The Cloud is inherently more secure and resilient than any communication and storage medium we have created before, but only if we exploit the new degrees of freedom for fixed, mobile, sporadic, visible and invisible modes of operation. Not all clouds are equal and neither is all data, and parsed storage, anonymity, and unpredictable communication can also be augmented by multiple disconnected providers.
The era of IT Departments providing centralized networking and security is drawing to a close and it is time to think anew our operations to improve efficiency, security and resilience. We should be judging the merits of outsourced Cloud provision and preparing to embrace the considerable opportunities presented by a growing BYOD (Bring Your Own Device) culture.
2. Cloud
Computing
Demands a mindset change in
the way we think about connectivity,
security, networking, applications, storage,
working practices,...........innovation and freedom
Sunday, 17 February 13
4. Huge
Centralized
System Programs
have a history of under delivery
very high costs & cannot
meet our varied and
dynamic future
needs
Sunday, 17 February 13
5. Cloud Growth 600M
500M
400M
300M
200M
100M
08 09 10 11 12
Sunday, 17 February 13
6. Cloud Growth 600M
Subscriptions 500M
400M
300M
200M
100M
08 09 10 11 12
Sunday, 17 February 13
8. The era of siting at a desk using a corporate PC is
fast coming to an end....it is no longer tenable...
Sunday, 17 February 13
9. The era of siting at a desk using a corporate PC is
fast coming to an end....it is no longer tenable...
Computing power, creativity and innovation, is migrating
to the periphery, toward the individual,
and it is going global...
Sunday, 17 February 13
10. Things on line
âą cars
âą food
âą tools
âą ofïŹces
âą homes
âą clothing
âą appliances
âą consumables
Sunday, 17 February 13
11. Tagging and
tracking for life ?
Sunday, 17 February 13
12. Tagging and
tracking for life ?
Cradle
Limited to Pretty
Grave
information
Data
Jewellery
Sunday, 17 February 13
13. Some sectors are
getting there faster than
others...
...driven by costs, safety,
the green agenda...
...logistics, competition,
.
customer expectation...
t
Sunday, 17 February 13
15. New generationsChange
have never
connected a computer to
anything with
a wire...
Can we identify the biggest movers and shakers ?
...other than for power
Sunday, 17 February 13
16. New generations have never
connected a computer to
anything with
a wire...
...other than for power
Sunday, 17 February 13
17. They are at one with technology
...it is their norm, their tool set,
New generations have never
and they see life has having no
connected a computer to
boundaries..
anything with
a wire...
...other than for power
Sunday, 17 February 13
18. They are at one with technology
...it is their norm, their tool set,
New generations have never
and they see life has having no
connected a computer to
boundaries..
anything with
a wire...
The are open
to the new
Change is
their
...other than for power
normality
Sunday, 17 February 13
22. The Young
created
eGames
TXT & IM
MP3 Market
Social Nets
Social Selling
Social Working
Open everything
+++++
And of course....
Sunday, 17 February 13
28. Cloud Computing
Inherently more secure than anything we
have experienced before
Sunday, 17 February 13
29. Cloud Computing
More resilient than anything we
have experienced before
Sunday, 17 February 13
30. Cloud Computing
More cost
effective than
anything we have
seen before
Sunday, 17 February 13
31. Cloud Computing
More empowering than
anything we have
had before
Sunday, 17 February 13
32. Rafts of capable âtech savvy and hardware equippedâ
young people are entering the work force and by-
pass corporate culture and IT Departments
Sunday, 17 February 13
33. They see IT as
âpersonalâ and not
âcorporateâ -
They think work and act
differently...
Sunday, 17 February 13
34. They see IT as
âpersonalâ and not
âcorporateâ -
They think work and act
differently...
They create new fast and
innovative companies
and operations...
...rather th
an wo rk in the old compan ies and cultures
Sunday, 17 February 13
35. AND they freely move their work from
the the corporate world to theirs
using Sticks, eMail, DropBox,
The Cloud, and ++++
The security
implications are
obvious but easy to
obviate....
...but the practice presents a clear
and present danger to companies
and organization not up to speed
Sunday, 17 February 13
36. For the young
(of mind) social
networking is a
vital tool... ...they donât
eMail, they TXT
and IM !
...they donât
conceal or
hide they
share !
Sunday, 17 February 13
37. For the young
(of mind) social
networking is a
vital tool... ...they donât
...as is their choice of eMail, they TXT
equipment, apps, and IM !
web sites and
ways of working... ...they donât
conceal or
hide they
share !
Sunday, 17 February 13
38. They represent a new,
ïŹexible and capable
workforce - in any
high tech, high
value economy
Sunday, 17 February 13
39. In n o v a t io n
is moving to
the edge...
...to become
a globally
n e t w o r ke d
activity...
...that is far more available, immediate,
c apable, and dynamic ...
Sunday, 17 February 13
41. Problem solving, skills
and timely ability are
starting to out rank pure
academic attainment !
Sunday, 17 February 13
42. Management attitudes, working and operational
practices, will have to change if
companies are to compete on
the world stage ...
