Understanding where technology has been, where it is headed, and how it will effect you are imperative in these times, as always. Scott Klososky takes you on a journey into the future of the 'Net.
4. SCOTT KLOSOSKY
Velocity Leadership
Three Leverage Points leaders must apply in
order to grow organizations with velocity...
5. SCOTT KLOSOSKY
Velocity Leadership
Three Leverage Points leaders must apply in
order to grow organizations with velocity...
Learn to better “see” future trends
6. SCOTT KLOSOSKY
Velocity Leadership
Three Leverage Points leaders must apply in
order to grow organizations with velocity...
Learn to better “see” future trends
Build sophisticated digital plumbing
7. SCOTT KLOSOSKY
Velocity Leadership
Three Leverage Points leaders must apply in
order to grow organizations with velocity...
Learn to better “see” future trends
Build sophisticated digital plumbing
Insure uptime, security and
speed
26. 4
SCOTT KLOSOSKY
Cloud Computing
Mainframes with tethered terminals. 1950
IT department control
Personal computers completely untethered. 1980
Partial IT department control
27. 4
SCOTT KLOSOSKY
Cloud Computing
Mainframes with tethered terminals. 1950
IT department control
Personal computers completely untethered. 1980
Partial IT department control
Cloud computing applications 2008
untethered.
IT department has even less control
32. 5
SCOTT KLOSOSKY
usiness Intelligence Layer
Custom reports and individualized Valuable
dashboards
33. 5
SCOTT KLOSOSKY
usiness Intelligence Layer
Rules platform with automated actions Game
that trigger on prescribed events Changing
Custom reports and individualized Valuable
dashboards
34. 5
SCOTT KLOSOSKY
usiness Intelligence Layer
Artificial intelligence (non sentient) Imperative
Rules platform with automated actions Game
that trigger on prescribed events Changing
Custom reports and individualized Valuable
dashboards
35. 5
Red
Core
u
Data ndant s
stem
Sy
Cen
ter
Auto s/
ient ers
mat Cl
ed W m
usto
orkfl c
ow
SaaS
rs
endo Appl
icati
V ons
•Real time
Acct
•Event
tracking
•Rules engine
Mas
h Up
Data
Feed
s
36. 5
SCOTT KLOSOSKY
Your Personal
Red
Core
eCommunity
u
Data ndant s
stem
Sy
Cen
ter
Auto s/
ient ers
mat Cl
ed W m
usto
orkfl c
ow
SaaS
rs
endo Appl
icati
V ons
•Real time
Acct
•Event
tracking
•Rules engine
Mas
h Up
Data
Feed
s
37. 5
SCOTT KLOSOSKY
Your Personal
Red
Core
eCommunity
u
Data ndant s
stem
Sy
Cen
ter
Auto s/
ient ers
mat Cl
ed W m
usto
orkfl c
ow
SaaS
rs
endo Appl
icati
V ons
•Real time
Acct
•Event
tracking
•Rules engine
Mas
h Up
Data
Feed
s
47. SCOTT KLOSOSKY
The Current State of
Security
We Strike Data
Galore... by Avi Baumstein
Are peer to peer networks
really filled with sensitive
corporate data just waiting
to be lucked and abused?
Information Week, March 17,
2008
48. SCOTT KLOSOSKY
The Current State of
Security
We Strike Data
Galore... by Avi Baumstein
Are peer to peer networks
really filled with sensitive
corporate data just waiting
to be lucked and abused?
Information Week, March 17,
2008
49. SCOTT KLOSOSKY
The Current State of
Security
We Strike Data
Galore... by Avi Baumstein
Are peer to peer networks
really filled with sensitive
corporate data just waiting
to be lucked and abused?
Information Week, March 17,
2008
50. SCOTT KLOSOSKY
The Current State of
Security
We Strike Data
Galore... by Avi Baumstein
Are peer to peer networks
really filled with sensitive
corporate data just waiting
to be lucked and abused?
Information Week, March 17,
2008
51.
52. SCOTT KLOSOSKY
The Cost of Poor
Security
1. Damage to customer
relationships
2. Damage to overall credibility
3. Legal ramifications can be
Note - According to analyst firm IDC, about 70% of all
successful attacks on computer networks were
costly
carried out by employees and insiders.
53. SCOTT KLOSOSKY
The Cost of Poor
Security
1. Damage to customer
relationships
2. Damage to overall credibility
3. Legal ramifications can be
Note - According to analyst firm IDC, about 70% of all
successful attacks on computer networks were
costly
carried out by employees and insiders.
54. SCOTT KLOSOSKY
The Cost of Poor
Security
1. Damage to customer
relationships
2. Damage to overall credibility
3. Legal ramifications can be
Note - According to analyst firm IDC, about 70% of all
successful attacks on computer networks were
costly
carried out by employees and insiders.
