Chat with us, powered by LiveChat In this assignment, I have presentation to explain each point in the agenda for the audience like management using the information mentioned in each point in the attached document.? Imagi - EssayAbode

In this assignment, I have presentation to explain each point in the agenda for the audience like management using the information mentioned in each point in the attached document.? Imagi

In this assignment, I have presentation to explain each point in the agenda for the audience like management using the information mentioned in each point in the attached document. 

Imagine yourself standing in front of audience explaining that by using your own words explaining the concept briefly.

In this assignment, I have to explain each point in the agenda for the audience like management using the information mentioned in each point in this document.

Imagine yourself standing in front of audience explaining that by using your own words explaining the concept briefly.

AGENDA:

· Goal

· Data and Backup Storage Encryption journey

· Encryption Progress

· Added value

· What is next

1. GOAL:

Encrypt Data & Backup storage systems to remove the risk of data breach and unauthorized access where data will be useless and not readable without decryption keys to protect & secure organization sensitive systems and data, by enabling encryption we are setting a benchmark term of Storage encryption in the organization.

2. Data and Backup Storage Encryption journey:

2020

Assessment:

· Study the Encryption requirements

· Define Targeted storage systems.

· Engage Hardware & Software Vendors

2021

Finding Remediation:

· Prepare the action plan with vendors.

· 15 Data storage systems identified, and budget requested for Hardware Encryption licenses and additional storage.

· 10 Backup storage systems identified, and budget requested
for Software Encryption Licenses

· Procurement cycle to purchase the required licenses and
additional storage

2022

Data and Backup Storage Encryption

· Starting the initiative.

· Defined targeted Storage systems
(Backup Storage SF, Data Storage SNF, Backup Storage SNF).

· Configure Data Storage Encryption

· Configure Backup Storage Encryption.

3. Encryption Progress:

Jan-Feb:

· Define Targeted storage systems and Study the Encryption.

Mar-May:

· Assessment on study encryption requirements and engage Hardware and Software Vendors

Jun-July:

· Configure encryption environment

Aug-Oct:

· Encryption implementation on All systems

4. Added value:

· Protect organization Sensitive Data from unauthorized access

· Integrated High availability Key Management system

· Increase Data integrity and availability

· Comply with government regulations and organization IT security policies

· Protection against data manipulation or unintentional destruction

5. What is next:

· Quarter 1:

Work on assessing SF Data Storage Encryption

· Quarter 2:

Engage Vendors

· Quarter 3:

Budget and purchase the required Hardware & Software

· Quarter 4:

Configure SF Data Storage Encryption.

Related Tags

Academic APA Assignment Business Capstone College Conclusion Course Day Discussion Double Spaced Essay English Finance General Graduate History Information Justify Literature Management Market Masters Math Minimum MLA Nursing Organizational Outline Pages Paper Presentation Questions Questionnaire Reference Response Response School Subject Slides Sources Student Support Times New Roman Title Topics Word Write Writing