In this assignment, I have presentation to explain each point in the agenda for the audience like management using the information mentioned in each point in the attached document.? Imagi
In this assignment, I have presentation to explain each point in the agenda for the audience like management using the information mentioned in each point in the attached document.
Imagine yourself standing in front of audience explaining that by using your own words explaining the concept briefly.
In this assignment, I have to explain each point in the agenda for the audience like management using the information mentioned in each point in this document.
Imagine yourself standing in front of audience explaining that by using your own words explaining the concept briefly.
AGENDA:
· Goal
· Data and Backup Storage Encryption journey
· Encryption Progress
· Added value
· What is next
1. GOAL:
Encrypt Data & Backup storage systems to remove the risk of data breach and unauthorized access where data will be useless and not readable without decryption keys to protect & secure organization sensitive systems and data, by enabling encryption we are setting a benchmark term of Storage encryption in the organization.
2. Data and Backup Storage Encryption journey:
2020
Assessment:
· Study the Encryption requirements
· Define Targeted storage systems.
· Engage Hardware & Software Vendors
2021
Finding Remediation:
· Prepare the action plan with vendors.
· 15 Data storage systems identified, and budget requested for Hardware Encryption licenses and additional storage.
· 10 Backup storage systems identified, and budget requested for Software Encryption Licenses
· Procurement cycle to purchase the required licenses and additional storage
2022
Data and Backup Storage Encryption
· Starting the initiative.
· Defined targeted Storage systems (Backup Storage SF, Data Storage SNF, Backup Storage SNF).
· Configure Data Storage Encryption
· Configure Backup Storage Encryption.
3. Encryption Progress:
Jan-Feb:
· Define Targeted storage systems and Study the Encryption.
Mar-May:
· Assessment on study encryption requirements and engage Hardware and Software Vendors
Jun-July:
· Configure encryption environment
Aug-Oct:
· Encryption implementation on All systems
4. Added value:
· Protect organization Sensitive Data from unauthorized access
· Integrated High availability Key Management system
· Increase Data integrity and availability
· Comply with government regulations and organization IT security policies
· Protection against data manipulation or unintentional destruction
5. What is next:
· Quarter 1:
Work on assessing SF Data Storage Encryption
· Quarter 2:
Engage Vendors
· Quarter 3:
Budget and purchase the required Hardware & Software
· Quarter 4:
Configure SF Data Storage Encryption.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.