Slides from the webinar I co-presented for FierceContentManagement. Are you ready for enterprise mobile opportunities? Technology-wise? Skills-wise? Satisfying the work needs to be done AND can be done well with mobile? Time to find out!
2. Dan
Keldsen
–
Informa5on
Architected
@dankeldsen
#mobilehumans
Exper;se:
• Content/Knowledge
Management
• Innova;on
management
• Enterprise
2.0/Web
2.0
Background:
• Current:
• Informa;on
Architected:
President,
Consultant
• Level
50
SoOware:
Co-‐founder,
Mobile
Social/UX
Strategy
(level50soOware.com)
• Past:
• AIIM:
Former
director
of
Market
Intelligence
unit
• Delphi
Group:
Former
analyst,
consultant
and
CTO
3. BEFORE
WE
PRESUME
THAT
“MOBILE
IS
THE
ANSWER”
OR
PERHAPS
THAT
“MOBILE
IS
THE
PROBLEM”
4. HOW
MUCH
OF
YOUR
ENTERPRISE
ENVIRONMENT
DO
YOU
(OR
YOUR
USERS)
WANT
TO
HAVE
AVAILABLE
VIA
MOBILE?
0
<––––––––––––>
100%
5. HOW
“SECURE”
DOES
THAT
ACCESS/
ABILITY
NEED
TO
BE?
0
<––––––––––––>
100%
6. YOU
CAN’T
HAVE
“100%
SECURITY.”
IT’S
NOT
POSSIBLE.
EVEN
IF
IT
WERE,
YOU’D
BE
AS
LIKELY
TO
PREVENT
MANY
BENEFITS
AS
WELL
AS
PREVENTING
ATTACKS/LEAKAGES
19. YOUR
SYSTEMS
ARE…
ANCIENT
AND
DECREPIT
3-‐10
YEARS
OLD,
USUALLY
PROPRIETARY
(FOCUSED
ON
A
SINGLE
ENVIRONMENT),
STATIC
RATHER
THAN
DYNAMIC,
WINDOWS
ONLY,
ONE
BROWSER
ONLY,
FULL
OF
“DUMB
TERMINAL”
TO
ACCESS
REALLY
OLD
SYSTEMS…
20. 3
BIG
GAPS:
77%
MISSING
SKILLS,
55%
CULTURAL
ISSUES,
50%
INEFFECTIVE
IT
Source: MIT/Cap Gemini
21. Q:
WHAT
WERE
THE
SALES
LEVELS
OF
THE
IPAD
JUST
3
YEARS
AGO?
22. A:
TRICK
QUESTION.
THE
IPAD
DIDN’T
EXIST
3
YEARS
AGO.
IF
YOU
ARE
ON
A
3-‐10
YEAR
REFRESH
CYCLE,
YOU
WILL
HAVE
MISSED
3-‐10
FULL
INNOVATION
CYCLES.
27. YOU
CAN’T
AFFORD
NOT
TO
EMBRACE
MOBILE
(+
CLOUD)
VERY
CLOSE
TO
FISCALLY
IRRESPONSIBLE
NOT
TO
CONSIDER
THIS
OPPORTUNITY
28. CONSIDER
MORE
THAN
SECURITY
“UNITED
SAID
THAT
PILOTS
TYPICALLY
CARRY
12,000
SHEETS
OF
PAPER
TO
CHART
THEIR
COURSE
DURING
FLIGHTS;
THE
INTRODUCTION
OF
THE
IPAD
SHOULD
SAVE
THE
AIRLINE
16
MILLION
SHEETS
OF
PAPER
AND,
THANKS
TO
THE
REDUCTION
IN
WEIGHT,
326,000
GALLONS
OF
JET
FUEL
PER
YEAR.”
Source: http://www.pcworldme.net/2011/08/23/united-airlines-cockpits-go-paperless-with-ipads/
29. NON-‐SECURITY
RELATED:
WE
WERE
NEVER
INTENDED
TO
SIT
IN
CUBES
MOBILE
OFFERS
AN
ABILITY
FOR
US
TO
GET
BACK
TO
BEING
HUMAN,
AND
THAT’S
BEEN
MISSING
FOR
DECADES
30. MOBILE
IS
AN
OPPORTUNITY
TO
RE-‐HUMANIZE
YOUR
COMPANY
WE
CAN
WORK
FROM
ANYWHERE
–
SO
WHY
SHOULDN’T
WE
BE
ABLE
TO?
MOBILE
=
MOVEMENT
=
MENTAL
AND
PHYSICAL
HEALTH.
