SlideShare une entreprise Scribd logo
1  sur  32
© All rights reserved. Rob Livingstone Advisory Pty Ltd. Unauthorized redistribution prohibited without prior approval.
‘Navigating through the Cloud’ is a Trademark of Rob Livingstone Advisory Pty Ltd.




   Why the systemic risks in Enterprise Cloud
   Computing could cripple your business

   What Every CFO Should Know About Hybrid Cloud


   CFO Summit
   24th October 2012



   ROB LIVINGSTONE
   - PRINCIPAL, Rob Livingstone Advisory Pty Ltd, and
   - Fellow, University of Technology, Sydney, Australia



      navigatingthrougthecloud.com
Agenda



 What I will be covering
1.   Exploring the real definition of Cloud
2.   Scope of this presentation
3.   Systemic vs. Technical risks
4.   Hybrid Cloud is the reality
5.   Adding in mobility
6.   BYOD, or Bring your own Disaster?
7.   Hybrid Cloud + Mobility + BYOD  Systemic Risk?
8.   Standards? Which standards?
9.   Orchestrating the transition
1. Exploring the real definition of Cloud


 The most quoted Definition of
 Cloud:

 “Cloud computing is a model for
 enabling convenient, on-
 demand network access to a
 shared pool of configurable
 computing resources (e.g.
 networks, servers, storage,
 applications, and services) that
 can be rapidly provisioned and
 released with minimal
 management effort or cloud
 provider interaction”
1. Exploring the real definition of Cloud




    The most sensible Definition of Cloud:
“Forget your technical definition of the Cloud, ask
your mom what the Cloud is….
…And what your mother will tell you about the Cloud
is that it means it’s not on my computer.”

Dave Asprey – Global VP, Cloud Security, Trend Micro
‘Navigating through the Cloud ‘ - Podcast Episode 23 rd May 2012
1. Exploring the real definition of Cloud

     The 3 key ‘classic’ Ingredients of Cloud
                              • You’re counting on SaaS vendor in order
                                to provide all the multi-tenancy for your
                                data.
                              • You hope they’ve written their applications
                                well, secure their databases, and so on ….
                              • You’re sharing the database with everyone
                                else.




                                                                    Adoption
                                                                    Greatest
2. Scope of this presentation




                                                           lo   ud
                                                  ci fic C
                                            R  spe re?
                                       Y OU e futu
                                 a p to d in th
                          th is m w an
                     d oes oth no
             H ow es , b
                       iv
              in itiat
2. Scope of this presentation



  • Mission critical, non-commodity, enterprise systems
  • Multi-year investment in a cloud solution
  • Shifting existing enterprise capability to Cloud, (or
    integrating)
  • Mid to large enterprise
  • High security, privacy and confidentiality needs
  • High governance loads and compliance environments
  • Low risk appetite / high failure penalty environments
3. Systemic vs. Technical Risk
3. Systemic vs. Technical Risk

        Inherent Risk Relationship with Cloud
        Service Delivery and Deployment Models

                                                                     http://www.coso.org
                                                                     The Committee of
                                                                     Sponsoring
                                                                     Organizations of the
                                                           lo   ud
                                                     fic C
                                                                     Treadway
                                                  ci
                                               spe re?
                                                                     Commission (COSO)
                                            R
                                         OU e futu
                                                                     is a joint initiative of
                                       Y
                                   p to d in th
                                                                     five private sector
                                 a
                          th is m w an                               organizations and is

                       oes oth no
                                                                     dedicated to providing
                     d
             H ow es , b                                             thought leadership
                       iv
                 itiat
                                                                     through the
              in                                                     development of
                                                                     frameworks and
                                                                     guidance on
                                                                     enterprise risk
                                                                     management, internal
                                                                     control and fraud
                                                                     deterrence
3. Systemic vs. Technical Risk


Systemic Risks
• Taking a systemic view of risk will give you a better perspective of
  the actual risk, rather that what you think the risk might be
• Systemic risks are those with the greatest potential impact as they
  affect the entire system (ie: Organisation, government, country,
  world…)
   • Case in Point: How is that the finance industry, which is one of
      the more regulated, and invests heavily in risk identification,
      mitigation and transference could be the cause of the current
      global financial problems?
• Systemic risk for the enterprise is the silent killer and is often the
  hardest to identify as only a few have a complete, transparent and
  objective overview of the overall enterprise in sufficient detail.
• Mitigation through approaches such as Enterprise Risk Management
  (ERM), origins in fraud, organisational governance, insurance, etc
3. Systemic vs. Technical Risk


 Technical (or functional) Risk
 • Identifying, categorising and ranking technical and functional risks
   is core to conventional IT risk assessment approaches:
    o Risk of a specific event = (Impact x Probability of that event
        occurring) + Risk Adjustment
 • Underpins conventional risk certification frameworks e.g. ISO
   2700X
 • Certification does not necessarily equal security or effectiveness
   of a risk management model
 • Often focusing on the diverse range of technical risks, does not
   account for the interaction between risks.
 • Systemic risks are often more significant than the sum of the
   individual, technical risks
 • Technical risks are the predominant focus for traditional IT shops
4. Hybrid Cloud is the reality