Sunday, 17 February 13
43. The biggest worry
and the even bigger
opportunity ?
Sunday, 17 February 13
44. There have never been
so many threats, attack
opportunities...
..and defense
weaknesses
Sunday, 17 February 13
45. And the attck surface has
never been as large and
vulnerable
Sunday, 17 February 13
46. We need to be far more
more sophisticated than
relying on ïŹrewalls
Sunday, 17 February 13
47. are always the
biggest
People risk Alw ays !
Sunday, 17 February 13
48. No Hierarchy
âïŹat structures give
few if any cluesâ
Sunday, 17 February 13
50. Cloud Computing - New degrees of
freedom !
- No single log-on device
- No single log-on location
- Variable log-on routine
- Distributed applications
- Distributed ïŹling system
- Parsed and distributed data
- Multiple clouds and providers
- Dynamic creation of clouds
- Dynamic cloud interconnection
- Inter-cloud encryption and coding
- Corporate strength security for all
- Real time global response to all threats
Sunday, 17 February 13
51. Dynam
ic addres
ing is a
v
ailable
s
comme
r
cially
Sunday, 17 February 13
52. The Dark Sideâs biggest
friend is the time to:
- detect
- affect
- repair
- repel
The slower our response time the
greater the damage and the
accumulating threat
Sunday, 17 February 13
53. We have to
reduce the
opportunity
surface and
time available to
The Dark Side
we have no
choice, we have to take action...
Sunday, 17 February 13
54. A moving target
is much harder
to hit !
Sunday, 17 February 13
55. A moving target
is much harder
to hit ! The Cloud
is dynamic
in form, location,
content, connect, .
people, things
Sunday, 17 February 13
56. Half Lives
of
knowledge,
data,
info,
and
location,
connection,
is going to
get much shorter
Sunday, 17 February 13
58. Different Devices
- OS ?
- Apps ?
- log on
- coding
- encryption
Compounded by
time
location
network
protocol
provider
Sunday, 17 February 13
59. Parsed & encrypted data
streams to and from
multiple clouds
...are incredibly difïŹcult/
impossible to intercept and decode...
Sunday, 17 February 13
60. Files distributed
over multiple
global servers with
regular/irregular
parsing, and multi -
encrypted data...is
even harder!
Sunday, 17 February 13
62. Or are they in the little league ?
- Unsure
- Unaware
- Uninformed
- Underpowered
- Blissfully ignorant
Pre - occupied by:
OfïŹce upgrades
LAN provision
Old services
Operations
+++
Sunday, 17 February 13
63. Wouldnât they
be far better
employed in
instrumenting
the company,
modeling, and
d e c i s i o n
support ?
Sunday, 17 February 13
64. And what are
they doing in
big data - it is
a really big
oppor tunity
space !
Sunday, 17 February 13
66. The Big Threat is now gov
agencies and criminal
organizations with
huge budgets,
resources,
people,
tech
Sunday, 17 February 13
67. Who has the capability?
$Bns
Relative Capability Money & Machines 10,000
1000
$Ms
100
$10ks
10
$ks
1
Hacker Hacker Criminal Government
Individual Group Group Agencies
Dedicated People Numbers
Headlines Invisible
Sunday, 17 February 13
68. The sophistication of StuxNet and Flame
surprised industry and governments ...and they
marked the start of a new era...
Sunday, 17 February 13
69. Fen
din
go
dem ff su
and ch t
tha sm hre
n in ore ats
gen divi
era dua capa
lly m l c bilit
uste orps y
r can
Sunday, 17 February 13
70. Global cooperation will
be required, to develop
solution of military
grade +++
Sunday, 17 February 13
71. The DIY
companies
will not
survive...
Sunday, 17 February 13
72. Malware is now open code for
free or a modest price from
multiple sources...
...it is also breeding by
the hand of man and by
a digital life force we
created...
Sunday, 17 February 13
73. âSpeed is the essence of war. Take advantage of the
enemy's unpreparedness; travel by unexpected routes
and strike him where he has taken no precautionsâ
The Art of War by Sun Tzu, 600 BC
âIt is fatal to enter any war
without the will to win itâ
Sunday, 17 February 13
74. âSpeed is the essence of war. Take advantage of the
enemy's unpreparedness; travel by unexpected routes
and strike him where he has taken no precautionsâ
The Art of War by Sun Tzu, 600 BC
âIt is fatal to enter any war
without the will to win itâ
General Douglas McArthur
Sunday, 17 February 13
75. To survive,prosper
and win this war we
have to think and act
d i f fe re n t ly w h i l s t
leveraging new and
the novel...including
the cooperative scale
and disruption inherent
The Cloud...
Sunday, 17 February 13
76. The Cloud offers the most potent defense
and the most creative path forward
Sunday, 17 February 13
77. The Cloud offers the most potent defense
and the most creative path forward
Be prepared !
Sunday, 17 February 13
78. ca-global.org
cochrane.org.uk
Thank You
COCHRANE
a s s o c i a t e s
Sunday, 17 February 13