SlideShare a Scribd company logo
1 of 14
Download to read offline
Don’t Risk IT: Managing & Mitigating Risk in
Your Business
Melinda Fieldus
Agenda

• Risk Landscape today
• Risks Scenarios (Whispir)
• Key Success Factors for Managing Risk
• How IBM can help (and why IBM)
Evolving towards a Smarter Planet




   162 million                            90%                                 1 trillion
   Almost 162 million smart phones        Nearly 90% of innovation            Soon, there will be 1 trillion
   were sold in 2008, surpassing laptop   in automobiles is related to        connected devices in the world,
   sales for the first time.              software and electronics systems.   constituting an “internet of things.”
Evolving towards a Smarter Planet


 New possibilities.
    New complexities.                                             “We have seen more
                                                                  change in the last 10
       New risks.......                                             years than in the
                                                                     previous 90.”
                                                                              Ad J. Scheepbouwer,
                                                                               CEO, KPN Telecom




  Information Explosion   Emerging Technologies   Privacy Risks       Complex Regulatory
                                                                         Landscape
Not all Risks are Created Equal
         Frequency of
                                                                              Data driven
          occurrences
             per year
                                      Viruses
                                                     Data corruption

                                                                   Disk failures                                   Business driven
                                   Worms
                                                                          Long term preservation
              Frequent




                                         Data growth
                                                                           Application outages
                           System availability failures
                                                                                                               Governance
                                                                                      Audits
                                                  Network problems

                                                                           New products                  Failure to meet industry                          Event driven
                                                                                                                standards
                                                           Regulatory compliance

                                                                                                                               Terrorism/civil unrest
                                                                Marketing campaigns

                                                                                                                                                  Natural disasters
                                                                                   Workplace inaccessibility
              Infrequent




                                                                                                          Regional power failures
                                                                                                                                                          Mergers and
                                                                                                                                                          acquisitions
                                                                                                                   Building fires
                                                                                                                                       Pandemics



                                                                  Consequences (single occurrence loss) in dollars per occurrence
                                   Low                                                                                                                           High

Source: IBM
Threats and disruptions can vary greatly in
business impact…


• In some industries, downtime costs can equal up to 16 percent of revenue1
• For 32 percent of organizations, just four hours of downtime could be severely
  damaging2
• Online security attacks are accelerating, causing downtime and loss of revenue
• Data is growing at explosive rates
• Security and resiliency are a top area of concern and spend for all size
  companies
• Some industries are enforcing fines for downtime and inability to meet
  regulatory compliance
• $6.6M3 = Estimated cost of a data security breach


1. Infonetics Research, The Costs of Enterprise Downtime: North American Vertical Markets 2005, Rob Dearborn and others, January 2005.
2. Continuity Central, “Business Continuity Unwrapped,” 2006, http://www.continuitycentral.com/feature0358.htm
3. 2008 Annual Ponemon Institute Annual Survey
Ignoring risk management is not an option

 “I need to manage complexity of compliance
   across my organization and silos -- and be
   audit-ready all the time.”

            “I need to provide access to and
            recoverability of data at any time.”
“I need to protect against threats – even the ones I’m not
prepared for.”

       “Lack of resources, expertise and tools to cost
        effectively manage multi-vendor
        environments”




   How do you…?

         • Increase compliance regulations without increasing expenses
         • Block potential incoming threats without inhibiting traffic flow and uptime
         • Prepare for the unexpected data breach or disaster
The key success factors for managing risk

                            • Manage risk
  Reduce cost of security   • Lower total cost of ownership
       & resiliency         • Demonstrate compliance


                            • Effectively manage compliance
  Protect data & manage     • Ensure privacy and recoverability of data
       compliance           • Protect sensitive and mission critical applications


                            • Secure data center access and administration
    Secure your data        • Provide threat and application security
        center              • Maintain ‘audit-ready’ status
Reducing Costs while Ensuring Strong Security
and Resilience Increases Profitability


                    • Ensure the uninterrupted flow of information
                     throughout an enterprise

                    • Preempt risks– while still supporting business
                      goals – and addressing various regulatory,
                      organizational and industry-based compliance
                      drivers

                    • Optimize employee productivity, workplace
                      continuity, and business agility

                    • Provide efficiencies in on-going compliance
                      maintenance
Fuel Innovation by Protecting Critical Data while
Meeting Regulatory Compliance Mandates