    The 4 flavours of cloud computing – basic attributes
    Public           Private/      Hybrid         Community
                     Internal




•   No control         • You control all     • Combination of 2   • Multiple
•   No ownership       • You may own           or more models       organisations
•   You own data       • You define          • Can be more          share same private
•   Apps stay behind     architecture          complex              cloud infrastructure
                       • You determine       • Need to manage
                         your own security     interfaces,
                         position              integration
4. Hybrid Cloud is the reality


   Hybrid will be the dominant form in the enterprise

  “Within five years, it will be primarily deployed by
  enterprises working in a hybrid mode”. - Gartner


  Gartner "Predicts 2012:
  Cloud Computing Is Becoming a Reality”
  (Published: 8 December 2011 ID:G00226103)
4. Hybrid Cloud is the reality……

         …. As is the potential for complexity….!
                                           • Orchestrating versioning,
                                             change control and rollback
                                           • Life expectancy alignments
                                           • Business Continuity
                                           • Identity Management
                                           • Due diligence
                                           • Forensics /eDiscovery
                                           • BYOD
                                           • Mobility
                                           • Legislative / Jurisdictional
                                  c tion   • Contractual complexity
                            s t ra s ?
                      o f ab risk          ….. To name but a few
                  ayer emic
            h er l syst
      a n ot t he
   d s t a re
A d ha
 …w
4. Hybrid Cloud is the reality……


 Why understanding your Cloud Computing Reference
 Architecture is important in coming to grips with systemic risk
4. Hybrid Cloud is the reality……




                                   Is the Cloud
                                   Broker your IT
                                   Department in
                                   the Cloud?
4. Hybrid Cloud is the reality……


   "Cloud consumers should budget for additional integration
   costs which can range from 10% to 30% — and sometimes as
   high as 50% — of the total cost of cloud IT projects.“

   Gartner Predicts 2012: Cloud Services Brokerage Will Bring New Benefits and
   Planning Challenges - Published: 22 November 2011 G00227370
4. Hybrid Cloud is the reality


   Hybrid cloud can contribute to….
   •Increased vulnerability due to its fragmented
   architecture and larger surface …
   •however if it is properly architected, risks largely
   eliminated by implementing measures such as…
       o Deploying effective policy based key management
         processes
       o Properly segmenting your public and private clouds
       o Encrypting each part of the hybrid Cloud with
         separate keys
       o … amongst other measures
5. Adding in Mobility



    Mobile Devices
    •Are powerful cloud access devices
    •Extend the perimeter of your cloud
    •Disperse the perimeter to your cloud

    Have the potential to increase the vulnerability
    •The compromising of one of these mobile
    devices could be significant and compromise
    your entire cloud.
    •Use policy based key management regimes for
    your data.
6. BYOD or Bring Your Own Disaster?



 BYOD stands for Bring
 Your Own Device,
 •Reflects the increasing
 demands of users and
 organisations of their own
 IT departments to be
 increasingly agile and
 responsive to their needs
 when it comes to iPads,
 tablets and other mobile
 devices.
6. BYOD or Bring Your Own Disaster?


BYOD requires management:
•Deploy Mobile Device Management systems (Remote wipe,
policy enforcement)
•Introduce a non-porous Virtual Desktop environment - No data
can flow between the Cloud system and the mobile device itself
•Containerisation:
    • Segregates corporate from personal data and applications
    • Enforces encryption and prevention of data leakage
       between containers
    • Application / device specific therefore can be a challenge to
       expand across the entire mobile environment for all
       applications.
7 . Hybrid Cloud + Mobility + BYOD  Systemic Risk?




       Is the Systemic risk increased by the combination of:
           – Hybrid Cloud
           – Mobility                                 Yes’
                                              er is ‘
           – BYOD?
                                         answ
                                      he
                                  at t
                              t th
                           ges
                       sug
                  ould
               Iw
8. Standards? Which standards?



 Plethora of forums, industry groups and associations
    –   Cloud Security Alliance
    –   Cloud Standards Customer Council
    –   Distributed Management Task Force (DMTF)
    –   Cloud Management Working Group (CMWG)
    –   The European Telecommunications Standards Institute (ETSI)
    –   National Institute of Standards and Technology (NIST)
    –   Open Grid Forum (OGF)
    –   Object Management Group (OMG)
    –   Open Cloud Consortium (OCC)
    –   Organization for the Advancement of Structured Information Standards (OASIS)
    –   Storage Networking Industry Association (SNIA)
    –   The Open Group
    –   Association for Retail Technology Standards (ARTS)
    –   TM Forum’s Cloud Services Initiative

          Source: cloud-standards.org
8. Standards? Which standards?


