33
Mobile: The up and downside of risk “Opportunities multiply as they are seized.” Sun Tzu Alliander IT CIO Office Michel de Goede

20141112 apps world_no_vid

Embed Size (px)

Citation preview

Page 1: 20141112 apps world_no_vid

Mobile: The up and downside of risk “Opportunities multiply as they are seized.”

Sun Tzu

Alliander IT CIO Office Michel de Goede

Page 2: 20141112 apps world_no_vid

1. Introduction

Page 3: 20141112 apps world_no_vid

1. Introduction

“European electricity consumers have the right to enjoy universal service

that is the right to be supplied with electricity of a specified quality … at

reasonable, easily and clearly comparable and transparent prices.”

Page 4: 20141112 apps world_no_vid

1. Introduction

• Electric Vehicles

• Two way traffic

• Smart metering and home automation

• Smart city initiatives

• Smart grid

Page 5: 20141112 apps world_no_vid

2. Innovation: sixth Schumpeter / Kondratiev wave of innovation

Page 6: 20141112 apps world_no_vid

2. Innovation: The semantic wave?

Page 7: 20141112 apps world_no_vid

2. Innovation: Venture capital dry powder

Page 8: 20141112 apps world_no_vid

2. Innovation: Predictions are as follows

Source: Sogeti VINT

Page 9: 20141112 apps world_no_vid

2. Innovation: And then there is also.....

Source: Sogeti VINT

Page 10: 20141112 apps world_no_vid

2. Innovation: Biohackables (implanted bio chip)

Source: Motherboard

Page 11: 20141112 apps world_no_vid

2. Innovation: Biohackables (Dean Kamen’s Luke Arm)

Source: Wired

Page 12: 20141112 apps world_no_vid

2. Innovation: Biohackables (exoskeleton)

Page 13: 20141112 apps world_no_vid

2. Innovation: Biohackables (hearing colour)

Source PSFK

Page 14: 20141112 apps world_no_vid

2. Innovation: Augmentables (Motorola wearable computer)

Source Motorola

Page 15: 20141112 apps world_no_vid

2. Innovation: Augmentables (Oculus Rift)

Page 16: 20141112 apps world_no_vid

2. Innovation: Enchantables (Glow Caps)

Source: Glow Caps

Page 17: 20141112 apps world_no_vid

2. Innovation: Swallowables (colonoscopy camera pill)

Source: PSFK

Page 18: 20141112 apps world_no_vid

2. Innovation: Swallowables (Google Motorola password pill)

Source: secretsofthefed.com

Page 19: 20141112 apps world_no_vid

2. Innovation: Wearables (Hexoskin biometric shirt)

Source: Hexoskin

Page 20: 20141112 apps world_no_vid

2. Innovation: Wearables (Google & Motorola’s lie detector tattoo)

Source: PSFK

Page 21: 20141112 apps world_no_vid

2. Innovation: Wearables (Bionym Nimy Heartbeat authentication)

Source: Bionym

Page 22: 20141112 apps world_no_vid

2. Innovation: Surroundables (Nissan Nismo Watch)

Source: Nissan

Page 23: 20141112 apps world_no_vid

The ultimate device is YOU!

Page 24: 20141112 apps world_no_vid

Business Processes

4. Security: So here is your Internet of Everything!!!

Virtual World Personal

Devices

Home Automation Operational Technology

IT Connected

Organizations

Crime

Page 25: 20141112 apps world_no_vid

3. Security: Gartner 2020 planning assumptions

• 80% of digital access will be shaped by new mobile and non-PC

architectures, up from 5% today.

• 60% of all digital identities interacting with enterprises will come from external

identity providers through a competitive marketplace, up from <10% today.

• over 80% of enterprises will allow unrestricted access to non-critical assets,

up from <5% today, reducing spending on IAM by 25%.

• 70% of all businesses will use attribute-based access control (ABAC) as the

dominant mechanism to protect critical assets, up from <5% today.

• identity analytics and intelligence (IAI) tools will deliver direct business value*

in 60% of enterprises, up from <5% today.

• the Internet of Things will redefine the concept of "identity management" to

include what people own, share, and use.

Source: Gartner (http://events.gartner.com/ja/symposium/eu/symposium/esc25/eventsagenda/details/714)

Page 26: 20141112 apps world_no_vid

4. Four measures to master mobile developments

1. Separate systems of engagement (more mobile) from systems of record (more data center) and specify interacions on the interface level. Choose standards.

2. Orchestrate over an increasing number of business partners, devices, protocols and formats

3. Be resilient to all types of risk in the automated landscape under your responsibility

4. Carefully choose your anti lock-in strategy

Speed up!

Page 27: 20141112 apps world_no_vid

4. Four measures to master mobile developments

- Separate systems of engagement from systems of record

Internet (open)

Access Management

(access layer) Representation

(presentation layer)

Authorization Management

(application layer)

Application

1

Application

n

May I enter the house?

What goods and services

am I allowed to

use in these rooms?

Any device

Offices (closed)

For which rooms do you

give me the key(s)?

What goods and services

am I allowed to

use in these rooms?

Protocol and data-

format decoupling

such as: Citrix,

HTML 5, JSON, XML,

Sybase SUP and so

on

Application

2 Application

3

Leverage

cloud

Page 28: 20141112 apps world_no_vid

© Wim Bouman, Alliander IT

Needs semantics

4. Four measures to master mobile developments

- Orchestrate

Compliance

starts here

Page 29: 20141112 apps world_no_vid

4. Four measures to master mobile developments

- Be resilient

Page 30: 20141112 apps world_no_vid

Resilience can be obtained by moving away from typical barrier enhancement

risk-measures. Consider the following options:

• Ignore, the ostrich ‘see-no-evil-hear-no-evil’ tactic;

• Accept, the potential impact of some risks may be deemed acceptable to your

organization;

• Reduce, e.g. the potential impact or probability of occurrence of a risk, like the banking

app;

• Transfer, use insurance or subcontracting to transfer potential consequences of risk;

• Avoid, not entering the type of business that may incur potential risk impact deemed too

high;

• Exploit, risk is also an opportunity and high risk investments may yield high returns.

4. Four measures to master mobile developments

- Be resilient

Page 31: 20141112 apps world_no_vid

• Counter the ‘wave of appliances’ and lock-in wars with open

source orchestration

• Use standardization to minimize the number of supported

protocols and file formats as much as possible

• Keep risk acceptable

4. Four measures to master mobile developments

- Choose your anti lock-in strategy

Page 32: 20141112 apps world_no_vid

The beauty of it all?

• Seize the opportunities of Mobile

• Maximize the upside of risk

Page 33: 20141112 apps world_no_vid

Alliander IT CIO Office Michel de Goede

Thank you!