19
New Threats to Data Security Presented by: Michael Hall, CISO Lynda Martel, Director, Privacy Compliance Communications Growing Risk of Using Unsecure Data Recovery Vendors

New Threats to Data Security

Embed Size (px)

DESCRIPTION

The webinar will cover highlights of the 2012 Ponemon Study: Trends in Security of Data Recovery Operations such as: Why data loss incidents are on the rise. Why data recovery vendors are being used more often. Why more data breach incidents are occurring at data recovery vendors.

Citation preview

Page 1: New Threats to Data Security

New Threats to Data Security

Presented by: Michael Hall, CISO Lynda Martel,

Director, Privacy Compliance Communications

Growing Risk of Using Unsecure Data Recovery Vendors

Page 2: New Threats to Data Security

Data Loss a Reality in Today’s Digital World

Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations

Page 3: New Threats to Data Security

Multiple DR Vendors Being UsedMajority Used 1X/Week +

Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations

Page 4: New Threats to Data Security

Data Recovery Outsourced More Often When Critical Data Lost

Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations

Page 5: New Threats to Data Security

Data Recovery Vendors Handle Your Most Sensitive Data

Page 6: New Threats to Data Security

IT Support Chooses Data Recovery Vendor

Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations

Page 7: New Threats to Data Security

IT Support Believes Speed and Cost Tops Data Security

Page 8: New Threats to Data Security

Data Recovery Vendors Fly Under IT Security’s Radar

Page 9: New Threats to Data Security

IT Security Not Involved In DR Vendor Vetting Process

Page 10: New Threats to Data Security

Vetting Process in Most Companies Below Par

Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations

Page 11: New Threats to Data Security

Risk Assessments Not Often Conducted

Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations

Page 12: New Threats to Data Security

Data Breaches at Recovery Companies Going Up

Page 13: New Threats to Data Security

Insecure Data Recovery Operations Cause of Breach

Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations

Page 14: New Threats to Data Security

Would Your Cloud Service Provider Notify You Of A Breach?

Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations

Page 15: New Threats to Data Security

IT & IT Security Understands Need to Strengthen Protocols

Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations

Page 16: New Threats to Data Security

Not All Data Recovery Companies are Created Equal

Page 17: New Threats to Data Security

DriveSavers Highlights

Annual and company-wide SAS 70 II Audit Reports

Certified secure network

Compliant with NIST 800.32, FERPA, GLBA, SOX AND HIPAA

State-of-the-art ISO-5 cleanroom

Engineers certified to recover data from encrypted files and drives – leading data recovery success rates since 1985

DoD approved data degaussing process

Authorized by all leading storage device OEMs

Page 18: New Threats to Data Security

A Few of Our Happy Customers

Page 19: New Threats to Data Security

Thank You!

Q&A