SlideShare une entreprise Scribd logo
1  sur  17
WHERE ARE WE TODAY?
Source: Rackspace Hong Kong Cloud Survey
(July 2013)
36% 34% 30%
Private Cloud Public Cloud Hybrid Cloud
General cloud adoption in HK: 84%
The rest are considering transition within 1-2 years
BASIC APPLICATIONS ARE MORE POPULAR
Complex Basic
Source: Rackspace Hong Kong Cloud Survey
(July 2013)
TOP REASONS FOR CLOUD ADOPTION
FULL POTENTIAL NOT YET REALISED
• HK IT market: 4 billion market, 10% cloud adoption?
• New business opportunities and jobs from cloud
adoption
• Increased government investment and facilitation
• SME cloud adoption on the rise
• New technology emerging: Internet of
Things, streaming digital content…
CLOUD STANDARDS
Establishing standards and interoperability
OGCIO:
1. HK/Guangdong Expert Committee on Cloud Computing
Services and Standards
2. Expert Group on Cloud Computing Services and
Standards (EGCCSS)
• Working Group on Cloud Computing Interoperability
Standards
• Study on Cloud Services Assessment Tools and
Certification Schemes
INFRASTRUCTURE – DATA CENTRE
DEVELOPMENT
Availability of land and space
• Greenfield Sites in Open Market: 5 tender proposals
received for TKO site bidding
• Redevelopment of Industrial Buildings for Other Uses
• Wholesale and partial conversion
• HK Science & Technology Parks? Or even
Underground Cavern Sites?
CHALLENGES
SECURITY AND CONTROL
Businesses
•Outsourcing:
How to select
a cloud
vendor?
•How to
maintain
direct control
to safeguard
data integrity?
Cloud service
providers
•How to satisfy
data residency
and privacy
requirements
•How to remain
flexible and
provide cost-
effective
service?
Regulator
•Formulation of
relevant
standards and
practices
•Would
sensitive data
end up
overseas?
Customers/end-
users
•Are my data
safe in the
cloud?
•Would I know
if there is
security or
privacy
breach?
IMPROVING DATA SECURITY AND PRIVACY
Governance Operation
Governance and Enterprise Risk
Management
Traditional Security, Business
Continuity and Disaster Recovery
Legal and Electronic Discovery Data Center Operations
Compliance and Audit Incident Response, Notification and
Remediation
Information Lifecycle Management Application Security
Portability and Interoperability Encryption and Key Management
Identity and Access Management
Virtualization
Source: Security Guidance for Critical Areas of Focus in
Cloud Computing V2.1, Cloud Security Alliance 2009
PRIVACY
Security
Is the data protected from
theft, leakage, spying or
attacks?
What is the level of control
and protection?
Residency
Where is the data stored?
geographically disbursed?
What to do with data in transit
& outside territory?
Privacy
Who can see personally
identifiable information (PII)?
Storing, transferring, locating
and protecting PII
COMPLIANCE WITH REGULATION
• Some countries have laws restricting storage of data outside
their physical country borders:
India, Switzerland, Germany, Australia, South Africa and Canada
• EU: Data Protection Directive; Safe Harbor Principles
• USA: US Patriot Act, 40+ states have breach notification laws
(25 states have exemption for encrypted personal data)
• Canada: Freedom of Information and Protection of Privacy
Act
• Hong Kong?
• Section 33(2)(f) of Personal Data (Privacy) Ordinance,
• Guidelines and information via infocloud.gov.hk
PERFORMANCE AND
IMPLEMENTATION
• Cost of migration: cloud adoption = downsizing?
• System integration with existing infrastructure
• Other costs: business process transformation, infosec
support
• Service level agreements (SLAs): data security and
system availability
• Interface with customers?
WHAT’S NEXT?
• Cloud as the tool for business and process
transformation
• Blurring distinctions between SaaS, PaaS and IaaS
environments
• Level of knowledge of potential cloud customers
• Hong Kong as the Global Cloud Centre?
Charles Mok
Legislative Councillor
(Information Technology)
charles@charlesmok.hk
www.charlesmok.hk
Facebook: Charles Mok B
Twitter: @charlesmok

Contenu connexe

Tendances

FREYA services support FAIR data - Simon Lambert
FREYA services support FAIR data - Simon LambertFREYA services support FAIR data - Simon Lambert
FREYA services support FAIR data - Simon LambertOpenAIRE
 
