises reported that
• Nearly 50% of system downtime was caused by Human Error or
Unexpected Updates & Patching
• Only 5% of downtime caused by an actual disaster
2011 Acronis Study of 6,000 IT Organizations
• 86% of companies experienced downtime in the previous 12 months
• 60% caused by human error
• Average downtime was over 2 days
• Average cost of downtime was $366,000 per year
Why is Data Protection Important?
Data Accessibility
• Anywhere
Encryption
• In-transit
• At rest
Encryption Mechanism
• AES 256
Security boundaries
• Logical
• Physical
How to Manage and Allocate Storage?
Sizing Critial Data
• 1:4 (1GB of data requires 4GB capacity)
Identifying the Cost and Probability of Downtime
• Fitting into your existing infrastructure
• Third party
Cloud Storage
• Azure
• Amazon
• Iron Mountain, and more…
When is Disaster Recover Appropriate?
• Business Directive dependent
• Backup ALONE is NOT Disaster Recovery
• Network
• Access
• Bandwidth
• Data Categories/Sets
• Be Strategic; Not Reactionary
• Rentention
• Finanacial institutions - 7 years
Challenges and Special Considerations
• Rules, regulations, and restrictions
• Data Security/Location Requirements
• Off Site Requirements
• Recovery Time Objectives (RTO)
• Infrastructure Compatibility
Recover Time Objective
Critical Business Activities Availability
* Labor cost association + Revenue impact
Business Continuity and Disaster Readiness
1. Identify and list critical business activities that satisfy
your business operations
2. Identify the critical business information needed for
these activities to complete successfully
3. Create a checklist of your core system processes
• Functional area
• Sequential approach to come back online
• Disaster recovery test
4. Following your checklist, can you recover post
disaster/impact, smoothly without affect your
bottom-line?
Questions?
Thank You!
Contact info:
Abdiel Louis | Abdiel@luminr.com
Tim Krupinski | Tim@luminr.com

More Related Content

What's hot

Future Proofing Your Mission - Samuel Gordy
Future Proofing Your Mission - Samuel GordyFuture Proofing Your Mission - Samuel Gordy
Future Proofing Your Mission - Samuel Gordyscoopnewsgroup
 
5 Applications of Cloud Computing
5 Applications of Cloud Computing5 Applications of Cloud Computing
5 Applications of Cloud ComputingCentriLogic
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011Donald E. Hester
 
Taming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug BourgeoisTaming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug Bourgeoisscoopnewsgroup
 
Romi tech cloud workspace overview
Romi tech   cloud workspace overviewRomi tech   cloud workspace overview
Romi tech cloud workspace overviewromitech
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energystacybre
 
CMS Linecard 2016- AGoodman
CMS Linecard 2016- AGoodmanCMS Linecard 2016- AGoodman
CMS Linecard 2016- AGoodmanAshley Goodman
 
Demystifying the Cloud by ScrivenerJam
Demystifying the Cloud by ScrivenerJamDemystifying the Cloud by ScrivenerJam
Demystifying the Cloud by ScrivenerJamACTDigitalEnterprise
 
Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013John Secondari
 
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyData Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyDell World
 
Embedding GDPR Within Your Information and Library Service
Embedding GDPR Within Your Information and Library ServiceEmbedding GDPR Within Your Information and Library Service
Embedding GDPR Within Your Information and Library ServiceCILIPScotland
 
UDT - Government and Healthcare
UDT - Government and HealthcareUDT - Government and Healthcare
UDT - Government and HealthcareTina Dominguez
 
Cloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismITCloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismITPrismITsolutions
 
Smarter Computing_Sebastian Krause_IBM Symp13
Smarter Computing_Sebastian Krause_IBM Symp13Smarter Computing_Sebastian Krause_IBM Symp13
Smarter Computing_Sebastian Krause_IBM Symp13IBM Switzerland
 
I365 presentation
I365 presentationI365 presentation
I365 presentationMCS621
 
5 Key Benefits of a Unified Data Center
5 Key Benefits of a Unified Data Center5 Key Benefits of a Unified Data Center
5 Key Benefits of a Unified Data CenterePlus
 

What's hot (20)

