SlideShare a Scribd company logo
1 of 34
Shah H Sheikh – Sr. Security Solutions Consultant
MEng CISSP CISA CISM CRISC CCSK
shah@dts-solution.com
The Digital Outsourcing (R)evolution
www.dts-solution.com
Agenda – The Digital Outsourcing (R)evolution
Digital Outsourcing - Information Technology
The role of Information Technology for the Enterprise
Cloud Computing – Leveraging Economies of Scale
Driving towards a Smarter Workforce
The Digital (R)evolution
The Digital Outsourcing (R)evolution
Year 1976 – 1st Apple Computer
with 8K RAM 
Who Remembers These?
8” > 5” > 3.5”
The Digital Outsourcing (R)evolution
The Digital Outsourcing (R)evolution
The Digital Outsourcing (R)evolution
• Information Technology is a business enabler
• Often seen as a CAPEX (if your line of business is not in
e-commerce)
Sales Accounting
Logistics
Finance
Production
Marketing
IT
The Digital Outsourcing (R)evolution
• A ‘typical’ Enterprise – IT Infrastructure Investments
• Internet Connectivity
• Online Presence – Website
• Endpoints (End User Computing Platform)
• Network and Security Infrastructure
• Firewalls, Anti-Virus, Data Loss Prevention etc…
• Email Infrastructure
• Voice over IP Infrastructure
• Social Media – Digital Marketing
• Backup and Storage
• Servers (Physical and Virtual)
• Applications – Intranet Portals, ERPs, Helpdesk + Software
…… THE LIST GOES ON 
The Digital Outsourcing (R)evolution
The Digital Outsourcing (R)evolution
The Digital Outsourcing (R)evolution
The Digital Outsourcing (R)evolution
The Digital Outsourcing (R)evolution
The Digital Outsourcing (R)evolution
The Digital Outsourcing (R)evolution
The Digital Outsourcing (R)evolution
On-demand self-
service
Consumer can unilaterally provision computing capabilities
as needed such as server time and network storage
automatically
Broad network
access
Capabilities are available over the network and accessed
through standard mechanisms that promote use by
heterogeneous thin or thick clients
Resource pooling
Provider’s computing resources are pooled to serve multiple
consumers using a multi-tenant model with resources
dynamically assigned according to consumer demand
Rapid elasticity
Measured service
Definition
Cloud computing is a model for
enabling convenient, on-demand
network access to a shared pool
of configurable computing
resources (for example, networks,
servers, storage, applications, and
services) that can be rapidly
provisioned and released with
minimal management effort or
service provider interaction
Essential characteristics
Capabilities can be rapidly and elastically provisioned, in
some cases automatically, to quickly scale out and rapidly
released to quickly scale in
Cloud systems automatically control and optimize resource
use by leveraging a metering capability at some level of
abstraction appropriate to type of service
Processing for the client-side application is moved away from
devices to a remote resource
Cloud Computing – Economies of Scale
Community clouds Public clouds Hybrid cloudsPrivate clouds
• Cloud infrastructure is
operated solely for an
organization
• It may be managed by the
organization or a third
party and may exist on
premise or off premise
• Cloud infrastructure is
shared by several
organizations and
supports a specific
community that has
shared concerns
• It may be managed by the
organizations or a third
party and may exist on
premise or off premise
• Cloud infrastructure is
made available to
general public and is
owned by an organization
selling cloud services
• Cloud infrastructure is
composition of two or
more clouds (private,
community or public)
that remain unique
entities but are bound
together by standardized
or proprietary
technology that enables
data and application
portability
Cloud Computing – Economies of Scale
Cloud Computing – Economies of Scale
Cloud Computing – Economies of Scale
Cloud Computing – Economies of Scale
Cloud Computing – Economies of Scale
Cloud Computing – Economies of Scale
Mandated by NESA UAE Cyber
Laws for Government Entities –
Data Sovereignty and Legalities
Data Custodian and Ownership…
Increased awareness – Cloud
Security Alliance
Outsourced IT Service Provider to
drive business competitiveness
The Smarter Workforce
• Mobility – Any device, any time, always on connectivity
• Team Collaboration – Tele-Presence and Virtual Meetings
• Sales Force and Business Development
• Digital Marketing – Social Presence …. +++
The Smarter Workforce
The Smarter Workforce
Drivers to Outsourcing
The Digital Outsourcing (R)evolution
• The Digital (R)evolution for your enterprise is well underway
• Smart City Initiatives in UAE is also driving this….
• Adoption of Cloud Technologies;
• Drive business growth through focus
• Improve workforce productivity
• Streamline and standardize IT
• Build Automation - Reduce Go-to-Market Time
• Building a Smarter Workforce
• Providing the tools for increased efficiency
• Business Process Outsourcing
The Digital Outsourcing (R)evolution
BUSINESS PROCESSES for Larger Organizations;
• Centralized Business Processes
• Shared Services Center (SSC) – In-House
• Decentralized Business Processes
• Silo – Fragmented
• Business Process Outsourcing (Service Provider)
• Control – Ensuring corporate compliance
• Reuse – Learning from previous experience
• Flexibility – Enabling local customer focus
• Direct cost – Using economies of scale
• Process – Enabling unit cooperation
• Transparency – Consolidated financials
• Personnel – Qualification requirements
Cloud
The Digital Outsourcing (R)evolution
Marketing Legal HR
Finance
Contact Center
IT Infrastructure
Cyber SecurityApplication Dev.
BPaaS
Many functions can be outsourced but you CAN’T outsource
your enterprise risk!
The Digital Outsourcing (R)evolution
Shah H Sheikh – Sr. Security Solutions Consultant
MEng CISSP CISA CISM CRISC CCSK
shah@dts-solution.com

