Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×

The Mobile Tribe

Ad

The	
  Mobile	
  Tribe	
  

Smart	
  Devices	
  +	
  Human	
  Behavior	
  =	
  Massive	
  Change	
  

Ad

Dan	
  Keldsen	
  –	
  Informa5on	
  Architected	
  
@dankeldsen	
  #mobilehumans	
  
     Exper;se:	
  
     •  Content/K...

Ad

BEFORE	
  WE	
  PRESUME	
  THAT   	
  
“MOBILE	
  IS	
  THE	
  ANSWER”
                              	
  
      OR	
  PERH...

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Hier ansehen

1 von 34 Anzeige
1 von 34 Anzeige

The Mobile Tribe

Herunterladen, um offline zu lesen

Slides from the webinar I co-presented for FierceContentManagement. Are you ready for enterprise mobile opportunities? Technology-wise? Skills-wise? Satisfying the work needs to be done AND can be done well with mobile? Time to find out!

Slides from the webinar I co-presented for FierceContentManagement. Are you ready for enterprise mobile opportunities? Technology-wise? Skills-wise? Satisfying the work needs to be done AND can be done well with mobile? Time to find out!

Anzeige
Anzeige

Weitere Verwandte Inhalte

Anzeige
Anzeige

The Mobile Tribe

  1. The  Mobile  Tribe   Smart  Devices  +  Human  Behavior  =  Massive  Change  
  2. Dan  Keldsen  –  Informa5on  Architected   @dankeldsen  #mobilehumans   Exper;se:   •  Content/Knowledge  Management   •  Innova;on  management     •  Enterprise  2.0/Web  2.0   Background:   •  Current:   •  Informa;on  Architected:  President,  Consultant   •  Level  50  SoOware:  Co-­‐founder,  Mobile  Social/UX  Strategy   (level50soOware.com)   •  Past:   •  AIIM:  Former  director  of  Market  Intelligence  unit   •  Delphi  Group:  Former  analyst,  consultant  and  CTO  
  3. BEFORE  WE  PRESUME  THAT   “MOBILE  IS  THE  ANSWER”   OR  PERHAPS  THAT   “MOBILE  IS  THE  PROBLEM”  
  4. HOW  MUCH  OF  YOUR  ENTERPRISE   ENVIRONMENT  DO  YOU  (OR  YOUR   USERS)  WANT  TO  HAVE  AVAILABLE  VIA   MOBILE?   0  <––––––––––––>  100%  
  5. HOW  “SECURE”  DOES  THAT  ACCESS/ ABILITY  NEED  TO  BE?   0  <––––––––––––>  100%  
  6. YOU  CAN’T  HAVE  “100%  SECURITY.”   IT’S  NOT  POSSIBLE.   EVEN  IF  IT  WERE,  YOU’D  BE  AS  LIKELY   TO  PREVENT  MANY  BENEFITS  AS  WELL   AS  PREVENTING  ATTACKS/LEAKAGES  
  7. Stop  thinking  of   security  as  being   “completely  safe”  
  8. Provide  Guard  Rails   Source: http://www.guzer.com/pictures/car_on_rail.php
  9. EX-­‐   PARANOID   SECURITY  GUY  
  10. Your  Security  =   Swiss  Cheese   Effec5veness   Reference: http://en.wikipedia.org/wiki/Swiss_cheese_model
  11. All  Security  Risks  are  Not  Equal  &  We  Are  TERRIBLE  at  Calcula5ng  Risk  
  12. WE  LITERALLY                  OUR  PHONES   (CAN  YOU  SAY  THE  SAME  FOR  YOUR   CONTENT  MANAGEMENT  PLATFORM?)  
  13. IS  YOUR   ORGANIZATION   READY  FOR   MOBILE?  
  14. SHOW  ME  YOU’RE  READY!   Source: “Jerry Maguire” (Copyright Sony Pictures Home Entertainment)
  15. THE  BAD  NEWS  
  16. YOU’RE  NOT  READY  FOR  THIS   I  WAS  (ALMOST)  KIDDING,  WHEN  I   WROTE  AN  ARTICLE  FOR  THE   BRAINYARD  LAST  YEAR…  
