SlideShare a Scribd company logo
1 | © 2020 Ntirety
The Great Disruption No One
Planned For: COVID-19
2 | © 2020 Ntirety
2 | © 2020 Ntirety
Meet the presenters:
• Emil Sayegh, CEO & President
• Chris Riley, CISO
• Kevin Smith, CRO
• John Faulkner, CFO
3 | © 2020 Ntirety
Agenda
COVID-19 Security
Preparedness
Disaster Recovery and
Best Practices
What Businesses Need to
Survive the Downturn
Closing and Questions
COVID-19 Business
Environment
Challenges
Introduction
Emil Sayegh
Emil Sayegh
Chris Riley
Kevin Smith John Faulkner
Emil Sayegh
4 | © 2020 Ntirety
How does this end?
How do we stop the virus?
How do we restore public confidence?
What is necessary to restore the economy?
1
2
3
4
Questions On All Of Our Minds
5
6
Are we through the worst of this?
What will be necessary to reopen states?
5 | © 2020 Ntirety
Two things we know about crises: they are all
different, and they all end. Hopefully, this will
pass soon with the least possible impact.
6 | © 2020 Ntirety
What We Know: COVID-19 Global Economic Impact
• US Senate passes historic $2 trillion rescue
package
• Millions of Americans have filed unemployment
claims
• UK to pay up to 80% of employee wages for
those unable to work due to the pandemic
• European Central Bank to launch €750 billion
stimulus program, following US Federal
Reserve move to cut interest rates to nearly
zero
7 | © 2020 Ntirety
Severe Damage To The Economy
“This is a huge, unprecedented, devastating hit,” Janet Yellen, former chair of the Federal Reserve, 4/6/2020
Source: Fox News
Source: Fox News
8 | © 2020 Ntirety
COVID-19 Could Affect Economy Through Three Channels
Direct impact on production
Supply chain and market disruption
Financial impact on firms and financial markets
1
2
3
9 | © 2020 Ntirety
4 Scenarios We Have To Be Prepared For
The Worst is Over
• Transmission in China has slowed already
• As global number of cases stabilizes, global economy
returns to normal
• Global GDPs take a big hit in Q1 2020 but bounce back
in Q2 after the country opens back up
Year of the Virus
• Although spread in China slows, outbreaks occur on a
rolling basis around world substantially slowing global
growth
• Nimble businesses that manage switching suppliers &
have enough liquidity to survive periods of low sales &
revenue will have a competitive advantage
Global Pandemic
• Economic centers around the world are subject to
Wuhan-style shutdowns. It takes more than a year for
the WHO and CDC to develop a global response
• Global manufacturing declines as businesses can only
operate intermittently
• Global GDP stagnates, international trade falls & global
recession is a possibility
Financial Crisis
• Delayed shipments create financial problems for
companies with heavy debt
• Decline in global equity markets and flight from risk
• Concern about counterparty risk accelerates the
decline and dries up liquidity
• The US economy recovers after a V, U, or W shaped
recession
1 2
3 4
10 | © 2020 Ntirety
Light At The End Of The Tunnel
Source: The Guardian
Source: Bloomberg
Source: CNN
11 | © 2020 Ntirety
The coronavirus has ignited
what Bloomberg calls the
“world’s largest work-from-
home experiment”
Travel restrictions,
canceled events driving
large online meetings
The security perimeter has
expanded to home offices
Business Has Changed
12 | © 2020 Ntirety
Where Is Ntirety In All Of This
Actions taken early
• Contingency plans in place in all DC facilities
• Enhanced cleaning and health safety protocols
• Tightened entry protocols to bare minimum for outsiders
• 1 week of food & water supplies available in DCs in the event of a lock down
• Canceled travel and in person gatherings
• All non-data center employees working from home with ability to function remotely with ample
supply of laptops, VDI technology and security
• Repeated multichannel communication to customers, partners and employees with many articles
published on Forbes and Ntirety blog
• SWOT analysis completed in first days of crisis
• COVID-19 War Room created with daily updates
13 | © 2020 Ntirety
Where Is Cloud In All Of This
Cloud is already helping
• Dependable, secure remote work technology: Virtual
Private Networking (VPN) & other cloud-enhanced tools
make remote work possible from nearly any device
anywhere in the world
Cloud can help even more
• Distributed Cloud IT systems in disaster recovery situations
• Cloud-enabled businesses have less personnel in data
centers to check, maintain & monitor their server and
storage installations
• Moving from CAPEX to OPEX with a pay per use component
• Prepare to scale for the recovery
• Implement automation
Source: Forbes; Author: Emil Sayegh
14 | © 2020 Ntirety
Questions We Should Also Be Asking Amidst This Crisis
What is your plan to
respond to an IT
emergency
(cyber or uptime)?
Do you have on-
staff IT & security
expertise?
Have you revised
and implemented
new IT security
tools and controls?
Are you in full
compliance with
regulatory
requirements?
Have you aligned IT,
security & business
priorities?
15 | © 2020 Ntirety
Agenda