More Related Content

What's hot

DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
Shah Sheikh
 

What's hot (20)

Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
SIEM evolution
SIEM evolutionSIEM evolution
SIEM evolution
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access Management
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security Intelligence
 
Qradar Business Case
Qradar Business CaseQradar Business Case
Qradar Business Case
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 

Viewers also liked

Comparative Study of Mod Security (Autosaved)
Comparative Study of Mod Security (Autosaved)Comparative Study of Mod Security (Autosaved)
Comparative Study of Mod Security (Autosaved)
Dashti Abdullah
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
Shah Sheikh
 

Viewers also liked (20)

DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
 
Clientside attack using HoneyClient Technology
Clientside attack using HoneyClient TechnologyClientside attack using HoneyClient Technology
Clientside attack using HoneyClient Technology
 
Comparative Study of Mod Security (Autosaved)
Comparative Study of Mod Security (Autosaved)Comparative Study of Mod Security (Autosaved)
Comparative Study of Mod Security (Autosaved)
 
Honeywall roo 2
Honeywall roo 2Honeywall roo 2
Honeywall roo 2
 
The Beginning Of World War Ii
The Beginning Of World War IiThe Beginning Of World War Ii
The Beginning Of World War Ii
 
The real and another
The real and anotherThe real and another
The real and another
 
Cyber Security Visualization
Cyber Security VisualizationCyber Security Visualization
Cyber Security Visualization
 
Staged Patching Approach in Oracle E-Business Suite
Staged Patching Approach in Oracle E-Business SuiteStaged Patching Approach in Oracle E-Business Suite
Staged Patching Approach in Oracle E-Business Suite
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
 
Ldap injection
Ldap injectionLdap injection
Ldap injection
 
Building Client-Side Attacks with HTML5 Features
Building Client-Side Attacks with HTML5 FeaturesBuilding Client-Side Attacks with HTML5 Features
Building Client-Side Attacks with HTML5 Features
 
Let Your Mach-O Fly, Black Hat DC 2009
Let Your Mach-O Fly, Black Hat DC 2009Let Your Mach-O Fly, Black Hat DC 2009
Let Your Mach-O Fly, Black Hat DC 2009
 
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxDetecting Evasive Malware in Sandbox
Detecting Evasive Malware in Sandbox
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
10 Google Analytics Features You Need to Know
10 Google Analytics Features You Need to Know10 Google Analytics Features You Need to Know
10 Google Analytics Features You Need to Know
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0
 
NetWatcher crowdsourcing
NetWatcher crowdsourcingNetWatcher crowdsourcing
NetWatcher crowdsourcing
 
Logs & Visualizations at Twitter
Logs & Visualizations at TwitterLogs & Visualizations at Twitter
Logs & Visualizations at Twitter
 
Cloud Computing Tools
Cloud Computing ToolsCloud Computing Tools
Cloud Computing Tools
 

Similar to DTS Solution - Outsourcing Outlook Dubai 2015

Group 39 presentation cloud computing
Group 39 presentation cloud computingGroup 39 presentation cloud computing
Group 39 presentation cloud computing
Deepak Shukla
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
EuroCloud
 
