new threats to data security

19
New Threats to Data Security Presented by: Michael Hall, CISO Lynda Martel, Director, Privacy Compliance Communications Growing Risk of Using Unsecure Data Recovery Vendors

Upload: drivesavers-inc

Post on 18-May-2015

279 views

Category:

Technology


3 download

DESCRIPTION

The webinar will cover highlights of the 2012 Ponemon Study: Trends in Security of Data Recovery Operations such as: Why data loss incidents are on the rise. Why data recovery vendors are being used more often. Why more data breach incidents are occurring at data recovery vendors.

TRANSCRIPT

Page 1: New Threats to Data Security

New Threats to Data Security

Presented by: Michael Hall, CISO Lynda Martel,

Director, Privacy Compliance Communications

Growing Risk of Using Unsecure Data Recovery Vendors

Page 2: New Threats to Data Security

Data Loss a Reality in Today’s Digital World

Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations

Page 3: New Threats to Data Security

Multiple DR Vendors Being UsedMajority Used 1X/Week +

Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations

Page 4: New Threats to Data Security

Data Recovery Outsourced More Often When Critical Data Lost

Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations

Page 5: New Threats to Data Security

Data Recovery Vendors Handle Your Most Sensitive Data

Page 6: New Threats to Data Security

IT Support Chooses Data Recovery Vendor

Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations

Page 7: New Threats to Data Security

IT Support Believes Speed and Cost Tops Data Security

Page 8: New Threats to Data Security

Data Recovery Vendors Fly Under IT Security’s Radar

Page 9: New Threats to Data Security

IT Security Not Involved In DR Vendor Vetting Process

Page 10: New Threats to Data Security

Vetting Process in Most Companies Below Par

Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations

Page 11: New Threats to Data Security

Risk Assessments Not Often Conducted

Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations

Page 12: New Threats to Data Security

Data Breaches at Recovery Companies Going Up

Page 13: New Threats to Data Security

Insecure Data Recovery Operations Cause of Breach

Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations

Page 14: New Threats to Data Security

Would Your Cloud Service Provider Notify You Of A Breach?

Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations

Page 15: New Threats to Data Security

IT & IT Security Understands Need to Strengthen Protocols

Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations

Page 16: New Threats to Data Security

Not All Data Recovery Companies are Created Equal

Page 17: New Threats to Data Security

DriveSavers Highlights

Annual and company-wide SAS 70 II Audit Reports

Certified secure network

Compliant with NIST 800.32, FERPA, GLBA, SOX AND HIPAA

State-of-the-art ISO-5 cleanroom

Engineers certified to recover data from encrypted files and drives – leading data recovery success rates since 1985

DoD approved data degaussing process

Authorized by all leading storage device OEMs

Page 18: New Threats to Data Security

A Few of Our Happy Customers

Page 19: New Threats to Data Security

Thank You!

Q&A