COVID-19 Security
Preparedness
Disaster Recovery and
Best Practices
What Businesses Need to
Survive the Downturn
Closing and Questions
COVID-19 Business
Environment
Challenges
Introduction
Emil Sayegh
Emil Sayegh
Chris Riley
Kevin Smith John Faulkner
Emil Sayegh
16 | © 2020 Ntirety
IT Is Hundreds Of Applications And Data Is Everywhere
Web sites
Mobile apps
Blogs
Shopping carts
Forums
CMS
Wikis
Streaming
Big data
Security
Health data
Crypto
CRM
ERP
Email
Webmail
Databases
Tickets
Photo galleries
Accounting
Test dev
Billing
Many more…
And an ever expanding perimeter….
17 | © 2020 Ntirety
With Hundreds Of Requirements
PIPEDA
18 | © 2020 Ntirety
With Thousands Of Threats
Viruses
Sabotage of data/networks
Ransomware
Data breaches
Data loss
Cyberbullying
Cryptojacking
Manipulating data
Unauthorized access by insiders
Employee abuse
Fake news
Theft of proprietary information
DDOS protection
Intrusion protection Malicious insiders
Account hijacking
Nefarious use
Illegal crypto mining
19 | © 2020 Ntirety
Systems, Like People, Can Only Handle So Much Change &
Stress
Attacker Mentality
Companies are
in varied
chaos, some
between DR
and BC
Traffic is
coming from
all over –
WFH
WFH is flooding
your
helpdesk/IT
teams
Communications
are coming from
everywhere
Massive shift in
how data is
accessed
CDC, local gov,
insurance, schools,
CEO, suppliers,
clients, prospects,
store and saviors
20 | © 2020 Ntirety
Threat Landscape: Your Home
Isn’t As Safe
Chinese actor APT41 carry out one of the broadest campaigns
by a Chinese cyber espionage actor observed in recent years.
Between January 20 and March 11 observed exploits of Cisco,
Citrix and Zoho.1
Phishing and social-engineering campaigns where COVID-19 is
used as a lure to get people to click
More than 16,000 new Coronavirus-related domains have been
registered since January. More than 2,200 of them are
suspicious and another 93 are being used to serve malware.2
“That’s out of scope.”
- Said no attacker ever
1 Fire Eye, 2020
2 Checkpoint 2020
21 | © 2020 Ntirety
- Vivian Greene
Life is not about waiting for the storms to pass...
It's about learning how to dance in the rain.
22 | © 2020 Ntirety
Training & Reoccurring Education
• Be diligent & careful - Phishing attack,
browsing online and checking email
• Hover & review links - Double check links
or URLs before clicking
• Confidential information - Credentials,
credit card information, and sensitive data
• Download files – Company resources,
legitimate websites and official website
• How and when to contact IT – 800 number,
email, chat
Asset inventory
Software Patched & Updated
Approved software and versions
Remove end-of-life (EOL) software
Reboot machines
23 | © 2020 Ntirety
Leverage Technology
Access control Traffic and data flow Evaluation & gap analysis
• Remote access via Virtual
Private Networks Multi-
Factor Authentication (MFA)
• Password management/
complexity/account lockout
• Mobile device management
or containerization
• Email filtering
• Intrusion Detection or Prevention
Systems (IPS/IDS)
• User behavioral analytics
• Firewall configurations
• Browser privacy and security
settings
• Full encryption management
• Logging and alerting
• Disaster Recovery
• Business continuity
• Pandemic planning/staffing
• Governance policies
24 | © 2020 Ntirety
Future State Quick Action
Remediation & Disaster Recovery
• Visibility - log review, attack detection,
incident response and recovery
• Security operations center
• Disaster Recovery/Business Continuity
Address gaps
• Celebrate success
• Find services that include technology
• Update and upgrade
• Buy like you consume
• Revisit plans, policies and procedures
25 | © 2020 Ntirety
Agenda
COVID-19 Security
Preparedness
Disaster Recovery and
Best Practices
What Businesses Need to
Survive the Downturn
Closing and Questions
COVID-19 Business
Environment
Challenges
Introduction
Emil Sayegh
Emil Sayegh
Chris Riley
Kevin Smith John Faulkner
Emil Sayegh
26 | © 2020 Ntirety
Disaster Recovery And Business Continuity
• Why it matters
• Where are you today
• What to do now
• What to do next
Identify
Analyze
Prioritize
Design &
Deploy
Test &
Drill
Cousins in the continuum
27 | © 2020 Ntirety
Why It Matters: The Cost Of Downtime
Cost of Outage Remediation By Industry Per Incident
Source: Zerto DR 101 Ebook
28 | © 2020 Ntirety
Why It Matters: Hybrid Cloud Complexity Compounds Risks
The need for speed vs. managing risk
DEDICATED
ON PREMISES
COLOCATION BYoD
HYBRID
Complexity
PRIVATE
PUBLIC
Plan Development CHALLENGES
1. The average enterprise has 6 different
forms of application infrastructure
2. …each of which comes with unique
management systems and tools
3. Up to 70% of IT time is spent in
management/maintenance
4. …which leaves little time for IT to
dedicate to Disaster Recovery and
Business Continuity Planning
5. Threats take many forms and are evolving
in real-time
6. ….Which means DR and BC Planning is a
continual cycle. Last year’s plan likely has
material gaps.
YOU HAVE GAPS
29 | © 2020 Ntirety
What To Do Now: Assess Your Hierarchy Of Needs