  17. NOT  READY…  TECHNOLOGICALLY  
  18. YOUR  SYSTEMS  ARE…   ANCIENT  AND  DECREPIT   3-­‐10  YEARS  OLD,  USUALLY  PROPRIETARY  (FOCUSED  ON  A   SINGLE  ENVIRONMENT),  STATIC  RATHER  THAN  DYNAMIC,   WINDOWS  ONLY,  ONE  BROWSER  ONLY,  FULL  OF  “DUMB   TERMINAL”  TO  ACCESS  REALLY  OLD  SYSTEMS…  
  19. 3  BIG  GAPS:   77%  MISSING  SKILLS,   55%  CULTURAL  ISSUES,   50%  INEFFECTIVE  IT   Source: MIT/Cap Gemini
  20. Q:  WHAT  WERE  THE  SALES  LEVELS  OF   THE  IPAD  JUST  3  YEARS  AGO?  
  21. A:  TRICK  QUESTION.  THE  IPAD  DIDN’T   EXIST  3  YEARS  AGO.   IF  YOU  ARE  ON  A  3-­‐10  YEAR  REFRESH   CYCLE,  YOU  WILL  HAVE  MISSED  3-­‐10   FULL  INNOVATION  CYCLES.  
  22. Q:  HOW  LONG  HAS  HTML  5  BEEN  A   STANDARD?  
  23. A:  IT  STILL  ISN’T!   IF  YOU’RE  WAITING  FOR  “STANDARDS”   –  PERHAPS  THAT’S  AN  EXCUSE  TO  HOLD   ONTO  A  PAST  NOT  WORTH  KEEPING.  
  24. We  Are  All   Pirates  on  the   SS  CoIT  
  25. Time  to  Jump  into   the   21st  Century  
  26. YOU  CAN’T  AFFORD  NOT  TO  EMBRACE   MOBILE  (+  CLOUD)   VERY  CLOSE  TO  FISCALLY  IRRESPONSIBLE   NOT  TO  CONSIDER  THIS  OPPORTUNITY  
  27. CONSIDER  MORE  THAN  SECURITY   “UNITED  SAID  THAT  PILOTS  TYPICALLY  CARRY  12,000  SHEETS   OF  PAPER  TO  CHART  THEIR  COURSE  DURING  FLIGHTS;  THE   INTRODUCTION  OF  THE  IPAD  SHOULD  SAVE  THE  AIRLINE  16   MILLION  SHEETS  OF  PAPER  AND,  THANKS  TO  THE  REDUCTION   IN  WEIGHT,  326,000  GALLONS  OF  JET  FUEL  PER  YEAR.”   Source: http://www.pcworldme.net/2011/08/23/united-airlines-cockpits-go-paperless-with-ipads/
  28. NON-­‐SECURITY  RELATED:   WE  WERE  NEVER  INTENDED  TO  SIT  IN   CUBES   MOBILE  OFFERS  AN  ABILITY  FOR  US  TO   GET  BACK  TO  BEING  HUMAN,  AND   THAT’S  BEEN  MISSING  FOR  DECADES  
  29. MOBILE  IS  AN   OPPORTUNITY  TO  RE-­‐HUMANIZE   YOUR  COMPANY   WE  CAN  WORK  FROM  ANYWHERE  –  SO  WHY   SHOULDN’T  WE  BE  ABLE  TO?   MOBILE  =  MOVEMENT  =  MENTAL  AND   PHYSICAL  HEALTH.  
  30. THINK  HUMAN-­‐CENTRIC,  NOT   COMPANY-­‐CENTRIC,  AND  CERTAINLY   NOT  SECURITY-­‐CENTRIC   INCREASE  THE  UPSIDE  POTENTIAL  VIA   MOBILE,  AND  BE  “REASONABLE”  ABOUT   THE  “NEW”  SECURITY  CONCERNS  OF   MOBILE  
  31. 20th Century/ 21st Century/ Proprietary Flexible
  32. BYOD   •  A  survey  covering  17  countries  by  business  technology   company  Avanade  found  that  88%  of  execu;ves  said   employees  were  using  their  own  personal  compu;ng   technologies  for  business  purposes.   •  Absolute  SoOware  found  that  64%  of  IT  managers  surveyed   thought  it  was  too  risky  to  let  personal  devices  be  integrated   into  the  business  network.  However  52%  of  companies   allowed  some  form  of  access.   •  Another  survey  by  Cisco  found  that  although  48%  said  their   company  would  never  authorize  employees  to  bring  their  own   devices,  57%  agreed  that  some  employees  use  personal   devices  without  consent.   Source: MIT/Cap Gemini
  33. Going  Mobile?  Let’s  talk.   Dan  Keldsen,  President   dk@informa;onarchitected.com   617-­‐933-­‐9655  