Future Proofing Your Mission - Samuel Gordy
Future Proofing Your Mission - Samuel GordyFuture Proofing Your Mission - Samuel Gordy
Future Proofing Your Mission - Samuel Gordy
 
5 Applications of Cloud Computing
5 Applications of Cloud Computing5 Applications of Cloud Computing
5 Applications of Cloud Computing
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011
 
Taming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug BourgeoisTaming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug Bourgeois
 
Romi tech cloud workspace overview
Romi tech   cloud workspace overviewRomi tech   cloud workspace overview
Romi tech cloud workspace overview
 
Optimize operations
Optimize operationsOptimize operations
Optimize operations
 
GDPR
GDPRGDPR
GDPR
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
 
CMS Linecard 2016- AGoodman
CMS Linecard 2016- AGoodmanCMS Linecard 2016- AGoodman
CMS Linecard 2016- AGoodman
 
Demystifying the Cloud by ScrivenerJam
Demystifying the Cloud by ScrivenerJamDemystifying the Cloud by ScrivenerJam
Demystifying the Cloud by ScrivenerJam
 
Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013
 
Cloud computing - When is Deletion Deletion?
Cloud computing - When is Deletion Deletion?Cloud computing - When is Deletion Deletion?
Cloud computing - When is Deletion Deletion?
 
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyData Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
 
Embedding GDPR Within Your Information and Library Service
Embedding GDPR Within Your Information and Library ServiceEmbedding GDPR Within Your Information and Library Service
Embedding GDPR Within Your Information and Library Service
 
UDT - Government and Healthcare
UDT - Government and HealthcareUDT - Government and Healthcare
UDT - Government and Healthcare
 
Cloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismITCloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismIT
 
Smarter Computing_Sebastian Krause_IBM Symp13
Smarter Computing_Sebastian Krause_IBM Symp13Smarter Computing_Sebastian Krause_IBM Symp13
Smarter Computing_Sebastian Krause_IBM Symp13
 
Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018
 
I365 presentation
I365 presentationI365 presentation
I365 presentation
 
5 Key Benefits of a Unified Data Center
5 Key Benefits of a Unified Data Center5 Key Benefits of a Unified Data Center
5 Key Benefits of a Unified Data Center
 

Viewers also liked

Introduction to Oracle Infrastructure as a Service
Introduction to Oracle Infrastructure as a ServiceIntroduction to Oracle Infrastructure as a Service
Introduction to Oracle Infrastructure as a ServiceTimothy Krupinski
 
Permanent hiring consultancy
Permanent hiring consultancyPermanent hiring consultancy
Permanent hiring consultancyNeuhiring
 
цдг космонавт коледна работилница
цдг космонавт коледна работилницацдг космонавт коледна работилница
цдг космонавт коледна работилницаmegikatq
 
Good practices to build good software
Good practices to build good softwareGood practices to build good software
Good practices to build good softwareTIDChile
 
Developmental stability of grape leaf morphometrics: allometry, heteroblasty,...
Developmental stability of grape leaf morphometrics: allometry, heteroblasty,...Developmental stability of grape leaf morphometrics: allometry, heteroblasty,...
Developmental stability of grape leaf morphometrics: allometry, heteroblasty,...DanChitwood
 
ден на христ.сем во-8 зала
ден на христ.сем во-8 заладен на христ.сем во-8 зала
ден на христ.сем во-8 залаmegikatq
 
Venezuela, una tragedia latinoamericana
Venezuela, una tragedia latinoamericanaVenezuela, una tragedia latinoamericana
Venezuela, una tragedia latinoamericanaCarlos Turdera
 
международен учителски форум
международен учителски форуммеждународен учителски форум
международен учителски форумmegikatq
 
eCommercePresentation
eCommercePresentationeCommercePresentation
eCommercePresentationChris Fry
 
игри белгия
игри  белгияигри  белгия
игри белгияmegikatq
 
Evaluating tests
Evaluating testsEvaluating tests
Evaluating testscwhms
 
GlobalWA Brochure
GlobalWA BrochureGlobalWA Brochure
GlobalWA BrochureSara Atalla
 
คู่มือการใช้ถึงหมักก๊าชชีวภาพ
คู่มือการใช้ถึงหมักก๊าชชีวภาพคู่มือการใช้ถึงหมักก๊าชชีวภาพ
คู่มือการใช้ถึงหมักก๊าชชีวภาพmantanwa22
 