Business Recovery
Business/Impact Planning
Validation and Testing
Biz
Continuity
IT (Technical Failure) Recovery Procedures
Risk Identification Evaluation
Prudent Data and Functional Protection
Components Meeting Functional Requirements
30 | © 2020 Ntirety
What To Do Now: First Line Of Defense Tactics
Business Recovery
Business/Impact Planning
Validation and Testing
Biz
Continuity
IT (Technical Failure) Recovery Procedures
Risk Identification Evaluation
Prudent Data and Functional Protection
Components Meeting Functional Requirements
Defined and assigned refined
roles and functions
Financial impact mitigation
planning
Scenario building business
impact assessments
Bi-annual DR testing
Monitoring / Trending
Back ups, DRaaS, patching
Collocation /
Virtualization
Documented “Run Books”
/ SOPs
31 | © 2020 Ntirety
Ntirety Is Here To Help
32 | © 2020 Ntirety
Ntirety Managed Services
A comprehensive approach to building resiliency in hybrid infrastructures
 Industry-first Guidance Level Agreement (GLA)
 Actionable, proactive recommendations from GLA
 Tightest SLA’s on market
 IT environments protected 24x7x365
 Self-managed or fully managed solutions
33 | © 2020 Ntirety
Full Suite Of Managed Hybrid And Multi-Cloud Services
Ntirety solves the complexities of hybrid cloud management for mission-critical applications
DEVOPS & DATABASE MANAGEMENT
SECURITY & COMPLIANCE
RECOVERY SERVICES
MONITORING INSIGHTS TM
CLOUD OPERATIONS
MANAGED SERVICES CONSULTING
Consumption
Method
Service
Type
Infrastructure
Standard Advanced Premier OnDemand Project-Based
ON & OFF-PREM
RealizedvaluewithNtirety
34 | © 2020 Ntirety
Capitalizing On The Lessons We Are Learning
• The current environment will expose
strengths and opportunities
• Creative solutions will be actualized, as they
have been in previous trying times
• There will be much to act upon to drive
resiliency before the next wave or new crisis
• We are here to help guide, deliver and
manage
• Remember to “Build on Stilts”
Rockaway Beach House Post Hurricane Sandy
35 | © 2020 Ntirety
Agenda
COVID-19 Security
Preparedness
Disaster Recovery and
Best Practices
What Businesses Need to
Survive the Downturn
Closing and Questions
COVID-19 Business
Environment
Challenges
Introduction
Emil Sayegh
Emil Sayegh
Chris Riley
Kevin Smith John Faulkner
Emil Sayegh
36 | © 2020 Ntirety
What Can We Learn From The Last Recession?
37 | © 2020 Ntirety
Governmental Response
• Emergency declaration: President Trump declared
a national Emergency on March 13, 2020
• The Stafford Act & Defense Production Act:
expand production & distribution of essential
supplies
• Coordinated action: 25+ specific targeted actions
by Fed, OCC, FDIC, CFTC, SEC, FHFA, & Treasury
• Fed rate cut: Fed funds rate cut to 0-0.25%
• Support for liquidity: Fed asset purchase at $700
billion, increased asset purchases
• Credit flexibility: Push by bank regulators to give
more forbearance on lines of credit to impacted
businesses, push from Congress to allow Fed to
purchase/guarantee troubled assets
• CECL relief: Exclude loans to impacted businesses
from troubled debt restructuring (TDR)
• Disaster funds: Gives federal government access
to $50 billion in disaster funds
• Regulatory changes: Removes some existing
regulatory hurdles & guidelines to facilitate a
faster government response
• Small business loans: Provides small businesses
access to low interest loans
• Student loans: Federal government backed
student loans have their interest frozen
• Strategic Petroleum Reserves (SPR): Federal
government will max out eligible purchases of
the strategic petroleum reserves
38 | © 2020 Ntirety
Mitigate
then recover
Take advantage of
government programs
for relief
Focus on what
you do best
(unique value proposition)
What Can Businesses Do
39 | © 2020 Ntirety
Agenda
COVID-19 Security
Preparedness
Disaster Recovery and
Best Practices
What Businesses Need to
Survive the Downturn
Closing and Questions
COVID-19 Business
Environment
Challenges
Introduction
Emil Sayegh
Emil Sayegh
Chris Riley
Kevin Smith John Faulkner
Emil Sayegh
40 | © 2020 Ntirety
Turbulent Times
Turbulent environments like these often
increase the distance between winners and
losers in the market
• We all may remember times like Y2K, the tech crash in
2001, 9/11 & the 2008 recession
• Uncertain times can severely test (and reveal) the
quality of an organization and its leadership
• Through our actions today, we stand as the difference
between thriving in a crisis or suffering irreparable
damage
• Companies that outpaced the competition are often
defined by the effectiveness of their decisions in times
of crisis
41 | © 2020 Ntirety
Plan For The Worst,
But Hope For The Best
• Stay calm but act now
• Protect your employees & community
• Communicate with stakeholders
• Ensure financial resiliency
• Get a crisis management team in place
• Leverage your network
• Work from facts, not rumors
• Stay positive
42 | © 2020 Ntirety
NTIRETY IS YOUR PARTNER IN THIS JOURNEY
WE ARE HERE TO HELP EVERY STEP OF THE WAY

