SlideShare une entreprise Scribd logo
1  sur  28
1
Cloud adoption in Europe
- an analyst's perspective
Mike Davis
Principal Analyst
June 2013
© All images acknowledged
© msmd advisors Ltd 2013
responsive, credible, flexible
2
© msmd advisors Ltd 2013
Running order
The issues around Cloud are not new
The thirst for cloud solutions (to problems)
9 questions and myths that need to be burst
The things businesses haven't thought of
How does legislation impact
Cloud adoption?
EU examples and initiatives
Which legislation?
4
© msmd advisors Ltd 2013
The thirst for and benefits from cloud
adoption
• Rapid adoption – learnt the lessons from web apps
• Rapid updates – without the pain of downtime
• Flex and scale – without “Yee cannot break the laws of
physics Captain”
• Addressed more needs than originally envisaged
• Scales exponentially (within contract and budget)
• Allowed IT to focus on solutions rather than 'plumbing'
• Better uptime than in house
5
These are all Cloud companies by design
© msmd advisors Ltd 2013
6
© msmd advisors Ltd 2013
9 questions/myths about Cloud for
EU CIOs
1. “I won't have control of my data”
2. “What if my provider get hacked?”
3. “How can I trust people I don't know to look after my data?”
4. “How can I be sure of my provider's privacy controls?”
5. “Can you guarantee it will be cheaper?”
6. “We can't use a generic platform, our business is unique, we need
significant customisation of our software to address our business
needs.”
7. “Why shouldn't I keep doing all our processing internally?” (It boosts my
staff numbers, my salary and my profile)
8. “My regulator says I can't have personal data stored outside the country”
9. “All the Cloud service providers are American, thus they are subject to
the Patriot Act and the US Government can size the data.”
7
© msmd advisors Ltd 2013
Control
8
© msmd advisors Ltd 2013
1. “I won't have control of my data”
– Yes you will, and as a corporate entity you still
have responsibility for your data too, no matter
where it is and who is processing/storing on
your behalf. If you are concerned about the
controls, look closer at the contracts and do
better due diligence. Banks and retailers do not
have qualms about security companies
transporting their cash.
9
© msmd advisors Ltd 2013
How secure is cloud?
10
© msmd advisors Ltd 2013
2. “What if my provider gets hacked?”
– There was a recent exercise on social engineering
hacking undertaken by so-called 'ethical hackers'.
Of the 25 well known corporations they targeted, the
majority were ‘captured’ within 15 minutes. The only
successful defendant was Google. Unless you are the
US government, you can't afford to invest in as much
training and infrastructure as a provider.
The real questions to ask are: 'How big is my security
team?' 'How quickly can they respond to a threat?'
More relevantly from a business perspective, 'How
sensitive is the vast majority of information in my
businesses systems?' I refer again to the canteen
menu.
11
© msmd advisors Ltd 2013
3. “How can I trust people I don't
know to look after my data?”
– The question is 'Do you put the database management
and backup responsibility in the hands of people who
work for an organisation, whose only purpose is to
deliver a trusted service? Or to your intern, who is at
best paid the minimum wage (probably nothing at all),
and when his/her partner says “can you come to the
cinema now?” will choose the popcorn over the
mandated procedure'.
12
© msmd advisors Ltd 2013
4. “How can I be sure of my
provider's privacy controls?”
– Because unless you are the intelligence service, they
are better at it than you are. It's their focus and
credibility. Like you they are subject to privacy laws,
and should have the ISO 27001 and equivalent
certification(s) (as should you).
13
© msmd advisors Ltd 2013
What do you NEED to keep private?
Menus for the canteen
Contracts?
Payroll?
Operating manuals?
Sales figures?
Research findings?
Canteen menus?
14
© msmd advisors Ltd 2013
Cloud is cheap!
15
© msmd advisors Ltd 2013
5. “Can you guarantee it will be
cheaper?”
– NO. It should be - because the providers have