55. SCOTT KLOSOSKY
The Cost of Poor
Security
1. Damage to customer
relationships
2. Damage to overall credibility
3. Legal ramifications can be
Note - According to analyst firm IDC, about 70% of all
successful attacks on computer networks were
costly
carried out by employees and insiders.
56. ✓ Only 6 percent of companies suering from a catastrophic
data loss survive, while 43 percent never reopen and 51
percent close within two years. Research by the University of Texas
✓ The survival rate for companies without a disaster
recovery plan is less than 10%! According to a recent Touche Ross
study
✓ Only 35 percent of Small/Medium Businesses have a
comprehensive disaster recovery plan in place. Research by
Gartner
✓ Companies lose an average of $84,000 for every hour of
downtime. Research by International Data Corp
✓ Man-made disasters aect 10% of small businesses,
whereas natural disasters have impacted more than 30% of
all small businesses in the USA. According to a recent NFIB National
Small Business Poll
✓ 40% of senior IT executives reported having a business
continuity plan, but hadn’t tested it within the past 12
months. According to Telephony Online
57. Business
Continuity
✓ Only 6 percent of companies suering from a catastrophic
data loss survive, while 43 percent never reopen and 51
percent close within two years. Research by the University of Texas
✓ The survival rate for companies without a disaster
recovery plan is less than 10%! According to a recent Touche Ross
study
✓ Only 35 percent of Small/Medium Businesses have a
comprehensive disaster recovery plan in place. Research by
Gartner
✓ Companies lose an average of $84,000 for every hour of
downtime. Research by International Data Corp
✓ Man-made disasters aect 10% of small businesses,
whereas natural disasters have impacted more than 30% of
all small businesses in the USA. According to a recent NFIB National
Small Business Poll
✓ 40% of senior IT executives reported having a business
continuity plan, but hadn’t tested it within the past 12
months. According to Telephony Online
58. Business
Continuity
✓ Only 6 percent of companies suering from a catastrophic
data loss survive, while 43 percent never reopen and 51
percent close within two years. Research by the University of Texas
✓ The survival rate for companies without a disaster
recovery plan is less than 10%! According to a recent Touche Ross
study
✓ Only 35 percent of Small/Medium Businesses have a
comprehensive disaster recovery plan in place. Research by
Gartner
✓ Companies lose an average of $84,000 for every hour of
downtime. Research by International Data Corp
✓ Man-made disasters aect 10% of small businesses,
whereas natural disasters have impacted more than 30% of
all small businesses in the USA. According to a recent NFIB National
Small Business Poll
✓ 40% of senior IT executives reported having a business
continuity plan, but hadn’t tested it within the past 12
months. According to Telephony Online
62. SCOTT KLOSOSKY
Business Continuity Realities
It is not a matter of “if” - it is a
matter of “when” you will be
impacted by an event
It is no longer feasible to allow data or
software applications to be at any kind
of risk because your customers have
many choices
63. SCOTT KLOSOSKY
Business Continuity Realities
It is not a matter of “if” - it is a
matter of “when” you will be
impacted by an event
It is no longer feasible to allow data or
software applications to be at any kind
of risk because your customers have
many choices
At the moment you find out you were
not properly prepared, it is too late -
and no excuse will be good enough
66. SCOTT KLOSOSKY
Five Steps to BC
1 - Understand what data and systems
are critical to business continuity
67. SCOTT KLOSOSKY
Five Steps to BC
1 - Understand what data and systems
are critical to business continuity
2 - Identify and fix single points of failure
in your network, business processes, and
68. SCOTT KLOSOSKY
Five Steps to BC
1 - Understand what data and systems
are critical to business continuity
2 - Identify and fix single points of failure
in your network, business processes, and
3 - Create a workforce continuity
plan
69. SCOTT KLOSOSKY
Five Steps to BC
1 - Understand what data and systems
are critical to business continuity
2 - Identify and fix single points of failure
in your network, business processes, and
3 - Create a workforce continuity
plan
4 - Create a disaster recovery plan
70. SCOTT KLOSOSKY
Five Steps to BC
1 - Understand what data and systems
are critical to business continuity
2 - Identify and fix single points of failure
in your network, business processes, and
3 - Create a workforce continuity
plan
4 - Create a disaster recovery plan
5 - Regularly train your sta on disaster
response
71.
72. “A rock pile ceases to be a rock pile
the moment a single person
contemplates it, bearing within them
the image of a cathedral.”
73.
74. SCOTT KLOSOSKY
Resources
Subscribe to www.technologystory.com
Give me a business card with Newsletter on it
This PowerPoint
Give me a business card
with PowerPoint written
on it