Cloud Computing Impact On Small Business
Cloud Computing Impact On Small BusinessCloud Computing Impact On Small Business
Cloud Computing Impact On Small Business
David Linthicum
 
Cloud Computing and Data Governance
Cloud Computing and Data GovernanceCloud Computing and Data Governance
Cloud Computing and Data Governance
Trillium Software
 
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Phil Copperwheat
 
Red Hat Ansible Client presentation Level 2.PPTX
Red Hat Ansible Client presentation Level 2.PPTXRed Hat Ansible Client presentation Level 2.PPTX
Red Hat Ansible Client presentation Level 2.PPTX
Alejandro Daricz
 

Similar to DTS Solution - Outsourcing Outlook Dubai 2015 (20)

Digital Business Transformation for Energy & Utility company
Digital Business Transformation for Energy & Utility companyDigital Business Transformation for Energy & Utility company
Digital Business Transformation for Energy & Utility company
 
Cloud Migration and Managed Services | Netfast
Cloud Migration and Managed Services | NetfastCloud Migration and Managed Services | Netfast
Cloud Migration and Managed Services | Netfast
 
Group 39 presentation cloud computing
Group 39 presentation cloud computingGroup 39 presentation cloud computing
Group 39 presentation cloud computing
 
Information technology in global arena & enterprise resource planning
Information technology in global arena & enterprise resource planningInformation technology in global arena & enterprise resource planning
Information technology in global arena & enterprise resource planning
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
 
Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...
Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...
Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...
 
ENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdfENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdf
 
TpM2013: Bruno Albietz : A Hotel in the Cloud
TpM2013: Bruno Albietz : A Hotel in the CloudTpM2013: Bruno Albietz : A Hotel in the Cloud
TpM2013: Bruno Albietz : A Hotel in the Cloud
 
Asyma E3 2014 The Impact of Cloud Computing on SME's
Asyma E3 2014   The Impact of Cloud Computing on SME'sAsyma E3 2014   The Impact of Cloud Computing on SME's
Asyma E3 2014 The Impact of Cloud Computing on SME's
 
Cloud Computing Impact On Small Business
Cloud Computing Impact On Small BusinessCloud Computing Impact On Small Business
Cloud Computing Impact On Small Business
 
Cloud Computing Trends in MSMEs (2).pdf
Cloud Computing Trends in MSMEs (2).pdfCloud Computing Trends in MSMEs (2).pdf
Cloud Computing Trends in MSMEs (2).pdf
 
Boot camp - Migration to AWS
Boot camp - Migration to AWSBoot camp - Migration to AWS
Boot camp - Migration to AWS
 
The cloud talk
The cloud talkThe cloud talk
The cloud talk
 
Bni cloud presentation
Bni cloud presentationBni cloud presentation
Bni cloud presentation
 
Cloud Computing and Data Governance
Cloud Computing and Data GovernanceCloud Computing and Data Governance
Cloud Computing and Data Governance
 
Vucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud PresentationVucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud Presentation
 
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
The Ultimate Guide to Cloud Migration - A Whitepaper by RapidValue
The Ultimate Guide to Cloud Migration - A Whitepaper by RapidValueThe Ultimate Guide to Cloud Migration - A Whitepaper by RapidValue
The Ultimate Guide to Cloud Migration - A Whitepaper by RapidValue
 
Red Hat Ansible Client presentation Level 2.PPTX
Red Hat Ansible Client presentation Level 2.PPTXRed Hat Ansible Client presentation Level 2.PPTX
Red Hat Ansible Client presentation Level 2.PPTX
 

More from Shah Sheikh

PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
Shah Sheikh
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
Shah Sheikh
 

More from Shah Sheikh (15)

DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
 
DTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingDTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration Testing
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
SeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysSeGW Whitepaper from Radisys
SeGW Whitepaper from Radisys
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