Viewers also liked (16)

Ocfs2 storage
Ocfs2 storageOcfs2 storage
Ocfs2 storage
 
Introduction to Oracle Infrastructure as a Service
Introduction to Oracle Infrastructure as a ServiceIntroduction to Oracle Infrastructure as a Service
Introduction to Oracle Infrastructure as a Service
 
DevOps in your Oracle Stack
DevOps in your Oracle StackDevOps in your Oracle Stack
DevOps in your Oracle Stack
 
Permanent hiring consultancy
Permanent hiring consultancyPermanent hiring consultancy
Permanent hiring consultancy
 
цдг космонавт коледна работилница
цдг космонавт коледна работилницацдг космонавт коледна работилница
цдг космонавт коледна работилница
 
Good practices to build good software
Good practices to build good softwareGood practices to build good software
Good practices to build good software
 
Developmental stability of grape leaf morphometrics: allometry, heteroblasty,...
Developmental stability of grape leaf morphometrics: allometry, heteroblasty,...Developmental stability of grape leaf morphometrics: allometry, heteroblasty,...
Developmental stability of grape leaf morphometrics: allometry, heteroblasty,...
 
ден на христ.сем во-8 зала
ден на христ.сем во-8 заладен на христ.сем во-8 зала
ден на христ.сем во-8 зала
 
Venezuela, una tragedia latinoamericana
Venezuela, una tragedia latinoamericanaVenezuela, una tragedia latinoamericana
Venezuela, una tragedia latinoamericana
 
международен учителски форум
международен учителски форуммеждународен учителски форум
международен учителски форум
 
eCommercePresentation
eCommercePresentationeCommercePresentation
eCommercePresentation
 
игри белгия
игри  белгияигри  белгия
игри белгия
 
CURRICULUM VITAE
CURRICULUM VITAECURRICULUM VITAE
CURRICULUM VITAE
 
Evaluating tests
Evaluating testsEvaluating tests
Evaluating tests
 
GlobalWA Brochure
GlobalWA BrochureGlobalWA Brochure
GlobalWA Brochure
 
คู่มือการใช้ถึงหมักก๊าชชีวภาพ
คู่มือการใช้ถึงหมักก๊าชชีวภาพคู่มือการใช้ถึงหมักก๊าชชีวภาพ
คู่มือการใช้ถึงหมักก๊าชชีวภาพ
 

Similar to LuminrDRPresentation_AITP_October2014.pptx

Top Trends and Challenges in the Cloud
Top Trends and Challenges in the CloudTop Trends and Challenges in the Cloud
Top Trends and Challenges in the CloudPrecisely
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsQuest
 
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...Janine Anthony Bowen, Esq.
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldInside Analysis
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkPrecisely
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?Jody Keyser
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 
Acture Solutions - 5 Efficient Ways To Align Your District's Cybersecurity w/...
Acture Solutions - 5 Efficient Ways To Align Your District's Cybersecurity w/...Acture Solutions - 5 Efficient Ways To Align Your District's Cybersecurity w/...
Acture Solutions - 5 Efficient Ways To Align Your District's Cybersecurity w/...ActureSolutions
 
IBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work TogetherIBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work TogetherPrecisely
 
Get ready for_an_autonomous_data_driven_future_ext
Get ready for_an_autonomous_data_driven_future_extGet ready for_an_autonomous_data_driven_future_ext
Get ready for_an_autonomous_data_driven_future_extOracle Developers
 
Cloud_Computing_IIMC_v1
Cloud_Computing_IIMC_v1Cloud_Computing_IIMC_v1
Cloud_Computing_IIMC_v1Steve Markey
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyTim Harvey
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsOmar Khawaja
 

Similar to LuminrDRPresentation_AITP_October2014.pptx (20)

Top Trends and Challenges in the Cloud
Top Trends and Challenges in the CloudTop Trends and Challenges in the Cloud
Top Trends and Challenges in the Cloud
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 Environments
 
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
DCNCBC
DCNCBCDCNCBC
DCNCBC
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Acture Solutions - 5 Efficient Ways To Align Your District's Cybersecurity w/...
Acture Solutions - 5 Efficient Ways To Align Your District's Cybersecurity w/...Acture Solutions - 5 Efficient Ways To Align Your District's Cybersecurity w/...
Acture Solutions - 5 Efficient Ways To Align Your District's Cybersecurity w/...
 
