View
83
Download
1
Category
Tags:
Preview:
DESCRIPTION
Citation preview
Critical IT:The Importance of Backing Up Your
DataJeff Ware
March 12th, 2013
Session Agenda IT in your business
◦ The value of data◦ The value of connectivity
Backups◦ Planning for the worst
The cloud is not always the answer PCI-DSS Q & A
Started with CBM at 14 Electrical Engineering/
Computer Science Background
Worked at CNN & theatres. Learned other aspects of live events.
Fell in love with food thanks to this job
My Story
Founded in 1980 as a hot dog stand
Catering spun off into separate company in 1991
Peak revenue of $17 Million 90 FT & 130 PT Employees 45% Full Service / 35% On
Premise / 20% Delivery
CBM 101
Largest event $1.3 million Focused on food quality
above all else Poor facility design
challenges efficiency Non Chicago address is a
marketing struggle
CBM 101
10 Servers 3 DVRs 2 PBXs 4 T1s & 1 50/10 Cable GFS Backup
◦ Tapes – Offline◦ SAN – Online
Only 1 critical app in the cloud
PCI DSS Compliant
IT @ CBM
Information technology (IT) is the application of computers and telecommunications
equipment to store, retrieve, transmit and manipulate data, often in the context of a
business or other enterprise.How do you use IT?
Communicate with◦ Potential Customers◦ Current Customers◦ Vendors◦ Staff
Receive $ and Pay $ Research Marketing Purchasing Cooking
How Do You Use IT?
A study from CIO Insight found improving the manageability of corporate data by 10% each year would increase total sales by $55,900 per employee
When your not connected?
How productive are you
Superheroes need it, police rely on it and everyone that uses a computer should use some form of it
Backup
Types of Data:
1. Mission Critical2. Business Critical3. Essential4. Consequential5. Non-Critical6. Inconsequential7. Disposable
Types of Backups:
1. Full Backup2. Incremental Backup3. Differential Backup4. Mirror Backup5. Full Computer Backup/Image
Where To Backup:
1. Local2. Offsite (Offline)3. Online4. Remote5. Cloud
Test Restorations
Use Multiple Destinations
Tips
The Cloud
1. Security & Privacy2. Dependency (Loss of control)3. Cost4. Decreased Flexibility5. Knowledge and Integration
5 Disadvantages
PCI-DSS
Build and Maintain a Secure Network Protect Cardholder Data Maintain a Vulnerability Management
Program Implement Strong Access Control Measures Regularly Monitor and Test Networks Maintain an Information Security Policy
Goals
To download a copy of this presentation, go to:slideshare.net/CateringChicago
Jeff Warejware@CateringByMichaels.com | (847) 966-6555
Questions?
Recommended