IBM Systems Magazine, Mainframe - July/August 2014 - 41

"Learned executives and IT practitioners recognize
their organization's reputation or brand is on the
line every time it experiences a signi´Čücant
disruption to business and IT operations."
-Larry Ponemon, chairman and founder, Ponemon Institute

When respondents were asked
to indicate which threats their
company experienced in the
last two years that impacted
the company's reputation, the
answers were much different. IT
system failure caused the most
damage to reputation, while
human error ranked second and
cyber security breaches ranked
third. Natural disasters ranked
far lower on this list, indicating
they may be less likely to cause
reputation or brand damages.
Corcoran says the perceived
threat of natural disaster is high
because when a disaster occurs,
it makes the front-page news.
That, he says, gets the executives'
attention and sticks in their minds
for months. Business executives
expect their IT environments to
never go down, which may be an
unrealistic expectation as the costs
to create a 100 percent available
IT environment may outweigh the
impacts of an IT outage.
Human error is the threat most
likely to occur and is the cause
of 70 percent more disruptions
than IT professionals anticipate.
Ponemon says this is important
because the problem isn't always
about "bad guys" stealing
company data; he says the "good
guys" sometimes make mistakes
that result in data loss.
"The most important step
to reducing human error is to
educate and raise awareness

among employees, including parttime workers and contractors,"
Ponemon says. "The second most
important step is to vigorously
monitor employees to make sure
they follow the rules."

Investing in Business
Continuity Plans
Most study respondents indicated
their companies don't have a
formal strategy for business
continuity or IT security
management across the enterprise.
This is where the real value of the
study lies. The potential damage to
reputation and brand value can be
the best incentive for organizations
to fund business continuity and IT
security programs. While forensics
and technical support are strictly
IT-related costs, reputation and
brand damage, lost productivity
and lost revenue are business
costs. Assuming these business
costs are greater than the cost of
investing in IT risk mitigation, the
business case for IT then becomes
one of either preventing losses or
increasing revenues-while at the
same time protecting one of your
organization's most critical assets:
its reputation.
Corcoran says C-level executives should start asking more
questions about what the risks
are to their businesses. They
must ensure the company is
taking the right actions to protect
the business and demonstrate

$$$
Total
projected
cost of
disruptions:
$5.8 million
Reputation and
brand damage
$3.7 million
Lost revenue
$4 million
Lost productivity
$1.6 million
Compliance
$2.4 million
Forensics
$2 million
Technical support

that safeguards are in place.
"Today, technology is enabling
that corporation, organization
or government agency to grow,
operate and communicate," he
says. "Executives need to understand that so the right resiliency
plans are put in place to ensure
that precautions are made to
safeguard the assets today, and
if something happens, to be able
to respond quickly so as to not
impact the business, or to minimize the impact to the business."
This study also helps reduce
the chasm between the business
and the IT organizations within a
company, according to Corcoran.
It helps put IT risks into a
business-focused language by
putting a cost on how much
businesses spend after IT failures.
Business-minded people expect
IT to be 100 percent available,
Corcoran says, and this is not a
realistic goal. "This study can
be valuable in helping the IT
audience learn how to talk about
risk with a business perspective,"
Corcoran says. "This study
allowed the business and IT
organizations to communicate
in a similar language. We have
to be talking at a business level.
This study helps them address
both IT risk and reputation from a
business view."

Turn Info Into Action
Based on the findings of the
study, IBM offers six action steps
to help you make the case for
IT risk mitigation spending and
achieve measurable results.
1. Carry the reputational risk
message to corporate leaders.
Most organizational leaders
don't realize the risks. Helping
them understand can protect
your business and position you
as a valuable corporate asset.
2. Build a business case for IT
investments. The study offers a

ibmsystemsmag.com JULY/AUGUST 2014 // 41


http://www.ibmsystemsmag.com

IBM Systems Magazine, Mainframe - July/August 2014

Table of Contents for the Digital Edition of IBM Systems Magazine, Mainframe - July/August 2014