•   Compliance standards were originally designed for on-premise IT
    systems and infrastructure that were relatively static
•   Auditing institutions are averse to cutting edge technologies
•   Is your organisation (or parts thereof) standards/compliance driven?
     – Compliance to Standards vs. Unimpeded Innovation based on
        principle of caveat emptor?
•   Regulators not providing much specific and concrete guidance on
    Cloud, however many guidelines exist
9. Orchestrating the Transition
9. Orchestrating the Transition


#1: Adopt an integrated approach to enterprise Cloud
• Standardised, traditional methodologies within specific
    disciplines such as IT security, project management, audit, and
    information security, in and of themselves, can be self limiting.
• Each discipline and/or technology is only really effective when
    applied actively coordinated with the other key moving parts of
    the organisation

   Harmonization of functionally specific methodologies and
    technologies unleashes value and eliminates waste
   Cloud solutions may or may not help!
9. Orchestrating the Transition


 #2: Manage the conflicting messages
 • 24% of CEOs surveyed in the 2012 PWC CEO Survey expect ‘major
     change’.
 • The eighth annual KPMG 2012 Audit Institute Report identified “IT
     Risk and Emerging Technologies” as the second-highest concern for
     audit committees, which is unprecedented in the history of the report.
 • Cloud evangelists see cloud as imperative, others not
 • Rigorously test generic, enterprise Cloud policy statements in the
     context of your business unit, agency or department. Map and
     quantify the gaps

    Develop an effective mechanism for interpreting these messages in
     the context of your organisation
9. Orchestrating the Transition


 #3: Actively identify, embrace and managing shadow IT

 “Shadow IT can create risks of data loss, corruption or misuse, and
    risks of inefficient and disconnected processes and information”
    – Gartner*

     Embrace shadow IT, and define what and what is not eligible to
      be considered enterprise IT
     Develop, socialize and police appropriate policies on the
      selection of Cloud based services, no matter how innocuous for
      your key information assets.
     Elevates systemic risk due to opacity
 *CIO New Year's Resolutions, 2012 ID:G00227785)
9. Orchestrating the Transition


 #4: Identify systemic risks across the organisation

 •   Systemic risks can jeopardise all or parts of the organisation

    Ensure your executives and key decision makers are aware of
     long term, systemic risks
    Federate enterprise IT decisions vs. Managing the systemic risk
    Understand the systemic risks inherent in long lead time IT
     projects where Cloud plays a critical part
    Consider implementing key aspects of Enterprise Risk
     Management (ERM) as they relate to your IT projects and
     initiatives
9. Orchestrating the Transition


 #5: Don’t gloss over complexity
 • Senior LOB managers with agency and/or functional responsibility
     over specific vertical silos of the organisation may underestimate
     the overall complexity of their own organisations as a whole.
 • From a functional perspective, specific methodologies and
     technologies exist to support specific activities, however
     integration can be the Achilles heel for single instance Cloud
     applications.
 • Cost your medium / long term Cloud strategy with rigour.

    Don’t believe that simple IT solutions can paper over underlying
     business complexity. Test assumptions if critical.
ThankYou!


ROB LIVINGSTONE
- Fellow, University of Technology, Sydney
- Principal, Rob Livingstone Advisory Pty Ltd

   W1:      www.rob-livingstone.com
   W2:      www.navigatingthroughthecloud.com
   E:       rob@rob-livingstone.com
   P:       +61 2 8005 1972
   M:       +61 419 632 673
   F:       +61 2 9879 5004
            @rladvisory




                                     © All rights reserved. Rob Livingstone Advisory Pty Ltd ABN 41 146 643 165.
                                     Unauthorized redistribution prohibited without prior approval. ‘Navigating
                                     through the Cloud’ is a Trademark of Rob Livingstone Advisory Pty Ltd.

Contenu connexe

Tendances

Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...Livingstone Advisory
 
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...Livingstone Advisory
 
Career implications for the Business Analyst in the age of digital disruption
Career implications for the Business Analyst in the age of digital disruptionCareer implications for the Business Analyst in the age of digital disruption
Career implications for the Business Analyst in the age of digital disruptionLivingstone Advisory
 
Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?Livingstone Advisory
 
Exploring the opportunities and pitfalls of new and emerging technologies in ...
Exploring the opportunities and pitfalls of new and emerging technologies in ...Exploring the opportunities and pitfalls of new and emerging technologies in ...
Exploring the opportunities and pitfalls of new and emerging technologies in ...Livingstone Advisory
 
Career resilience is the name of the game
Career resilience is the name of the gameCareer resilience is the name of the game
Career resilience is the name of the gameLivingstone Advisory
 
Maximising the opportunities offered by emerging technologies within the chan...
Maximising the opportunities offered by emerging technologies within the chan...Maximising the opportunities offered by emerging technologies within the chan...
Maximising the opportunities offered by emerging technologies within the chan...Livingstone Advisory
 
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Livingstone Advisory
 
Cloud computing implications for project management methodologies
Cloud computing implications for project management methodologiesCloud computing implications for project management methodologies
Cloud computing implications for project management methodologiesLivingstone Advisory
 
Future Tech: How should enterprise avoid the 'success trap' of the next big t...
Future Tech: How should enterprise avoid the 'success trap' of the next big t...Future Tech: How should enterprise avoid the 'success trap' of the next big t...
Future Tech: How should enterprise avoid the 'success trap' of the next big t...Livingstone Advisory
 