31. THINK
HUMAN-‐CENTRIC,
NOT
COMPANY-‐CENTRIC,
AND
CERTAINLY
NOT
SECURITY-‐CENTRIC
INCREASE
THE
UPSIDE
POTENTIAL
VIA
MOBILE,
AND
BE
“REASONABLE”
ABOUT
THE
“NEW”
SECURITY
CONCERNS
OF
MOBILE
33. BYOD
• A
survey
covering
17
countries
by
business
technology
company
Avanade
found
that
88%
of
execu;ves
said
employees
were
using
their
own
personal
compu;ng
technologies
for
business
purposes.
• Absolute
SoOware
found
that
64%
of
IT
managers
surveyed
thought
it
was
too
risky
to
let
personal
devices
be
integrated
into
the
business
network.
However
52%
of
companies
allowed
some
form
of
access.
• Another
survey
by
Cisco
found
that
although
48%
said
their
company
would
never
authorize
employees
to
bring
their
own
devices,
57%
agreed
that
some
employees
use
personal
devices
without
consent.
Source: MIT/Cap Gemini
34. Going
Mobile?
Let’s
talk.
Dan
Keldsen,
President
dk@informa;onarchitected.com
617-‐933-‐9655
Hinweis der Redaktion
Period, at all, not by anyone or any organization. I can put you in touch with penetration testing teams I know if you don’t believe me. But you won’t sleep for weeks.Don’t believe Oracle’s “100% Secure” or whatever their ridiculous marketing claim was. It’s not possible.
Stop thinking “no risk” and create guard rails that keep your car on the road. Stuff happens, it’s how you react that’s more important than trying to prevent all bad things.There are always going to be people who accidentally or on purpose go beyond “expected behavior” – but trying to be “ultra-vigilent” is a serious mistake. It’s almost never worth it.You can’t afford “perfect security” and even if you could, it’s not possible. So instead of thinking “protect against all harm” – think “safely enable” – it opens up a much wider realm of opportunity.
Confession Time
Major moment for me as a security guy…Can’t protect against all threats. Completely impossible.We our are own worst enemies. I was in charge of security configurations and audits….Accidentally killed off all email EXCEPT spam for about 30 minutes. Not a good day in my career.Problem is… I thought I was going above and beyond to ultra-protective of the company. But one tiny misconfiguration completely reversed the expected risk profile… and that’s just a simple example of a major security hole that came about WITHOUT being attacked. Pure human misconfiguration of a truly terrible user interface. Checkpoint firewall, for those who are wondering.
There are no absolutes in security – but calculating risk and addressing various risk levels happens about as often as ROI calculations are done in enterprises, for the same reasons.We are terrible at calculating risks, we are predictably irrational in the way we make decisions, justify decisions after the fact, and prepare for future potential decisions.Both of these books are fantastic – as they show that are understanding of how decisions are made, how people think they’ll react and how they actually do, are not as “obvious” as we might think.Even professional risk takers “fail” quite often – that’s the point of risk – you calculate it and acknowledge that sometimes you’ll be wrong, but work to minimize the downside while maximizing the upside.
So, against my initial inclination for this webinar - I just can’t bring myself to make a massive deal out of mobile security and/or cloud concerns. They are just extensions and in many ways, a return to very old computing models.So let’s focus on whether you’re even ready to take advantage of what is, in my opinion, a massive opportunity to right some wrongs that have hampered us for far too long…
When’s the last time you loved any devices you have to use at work?Probably never.This is REALLY big folks.More people forget their spouses and children more often than they will forget their phone.And according to FMRi (functional magnetic resonance imaging) studies, we show signs of not just being addicted to mobile devices, but effectively “loving” our phones very literally. Exact same measurable response.Is that creepy? Exciting? Not sure – probably both – but this is a major moment for computers – away from the dry labs of mainframes and into devices in our pockets that have “lickable” user interfaces as the model.So… we love our phones, but is your enterprise ready for this?
We have all of this potential power right in our hands – let’s go for it!
Cap Gemini/MIT survey of 157 executives $1 billion+ revenue companies: The three top reasons why companies are finding it hard to implement tools like analytics, mobile technology, and social media for business are: missing skills (77%), cultural issues (55%), and ineffective IT (50%). It is clear that changing people’s work habits represent the biggest impediment to technology change.
So why is that? Seems like mobile devices are everywhere, right? And at this point, that they’ve been available forever…But what were the sales levels of the iPad just 3 years ago?
You already have pirates breaking the rules to get things done in your organization…Call it Consumerization of IT or CoIT – The outside world and normal pace of tech change at most companies is far behind the pace of change of the world at large.Bring your tribe of pirates together to HELP you, rather than end-run around you.
All of the biggest, clunkiest costs for the infrastructure of companies (computers, wiring systems, offices, buildings, etc.) are being eliminated – to not take advantage of the massive revolution of mobile + cloud is very close to fiscally irresponsible, in my viewBe ready to map out both the risks AND the opportunities available via mobile, cloud, etc.
If you over-focus on security, you miss out on all sorts of other ways to innovate in your business – that far outweigh security concerns.