Leadership project presentation
Leadership project presentationLeadership project presentation
Leadership project presentationLEADERSHIP Project
 
Who Runs the Internet?
Who Runs the Internet?Who Runs the Internet?
Who Runs the Internet?ICANN
 
Aut Presentation V3
Aut Presentation V3Aut Presentation V3
Aut Presentation V3jsymonds
 
II-SDV 2016 IRIX Software Engineering
II-SDV 2016 IRIX Software EngineeringII-SDV 2016 IRIX Software Engineering
II-SDV 2016 IRIX Software EngineeringDr. Haxel Consult
 
The Siloization of the IoT: A Guide out of the App trap
The Siloization of the IoT: A Guide out of the App trapThe Siloization of the IoT: A Guide out of the App trap
The Siloization of the IoT: A Guide out of the App trapArmin Haller
 
II-SDV 2015, 20 - 21 April, in Nice
II-SDV 2015, 20 - 21 April, in NiceII-SDV 2015, 20 - 21 April, in Nice
II-SDV 2015, 20 - 21 April, in NiceDr. Haxel Consult
 
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44Jisc
 
01 i4.0-150218-overview-final
01 i4.0-150218-overview-final01 i4.0-150218-overview-final
01 i4.0-150218-overview-finalJohn Soldatos
 

Tendances (9)

FREYA services support FAIR data - Simon Lambert
FREYA services support FAIR data - Simon LambertFREYA services support FAIR data - Simon Lambert
FREYA services support FAIR data - Simon Lambert
 
Leadership project presentation
Leadership project presentationLeadership project presentation
Leadership project presentation
 
Who Runs the Internet?
Who Runs the Internet?Who Runs the Internet?
Who Runs the Internet?
 
Aut Presentation V3
Aut Presentation V3Aut Presentation V3
Aut Presentation V3
 
II-SDV 2016 IRIX Software Engineering
II-SDV 2016 IRIX Software EngineeringII-SDV 2016 IRIX Software Engineering
II-SDV 2016 IRIX Software Engineering
 
The Siloization of the IoT: A Guide out of the App trap
The Siloization of the IoT: A Guide out of the App trapThe Siloization of the IoT: A Guide out of the App trap
The Siloization of the IoT: A Guide out of the App trap
 
II-SDV 2015, 20 - 21 April, in Nice
II-SDV 2015, 20 - 21 April, in NiceII-SDV 2015, 20 - 21 April, in Nice
II-SDV 2015, 20 - 21 April, in Nice
 
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
 
01 i4.0-150218-overview-final
01 i4.0-150218-overview-final01 i4.0-150218-overview-final
01 i4.0-150218-overview-final
 

En vedette

AWSome Day Hong Kong and Taipei - Opening Keynote
AWSome Day Hong Kong and Taipei - Opening KeynoteAWSome Day Hong Kong and Taipei - Opening Keynote
AWSome Day Hong Kong and Taipei - Opening KeynoteAmazon Web Services
 
Google apps and cloud solutions a google apps reseller
Google apps and cloud solutions a google apps resellerGoogle apps and cloud solutions a google apps reseller
Google apps and cloud solutions a google apps resellerCloud Solutions
 
Data center 2.0: Cloud computing - opportunities or threats to HK IT by Mr. ...
Data center 2.0: Cloud computing  - opportunities or threats to HK IT by Mr. ...Data center 2.0: Cloud computing  - opportunities or threats to HK IT by Mr. ...
Data center 2.0: Cloud computing - opportunities or threats to HK IT by Mr. ...HKISPA
 
Why Hong Kong? Expanding Your Business to Asia.
Why Hong Kong? Expanding Your Business to Asia.Why Hong Kong? Expanding Your Business to Asia.
Why Hong Kong? Expanding Your Business to Asia.Josh Steimle
 
AWS Keynote 1 - AWS Enterprise Summit - Hong Kong
AWS Keynote 1 - AWS Enterprise Summit - Hong KongAWS Keynote 1 - AWS Enterprise Summit - Hong Kong
AWS Keynote 1 - AWS Enterprise Summit - Hong KongAmazon Web Services
 
Intro to Digital Marketing - ClickZ Live Hong Kong 2014
Intro to Digital Marketing - ClickZ Live Hong Kong 2014Intro to Digital Marketing - ClickZ Live Hong Kong 2014
Intro to Digital Marketing - ClickZ Live Hong Kong 2014MWI Hong Kong
 