DTS Solution - Outsourcing Outlook Dubai 2015

  • 1. Shah H Sheikh – Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK shah@dts-solution.com The Digital Outsourcing (R)evolution www.dts-solution.com
  • 2. Agenda – The Digital Outsourcing (R)evolution Digital Outsourcing - Information Technology The role of Information Technology for the Enterprise Cloud Computing – Leveraging Economies of Scale Driving towards a Smarter Workforce
  • 4. The Digital Outsourcing (R)evolution Year 1976 – 1st Apple Computer with 8K RAM  Who Remembers These? 8” > 5” > 3.5”
  • 5. The Digital Outsourcing (R)evolution
  • 6. The Digital Outsourcing (R)evolution
  • 7. The Digital Outsourcing (R)evolution • Information Technology is a business enabler • Often seen as a CAPEX (if your line of business is not in e-commerce) Sales Accounting Logistics Finance Production Marketing IT
  • 8. The Digital Outsourcing (R)evolution • A ‘typical’ Enterprise – IT Infrastructure Investments • Internet Connectivity • Online Presence – Website • Endpoints (End User Computing Platform) • Network and Security Infrastructure • Firewalls, Anti-Virus, Data Loss Prevention etc… • Email Infrastructure • Voice over IP Infrastructure • Social Media – Digital Marketing • Backup and Storage • Servers (Physical and Virtual) • Applications – Intranet Portals, ERPs, Helpdesk + Software …… THE LIST GOES ON 
  • 9. The Digital Outsourcing (R)evolution
  • 10. The Digital Outsourcing (R)evolution
  • 11. The Digital Outsourcing (R)evolution
  • 12. The Digital Outsourcing (R)evolution
  • 13. The Digital Outsourcing (R)evolution
  • 14. The Digital Outsourcing (R)evolution
  • 15. The Digital Outsourcing (R)evolution
  • 16. The Digital Outsourcing (R)evolution
  • 17. On-demand self- service Consumer can unilaterally provision computing capabilities as needed such as server time and network storage automatically Broad network access Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick clients Resource pooling Provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model with resources dynamically assigned according to consumer demand Rapid elasticity Measured service Definition Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (for example, networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction Essential characteristics Capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to type of service Processing for the client-side application is moved away from devices to a remote resource Cloud Computing – Economies of Scale
  • 18. Community clouds Public clouds Hybrid cloudsPrivate clouds • Cloud infrastructure is operated solely for an organization • It may be managed by the organization or a third party and may exist on premise or off premise • Cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns • It may be managed by the organizations or a third party and may exist on premise or off premise • Cloud infrastructure is made available to general public and is owned by an organization selling cloud services • Cloud infrastructure is composition of two or more clouds (private, community or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability Cloud Computing – Economies of Scale
  • 19. Cloud Computing – Economies of Scale
  • 20. Cloud Computing – Economies of Scale
  • 21. Cloud Computing – Economies of Scale
  • 22. Cloud Computing – Economies of Scale
  • 23. Cloud Computing – Economies of Scale Mandated by NESA UAE Cyber Laws for Government Entities – Data Sovereignty and Legalities Data Custodian and Ownership… Increased awareness – Cloud Security Alliance Outsourced IT Service Provider to drive business competitiveness
  • 24. The Smarter Workforce • Mobility – Any device, any time, always on connectivity • Team Collaboration – Tele-Presence and Virtual Meetings • Sales Force and Business Development • Digital Marketing – Social Presence …. +++
  • 28. The Digital Outsourcing (R)evolution • The Digital (R)evolution for your enterprise is well underway • Smart City Initiatives in UAE is also driving this…. • Adoption of Cloud Technologies; • Drive business growth through focus • Improve workforce productivity • Streamline and standardize IT • Build Automation - Reduce Go-to-Market Time • Building a Smarter Workforce • Providing the tools for increased efficiency • Business Process Outsourcing
  • 29. The Digital Outsourcing (R)evolution BUSINESS PROCESSES for Larger Organizations; • Centralized Business Processes • Shared Services Center (SSC) – In-House • Decentralized Business Processes • Silo – Fragmented • Business Process Outsourcing (Service Provider) • Control – Ensuring corporate compliance • Reuse – Learning from previous experience • Flexibility – Enabling local customer focus • Direct cost – Using economies of scale • Process – Enabling unit cooperation • Transparency – Consolidated financials • Personnel – Qualification requirements
  • 30. Cloud
  • 31.
  • 32. The Digital Outsourcing (R)evolution Marketing Legal HR Finance Contact Center IT Infrastructure Cyber SecurityApplication Dev. BPaaS Many functions can be outsourced but you CAN’T outsource your enterprise risk!
  • 33. The Digital Outsourcing (R)evolution
  • 34. Shah H Sheikh – Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK shah@dts-solution.com