Hinweis der Redaktion

  • Period, at all, not by anyone or any organization. I can put you in touch with penetration testing teams I know if you don’t believe me. But you won’t sleep for weeks.Don’t believe Oracle’s “100% Secure” or whatever their ridiculous marketing claim was. It’s not possible.
  • Stop thinking “no risk” and create guard rails that keep your car on the road. Stuff happens, it’s how you react that’s more important than trying to prevent all bad things.There are always going to be people who accidentally or on purpose go beyond “expected behavior” – but trying to be “ultra-vigilent” is a serious mistake. It’s almost never worth it.You can’t afford “perfect security” and even if you could, it’s not possible. So instead of thinking “protect against all harm” – think “safely enable” – it opens up a much wider realm of opportunity.
  • Confession Time
  • Major moment for me as a security guy…Can’t protect against all threats. Completely impossible.We our are own worst enemies. I was in charge of security configurations and audits….Accidentally killed off all email EXCEPT spam for about 30 minutes. Not a good day in my career.Problem is… I thought I was going above and beyond to ultra-protective of the company. But one tiny misconfiguration completely reversed the expected risk profile… and that’s just a simple example of a major security hole that came about WITHOUT being attacked. Pure human misconfiguration of a truly terrible user interface. Checkpoint firewall, for those who are wondering.
  • There are no absolutes in security – but calculating risk and addressing various risk levels happens about as often as ROI calculations are done in enterprises, for the same reasons.We are terrible at calculating risks, we are predictably irrational in the way we make decisions, justify decisions after the fact, and prepare for future potential decisions.Both of these books are fantastic – as they show that are understanding of how decisions are made, how people think they’ll react and how they actually do, are not as “obvious” as we might think.Even professional risk takers “fail” quite often – that’s the point of risk – you calculate it and acknowledge that sometimes you’ll be wrong, but work to minimize the downside while maximizing the upside.
  • So, against my initial inclination for this webinar - I just can’t bring myself to make a massive deal out of mobile security and/or cloud concerns. They are just extensions and in many ways, a return to very old computing models.So let’s focus on whether you’re even ready to take advantage of what is, in my opinion, a massive opportunity to right some wrongs that have hampered us for far too long…
  • When’s the last time you loved any devices you have to use at work?Probably never.This is REALLY big folks.More people forget their spouses and children more often than they will forget their phone.And according to FMRi (functional magnetic resonance imaging) studies, we show signs of not just being addicted to mobile devices, but effectively “loving” our phones very literally. Exact same measurable response.Is that creepy? Exciting? Not sure – probably both – but this is a major moment for computers – away from the dry labs of mainframes and into devices in our pockets that have “lickable” user interfaces as the model.So… we love our phones, but is your enterprise ready for this?
  • We have all of this potential power right in our hands – let’s go for it!
  • Cap Gemini/MIT survey of 157 executives $1 billion+ revenue companies: The three top reasons why companies are finding it hard to implement tools like analytics, mobile technology, and social media for business are: missing skills (77%), cultural issues (55%), and ineffective IT (50%). It is clear that changing people’s work habits represent the biggest impediment to technology change.
  • So why is that? Seems like mobile devices are everywhere, right? And at this point, that they’ve been available forever…But what were the sales levels of the iPad just 3 years ago?
  • You already have pirates breaking the rules to get things done in your organization…Call it Consumerization of IT or CoIT – The outside world and normal pace of tech change at most companies is far behind the pace of change of the world at large.Bring your tribe of pirates together to HELP you, rather than end-run around you.
  • All of the biggest, clunkiest costs for the infrastructure of companies (computers, wiring systems, offices, buildings, etc.) are being eliminated – to not take advantage of the massive revolution of mobile + cloud is very close to fiscally irresponsible, in my viewBe ready to map out both the risks AND the opportunities available via mobile, cloud, etc.
  • If you over-focus on security, you miss out on all sorts of other ways to innovate in your business – that far outweigh security concerns.

×