It

Post on 21-Dec-2014

81 views 1 download

Tags:

description

 

Transcript of It

Critical IT:The Importance of Backing Up Your

DataJeff Ware

March 12th, 2013

Session Agenda IT in your business

◦ The value of data◦ The value of connectivity

Backups◦ Planning for the worst

The cloud is not always the answer PCI-DSS Q & A

Started with CBM at 14 Electrical Engineering/

Computer Science Background

Worked at CNN & theatres. Learned other aspects of live events.

Fell in love with food thanks to this job

My Story

Founded in 1980 as a hot dog stand

Catering spun off into separate company in 1991

Peak revenue of $17 Million 90 FT & 130 PT Employees 45% Full Service / 35% On

Premise / 20% Delivery

CBM 101

Largest event $1.3 million Focused on food quality

above all else Poor facility design

challenges efficiency Non Chicago address is a

marketing struggle

CBM 101

10 Servers 3 DVRs 2 PBXs 4 T1s & 1 50/10 Cable GFS Backup

◦ Tapes – Offline◦ SAN – Online

Only 1 critical app in the cloud

PCI DSS Compliant

IT @ CBM

Information technology (IT) is the application of computers and telecommunications

equipment to store, retrieve, transmit and manipulate data, often in the context of a

business or other enterprise.How do you use IT?

Communicate with◦ Potential Customers◦ Current Customers◦ Vendors◦ Staff

Receive $ and Pay $ Research Marketing Purchasing Cooking

How Do You Use IT?

A study from CIO Insight found improving the manageability of corporate data by 10% each year would increase total sales by $55,900 per employee

When your not connected?

How productive are you

Superheroes need it, police rely on it and everyone that uses a computer should use some form of it

Backup

Types of Data:

1. Mission Critical2. Business Critical3. Essential4. Consequential5. Non-Critical6. Inconsequential7. Disposable

Types of Backups:

1. Full Backup2. Incremental Backup3. Differential Backup4. Mirror Backup5. Full Computer Backup/Image

Where To Backup:

1. Local2. Offsite (Offline)3. Online4. Remote5. Cloud

Test Restorations

Use Multiple Destinations

Tips

The Cloud

1. Security & Privacy2. Dependency (Loss of control)3. Cost4. Decreased Flexibility5. Knowledge and Integration

5 Disadvantages

PCI-DSS

Build and Maintain a Secure Network Protect Cardholder Data Maintain a Vulnerability Management

Program Implement Strong Access Control Measures Regularly Monitor and Test Networks Maintain an Information Security Policy

Goals

To download a copy of this presentation, go to:slideshare.net/CateringChicago

Jeff Warejware@CateringByMichaels.com | (847) 966-6555

Questions?