En vedette (6)

AWSome Day Hong Kong and Taipei - Opening Keynote
AWSome Day Hong Kong and Taipei - Opening KeynoteAWSome Day Hong Kong and Taipei - Opening Keynote
AWSome Day Hong Kong and Taipei - Opening Keynote
 
Google apps and cloud solutions a google apps reseller
Google apps and cloud solutions a google apps resellerGoogle apps and cloud solutions a google apps reseller
Google apps and cloud solutions a google apps reseller
 
Data center 2.0: Cloud computing - opportunities or threats to HK IT by Mr. ...
Data center 2.0: Cloud computing  - opportunities or threats to HK IT by Mr. ...Data center 2.0: Cloud computing  - opportunities or threats to HK IT by Mr. ...
Data center 2.0: Cloud computing - opportunities or threats to HK IT by Mr. ...
 
Why Hong Kong? Expanding Your Business to Asia.
Why Hong Kong? Expanding Your Business to Asia.Why Hong Kong? Expanding Your Business to Asia.
Why Hong Kong? Expanding Your Business to Asia.
 
AWS Keynote 1 - AWS Enterprise Summit - Hong Kong
AWS Keynote 1 - AWS Enterprise Summit - Hong KongAWS Keynote 1 - AWS Enterprise Summit - Hong Kong
AWS Keynote 1 - AWS Enterprise Summit - Hong Kong
 
Intro to Digital Marketing - ClickZ Live Hong Kong 2014
Intro to Digital Marketing - ClickZ Live Hong Kong 2014Intro to Digital Marketing - ClickZ Live Hong Kong 2014
Intro to Digital Marketing - ClickZ Live Hong Kong 2014
 

Similaire à HKCS CCSIG Cloud Executive Forum keynote

It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...David Terrar
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014KBIZEAU
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdprUlf Mattsson
 
Cloud and challenges isacakenya
Cloud and challenges   isacakenyaCloud and challenges   isacakenya
Cloud and challenges isacakenyaTonny Omwansa
 
Big Data: Trends, Applications and Potentials
Big Data: Trends, Applications and PotentialsBig Data: Trends, Applications and Potentials
Big Data: Trends, Applications and PotentialsCharles Mok
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyCharles Mok
 
Smart Grid Solutions( June 2012)
Smart Grid Solutions( June 2012)Smart Grid Solutions( June 2012)
Smart Grid Solutions( June 2012)Berik Dossayev
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsUlf Mattsson
 
Understanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarUnderstanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarCipherCloud
 
ACS cloud discussion paper
ACS cloud discussion paperACS cloud discussion paper
ACS cloud discussion paperRoland Padilla
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptxNguyenNM
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...SLA-Ready Network
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Mark Skilton
 
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersMichael Davis
 
cloud-20deployments-20model-131226165813-phpapp01.pptx
cloud-20deployments-20model-131226165813-phpapp01.pptxcloud-20deployments-20model-131226165813-phpapp01.pptx
cloud-20deployments-20model-131226165813-phpapp01.pptx20DC11NOUFALN
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?Jody Keyser
 

Similaire à HKCS CCSIG Cloud Executive Forum keynote (20)

It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
Cloud and challenges isacakenya
Cloud and challenges   isacakenyaCloud and challenges   isacakenya
Cloud and challenges isacakenya
 
Big Data: Trends, Applications and Potentials
Big Data: Trends, Applications and PotentialsBig Data: Trends, Applications and Potentials
Big Data: Trends, Applications and Potentials
 
Data Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for StandardsData Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for Standards
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and Privacy
 
Smart Grid Solutions( June 2012)
Smart Grid Solutions( June 2012)Smart Grid Solutions( June 2012)
Smart Grid Solutions( June 2012)
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 
Understanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarUnderstanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: Webinar
 
ACS cloud discussion paper
ACS cloud discussion paperACS cloud discussion paper
ACS cloud discussion paper
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
 
Cloud and compliance REX
Cloud and compliance REXCloud and compliance REX
Cloud and compliance REX
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...
 