More Related Content

What's hot

A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
Symantec
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
PECB
 
Cyber Risk Wednesday: October 23, 2013
Cyber Risk Wednesday: October 23, 2013Cyber Risk Wednesday: October 23, 2013
Cyber Risk Wednesday: October 23, 2013
atlanticcouncil
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
PECB
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security Services
All Covered
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 
Reducing Attack Surface in Budget Constrained Environments
Reducing Attack Surface in Budget Constrained EnvironmentsReducing Attack Surface in Budget Constrained Environments
Reducing Attack Surface in Budget Constrained Environments
Denim Group
 
Security initiatives here and down under
Security initiatives here and down underSecurity initiatives here and down under
Security initiatives here and down under
Roger Hagedorn
 
20101116 deckers
20101116 deckers20101116 deckers
20101116 deckers
CIONET
 
Cyber Security Conference 2017
Cyber Security Conference 2017Cyber Security Conference 2017
Cyber Security Conference 2017
Norfolk Chamber of Commerce
 
Protecting Your Business
Protecting Your BusinessProtecting Your Business
Protecting Your Business
All Covered
 
The Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityThe Proactive Approach to Cyber Security
The Proactive Approach to Cyber Security
Nathan Desfontaines
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
Livingstone Advisory
 
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss PreventionWebinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
WithumSmith+Brown, formerly Portal Solutions
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
Citrin Cooperman
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
Darren Argyle
 
Mind the gap
Mind the gapMind the gap
Mind the gap
Roger Hagedorn
 
Co3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarCo3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions Webinar
Resilient Systems
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
Donald Tabone
 
Thriving in the world of Big Data
Thriving in the world of Big DataThriving in the world of Big Data
Thriving in the world of Big Data
Livingstone Advisory
 

What's hot (20)

A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
Cyber Risk Wednesday: October 23, 2013
Cyber Risk Wednesday: October 23, 2013Cyber Risk Wednesday: October 23, 2013
Cyber Risk Wednesday: October 23, 2013
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security Services
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Reducing Attack Surface in Budget Constrained Environments
Reducing Attack Surface in Budget Constrained EnvironmentsReducing Attack Surface in Budget Constrained Environments
Reducing Attack Surface in Budget Constrained Environments
 
Security initiatives here and down under
Security initiatives here and down underSecurity initiatives here and down under
Security initiatives here and down under
 