                     Prevent unauthorized deletion or modification
                     of company data

                     Reduce risks related to non compliance to
                     regulatory requirements

                     Protect sensitive business processes and
                     mission critical applications and information

                     Leverage new technologies and innovations to
                     achieve business goals
Secure the Datacentre from Threats to Ensure
Productivity, Profitability and Reputation
Management

                   Control and monitor internal and external user
                   access and modification to sensitive information,
                   applications and infrastructure

                   Gain visibility of organization security posture
                   across heterogeneous datacenter assets

                   Achieve comprehensive and proactive security
                   control for protection across the threat landscape

                   Avoid costs of downtime associated with
                   protecting your data center from outages; simplify
                   the recovery of data across the enterprise
Why IBM?
IBM has a unique perspective on Managing Risk




       Trusted Advisor                      Security Company                    Solution Provider                   The Company


          Helping customers              A leading provider of security     A leading provider of software,   400,000 employees across 130
 build smarter cities, smarter grids,       and business resiliency        hardware, and service solutions     countries with private data to
   rail systems, new data centers,      solutions across a vast array of           around the world                       protect
trusted passport systems and more           industries and services
                                                   segments
A smarter business needs smarter systems.




                        Reduce the cost of security and resiliency.

                        Protect data and manage compliance.

                        Secure your data center.




                        IBM can help you manage risk.
Textit Live Polling



Q: Is addressing RISK a key focus in your current IT
     Strategy?
Y/N

More Related Content

What's hot

Operations Foundation Business Brief 2
Operations Foundation Business Brief 2Operations Foundation Business Brief 2
Operations Foundation Business Brief 2wdjohnson1
 
BC Components and CM Lifecycle
BC Components and  CM LifecycleBC Components and  CM Lifecycle
BC Components and CM LifecycleZaszou
 
Safetydivnewslettersummer05
Safetydivnewslettersummer05Safetydivnewslettersummer05
Safetydivnewslettersummer05supperman2011
 
Florida Association of Community Colleges, Council of Student Affairs Present...
Florida Association of Community Colleges, Council of Student Affairs Present...Florida Association of Community Colleges, Council of Student Affairs Present...
Florida Association of Community Colleges, Council of Student Affairs Present...Margolis Healy
 
Enabling Embedded Business Continuity
Enabling Embedded Business ContinuityEnabling Embedded Business Continuity
Enabling Embedded Business ContinuityMustafa KILIC
 
Data Center Qualitative Readiness Sample Post
Data Center Qualitative Readiness Sample PostData Center Qualitative Readiness Sample Post
Data Center Qualitative Readiness Sample Postchroan_soc
 
Business continuity management and risk -The role of standards
Business continuity management  and risk -The role of standardsBusiness continuity management  and risk -The role of standards
Business continuity management and risk -The role of standardsBSI British Standards Institution
 
Let technology lead the way.
Let technology lead the way.Let technology lead the way.
Let technology lead the way.LSG
 
Hurricane Preparedness and Disaster Recovery
Hurricane Preparedness and Disaster RecoveryHurricane Preparedness and Disaster Recovery
Hurricane Preparedness and Disaster Recovery_michellgrp10
 
Taming the data demons: leveraging information in the age of risk white paper
Taming the data demons: leveraging information in the age of risk white paperTaming the data demons: leveraging information in the age of risk white paper
Taming the data demons: leveraging information in the age of risk white paperIBM India Smarter Computing
 
Security and Business Continuity Working Together
Security and Business Continuity Working TogetherSecurity and Business Continuity Working Together
Security and Business Continuity Working Togethercharliemb2
 
Case Study City Of Brentwood
Case Study City Of BrentwoodCase Study City Of Brentwood
Case Study City Of BrentwoodAVG Technologies
 
Converged Security in Critical National Infrastructure**A Risk-Modelled Appro...
Converged Security in Critical National Infrastructure**A Risk-Modelled Appro...Converged Security in Critical National Infrastructure**A Risk-Modelled Appro...
Converged Security in Critical National Infrastructure**A Risk-Modelled Appro...dan solomon
 
Secure Mde Brochure Doc
Secure Mde Brochure DocSecure Mde Brochure Doc
Secure Mde Brochure Docsuzette1
 