economies of scale in terms of hardware, networks,
and expertise. The real business question is 'Can it
give me a better service within my current budget
envelope?'. It should do - because in most instances it
is likely to be more efficient, robust, accessible, and
secure than an on-premise service.
However, just as with the IT Facilities Management
contracts of the 1980/90s beware of the costs of
changes to service/processes/volumes that the
provider will charge. In addition moving to cloud
services is not a 'fire and forget' issue. You need to
have robust and regular monitoring of all areas of the
service provided.
16
© msmd advisors Ltd 2013
6. “We can't use a generic platform,
our business is unique”
– If you move to a cloud service you can take all your
idiosyncrasies with you, but don't expect the service to
be cheaper, because your provider will have to
incorporate and train their staff on all those 'tweaks'.
60% + of the western world uses Google as their
internet search engine, less than 1% of those
customise the interface because the 'vanilla' product
gives them the majority of what they need. The pareto
principle (80-20) applies in information management/IT
just as much as it does in the rest of life.
17
© msmd advisors Ltd 2013
7. “Why shouldn't I keep doing all our
processing internally?”
– Look at the previous 6 answers. Your job security and
progression really depends on addressing the
business needs of your organisation. If you cannot
provide the service the organisation requires, it will find
someone who can.
18
© msmd advisors Ltd 2013
The EU perspective – personal data
19
© msmd advisors Ltd 2013
Data Protection Act 1998 - 8th
principle
“Personal data shall not be transferred to a country or
territory outside the European Economic Area unless
that country or territory ensures an adequate level of
protection for the rights and freedoms of data subjects
in relation to the processing of personal data”.”
20
© msmd advisors Ltd 2013
'No go' zones for cloud adoption?
X
X
X
21
© msmd advisors Ltd 2013
8. “My regulator says I can’t have
personal data stored outside the country”
– So? That becomes an explicit contractual requirement,
a focus of due diligence and then on-going monitoring.
No different technically than stating the cleaning
contractor should wash the toilet floors twice a day.
Chose a provider that can address that requirement,
and remember the geographic restriction only applies
to personal data or that specified by national security.
You can store your canteen menus anywhere in the
world.
22
© msmd advisors Ltd 2013
EU examples and initiatives
23
© msmd advisors Ltd 2013
Whose legislation is going to hold back
cloud adoption?
24
© msmd advisors Ltd 2013
Whose legislation is going to hold back
cloud adoption?
26
© msmd advisors Ltd 2013
9. “All the cloud service providers are
subject the Patriot Act and the US
government can seize the data”
– There are a lot of scare stories around the Act. Yes if
your data is on US soil there is a risk it could be
seized, if it poses a threat to US national security. But
how many businesses will that apply to? More
importantly there are many other providers of managed
services or cloud provision in different geographies
who are not subject to the Act. Look at the real issues
of service delivery and expected outcomes, and as
with all business decisions make pragmatic trade-offs
of the risks and benefits.
27
© msmd advisors Ltd 2013
Issues around cloud adoption
We use procurement models for kit. not services (talk to the
facilities manager)
Bring your own (BYOx) can cause issues (though it shouldn't)
Solution vendors don't like cloud (unless its their own – vertical
integration = margins)
Organisations need to keep/develop in house support (cloud is
VANILLA)
3rd
party add-ons not always available for cloud
Granular Security can present challenges
- apps designed for companies have a specific security mode
Federated security for hybrid not yet addressed
28
Thank you
miked@msmd-advisors.com
www.msmd-advisors.com
@mikemasseydavis
responsive, credible, flexible
© msmd advisors Ltd 2013