20101116 deckers
20101116 deckers20101116 deckers
20101116 deckers
 
Cyber Security Conference 2017
Cyber Security Conference 2017Cyber Security Conference 2017
Cyber Security Conference 2017
 
Protecting Your Business
Protecting Your BusinessProtecting Your Business
Protecting Your Business
 
The Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityThe Proactive Approach to Cyber Security
The Proactive Approach to Cyber Security
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss PreventionWebinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
Mind the gap
Mind the gapMind the gap
Mind the gap
 
Co3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarCo3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions Webinar
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Thriving in the world of Big Data
Thriving in the world of Big DataThriving in the world of Big Data
Thriving in the world of Big Data
 

Similar to The Great Disruption No One Planned For: COVID-19

Covid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber ThreatsCovid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber Threats
Arun Kannoth
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
IBM Security
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
fmi_igf
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
inside-BigData.com
 
Understanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacksUnderstanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacks
Marie Wilcox
 
Navigating COVID's Impact on the Financial Services Industry
Navigating COVID's Impact on the Financial Services IndustryNavigating COVID's Impact on the Financial Services Industry
Navigating COVID's Impact on the Financial Services Industry
Citrin Cooperman
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
TechSoup
 
The Future of Disruptive and Enabling Financial Technology post CV-19
The Future of Disruptive and Enabling Financial Technology post CV-19The Future of Disruptive and Enabling Financial Technology post CV-19
The Future of Disruptive and Enabling Financial Technology post CV-19
Finch Capital
 
5 things digital media companies need to do now
5 things digital media companies need to do now5 things digital media companies need to do now
5 things digital media companies need to do now
Grant Thornton LLP
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
Dr. Prashant Vats
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
IT Governance Ltd
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
Judith Beckhard Cardoso
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
Morgan Jones
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
Cyril Soeri
 
Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...
Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...
Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...
EC-Council
 
Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...
Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...
Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...
Iryna Chekanava
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBs
Mary Brophy
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
VMUG IT
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
ssusera5ade5
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
IT Governance Ltd
 

Similar to The Great Disruption No One Planned For: COVID-19 (20)

Covid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber ThreatsCovid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber Threats
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
Understanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacksUnderstanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacks
 
Navigating COVID's Impact on the Financial Services Industry
Navigating COVID's Impact on the Financial Services IndustryNavigating COVID's Impact on the Financial Services Industry
Navigating COVID's Impact on the Financial Services Industry
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
 
The Future of Disruptive and Enabling Financial Technology post CV-19
The Future of Disruptive and Enabling Financial Technology post CV-19The Future of Disruptive and Enabling Financial Technology post CV-19
The Future of Disruptive and Enabling Financial Technology post CV-19
 
5 things digital media companies need to do now
5 things digital media companies need to do now5 things digital media companies need to do now
5 things digital media companies need to do now
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...
Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...
Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...
 
Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...
Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...
Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBs
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
 

Recently uploaded

Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 

Recently uploaded (20)

Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 

The Great Disruption No One Planned For: COVID-19

  • 1. 1 | © 2020 Ntirety The Great Disruption No One Planned For: COVID-19
  • 2. 2 | © 2020 Ntirety 2 | © 2020 Ntirety Meet the presenters: • Emil Sayegh, CEO & President • Chris Riley, CISO • Kevin Smith, CRO • John Faulkner, CFO
  • 3. 3 | © 2020 Ntirety Agenda COVID-19 Security Preparedness Disaster Recovery and Best Practices What Businesses Need to Survive the Downturn Closing and Questions COVID-19 Business Environment Challenges Introduction Emil Sayegh Emil Sayegh Chris Riley Kevin Smith John Faulkner Emil Sayegh
  • 4. 4 | © 2020 Ntirety How does this end? How do we stop the virus? How do we restore public confidence? What is necessary to restore the economy? 1 2 3 4 Questions On All Of Our Minds 5 6 Are we through the worst of this? What will be necessary to reopen states?
  • 5. 5 | © 2020 Ntirety Two things we know about crises: they are all different, and they all end. Hopefully, this will pass soon with the least possible impact.
  • 6. 6 | © 2020 Ntirety What We Know: COVID-19 Global Economic Impact • US Senate passes historic $2 trillion rescue package • Millions of Americans have filed unemployment claims • UK to pay up to 80% of employee wages for those unable to work due to the pandemic • European Central Bank to launch €750 billion stimulus program, following US Federal Reserve move to cut interest rates to nearly zero
  • 7. 7 | © 2020 Ntirety Severe Damage To The Economy “This is a huge, unprecedented, devastating hit,” Janet Yellen, former chair of the Federal Reserve, 4/6/2020 Source: Fox News Source: Fox News
  • 8. 8 | © 2020 Ntirety COVID-19 Could Affect Economy Through Three Channels Direct impact on production Supply chain and market disruption Financial impact on firms and financial markets 1 2 3
  • 9. 9 | © 2020 Ntirety 4 Scenarios We Have To Be Prepared For The Worst is Over • Transmission in China has slowed already • As global number of cases stabilizes, global economy returns to normal • Global GDPs take a big hit in Q1 2020 but bounce back in Q2 after the country opens back up Year of the Virus • Although spread in China slows, outbreaks occur on a rolling basis around world substantially slowing global growth • Nimble businesses that manage switching suppliers & have enough liquidity to survive periods of low sales & revenue will have a competitive advantage Global Pandemic • Economic centers around the world are subject to Wuhan-style shutdowns. It takes more than a year for the WHO and CDC to develop a global response • Global manufacturing declines as businesses can only operate intermittently • Global GDP stagnates, international trade falls & global recession is a possibility Financial Crisis • Delayed shipments create financial problems for companies with heavy debt • Decline in global equity markets and flight from risk • Concern about counterparty risk accelerates the decline and dries up liquidity • The US economy recovers after a V, U, or W shaped recession 1 2 3 4
  • 10. 10 | © 2020 Ntirety Light At The End Of The Tunnel Source: The Guardian Source: Bloomberg Source: CNN
  • 11. 11 | © 2020 Ntirety The coronavirus has ignited what Bloomberg calls the “world’s largest work-from- home experiment” Travel restrictions, canceled events driving large online meetings The security perimeter has expanded to home offices Business Has Changed
  • 12. 12 | © 2020 Ntirety Where Is Ntirety In All Of This Actions taken early • Contingency plans in place in all DC facilities • Enhanced cleaning and health safety protocols • Tightened entry protocols to bare minimum for outsiders • 1 week of food & water supplies available in DCs in the event of a lock down • Canceled travel and in person gatherings • All non-data center employees working from home with ability to function remotely with ample supply of laptops, VDI technology and security • Repeated multichannel communication to customers, partners and employees with many articles published on Forbes and Ntirety blog • SWOT analysis completed in first days of crisis • COVID-19 War Room created with daily updates
  • 13. 13 | © 2020 Ntirety Where Is Cloud In All Of This Cloud is already helping • Dependable, secure remote work technology: Virtual Private Networking (VPN) & other cloud-enhanced tools make remote work possible from nearly any device anywhere in the world Cloud can help even more • Distributed Cloud IT systems in disaster recovery situations • Cloud-enabled businesses have less personnel in data centers to check, maintain & monitor their server and storage installations • Moving from CAPEX to OPEX with a pay per use component • Prepare to scale for the recovery • Implement automation Source: Forbes; Author: Emil Sayegh
  • 14. 14 | © 2020 Ntirety Questions We Should Also Be Asking Amidst This Crisis What is your plan to respond to an IT emergency (cyber or uptime)? Do you have on- staff IT & security expertise? Have you revised and implemented new IT security tools and controls? Are you in full compliance with regulatory requirements? Have you aligned IT, security & business priorities?