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
 
cloud-20deployments-20model-131226165813-phpapp01.pptx
cloud-20deployments-20model-131226165813-phpapp01.pptxcloud-20deployments-20model-131226165813-phpapp01.pptx
cloud-20deployments-20model-131226165813-phpapp01.pptx
 
Cloud migration
Cloud migrationCloud migration
Cloud migration
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 

Plus de Charles Mok

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet Charles Mok
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong KongCharles Mok
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionCharles Mok
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇Charles Mok
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationCharles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfCharles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyCharles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsCharles Mok
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital RepressionCharles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and EthicsCharles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdfCharles Mok
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCharles Mok
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdfCharles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldCharles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsCharles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and IdentityCharles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckCharles Mok
 

Plus de Charles Mok (20)

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 

Dernier

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Dernier (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

HKCS CCSIG Cloud Executive Forum keynote

  • 1.
  • 2. WHERE ARE WE TODAY? Source: Rackspace Hong Kong Cloud Survey (July 2013) 36% 34% 30% Private Cloud Public Cloud Hybrid Cloud General cloud adoption in HK: 84% The rest are considering transition within 1-2 years
  • 3. BASIC APPLICATIONS ARE MORE POPULAR Complex Basic Source: Rackspace Hong Kong Cloud Survey (July 2013)
  • 4. TOP REASONS FOR CLOUD ADOPTION
  • 5.
  • 6. FULL POTENTIAL NOT YET REALISED • HK IT market: 4 billion market, 10% cloud adoption? • New business opportunities and jobs from cloud adoption • Increased government investment and facilitation • SME cloud adoption on the rise • New technology emerging: Internet of Things, streaming digital content…
  • 7. CLOUD STANDARDS Establishing standards and interoperability OGCIO: 1. HK/Guangdong Expert Committee on Cloud Computing Services and Standards 2. Expert Group on Cloud Computing Services and Standards (EGCCSS) • Working Group on Cloud Computing Interoperability Standards • Study on Cloud Services Assessment Tools and Certification Schemes
  • 8. INFRASTRUCTURE – DATA CENTRE DEVELOPMENT Availability of land and space • Greenfield Sites in Open Market: 5 tender proposals received for TKO site bidding • Redevelopment of Industrial Buildings for Other Uses • Wholesale and partial conversion • HK Science & Technology Parks? Or even Underground Cavern Sites?
  • 10.
  • 11. SECURITY AND CONTROL Businesses •Outsourcing: How to select a cloud vendor? •How to maintain direct control to safeguard data integrity? Cloud service providers •How to satisfy data residency and privacy requirements •How to remain flexible and provide cost- effective service? Regulator •Formulation of relevant standards and practices •Would sensitive data end up overseas? Customers/end- users •Are my data safe in the cloud? •Would I know if there is security or privacy breach?
  • 12. IMPROVING DATA SECURITY AND PRIVACY Governance Operation Governance and Enterprise Risk Management Traditional Security, Business Continuity and Disaster Recovery Legal and Electronic Discovery Data Center Operations Compliance and Audit Incident Response, Notification and Remediation Information Lifecycle Management Application Security Portability and Interoperability Encryption and Key Management Identity and Access Management Virtualization Source: Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, Cloud Security Alliance 2009
  • 13. PRIVACY Security Is the data protected from theft, leakage, spying or attacks? What is the level of control and protection? Residency Where is the data stored? geographically disbursed? What to do with data in transit & outside territory? Privacy Who can see personally identifiable information (PII)? Storing, transferring, locating and protecting PII
  • 14. COMPLIANCE WITH REGULATION • Some countries have laws restricting storage of data outside their physical country borders: India, Switzerland, Germany, Australia, South Africa and Canada • EU: Data Protection Directive; Safe Harbor Principles • USA: US Patriot Act, 40+ states have breach notification laws (25 states have exemption for encrypted personal data) • Canada: Freedom of Information and Protection of Privacy Act • Hong Kong? • Section 33(2)(f) of Personal Data (Privacy) Ordinance, • Guidelines and information via infocloud.gov.hk
  • 15. PERFORMANCE AND IMPLEMENTATION • Cost of migration: cloud adoption = downsizing? • System integration with existing infrastructure • Other costs: business process transformation, infosec support • Service level agreements (SLAs): data security and system availability • Interface with customers?
  • 16. WHAT’S NEXT? • Cloud as the tool for business and process transformation • Blurring distinctions between SaaS, PaaS and IaaS environments • Level of knowledge of potential cloud customers • Hong Kong as the Global Cloud Centre?
  • 17. Charles Mok Legislative Councillor (Information Technology) charles@charlesmok.hk www.charlesmok.hk Facebook: Charles Mok B Twitter: @charlesmok