8 Solutions - Specialist Data Centre Cleaning & Decontamination
8 Solutions - Specialist Data Centre Cleaning & Decontamination8 Solutions - Specialist Data Centre Cleaning & Decontamination
8 Solutions - Specialist Data Centre Cleaning & Decontaminationjamielakin
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Reportfinance40
 

What's hot (20)

SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
Operations Foundation Business Brief 2
Operations Foundation Business Brief 2Operations Foundation Business Brief 2
Operations Foundation Business Brief 2
 
BC Components and CM Lifecycle
BC Components and  CM LifecycleBC Components and  CM Lifecycle
BC Components and CM Lifecycle
 
Hutton B Side Sf
Hutton B Side SfHutton B Side Sf
Hutton B Side Sf
 
Safetydivnewslettersummer05
Safetydivnewslettersummer05Safetydivnewslettersummer05
Safetydivnewslettersummer05
 
Maximizing Security Training ROI
Maximizing Security Training ROIMaximizing Security Training ROI
Maximizing Security Training ROI
 
Florida Association of Community Colleges, Council of Student Affairs Present...
Florida Association of Community Colleges, Council of Student Affairs Present...Florida Association of Community Colleges, Council of Student Affairs Present...
Florida Association of Community Colleges, Council of Student Affairs Present...
 
Enabling Embedded Business Continuity
Enabling Embedded Business ContinuityEnabling Embedded Business Continuity
Enabling Embedded Business Continuity
 
Data Center Qualitative Readiness Sample Post
Data Center Qualitative Readiness Sample PostData Center Qualitative Readiness Sample Post
Data Center Qualitative Readiness Sample Post
 
Business continuity management and risk -The role of standards
Business continuity management  and risk -The role of standardsBusiness continuity management  and risk -The role of standards
Business continuity management and risk -The role of standards
 
Let technology lead the way.
Let technology lead the way.Let technology lead the way.
Let technology lead the way.
 
Hurricane Preparedness and Disaster Recovery
Hurricane Preparedness and Disaster RecoveryHurricane Preparedness and Disaster Recovery
Hurricane Preparedness and Disaster Recovery
 
Taming the data demons: leveraging information in the age of risk white paper
Taming the data demons: leveraging information in the age of risk white paperTaming the data demons: leveraging information in the age of risk white paper
Taming the data demons: leveraging information in the age of risk white paper
 
Security and Business Continuity Working Together
Security and Business Continuity Working TogetherSecurity and Business Continuity Working Together
Security and Business Continuity Working Together
 
Case Study City Of Brentwood
Case Study City Of BrentwoodCase Study City Of Brentwood
Case Study City Of Brentwood
 
Converged Security in Critical National Infrastructure**A Risk-Modelled Appro...
Converged Security in Critical National Infrastructure**A Risk-Modelled Appro...Converged Security in Critical National Infrastructure**A Risk-Modelled Appro...
Converged Security in Critical National Infrastructure**A Risk-Modelled Appro...
 
Secure Mde Brochure Doc
Secure Mde Brochure DocSecure Mde Brochure Doc
Secure Mde Brochure Doc
 
8 Solutions - Specialist Data Centre Cleaning & Decontamination
8 Solutions - Specialist Data Centre Cleaning & Decontamination8 Solutions - Specialist Data Centre Cleaning & Decontamination
8 Solutions - Specialist Data Centre Cleaning & Decontamination
 
Rebuilding After a Disaster Can Be Proactive
Rebuilding After a Disaster Can Be ProactiveRebuilding After a Disaster Can Be Proactive
Rebuilding After a Disaster Can Be Proactive
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
 

Viewers also liked

Stream 2 - Drive Business Performance with Information Analytics
Stream 2 - Drive Business Performance with Information AnalyticsStream 2 - Drive Business Performance with Information Analytics
Stream 2 - Drive Business Performance with Information AnalyticsIBM Business Insight
 
Stream 1 - Keynote Presentation: Perth & Adelaide
Stream 1 - Keynote  Presentation: Perth & AdelaideStream 1 - Keynote  Presentation: Perth & Adelaide
Stream 1 - Keynote Presentation: Perth & AdelaideIBM Business Insight
 
Stream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and Shoretel
Stream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and ShoretelStream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and Shoretel
Stream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and ShoretelIBM Business Insight
 