  • 15. 15 | © 2020 Ntirety Agenda COVID-19 Security Preparedness Disaster Recovery and Best Practices What Businesses Need to Survive the Downturn Closing and Questions COVID-19 Business Environment Challenges Introduction Emil Sayegh Emil Sayegh Chris Riley Kevin Smith John Faulkner Emil Sayegh
  • 16. 16 | © 2020 Ntirety IT Is Hundreds Of Applications And Data Is Everywhere Web sites Mobile apps Blogs Shopping carts Forums CMS Wikis Streaming Big data Security Health data Crypto CRM ERP Email Webmail Databases Tickets Photo galleries Accounting Test dev Billing Many more… And an ever expanding perimeter….
  • 17. 17 | © 2020 Ntirety With Hundreds Of Requirements PIPEDA
  • 18. 18 | © 2020 Ntirety With Thousands Of Threats Viruses Sabotage of data/networks Ransomware Data breaches Data loss Cyberbullying Cryptojacking Manipulating data Unauthorized access by insiders Employee abuse Fake news Theft of proprietary information DDOS protection Intrusion protection Malicious insiders Account hijacking Nefarious use Illegal crypto mining
  • 19. 19 | © 2020 Ntirety Systems, Like People, Can Only Handle So Much Change & Stress Attacker Mentality Companies are in varied chaos, some between DR and BC Traffic is coming from all over – WFH WFH is flooding your helpdesk/IT teams Communications are coming from everywhere Massive shift in how data is accessed CDC, local gov, insurance, schools, CEO, suppliers, clients, prospects, store and saviors
  • 20. 20 | © 2020 Ntirety Threat Landscape: Your Home Isn’t As Safe Chinese actor APT41 carry out one of the broadest campaigns by a Chinese cyber espionage actor observed in recent years. Between January 20 and March 11 observed exploits of Cisco, Citrix and Zoho.1 Phishing and social-engineering campaigns where COVID-19 is used as a lure to get people to click More than 16,000 new Coronavirus-related domains have been registered since January. More than 2,200 of them are suspicious and another 93 are being used to serve malware.2 “That’s out of scope.” - Said no attacker ever 1 Fire Eye, 2020 2 Checkpoint 2020
  • 21. 21 | © 2020 Ntirety - Vivian Greene Life is not about waiting for the storms to pass... It's about learning how to dance in the rain.
  • 22. 22 | © 2020 Ntirety Training & Reoccurring Education • Be diligent & careful - Phishing attack, browsing online and checking email • Hover & review links - Double check links or URLs before clicking • Confidential information - Credentials, credit card information, and sensitive data • Download files – Company resources, legitimate websites and official website • How and when to contact IT – 800 number, email, chat Asset inventory Software Patched & Updated Approved software and versions Remove end-of-life (EOL) software Reboot machines
  • 23. 23 | © 2020 Ntirety Leverage Technology Access control Traffic and data flow Evaluation & gap analysis • Remote access via Virtual Private Networks Multi- Factor Authentication (MFA) • Password management/ complexity/account lockout • Mobile device management or containerization • Email filtering • Intrusion Detection or Prevention Systems (IPS/IDS) • User behavioral analytics • Firewall configurations • Browser privacy and security settings • Full encryption management • Logging and alerting • Disaster Recovery • Business continuity • Pandemic planning/staffing • Governance policies
  • 24. 24 | © 2020 Ntirety Future State Quick Action Remediation & Disaster Recovery • Visibility - log review, attack detection, incident response and recovery • Security operations center • Disaster Recovery/Business Continuity Address gaps • Celebrate success • Find services that include technology • Update and upgrade • Buy like you consume • Revisit plans, policies and procedures
  • 25. 25 | © 2020 Ntirety Agenda COVID-19 Security Preparedness Disaster Recovery and Best Practices What Businesses Need to Survive the Downturn Closing and Questions COVID-19 Business Environment Challenges Introduction Emil Sayegh Emil Sayegh Chris Riley Kevin Smith John Faulkner Emil Sayegh
  • 26. 26 | © 2020 Ntirety Disaster Recovery And Business Continuity • Why it matters • Where are you today • What to do now • What to do next Identify Analyze Prioritize Design & Deploy Test & Drill Cousins in the continuum
  • 27. 27 | © 2020 Ntirety Why It Matters: The Cost Of Downtime Cost of Outage Remediation By Industry Per Incident Source: Zerto DR 101 Ebook
  • 28. 28 | © 2020 Ntirety Why It Matters: Hybrid Cloud Complexity Compounds Risks The need for speed vs. managing risk DEDICATED ON PREMISES COLOCATION BYoD HYBRID Complexity PRIVATE PUBLIC Plan Development CHALLENGES 1. The average enterprise has 6 different forms of application infrastructure 2. …each of which comes with unique management systems and tools 3. Up to 70% of IT time is spent in management/maintenance 4. …which leaves little time for IT to dedicate to Disaster Recovery and Business Continuity Planning 5. Threats take many forms and are evolving in real-time 6. ….Which means DR and BC Planning is a continual cycle. Last year’s plan likely has material gaps. YOU HAVE GAPS