Contenu connexe

Tendances

Space to think | Cloud research using Logica futurescope
Space to think | Cloud research using Logica futurescope Space to think | Cloud research using Logica futurescope
Space to think | Cloud research using Logica futurescope
CGI
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
guestd7fc9c
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Doeren Mayhew
 

Tendances (20)

Space to think | Cloud research using Logica futurescope
Space to think | Cloud research using Logica futurescope Space to think | Cloud research using Logica futurescope
Space to think | Cloud research using Logica futurescope
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...
 
When and why to use blockchain technology
When and why to use blockchain technology When and why to use blockchain technology
When and why to use blockchain technology
 
Asean 1017 ezine_14pp
Asean 1017 ezine_14ppAsean 1017 ezine_14pp
Asean 1017 ezine_14pp
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers Perspective
 
10 Practical Tips to Prepare for the New Privacy Shield Era
10 Practical Tips to Prepare for the New Privacy Shield Era10 Practical Tips to Prepare for the New Privacy Shield Era
10 Practical Tips to Prepare for the New Privacy Shield Era
 
The cloud: financial, legal and technical
The cloud: financial, legal and technicalThe cloud: financial, legal and technical
The cloud: financial, legal and technical
 
Regulatory and compliance forum cloud computing for law firms
Regulatory and compliance forum   cloud computing for law firmsRegulatory and compliance forum   cloud computing for law firms
Regulatory and compliance forum cloud computing for law firms
 
Legal challenges of cloud based enterprise 20
Legal challenges of cloud based  enterprise 20Legal challenges of cloud based  enterprise 20
Legal challenges of cloud based enterprise 20
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
IDC on 10 myths regarding GDPR
IDC on 10 myths regarding GDPRIDC on 10 myths regarding GDPR
IDC on 10 myths regarding GDPR
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
 
11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 a11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 a
 
Your clouds must be transparent - an intro to Cloud Security Alliance
Your clouds must be transparent - an intro to Cloud Security AllianceYour clouds must be transparent - an intro to Cloud Security Alliance
Your clouds must be transparent - an intro to Cloud Security Alliance
 
Mobile Devices and Internet of Things
Mobile Devices and Internet of ThingsMobile Devices and Internet of Things
Mobile Devices and Internet of Things
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNA
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For Action
 

En vedette

PostgreSQL Day 2008 - sCORdb Project
PostgreSQL Day 2008 - sCORdb ProjectPostgreSQL Day 2008 - sCORdb Project
PostgreSQL Day 2008 - sCORdb Project
Emanuele Zamprogno
 
Aspetti medico-legali ed etici della stampa 3D in medicina
Aspetti medico-legali ed etici della stampa 3D in medicinaAspetti medico-legali ed etici della stampa 3D in medicina
Aspetti medico-legali ed etici della stampa 3D in medicina
Maria Livia Rizzo
 

En vedette (11)

PostgreSQL Day 2008 - sCORdb Project
PostgreSQL Day 2008 - sCORdb ProjectPostgreSQL Day 2008 - sCORdb Project
PostgreSQL Day 2008 - sCORdb Project
 
La salute e i big data
La salute e i big dataLa salute e i big data
La salute e i big data
 
Big data and analytics
Big data and analyticsBig data and analytics
Big data and analytics
 
Le soluzioni digitali a supporto dei progetti di aderenza versione slideshare
Le soluzioni digitali a supporto dei progetti di aderenza   versione slideshareLe soluzioni digitali a supporto dei progetti di aderenza   versione slideshare
Le soluzioni digitali a supporto dei progetti di aderenza versione slideshare
 
Ball de gitanes per carnetoltes: recuperem la tradició!
Ball de gitanes per carnetoltes: recuperem la tradició!Ball de gitanes per carnetoltes: recuperem la tradició!
Ball de gitanes per carnetoltes: recuperem la tradició!
 
Paralisi cerebrale: orientamenti della giurisprudenza. Una analisi storica de...
Paralisi cerebrale: orientamenti della giurisprudenza. Una analisi storica de...Paralisi cerebrale: orientamenti della giurisprudenza. Una analisi storica de...
Paralisi cerebrale: orientamenti della giurisprudenza. Una analisi storica de...
 
La responsabilità nell'utilizzo di applicazioni di mhealth
La responsabilità nell'utilizzo di applicazioni di mhealthLa responsabilità nell'utilizzo di applicazioni di mhealth
La responsabilità nell'utilizzo di applicazioni di mhealth
 
Come affrontare i rischi per la salute legati alla stampa 3D
Come affrontare i rischi per la salute legati alla stampa 3DCome affrontare i rischi per la salute legati alla stampa 3D
Come affrontare i rischi per la salute legati alla stampa 3D
 
Aspetti medico-legali ed etici della stampa 3D in medicina
Aspetti medico-legali ed etici della stampa 3D in medicinaAspetti medico-legali ed etici della stampa 3D in medicina
Aspetti medico-legali ed etici della stampa 3D in medicina
 
S.M. Iacus - Social Media, Big Data & Statistics
S.M. Iacus - Social Media, Big Data & StatisticsS.M. Iacus - Social Media, Big Data & Statistics
S.M. Iacus - Social Media, Big Data & Statistics
 
The Great State of Design with CSS Grid Layout and Friends
The Great State of Design with CSS Grid Layout and FriendsThe Great State of Design with CSS Grid Layout and Friends
The Great State of Design with CSS Grid Layout and Friends
 

Similaire à Cloud adoption in the EU - and analyst's perspective (revised)

1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
durantheseldine
 
Understanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingUnderstanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud Computing
Janine Anthony Bowen, Esq.
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
Caston Thomas
 
Data issue affrecting Cloud computing
Data issue affrecting Cloud computingData issue affrecting Cloud computing
Data issue affrecting Cloud computing
Martin Bioh
 

Similaire à Cloud adoption in the EU - and analyst's perspective (revised) (20)

#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
 
Is your cloud GDPR compliant?
Is your cloud GDPR compliant?Is your cloud GDPR compliant?
Is your cloud GDPR compliant?
 