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012Livingstone Advisory
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonPatricia M Watson
 
UU innovation masters november 2010
UU innovation masters november 2010UU innovation masters november 2010
UU innovation masters november 2010Tim Willoughby
 
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012 Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012 Livingstone Advisory
 
A future history of content management
A future history of content managementA future history of content management
A future history of content managementJohn Mancini
 
Social business and innovation
Social business and innovationSocial business and innovation
Social business and innovationJohn Mancini
 
McAfee and AIIM Task Force Findings
McAfee and AIIM Task Force FindingsMcAfee and AIIM Task Force Findings
McAfee and AIIM Task Force FindingsJohn Mancini
 
Big data and the challenge of extreme information
Big data and the challenge of extreme informationBig data and the challenge of extreme information
Big data and the challenge of extreme informationJohn Mancini
 
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your OrganizationJesse Wilkins
 

Tendances (20)

Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
 
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...
 
Career implications for the Business Analyst in the age of digital disruption
Career implications for the Business Analyst in the age of digital disruptionCareer implications for the Business Analyst in the age of digital disruption
Career implications for the Business Analyst in the age of digital disruption
 
Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?
 
Exploring the opportunities and pitfalls of new and emerging technologies in ...
Exploring the opportunities and pitfalls of new and emerging technologies in ...Exploring the opportunities and pitfalls of new and emerging technologies in ...
Exploring the opportunities and pitfalls of new and emerging technologies in ...
 
Career resilience is the name of the game
Career resilience is the name of the gameCareer resilience is the name of the game
Career resilience is the name of the game
 
Maximising the opportunities offered by emerging technologies within the chan...
Maximising the opportunities offered by emerging technologies within the chan...Maximising the opportunities offered by emerging technologies within the chan...
Maximising the opportunities offered by emerging technologies within the chan...
 
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
 
Cloud computing implications for project management methodologies
Cloud computing implications for project management methodologiesCloud computing implications for project management methodologies
Cloud computing implications for project management methodologies
 
Future Tech: How should enterprise avoid the 'success trap' of the next big t...
Future Tech: How should enterprise avoid the 'success trap' of the next big t...Future Tech: How should enterprise avoid the 'success trap' of the next big t...
Future Tech: How should enterprise avoid the 'success trap' of the next big t...
 
Thriving in the world of Big Data
Thriving in the world of Big DataThriving in the world of Big Data
Thriving in the world of Big Data
 
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
UU innovation masters november 2010
UU innovation masters november 2010UU innovation masters november 2010
UU innovation masters november 2010
 
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012 Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
 
A future history of content management
A future history of content managementA future history of content management
A future history of content management
 
Social business and innovation
Social business and innovationSocial business and innovation
Social business and innovation
 
McAfee and AIIM Task Force Findings
McAfee and AIIM Task Force FindingsMcAfee and AIIM Task Force Findings
McAfee and AIIM Task Force Findings
 
Big data and the challenge of extreme information
Big data and the challenge of extreme informationBig data and the challenge of extreme information
Big data and the challenge of extreme information
 
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
 

En vedette

Exposing the systemic risks in enterprise cloud computing
Exposing the systemic risks in enterprise cloud computingExposing the systemic risks in enterprise cloud computing
Exposing the systemic risks in enterprise cloud computingLivingstone Advisory
 
Get connected socialmedia_nyu_18april15_part2
Get connected socialmedia_nyu_18april15_part2Get connected socialmedia_nyu_18april15_part2
Get connected socialmedia_nyu_18april15_part2Ethan Chazin MBA
 
Consumer behavior week4_attributes
Consumer behavior week4_attributesConsumer behavior week4_attributes
Consumer behavior week4_attributesEthan Chazin MBA
 
Build a Brand From scratch
Build a Brand From scratchBuild a Brand From scratch
Build a Brand From scratchEthan Chazin MBA
 
Consumer behavior week2_valuesculture
Consumer behavior week2_valuescultureConsumer behavior week2_valuesculture
Consumer behavior week2_valuescultureEthan Chazin MBA
 
Get connected socialmedia_nyu_18april15_part1
Get connected socialmedia_nyu_18april15_part1Get connected socialmedia_nyu_18april15_part1
Get connected socialmedia_nyu_18april15_part1Ethan Chazin MBA
 
20121131 i week liepaja 2012, Art of Resilience
20121131 i week liepaja 2012, Art of Resilience20121131 i week liepaja 2012, Art of Resilience
20121131 i week liepaja 2012, Art of ResilienceAlbert van der Kooij
 
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...Livingstone Advisory
 
Master your marketing PNC talk 19 September 2013
Master your marketing PNC talk 19 September 2013Master your marketing PNC talk 19 September 2013
Master your marketing PNC talk 19 September 2013Ethan Chazin MBA
 
A career in_entrepreneurship_ethan_chazin_31oct2013
A career in_entrepreneurship_ethan_chazin_31oct2013A career in_entrepreneurship_ethan_chazin_31oct2013
A career in_entrepreneurship_ethan_chazin_31oct2013Ethan Chazin MBA
 

En vedette (13)