Table of Contents
Editor's Desk: Protecting information
IBM Perspective: Sunny outlook on the mainframe
Techbits: Watson: your personal shopper
Infographic: How the mainframe changed our world
Partner PoV: ISVs can help mainframe customers keep up with a rapidly evolving environment
Focus on Storage: IBM FlashSystem addresses storage and application performance issues
Currents: As data consumption expands, information protection policies must be put in place
Case Study: Credit Where Credit's Due: Isracard Group devises a novel way to verify its system integrity before disaster occurs
Cover Story: A Secure Fortress: The mainframe delivers the reliability, safety and cost-effectiveness your IT shop needs
Feature: Be Proactive in Risk Management: Protecting data is crucial as your business connects in ever-increasing ways along the access superhighway
Feature: Being Risk-Aware: New IBM and Ponemon study examines the economics of IT risk and reputation
Administrator: Active/Active Sites helps distribute workloads during outages
Tech Corner: A point-in-time tool, Runtime Diagnostics can find issues in a pinch
Solutions: Reflection 2014; CA Chorus; VFTP 3.0; Lifecycle Manager; STEPLIB-Rx; Ivory VisualConnect; Mainframe Abend Assist; Linux Enterprise Server Starter System for System z
Stop Run: Together, IBM executives Pat Toole Jr. and Pat Toole St. bring more than half a century of dedication to the company
Reference Point - Global Events, Education, Resources for Mainframe
2014 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - July/August 2014 - Intro
IBM Systems Magazine, Mainframe - July/August 2014 - Cover1
IBM Systems Magazine, Mainframe - July/August 2014 - Cover2
IBM Systems Magazine, Mainframe - July/August 2014 - 1
IBM Systems Magazine, Mainframe - July/August 2014 - Table of Contents
IBM Systems Magazine, Mainframe - July/August 2014 - 3
IBM Systems Magazine, Mainframe - July/August 2014 - 4
IBM Systems Magazine, Mainframe - July/August 2014 - 5
IBM Systems Magazine, Mainframe - July/August 2014 - Editor's Desk: Protecting information
IBM Systems Magazine, Mainframe - July/August 2014 - 7
IBM Systems Magazine, Mainframe - July/August 2014 - IBM Perspective: Sunny outlook on the mainframe
IBM Systems Magazine, Mainframe - July/August 2014 - 9
IBM Systems Magazine, Mainframe - July/August 2014 - Techbits: Watson: your personal shopper
IBM Systems Magazine, Mainframe - July/August 2014 - 11
IBM Systems Magazine, Mainframe - July/August 2014 - Infographic: How the mainframe changed our world
IBM Systems Magazine, Mainframe - July/August 2014 - 13
IBM Systems Magazine, Mainframe - July/August 2014 - Partner PoV: ISVs can help mainframe customers keep up with a rapidly evolving environment
IBM Systems Magazine, Mainframe - July/August 2014 - 15
IBM Systems Magazine, Mainframe - July/August 2014 - Focus on Storage: IBM FlashSystem addresses storage and application performance issues
IBM Systems Magazine, Mainframe - July/August 2014 - 17
IBM Systems Magazine, Mainframe - July/August 2014 - 18
IBM Systems Magazine, Mainframe - July/August 2014 - 19
IBM Systems Magazine, Mainframe - July/August 2014 - Currents: As data consumption expands, information protection policies must be put in place
IBM Systems Magazine, Mainframe - July/August 2014 - 21
IBM Systems Magazine, Mainframe - July/August 2014 - 22
IBM Systems Magazine, Mainframe - July/August 2014 - 23
IBM Systems Magazine, Mainframe - July/August 2014 - Case Study: Credit Where Credit's Due: Isracard Group devises a novel way to verify its system integrity before disaster occurs
IBM Systems Magazine, Mainframe - July/August 2014 - 25
IBM Systems Magazine, Mainframe - July/August 2014 - 26
IBM Systems Magazine, Mainframe - July/August 2014 - 27
IBM Systems Magazine, Mainframe - July/August 2014 - 28
IBM Systems Magazine, Mainframe - July/August 2014 - 29
IBM Systems Magazine, Mainframe - July/August 2014 - Cover Story: A Secure Fortress: The mainframe delivers the reliability, safety and cost-effectiveness your IT shop needs
IBM Systems Magazine, Mainframe - July/August 2014 - 31
IBM Systems Magazine, Mainframe - July/August 2014 - 32
IBM Systems Magazine, Mainframe - July/August 2014 - 33