Stream 3 - VMware Sponsor Presentation
Stream 3 - VMware Sponsor PresentationStream 3 - VMware Sponsor Presentation
Stream 3 - VMware Sponsor PresentationIBM Business Insight
 
Turvas
TurvasTurvas
Turvasliivip
 
DataStax NYC Java Meetup: Cassandra with Java
DataStax NYC Java Meetup: Cassandra with JavaDataStax NYC Java Meetup: Cassandra with Java
DataStax NYC Java Meetup: Cassandra with Javacarolinedatastax
 

Viewers also liked (9)

Stream 2 - Drive Business Performance with Information Analytics
Stream 2 - Drive Business Performance with Information AnalyticsStream 2 - Drive Business Performance with Information Analytics
Stream 2 - Drive Business Performance with Information Analytics
 
Stream 1 - Keynote Presentation: Perth & Adelaide
Stream 1 - Keynote  Presentation: Perth & AdelaideStream 1 - Keynote  Presentation: Perth & Adelaide
Stream 1 - Keynote Presentation: Perth & Adelaide
 
Stream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and Shoretel
Stream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and ShoretelStream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and Shoretel
Stream 2 - Anywhere, Anytime, Anyplace Communiations with IBM and Shoretel
 
Stream 3 - VMware Sponsor Presentation
Stream 3 - VMware Sponsor PresentationStream 3 - VMware Sponsor Presentation
Stream 3 - VMware Sponsor Presentation
 
Vars
VarsVars
Vars
 
Stream 1- Smart Work
Stream 1- Smart WorkStream 1- Smart Work
Stream 1- Smart Work
 
Turvas
TurvasTurvas
Turvas
 
DataStax NYC Java Meetup: Cassandra with Java
DataStax NYC Java Meetup: Cassandra with JavaDataStax NYC Java Meetup: Cassandra with Java
DataStax NYC Java Meetup: Cassandra with Java
 
Stream 3 - Cloud Computing
Stream 3 - Cloud ComputingStream 3 - Cloud Computing
Stream 3 - Cloud Computing
 

Similar to Stream 2 - Don't Risk IT

Business Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revBusiness Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revShanker Sareen
 
Business Meets IT presentation: Business Continuity
Business Meets IT presentation: Business ContinuityBusiness Meets IT presentation: Business Continuity
Business Meets IT presentation: Business ContinuityWilliam Visterin
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentationVincent Kwon
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...Andris Soroka
 
360-Degree Approach to DR / BC
360-Degree Approach to DR / BC360-Degree Approach to DR / BC
360-Degree Approach to DR / BCAISDC
 
Challenges financial information_systems_a_clarke
Challenges financial information_systems_a_clarkeChallenges financial information_systems_a_clarke
Challenges financial information_systems_a_clarkeShane Dempsey
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)Resolver Inc.
 
Jedi mind tricks for building application security programs
Jedi mind tricks for building application security programsJedi mind tricks for building application security programs
Jedi mind tricks for building application security programsSecurity BSides London
 
What makes the large enterprise network management, large
What makes the large enterprise network management, largeWhat makes the large enterprise network management, large
What makes the large enterprise network management, largeManageEngine, Zoho Corporation
 
Risk Management - Time to blow it up and start over? - Alex Hutton
Risk Management - Time to blow it up and start over? - Alex HuttonRisk Management - Time to blow it up and start over? - Alex Hutton
Risk Management - Time to blow it up and start over? - Alex HuttonSecurity B-Sides
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...GFI Software
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your UsersMike Murray
 
Eliminate cyber-security threats using data analytics – Build a resilient ent...
Eliminate cyber-security threats using data analytics – Build a resilient ent...Eliminate cyber-security threats using data analytics – Build a resilient ent...
Eliminate cyber-security threats using data analytics – Build a resilient ent...Impetus Technologies
 
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...Compuware APM
 
JDE & Peoplesoft 2 _ Mike Ward _ Security implications of Upgrading JDE.pdf
JDE & Peoplesoft 2 _ Mike Ward _ Security implications of Upgrading JDE.pdfJDE & Peoplesoft 2 _ Mike Ward _ Security implications of Upgrading JDE.pdf
JDE & Peoplesoft 2 _ Mike Ward _ Security implications of Upgrading JDE.pdfInSync2011
 

Similar to Stream 2 - Don't Risk IT (20)

Business Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revBusiness Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_rev
 