Exposing the systemic risks in enterprise cloud computing
Exposing the systemic risks in enterprise cloud computingExposing the systemic risks in enterprise cloud computing
Exposing the systemic risks in enterprise cloud computing
 
Get connected socialmedia_nyu_18april15_part2
Get connected socialmedia_nyu_18april15_part2Get connected socialmedia_nyu_18april15_part2
Get connected socialmedia_nyu_18april15_part2
 
Consumer behavior week4_attributes
Consumer behavior week4_attributesConsumer behavior week4_attributes
Consumer behavior week4_attributes
 
Build a Brand From scratch
Build a Brand From scratchBuild a Brand From scratch
Build a Brand From scratch
 
Mktg sales week2_part2
Mktg sales week2_part2Mktg sales week2_part2
Mktg sales week2_part2
 
Consumer behavior week2_valuesculture
Consumer behavior week2_valuescultureConsumer behavior week2_valuesculture
Consumer behavior week2_valuesculture
 
Get connected socialmedia_nyu_18april15_part1
Get connected socialmedia_nyu_18april15_part1Get connected socialmedia_nyu_18april15_part1
Get connected socialmedia_nyu_18april15_part1
 
Mktg sales week2_part2
Mktg sales week2_part2Mktg sales week2_part2
Mktg sales week2_part2
 
Mktg sales week2_part1
Mktg sales week2_part1Mktg sales week2_part1
Mktg sales week2_part1
 
20121131 i week liepaja 2012, Art of Resilience
20121131 i week liepaja 2012, Art of Resilience20121131 i week liepaja 2012, Art of Resilience
20121131 i week liepaja 2012, Art of Resilience
 
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
 
Master your marketing PNC talk 19 September 2013
Master your marketing PNC talk 19 September 2013Master your marketing PNC talk 19 September 2013
Master your marketing PNC talk 19 September 2013
 
A career in_entrepreneurship_ethan_chazin_31oct2013
A career in_entrepreneurship_ethan_chazin_31oct2013A career in_entrepreneurship_ethan_chazin_31oct2013
A career in_entrepreneurship_ethan_chazin_31oct2013
 

Similaire à Why the systemic risks in Enterprise Cloud Computing could cripple your business - What Every CFO Should Know About Hybrid Cloud

Coso erm for cloud computing
Coso erm for cloud computingCoso erm for cloud computing
Coso erm for cloud computingVidipOlhyan
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Troy Marshall
 
RSC - STEM Conference Presentation - 03082012
RSC - STEM Conference Presentation - 03082012RSC - STEM Conference Presentation - 03082012
RSC - STEM Conference Presentation - 03082012Robert Colombo
 
Externalization Trend
Externalization TrendExternalization Trend
Externalization TrendNigel Green
 
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Greataccenture
 
You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!wmetcalf
 
Dell B2B: APT by Brilliant Noise
Dell B2B: APT by Brilliant NoiseDell B2B: APT by Brilliant Noise
Dell B2B: APT by Brilliant NoiseAntony Mayfield
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeUniversity of Geneva
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldNeil Raden
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up EMC
 
How will social technologies affect the future o
How will social technologies affect the future oHow will social technologies affect the future o
How will social technologies affect the future oJohn Mancini
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiebuc
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsDILIPKUMARMONDAL6
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloudsallysogeti
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloudreshmaroberts
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloudreshmaroberts
 

Similaire à Why the systemic risks in Enterprise Cloud Computing could cripple your business - What Every CFO Should Know About Hybrid Cloud (20)

The Logistics of Information
The Logistics of InformationThe Logistics of Information
The Logistics of Information
 
Coso erm for cloud computing
Coso erm for cloud computingCoso erm for cloud computing
Coso erm for cloud computing
 
Cloudsourcing2013
Cloudsourcing2013Cloudsourcing2013
Cloudsourcing2013
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
Resilience in the Cyber Era
Resilience in the Cyber EraResilience in the Cyber Era
Resilience in the Cyber Era
 
RSC - STEM Conference Presentation - 03082012
RSC - STEM Conference Presentation - 03082012RSC - STEM Conference Presentation - 03082012
RSC - STEM Conference Presentation - 03082012
 
Externalization Trend
Externalization TrendExternalization Trend
Externalization Trend
 
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Great
 
You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!
 
Dell B2B: APT by Brilliant Noise
Dell B2B: APT by Brilliant NoiseDell B2B: APT by Brilliant Noise
Dell B2B: APT by Brilliant Noise
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid World
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
 
How will social technologies affect the future o
How will social technologies affect the future oHow will social technologies affect the future o
How will social technologies affect the future o
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teams
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloud
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloud
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloud
 

Plus de Livingstone Advisory

How to setup and lead digital transformation capability (CIOs perspectives)
How to setup and lead digital transformation capability (CIOs perspectives)How to setup and lead digital transformation capability (CIOs perspectives)
How to setup and lead digital transformation capability (CIOs perspectives)Livingstone Advisory
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
 
Influence, Power, Integrity and your career in IT
Influence, Power, Integrity and your career in ITInfluence, Power, Integrity and your career in IT
Influence, Power, Integrity and your career in ITLivingstone Advisory
 