IBM Systems Magazine, Mainframe - July/August 2014 - Feature: Be Proactive in Risk Management: Protecting data is crucial as your business connects in ever-increasing ways along the access superhighway
IBM Systems Magazine, Mainframe - July/August 2014 - 35
IBM Systems Magazine, Mainframe - July/August 2014 - 36
IBM Systems Magazine, Mainframe - July/August 2014 - 37
IBM Systems Magazine, Mainframe - July/August 2014 - Feature: Being Risk-Aware: New IBM and Ponemon study examines the economics of IT risk and reputation
IBM Systems Magazine, Mainframe - July/August 2014 - 39
IBM Systems Magazine, Mainframe - July/August 2014 - 40
IBM Systems Magazine, Mainframe - July/August 2014 - 41
IBM Systems Magazine, Mainframe - July/August 2014 - 42
IBM Systems Magazine, Mainframe - July/August 2014 - 43
IBM Systems Magazine, Mainframe - July/August 2014 - Administrator: Active/Active Sites helps distribute workloads during outages
IBM Systems Magazine, Mainframe - July/August 2014 - 45
IBM Systems Magazine, Mainframe - July/August 2014 - 46
IBM Systems Magazine, Mainframe - July/August 2014 - 47
IBM Systems Magazine, Mainframe - July/August 2014 - Tech Corner: A point-in-time tool, Runtime Diagnostics can find issues in a pinch
IBM Systems Magazine, Mainframe - July/August 2014 - 49
IBM Systems Magazine, Mainframe - July/August 2014 - 50
IBM Systems Magazine, Mainframe - July/August 2014 - 51
IBM Systems Magazine, Mainframe - July/August 2014 - Solutions: Reflection 2014; CA Chorus; VFTP 3.0; Lifecycle Manager; STEPLIB-Rx; Ivory VisualConnect; Mainframe Abend Assist; Linux Enterprise Server Starter System for System z
IBM Systems Magazine, Mainframe - July/August 2014 - 53
IBM Systems Magazine, Mainframe - July/August 2014 - 54
IBM Systems Magazine, Mainframe - July/August 2014 - 55
IBM Systems Magazine, Mainframe - July/August 2014 - Stop Run: Together, IBM executives Pat Toole Jr. and Pat Toole St. bring more than half a century of dedication to the company
IBM Systems Magazine, Mainframe - July/August 2014 - Cover3
IBM Systems Magazine, Mainframe - July/August 2014 - Cover4
IBM Systems Magazine, Mainframe - July/August 2014 - Reference Point - Global Events, Education, Resources for Mainframe
IBM Systems Magazine, Mainframe - July/August 2014 - 2014 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - July/August 2014 - SE2
IBM Systems Magazine, Mainframe - July/August 2014 - SE3
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20201112
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20200910
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20200708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2020mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20191112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/relevantz_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2019mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20181112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2018mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20171112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_sesupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_linuxsupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20161112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/MainframeSecurity
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20151112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910_se
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910
http://www.ibmsystemsmagmainframedigital.com/MFSkills
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506_supp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20141112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_gt_201405
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/BigData
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20131112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20121112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/buyersguide2013
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/ibmsystems_mainframe_2012bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20111112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20101112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910_bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20091112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090506
https://www.nxtbook.com/nxtbooks/ibmsystemsmag/mainframe_20090304
https://www.nxtbookmedia.com