new threats to data security
DESCRIPTION
The webinar will cover highlights of the 2012 Ponemon Study: Trends in Security of Data Recovery Operations such as: Why data loss incidents are on the rise. Why data recovery vendors are being used more often. Why more data breach incidents are occurring at data recovery vendors.TRANSCRIPT
![Page 1: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/1.jpg)
New Threats to Data Security
Presented by: Michael Hall, CISO Lynda Martel,
Director, Privacy Compliance Communications
Growing Risk of Using Unsecure Data Recovery Vendors
![Page 2: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/2.jpg)
Data Loss a Reality in Today’s Digital World
Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
![Page 3: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/3.jpg)
Multiple DR Vendors Being UsedMajority Used 1X/Week +
Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
![Page 4: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/4.jpg)
Data Recovery Outsourced More Often When Critical Data Lost
Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
![Page 5: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/5.jpg)
Data Recovery Vendors Handle Your Most Sensitive Data
![Page 6: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/6.jpg)
IT Support Chooses Data Recovery Vendor
Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
![Page 7: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/7.jpg)
IT Support Believes Speed and Cost Tops Data Security
![Page 8: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/8.jpg)
Data Recovery Vendors Fly Under IT Security’s Radar
![Page 9: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/9.jpg)
IT Security Not Involved In DR Vendor Vetting Process
![Page 10: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/10.jpg)
Vetting Process in Most Companies Below Par
Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
![Page 11: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/11.jpg)
Risk Assessments Not Often Conducted
Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
![Page 12: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/12.jpg)
Data Breaches at Recovery Companies Going Up
![Page 13: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/13.jpg)
Insecure Data Recovery Operations Cause of Breach
Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
![Page 14: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/14.jpg)
Would Your Cloud Service Provider Notify You Of A Breach?
Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
![Page 15: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/15.jpg)
IT & IT Security Understands Need to Strengthen Protocols
Resource: 2011 Ponemon Institute Study “Trends in Security of Data Recovery Operations
![Page 16: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/16.jpg)
Not All Data Recovery Companies are Created Equal
![Page 17: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/17.jpg)
DriveSavers Highlights
Annual and company-wide SAS 70 II Audit Reports
Certified secure network
Compliant with NIST 800.32, FERPA, GLBA, SOX AND HIPAA
State-of-the-art ISO-5 cleanroom
Engineers certified to recover data from encrypted files and drives – leading data recovery success rates since 1985
DoD approved data degaussing process
Authorized by all leading storage device OEMs
![Page 18: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/18.jpg)
A Few of Our Happy Customers
![Page 19: New Threats to Data Security](https://reader034.vdocument.in/reader034/viewer/2022052523/5559ff87d8b42ad00a8b4dd2/html5/thumbnails/19.jpg)
Thank You!
Q&A