Rob livingstone Canberra Cloud Security Conference Nov 2011
Rob livingstone Canberra Cloud Security Conference Nov 2011 Rob livingstone Canberra Cloud Security Conference Nov 2011
Rob livingstone Canberra Cloud Security Conference Nov 2011 Livingstone Advisory
 
Rob livingstone - Australian Payroll Association's Annual Conference May 2011
Rob livingstone  - Australian Payroll Association's Annual Conference May 2011Rob livingstone  - Australian Payroll Association's Annual Conference May 2011
Rob livingstone - Australian Payroll Association's Annual Conference May 2011Livingstone Advisory
 
Australian Not-for-Profit CIO Forum March 2011 - Rob Livingstone
Australian Not-for-Profit CIO Forum March 2011 - Rob LivingstoneAustralian Not-for-Profit CIO Forum March 2011 - Rob Livingstone
Australian Not-for-Profit CIO Forum March 2011 - Rob LivingstoneLivingstone Advisory
 
Navigating through the cloud SPUSC 2011 -Rob Livingstone Keynote
Navigating through the cloud   SPUSC 2011 -Rob Livingstone KeynoteNavigating through the cloud   SPUSC 2011 -Rob Livingstone Keynote
Navigating through the cloud SPUSC 2011 -Rob Livingstone KeynoteLivingstone Advisory
 

Plus de Livingstone Advisory (7)

How to setup and lead digital transformation capability (CIOs perspectives)
How to setup and lead digital transformation capability (CIOs perspectives)How to setup and lead digital transformation capability (CIOs perspectives)
How to setup and lead digital transformation capability (CIOs perspectives)
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
Influence, Power, Integrity and your career in IT
Influence, Power, Integrity and your career in ITInfluence, Power, Integrity and your career in IT
Influence, Power, Integrity and your career in IT
 
Rob livingstone Canberra Cloud Security Conference Nov 2011
Rob livingstone Canberra Cloud Security Conference Nov 2011 Rob livingstone Canberra Cloud Security Conference Nov 2011
Rob livingstone Canberra Cloud Security Conference Nov 2011
 
Rob livingstone - Australian Payroll Association's Annual Conference May 2011
Rob livingstone  - Australian Payroll Association's Annual Conference May 2011Rob livingstone  - Australian Payroll Association's Annual Conference May 2011
Rob livingstone - Australian Payroll Association's Annual Conference May 2011
 
Australian Not-for-Profit CIO Forum March 2011 - Rob Livingstone
Australian Not-for-Profit CIO Forum March 2011 - Rob LivingstoneAustralian Not-for-Profit CIO Forum March 2011 - Rob Livingstone
Australian Not-for-Profit CIO Forum March 2011 - Rob Livingstone
 
Navigating through the cloud SPUSC 2011 -Rob Livingstone Keynote
Navigating through the cloud   SPUSC 2011 -Rob Livingstone KeynoteNavigating through the cloud   SPUSC 2011 -Rob Livingstone Keynote
Navigating through the cloud SPUSC 2011 -Rob Livingstone Keynote
 

Dernier

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Dernier (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Why the systemic risks in Enterprise Cloud Computing could cripple your business - What Every CFO Should Know About Hybrid Cloud