Business Meets IT presentation: Business Continuity
Business Meets IT presentation: Business ContinuityBusiness Meets IT presentation: Business Continuity
Business Meets IT presentation: Business Continuity
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
 
360-Degree Approach to DR / BC
360-Degree Approach to DR / BC360-Degree Approach to DR / BC
360-Degree Approach to DR / BC
 
Challenges financial information_systems_a_clarke
Challenges financial information_systems_a_clarkeChallenges financial information_systems_a_clarke
Challenges financial information_systems_a_clarke
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)
 
The smb dilemma
The smb dilemmaThe smb dilemma
The smb dilemma
 
Jedi mind tricks for building application security programs
Jedi mind tricks for building application security programsJedi mind tricks for building application security programs
Jedi mind tricks for building application security programs
 
What makes the large enterprise network management, large
What makes the large enterprise network management, largeWhat makes the large enterprise network management, large
What makes the large enterprise network management, large
 
Risk Management - Time to blow it up and start over? - Alex Hutton
Risk Management - Time to blow it up and start over? - Alex HuttonRisk Management - Time to blow it up and start over? - Alex Hutton
Risk Management - Time to blow it up and start over? - Alex Hutton
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your Users
 
Eliminate cyber-security threats using data analytics – Build a resilient ent...
Eliminate cyber-security threats using data analytics – Build a resilient ent...Eliminate cyber-security threats using data analytics – Build a resilient ent...
Eliminate cyber-security threats using data analytics – Build a resilient ent...
 
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
 
On Demand Cloud Services Coury
On Demand Cloud Services   CouryOn Demand Cloud Services   Coury
On Demand Cloud Services Coury
 
JDE & Peoplesoft 2 _ Mike Ward _ Security implications of Upgrading JDE.pdf
JDE & Peoplesoft 2 _ Mike Ward _ Security implications of Upgrading JDE.pdfJDE & Peoplesoft 2 _ Mike Ward _ Security implications of Upgrading JDE.pdf
JDE & Peoplesoft 2 _ Mike Ward _ Security implications of Upgrading JDE.pdf
 

More from IBM Business Insight

Stream 1- Enhanced Business Performance
Stream 1- Enhanced Business PerformanceStream 1- Enhanced Business Performance
Stream 1- Enhanced Business PerformanceIBM Business Insight
 
Stream 3 - IT optimisation & virtualisation
Stream 3 - IT optimisation & virtualisationStream 3 - IT optimisation & virtualisation
Stream 3 - IT optimisation & virtualisationIBM Business Insight
 
IBM Business Intelligence Software
IBM Business Intelligence SoftwareIBM Business Intelligence Software
IBM Business Intelligence SoftwareIBM Business Insight
 
Breakthrough reporting, analysis and planning tools for midsize companies.
Breakthrough reporting, analysis and planning tools for midsize companies.Breakthrough reporting, analysis and planning tools for midsize companies.
Breakthrough reporting, analysis and planning tools for midsize companies.IBM Business Insight
 

More from IBM Business Insight (6)

Stream 1- Enhanced Business Performance
Stream 1- Enhanced Business PerformanceStream 1- Enhanced Business Performance
Stream 1- Enhanced Business Performance
 
Stream 1 - Cloud Computing
Stream 1 - Cloud ComputingStream 1 - Cloud Computing
Stream 1 - Cloud Computing
 
Stream 3 - IT optimisation & virtualisation
Stream 3 - IT optimisation & virtualisationStream 3 - IT optimisation & virtualisation
Stream 3 - IT optimisation & virtualisation
 
IBM Business Intelligence Software
IBM Business Intelligence SoftwareIBM Business Intelligence Software
IBM Business Intelligence Software
 
Breakthrough reporting, analysis and planning tools for midsize companies.
Breakthrough reporting, analysis and planning tools for midsize companies.Breakthrough reporting, analysis and planning tools for midsize companies.
Breakthrough reporting, analysis and planning tools for midsize companies.
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Stream 2 - Don't Risk IT