Rubik cloud risks-jun2012
Rubik cloud risks-jun2012Rubik cloud risks-jun2012
Rubik cloud risks-jun2012
 
IBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work TogetherIBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work Together
 
Get ready for_an_autonomous_data_driven_future_ext
Get ready for_an_autonomous_data_driven_future_extGet ready for_an_autonomous_data_driven_future_ext
Get ready for_an_autonomous_data_driven_future_ext
 
Cloud_Computing_IIMC_v1
Cloud_Computing_IIMC_v1Cloud_Computing_IIMC_v1
Cloud_Computing_IIMC_v1
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
 
Securing your Cloud Deployment
Securing your Cloud DeploymentSecuring your Cloud Deployment
Securing your Cloud Deployment
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
Cloud Storage
Cloud StorageCloud Storage
Cloud Storage
 

LuminrDRPresentation_AITP_October2014.pptx

  • 1. Presented by Abdiel Louis and Tim Krupinski LUMINR Business Continuity and Disaster Readiness
  • 2. Abdiel Louis Co-Founder at Luminr and a Senior IT Architect in the payment industries, where he leads and designs Private Cloud and Identity Management solutions between cross functional platforms safeguarding global clients. He has over ten years of experience integrating and delivering technology solutions. Solution Architect with SageLogix and Co-Founder at Luminr, specializing in platform migrations and operational efficiency improvement. He has worked on platforms in the Financial, Healthcare, Enterprise Support and Government industries since 2005. About.(Luminr) Tim Krupinski
  • 3. Business Drivers • How: Storage • What: Disaster Recovery • Why: Data Protection • When: Disaster Recovery • Challenges and Special Considerations • Business Continuity and Disaster Readiness Steps
  • 4. What is Disaster Recovery? Disaster recovery (DR) : set of policies and procedures to enable the recovery or continuation of critical business and it supporting technological infrastructure following a disaster. • Some Popular Culprits • Natural Disasters • Fire or Earthquake • Terrorist Attacks • Not-So-Popular Culprits • Junior Admins • “Accidental” loss of data
  • 5. A Look at the Data In a 2012 study, Enterprises reported that • Nearly 50% of system downtime was caused by Human Error or Unexpected Updates & Patching • Only 5% of downtime caused by an actual disaster 2011 Acronis Study of 6,000 IT Organizations • 86% of companies experienced downtime in the previous 12 months • 60% caused by human error • Average downtime was over 2 days • Average cost of downtime was $366,000 per year
  • 6. Why is Data Protection Important? Data Accessibility • Anywhere Encryption • In-transit • At rest Encryption Mechanism • AES 256 Security boundaries • Logical • Physical
  • 7. How to Manage and Allocate Storage? Sizing Critial Data • 1:4 (1GB of data requires 4GB capacity) Identifying the Cost and Probability of Downtime • Fitting into your existing infrastructure • Third party Cloud Storage • Azure • Amazon • Iron Mountain, and more…
  • 8. When is Disaster Recover Appropriate? • Business Directive dependent • Backup ALONE is NOT Disaster Recovery • Network • Access • Bandwidth • Data Categories/Sets • Be Strategic; Not Reactionary • Rentention • Finanacial institutions - 7 years
  • 9. Challenges and Special Considerations • Rules, regulations, and restrictions • Data Security/Location Requirements • Off Site Requirements • Recovery Time Objectives (RTO) • Infrastructure Compatibility
  • 10. Recover Time Objective Critical Business Activities Availability * Labor cost association + Revenue impact
  • 11. Business Continuity and Disaster Readiness 1. Identify and list critical business activities that satisfy your business operations 2. Identify the critical business information needed for these activities to complete successfully 3. Create a checklist of your core system processes • Functional area • Sequential approach to come back online • Disaster recovery test 4. Following your checklist, can you recover post disaster/impact, smoothly without affect your bottom-line?
  • 12. Questions? Thank You! Contact info: Abdiel Louis | Abdiel@luminr.com Tim Krupinski | Tim@luminr.com