  • 1. © All rights reserved. Rob Livingstone Advisory Pty Ltd. Unauthorized redistribution prohibited without prior approval. ‘Navigating through the Cloud’ is a Trademark of Rob Livingstone Advisory Pty Ltd. Why the systemic risks in Enterprise Cloud Computing could cripple your business What Every CFO Should Know About Hybrid Cloud CFO Summit 24th October 2012 ROB LIVINGSTONE - PRINCIPAL, Rob Livingstone Advisory Pty Ltd, and - Fellow, University of Technology, Sydney, Australia navigatingthrougthecloud.com
  • 2. Agenda What I will be covering 1. Exploring the real definition of Cloud 2. Scope of this presentation 3. Systemic vs. Technical risks 4. Hybrid Cloud is the reality 5. Adding in mobility 6. BYOD, or Bring your own Disaster? 7. Hybrid Cloud + Mobility + BYOD  Systemic Risk? 8. Standards? Which standards? 9. Orchestrating the transition
  • 3. 1. Exploring the real definition of Cloud The most quoted Definition of Cloud: “Cloud computing is a model for enabling convenient, on- demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or cloud provider interaction”
  • 4. 1. Exploring the real definition of Cloud The most sensible Definition of Cloud: “Forget your technical definition of the Cloud, ask your mom what the Cloud is…. …And what your mother will tell you about the Cloud is that it means it’s not on my computer.” Dave Asprey – Global VP, Cloud Security, Trend Micro ‘Navigating through the Cloud ‘ - Podcast Episode 23 rd May 2012
  • 5. 1. Exploring the real definition of Cloud The 3 key ‘classic’ Ingredients of Cloud • You’re counting on SaaS vendor in order to provide all the multi-tenancy for your data. • You hope they’ve written their applications well, secure their databases, and so on …. • You’re sharing the database with everyone else. Adoption Greatest
  • 6. 2. Scope of this presentation lo ud ci fic C R spe re? Y OU e futu a p to d in th th is m w an d oes oth no H ow es , b iv in itiat
  • 7. 2. Scope of this presentation • Mission critical, non-commodity, enterprise systems • Multi-year investment in a cloud solution • Shifting existing enterprise capability to Cloud, (or integrating) • Mid to large enterprise • High security, privacy and confidentiality needs • High governance loads and compliance environments • Low risk appetite / high failure penalty environments
  • 8. 3. Systemic vs. Technical Risk
  • 9. 3. Systemic vs. Technical Risk Inherent Risk Relationship with Cloud Service Delivery and Deployment Models http://www.coso.org The Committee of Sponsoring Organizations of the lo ud fic C Treadway ci spe re? Commission (COSO) R OU e futu is a joint initiative of Y p to d in th five private sector a th is m w an organizations and is oes oth no dedicated to providing d H ow es , b thought leadership iv itiat through the in development of frameworks and guidance on enterprise risk management, internal control and fraud deterrence
  • 10. 3. Systemic vs. Technical Risk Systemic Risks • Taking a systemic view of risk will give you a better perspective of the actual risk, rather that what you think the risk might be • Systemic risks are those with the greatest potential impact as they affect the entire system (ie: Organisation, government, country, world…) • Case in Point: How is that the finance industry, which is one of the more regulated, and invests heavily in risk identification, mitigation and transference could be the cause of the current global financial problems? • Systemic risk for the enterprise is the silent killer and is often the hardest to identify as only a few have a complete, transparent and objective overview of the overall enterprise in sufficient detail. • Mitigation through approaches such as Enterprise Risk Management (ERM), origins in fraud, organisational governance, insurance, etc
  • 11. 3. Systemic vs. Technical Risk Technical (or functional) Risk • Identifying, categorising and ranking technical and functional risks is core to conventional IT risk assessment approaches: o Risk of a specific event = (Impact x Probability of that event occurring) + Risk Adjustment • Underpins conventional risk certification frameworks e.g. ISO 2700X • Certification does not necessarily equal security or effectiveness of a risk management model • Often focusing on the diverse range of technical risks, does not account for the interaction between risks. • Systemic risks are often more significant than the sum of the individual, technical risks • Technical risks are the predominant focus for traditional IT shops
  • 12. 4. Hybrid Cloud is the reality The 4 flavours of cloud computing – basic attributes Public Private/ Hybrid Community Internal • No control • You control all • Combination of 2 • Multiple • No ownership • You may own or more models organisations • You own data • You define • Can be more share same private • Apps stay behind architecture complex cloud infrastructure • You determine • Need to manage your own security interfaces, position integration
  • 13. 4. Hybrid Cloud is the reality Hybrid will be the dominant form in the enterprise “Within five years, it will be primarily deployed by enterprises working in a hybrid mode”. - Gartner Gartner "Predicts 2012: Cloud Computing Is Becoming a Reality” (Published: 8 December 2011 ID:G00226103)
  • 14. 4. Hybrid Cloud is the reality…… …. As is the potential for complexity….! • Orchestrating versioning, change control and rollback • Life expectancy alignments • Business Continuity • Identity Management • Due diligence • Forensics /eDiscovery • BYOD • Mobility • Legislative / Jurisdictional c tion • Contractual complexity s t ra s ? o f ab risk ….. To name but a few ayer emic h er l syst a n ot t he d s t a re A d ha …w
  • 15. 4. Hybrid Cloud is the reality…… Why understanding your Cloud Computing Reference Architecture is important in coming to grips with systemic risk
  • 16. 4. Hybrid Cloud is the reality…… Is the Cloud Broker your IT Department in the Cloud?
  • 17. 4. Hybrid Cloud is the reality…… "Cloud consumers should budget for additional integration costs which can range from 10% to 30% — and sometimes as high as 50% — of the total cost of cloud IT projects.“ Gartner Predicts 2012: Cloud Services Brokerage Will Bring New Benefits and Planning Challenges - Published: 22 November 2011 G00227370