10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud
 
Clouds and Chains
Clouds and ChainsClouds and Chains
Clouds and Chains
 
Cloud data security and GDPR compliance
Cloud data security and GDPR complianceCloud data security and GDPR compliance
Cloud data security and GDPR compliance
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdf
 
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Aiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast Briefing
 
Is data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risksIs data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risks
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
 
Understanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingUnderstanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud Computing
 
How Is Your Data Shared? 10 Surprising Stats
How Is Your Data Shared? 10 Surprising StatsHow Is Your Data Shared? 10 Surprising Stats
How Is Your Data Shared? 10 Surprising Stats
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 
Overcoming The Biggest Barriers To Cloud Computing?
Overcoming The Biggest Barriers To Cloud Computing?Overcoming The Biggest Barriers To Cloud Computing?
Overcoming The Biggest Barriers To Cloud Computing?
 
Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
Security with Cloud Computing
Security with Cloud ComputingSecurity with Cloud Computing
Security with Cloud Computing
 
Data issue affrecting Cloud computing
Data issue affrecting Cloud computingData issue affrecting Cloud computing
Data issue affrecting Cloud computing
 

Dernier

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Dernier (20)

The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 

Cloud adoption in the EU - and analyst's perspective (revised)

  • 1. 1 Cloud adoption in Europe - an analyst's perspective Mike Davis Principal Analyst June 2013 © All images acknowledged © msmd advisors Ltd 2013 responsive, credible, flexible
  • 2. 2 © msmd advisors Ltd 2013 Running order The issues around Cloud are not new The thirst for cloud solutions (to problems) 9 questions and myths that need to be burst The things businesses haven't thought of How does legislation impact Cloud adoption? EU examples and initiatives Which legislation?
  • 3.
  • 4. 4 © msmd advisors Ltd 2013 The thirst for and benefits from cloud adoption • Rapid adoption – learnt the lessons from web apps • Rapid updates – without the pain of downtime • Flex and scale – without “Yee cannot break the laws of physics Captain” • Addressed more needs than originally envisaged • Scales exponentially (within contract and budget) • Allowed IT to focus on solutions rather than 'plumbing' • Better uptime than in house
  • 5. 5 These are all Cloud companies by design © msmd advisors Ltd 2013
  • 6. 6 © msmd advisors Ltd 2013 9 questions/myths about Cloud for EU CIOs 1. “I won't have control of my data” 2. “What if my provider get hacked?” 3. “How can I trust people I don't know to look after my data?” 4. “How can I be sure of my provider's privacy controls?” 5. “Can you guarantee it will be cheaper?” 6. “We can't use a generic platform, our business is unique, we need significant customisation of our software to address our business needs.” 7. “Why shouldn't I keep doing all our processing internally?” (It boosts my staff numbers, my salary and my profile) 8. “My regulator says I can't have personal data stored outside the country” 9. “All the Cloud service providers are American, thus they are subject to the Patriot Act and the US Government can size the data.”
  • 7. 7 © msmd advisors Ltd 2013 Control
  • 8. 8 © msmd advisors Ltd 2013 1. “I won't have control of my data” – Yes you will, and as a corporate entity you still have responsibility for your data too, no matter where it is and who is processing/storing on your behalf. If you are concerned about the controls, look closer at the contracts and do better due diligence. Banks and retailers do not have qualms about security companies transporting their cash.
  • 9. 9 © msmd advisors Ltd 2013 How secure is cloud?
  • 10. 10 © msmd advisors Ltd 2013 2. “What if my provider gets hacked?” – There was a recent exercise on social engineering hacking undertaken by so-called 'ethical hackers'. Of the 25 well known corporations they targeted, the majority were ‘captured’ within 15 minutes. The only successful defendant was Google. Unless you are the US government, you can't afford to invest in as much training and infrastructure as a provider. The real questions to ask are: 'How big is my security team?' 'How quickly can they respond to a threat?' More relevantly from a business perspective, 'How sensitive is the vast majority of information in my businesses systems?' I refer again to the canteen menu.