  • 29. 29 | © 2020 Ntirety What To Do Now: Assess Your Hierarchy Of Needs Business Recovery Business/Impact Planning Validation and Testing Biz Continuity IT (Technical Failure) Recovery Procedures Risk Identification Evaluation Prudent Data and Functional Protection Components Meeting Functional Requirements
  • 30. 30 | © 2020 Ntirety What To Do Now: First Line Of Defense Tactics Business Recovery Business/Impact Planning Validation and Testing Biz Continuity IT (Technical Failure) Recovery Procedures Risk Identification Evaluation Prudent Data and Functional Protection Components Meeting Functional Requirements Defined and assigned refined roles and functions Financial impact mitigation planning Scenario building business impact assessments Bi-annual DR testing Monitoring / Trending Back ups, DRaaS, patching Collocation / Virtualization Documented “Run Books” / SOPs
  • 31. 31 | © 2020 Ntirety Ntirety Is Here To Help
  • 32. 32 | © 2020 Ntirety Ntirety Managed Services A comprehensive approach to building resiliency in hybrid infrastructures  Industry-first Guidance Level Agreement (GLA)  Actionable, proactive recommendations from GLA  Tightest SLA’s on market  IT environments protected 24x7x365  Self-managed or fully managed solutions
  • 33. 33 | © 2020 Ntirety Full Suite Of Managed Hybrid And Multi-Cloud Services Ntirety solves the complexities of hybrid cloud management for mission-critical applications DEVOPS & DATABASE MANAGEMENT SECURITY & COMPLIANCE RECOVERY SERVICES MONITORING INSIGHTS TM CLOUD OPERATIONS MANAGED SERVICES CONSULTING Consumption Method Service Type Infrastructure Standard Advanced Premier OnDemand Project-Based ON & OFF-PREM RealizedvaluewithNtirety
  • 34. 34 | © 2020 Ntirety Capitalizing On The Lessons We Are Learning • The current environment will expose strengths and opportunities • Creative solutions will be actualized, as they have been in previous trying times • There will be much to act upon to drive resiliency before the next wave or new crisis • We are here to help guide, deliver and manage • Remember to “Build on Stilts” Rockaway Beach House Post Hurricane Sandy
  • 35. 35 | © 2020 Ntirety Agenda COVID-19 Security Preparedness Disaster Recovery and Best Practices What Businesses Need to Survive the Downturn Closing and Questions COVID-19 Business Environment Challenges Introduction Emil Sayegh Emil Sayegh Chris Riley Kevin Smith John Faulkner Emil Sayegh
  • 36. 36 | © 2020 Ntirety What Can We Learn From The Last Recession?
  • 37. 37 | © 2020 Ntirety Governmental Response • Emergency declaration: President Trump declared a national Emergency on March 13, 2020 • The Stafford Act & Defense Production Act: expand production & distribution of essential supplies • Coordinated action: 25+ specific targeted actions by Fed, OCC, FDIC, CFTC, SEC, FHFA, & Treasury • Fed rate cut: Fed funds rate cut to 0-0.25% • Support for liquidity: Fed asset purchase at $700 billion, increased asset purchases • Credit flexibility: Push by bank regulators to give more forbearance on lines of credit to impacted businesses, push from Congress to allow Fed to purchase/guarantee troubled assets • CECL relief: Exclude loans to impacted businesses from troubled debt restructuring (TDR) • Disaster funds: Gives federal government access to $50 billion in disaster funds • Regulatory changes: Removes some existing regulatory hurdles & guidelines to facilitate a faster government response • Small business loans: Provides small businesses access to low interest loans • Student loans: Federal government backed student loans have their interest frozen • Strategic Petroleum Reserves (SPR): Federal government will max out eligible purchases of the strategic petroleum reserves
  • 38. 38 | © 2020 Ntirety Mitigate then recover Take advantage of government programs for relief Focus on what you do best (unique value proposition) What Can Businesses Do
  • 39. 39 | © 2020 Ntirety Agenda COVID-19 Security Preparedness Disaster Recovery and Best Practices What Businesses Need to Survive the Downturn Closing and Questions COVID-19 Business Environment Challenges Introduction Emil Sayegh Emil Sayegh Chris Riley Kevin Smith John Faulkner Emil Sayegh
  • 40. 40 | © 2020 Ntirety Turbulent Times Turbulent environments like these often increase the distance between winners and losers in the market • We all may remember times like Y2K, the tech crash in 2001, 9/11 & the 2008 recession • Uncertain times can severely test (and reveal) the quality of an organization and its leadership • Through our actions today, we stand as the difference between thriving in a crisis or suffering irreparable damage • Companies that outpaced the competition are often defined by the effectiveness of their decisions in times of crisis
  • 41. 41 | © 2020 Ntirety Plan For The Worst, But Hope For The Best • Stay calm but act now • Protect your employees & community • Communicate with stakeholders • Ensure financial resiliency • Get a crisis management team in place • Leverage your network • Work from facts, not rumors • Stay positive
  • 42. 42 | © 2020 Ntirety NTIRETY IS YOUR PARTNER IN THIS JOURNEY WE ARE HERE TO HELP EVERY STEP OF THE WAY