20141112 apps world_no_vid

Post on 31-Jul-2015

130 views 0 download

Tags:

transcript

Mobile: The up and downside of risk “Opportunities multiply as they are seized.”

Sun Tzu

Alliander IT CIO Office Michel de Goede

1. Introduction

1. Introduction

“European electricity consumers have the right to enjoy universal service

that is the right to be supplied with electricity of a specified quality … at

reasonable, easily and clearly comparable and transparent prices.”

1. Introduction

• Electric Vehicles

• Two way traffic

• Smart metering and home automation

• Smart city initiatives

• Smart grid

2. Innovation: sixth Schumpeter / Kondratiev wave of innovation

2. Innovation: The semantic wave?

2. Innovation: Venture capital dry powder

2. Innovation: Predictions are as follows

Source: Sogeti VINT

2. Innovation: And then there is also.....

Source: Sogeti VINT

2. Innovation: Biohackables (implanted bio chip)

Source: Motherboard

2. Innovation: Biohackables (Dean Kamen’s Luke Arm)

Source: Wired

2. Innovation: Biohackables (exoskeleton)

2. Innovation: Biohackables (hearing colour)

Source PSFK

2. Innovation: Augmentables (Motorola wearable computer)

Source Motorola

2. Innovation: Augmentables (Oculus Rift)

2. Innovation: Enchantables (Glow Caps)

Source: Glow Caps

2. Innovation: Swallowables (colonoscopy camera pill)

Source: PSFK

2. Innovation: Swallowables (Google Motorola password pill)

Source: secretsofthefed.com

2. Innovation: Wearables (Hexoskin biometric shirt)

Source: Hexoskin

2. Innovation: Wearables (Google & Motorola’s lie detector tattoo)

Source: PSFK

2. Innovation: Wearables (Bionym Nimy Heartbeat authentication)

Source: Bionym

2. Innovation: Surroundables (Nissan Nismo Watch)

Source: Nissan

The ultimate device is YOU!

Business Processes

4. Security: So here is your Internet of Everything!!!

Virtual World Personal

Devices

Home Automation Operational Technology

IT Connected

Organizations

Crime

3. Security: Gartner 2020 planning assumptions

• 80% of digital access will be shaped by new mobile and non-PC

architectures, up from 5% today.

• 60% of all digital identities interacting with enterprises will come from external

identity providers through a competitive marketplace, up from <10% today.

• over 80% of enterprises will allow unrestricted access to non-critical assets,

up from <5% today, reducing spending on IAM by 25%.

• 70% of all businesses will use attribute-based access control (ABAC) as the

dominant mechanism to protect critical assets, up from <5% today.

• identity analytics and intelligence (IAI) tools will deliver direct business value*

in 60% of enterprises, up from <5% today.

• the Internet of Things will redefine the concept of "identity management" to

include what people own, share, and use.

Source: Gartner (http://events.gartner.com/ja/symposium/eu/symposium/esc25/eventsagenda/details/714)

4. Four measures to master mobile developments

1. Separate systems of engagement (more mobile) from systems of record (more data center) and specify interacions on the interface level. Choose standards.

2. Orchestrate over an increasing number of business partners, devices, protocols and formats

3. Be resilient to all types of risk in the automated landscape under your responsibility

4. Carefully choose your anti lock-in strategy

Speed up!

4. Four measures to master mobile developments

- Separate systems of engagement from systems of record

Internet (open)

Access Management

(access layer) Representation

(presentation layer)

Authorization Management

(application layer)

Application

1

Application

n

May I enter the house?

What goods and services

am I allowed to

use in these rooms?

Any device

Offices (closed)

For which rooms do you

give me the key(s)?

What goods and services

am I allowed to

use in these rooms?

Protocol and data-

format decoupling

such as: Citrix,

HTML 5, JSON, XML,

Sybase SUP and so

on

Application

2 Application

3

Leverage

cloud

© Wim Bouman, Alliander IT

Needs semantics

4. Four measures to master mobile developments

- Orchestrate

Compliance

starts here

4. Four measures to master mobile developments

- Be resilient

Resilience can be obtained by moving away from typical barrier enhancement

risk-measures. Consider the following options:

• Ignore, the ostrich ‘see-no-evil-hear-no-evil’ tactic;

• Accept, the potential impact of some risks may be deemed acceptable to your

organization;

• Reduce, e.g. the potential impact or probability of occurrence of a risk, like the banking

app;

• Transfer, use insurance or subcontracting to transfer potential consequences of risk;

• Avoid, not entering the type of business that may incur potential risk impact deemed too

high;

• Exploit, risk is also an opportunity and high risk investments may yield high returns.

4. Four measures to master mobile developments

- Be resilient

• Counter the ‘wave of appliances’ and lock-in wars with open

source orchestration

• Use standardization to minimize the number of supported

protocols and file formats as much as possible

• Keep risk acceptable

4. Four measures to master mobile developments

- Choose your anti lock-in strategy

The beauty of it all?

• Seize the opportunities of Mobile

• Maximize the upside of risk

Alliander IT CIO Office Michel de Goede

Thank you!