  • 11. 11 © msmd advisors Ltd 2013 3. “How can I trust people I don't know to look after my data?” – The question is 'Do you put the database management and backup responsibility in the hands of people who work for an organisation, whose only purpose is to deliver a trusted service? Or to your intern, who is at best paid the minimum wage (probably nothing at all), and when his/her partner says “can you come to the cinema now?” will choose the popcorn over the mandated procedure'.
  • 12. 12 © msmd advisors Ltd 2013 4. “How can I be sure of my provider's privacy controls?” – Because unless you are the intelligence service, they are better at it than you are. It's their focus and credibility. Like you they are subject to privacy laws, and should have the ISO 27001 and equivalent certification(s) (as should you).
  • 13. 13 © msmd advisors Ltd 2013 What do you NEED to keep private? Menus for the canteen Contracts? Payroll? Operating manuals? Sales figures? Research findings? Canteen menus?
  • 14. 14 © msmd advisors Ltd 2013 Cloud is cheap!
  • 15. 15 © msmd advisors Ltd 2013 5. “Can you guarantee it will be cheaper?” – NO. It should be - because the providers have economies of scale in terms of hardware, networks, and expertise. The real business question is 'Can it give me a better service within my current budget envelope?'. It should do - because in most instances it is likely to be more efficient, robust, accessible, and secure than an on-premise service. However, just as with the IT Facilities Management contracts of the 1980/90s beware of the costs of changes to service/processes/volumes that the provider will charge. In addition moving to cloud services is not a 'fire and forget' issue. You need to have robust and regular monitoring of all areas of the service provided.
  • 16. 16 © msmd advisors Ltd 2013 6. “We can't use a generic platform, our business is unique” – If you move to a cloud service you can take all your idiosyncrasies with you, but don't expect the service to be cheaper, because your provider will have to incorporate and train their staff on all those 'tweaks'. 60% + of the western world uses Google as their internet search engine, less than 1% of those customise the interface because the 'vanilla' product gives them the majority of what they need. The pareto principle (80-20) applies in information management/IT just as much as it does in the rest of life.
  • 17. 17 © msmd advisors Ltd 2013 7. “Why shouldn't I keep doing all our processing internally?” – Look at the previous 6 answers. Your job security and progression really depends on addressing the business needs of your organisation. If you cannot provide the service the organisation requires, it will find someone who can.
  • 18. 18 © msmd advisors Ltd 2013 The EU perspective – personal data
  • 19. 19 © msmd advisors Ltd 2013 Data Protection Act 1998 - 8th principle “Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data”.”
  • 20. 20 © msmd advisors Ltd 2013 'No go' zones for cloud adoption? X X X
  • 21. 21 © msmd advisors Ltd 2013 8. “My regulator says I can’t have personal data stored outside the country” – So? That becomes an explicit contractual requirement, a focus of due diligence and then on-going monitoring. No different technically than stating the cleaning contractor should wash the toilet floors twice a day. Chose a provider that can address that requirement, and remember the geographic restriction only applies to personal data or that specified by national security. You can store your canteen menus anywhere in the world.
  • 22. 22 © msmd advisors Ltd 2013 EU examples and initiatives
  • 23. 23 © msmd advisors Ltd 2013 Whose legislation is going to hold back cloud adoption?
  • 24. 24 © msmd advisors Ltd 2013 Whose legislation is going to hold back cloud adoption?
  • 25.
  • 26. 26 © msmd advisors Ltd 2013 9. “All the cloud service providers are subject the Patriot Act and the US government can seize the data” – There are a lot of scare stories around the Act. Yes if your data is on US soil there is a risk it could be seized, if it poses a threat to US national security. But how many businesses will that apply to? More importantly there are many other providers of managed services or cloud provision in different geographies who are not subject to the Act. Look at the real issues of service delivery and expected outcomes, and as with all business decisions make pragmatic trade-offs of the risks and benefits.
  • 27. 27 © msmd advisors Ltd 2013 Issues around cloud adoption We use procurement models for kit. not services (talk to the facilities manager) Bring your own (BYOx) can cause issues (though it shouldn't) Solution vendors don't like cloud (unless its their own – vertical integration = margins) Organisations need to keep/develop in house support (cloud is VANILLA) 3rd party add-ons not always available for cloud Granular Security can present challenges - apps designed for companies have a specific security mode Federated security for hybrid not yet addressed