  • 18. 4. Hybrid Cloud is the reality Hybrid cloud can contribute to…. •Increased vulnerability due to its fragmented architecture and larger surface … •however if it is properly architected, risks largely eliminated by implementing measures such as… o Deploying effective policy based key management processes o Properly segmenting your public and private clouds o Encrypting each part of the hybrid Cloud with separate keys o … amongst other measures
  • 19. 5. Adding in Mobility Mobile Devices •Are powerful cloud access devices •Extend the perimeter of your cloud •Disperse the perimeter to your cloud Have the potential to increase the vulnerability •The compromising of one of these mobile devices could be significant and compromise your entire cloud. •Use policy based key management regimes for your data.
  • 20. 6. BYOD or Bring Your Own Disaster? BYOD stands for Bring Your Own Device, •Reflects the increasing demands of users and organisations of their own IT departments to be increasingly agile and responsive to their needs when it comes to iPads, tablets and other mobile devices.
  • 21. 6. BYOD or Bring Your Own Disaster? BYOD requires management: •Deploy Mobile Device Management systems (Remote wipe, policy enforcement) •Introduce a non-porous Virtual Desktop environment - No data can flow between the Cloud system and the mobile device itself •Containerisation: • Segregates corporate from personal data and applications • Enforces encryption and prevention of data leakage between containers • Application / device specific therefore can be a challenge to expand across the entire mobile environment for all applications.
  • 22. 7 . Hybrid Cloud + Mobility + BYOD  Systemic Risk? Is the Systemic risk increased by the combination of: – Hybrid Cloud – Mobility Yes’ er is ‘ – BYOD? answ he at t t th ges sug ould Iw
  • 23. 8. Standards? Which standards? Plethora of forums, industry groups and associations – Cloud Security Alliance – Cloud Standards Customer Council – Distributed Management Task Force (DMTF) – Cloud Management Working Group (CMWG) – The European Telecommunications Standards Institute (ETSI) – National Institute of Standards and Technology (NIST) – Open Grid Forum (OGF) – Object Management Group (OMG) – Open Cloud Consortium (OCC) – Organization for the Advancement of Structured Information Standards (OASIS) – Storage Networking Industry Association (SNIA) – The Open Group – Association for Retail Technology Standards (ARTS) – TM Forum’s Cloud Services Initiative Source: cloud-standards.org
  • 24. 8. Standards? Which standards? • Compliance standards were originally designed for on-premise IT systems and infrastructure that were relatively static • Auditing institutions are averse to cutting edge technologies • Is your organisation (or parts thereof) standards/compliance driven? – Compliance to Standards vs. Unimpeded Innovation based on principle of caveat emptor? • Regulators not providing much specific and concrete guidance on Cloud, however many guidelines exist
  • 25. 9. Orchestrating the Transition
  • 26. 9. Orchestrating the Transition #1: Adopt an integrated approach to enterprise Cloud • Standardised, traditional methodologies within specific disciplines such as IT security, project management, audit, and information security, in and of themselves, can be self limiting. • Each discipline and/or technology is only really effective when applied actively coordinated with the other key moving parts of the organisation  Harmonization of functionally specific methodologies and technologies unleashes value and eliminates waste  Cloud solutions may or may not help!
  • 27. 9. Orchestrating the Transition #2: Manage the conflicting messages • 24% of CEOs surveyed in the 2012 PWC CEO Survey expect ‘major change’. • The eighth annual KPMG 2012 Audit Institute Report identified “IT Risk and Emerging Technologies” as the second-highest concern for audit committees, which is unprecedented in the history of the report. • Cloud evangelists see cloud as imperative, others not • Rigorously test generic, enterprise Cloud policy statements in the context of your business unit, agency or department. Map and quantify the gaps  Develop an effective mechanism for interpreting these messages in the context of your organisation
  • 28. 9. Orchestrating the Transition #3: Actively identify, embrace and managing shadow IT “Shadow IT can create risks of data loss, corruption or misuse, and risks of inefficient and disconnected processes and information” – Gartner*  Embrace shadow IT, and define what and what is not eligible to be considered enterprise IT  Develop, socialize and police appropriate policies on the selection of Cloud based services, no matter how innocuous for your key information assets.  Elevates systemic risk due to opacity *CIO New Year's Resolutions, 2012 ID:G00227785)
  • 29. 9. Orchestrating the Transition #4: Identify systemic risks across the organisation • Systemic risks can jeopardise all or parts of the organisation  Ensure your executives and key decision makers are aware of long term, systemic risks  Federate enterprise IT decisions vs. Managing the systemic risk  Understand the systemic risks inherent in long lead time IT projects where Cloud plays a critical part  Consider implementing key aspects of Enterprise Risk Management (ERM) as they relate to your IT projects and initiatives
  • 30. 9. Orchestrating the Transition #5: Don’t gloss over complexity • Senior LOB managers with agency and/or functional responsibility over specific vertical silos of the organisation may underestimate the overall complexity of their own organisations as a whole. • From a functional perspective, specific methodologies and technologies exist to support specific activities, however integration can be the Achilles heel for single instance Cloud applications. • Cost your medium / long term Cloud strategy with rigour.  Don’t believe that simple IT solutions can paper over underlying business complexity. Test assumptions if critical.
  • 31.
  • 32. ThankYou! ROB LIVINGSTONE - Fellow, University of Technology, Sydney - Principal, Rob Livingstone Advisory Pty Ltd W1: www.rob-livingstone.com W2: www.navigatingthroughthecloud.com E: rob@rob-livingstone.com P: +61 2 8005 1972 M: +61 419 632 673 F: +61 2 9879 5004 @rladvisory © All rights reserved. Rob Livingstone Advisory Pty Ltd ABN 41 146 643 165. Unauthorized redistribution prohibited without prior approval. ‘Navigating through the Cloud’ is a Trademark of Rob Livingstone Advisory Pty Ltd.

Notes de l'éditeur

  1. (Read them out) So lets get started – by the way if you have questions at any time please feel free to raise your hand.