  • 1. Don’t Risk IT: Managing & Mitigating Risk in Your Business Melinda Fieldus
  • 2. Agenda • Risk Landscape today • Risks Scenarios (Whispir) • Key Success Factors for Managing Risk • How IBM can help (and why IBM)
  • 3. Evolving towards a Smarter Planet 162 million 90% 1 trillion Almost 162 million smart phones Nearly 90% of innovation Soon, there will be 1 trillion were sold in 2008, surpassing laptop in automobiles is related to connected devices in the world, sales for the first time. software and electronics systems. constituting an “internet of things.”
  • 4. Evolving towards a Smarter Planet New possibilities. New complexities. “We have seen more change in the last 10 New risks....... years than in the previous 90.” Ad J. Scheepbouwer, CEO, KPN Telecom Information Explosion Emerging Technologies Privacy Risks Complex Regulatory Landscape
  • 5. Not all Risks are Created Equal Frequency of Data driven occurrences per year Viruses Data corruption Disk failures Business driven Worms Long term preservation Frequent Data growth Application outages System availability failures Governance Audits Network problems New products Failure to meet industry Event driven standards Regulatory compliance Terrorism/civil unrest Marketing campaigns Natural disasters Workplace inaccessibility Infrequent Regional power failures Mergers and acquisitions Building fires Pandemics Consequences (single occurrence loss) in dollars per occurrence Low High Source: IBM
  • 6. Threats and disruptions can vary greatly in business impact… • In some industries, downtime costs can equal up to 16 percent of revenue1 • For 32 percent of organizations, just four hours of downtime could be severely damaging2 • Online security attacks are accelerating, causing downtime and loss of revenue • Data is growing at explosive rates • Security and resiliency are a top area of concern and spend for all size companies • Some industries are enforcing fines for downtime and inability to meet regulatory compliance • $6.6M3 = Estimated cost of a data security breach 1. Infonetics Research, The Costs of Enterprise Downtime: North American Vertical Markets 2005, Rob Dearborn and others, January 2005. 2. Continuity Central, “Business Continuity Unwrapped,” 2006, http://www.continuitycentral.com/feature0358.htm 3. 2008 Annual Ponemon Institute Annual Survey
  • 7. Ignoring risk management is not an option “I need to manage complexity of compliance across my organization and silos -- and be audit-ready all the time.” “I need to provide access to and recoverability of data at any time.” “I need to protect against threats – even the ones I’m not prepared for.” “Lack of resources, expertise and tools to cost effectively manage multi-vendor environments” How do you…? • Increase compliance regulations without increasing expenses • Block potential incoming threats without inhibiting traffic flow and uptime • Prepare for the unexpected data breach or disaster
  • 8. The key success factors for managing risk • Manage risk Reduce cost of security • Lower total cost of ownership & resiliency • Demonstrate compliance • Effectively manage compliance Protect data & manage • Ensure privacy and recoverability of data compliance • Protect sensitive and mission critical applications • Secure data center access and administration Secure your data • Provide threat and application security center • Maintain ‘audit-ready’ status
  • 9. Reducing Costs while Ensuring Strong Security and Resilience Increases Profitability • Ensure the uninterrupted flow of information throughout an enterprise • Preempt risks– while still supporting business goals – and addressing various regulatory, organizational and industry-based compliance drivers • Optimize employee productivity, workplace continuity, and business agility • Provide efficiencies in on-going compliance maintenance
  • 10. Fuel Innovation by Protecting Critical Data while Meeting Regulatory Compliance Mandates Prevent unauthorized deletion or modification of company data Reduce risks related to non compliance to regulatory requirements Protect sensitive business processes and mission critical applications and information Leverage new technologies and innovations to achieve business goals
  • 11. Secure the Datacentre from Threats to Ensure Productivity, Profitability and Reputation Management Control and monitor internal and external user access and modification to sensitive information, applications and infrastructure Gain visibility of organization security posture across heterogeneous datacenter assets Achieve comprehensive and proactive security control for protection across the threat landscape Avoid costs of downtime associated with protecting your data center from outages; simplify the recovery of data across the enterprise
  • 12. Why IBM? IBM has a unique perspective on Managing Risk Trusted Advisor Security Company Solution Provider The Company Helping customers A leading provider of security A leading provider of software, 400,000 employees across 130 build smarter cities, smarter grids, and business resiliency hardware, and service solutions countries with private data to rail systems, new data centers, solutions across a vast array of around the world protect trusted passport systems and more industries and services segments
  • 13. A smarter business needs smarter systems. Reduce the cost of security and resiliency. Protect data and manage compliance. Secure your data center. IBM can help you manage risk.
  • 14. Textit Live Polling Q: Is addressing RISK a key focus in your current IT Strategy? Y/N